Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Y. Robiah is active.

Publication


Featured researches published by Y. Robiah.


2010 Second International Conference on Network Applications, Protocols and Services | 2010

Time Based Intrusion Detection on Fast Attack for Network Intrusion Detection System

M. A. Faizal; M. Mohd Zaki; Shahrin Sahib; Y. Robiah; S. Siti Rahayu; Y Asrul Hadi

In recent years network attack are easily launch since the tools to execute the attack are freely available on the Internet. Even the script kiddies can initiate a sophisticated attack with just a basic knowledge on network and software technology. To overcome this matter, Intrusion Detection System (IDS) has been used as a vital instrument in defending the network from this malicious activity. With the ability to analyze network traffic and recognize incoming and on-going network attack, majority of network administrator has turn to IDS to help them in detecting anomalies in network traffic. The gathering of information and analysis on the anomalies activity can be classified into fast and slow attack. Since fast attack activity make a connection in few second and uses a large amount of packet, detecting this early connection provide the administrator one step ahead in deflecting further damages towards the network infrastructure. This paper describes IDS that detects fast attack intrusion using time based detection method. The time based detection method calculates the statistic of the frequency event which occurs between one second time intervals for each connection made to a host thus providing the crucial information in detecting fast attack.


arXiv: Cryptography and Security | 2009

A New Generic Taxonomy on Hybrid Malware Detection Technique

Y. Robiah; S. Siti Rahayu; M. Mohd Zaki; S. Shahrin; M. A. Faizal; R. Marliza


arXiv: Cryptography and Security | 2009

Threshold Verification Technique for Network Intrusion Detection System

M. A. Faizal; M. Mohd Zaki; S. Shahrin; Y. Robiah; S. Siti Rahayu; B. Nazrulazhar


arXiv: Cryptography and Security | 2010

New Multi-step Worm Attack Model

Y. Robiah; S. Siti Rahayu; S. Shahrin; M. A. Faizal; M. Mohd Zaki; R. Marliza


international symposium on information technology | 2010

An improved traditional worm attack pattern

Y. Robiah; S. Siti Rahayu; Shahrin Sahib; M. Mohd Zaki; M. A. Faizal; R. Marliza


Archive | 2007

Real Time Traffic Classification For Intrusion Detection System

S. Shahrin; Abdollah Mohd Faizal; Y. Robiah; Selamat Siti Rahayu


Archive | 2016

An Evaluation Of N-gram System Call Sequence In Mobile Malware Detection

Mas'ud Mohd Zaki; S. Shahrin; Abdollah Mohd Faizal; Selamat Siti Rahayu; Y. Robiah


arXiv: Cryptography and Security | 2009

Tracing Technique for Blaster Attack

S. Siti Rahayu; Y. Robiah; S. Shahrin; M. A. Faizal; M. Mohd Zaki; Roslan Irda


Archive | 2016

FORMULATING GENERALIZE MALWARE ATTACK PATTERN USING FEATURES SELECTION

Y. Robiah; Mas'ud Mohd Zaki; Selamat Siti Rahayu; Abdollah Mohd Faizal; S. Shahrin; Mohd Dollah Rudy Fadhlee


Archive | 2011

Developing Worm Trace Pattern For Forensic Investigation

Y. Robiah; Selamat Siti Rahayu; Mas'ud Mohd Zaki; S. Shahrin

Collaboration


Dive into the Y. Robiah's collaboration.

Top Co-Authors

Avatar

M. A. Faizal

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge