Preferred Language
Articles
/
joe-1666
An Empirical Investigation on Snort NIDS versus Supervised Machine Learning Classifiers
...Show More Authors

With the vast usage of network services, Security became an important issue for all network types. Various techniques emerged to grant network security; among them is Network Intrusion Detection System (NIDS). Many extant NIDSs actively work against various intrusions, but there are still a number of performance issues including high false alarm rates, and numerous undetected attacks. To keep up with these attacks, some of the academic researchers turned towards machine learning (ML) techniques to create software that automatically predict intrusive and abnormal traffic, another approach is to utilize ML algorithms in enhancing Traditional NIDSs which is a more feasible solution since they are widely spread. To upgrade the detection rates of current NIDSs, thorough analyses are essential to identify where ML predictors outperform them. The first step is to provide assessment of most used NIDS worldwide, Snort, and comparing its performance with ML classifiers. This paper provides an empirical study to evaluate performance of Snort and four supervised ML classifiers, KNN, Decision Tree, Bayesian net and Naïve Bays against network attacks, probing, Brute force and DoS. By measuring Snort metric, True Alarm Rate, F-measure, Precision and Accuracy and compares them with the same metrics conducted from applying ML algorithms using Weka tool. ML classifiers show an elevated performance with over 99% correctly classified instances for most algorithms, While Snort intrusion detection system shows a degraded classification of about 25% correctly classified instances, hence identifying Snort weaknesses towards certain attack types and giving leads on how to overcome those weaknesses. 

es.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Apr 10 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
The Environment Effects of Fish Cages Farming in the Euphrates River at Mysayyib District on Water Quality at the Farms and at the Myssayyib Water Purification Stations-2013
...Show More Authors

    The present study aimed to investigate the effects of cages of fish farming of Mussayyib district,The fish farming have been selected at Euphrates river with in Mussayyib districtBabylon province the area of study extend 3 Km at the river and includes 541 cages in water with in 46 fish farming . Water samples were taken from 3 stations three times within one month for each two of them were taken from two water purification stations in mussayyib ,physical and chemical examination of water quality were taken ,The results for samples from the fish farming indicated that PH and salinity of water within acceptable levels, high proporation of dissolved oxygen and vital oxygen required were very high while the turbidity was more t

... Show More
View Publication Preview PDF
Publication Date
Fri Jun 07 2024
Journal Name
Medicine
Impact of TYMS gene polymorphism on the outcome of methotrexate treatment in a sample of Iraqi rheumatoid arthritis patients – identification of novel single nucleotide polymorphism: Cross-sectional study
...Show More Authors

The current work aims to evaluate the association between genetic mutations in thymidylate synthetase (TYMS gene in exon1 and partial regions of promotor and intron 1 [877 bp, 657,220–658,096 bp]) and the therapeutic outcomes for rheumatoid arthritis (RA) Iraqi patients. An observational cross-sectional study involving 95 RA patients with established RA patients based on their methotrexate treatment responsiveness. Genetic sequencing of the TYMS gene was performed for all patients according to the instruction manuals of the sequencing company (Macrogen Inc. Geumchen, South Korea). Four polymorphisms were identified by sequencing 95 randomly selected patients in the noncoding region of TYMS

... Show More
View Publication
Scopus Clarivate Crossref
Publication Date
Tue Apr 01 2014
Journal Name
Journal Of Economics And Administrative Sciences
Analsis of politic behavior and its impact on displaying the continuousness of organizational trust mantainance ,applied research of a sample of AL-farouq State Construction contracting company Employees
...Show More Authors

The research aims to know the concept of politic behavior as one of the important behaviours in the different fields and sectors. It is considered to be part of the organizatial work to face the expected  risks. It includes two group of factors personal (self –monitors, locus of control ,expectation s of success, perceived job alternatives)and organizational(promotion ,division resources,role  ambiguity ,democratic decision)studied by the researcher  in the frame of the relationship with the variable  of display  continuous trust matain which includes two variable (build trust mantain, display  trust continuouness)through applied frame by random sample consists of (90)employee  at Farouq State

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Dec 29 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The role of the external auditor in assessing the security of information technology systems in light of (ISO/IEC 27001): (Applied research on a sample of private banks)
...Show More Authors

This research aims to shed light on the necessity of establishing an information security management system through which banking security risks are managed in the light of the ISO (IEC 27001) standard, through which bank departments seek to demonstrate the management of their security systems and their controls in accordance with the specifications of the standard to obtain an internationally recognized security certificate And the need for senior management in banks to an independent person with scientific and practical qualification and who has accredited certificates in the field of information technology for the purpose of helping them to verify the level of compatibility between the policies and procedures applied and the p

... Show More
View Publication Preview PDF
Publication Date
Wed Mar 02 2022
Journal Name
Journal Of Educational And Psychological Researches
The Effectiveness of a Training Program to Improve some Aspects of Sensory Integration Disorder and Its Effect on Self-Direction Among a Sample of Children with Intellectual Disabilities
...Show More Authors

