Preferred Language
Articles
/
oRf6Po8BVTCNdQwC6WUP
Evaluation of DDoS attacks Detection in a New Intrusion Dataset Based on Classification Algorithms
...Show More Authors

Intrusion detection system is an imperative role in increasing security and decreasing the harm of the computer security system and information system when using of network. It observes different events in a network or system to decide occurring an intrusion or not and it is used to make strategic decision, security purposes and analyzing directions. This paper describes host based intrusion detection system architecture for DDoS attack, which intelligently detects the intrusion periodically and dynamically by evaluating the intruder group respective to the present node with its neighbors. We analyze a dependable dataset named CICIDS 2017 that contains benign and DDoS attack network flows, which meets certifiable criteria and is openly accessible. It evaluates the performance of a complete arrangement of machine learning algorithms and network traffic features to indicate the best features for detecting the assured attack classes. Our goal is storing the address of destination IP that is utilized to detect an intruder by method of misuse detection.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Mar 10 2021
Journal Name
Baghdad Science Journal
A new approach for the topical treatment of acne vulgaris by clindamycin HCL supported on kalion
...Show More Authors

Has been studied both processes Almetzaz and extortion of a substance Alklanda Maysan different amounts of Alcaúlan Guy 70% alcohol solution using the method when the wavelength

View Publication Preview PDF
Publication Date
Tue Aug 01 2023
Journal Name
Baghdad Science Journal
Isolation and Classification of Green Alga Stigeoclonium attenuatum and Evaluation of its Ability to Prepare Zinc Oxide Nanoflakes for Methylene Blue Photodegradation by Sunlight
...Show More Authors

           Algae have been used in different applications in various fields such as the pharmaceutical industry, environmental treatments, and biotechnology. Studies show that the preparation of nanoparticles by a green synthesis method is a promising solution to many medical and environmental issues. In the current study, the green alga Stigeoclonium attenuatum (Hazen) F.S. Collins 1909 was isolated and identified from the Al-Hillah River (Governorate of Babylon) in the middle of Iraq. The green synthesis by the aqueous extract of algae was used to prepare the nanoflakes of ZnO. Nanoflakes of ZnO are characterized by X-Ray diffraction (XRD) and scanning electron microscope (SEM) with flakes shape and dimensions ranging be

... Show More
View Publication Preview PDF
Scopus (2)
Crossref (1)
Scopus Crossref
Publication Date
Sat Feb 03 2018
Journal Name
Chinese Journal Of Physics
A true random number generator based on the photon arrival time registered in a coincidence window between two single-photon counting modules
...Show More Authors

True random number generators are essential components for communications to be conconfidentially secured. In this paper a new method is proposed to generate random sequences of numbers based on the difference of the arrival times of photons detected in a coincidence window between two single-photon counting modules

View Publication
Scopus (17)
Crossref (11)
Scopus Clarivate Crossref
Publication Date
Tue Apr 30 2024
Journal Name
Iraqi Journal Of Science
Credit Card Fraud Detection Challenges and Solutions: A Review
...Show More Authors

     Credit card fraud has become an increasing problem due to the growing reliance on electronic payment systems and technological advances that have improved fraud techniques. Numerous financial institutions are looking for the best ways to leverage technological advancements to provide better services to their end users, and researchers used various protection methods to provide security and privacy for credit cards. Therefore, it is necessary to identify the challenges and the proposed solutions to address them.  This review provides an overview of the most recent research on the detection of fraudulent credit card transactions to protect those transactions from tampering or improper use, which includes imbalance classes, c

... Show More
Scopus (1)
Scopus Crossref
Publication Date
Sun Oct 15 2023
Journal Name
Journal Of Yarmouk
Artificial Intelligence Techniques for Colon Cancer Detection: A Review
...Show More Authors

Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant features from

... Show More
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jul 31 2021
Journal Name
Iraqi Journal Of Science
A Decision Tree-Aware Genetic Algorithm for Botnet Detection
...Show More Authors

     In this paper, the botnet detection problem is defined as a feature selection problem and the genetic algorithm (GA) is used to search for the best significant combination of features from the entire search space of set of features. Furthermore, the Decision Tree (DT) classifier is used as an objective function to direct the ability of the proposed GA to locate the combination of features that can correctly classify the activities into normal traffics and botnet attacks. Two datasets  namely the UNSW-NB15 and the Canadian Institute for Cybersecurity Intrusion Detection System 2017 (CICIDS2017), are used as evaluation datasets. The results reveal that the proposed DT-aware GA can effectively find the relevant

... Show More
View Publication Preview PDF
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sat Jan 01 2022
Journal Name
Iranian Journal Of Earth Sciences
Resistivity surveys application for detection of shallow caves in a case example from Western Iraq
...Show More Authors

Scopus (1)
Scopus
Publication Date
Sun Dec 01 2013
Journal Name
Toxicon
Methods for simultaneous detection of the cyanotoxins BMAA, DABA, and anatoxin-a in environmental samples
...Show More Authors

View Publication Preview PDF
Scopus (33)
Crossref (32)
Scopus Clarivate Crossref
Publication Date
Sun Jan 01 2012
Journal Name
Conference
Identifying Causes of Variation in Construction Industry Based on Questionnaire
...Show More Authors