research centers


Search results: Found 3

Listing 1 - 3 of 3
Sort by

Article
Development an Anomaly Network Intrusion Detection System Using Neural Network

Authors: Elaf Sabah Abbas --- Hamid M. Ali --- Kais Said Al-Sabbagh
Journal: Journal of Engineering مجلة الهندسة ISSN: 17264073 25203339 Year: 2012 Volume: 18 Issue: 12 Pages: 1325-1334
Publisher: Baghdad University جامعة بغداد

Loading...
Loading...
Abstract

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed system is ‎developed to overcome them.‎The proposed system is a development to the well-known payload anomaly detector (PAYL). By combining two stages with the PAYL ‎detector, it gives good detection ability and acceptable ratio of false ‎positive. The proposed system improve the models recognition ability in the ‎PAYL detector, for a filtered unencrypted HTTP subset traffic of ‎DARPA 1999 data set, from 55.234% in the PAYL system alone to ‎‎99.94% in the proposed system; due to the existence of the neural ‎network self-organizing map (SOM). In addition SOM decreases the ‎ratio of false positive from 44.676% in the PAYL system alone to ‎‎5.176% in the proposed system.The proposed system provides 80% detection ability of smart worms that are meant to invade the PAYL detector in the PAYL system alone, due to the existence of the randomization stage in the proposed system.

معظم ال(Intrusion Detection Systems)هي من نوع (Signature based) والتي تعمل بشكل مشابه الى مضادات الفايروسات ولكنها غير قادرة على التعرف على الهجمات التى تظهر لاول مره (الهجمات غير المدرجه في قاعده بياناتها) وقد ظهرت اهميه ال(anomaly based IDS) .تم تطوير النظام المقترح للتغلب على نقاط الضعف المذكوه سابقا.النظام المقترح هو تطوير الى نظام ال (PAYL) المعروف. بدمج مرحلتين مع كاشف ال(PAYL) يتم الحصول على قدره كشف جيده ونسبه ايجابيه كاذبه (False positive) الى 99.94% في النظام المقترح ، نتيجه لوجود الشبكه العصبيه. وكذلك قلل وجود ال (SOM) ال (False positive) من 44.676% في ال (PAYL system alone ) الى 5.176% في النظام المقترح .بسبب وجود مرحلة ال (randomization ) اظهر النظام المقترح قابليه على اكتشاف ال (smart worms) والمصممه لغزو كاشف ال ( PAYL) في ال (PAYL system alone ) بنسبة 80%.


Article
A Proposed Secure Protocol for E-Mail System Based on Authentication and Hash Function

Author: Muna Mohammed Al-Nayar
Journal: Engineering and Technology Journal مجلة الهندسة والتكنولوجيا ISSN: 16816900 24120758 Year: 2011 Volume: 29 Issue: 16 Pages: 3291-3301
Publisher: University of Technology الجامعة التكنولوجية

Loading...
Loading...
Abstract

Internet has opened new channel of communication enabling an e-mail to be sent to a relative thousands of kilometers away. This medium of communication opens doors for virtually free mass e-mailing, reaching out to hundreds of thousands users around the globe within seconds, so e-mail becomes the most popular form of communication today. E-mail systems have suffered from increasing attacking problem that threatens the validity and integrity of communication. Many differentapproaches for fighting this attack have been proposed, ranging from various sender authentication protocols to encrypt the message itself. This paper demonstrates a promising protocol. The proposed protocol ensures the authentication and integrity of the data and avoids the problem of key distribution or breaking by using multiplerandom keys generated automatically during communication session.


Article
Secure Watermark Image Steganography by Pixel Indicator Based on Randomization
اخفاء الصورة المائية من المؤشر بكسل استنادا إلى التوزيع العشوائي

Authors: M. Hamid Mohammed Farhan --- Zena Ahmed
Journal: JOURNAL OF MADENAT ALELEM COLLEGE مجلة كلية مدينة العلم الجامعة ISSN: 2073,2295 Year: 2012 Volume: 4 Issue: 2 Pages: 101-110
Publisher: City College of Science University كلية مدينة العلم الجامعة

Loading...
Loading...
Abstract

Steganography is the art of hiding the fact that communication is taking place, by hiding information in other information. In this paper have being investigated a method to RGB image steganography based on pixel indicator technique and triple-A algorithm. They uses the same principle of Least Significant Bit (LSB), where the secret is hidden in the least significant bits of the pixels, with more randomization in selection of the number of bits used and the color channels that are used. This randomization is expected to increase the security of the system and also increase the capacity of information. These techniques can be applied to RGB images where each pixel is represented by three bytes (24 bit) to indicate the intensity of red, green, and blue in that pixel. This work showed attractive results especially in the capacity of the data-bits to be hidden with relation to the RGB image pixels. The effective of the proposed stego system has been estimated by Mean Square Error (MSE), Peak Signal to Noise Ratio (PSNR). This paper also illustrates how security has been enhanced using this algorithm.

إخفاء المعلومات هو فن اخفاء حقيقي وان الاتصالات تجري عن طريق إخفاء المعلومات في غيرها من المعلومات. في هذا البحث لدينا وسيلة لتحقيق في إخفاء المعلومات صورة RGB على أساس تقنية مؤشر بكسل والثلاثي خوارزمية. انها تستخدم نفس مبدأ LSB، حيث يتم إخفاء سر في بت على الأقل أهمية من بكسل، مع مزيد من العشوائية في اختيار عدد البتات المستخدمة وقنوات الألوان التي يتم استخدامها. ومن المتوقع أن هذا التوزيع العشوائي لزيادة أمن النظام، وكذلك زيادة قدرته. ويمكن تطبيق هذه التقنيات لصور RGB حيث يتم تمثيل كل بكسل من ثلاثة بايت للدلالة على كثافة اللون الأحمر والأخضر والأزرق في تلك بكسل. وأظهرت نتائج هذا العمل جذابا خصوصا في قدرة بت البيانات إلى أن تكون مخفية مع يتعلق بكسل صورة RGB. وقد قدر من فعالية نظام stego المقترحة عن طريق مربع الخطأ (MSE)، وإشارة إلى الذروة نسبة الضوضاء (PSNR). هذا البحث كما يوضح كيف تم تعزيز الأمن باستخدام هذه الخوارزمية.

Listing 1 - 3 of 3
Sort by
Narrow your search

Resource type

article (3)


Language

English (2)

Arabic and English (1)


Year
From To Submit

2012 (2)

2011 (1)