Preferred Language
Articles
/
SRepUJEBVTCNdQwC6pT_
Machine Learning Techniques to Detect a DDoS Attack in SDN: A Systematic Review
...Show More Authors

The recent advancements in security approaches have significantly increased the ability to identify and mitigate any type of threat or attack in any network infrastructure, such as a software-defined network (SDN), and protect the internet security architecture against a variety of threats or attacks. Machine learning (ML) and deep learning (DL) are among the most popular techniques for preventing distributed denial-of-service (DDoS) attacks on any kind of network. The objective of this systematic review is to identify, evaluate, and discuss new efforts on ML/DL-based DDoS attack detection strategies in SDN networks. To reach our objective, we conducted a systematic review in which we looked for publications that used ML/DL approaches to identify DDoS attacks in SDN networks between 2018 and the beginning of November 2022. To search the contemporary literature, we have extensively utilized a number of digital libraries (including IEEE, ACM, Springer, and other digital libraries) and one academic search engine (Google Scholar). We have analyzed the relevant studies and categorized the results of the SLR into five areas: (i) The different types of DDoS attack detection in ML/DL approaches; (ii) the methodologies, strengths, and weaknesses of existing ML/DL approaches for DDoS attacks detection; (iii) benchmarked datasets and classes of attacks in datasets used in the existing literature; (iv) the preprocessing strategies, hyperparameter values, experimental setups, and performance metrics used in the existing literature; and (v) current research gaps and promising future directions.

Scopus Clarivate Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
Keratoconus Severity Detection From Elevation, Topography and Pachymetry Raw Data Using a Machine Learning Approach
...Show More Authors

View Publication
Scopus (12)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Wed Feb 06 2013
Journal Name
Eng. & Tech. Journal
A proposal to detect computer worms (malicious codes) using data mining classification algorithms
...Show More Authors

Malicious software (malware) performs a malicious function that compromising a computer system’s security. Many methods have been developed to improve the security of the computer system resources, among them the use of firewall, encryption, and Intrusion Detection System (IDS). IDS can detect newly unrecognized attack attempt and raising an early alarm to inform the system about this suspicious intrusion attempt. This paper proposed a hybrid IDS for detection intrusion, especially malware, with considering network packet and host features. The hybrid IDS designed using Data Mining (DM) classification methods that for its ability to detect new, previously unseen intrusions accurately and automatically. It uses both anomaly and misuse dete

... Show More
Publication Date
Tue Jan 11 2022
Journal Name
Iraqi Journal Of Science
Methods and Simulations used to Detect Photons from Exoplanets of a Parent Star
...Show More Authors

The extrasolar planets in the vicinity of stars are expected to be bright enough
and are very difficult to be observed by direct detection. The problem is attributed to
the side loops of the star that created due to the telescope diffraction processing.
Several methods have been suggested in the literatures are being capable to detect
exoplanet at a separation angle of 4λ/D and at a contrast ratio of 10-10. These
methods are more than one parameter function and imposing limitations on the inner
working distance. New simple method based on a circular aperture combined with a
third power Gaussian function is suggested. The parameters of this function are then
optimized based on obtaining a minimum inner working dis

... Show More
View Publication Preview PDF
Publication Date
Sat Dec 30 2023
Journal Name
Iraqi Journal Of Science
Proposed Security Models for Node-level and Network-level Aspects of Wireless Sensor Networks Using Machine Learning Techniques
...Show More Authors

     As a result of the pandemic crisis and the shift to digitization, cyber-attacks are at an all-time high in the modern day despite good technological advancement. The use of wireless sensor networks (WSNs) is an indicator of technical advancement in most industries. For the safe transfer of data, security objectives such as confidentiality, integrity, and availability must be maintained. The security features of WSN are split into node level and network level. For the node level, a proactive strategy using deep learning /machine learning techniques is suggested. The primary benefit of this proactive approach is that it foresees the cyber-attack before it is launched, allowing for damage mitigation. A cryptography algorithm is put

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Tue Apr 18 2023
Journal Name
Electronics
A Systematic Approach to Stable Grasping of a Two-Finger Robotic Hand Activated by Jamming of Granular Media
...Show More Authors

A systematic approach is presented to achieve the stable grasping of objects through a two-finger robotic hand, in which each finger cavity was filled with granular media. The compaction of the latter, controlled by vacuum pressure, was used to adjust the structural and contact stiffness of the finger. The grasping stability was studied under the concurrent effect of an external torque and applied vacuum pressure. Stable grasping was defined as the no slippage condition between the grasped object and the two fingers. Three control schemes were adopted and applied experimentally to ensure the effectiveness of the grasping process. The results showed that stable and unstable grasping regions exist for each combination of applied torqu

... Show More
Scopus (2)
Crossref (2)
Scopus Clarivate Crossref
Publication Date
Sun Dec 01 2019
Journal Name
Journal Of Coloproctology
Rectal cancer and chemoradiation in Iraq: systematic review and meta-analysis
...Show More Authors
Abstract<p> Background Rectal cancer is one of the most common malignant tumors of gastrointestinal tract. Combining chemotherapy with radiotherapy has a sound effect on its management.</p><p> Objectives Assessment the patterns of characterizations of rectal cancer. Evaluation of the efficacy, and long-term survival of pre-/ postoperative chemoradiation. Collecting all eligible evidence articles and summarize the results.</p><p> Methods By this systematic review and meta-analysis study, we include data of chemoradiation of rectal cancer articles from 2015 until 2019. The research was carried out at Baghdad Medical City oncology centers. Accordance with the</p> ... Show More
View Publication
Scopus (6)
Crossref (5)
Scopus Crossref
Publication Date
Thu Aug 01 2024
Journal Name
Advances In Science And Technology Research Journal
Power Predicting for Power Take-Off Shaft of a Disc Maize Silage Harvester Using Machine Learning
...Show More Authors

View Publication
Scopus (1)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Mon Feb 01 2021
Journal Name
Meta Gene
Association analysis of FTO gene polymorphisms rs9939609 and obesity risk among the adults: A systematic review and meta-analysis
...Show More Authors

View Publication
Scopus (9)
Scopus
Publication Date
Fri Feb 01 2019
Journal Name
Iraqi Journal Of Information &amp; Communications Technology
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is ope

... Show More
View Publication Preview PDF
Crossref (14)
Crossref
Publication Date
Mon Jan 01 2024
Journal Name
Bio Web Of Conferences
Forecasting Cryptocurrency Market Trends with Machine Learning and Deep Learning
...Show More Authors

Cryptocurrency became an important participant on the financial market as it attracts large investments and interests. With this vibrant setting, the proposed cryptocurrency price prediction tool stands as a pivotal element providing direction to both enthusiasts and investors in a market that presents itself grounded on numerous complexities of digital currency. Employing feature selection enchantment and dynamic trio of ARIMA, LSTM, Linear Regression techniques the tool creates a mosaic for users to analyze data using artificial intelligence towards forecasts in real-time crypto universe. While users navigate the algorithmic labyrinth, they are offered a vast and glittering selection of high-quality cryptocurrencies to select. The

... Show More
View Publication
Scopus (3)
Scopus Crossref