Clustering algorithms have recently gained attention in the related literature since
they can help current intrusion detection systems in several aspects. This paper
proposes genetic algorithm (GA) based clustering, serving to distinguish patterns
incoming from network traffic packets into normal and attack. Two GA based
clustering models for solving intrusion detection problem are introduced. The first
model coined as handles numeric features of the network packet, whereas
the second one coined as concerns all features of the network packet.
Moreover, a new mutation operator directed for binary and symbolic features is
proposed. The basic concept of proposed mutation operator depends on the most
frequent value of the features using mode operator. The proposed GA-based
clustering models are evaluated using Network Security Laboratory-Knowledge
Discovery and Data mining (NSL-KDD) benchmark dataset. Also, it is compared
with two baseline methods namely k-means and k-prototype to judge their
performance and to confirm the value of the obtained clustering structures. The
experiments demonstrate the effectiveness of the proposed models for intrusion
detection problem in which and models outperform the two baseline
methods in accuracy ( ), detection rate ( ) and true negative rate ( ).
Moreover, the results prove the positive impact of the proposed mutation operator to
enhance the strength of model in all evaluation metrics. It successfully attains
6.4, 5.463 and 3.279 percentage of relative improvement in over and
baseline models respectively.
Information is an essential and valuable object in all systems. The more information you have about your issue, the better you can conform to the world around you. Moreover, information recognizes companies and provides influence that helps one company be more effective than another. So, protecting this information using better security controls and providing a high level of access to authorized parties becomes an urgent need. As a result, many algorithms and encryption techniques have been developed to provide a high level of protection for system information. Therefore, this paper presents an enhancement to the Blowfish algorithm as one of the cryptography techniques. Then it proposes an enhancement for increasing efficiency
... Show MoreThe widespread of internet allover the world, in addition to the increasing of the huge number of users that they exchanged important information over it highlights the need for a new methods to protect these important information from intruders' corruption or modification. This paper suggests a new method that ensures that the texts of a given document cannot be modified by the intruders. This method mainly consists of mixture of three steps. The first step which barrows some concepts of "Quran" security system to detect some type of change(s) occur in a given text. Where a key of each paragraph in the text is extracted from a group of letters in that paragraph which occur as multiply of a given prime number. This step cannot detect the ch
... Show MoreThe present study discusses the significant role of the historical memory in all the Spanish society aspects of life. When a novelist takes the role and puts on the mask of one of the novel’s protagonists or hidden characters, his memory of the events becomes the keywords of accessing the close-knit fabric of society and sheds lights on deteriorating social conceptions in a backwards social reality that rejects all new progressive ideas and modernity. Through concentrating on the society flawing aspects and employing everything of his stored memory, the author uses sarcasm to criticize and change such old deteriorating reality conceptions.
&nbs
... Show MoreThe chemical properties of chemical compounds and their molecular structures are intimately connected. Topological indices are numerical values associated with chemical molecular graphs that help in understanding the physicochemical properties, chemical reactivity and biological activity of a chemical compound. This study obtains some topological properties of second and third dominating David derived (DDD) networks and computes several K Banhatti polynomial of second and third type of DDD.
Chemical compounds, characteristics, and molecular structures are inevitably connected. Topological indices are numerical values connected with chemical molecular graphs that contribute to understanding a chemical compounds physical qualities, chemical reactivity, and biological activity. In this study, we have obtained some topological properties of the first dominating David derived (DDD) networks and computed several K-Banhatti polynomials of the first type of DDD.
The knowledge of transferring body organs or tissues appears in the ancient mythology of Roman, Greek, Indian, Chinese, and Egyptian civilizations. The stories of organ transplants performed by GODs and health care’s using organs from cadaveric and after that transplantation change from lore to medical training
This study investigated the potential of bacterial culture in bioremediation of gasoline pollutant soils. Klebsiella pneumoniae has shown a tremendous ability in bioremediation of gasoline. K.pneumoniae was isolated from three electrical generator pollutant soils with gasoline in different regions from Baghdad (Abu-Graib, Al-Khadra quarter and Al-Seleikh region. Bacteria was isolated and identified according to biochemical tests, with optimum temperature at 35°C and pH=5.
FTIR spectrum was tested the ability of the K.pneumoniae to biodegrade the gasoline according to the peak areas, which appeared and referred to degrade amino compounds at wave number 3000 cm-1 (2955.23, 2923.47) which refer to the C-H with amines compounds and decre
The definition of orthogonal generalized higher k-derivation is examined in this paper and we introduced some of its related results.
The importance of Public Relations activity has increased during the last half of the last century as a specialized and modern administrative function in most institutions. It has, moreover, become an integral part of activities of those institutions of various types, due to its pivotal role in building its reputation and drawing a good mental image among its audiences, as well as its influential and basic role in maintaining communication and the communication between its members at its various levels and their job tasks to ensure the greatest amount of understanding and to enhance trust between them. This is why public relations activity has become indispensable in all institutions, and without it, it is difficult to achieve any coordi
... Show MoreThe current research seeks to shed light on the role that social media can play, through the optimal use of it by students, in achieving academic excellence. The most prominent aims that constitute it are:Identifying the social sites most used by students; learning how students interact with the published study material on communication sites and benefit from them to achieve their academic excellence; and knowing the connection between using social media and achieving academic excellence, and the role that these sites play in achieving academic excellence.That incorrect use by students leads to adverse results, and thus affects their academic level. Failure of parents to monitor their student’ use of social media leads
... Show More