Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system. A new features selection method is proposed based on DNA encoding and on DNA keys positions. The current system has three phases, the first phase, is called pre-processing phase, which is used to extract the keys and their positions, the second phase is training phase; the main goal of this phase is to select features based on the key positions that gained from pre-processing phase, and the third phase is the testing phase, which classified the network traffic records as either normal or attack by using specific features. The performance is calculated based on the detection rate, false alarm rate, accuracy, and also on the time that include both encoding time and matching time. All these results are based on using two or three keys, and it is evaluated by using two datasets, namely, KDD Cup 99, and NSL-KDD. The achieved detection rate, false alarm rate, accuracy, encoding time, and matching time for all corrected KDD Cup records (311,029 records) by using two and three keys are equal to 96.97, 33.67, 91%, 325, 13 s, and 92.74, 7.41, 92.71%, 325 and 20 s, respectively. The results for detection rate, false alarm rate, accuracy, encoding time, and matching time for all NSL-KDD records (22,544 records) by using two and three keys are equal to 89.34, 28.94, 81.46%, 20, 1 s and 82.93, 11.40, 85.37%, 20 and 1 s, respectively. The proposed system is evaluated and compared with previous systems and these comparisons are done based on encoding time and matching time. The outcomes showed that the detection results of the present system are faster than the previous ones.
Abstract
In this study, the effect of carboxylic methyl cellulose (CMC), and sodium dodcyl benzene sulfonate (SDBS) as an aqueous solution on the drag reduction was investigated. Different concentrations of (CMC) and (SDBS) such as (50, 100, 150, 200, 250, 300, 350, 400, 450, and 500 ppm) were used to analyze the aqueous solution properties, including surface tension, conductivity, and shear viscosity. The optimum four concentrations (i.e., 50, 100, 200, and 300 ppm) of fluid properties were utilized to find their effect on the drag reduction. Two different PVC pipe diameters (i.e., 1" and 3/4") were used in this work. The results showed that blending CMC with SDBS gives
... Show MoreVapor-liquid equilibrium data are presented for the binary systems n-hexane - 1-propanol, benzene - 1-propanol and n-hexane – benzene at 760 mm of mercury pressure. In addition ternary data are presented at selected compositions with respect to the 1-propanol in the 1-propanol, benzene, n-hexane system at 760 mmHg. The results indicate the relative volatility of n-hexane relative to benzene increases appreciably with addition of 1-propanol.
The paper presents a highly accurate power flow solution, reducing the possibility of ending at local minima, by using Real-Coded Genetic Algorithm (RCGA) with system reduction and restoration. The proposed method (RCGA) is modified to reduce the total computing time by reducing the system in size to that of the generator buses, which, for any realistic system, will be smaller in number, and the load buses are eliminated. Then solving the power flow problem for the generator buses only by real-coded GA to calculate the voltage phase angles, whereas the voltage magnitudes are specified resulted in reduced computation time for the solution. Then the system is restored by calculating the voltages of the load buses in terms
... Show MoreSeventy four Iraqi breast cancer paraffin blocks were collected from patients were attended to center health laboratory, histopathology department, Bagdad, Iraq. The patients information’s which included: name, age, and the pathological stage, grade, tumor size were obtained from the clinical records of the patients also relation with sex hormones was recorded. The cases which has been taken included invasive ductal and invasive lobular carcinoma type Women age were ranged from 24-80 years peak age frequency of tumor occurred in the category of more than 40 years old. Immunohistochemical expression of her-2/neu was from total 74 cases of infiltrative ductal carcinoma cases, 27(36.49%)were positive for Her-2/neu expression, 47(63.51%) were
... Show MoreIn this article, the lattice Boltzmann method with two relaxation time (TRT) for the D2Q9 model is used to investigate numerical results for 2D flow. The problem is performed to show the dissipation of the kinetic energy rate and its relationship with the enstrophy growth for 2D dipole wall collision. The investigation is carried out for normal collision and oblique incidents at an angle of . We prove the accuracy of moment -based boundary conditions with slip and Navier-Maxwell slip conditions to simulate this flow. These conditions are under the effect of Burnett-order stress conditions that are consistent with the discrete Boltzmann equation. Stable results are found by using this kind of boundary condition where d
... Show MoreActive worms have posed a major security threat to the Internet, and many research efforts have focused on them. This paper is interested in internet worm that spreads via TCP, which accounts for the majority of internet traffic. It presents an approach that use a hybrid solution between two detection algorithms: behavior base detection and signature base detection to have the features of each of them. The aim of this study is to have a good solution of detecting worm and stealthy worm with the feature of the speed. This proposal was designed in distributed collaborative scheme based on the small-world network model to effectively improve the system performance.
In study of effective bioactive compounds, we have synthesized the Co((ІІ), Mn(ІІ), Fe(ІІ), Cu(ІІ), Ni(ІІ), and Zn(ІІ) complexes of the Schiff base derived from trimethoprim and2'-amino-4-chlorobenzophenone and characterized by spectroscopic (NMR, IR, Mass, UV–vis,), analytical, TGA studies and magnetic data .The solution electronic spectral study suggests the stoichiometry of the synthesized complexes and Elemental analysis detected the square planer and octahedral geometry of the compounds. The prepared metal complexes presented promoted efficiency versus the screened bacterial (Escherichia Coli and Staphylococcus aureus) antibacterial efficacy against (Staphylococcus aureus, Salmonella spp., E. coli, Vibrio spp., Pseud
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5- trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion (𝐶𝑂 ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional th
... Show MoreMixed ligand metal complexes are synthesized from oxalic acid with Schiff base, and the Schiff base was obtained from trimethoprim and acetylacetone. The synthesized complexes were of the type [M(L1)(L2)], where the metal, M, is Ni(II), Cu(II), Cr(III), and Zn(II), L1 corresponds to the trimethoprim ((Z)-4-((4-amino-5-(3,4,5-trimethoxybenzyl)pyrimidine-2-yl)imino)pentane-2-one) as the first ligand and L2 represent the oxalate anion ( ) as a second ligand. Characterization of the prepared compounds was performed by elemental analysis, molar conductivity, magnetic measurements, 1H-NMR, 13C-NMR, FT-IR, and Ultraviolet-visible (UV-Vis) spectral studies. The recorded infrared data is reinforced with density functional theory (DFT) calcul
... Show More