?url_ver=Z39.88-2004&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Adc&rft.title=Threshold+Verification+Technique+for+Network+Intrusion+Detection+System&rft.creator=Mohd+Faizal+%2C+A.&rft.creator=Mohd+Zaki+%2C+M.&rft.creator=Shahrin+%2C+S.&rft.creator=Robiah+%2C+Y.&rft.creator=Siti+Rahayu+%2C+S.&rft.subject=Complexity+Theory&rft.subject=Dynamical+Systems&rft.description=Internet+has+played+a+vital+role+in+this+modern+world%2C+the+possibilities+and+opportunities+offered+are+limitless.+Despite+all+the+hype%2C+Internet+services+are+liable+to+intrusion+attack+that+could+tamper+the+confidentiality+and+integrity+of+important+information.+An+attack+started+with+gathering+the+information+of+the+attack+target%2C+this+gathering+of+information+activity+can+be+done+as+either+fast+or+slow+attack.+The+defensive+measure+network+administrator+can+take+to+overcome+this+liability+is+by+introducing+Intrusion+Detection+Systems+(IDSs)+in+their+network.+IDS+have+the+capabilities+to+analyze+the+network+traffic+and+recognize+incoming+and+on-going+intrusion.+Unfortunately+the+combination+of+both+modules+in+real+time+network+traffic+slowed+down+the+detection+process.+In+real+time+network%2C+early+detection+of+fast+attack+can+prevent+any+further+attack+and+reduce+the+unauthorized+access+on+the+targeted+machine.+The+suitable+set+of+feature+selection+and+the+correct+threshold+value%2C+add+an+extra+advantage+for+IDS+to+detect+anomalies+in+the+network.+Therefore+this+paper+discusses+a+new+technique+for+selecting+static+threshold+value+from+a+minimum+standard+features+in+detecting+fast+attack+from+the+victim+perspective.+In+order+to+increase+the+confidence+of+the+threshold+value+the+result+is+verified+using+Statistical+Process+Control+(SPC).+The+implementation+of+this+approach+shows+that+the+threshold+selected+is+suitable+for+identifying+the+fast+attack+in+real+time.&rft.publisher=IJCSIS&rft.contributor=Managing+Editor%2C+IJCSIS&rft.date=2009-06&rft.type=Journal+(On-line%2FUnpaginated)&rft.type=PeerReviewed&rft.format=application%2Fpdf&rft.identifier=http%3A%2F%2Fcogprints.org%2F6555%2F1%2F27050954_Camera_Ready.pdf&rft.identifier=++Mohd+Faizal+%2C+A.+and+Mohd+Zaki+%2C+M.+and+Shahrin+%2C+S.+and+Robiah+%2C+Y.+and+Siti+Rahayu+%2C+S.++(2009)+Threshold+Verification+Technique+for+Network+Intrusion+Detection+System.++%5BJournal+(On-line%2FUnpaginated)%5D+++++&rft.relation=http%3A%2F%2Fcogprints.org%2F6555%2F