2,179 research outputs found
Review of intrusion detection systems based on deep learning techniques: coherent taxonomy, challenges, motivations, recommendations, substantial analysis and future directions
This study reviews and analyses the research landscape for intrusion detection systems (IDSs) based on deep learning (DL)
techniques into a coherent taxonomy and identifies the gap in this pivotal research area. The focus is on articles related to
the keywords ‘deep learning’, ‘intrusion’ and ‘attack’ and their variations in four major databases, namely Web of Science,
ScienceDirect, Scopus and the Institute of Electrical and Electronics Engineers’ Xplore. These databases are sufficiently
broad to cover the technical literature. The dataset comprises 68 articles. The largest proportion (72.06%; 49/68) relates to
articles that develop an approach for evaluating or identifying intrusion detection techniques using the DL approach. The
second largest proportion (22.06%; 15/68) relates to studying/applying articles to the DL area, IDSs or other related issues.
The third largest proportion (5.88%; 4/68) discusses frameworks/models for running or adopting IDSs. The basic characteristics
of this emerging field are identified from the aspects of motivations, open challenges that impede the technology’s
utility, authors’ recommendations and substantial analysis. Then, a result analysis mapping for new directions is
discussed. Three phases are designed to meet the demands of detecting distributed denial-of-service attacks with a high
accuracy rate. This study provides an extensive resource background for researchers who are interested in IDSs based on DL
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques
The hurried development of multimedia and internet allows for wide
distribution of digital media data. It becomes much easier to edit, modify and
duplicate digital information. In additional, digital document is also easy to
copy and distribute, therefore it may face many threats. It became necessary to
find an appropriate protection due to the significance, accuracy and
sensitivity of the information. Furthermore, there is no formal method to be
followed to discover a hidden data. In this paper, a new information hiding
framework is presented.The proposed framework aim is implementation of
framework computation between advance encryption standard (AES) and distortion
technique (DT) which embeds information in image page within executable file
(EXE file) to find a secure solution to cover file without change the size of
cover file. The framework includes two main functions; first is the hiding of
the information in the image page of EXE file, through the execution of four
process (specify the cover file, specify the information file, encryption of
the information, and hiding the information) and the second function is the
extraction of the hiding information through three process (specify the stego
file, extract the information, and decryption of the information).Comment: 6 Pages IEEE Format, International Journal of Computer Science and
Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.42
Novel approach for secure cover file of hidden data in the unused area within EXE file using computation between cryptography and steganography
The strength of the information hiding science is due to the non-existence of standard algorithms to be used in hiding secret messages. Also there is randomness in hiding methods such as combining several media (covers) with different methods to pass a secret message. In addition, there are no formal methods to be followed to discover the hidden data. For this reason, the task of this paper becomes difficult. In this paper a new method is implementing to hide a file of unused area 2 within .EXE file and to detect the hidden file. The aim of this paper is implementation of system computation between Cryptography and Steganography which embeds information in unused area 2 within EXE files to find a secure solution to cover file without change the size of cover file. The system includes two main functions; first is the hiding of the information in unused area 2 of PE-file (.EXE file), through the execution of four process (specify the cover file, specify the information file, encryption of the information, and hiding the information) and the second function is the extraction of the hiding information through three process (specify the steno file, extract the information, and decryption of the information) and The proposed system is implemented by using java
Pengembangan Tugas Membaca Untuk Membangun Karakter Di Sekolah Menengah Atas
: The nurturing of values or character at schools, particularly at the senior high schools has not been optimally realized. Therefore, it must be integrated in all the school subjects. English as one of the school subjects must also develop and integrate character in its teaching and learning process. The character can be integrated in the curriculum through its syllabus, lesson plans, approach to or method of teaching and learning, evaluation and tasks which include goal, input or the teaching and learning materials, teaching and learning activities, setting, the roles of the teacher, and the roles of the students. Character must be reflected through the components of tasks in the reading skill
- …