Preferred Language
Articles
/
lBZirIoBVTCNdQwC8qJ0
Development of an Optimized Botnet Detection Framework based on Filters of Features and Machine Learning Classifiers using CICIDS2017 Dataset
...Show More Authors
Abstract<p>Botnet is a malicious activity that tries to disrupt traffic of service in a server or network and causes great harm to the network. In modern years, Botnets became one of the threads that constantly evolving. IDS (intrusion detection system) is one type of solutions used to detect anomalies of networks and played an increasing role in the computer security and information systems. It follows different events in computer to decide to occur an intrusion or not, and it used to build a strategic decision for security purposes. The current paper <italic>suggests</italic> a hybrid detection Botnet model using machine learning approach, performed and analyzed to detect Botnet attacks using CICIDS2017 dataset. The proposed model designed based on two types of filters to the botnet features; Correlation Attribute Eval and Principal Component deployed to reduce the dataset dimensions and to decrease the time complexity of the botnet detection process. The detection enhancement achieved by reducing the features of the dataset from 85 to 9. The training stage of classifiers is developed and compared based on six classifiers called (Random Forest, IBK, JRip, Multilayer Perceptron, Naive Bayes and OneR) evaluated to accomplish an optimized detection model. The performance and results of the proposed framework are validated using well-known metrics such as Accuracy (ACC), Precision (Pr), Recall (Rc) and F-Measure (F1). The consequence is that the combination of Correlation Attribute Eval (filter) with JRip (classifier) together can satisfy significant improvement in the Botnet detection process using CICIDS2017 dataset.</p>
Scopus Crossref
View Publication
Publication Date
Thu Jun 01 2017
Journal Name
Journal Of Economics And Administrative Sciences
The Role of Strategic audit in detection of financial corruption cases in Iraq - Proposed Framework
...Show More Authors

This research focuses on detecting the financial corruption cases in Iraq in light of adoption the strategic audit, the paper deals with the problem of the proliferation corruption cases particularly financial in Iraq and dramatically in the presence of audit and control devices as well as inspection and integrity devices, which indicates the existence of deficiencies and weaknesses in those devices in the implementation of audit and control functions in order to detect the corruption cases in the economic units in Iraq.

Stems objective of this research through the provision of approach of strategic audit concepts and indicate the extent importance of adopting of strategic audit as a means to detect the f

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Jan 01 2019
Journal Name
Aip Conference Proceedings
Improvement of electrical features of SnO2 based varistor doped with Al2O3
...Show More Authors

One of the important objectives of the varistor is for a sustainable environment and reduce the pollution resulting from the frequent damage of the electrical devices and power station waste. In present work, the influence of Al2O3 additives on the non –linear electrical features of SnO2 varistors, has been investigated, where SnO2 ceramic powder doped with Al2O3 in three rates (0.005, 0.01, and 0.05), the XRD test improved that SnO2 is the primary phase, while CoCr2O4, and Al2O3 represent the secondary phases. The electrical tests of all prepared samples confirmed that the increasing of Al2O3 rates and sintering temperature improves and increase the electrical features, where the best results obtained at Al2O3 (0.05) and 1000℃, the non

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Mon Aug 05 2024
Journal Name
Food And Bioprocess Technology
Development of an Innovative Reinforced Food Packaging Film Based on Corn Starch/Hydroxypropyl Methylcellulose/Nanocrystalline Cellulose Incorporated with Nanogel Containing Quercetin
...Show More Authors

View Publication
Scopus (9)
Crossref (5)
Scopus Clarivate Crossref
Publication Date
Tue Jul 01 2014
Journal Name
Computer Engineering And Intelligent Systems
Static Analysis Based Behavioral API for Malware Detection using Markov Chain
...Show More Authors

Researchers employ behavior based malware detection models that depend on API tracking and analyzing features to identify suspected PE applications. Those malware behavior models become more efficient than the signature based malware detection systems for detecting unknown malwares. This is because a simple polymorphic or metamorphic malware can defeat signature based detection systems easily. The growing number of computer malwares and the detection of malware have been the concern for security researchers for a large period of time. The use of logic formulae to model the malware behaviors is one of the most encouraging recent developments in malware research, which provides alternatives to classic virus detection methods. To address the l

