Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The Internet, networks and the means of communication in the world of communication and information have greatly influenced all aspects of the information cycle until things have been turned upside down, and it has even been said that today the world can be separated into two worlds: the world of pre-internet and post-Internet.
Perhaps one of the most important data of the Internet in the world of information and journalism is electronic publishing, which comes blogging as one of its forms. Blogs, which have begun slowly in the form of personal diaries, developed and spread on the Internet very quickly and started to have its own universe, the world of blogging. It has begun to make its way in the world of journali
... Show MoreThe present study was conducted to investigate the relationship between critical thinking, epistemological beliefs, and learning strategies with the academic performance of high school first-grade male and female students in Yazd. For this purpose, from among all first-grade students, as many as 250 students (130 females and 120 males) were selected by using multistage cluster sampling. The data needed were then collected through using California Critical Thinking Skills Test, Schommer's Epistemological Beliefs Questionnaire, Biggs’ Revised Two Factor Study Process Questionnaire. The findings indicated that there is a positive significant relationship between critical thinking and academic performance and achievement. Moreover, four fa
... Show MoreThis research examines the issue of Internet banking services and their impact on customer's perceived value to know the potential of Iraqi commercial Banks to provide Internet banking services as well as determine the customer's level of perception of the value of such services. The research aims to demonstrate the effect that Internet banking services have on the customer's perceived value and to find how online banking services can be used to add value that the customer perceive. The main findings were that research sample banks don't have a sophisticated network of electronic Windows through which banking services are provided to allow customers to manage their accounts, and perform various operational operations through the
... Show MoreCoaches and analysts face a significant challenge of inaccurate estimation when analyzing Men's 100 Meter Sprint Performance, particularly when there is limited data available. This necessitates the use of modern technologies to address the problem of inaccurate estimation. Unfortunately, current methods used to estimate Men's 100 Meter Sprint Performance indexes in Iraq are ineffective, highlighting the need to adopt new and advanced technologies that are fast, accurate, and flexible. Therefore, the objective of this study was to utilize an advanced method known as artificial neural networks to estimate four key indexes: Accelerate First of 10 meters, Speed Rate, Time First of 10 meters, and Reaction Time. The application of artifi
... Show MoreThe research aimed to find the effectiveness of teaching impact of the reflex learning strategy on the fifth class female student achievement of the geography content material). The researcher adopted the null hypotheses (there are no statistically significant differences at (0,05) level between the women score mean of the experimental group student who has been taught by the cement material assigned by the reflex learning strategy, and that of the control group who have been taught by the traditional method on the achievement test. The researcher adopted the post-test experimental design to measure students’ achievement. The population of the present study has been limited to the fifth literary class female stud
... Show MoreAbstract
In order to enhance the efficiency of flat plate solar water collectors without changing in its original shape and with low additional cost, twisted strips are inserted inside its riser pipes. Three flat plate collectors are used for test. Family of twisted strips are inserted inside each collector risers with different twisted ratios (TR=3,4,5). The collectors are connected in parallel mode (Z-Configuration) and are exposed to the same conditions (solar radiation and ambient temperature) .The experimental results show that, the highest heat transfer rate occurs at twisted ratio (3) .Consequently, for the same twisted ratio the daily efficiencies for the solar collector at d
... Show MoreThe extraction process of chlorophyll from dehydrated and pulverized alfalfa plant were studied by percolation method. Two solvent systems were used for the extraction namely; Ethanol-water and Hexane-Toluene systems . The effect of circulation rate, solvent concentration, and solvent volume to solid weight ratio were studied. In both ethanol water, and Hexane-Toluene systems it appears that solvent concentration is the most effective variable.
ABSTRACT: In this research SnO2 thin films have been prepared by using hot plate atmospheric pressure chemical vapor deposition (HPCVD) on glass and Si (n-type) substrates at various temperatures. Optical properties have been measured by UV-VIS spectrophotometer, maximum transmittance about (94%) at 400 0C. Structure properties have been studied by using X-ray diffraction (XRD) , its shows that all films have a crystalline structure in nature and by increasing growth temperature from(350-500) 0C diffraction peaks becomes sharper and grain size has been change. Atomic force microscopy (AFM) uses to analyze the morphology of the Tine Oxides surface structure. Roughness & Root mean square for different temperature have been investigated. The r
... Show MoreA New developed technique to estimate the necessary six elastic constants of homogeneous laminate of special orthotropic properties are presented in this paper for the first time. The new approach utilizes the elasto-static deflection behavior of composite cantilever beam employing the famous theory of Timoshenko. Three extracted strips of the composite plate are tested for measuring the bending deflection at two locations. Each strip is associated to a preferred principal axis and the deflection is measured in two orthogonal planes of the beam domain. A total of five trails of testing is accomplished and the numerical results of the stiffness coefficients are evaluated correctly under the contribution of the macromechanic
... Show MoreIn the last decade, the web has rapidly become an attractive platform, and an indispensable part of our lives. Unfortunately, as our dependency on the web increases so programmers focus more on functionality and appearance than security, has resulted in the interest of attackers in exploiting serious security problems that target web applications and web-based information systems e.g. through an SQL injection attack. SQL injection in simple terms, is the process of passing SQL code into interactive web applications that employ database services such applications accept user input such as form and then include this input in database requests, typically SQL statements in a way that was not intende
... Show More