Cybersecurity refers to the actions that are used by people and companies to protect themselves and their information from cyber threats. Different security methods have been proposed for detecting network abnormal behavior, but some effective attacks are still a major concern in the computer community. Many security gaps, like Denial of Service, spam, phishing, and other types of attacks, are reported daily, and the attack numbers are growing. Intrusion detection is a security protection method that is used to detect and report any abnormal traffic automatically that may affect network security, such as internal attacks, external attacks, and maloperations. This paper proposed an anomaly intrusion detection system method based on a new RNA encoding method and ResNet50 Model, where the encoding is done by splitting the training records into different groups. These groups are protocol, service, flag, and digit, and each group is represented by the number of RNA characters that can represent the group's values. The RNA encoding phase converts network traffic records into RNA sequences, allowing for a comprehensive representation of the dataset. The detection model, utilizing the ResNet architecture, effectively tackles training challenges and achieves high detection rates for different attack types. The KDD-Cup99 Dataset is used for both training and testing. The testing dataset includes new attacks that do not appear in the training dataset, which means the system can detect new attacks in the future. The efficiency of the suggested anomaly intrusion detection system is done by calculating the detection rate (DR), false alarm rate (FAR), and accuracy. The achieved DR, FAR, and accuracy are equal to 96.24%, 6.133%, and 95.99%. The experimental results exhibit that the RNA encoding method can improve intrusion detection.
Research Summary :
Praise be to God, Lord of the Worlds, and prayers and peace be upon the Master of the Messengers, his family and all his companions, then after:
This is brief research that contained between its two covers one of the jurisprudence rules derived from Islamic Sharia that guarantees the right of others, in case of forcing to do the prohibited act, and it is a restriction of the rule: “Necessities allow prohibitions” and “Hardship brings facilitation” and support for the rule: “Necessities are valued.” It is an origin in alleviating the taxpayer definitely , and the study has briefly shown some of the jurisprudential appli
... Show MoreComputer analysis of simple eye model is performed in the present work by using the Zemax optical design software 2000E . The most important optical parameters of the eye were calculated such as the effective focal length (EFL) , the image spot size at the retina and found to be in a reasonable agreement with the values needed for the laser retinal treatment .The present eye model leads to an effective wavelength and we found the image spot diagram at the surface of the retina and the wavefront error which are provided at zero field angle. This gives a good evidence of the validity of the model in one hand, and can be used to determine the compatibility of any optical design intended for visual applications. By using the pulse fre
... Show MoreIn this paper, chaotic and periodic dynamics in a hybrid food chain system with Holling type IV and Lotka-Volterra responses are discussed. The system is observed to be dissipative. The global stability of the equilibrium points is analyzed using Routh-Hurwitz criterion and Lyapunov direct method. Chaos phenomena is characterized by attractors and bifurcation diagram. The effect of the controlling parameter of the model is investigated theoretically and numerically.
RA is a complex chronic disease, primarily affects the lining of the synovial joints and can cause progressive disability, premature death, and socioeconomic burdens. The clinical manifestations of symmetrical joint involvement include arthralgia, swelling, redness, and even limiting the range of motion. The pathogenesis is not known therefore the study included Rheumatoid arthritis (RA) is one of systemic inflammatory diseases that characterized by a progressive disabling course. The study included patients suffering from RA and as healthy controls. immunological and genetic factor were evaluated in each subject by using serum level of cytokine and genetic factor. The etiopathology of the disease is not well known for this reason the study
... Show More5-Fluorouracil is one of the commonly used chemotherapy drugs in anticancer therapy; unfortunately treatment with 5-FU by solely has many drawbacks low lipophilicity, low permeability, low molecular weight, and its relatively poor plasma protein binding; also a brief half-life therefore frequent administration is required to maintain the optimal therapeutic plasma level which in addition to its poor selectivity, drug resistance and limited penetration to cancer cells; leads to increased incidence of side-effects to healthy cells/tissues and low response rates. In order to minimize these drawbacks; 5-FU was chemically conjugated with pyrrolidine dithiocarbamate (PDTC) in a mutual prodrug moiety (S-(9H-purin-6-yl) 3-(
... Show MoreThe current research aims to determine the impact of the cognitive reconstruction program on the development of psychological hardness among middle school students through the experimental verification of three hypotheses. The research sample consisted of (16) out of (450) students selected from Ibn Rushud preparatory school- Al-Rusafa 2. These participants have been randomly distributed into two equal groups. The researcher has used the method of cognitive reconstruction with the experimental group, whereas with the controlling group, he used nothing. The researcher has further used the scale of psychological hardness of Kobassa with the participants; the scale has been built in a way that suits the sample of the study, which consisted
... Show MoreThe science of information security has become a concern of many researchers, whose efforts are trying to come up with solutions and technologies that ensure the transfer of information in a more secure manner through the network, especially the Internet, without any penetration of that information, given the risk of digital data being sent between the two parties through an insecure channel. This paper includes two data protection techniques. The first technique is cryptography by using Menezes Vanstone elliptic curve ciphering system, which depends on public key technologies. Then, the encoded data is randomly included in the frame, depending on the seed used. The experimental results, using a PSNR within avera
... Show MoreDocetaxel is an effective treatment approved for many types of cancers, but its effectiveness in clinical practice can be compromised by significant occurrence of adverse drug reactions. The aim of the current study was to measure the distribution of adverse drug reactions of docetaxel reported in Iraq and to assess the causality, severity, seriousness, preventability, expectedness and outcome of these adverse reactions. A retrospective study conducted on individual case safety reports from the Iraqi Pharmacovigilance Center / Ministry of Health. The study included 118 individual case safety report containing 236 adverse drug reactions.
Most of the adverse drug reactions were related to skin and subcutaneous tissue disorders(26.7%), f
Portland cement concrete is the most commonly used construction material in the world for decades. However, the searches in concrete technology are remaining growing to meet particular properties related to its strength, durability, and sustainability issue. Thus, several types of concrete have been developed to enhance concrete performance. Most of the modern concrete types have to contain supplementary cementitious materials (SCMs) as a partial replacement of cement. These materials are either by-products of waste such as fly ash, slag, rice husk ash, and silica fume or from a geological resource like natural pozzolans and metakaolin (MK). Ideally, the utilization of SCMs will enhance the concrete performance, minimize
... Show More