76 research outputs found

    Antara teknologi dan maqasid syariah

    Get PDF
    PERKEMBANGAN teknologi terlalu pantas. Teknologi berubah dan mencabar kebanyakan status quo. Tempoh kepantasan perubahannya juga semakin pendek. Sejarah revolusi industri abad ke-17, 18 dan 19 mengambil lebih 100 tahun. Teknologi transistor mengambil puluhan tahun, namun Internet telah mengubah pelbagai aspek kehidupan dalam masa kurang 10 tahun!. Revolusi industri keempat bakal menggandingkan lebih banyak teknologi dan pastinya akan mengubah pelbagai status quo dalam jangka masa lebih pendek, dianggarkan kurang daripada lima tahun. Teknologi, khususnya komunikasi dan maklumat (ICT), secara dasarnya adalah bebas nilai (value-free). Internet boleh digunakan untuk menyebarkan dakwah, tetapi pada masa sama ia juga digunakan untuk memfitnah dan mengadu-domba. Semuanya bergantung kepada niat dan tujuan masing-masing

    Alert correlation framework using a novel clustering approach

    Get PDF
    Currently, the primary and pressing issue in IDS implementation is the enormous number of alerts generated by the IDS sensors. Moreover, due to this obtrusive predicament, two other problems have emerged, first is the difficulty in processing the alerts accurately and second is the reduction in performance rate in terms of time and memory capacity while processing these alerts. The purpose of this research is to construct a holistic solution that is able to firstly reduce the number of alerts to be processed and at the same time produce a high quality attack scenarios that are meaningful to the administrators in a timely manner. To achieve these goals, alerts generated by IDS sensors need to be correlated and organized in an appropriate approach. Thus the significant contribution of this research is to create an integrated operational framework for alert processing that reduces the amount of alerts to be processed and creates more meaningful attack scenarios to be analyzed. We are presenting the results obtained from the clustering algorithm and discuss its significant contribution to practitioners in an actual working environment

    Distributed intrusion detection trust management through integrity and expertise evaluation

    Get PDF
    Information sharing and collaboration has facilitated decision accuracy and reaction time in many applications. Distributed Intrusion Detection Systems (DIDS) solutions are one of such applications that have dramatically been transformed. This is mainly due to increasing number of attacks as well as sophisticated nature of today's intrusions. Moreover, it has been shown that various critical components of a system can be targeted. This is further exasperated by the fact that most DIDS models do not consider attacks that targets the collaborative network itself. We specifically find this issue to be very critical and hence in this paper we propose a trust aware DIDS simulation model that is capable of categorizing each participating IDS expertise (i.e. speciality and competence), therefore helps collaborating organizations to consult our simulation model for choosing the right candidate for any type of intrusion. We call our proposed DIDS model Consultative Trusted Computing-based Collaborative IDS (CTC IDS). We utilize the Trusted Platform Module (TPM) for integrity evaluation and to fine-tune peer evaluation

    CloudIDS: Cloud Intrusion Detection Model Inspired by Dendritic Cell Mechanism

    Get PDF
    Cloud Computing Security is a new era of computer technology and opens a new research area and creates a lot of opportunity of exploration. One of the new implementation in Cloud is Intrusion Detection System (IDS).There are problems with existing IDS approach in Cloud environment. Implementing traditional IDS need a lot of self-maintenance and did not scale with the customer security requirements. In addition, maintenance of traditional IDS in Cloud Computing system requires expertise and consumes more time where not each Cloud user has. A decentralized traditional IDS approach where being deployed in current Cloud Computing infrastructure will make the IDS management become complicated. Each user's IDS will not be the same in term of type and configurations and each user may have outdated signatures. Inter VM's communication also become a big concern when we implementing Cloud Computing system where communication between Clouds are not monitored and controlled by the traditional IDS. A specific IDS model for Cloud computing is required to solve these problems. In this paper, we develop a prototype of Cloud IDS inspired by Dendritic Cell mechanism. Experiment result proved that Cloud IDS was able to detect any attempt to attack the Cloud environment. The experiments show that the Cloud IDS model based on Dendritic Cell algorithm able to identify and detect novel threat that targeting Cloud environment

