Preferred Language
Articles
/
joe-2549
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the most effective features of the existing detection systems are extracted, modified and combined together to develop more powerful detection system called Sequence Number with Rate and Signal Strength detection method (SN-R-SS).

SN-R-SS consists from three phases. First phase is Window Sequence Numbers; to detect suspicious spoofed frames in the network. Second phase is Transmission Rate Analysis; to reduce the amount of the suspicious spoofed frames that are generated from the first phase. Finally, the third phase is Received Signal Strength; this phase is decisive phase because it decides whether the suspicious
spoofed frames are spoofed or not. Commview for WiFi network monitor and analyzer is used to capturing frames from the radio channals. Matlab software has been used to implement various computational and mathematical relations in SN-R-SS. This detection method does not work in a real time because it needs a lot of computation.

 

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Wed Dec 01 2021
Journal Name
Iraqi Journal Of Veterinary Sciences
Isolation and molecular detection of enterotoxigenic Staphylococcus aureus from raw milk of cows
...Show More Authors

View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Fri Jan 01 2016
Journal Name
Iraqi Journal Of Science
Land cover change detection of Baghdad city using multi-spectral remote sensing imagery
...Show More Authors

Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Thu Jul 01 2004
Journal Name
Bulletin Of The Iraq Natural History Museum (p-issn: 1017-8678 , E-issn: 2311-9799)
DETECTION OF SUBSURFACE CAVITIES BY THE ELECTROMAGNETIC METHOD (Case Study at Haditha Area)
...Show More Authors

Two EM techniques, terrain conductivity and VLF-Radiohm resistivity (using two
different instruments of Geonics EM 34-3 and EMI6R respectively) have been applied to
evaluate their ability in delineation and measuring the depth of shallow subsurface cavities
near Haditha city.
Thirty one survey traverses were achieved to distinguish the subsurface cavities in the
investigated area. Both EM techniques are found to be successfiul tools in study area.

View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (6)
Crossref (1)
Scopus Crossref
Publication Date
Fri Aug 12 2022
Journal Name
Future Internet
Improved DDoS Detection Utilizing Deep Neural Networks and Feedforward Neural Networks as Autoencoder
...Show More Authors

Software-defined networking (SDN) is an innovative network paradigm, offering substantial control of network operation through a network’s architecture. SDN is an ideal platform for implementing projects involving distributed applications, security solutions, and decentralized network administration in a multitenant data center environment due to its programmability. As its usage rapidly expands, network security threats are becoming more frequent, leading SDN security to be of significant concern. Machine-learning (ML) techniques for intrusion detection of DDoS attacks in SDN networks utilize standard datasets and fail to cover all classification aspects, resulting in under-coverage of attack diversity. This paper proposes a hybr

... Show More
View Publication Preview PDF
Scopus (37)
Crossref (29)
Scopus Clarivate Crossref
Publication Date
Tue Nov 01 2016
Journal Name
Journal Of Economics And Administrative Sciences
Analysis of The Effect of The Administration of Communications Towers in The Selling Prices of Residential Real estate )New University Village Model(
...Show More Authors

Abstract                          

 Should be the goal of Government controls, including environmental controls and safety laws to protect citizens from the harmful effects of negative secreted by human's additions and changes in the environment. and perhaps the protection aspects of the protection of citizens from the adverse effects of communications towers, including those produced by towers of health effects. The people the right to choose the nature of the physical environment, which should not be imposed on them by others. Communications towers are one of the main problems that have been

... Show More
View Publication Preview PDF
Crossref (1)
Crossref
Publication Date
Mon Dec 29 2025
Journal Name
Iraqi Journal Of Science
Synthesis, Characterization and Quantum Mechanical Study of Some New 2-benzylidenehydrazinecarbothioamide Derivatives as Corrosion Inhibitors for Carbon/mild Steel in Acidic Medium.
...Show More Authors

In this work, some of new 2-benzylidenehydrazinecarbothioamide derivatives have been prepared by condensation of thiosemicarbazide and different substituted aromatic benzaldehydes in presence of glacial acetic acid to give compounds (1-6), these compounds have characterized by its physical properties and spectroscopic methods. This work also included theoretical study to prove the ability of these compounds as corrosion inhibitors; The program package of Gaussian 09W with its graphical user interface GaussView 5.0 had used for this purpose; the methods of Density Functional Theory (DFT) with basis set of 6-311G (d,p) / hybrid function of B3LYP and semiempirical method of PM3 have been used, the study included theoretical simulation

... Show More
View Publication Preview PDF
Publication Date
Tue Oct 01 2019
Journal Name
Journal Of Economics And Administrative Sciences
The Time-Cost Trade-off to Manage A Project in a Fuzzy Environment
...Show More Authors

In this research, the problem of ambiguity of the data for the project of establishing the typical reform complex in Basrah Governorate was eliminated. The blurry of the data represented by the time and cost of the activities was eliminated by using the Ranking function and converting them into normal numbers. Scheduling and managing the Project in the Critical Pathway (CPM) method to find the project completion time in normal conditions in the presence of non-traditional relationships between the activities and the existence of the lead and lag periods. The MS Project was used to find the critical path. The results showed that the project completion time (1309.5) dinars and the total cost has reached (33113017769) dinars and the

... Show More
View Publication Preview PDF
Crossref