Search Results/Filters    

Filters

Year

Banks




Expert Group











Full-Text


Issue Info: 
  • Year: 

    2021
  • Volume: 

    4
  • Issue: 

    2
  • Pages: 

    8-15
Measures: 
  • Citations: 

    0
  • Views: 

    43
  • Downloads: 

    36
Abstract: 

The Internet has become an important part of many people’, s daily activities. Therefore, numerous attacks threaten Internet users. IDS is a network intrusion detection tool used to quickly identify and categorize intrusions, attacks, or security issues in network-level and host-level infrastructure. Although much research has been done to improve IDS performance, many key issues remain. IDSs need to be able to more accurately detect different types of intrusions with fewer false alarms and other challenges. In this paper, we attempt to improve the performance of IDS using Whale Optimization Algorithm (WOA). The results are compared with other algorithms. NSL-KDD dataset is used to evaluate and compare the results. K-means clustering was chosen for pre-processing after a comparison between some of the existing classifier algorithms. The proposed method has proven to be a competitive method in terms of detection rate and false alarm rate base on a comparison with some of the other existing methods.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 43

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 36 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

SHAH K. | DAVE N. | CHAVON S.

Issue Info: 
  • Year: 

    2004
  • Volume: 

    1
  • Issue: 

    -
  • Pages: 

    70-74
Measures: 
  • Citations: 

    1
  • Views: 

    240
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 240

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2014
  • Volume: 

    6
  • Issue: 

    2
  • Pages: 

    155-167
Measures: 
  • Citations: 

    0
  • Views: 

    434
  • Downloads: 

    125
Abstract: 

Nowadays, information plays an important role in organizations. Sensitive information is often stored in Databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of intrusion detection systems in Databases are necessary. In this paper, we propose an intrusion detection system for detecting attacks in both Database transaction level and inter-transaction level (user task level). For this purpose, we propose a detection method at transaction level, which is based on describing the expected transactions within the Database applications. Then at inter-transaction level, we propose a detection method that is based on anomaly detection and uses data mining to find dependency and sequence rules. The main advantage of this system, in comparison with the previous Database intrusion detection systems, is that it can detect malicious behaviors in both transaction and inter-transaction levels.Also, it gains advantages of a hybrid method, including specification-based detection and anomaly detection, to minimize both false positive and false negative alarms. In order to evaluate the accuracy of the proposed system, some experiments have been done. The experiment results demonstrate that the true positive rate (recall metric) is higher than 80%, and the false positive rate is lower than 10% per different data sets and choosing appropriate ranges for support and confidence thresholds. The experimental evaluation results show high accuracy and effectiveness of the proposed system.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 434

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 125 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    1388
  • Volume: 

    1
Measures: 
  • Views: 

    941
  • Downloads: 

    0
Abstract: 

خطوط راه آهن شهری برای حرکت ایمن و سرویس بهینه، به سیستمهای کنترل و علائم پیشرفته نظیر اینترلاکینگ، حفاظت اتوماتیک، مدارهای راه، ماشین سوزن و غیره مجهز می شوند و در نتیجه از بروز تصادم و سرعت غیر مجاز جلوگیری می گردد. با این حال موانعی نیز وجود دارند که در سیستمهای کنترل و علائم مرسوم قابل تشخیص و حفاظت نیستند که نمونه آنها عبور افراد و یا جا گذاشتن وسایل تعمیر و نگهداری گروههای کاری و غیره در خط می باشند. طبیعی است که به علت ایجاد ریسک، تشخیص آنها و کنترل قطار از اهمیت بالایی برخوردار است. برای تشخیص این موانع و کاهش ریسک، نیازمند سیستمهای تشخیص دهنده دیگری هستیم که متفاوت از سیستم های علائم بکار رفته مرسوم است؛ ولیکن مساله انطباق و سازگاری با سیستهای موجود در آنها وجود دارد.بدین منظور، در این تحقیق سیستم های مختلف تشخیص موانع در خط معرفی می شوند.شرکت های مترو بسته به نیازها و انتظاراتی که از یک سیستم تشخیص موانع دارند، نوع طراحی خطوط مترو و نیز بودجه در اختیارشان می توانند هر یک از آن ها را به دلخواه انتخاب کنند. در این مقاله ابتدا به تحلیل و معرفی انواع روشهای تشخیص متناسب با خطوط متروی تهران پرداخته شده و سپس با در نظر گرفتن داده های خطوط متروی تهران و عملیات و سیستم های علائم موجودآن، توجیه استفاده از چنین سیستم هایی در خطوط راه آهن شهری تهران بررسی می شود.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 941

