Preferred Language
Articles
/
jBZerIoBVTCNdQwCnaJd
BotDetectorFW: an optimized botnet detection framework based on five features-distance measures supported by comparisons of four machine learning classifiers using CICIDS2017 dataset

<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver &amp; kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>

Scopus Crossref
View Publication
Publication Date
Thu Aug 01 2024
Journal Name
Advances In Science And Technology Research Journal
Crossref (1)
Scopus Crossref
View Publication
Publication Date
Wed Apr 10 2019
Journal Name
Engineering, Technology &amp; Applied Science Research
Content Based Image Clustering Technique Using Statistical Features and Genetic Algorithm

Text based-image clustering (TBIC) is an insufficient approach for clustering related web images. It is a challenging task to abstract the visual features of images with the support of textual information in a database. In content-based image clustering (CBIC), image data are clustered on the foundation of specific features like texture, colors, boundaries, shapes. In this paper, an effective CBIC) technique is presented, which uses texture and statistical features of the images. The statistical features or moments of colors (mean, skewness, standard deviation, kurtosis, and variance) are extracted from the images. These features are collected in a one dimension array, and then genetic algorithm (GA) is applied for image clustering.

... Show More
Scopus (5)
Crossref (2)
Scopus Crossref
View Publication
Publication Date
Tue May 21 2019
Journal Name
The Journal Of Engineering
Crossref (2)
Clarivate Crossref
Publication Date
Wed Nov 16 2016
Journal Name
Eurasip Journal On Wireless Communications And Networking
Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm

Traffic management at road intersections is a complex requirement that has been an important topic of research and discussion. Solutions have been primarily focused on using vehicular ad hoc networks (VANETs). Key issues in VANETs are high mobility, restriction of road setup, frequent topology variations, failed network links, and timely communication of data, which make the routing of packets to a particular destination problematic. To address these issues, a new dependable routing algorithm is proposed, which utilizes a wireless communication system between vehicles in urban vehicular networks. This routing is position-based, known as the maximum distance on-demand routing algorithm (MDORA). It aims to find an optimal route on a hop-by-ho

... Show More
Scopus (25)
Crossref (18)
Scopus Clarivate Crossref
View Publication Preview PDF
Publication Date
Tue Jun 09 2020
Journal Name
Article In Journal Of Engineering Science And Technology
Scopus (2)
Scopus
View Publication
Publication Date
Sun Jun 30 2013
Journal Name
International Journal For Sciences And Technology
Synthesis and anti-bacterial study of novel compounds with bis (four-, five-, and seven-membered) heterocyclic rings

New twin compounds having four-, five-, and seven- membered heterocyclic rings were synthesized via Schiff bases (1a,b) which were obtained by the condensation of o-tolidine with two moles of 4- N,N-dimethyl benzaldehyde or 4- chloro benzaldehyde. The reaction of these Schiff bases with two moles of phenyl isothiocyanate, phenyl isocyanate or naphthyl isocyanate as in scheme(1) led to the formation of bis -1,3- diazetidin- 2- thion and bis -1,3- diazetidin -2-one derivatives (2-4 a,b). While in scheme (2) bis imidazolidin-4-one (5a,b) ,bistetrazole (6a,b) and bis thiazolidin-4-one (7a,b) derivatives were produced by reacting the mentioned Schiff bases(1a,b)with two moles of glycine, sodium azide or thioglycolic acid, respectively. The new b

... Show More
Publication Date
Fri May 01 2015
Journal Name
Journal Of Hazardous Materials
Scopus (30)
Crossref (24)
Scopus Clarivate Crossref
View Publication
Publication Date
Tue Dec 05 2023
Journal Name
Baghdad Science Journal
Robust Color Image Encryption Scheme Based on RSA via DCT by Using an Advanced Logic Design Approach

Information security in data storage and transmission is increasingly important. On the other hand, images are used in many procedures. Therefore, preventing unauthorized access to image data is crucial by encrypting images to protect sensitive data or privacy. The methods and algorithms for masking or encoding images vary from simple spatial-domain methods to frequency-domain methods, which are the most complex and reliable. In this paper, a new cryptographic system based on the random key generator hybridization methodology by taking advantage of the properties of Discrete Cosine Transform (DCT) to generate an indefinite set of random keys and taking advantage of the low-frequency region coefficients after the DCT stage to pass them to

... Show More
Scopus Crossref
View Publication Preview PDF
Publication Date
Fri Sep 30 2022
Journal Name
Iraqi Journal Of Science
Network Traffic Prediction Based on Boosting Learning

Classification of network traffic is an important topic for network management, traffic routing, safe traffic discrimination, and better service delivery. Traffic examination is the entire process of examining traffic data, from intercepting traffic data to discovering patterns, relationships, misconfigurations, and anomalies in a network. Between them, traffic classification is a sub-domain of this field, the purpose of which is to classify network traffic into predefined classes such as usual or abnormal traffic and application type. Most Internet applications encrypt data during traffic, and classifying encrypted data during traffic is not possible with traditional methods. Statistical and intelligence methods can find and model traff

... Show More
Scopus (1)
Crossref (1)
Scopus Crossref
View Publication Preview PDF
Publication Date
Sun Sep 03 2023
Journal Name
Wireless Personal Communications
Scopus Clarivate Crossref
View Publication