The present research was conducted to investigate the effectiveness of a training program to improve some aspects of sensory integration disorder and its effect on self-direction among a sample of children with intellectual disabilities. The study sample consists of (10 subjects as an experimental group) were exposed to the training program، and the control group consists of (10 subjects as a control group) were not exposed to the training program. The study included the following tools: A scale of self-direction for intellectual disability (prepared by the researcher). Training program (prepared by the researcher). The Results of the study showed the following: There are no statistically significant differences between the means ranks

... Show More
View Publication Preview PDF
Publication Date
Thu Jan 16 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
Security and confidentiality of information and its impact on the competitive performance of insurance companies: A prospective study for the Iraq insurance company and ALhamraa Insurance company (private)
...Show More Authors

The security of information represent the available  protection of  information and its component and guaranty the its safety and confidentiality. The absent or lack or stop of security of information and without maximum benefit may lead to lose confidence and make it burden on the company. So we must protect the company and information from the damages which may lead to the frailer of performance and loses of the company and its workers. So the security of information considered one of the potential  and controlling basis to protect individuals and companies from the damages. To insure the security  and confidentiality of information there are delicate,  proper and trusted ways, like FIRE WALL, PASS WORD, SYPHAR

... Show More
View Publication Preview PDF
Publication Date
Sun Jun 04 2017
Journal Name
Baghdad Science Journal
The Effect of Variety and Gibberellic acid and Brassinolide and their Interaction on Some of The Chemical Characteristics and Total chlorophyll of the plant Dill Anethum graveolens L.
...Show More Authors

The experiment was carried out to study the effect of variety and gibberellic acid in concentration (0 and 50)mg.lat-1 and BL in five concentration (0, 0.50 ,1 ,2 and 3)mg.ltr-1 and their interaction in some chemical Characteristics and total chlorophyll for Dill plant . the experiment designed according Randomized Complete Block Design (RCBD) and three replicates per treatment, compared to the average using less significant difference at the level of probability (0.05) , the results showed the following:- The effect of brassinolide with it,s concentrations led to obtain a significant increase in all the studied characteristics, so the superiority of the concentration of 2 mg.L-1 of brassinolide in each of Ca, Mg,Fe, and total chlorophyll T

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Feb 07 2019
Journal Name
Journal Of The College Of Education For Women
Nominal Ellipsis in English & Arabic and its Influence on the Translation of the Meanings of Some Selected Qurànic Verses ( A Contrastive study ): هدى فالح حسن & جمانة شكيب محمد
...Show More Authors

Nominal ellipsis is a linguistic phenomenon found in English and Arabic .It is
based on leaving out a part of a nominal construction or more for the sake of good
style , compactness and connectedness .This phenomenon is found in the language of
the Glorious Qur’an .The study in hand is concerned with how translators handle
translating Qur’anic verses which contain ellipted nouns , i ,e. , to what extent the
translated Qur’anic verses are close to the original ones , and to what extent their
translations serve understanding the meanings of the glorious verses while at the
same time maintaining their beauty in style. The study aims at shedding light on
nominal ellipsis in English and Arabic .The study undertak

... Show More
View Publication Preview PDF
Publication Date
Wed May 01 2024
Journal Name
Journal Of Ecological Engineering
Explore the Impact of Surfactant Type on the Stability and Separation Efficiency of Oil–Water Emulsions of Real Wastewater from Al-Basrah Crude Oil Using Microbubble Air Flotation
...Show More Authors

Among several separation processes, the air flotation distinguish as remarkably high potential separation process related to its high separation efficiency and throughput, energy-efficient, simple process, cost-effective, applicable to a wide range of oily wastewater and no by-products. The current study aimed to investigate the effect of the type and concentration of surfactant on the stability of oil-water emulsion and efficiency of the separation process. For this purpose, three types of surfactant where used (anionic SDS, mixed nonionic Span 85/Tween 80, and cationic CTAB). The results demonstrated that the Span 85/Tween 80 surfactant has the best stability, and it increases with the surfactant concentration augmentation. The removal ef

... Show More
View Publication Preview PDF
Scopus (2)
Scopus Clarivate Crossref
Publication Date
Tue May 24 2022
Journal Name
International Journal Of Interactive Mobile Technologies (ijim)
A Blind Video Copyright Protection Technique in Maximum and Minimum Energy Frames Based on The Fast Walsh Hadamard Transform (FWHT) and Discrete Wavelet Transform (DWT) and Arnold Map
...Show More Authors

Video copyright protection is the most generally acknowledged method of preventing data piracy. This paper proposes a blind video copyright protection technique based on the Fast Walsh Hadamard Transform (FWHT), Discrete Wavelet Transform (DWT), and Arnold Map. The proposed method chooses only frames with maximum and minimum energy features to host the watermark. It also exploits the advantages of both the fast Walsh Hadamard transform (FWHT) and discrete wavelet transforms (DWT) for watermark embedding. The Arnold map encrypts watermarks before the embedding process and decrypts watermarks after extraction. The results show that the proposed method can achieve a fast embedding time, good transparency, and robustness against various

... Show More
View Publication
Scopus (1)
Scopus Crossref