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0
Author(s): 

KANNADIGA P. | ZULKERNINE M.

Issue Info: 
  • Year: 

    2005
  • Volume: 

    -
  • Issue: 

    6
  • Pages: 

    238-245
Measures: 
  • Citations: 

    1
  • Views: 

    159
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 159

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2023
  • Volume: 

    20
  • Issue: 

    1
  • Pages: 

    159-170
Measures: 
  • Citations: 

    0
  • Views: 

    101
  • Downloads: 

    23
Abstract: 

Wireless Body Area Network (WBAN) is a pioneer trend in healthcare technology. Since any cyber-attack on a WBAN could jeopardize the patient's health, securing the WBAN plays a crucial role in healthcare applications. An intrusion detection system (IDS), as a second-line defense, is one of the security methods in computer networks. In this paper, a new IDS has been presented which is able to detect denial of service (DoS) attacks in a WBAN. In the proposed IDS, a genetic algorithm is used to select features of collected data, in a way that increases the performance of the IDS and as a result the WBAN. Then, using support vector machine and k nearest neighbor techniques, the data classification is performed to detect DoS traffic from regular data traffic. Simulation results indicate that the proposed IDS has effective performance with a 90% detection rate.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 101

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 23 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2010
  • Volume: 

    2
  • Issue: 

    2
  • Pages: 

    194-196
Measures: 
  • Citations: 

    1
  • Views: 

    73
  • Downloads: 

    0
Keywords: 
Abstract: 

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 73

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 1 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Author(s): 

JAFARPOUR Z. | RAD F. | PARVIN H.

Issue Info: 
  • Year: 

    2019
  • Volume: 

    6
  • Issue: 

    4 (24)
  • Pages: 

    143-152
Measures: 
  • Citations: 

    0
  • Views: 

    731
  • Downloads: 

    0
Abstract: 

intrusion detection is an important subject of research in the cyberspace field. In an intrusion detectionsystem (IDS), redundant and irrelevant features have a negative impact on the IDS performance. Therefore, an appropriate feature selection method is an important part of IDSs for eliminating unrelated and redundant features. In this paper, a new feature selection method is proposed that joins features level to level and step by step to select a subset of proper features in order to finally detect intrusion more accurately and speedily. The purpose of the proposed method is applying it in intrusion detection systems to distinguish a normal the connection from an intruding connection to the network. The experiments on the NSL-KDD dataset show that the proposed method in comparison with other methods selects only six important features among the 41 features in the baseline, and can detect an intrusion with precision above 99. 58% by relying only on these six features. In other words, the proposed method's failure has been 42 in 10, 000 connections of the network and has correctly identified other 9958 regular connections and labeled them as normal. Finally, improvement in the algorithm runtime and the percentage accuracy of the proposed method in comparison with other methods has been verified and reported.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 731

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
Issue Info: 
  • Year: 

    2017
  • Volume: 

    3
Measures: 
  • Views: 

    127
  • Downloads: 

