152 research outputs found

    Audit of lymph node biopsies in suspected cases of Lymphoproliferative Malignancies: Implications on tissue diagnosis and patient management

    Get PDF
    Aims: To carry out an audit ascertaining the importance of condition of lymph node specimen, submission of clinical history including site of biopsy and imrnunohistochemcial studies on conclusiveness of diagnosis made. Methodology: Computer records of the Aga Khan University Hospital, Histopathology Laboratory were used to analyze all cases of lymphoproliferative malignancies presented at the hospital from 1992 to 1998. Results: Out of a total of 466 cases studied, in 283 (61%) the lymph nodes were fragmented. The site of biopsy was mentioned in 361 (77.5%) cases with the cervical region forming the most common site (56.5%). A clinical history was submitted in 395 (85%) and a conclusive diagnosis was reached in 378 (81%) cases. Conclusion: This audit indicates a strong co-relation between the condition of lymph node biopsies received, clinical history of the patient submitted including site of biopsy, acvillary studies like IHC performed on the eventual outcome in the form of precise diagnosis and categorization of lymphoproliferative malignancie

    Bronchial Carcinoid Presenting as Multiple Lung Abscesses

    Get PDF
    Bronchial carcinoid tumours is a rare group of pulmonary malignant neoplasm that is derived from neuroendocrine system. Bronchial carcinoid usually present with hilar masses, atelactasis, bronchiectasis, or post-obstructive pneumonia. This case describes a very unusual presentation of bronchial carcinoid tumour with multiple lung abscesses involving the whole lung. This report is of an adult lady who presented with multiple lung abscesses involving her whole of the right lung. She was found to have an endo-bronchial lesion in her right main bronchus which eventually turned out to be carcinoid tumour. She responded to resection and antibiotic therapy

    MS-ADS: multistage spectrogram image-based anomaly detection system for IoT security.

    Get PDF
    The innovative computing idea of Internet-of-Things (IoT) architecture has gained tremendous popularity over the last decade, resulting in an exponential increase in the connected devices and the data processed in the IoT networks. Since IoT devices collect a massive amount of sensitive information exchanged over the traditional internet, security has become a prime concern due to the more frequent generation of network anomalies. A network-based anomaly detection system can provide the much-needed efficient security solution to the IoT network by detecting anomalies at the network entry points through constant traffic monitoring. Despite enormous efforts by researchers, these detection systems still suffer from lower detection accuracy in detecting anomalies and generate a high false alarm rate and false-negative rate in classifying network traffic. To this end, this paper proposes an efficient Multistage Spectrogram image-based network Anomaly Detection System (MS-ADS) using a deep convolution neural network that utilizes a short-time Fourier Transform to transform flow features into spectrogram images. The results demonstrate that the proposed method achieves high detection accuracy of 99.98% with a reduction in the false alarm rate to 0.006% in classifying network traffic. Also, the proposed scheme improves predicting the anomaly instances by 0.75% to 4.82%, comparing the benchmark methodologies to exhibit its efficiency for the IoT network. To minimize the computational and training cost for the model re-training phase, the proposed solution demonstrates that only 40500 network flows from the dataset suffice to achieve a detection accuracy of 99.5%

    TPAAD: two‐phase authentication system for denial of service attack detection and mitigation using machine learning in software‐defined network.

    Get PDF
    Software-defined networking (SDN) has received considerable attention and adoption owing to its inherent advantages, such as enhanced scalability, increased adaptability, and the ability to exercise centralized control. However, the control plane of the system is vulnerable to denial-of-service (DoS) attacks, which are a primary focus for attackers. These attacks have the potential to result in substantial delays and packet loss. In this study, we present a novel system called Two-Phase Authentication for Attack Detection that aims to enhance the security of SDN by mitigating DoS attacks. The methodology utilized in our study involves the implementation of packet filtration and machine learning classification techniques, which are subsequently followed by the targeted restriction of malevolent network traffic. Instead of completely deactivating the host, the emphasis lies on preventing harmful communication. Support vector machine and K-nearest neighbours algorithms were utilized for efficient detection on the CICDoS 2017 dataset. The deployed model was utilized within an environment designed for the identification of threats in SDN. Based on the observations of the banned queue, our system allows a host to reconnect when it is no longer contributing to malicious traffic. The experiments were run on a VMware Ubuntu, and an SDN environment was created using Mininet and the RYU controller. The results of the tests demonstrated enhanced performance in various aspects, including the reduction of false positives, the minimization of central processing unit utilization and control channel bandwidth consumption, the improvement of packet delivery ratio, and the decrease in the number of flow requests submitted to the controller. These results confirm that our Two-Phase Authentication for Attack Detection architecture identifies and mitigates SDN DoS attacks with low overhead

    A Spectrogram Image-Based Network Anomaly Detection System Using Deep Convolutional Neural Network

    Get PDF
    The dynamics of computer networks have changed rapidly over the past few years due to a tremendous increase in the volume of the connected devices and the corresponding applications. This growth in the network’s size and our dependence on it for all aspects of our life have therefore resulted in the generation of many attacks on the network by malicious parties that are either novel or the mutations of the older attacks. These attacks pose many challenges for network security personnel to protect the computer and network nodes and corresponding data from possible intrusions. A network intrusion detection system (NIDS) can act as one of the efficient security solutions by constantly monitoring the network traffic to secure the entry points of a network. Despite enormous efforts by researchers, NIDS still suffers from a high false alarm rate (FAR) in detecting novel attacks. In this paper, we propose a novel NIDS framework based on a deep convolution neural network that utilizes network spectrogram images generated using the short-time Fourier transform. To test the efficiency of our proposed solution, we evaluated it using the CIC-IDS2017 dataset. The experimental results have shown about 2.5% - 4% improvement in accurately detecting intrusions compared to other deep learning (DL) algorithms while at the same time reducing the FAR by 4.3%-6.7% considering binary classification scenario. We also observed its efficiency for a 7-class classification scenario by achieving almost 98.75% accuracy with 0.56% - 3.72% improvement compared to other DL methodologies

    Blockchain-based secure authentication with improved performance for fog computing

    Get PDF
    Advancement in the Internet of Things (IoT) and cloud computing has escalated the number of connected edge devices in a smart city environment. Having billions more devices has contributed to security concerns, and an attack-proof authentication mechanism is the need of the hour to sustain the IoT environment. Securing all devices could be a huge task and require lots of computational power, and can be a bottleneck for devices with fewer computational resources. To improve the authentication mechanism, many researchers have proposed decentralized applications such as blockchain technology for securing fog and IoT environments. Ethereum is considered a popular blockchain platform and is used by researchers to implement the authentication mechanism due to its programable smart contract. In this research, we proposed a secure authentication mechanism with improved performance. Neo blockchain is a platform that has properties that can provide improved security and faster execution. The research utilizes the intrinsic properties of Neo blockchain to develop a secure authentication mechanism. The proposed authentication mechanism is compared with the existing algorithms and shows that the proposed mechanism is 20 to 90 per cent faster in execution time and has over 30 to 70 per cent decrease in registration and authentication when compared to existing methods
    corecore