Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.
The effect of Wood Flour addition to the gamma alumina powder used in the preparation of gamma alumina (ɤ-Al2O3) catalyst carrier extrudates on the pore volume and BET surface area physical properties was investigated. Two parameters which are size of wood flour particles and its quantity were studied. The sizes of wood flour particles used are 150 µm, 212 µm and 500 µm and the weight percentage added to the gamma alumina powder during the preparation of the extrudates are (1%, 3%, 5% and 10%). The results showed that the addition of wood flour to the gamma alumina powder in order to get gamma alumina extrudates used as catalyst carrier is one of the successful methods to improve the pore volume
... Show Moreבמחקר זה אבקש לעסוק בתימת העקדה בשירתה של חוה פנחס כוהן. סיפור העקדה נבחר לעמוד בבסיסה של המחקר ממספר סיבות. ראשית, כיון שהסיפור הוא סיפור משמעותי, מאורע חשוב במסורת היהודית. שנית, כיוון שעניינו אותי מערכות היחסים השונות בסיפור. מערכת היחסים בין יהוה לאברהם, מערכת היחסים בתוך המשפחה ומערכת היחסים בין יצחק לאברהם. במערכות היחסים הללו משכו את תשומת לבי גם אותם דברים שאינם כתובים בתנ״ך (לדוגמה: מה הייתה תגובת שרה
... Show MoreForeign Object Debris (FOD) is defined as one of the major problems in the airline maintenance industry, reducing the levels of safety. A foreign object which may result in causing serious damage to an airplane, including engine problems and personal safety risks. Therefore, it is critical to detect FOD in place to guarantee the safety of airplanes flying. FOD detection systems in the past lacked an effective method for automatic material recognition as well as high speed and accuracy in detecting materials. This paper proposes the FOD model using a variety of feature extraction approaches like Gray-level Co-occurrence Matrix (GLCM) and Linear Discriminant Analysis (LDA) to extract features and Deep Learning (DL) for classifi
... Show MoreThe Turkish Kurdistan Workers Party (PKK) is one of the most influential elements in the Iraqi national security since 2014. It has a new and effective role in the Iraqi political arena, as a result of participating in combat operations against ISIS in Nineveh Governorate, which prompted several minorities within the province to sympathize with its presence and its role in particular in Sinjar after ISIS committed the most brutal crimes against the Aizidi minority, Turkey took advantage of the security conditions that Iraq went through after the entry of ISIS into the country to expand its influence in the north, using the pretext of the PKK and the previous agreement between the two countries on border protection. Also, the continued
... Show MoreSteganography is a useful technique that helps in securing data in communication using different data carriers like audio, video, image and text. The most popular type of steganography is image steganography. It mostly uses least significant bit (LSB) technique to hide the data but the probability of detecting the hidden data using this technique is high. RGB is a color model which uses LSB to hide the data in three color channels, where each pixel is represented by three bytes to indicate the intensity of red, green and blue in that pixel. In this paper, steganography based RGB image is proposed which depends on genetic algorithm (GA). GA is used to generate random key that represents the best ordering of secret (image/text) blocks to b
... Show MoreData hiding (Steganography) is a method used for data security purpose and to protect the data during its transmission. Steganography is used to hide the communication between two parties by embedding a secret message inside another cover (audio, text, image or video). In this paper a new text Steganography method is proposed that based on a parser and the ASCII of non-printed characters to hide the secret information in the English cover text after coding the secret message and compression it using modified Run Length Encoding method (RLE). The proposed method achieved a high capacity ratio for Steganography (five times more than the cover text length) when compared with other methods, and provides a 1.0 transparency by depending on som
... Show MoreMeasuring university teachers attitudes towards the security man Summary This research aims to study the measurement of university teachers attitudes towards the security man, and represented the research sample (196) of teachers, including 124 males and 72 females from different faculties of Salah al-Din - Erbil University. The researchers adopted on a scale (Al-Tarawneh 2008), as amended, and its development, the scale consists of four areas and (28) paragraph covers paragraphs measure the beliefs and feelings of the individual towards the security man as the theme of direction. The research sample answered all the paragraphs of the scale grade five similar styles (Likert) (strongly OK, OK, neutral, non-OK, Strongly Disagree). The rese
... Show MoreThe amount of information on the web is growing rapidly and number of web sites
becomes huge, so set of web applications used to help user and give him some information
about these sites, especially in e- business, news and sites introduce services.
Since Web site is built by comparatively free description, it is difficult to perform
absolute evaluation. So, rating of Web site is performed from various viewpoints.
In this paper we proposed method for ranking and rating using the web service and java
script to motivation remote server and return some public information to the site user and
other private information to owner.
Kamel, S.H., R.F. Al-Jassani and H.A. Al-Shammari. 2022. Effects of Pseudomonas fluorescens, Bacillus thuringiensis tenebrionis Isolates and Biologically Synthesized Silver Nanoparticles on Cellulase Enzyme Activity in Workers' Digestive System of the Termite Microcerotermes diversus Silv. Arab Journal of Plant Protection, 40(4): 315-324. https://doi.org/10.22268/AJPP-40.4.315324 The purpose of this study was to investigate the effect of different bacterial isolates of P. fluorescens and B. t. tenebrionis and silver nanoparticles on the activity of the cellulase enzyme in termites' middle digestive system and its role in glucose release by treating cellulose media with bacterial strains and nanoparticles. Ultraviolet spectroscopy re
... Show More