4 research outputs found

    Embedded Devices Security Based on ICMetric Technology

    Get PDF
    An intelligent wheelchair application is required which is equipped with the MEMSs which are magnetometer, gyroscope, and accelerometer sensors. The generated process of ICMetrics number is heavily based on magnetometer, gyroscope, and accelerometer sensors. In addition, this number can be utilised to provide the identification of device. Our proposed system passed through three phases. The first phase is bias reading that was extracted from MEMSs (gyroscope, magnetometer, and accelerometers) sensors; whereas, in the second phase, ICMetric number is generated by using the sensor bias readings that was extracted in the first phase. Therefore, this number is non-stored and can be utilised to provide identification of device. In the third phase, the security system is tested/evaluated to measure its effectivity. In other words, it is tested with dataset that was extracted from the trace file of ns-2. In this phase, performance metrics are calculated, which are rate of error, confused metrics, and accuracy

    A Comparative Study for SDN Security Based on Machine Learning

    No full text
    In the past decade, traditional networks have been utilized to transfer data between more than one node. The primary problem related to formal networks is their stable essence, which makes them incapable of meeting the requirements of nodes recently inserted into the network. Thus, formal networks are substituted by a Software Defined Network (SDN). The latter can be utilized to construct a structure for intensive data applications like big data. In this paper, a comparative investigation of Deep Neural Network (DNN) and Machine Learning (ML) techniques that uses various feature selection techniques is undertaken. The ML techniques employed in this approach are decision tree (DT), Naïve Bayes (NB), Support Vector Machine (SVM). The proposed approach is tested experimentally and evaluated using an available NSL–KDD dataset. This dataset includes 41 features and 148,517 samples. To evaluate the techniques, several estimation measurements are calculated. The results prove that DT is the most accurate and effective approach. Furthermore, the evaluation measurements indicate the efficacy of the presented approach compared to earlier studies

    Cloud Intrusion Detection System Based on SVM

    No full text
    The demand for better intrusion detection and prevention solutions has elevated due to the current global uptick in hacking and computer network attacks. The Intrusion Detection System (IDS) is essential for spotting network attacks and anomalies, which have increased in size and scope. A detection system has become an effective security method that monitors and investigates security in cloud computing. However, several existing methods have faced issues such as low classification accuracy, high false positive rates, and low true positive rates. To solve these problems, a detection system based on Support Vector Machine (SVM) is proposed in this paper. In this method, the SVM classifier is utilized for network data classification into normal and abnormal behaviors. The Cloud Intrusion Detection Dataset is used to test the effectiveness of the suggested system. The experimental results show which the suggested system can detect abnormal behaviors with high accuracy

    Intelligent Mobile Coronavirus Recognition Centre Based on IEEE 802.15.4

    No full text
    The novel coronavirus (COVID-19) has become widespread around the world. It started in Wuhan, China, and has since spread rapidly among people living in other countries. Hence, the World Health Organization has considered COVID-19 as a pandemic that threatens millions of people’s lives. Due to the high number of infected people, many hospitals have been facing critical issues in providing the required medical services. For instance, some clinical centers have been unable to provide one of the most important medical services, namely blood tests to determine whether an individual is infected with COVID-19. Therefore, it is important to present an alternative diagnosis option to prevent the further spread of COVID-19. In this paper, a proposed intelligent detection communication system (IDCS) is configured for distributed mobile clinical centers to control the pandemic. In addition, the intelligent system is integrated with the Zigbee communication protocol to build a mobile COVID-19 detection system. The proposed system was trained on X-ray COVID-19 lung images used to identify infected people. The Zigbee protocol and decision tree algorithm were used to design the IDCS. The results of the proposed system show high accuracy 94.69% and accept results according to the performance measurements
    corecore