A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function
Бесплатный доступ
The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence new signatures for novel attacks can be troublesome, time consuming and has high false alarm rate. To achieve this, system was trained and tested with known and unknown patterns with the help of Radial Basis Functions (RBF). KDD 99 IDE (Knowledge Discovery in Databases Intrusion Detection Evaluation) data set was used for training and testing. The IDS is supposed to distinguish normal traffic from intrusions and to classify them into four classes: DoS, probe, R2L and U2R. The dataset is quite unbalanced, with 79% of the traffic belonging to the DoS category, 19% is normal traffic and less than 2% constitute the other three categories. The usefulness of the data set used for experimental evaluation has been demonstrated. The different metrics available for the evaluation of IDS were also introduced. Experimental evaluations were shown that the proposed methods were having the capacity of detecting a significant percentage of rate and new attacks.
ID: 15010374 Короткий адрес: https://sciup.org/15010374
Статьи выпуска 1 vol.4, 2012 International Journal of Modern Education and Computer Science (IJMECS)
Element-Based Computational Model
Статья научная
A variation on the data-flow model is proposed to use for developing parallel architectures. While the model is a data driven model it has significant differences to the data- flow model. The proposed model has an evaluation cycle of processing elements (encapsulated data) that is similar to the instruction cycle of the von Neumann model. The elements contain the information required to process them. The model is inherently parallel. An emulation of the model has been implemented. The objective of this paper is to motivate support for taking the research further. Using matrix multiplication as a case study, the element/data-flow based model is compared with the instruction-based model. This is done using complexity analysis followed by empirical testing to verify this analysis. The positive results are given as motivation for the research to be taken to the next stage - that is, implementing the model using FPGAs.
Бесплатно
Perceived Gender Classification from Face Images
Статья научная
Perceiving human faces and modeling the distinctive features of human faces that contribute most towards face recognition are some of the challenges faced by computer vision and psychophysics researchers. There are many methods have been proposed in the literature for the facial features and gender classification. However, all of them have still disadvantage such as not complete reflection about face structure, face texture. The features set is applied to three different applications: face recognition, facial expressions recognition and gender classification, which produced the reasonable results in all database. In this paper described two phases such as feature extraction phase and classification phase. The proposed system produced very promising recognition rates for our applications with same set of features and classifiers. The system is also real-time capable and automatic.
Бесплатно
Using Virtual Security Lab in Teaching Cryptography
Статья научная
Teaching Information Security for undergraduate students requires a safe hand-on environment for practicing. This paper focuses on using a virtual lab for two modules in cryptography concepts. At the end, a survey was conducted on a group of students at the Information Systems Department at the King Abdulaziz University to measure the performance of the students’ outcomes in the lab comparing with other students from a previous semester. The result of the survey shows a significant feedback on the system.
Бесплатно
Finding Vulnerabilities in Rich Internet Applications (Flex/AS3) Using Static Techniques
Статья научная
The number and the importance of Rich Internet Applications (RIA) have increased rapidly over the last years. At the same time, the quantity and impact of security vulnerabilities in such RIA applications have grown as well. Since manual code reviews are time-consuming, error prone and costly,the need for automated solutions has become evident.In this paper, we address the problem of vulnerable detection on Adobe Flex RIA web 2.0 applications by means of static source code analysis. To this end, we present a novel; precise alias analysis targeted at the unique reference semantics commonly found in RIA based web applications or widgets developed in Adobe Flex Framework or Action Script 3.0. Moreover, we enhance the quality and quantity of the generated vulnerability reports.
Бесплатно
Статья научная
Biometric passports is to prevent the illegal entry of traveler into a specific country and limit the use of counterfeit documents by more accurate identification of an individual. The e-passport, as it is sometimes called,represents a bold initiative in the deployment of two new technologies: Cryptography security and biometrics face and fingerprints. The privacy and security implications of this impending worldwide experiment in biometrics face and fingerprints authentication technology. An overall security process that involves people, technology and procedures can overcome limitations of the Cryptography security and face and fingerprint biometric passport using ASP.Net.
Бесплатно
Blinds Children Education and Their Perceptions towards First Institute of Blinds in Pakistan
Статья научная
This paper investigates the parental participation,their perceptions and opinions about the education of their visually handicapped children in the first institute for the blinds children in Multan Pakistan. Students with visual impairments have unique educational needs which could most effectively meet using a team approach of professionals,parents and students. In order to meet their unique needs,students must have specialized services, books and materials in appropriate media to enable them to most effectively compete with their peers in school and ultimately in society.This study examines the role of education imparted by the institute as felt by the parents of visually impaired children admitted at the institute for blinds.
Бесплатно
The Model of the Evolution of the Knowledge Content and Contemporary Science Education Crisis
Статья научная
We try to diagnose the situation in science education in the beginning of the 21st century. The coincidence of the occurrence of the global science education crisis and rapid acceleration of development of the science itself allows us to derive a differential equation describing basic patterns of development of human knowledge, using a few quite obvious parameters defined by social and biological determinants of the given moment in history.We then examine the proposed solutions of the general educational problem. Predictions about the evolution of knowledge/science give us the ability to reject some of them,and the analysis of social needs, seems to lead to the one,which we called a "three-way system".
Бесплатно
A Frame of Intrusion Detection Learning System Utilizing Radial Basis Function
Статья научная
The process of monitoring the events that occur in a computer system or network and analyzing them for signs of intrusion is known as Intrusion Detection System (IDS). Detection ability of most of the IDS are limited to known attack patterns; hence new signatures for novel attacks can be troublesome, time consuming and has high false alarm rate. To achieve this, system was trained and tested with known and unknown patterns with the help of Radial Basis Functions (RBF). KDD 99 IDE (Knowledge Discovery in Databases Intrusion Detection Evaluation) data set was used for training and testing. The IDS is supposed to distinguish normal traffic from intrusions and to classify them into four classes: DoS, probe, R2L and U2R. The dataset is quite unbalanced, with 79% of the traffic belonging to the DoS category, 19% is normal traffic and less than 2% constitute the other three categories. The usefulness of the data set used for experimental evaluation has been demonstrated. The different metrics available for the evaluation of IDS were also introduced. Experimental evaluations were shown that the proposed methods were having the capacity of detecting a significant percentage of rate and new attacks.
Бесплатно