    157
Abstract: 

WITH THE PROLIFERATION OF THE INTERNET AND INCREASED GLOBAL ACCESS TO ONLINE MEDIA, CYBERCRIME IS ALSO OCCURRING AT AN INCREASING RATE. CURRENTLY, BOTH PERSONAL USERS AND COMPANIES ARE VULNERABLE TO CYBERCRIME. A NUMBER OF TOOLS INCLUDING FIREWALLS AND intrusion detection systemS (IDS) CAN BE USED AS DEFENSE MECHANISMS. A FIREWALL ACTS AS A CHECKPOINT WHICH ALLOWS PACKETS TO PASS THROUGH ACCORDING TO PREDETERMINED CONDITIONS. IN EXTREME CASES, IT MAY EVEN DISCONNECT ALL NETWORK TRAFFIC. AN IDS, ON THE OTHER HAND, AUTOMATES THE MONITORING PROCESS IN COMPUTER NETWORKS. THE STREAMING NATURE OF DATA IN COMPUTER NETWORKS POSES A SIGNIFICANT CHALLENGE IN BUILDING IDS. IN THIS PAPER, A METHOD IS PROPOSED TO OVERCOME THIS PROBLEM BY PERFORMING ONLINE CLASSIFICATION ON DATASETS. IN DOING SO, AN INCREMENTAL NAIVE BAYESIAN CLASSIFIER IS EMPLOYED. FURTHERMORE, ACTIVE LEARNING ENABLES SOLVING THE PROBLEM USING A SMALL SET OF LABELED DATA POINTS WHICH ARE OFTEN VERY EXPENSIVE TO ACQUIRE. THE PROPOSED METHOD INCLUDES TWO GROUPS OF ACTIONS I.E. OFFLINE AND ONLINE. THE FORMER INVOLVES DATA PREPROCESSING WHILE THE LATTER INTRODUCES THE NADAL ONLINE METHOD. THE PROPOSED METHOD IS COMPARED TO THE INCREMENTAL NAIVE BAYESIAN CLASSIFIER USING THE NSL-KDD STANDARD DATASET. THERE ARE THREE ADVANTAGES WITH THE PROPOSED METHOD: (1) OVERCOMING THE STREAMING DATA CHALLENGE; (2) REDUCING THE HIGH COST ASSOCIATED WITH INSTANCE LABELING; AND (3) IMPROVED ACCURACY AND KAPPA COMPARED TO THE INCREMENTAL NAIVE BAYESIAN APPROACH. THUS, THE METHOD IS WELL-SUITED TO IDS APPLICATIONS.

Yearly Impact:   مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 127

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 157
Author(s): 

Dadashtabar Ahmadi K.

Issue Info: 
  • Year: 

    2022
  • Volume: 

    13
  • Issue: 

    1 (پیاپی 47)
  • Pages: 

    53-63
Measures: 
  • Citations: 

    0
  • Views: 

    132
  • Downloads: 

    34
Abstract: 

Today, the number of cyberattacks on computer networks, especially local area networks and the Internet, has increased dramatically, and these attacks have become much more complex. Many intrusion detection systems (IDS) and signatures are being designed and developed to detect these types of attacks. In recent years, with the introduction of blockchain, which is a secure distributed Database in decentralized networks, a dramatic change has occurred in computer networks. This technology can create consensus and trust between intrusion detection systems to increase the stability of the cooperating networks among IDS systems. Therefore, the combination of these two systems can have better performance than previous generations of IDS. Blockchain technology has many applications in the world of cryptography and network security due to features such as data integrity, availability, and decentralized management. Information security in this network is essential for the proper functioning of intrusion detection systems and firewalls. These features can be found in the Hyperledger Fabric network. Due to the use of asymmetric encryption and blockchain, this network transmits and records information securely and quickly in the network. In this project, using blockchain technology, we are trying to create a network of IDS nodes where each node can add its own rules to the blockchain Database. In this way, the other nodes of the chain use the rules of other nodes to improve their intrusion detection system efficiency after consensus and synchronization. Also, due to the decentralized nature of the blockchain, a central identity control is not required to approve/disapprove the nodes and rules added to the Database, and consensus mechanisms do this.

Yearly Impact: مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic Resources

View 132

مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesDownload 34 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesCitation 0 مرکز اطلاعات علمی Scientific Information Database (SID) - Trusted Source for Research and Academic ResourcesRefrence 0
litScript
telegram sharing button
whatsapp sharing button
linkedin sharing button
twitter sharing button
email sharing button
email sharing button
email sharing button
sharethis sharing button