2019
DOI: 10.22219/kinetik.v4i3.740
|View full text |Cite
|
Sign up to set email alerts
|

Implementing Flash Event Discrimination in IP Traceback using Shark Smell Optimisation Algorithm

Abstract: Denial of service attack and its variants are the largest ravaging network problems. They are used to cause damage to network by disrupting its services in order to harm a business or organization. Flash event is a network phenomenon that causes surge in normal network flow due to sudden increase in number of network users, to curtail the menace of the Denial of service attack it is pertinent to expose the perpetrator and take appropriate action against it. Internet protocol traceback is a network forensic too… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2022
2022

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
0
2
0
Order By: Relevance
“…Measurement of technology quality uses three parameters, namely delay and packet loss. The purpose of the test is to find out how the built topology affects the quality of the network installation [22]. In network testing, several network treatment scenarios are needed before being implemented.…”
Section: Testing Modelmentioning
confidence: 99%
“…Measurement of technology quality uses three parameters, namely delay and packet loss. The purpose of the test is to find out how the built topology affects the quality of the network installation [22]. In network testing, several network treatment scenarios are needed before being implemented.…”
Section: Testing Modelmentioning
confidence: 99%
“…But the fragile nature of digital data, e.g., wireless sensor data [1], may make it difficult to be extracted successfully in a way that will not hamper its successful use to generate genuine information. This is because it can be easily damaged by improper handling, unethical inspection method [2], or an attack on the network [3]. Manipulations, made deliberately or by mistake, that alters the state or interpretation of data can render it unacceptable [4] for analysis.…”
Section: Introductionmentioning
confidence: 99%