Classification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traffic patterns that can be categorized based on statistical characteristics. These methods help determine the type of traffic and protect user privacy at the same time. To classify encrypted traffic from end to end, this paper proposes using (XGboost) algorithms, finding the highest parameters using Bayesian optimization, and comparing the proposed model with machine learning algorithms (Nearest Neighbor, Logistic Regression, Decision Trees, Naive Bayes, Multilayer Neural Networks) to classify traffic from end to end. Network traffic has two classifications: whether the traffic is encrypted or not, and the target application. The research results showed the possibility of classifying dual and multiple traffic with high accuracy. The proposed model has a higher classification accuracy than the other models, and finding the optimal parameters increases the model accuracy.
This research focuses on the services provided by news websites (IMN, Youm7, Huffington Post Arabic) to its audience of Internet users, as well as materials posted through its pages, trying to monitor and explain them to identify their types & features, and it›s functions, whether informational or non-informational, to know the technical potential of each of the news sites, with the entry of the latest technology information. The research used the analysis method to achieve the research objectives within the period from 1/1 to 31/1/2017. The researchers used the content analysis tool as a research tool to analyze the news sites and to know the services they provide through their pages. The research was divided into three parts, the
... Show MoreIn every system of security, to keep important data confidential, we need a high degree of protection. Steganography can be defined as a way of sending confidential texts through a secure medium of communications as well as protecting the information during the process of transmission. Steganography is a technology that is used to protect users' security and privacy. Communication is majorly achieved using a network through SMS, e-mail, and so on. The presented work suggested a technology of text hiding for protecting secret texts with Unicode characters. The similarities of glyphs provided invisibility and increased the hiding capacity. In conclusion, the proposed method succeeded in securing confidential data and achieving high p
... Show MoreThe UN organization is considered one of the most important organizations at the international level. It has accomplished multiple tasks and roles of many different issues and events that hit the developing and advanced world countries. It has performed a series of procedures and laws that have had an impact on ending the wars and conflicts that plagued some countries and continued for a period of time in the past. Moreover, it has improved the level of the international relations between a number of countries due to the problems and incidents took place between them. It has relied on finding solutions and treatments for humanitarian problems such as the preservation of the environment, preventing the spread of epidemics and diseases Thi
... Show MoreComputer simulations were carried out to investigate the dependence of the main perturbation parameters (Sun and Moon attractions, solar radiation pressure, atmosphere drag, and geopotential of Earth) on the orbital behavior of satellite. In this simulation, the Cowell method for accelerations technique was adopted, the equation of motion with perturbation was solved by 4th order Runge-Kutta method with step (1/50000) of period to obtain the state vectors for position and velocity. The results of this simulation have been compared with data that available on TLEs (NORD data in two line elements). The results of state vectors for satellites (Cartosat-2B, Gsat-14 an
YouTube is not just a platform that individuals share, upload, comment on videos; teachers and educators can utilize it to the best maximum so that students can have benefits. This study aims at investigating how active and influential YouTube can be in the educational process and how it is beneficial for language teachers to enhance the skills of students. The study demonstrates different theoretical frameworks that tackle the employment of technology to enhance the learning/teaching process. It relies on the strategies of Berk (2009) for using multimedia media, video clips in particular to develop the abilities of teachers for using technology in classrooms. To achieve the objective of the study, the researchers develop a questionnair
... Show MoreNowadays, the process of ontology learning for describing heterogeneous systems is an influential phenomenon to enhance the effectiveness of such systems using Social Network representation and Analysis (SNA). This paper presents a novel scenario for constructing adaptive architecture to develop community performance for heterogeneous communities as a case study. The crawling of the semantic webs is a new approach to create a huge data repository for classifying these communities. The architecture of the proposed system involves two cascading modules in achieving the ontology data, which is represented in Resource Description Framework (RDF) format. The proposed system improves the enhancement of these environments ach
... Show More