... Show More
Publication Date
Sat Dec 15 2018
Journal Name
Journal Of Baghdad College Of Dentistry
The Impact of Breastfeeding Duration on the Development of Normal Occlusal Features of the Primary Dentition among Baghdad Preschool Children
...Show More Authors

Background: Normal occlusal features of primary dentition are crucial for normal development of the permanent dentition. Breastfeeding is an important factor for both general and dental health of children. Aim: The aim of the present study is to assess the impact of the breastfeeding duration on the prevalence of normal occlusal features of the primary dentition among preschool children in Baghdad. Materials and Methods: The sample was 630 Iraqi children (270- boys, 360 girls), aged 3-5 years selected from four kindergartens in Baghdad city. The study was carried out through questionnaire and clinical examination. Normal occlusal features were examined as the presence or absence of interincisive spaces (IS) and primate spaces (PS), termi

... Show More
View Publication Preview PDF
Crossref (2)
Crossref
Publication Date
Tue Jan 31 2023
Journal Name
International Journal Of Nonlinear Analysis And Applications
Survey on intrusion detection system based on analysis concept drift: Status and future directions
...Show More Authors

Nowadays, internet security is a critical concern; the One of the most difficult study issues in network security is "intrusion detection". Fight against external threats. Intrusion detection is a novel method of securing computers and data networks that are already in use. To boost the efficacy of intrusion detection systems, machine learning and deep learning are widely deployed. While work on intrusion detection systems is already underway, based on data mining and machine learning is effective, it requires to detect intrusions by training static batch classifiers regardless considering the time-varying features of a regular data stream. Real-world problems, on the other hand, rarely fit into models that have such constraints. Furthermor

... Show More
View Publication
Publication Date
Fri Apr 30 2021
Journal Name
International Journal Of Intelligent Engineering And Systems
SMS Spam Detection Based on Fuzzy Rules and Binary Particle Swarm Optimization
...Show More Authors

View Publication
Scopus (10)
Crossref (5)
Scopus Crossref
Publication Date
Fri Jun 01 2018
Journal Name
Arpn Journal Of Engineering And Applied
Product development from 3D scanner To CNC machine in reverse engineering
...Show More Authors

The purpose of this article is to introduce reverse engineering procedure (REP). It can achieved by developing an industrial mechanical product that had no design schemes throughout the 3D-Scanners. The aim of getting a geometric CAD model from 3D scanner is to present physical model. Generally, this used in specific applications, like commercial plan and manufacturing tasks. Having a digital data as stereolithography (STL) format. Converting the point cloud be can developed as a work in programming by producing triangles between focuses, a procedure known as triangulation. Then it could be easy to manufacture parts unknown documentation and transferred the information to CNC-machines. In this work, modification was proposed and used in RE

... Show More
Scopus
Publication Date
Mon Oct 03 2022
Journal Name
International Journal Of Nonlinear Analysis And Applications
Use of learning methods for gender and age classification based on front shot face images
...Show More Authors

Publication Date
Fri Mar 01 2024
Journal Name
Baghdad Science Journal
Exploring the Challenges of Diagnosing Thyroid Disease with Imbalanced Data and Machine Learning: A Systematic Literature Review
...Show More Authors

Thyroid disease is a common disease affecting millions worldwide. Early diagnosis and treatment of thyroid disease can help prevent more serious complications and improve long-term health outcomes. However, thyroid disease diagnosis can be challenging due to its variable symptoms and limited diagnostic tests. By processing enormous amounts of data and seeing trends that may not be immediately evident to human doctors, Machine Learning (ML) algorithms may be capable of increasing the accuracy with which thyroid disease is diagnosed. This study seeks to discover the most recent ML-based and data-driven developments and strategies for diagnosing thyroid disease while considering the challenges associated with imbalanced data in thyroid dise

... Show More
View Publication Preview PDF
Scopus (6)
Crossref (4)
Scopus Crossref