The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Currently, most computer systems use user IDs and passwords as the login patterns to authenticate users. However, many people share their login patterns with coworkers and request these coworkers to assist co-tasks, thereby making the pattern as one of the weakest points of computer security. Insider attackers, the valid users of a system who attack the system internally, are hard to detect since...
The data structure course is very important for information communication technology learning. However, some students can learn data structures well, but most students feel difficult to understand the contents of the data structure course. Therefore, a data structure exercise system applying self-regulated learning mechanism was used for students to learn by their own goals and strategies, and this...
We present a desktop monitoring application that combines keyboard, mouse, desktop and application-level activities. It has been developed to discover differences in cognitive functioning amongst older computer users indicative of mild cognitive impairment (MCI). Following requirements capture from clinical domain experts, the tool collects all Microsoft Windows events deemed potentially useful for...
Botnet detection plays an important role in network security. Botnet are collection of compromised computers called the bot. For detecting the presence of bots in a network, there are many detection techniques available. Network based detection method is the one of the efficient method in detecting bots. Paper reviews four different botnet detection techniques and a comparison of all these techniques...
The concept behind this particular aspect lies on the fact to determine and customize the simplicity and the most basic scenario. The basicity lies on the fact that we have been using the concept of Data Mining and even the algorithms are included that merely includes the efficiency of NIDS that is Network Intrusion Detection System. We have seen a lot of aspects and different concepts being used...
Database audit logs contain the information about database operations which are helpful to verify accuracy, lawfulness and to report risks. In financial systems, the audit logs should be monitored on continuous basis in order to detect and take action against any reasonably abnormal behavior. Outlier detection is a very important concept in the data mining which is useful in data analysis. Nowadays,...
Computer controlled machinery is perceived as a cyber-physical system. Such systems are vulnerable to cyber attacks of ever-growing sophistication with potentially severe consequences. To address this threat advanced security/status monitoring measures are to be developed and deployed within the framework of industrial control systems. A system diagnostic approach based on modeling and assessment...
We conducted a cross-sectional retrospective study in order to evaluate the usage of the software named Moodle Learning Management Software (LMS) with the purpose of educational auditing and its functionality. The study was performed over a practice of education, which deals with PBL activities with a networked learning approach. Course subjects were the instructional principles and methods. Students...
In computer network security, a Network Intrusion Detection (NID) is an Intrusion Detection mechanism that attempts to discover unauthorized access to a computer network by analyzing traffic on the network for signs of malicious activity. There are many areas of research in this vast field of Network Intrusion Detection (NID) but in this survey paper, we will focus on its technology, development &...
Frequent Itemset [1] mining is a key step in association rule problem. Early classical algorithms are serial algorithms, such as the Apriori [2], and FP-growth [3]. With the rapid development of information technology, today, the amount of data often needed to handle is based on GB or TB, which has forced the efficiency of mining algorithms significantly improved. At present, more effective method...
Every enterprise wants to protect their data from both the internal and external attackers. In this initiative firewall, encryption, and authentication serve as the first line of defense. And Intrusion Detection serves as the second line of defense. IDS may use either anomaly based approach or misuse based approach. Traditional IDS were making use of misuse based approach. The drawback of misuse based...
Focusing on the application of mixed data fuzzy clustering in network monitoring, based on a dynamic growth and delete self-organizing maps model (DGDSOM), an algorithm of fuzzy dynamic growth and delete self-organizing maps (FDGDSOM) is proposed. This algorithm introduces the triggering system and designs the triggering module, and makes the intelligent judgment and decision according to the real-time...
One of the biggest problems in sensitive data wiping is to determine if a file is sensitive or not. Data wiping applications have improved a lot, but they cannot determine by themselves if a file is sensitive. The method we propose tries to determine if a file is sensitive by using a pre-defined set of rules initially specified by the user. These rules can update themselves in time, by “learning”...
Intrusion Detection Systems (IDSs) have become an efficient defense tool against network attacks since they allow network administrator to detect policy violations. However, traditional IDs are vulnerable to original and novel malicious attacks. Also, it is very inefficient to analyze from a large amount volume data such as possibility logs. In addition, there are high false positives and false negatives...
Networked computer systems continue to grow in scale and in the complexity of their components and interactions. Component failures become norms instead of exceptions in these environments. A failure will cause one or multiple computer(s) to be unavailable, which affects the resource utilization and system throughput. When a computer fails to function properly, health-related data are valuable for...
Detecting and identifying security events to provide cyber situation awareness has become an increasingly important task within the network research and development community. We propose a graph similarity-based approach to event detection and identification that integrates a number of techniques to collect time-varying situation information, extract correlations between event attributes, and characterize...
Intrusion Detection System (IDS) is the key technology to ensure the security of dynamic systems. We employ a sequential pattern mining approach to discover significant system call sequences to prevent malicious attacks. To reduce the computing time of generating meaningful rules, we design a weighted suffix tree structure to detect intrusive events on the fly. The experimental results show our method...
This paper analyzes the status of the computer lab and traditional management of several problems, made use of its software and manage the development of secondary development of access control systems and remote video monitoring systems to automate the management of design. Realization of the system mainly uses the middleware technology, pattern recognition, data mining technology to solve the organic...
Interactive Question and Answering System (IQA) is a new question and answer research field. IQA guides users to complement the missing question information through some interaction strategy. It overcomes the defect that traditional question answering system cannot handle questions with incomplete information; it also reduces the requirement for questions analysis. This paper introduces the mechanism...
Botnet was composed of the virus-infected computers severely threaten the security of internet. Hackers, firstly, implanted virus in targeted computers, which were then commanded and controlled by them via the internet to operate distributed denial of services (DDoS), steal confidential information, distribute junk mails and other malicious acts. By imitating P2P software, P2P botnet used multiple...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.