Preferred Language
Articles
/
joe-1666
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade the detection rates of current NIDSs, thorough analyses are essential to identify where ML predictors outperform them. The first step is to provide assessment of most used NIDS worldwide, Snort, and comparing its performance with ML classifiers. This paper provides an empirical study to evaluate performance of Snort and four supervised ML classifiers, KNN, Decision Tree, Bayesian net and Naïve Bays against network attacks, probing, Brute force and DoS. By measuring Snort metric, True Alarm Rate, F-measure, Precision and Accuracy and compares them with the same metrics conducted from applying ML algorithms using Weka tool. ML classifiers show an elevated performance with over 99% correctly classified instances for most algorithms, While Snort intrusion detection system shows a degraded classification of about 25% correctly classified instances, hence identifying Snort weaknesses towards certain attack types and giving leads on how to overcome those weaknesses. 

es.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Tue Jun 01 2021
Journal Name
Periodicals Of Engineering And Natural Sciences
Steganography using dual tree complex wavelet transform with LSB indicator technique
...Show More Authors

Image steganography is undoubtedly significant in the field of secure multimedia communication. The undetectability and high payload capacity are two of the important characteristics of any form of steganography. In this paper, the level of image security is improved by combining the steganography and cryptography techniques in order to produce the secured image. The proposed method depends on using LSBs as an indicator for hiding encrypted bits in dual tree complex wavelet coefficient DT-CWT. The cover image is divided into non overlapping blocks of size (3*3). After that, a Key is produced by extracting the center pixel (pc) from each block to encrypt each character in the secret text. The cover image is converted using DT-CWT, then the p

... Show More
Preview PDF
Scopus (5)
Crossref (3)
Scopus Crossref
Publication Date
Mon Dec 31 2018
Journal Name
Journal Of Theoretical And Applied Information Technology (jatit)
Factors and Model for Sensitive Data Management and Protection in Information Systems’ Decision of Cloud Environment
...Show More Authors

Journal of Theoretical and Applied Information Technology is a peer-reviewed electronic research papers & review papers journal with aim of promoting and publishing original high quality research dealing with theoretical and scientific aspects in all disciplines of IT (Informaiton Technology

View Publication
Publication Date
Sat Feb 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Solve travelling sales man problem by using fuzzy multi-objective linear programming
...Show More Authors

   The main focus of this research is to examine the Travelling Salesman Problem (TSP) and the methods used to solve this problem where this problem is considered as one of the combinatorial optimization problems which met wide publicity and attention from the researches for to it's simple formulation and important applications and engagement to the rest of combinatorial problems , which is based on finding the optimal path through known number of cities where the salesman visits each city only once before returning to the city of departure n this research , the benefits  of( FMOLP)   algorithm is employed as one of the best methods to solve the (TSP) problem and the application of the algorithm in conjun

... Show More
View Publication Preview PDF
Crossref
Publication Date
Wed Jun 01 2016
Journal Name
Journal Of Engineering
Management Model for Evaluation and Selection of Engineering Equipment Suppliers for Construction Projects in Iraq
...Show More Authors

Engineering equipment is essential part in the construction project and usually manufactured with long lead times, large costs and special engineering requirements. Construction manager targets that equipment to be delivered in the site need date with the right quantity, appropriate cost and required quality, and this entails an efficient supplier can satisfy these targets. Selection of engineering equipment supplier is a crucial managerial process .it requires evaluation of multiple suppliers according to multiple criteria. This process is usually performed manually and based on just limited evaluation criteria, so better alternatives may be neglected. Three stages of survey comprised number of public a

... Show More
View Publication Preview PDF
Publication Date
Tue Jan 01 2019
Journal Name
Advances In Materials Physics And Chemistry
The Role of Cooling Condition on the Superconducting Properties of Tl<sub>2-x</sub>Hg<sub>x</sub>Sr<sub>2</sub>Ca<sub>2</sub>Cu<sub>3</sub>O<sub>10+δ</sub> System
...Show More Authors

