<p><span>A Botnet is one of many attacks that can execute malicious tasks and develop continuously. Therefore, current research introduces a comparison framework, called BotDetectorFW, with classification and complexity improvements for the detection of Botnet attack using CICIDS2017 dataset. It is a free online dataset consist of several attacks with high-dimensions features. The process of feature selection is a significant step to obtain the least features by eliminating irrelated features and consequently reduces the detection time. This process implemented inside BotDetectorFW using two steps; data clustering and five distance measure formulas (cosine, dice, driver & kroeber, overlap, and pearson correlation) using C#, followed by selecting the best N features used as input into four classifier algorithms evaluated using machine learning (WEKA); multilayerperceptron, JRip, IBK, and random forest. In BotDetectorFW, the thoughtful and diligent cleaning of the dataset within the preprocessing stage beside the normalization, binary clustering of its features, followed by the adapting of feature selection based on suitable feature distance techniques, and finalized by testing of selected classification algorithms. All together contributed in satisfying the high-performance metrics using fewer features number (8 features as a minimum) compared to and outperforms other methods found in the literature that adopted (10 features or higher) using the same dataset. Furthermore, the results and performance evaluation of BotDetectorFM shows a competitive impact in terms of classification accuracy (ACC), precision (Pr), recall (Rc), and f-measure (F1) metrics.</span></p>
Computer systems and networks are being used in almost every aspect of our daily life; as a result the security threats to computers and networks have also increased significantly. Traditionally, password-based user authentication is widely used to authenticate legitimate user in the current system0T but0T this method has many loop holes such as password sharing, shoulder surfing, brute force attack, dictionary attack, guessing, phishing and many more. The aim of this paper is to enhance the password authentication method by presenting a keystroke dynamics with back propagation neural network as a transparent layer of user authentication. Keystroke Dynamics is one of the famous and inexpensive behavioral biometric technologies, which identi
... Show MoreInformation security is a crucial factor when communicating sensitive information between two parties. Steganography is one of the most techniques used for this purpose. This paper aims to enhance the capacity and robustness of hiding information by compressing image data to a small size while maintaining high quality so that the secret information remains invisible and only the sender and recipient can recognize the transmission. Three techniques are employed to conceal color and gray images, the Wavelet Color Process Technique (WCPT), Wavelet Gray Process Technique (WGPT), and Hybrid Gray Process Technique (HGPT). A comparison between the first and second techniques according to quality metrics, Root-Mean-Square Error (RMSE), Compression-
... Show MoreThe purpose of this study is testing the effect of orgnizational learning in orgnizational Effectivness an applied study in Al-hiqma Jordinan Medecine Company . study sosiety 88 manegers sleect 80 of them .study used SPSS to test the hypothesis.study reachs to significant conculctions
Since there is no market for bond issuance by companies in the Iraqi market and the difficulty of borrowing, companies must resort to proprietary financing to finance their investments. However, in the framework of the literature of financial management, the type of financing used by the company sends signals to investors and therefore reflected on the market value. Therefore, the problem of the study revolves around the variables of the study (Equity financing within the framework the signal theory, price of common stock in the Iraqi market).
The study aims to verify the impact of the capital increase through the issuance of new stock on the price of
... Show MoreABSTRACT
Herbs and spices have long been used to support various food products, including dairy products because of their flavoring, taste, texture and general appearance as well as therapeutic properties such as antioxidant activities, infections, microbes, anti-diabetes and hypertension. Therefore, this study aimed to demonstrate the effect of adding ginger, cinnamon, lycopene extract and olive oil on the physiochemical properties, the quality of the soft cheese produced and the extent of its acceptance by the Iraqi consumer, who prefers this product in abundance to other types of cheese. So, this study was prepared
... Show MoreIn the present study, activated carbon supported metal oxides was prepared for thiophene removal from model fuel (Thiophene in n-hexane) using adsorptive desulfurization technique. Commercial activated carbon was loaded individually with copper oxide in the form of Cu2O/AC. A comparison of the kinetic and isotherm models of the sorption of thiophene from model fuel was made at different operating conditions including adsorbent dose, initial thiophene concentration and contact time. Various adsorption rate constants and isotherm parameters were calculated. Results indicated that the desulfurization was enhanced when copper was loaded onto activated carbon surface. The highest desulfurization percent for Cu2O/AC and o
... Show More