1,910 research outputs found
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL)
techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to
the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science,
ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently
broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to
articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The
second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues.
The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics
of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s
utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is
discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high
accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
Karakteristik Penderita Demam Tifoid di RS. Ibnu Sina Kota Makassar Tahun 2016 - 2017
Latar Belakang: Demam Tifoid merupakan penyakit infeksi akut usus halus yang disebabkan oleh bakteri Salmonella typhi dan merupakan masalah utama kesehatan masyarakat Indonesia. Berdasarkan laporan World Health Organization (WHO) diperkirakan 11-20 juta orang di dunia terkena penyakit demam tifoid dan menyebabkan kematian sekitar 128.000 - 161.000 jiwa. Berdasarkan uraian di atas, maka penelitian ini dilakukan untuk melihat karakteristik penderita demam tifoid di rumah sakit Ibnu Sina kota makassar pada tahun 2016-2017.
Metode: Penelitian ini bersifat deskriptif dengan metode total sampling menggunakan data sekunder dari rekam medik. Pada penelitian ini didapatkan jumlah penderita demam tifoid tahun 2016–2017 sebanyak 233 orang.
Hasil: Kejadian demam tifoid tertinggi adalah tahun 2016 bulan April sebanyak 26 orang (14,8%) dengan kelompok usia terbanyak yaitu 21-30 sebanyak 80 orang (34,3%), jenis kelamin terbanyak perempuan sebanyak 124 orang (53,2%). Jenis pekerjaan penderita demam tifoid terbanyak yaitu kelompok mahasiswa sebanyak 62 orang (26,6%) dengan gejala subjektif demam sebanyak 233 orang (100%). Pada pemeriksaan lidah kotor positif sebanyak 80 orang (34,3%). Pemeriksaan penunjang diagnosis yaitu pemeriksaan darah rutin didapatkan yang mengalami anemia sebanyak 38 orang (12,5%).
Kesimpulan: Gejala subjektif tertinggi yaitu demam dengan pemeriksaan fisis yaitu lidah kotor. Pemeriksaan penunjang diagnosis terbanyak adalah pemeriksaaan darah rutin dan pemeriksaan laboratorium yang sering dilakukan adalah tes widal
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java
- …