View Publication
Crossref
Publication Date
Sun Oct 01 2023
Journal Name
Baghdad Science Journal
Molecular detection by some virulence genes of Salmonella enterica subsp. enterica isolated from the stool of children with diarrhea
...Show More Authors

Diarrhea is a real disease in childhood which could cause death. Therefore, this study was conducted to isolate Salmonella from 350 stool samples taken from children under five years in age, suffering from diarrhea during the period from March 2019 to March 2020 in Tikrit city / Iraq. The results showed the possibility to isolate ten isolates of Salmonella enterica subsp. Enterica, an infection rate, represents 2.875% of the total rate of patients who suffer from diarrhea. The virulence genes were investigated for ten isolates of S. enterica subsp. enterica, the result is that all isolates possessed the genes stn, invA, lpfA with an appearance percentage of 100%, whi

... Show More
View Publication Preview PDF
Scopus (1)
Crossref (1)
Scopus Crossref
Publication Date
Fri Apr 01 2022
Journal Name
Baghdad Science Journal
Data Mining Techniques for Iraqi Biochemical Dataset Analysis
...Show More Authors

This research aims to analyze and simulate biochemical real test data for uncovering the relationships among the tests, and how each of them impacts others. The data were acquired from Iraqi private biochemical laboratory. However, these data have many dimensions with a high rate of null values, and big patient numbers. Then, several experiments have been applied on these data beginning with unsupervised techniques such as hierarchical clustering, and k-means, but the results were not clear. Then the preprocessing step performed, to make the dataset analyzable by supervised techniques such as Linear Discriminant Analysis (LDA), Classification And Regression Tree (CART), Logistic Regression (LR), K-Nearest Neighbor (K-NN), Naïve Bays (NB

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Clarivate Crossref
Publication Date
Wed Mar 26 2025
Journal Name
قضايا سياسية
The role of strategic planning in American decision-making
...Show More Authors

The purpose of this research is to study the organic planning in the United Industry Alliance, focusing on an applied model. It takes the concept of good planning, and its importance in the overall picture, well into political, economic, and military policy. It also analyzes how the United States has used this year to address the challenges that nationalism targets. The research draws on typical examples to illustrate the differences between researcher and decision effectiveness. It also discusses the factors that lead to the success or failure of dynamic planning, and draws lessons from it in other countries. Finally, the researcher begins to help in planning the goal as a basic tool in enhancing effectiveness.

Publication Date
Wed Feb 08 2023
Journal Name
Journal Of Educational And Psychological Researches
Activating the Role of Women Leaders in Educational Decision-Making in Educational Administrations in the Northern Border in Light of the Kingdom's 2030 Vision
...Show More Authors

This study aims at identifying the activation of the role of feminine leaders in educational decision-making in educational administrations in the Northern Borders Province in light of the Kingdom's vision 2030. It also aims to identify what educational leadership is, to study the conceptual framework of the contemporary education decision-making process, and to examine the reality of the problems of feminine leaders in educational decision-making in the educational administrations in the Northern Borders. In addition, it tries to develop a proposed vision to activate the role of feminine leaders in educational decision-making in Educational Administrations in the Northern Borders Province in light of Vision 2030. To achieve the objectiv

... Show More
View Publication Preview PDF
Publication Date
Tue Mar 01 2022
Journal Name
The International Journal Of Nonlinear Analysis And Applications
Improved optimality checkpoint for decision making by using the sub-triangular form
...Show More Authors

Decision-making in Operations Research is the main point in various studies in our real-life applications. However, these different studies focus on this topic. One drawback some of their studies are restricted and have not addressed the nature of values in terms of imprecise data (ID). This paper thus deals with two contributions. First, decreasing the total costs by classifying subsets of costs. Second, improving the optimality solution by the Hungarian assignment approach. This newly proposed method is called fuzzy sub-Triangular form (FS-TF) under ID. The results obtained are exquisite as compared with previous methods including, robust ranking technique, arithmetic operations, magnitude ranking method and centroid ranking method. This

... Show More
View Publication Preview PDF