The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
As security threats advance in a drastic way, most of the organizations implement multiple network intrusion detection systems (NIDSs) to optimize detection and to provide comprehensive view of intrusion activities. But NIDSs trigger a massive amount of alerts even for a day and overwhelmed security experts. Thus, automated and intelligent clustering is important to reveal their structural correlation...
Both supervised and unsupervised learning are popularly used to address the classification problem in anomaly intrusion detection. The classical and challenging task in intrusion detection is how to identify and classify new attacks or variants of normal traffic. Though the classification rate is not at par with supervised approach, unsupervised approach is not affected by the unknown attacks. Inspired...
Many users applied built-in random generator for their cryptography applications which is simple and fast. However, the randomness of generated pseudorandom numbers (PRNs) is under questioned whether it can support the reliable security in secure communication. In this paper, we examined two kinds of pseudorandom bit sequence (PRBS); conventional PRBS and chaos-based PRBS. Linear congruential method,...
Skin detection is well known to detect the appearance of human and human parts within an image. However, there are several limitations exist in skin detection when using skin colour as cue to detect skin appearance. These limitations include problems such as illumination, skin-like pixels and camera characteristic. In this paper, a set of modified fuzzy rules has been introduced to deal with the skin-lie...
The exponential increase of information in Internet has raise the issue of information security. Pornography Web content is one of the biggest harmful resource that pollute the mind of children and teenagers. Several Web content based analysis approaches had been proposed to avoiding these illicit Web content accessing by the children. However implementation of each solution still remain as an issue...
In the autonomous environment of mobile ad hoc network (MANET) where nodes are free to move around and depend on each other to initiate communication, cooperation among nodes is an essential component of a successful data transmission process. Since there is no central controller such as router to determine the communication paths in MANET, each node in the ad hoc network has to rely on each other...
To achieve high accuracy while lowering false alarm rates are major challenges in designing an intrusion detection system. In addressing this issue, this paper proposes an ensemble of one-class classifiers where each uses different learning paradigms. The techniques deployed in this ensemble model are; linear genetic programming (LGP), adaptive neural fuzzy inference system (ANFIS) and random forest...
This paper investigates loss of self-similarity (LoSS) detection performance using exact and asymptotic second order self-similarity (ESOSS and ASOSS) models. Previous works on LoSS detection have used ESOSS model with fixed sampling that we believe is insufficient to reveal LoSS detection efficiently. In this work, we study two variables known as sampling level and correlation lag in order to improve...
This paper analyzes loss of self-similarity (LoSS) detection accuracy using parameterpsilas adjustment which includes different values of sampling level and correlation lag. This is important when considering exact and asymptotic self-similar models concurrently in the self-similarity parameter estimation method. Due to the needs of high accuracy and fast estimation, the optimization method (OM) based...
Efficiency is one of the major issues in intrusion detection. Inefficiency is often attributed to high overhead and this is caused by several reasons. Among them are continuous detection and the use of full feature set to look for intrusive patterns in the network packet. The purpose of this paper are; to address the issue of continuous detection by introducing traffic monitoring mechanism and a lengthy...
In a mobile ad hoc network (MANET) where security is a crucial issue, trust plays an important factor that could improve the number of successful data transmission process. The higher the numbers of nodes that trust each other in the network means the higher successful communication process rates could be expected. To determine trust, there are several criteria need to be considered. These criteria...
This paper proposes a continuous Loss of Self-Similarity (LoSS) detection using iterative window and Multi-Level Sampling (MLS) approach. The method defines LoSS based on Second Order Self-Similarity (SOSS) statistical model. The Optimization Method (OM) is used to estimate self-similarity parameter since it is fast and more accurate in comparison with other estimation methods known in the literature...
Most of existing intrusion detection systems use all data features to detect an intrusion. Very little works address the importance of having a small feature subset in designing an efficient intrusion detection system. Some features are redundant and some contribute little to the intrusion detection process. The purpose of this study is to investigate the effectiveness of rough set theory in identifying...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.