Preferred Language
Articles
/
Cxc5-Y0BVTCNdQwCEStJ
Techniques for DDoS Attack in SDN: A Comparative Study
...Show More Authors

Abstract Software-Defined Networking (commonly referred to as SDN) is a newer paradigm that develops the concept of a software-driven network by separating data and control planes. It can handle the traditional network problems. However, this excellent architecture is subjected to various security threats. One of these issues is the distributed denial of service (DDoS) attack, which is difficult to contain in this kind of software-based network. Several security solutions have been proposed recently to secure SDN against DDoS attacks. This paper aims to analyze and discuss machine learning-based systems for SDN security networks from DDoS attack. The results have indicated that the algorithms for machine learning can be used to detect DDoS attacks in SDN efficiently. From machine learning approaches, it can be explored that the best way to detect DDoS attack is based on utilizing deep learning procedures.Moreover, analyze the methods that combine it with other machine learning techniques. The most benefits that can be achieved from using the deep learning methods are the ability to do both feature extraction along with data classification; the ability to extract the specific information from partial data. Nevertheless, it is appropriate to recognize the low-rate attack, and it can get more computation resources than other machine learning where it can use graphics processing unit (GPU) rather than central processing unit (CPU) for carrying out the matrix operations, making the processes computationally effective and fast.

Crossref
View Publication
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information & Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
Journal Of Legal Sciences
Compensation for Psychological Damage Caused by Negligence - A Comparative Study
...Show More Authors

Psychological damage is one of the damages that can be compensated under the fault of negligence in the framework of English law, where the latter intends to include an enumeration of civil errors on the basis of which liability can be determined, and aims under each of these errors to protect a specific interest (for example, defamation protects Among the damage to reputation and inconvenience are the rights contained on the land), and the same is true for the rest of the other errors. Compensation for psychological damage resulting from negligence has raised problems in cases where the psychological injury is "pure", that is, those that are not accompanied by a physical injury, which required subjecting them to special requirements by the

... Show More
View Publication
Publication Date
Thu Aug 08 2024
Journal Name
Al-rafidain Journal Of Medical Sciences ( Issn 2789-3219 )
Novel Technique for Alveolar Ridge Expansion: A Comparative Clinical Study
...Show More Authors

Background: Piezosurgery improved the split approach by making it safer, easier, and less prone to complications when treating extremely atrophic crests. Densah drills, with their unique design, expand the ridge by densifying bone in a reverse, non-cutting mode. Objective: To assess the effectiveness of sagittal piezosurgery, which involves cutting bone to the full implant depth and then expanding it using osseodensification drills. We use this technique to expand narrow alveolar bones and simultaneously place dental implants in the maxillary and mandibular arches. Methods: Fourteen patients received 31 dental implants. The maxillary arch received 19, and the mandible received 12 dental implants. This study will include patients who

... Show More
View Publication Preview PDF
Crossref (1)
Scopus Crossref
Publication Date
Mon May 22 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Some Robust Tests for the Correlation Coefficient: A Comparative Study
...Show More Authors

This paper is Interested with studying the performance of statistic test the hypothesis of independence of the two variables (the hypothesis that there is no correlation between the variables under study) in the case of data to meet the requirement of normal distribution in the case away from the distribution due to the presence of outliers (contaminated values) and compared with the performance of some of the other methods proposed and modified

View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Journal Of Economics And Administrative Sciences
A Comparative Study for Estimate Fractional Parameter of ARFIMA Model
...Show More Authors

      Long memory analysis is one of the most active areas in econometrics and time series where various methods have been introduced to identify and estimate the long memory parameter in partially integrated time series. One of the most common models used to represent time series that have a long memory is the ARFIMA (Auto Regressive Fractional Integration Moving Average Model) which diffs are a fractional number called the fractional parameter. To analyze and determine the ARFIMA model, the fractal parameter must be estimated. There are many methods for fractional parameter estimation. In this research, the estimation methods were divided into indirect methods, where the Hurst parameter is estimated fir

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun May 25 2025
Journal Name
Journal Of Baghdad College Of Dentistry
Fracture strength of laminate veneers using different restorative materials and techniques (A comparative in vitro stuy)
...Show More Authors

Background: Esthetic correction represents one of the clinical conditions that required the use of laminate veneers in premolars region. Aim of the study: The purpose of this study was to evaluate the fracture strength of the laminate veneers in maxillary first premolars, fabricated from either composite (direct and indirect techniques) or ceramic CAD/CAM blocks. Materials and Methods: Fifty sound human maxillary premolar teeth were used in this in vitro study. Teeth were divided randomly into one control group and four experimental groups of ten teeth each; Group A: Restored with direct composite veneer (Filtek Z250 XT), Group B: Restored with indirect composite veneers (Filtek Z250 XT), Group C: Restored with lithium disilicate ceramic CA

... Show More
View Publication Preview PDF
Publication Date
Sun May 25 2025
Journal Name
Journal Of Baghdad College Of Dentistry
An Evaluation of Gutta-Percha Penetration Depth into Simulated Lateral Canals by Using Three Different Obturation Techniques (A Comparative Study)
...Show More Authors

Background:sThe aims of this study were to evaluate and compare the ability of three different techniques to obdurate simulated lateral canals, evaluate the effect of the main canal curvature on obturation of lateral canals and compare the gutta-percha penetration between coronal and apical lateral canals. Materials and methods: Resin blocks with 30 straight and 30 curved were used in this study. Each canal has two parallel lateral canals. The main canal has 0.3 mm apical diameter and 0.04 taper. The canals were divided into six groups according to canal curvature and obturation techniques used (n=10): Groups C1 and C2: straight and curved canals obturated with continuous wave technique using E&Q masterTM system. Groups O1 and O2: straight

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon Oct 01 2018
Journal Name
International Journal Of Electrical And Computer Engineering
Load balance in data center SDN networks
...Show More Authors

In the last two decades, networks had been changed according to the rapid changing in its requirements. The current Data Center Networks have large number of hosts (tens or thousands) with special needs of bandwidth as the cloud network and the multimedia content computing is increased. The conventional Data Center Networks (DCNs) are highlighted by the increased number of users and bandwidth requirements which in turn have many implementation limitations. The current networking devices with its control and forwarding planes coupling result in network architectures are not suitable for dynamic computing and storage needs. Software Defined networking (SDN) is introduced to change this notion of traditional networks by decoupling control and

... Show More
Publication Date
Wed Dec 30 2015
Journal Name
College Of Islamic Sciences
Acquisition provisions in Islamic jurisprudence: A model - a comparative study
...Show More Authors

Acquisition provisions in Islamic jurisprudence

View Publication Preview PDF
Publication Date
Thu Nov 01 2018
Journal Name
Italian Journal Of Vascular And Endovascular Surgery
Retroperitoneal versus transperitoneal approach for aortoiliac occlusive disease: a comparative study
...Show More Authors

View Publication
Scopus Crossref