    Processus de transfert et environnement culturel

    Get PDF
    Face au risque que représentent une monopolisation du savoir par les pays les plus riches et une pénétration standardisée de leurs outils de haute technologie dans des sociétés qui en sont particulièrement friandes, le réseau interactif de formation, développé par l’université Thomson-CSF dans des pays d’Asie du Sud-Est, fait figure de contrepoint en termes de formation autonome.In view of the risk of a monopoly on knowledge by the richest countries and a standardised penetration of their high tech tools in societies which are very keen to acquire them, the « interactive training network » that Thomson-CSF developed in South East Asia is an original experiment in the field of self study.Frente al riesgo que representa un monopolio del saber por los países más ricos y una penetración estandardizada de sus instrumentos de alta tecnología en sociedades que los aprecian particularmente, la « red interactiva de formación » desarrollada por la universidad Thomson-CSF en los países del sudeste de Asia, es una experiencia original en términos de formación autónoma

    A prototype for network intrusion detection system using danger theory

    Get PDF
    Network Intrusion Detection System (NIDS) is considered as one of the last defense mechanisms for any organization. NIDS can be broadly classified into two approaches: misuse-based detection and anomaly-based detection. Misuse-based intrusion detection builds a database of the well-defined patterns of the attacks that exploit weaknesses in systems and network protocols, and uses that database to identify the intrusions. Although this approach can detect all the attacks included in the database, it leads to false negative errors where any new attack not included in that database can’t be detected. The other approach is the anomaly-based NIDS which is developed to emulate the Human Immune System (HIS) and overcome the limitation of the misuse-based approach. The anomaly-based detection approach is based on Negative Selection (NS) mechanism. NS is based on building a database of the normal self patterns, and identifying any pattern not included in that database as a non-self pattern and hence the intrusion is detected. Unfortunately, NS concept has also its drawbacks. Although any attack pattern can be detected as a non-self pattern and this leads to low false negative rate, non-self patterns would not necessarily indicate the existence of intrusions. So, NS has a high false positive error rate caused from that assumption. Danger Theory (DT) is a new concept in HIS, which shows that the response mechanism in HIS is more complicated and beyond the simple NS concept. So, is it possible to utilize the DT to minimize the high false positive detection rate of NIDS? This paper answers this question by developing a prototype for NIDS based on DT and evaluating that prototype using DARPA99 Intrusion Detection dataset

    A new privacy-preserving protocol for academic certificates on hyperledger fabric

    Get PDF
    Academic certificates are integral to an individual's education and career prospects, yet conventional paper-based certificates pose challenges with their transport and vulnerability to forgery. In response to this predicament, institutions have taken measures to release e-certificates, though ensuring authenticity remains a pressing concern. Blockchain technology, recognised for its attributes of security, transparency, and decentralisation, presents a resolution to this problem and has garnered attention from various sectors. While blockchain-based academic certificate management systems have been proposed, current systems exhibit some security and privacy limitations. To address these issues, this research proposes a new Decentralised Control Verification Privacy-Centered (DCVPC) protocol based on Hyperledger Fabric blockchain for preserving the privacy of academic certificates. The proposed protocol aims to protect academic certificates' privacy by granting complete authority over all network nodes, creating channels for universities to have their private environment, and limiting access to the ledger. The protocol is highly secure, resistant to attacks, and allows improved interoperability and automation of the certificate verification process. A proof-of-concept was developed to demonstrate the protocol's functionality and performance. The proposed protocol presents a promising solution for enhancing security, transparency, and privacy of academic certificates. It guarantees that the certificate's rightful owner is correctly identified, and the issuer is widely recognised. This research makes a valuable contribution to the area of blockchain-based academic certificate management systems by introducing a new protocol that addresses the present security and privacy limitations

    Proposed architecture for intrusion detection system for software as a service in cloud computing environment

    Get PDF
    The purpose of this paper is to propose an architecture for intrusion detection based on Software as a Service (SaaS) called Software as a Service Intrusion Detection Services (SaaSIDS) in a cloud environment. Therefore, this research focusing on developing Software As A Service IDS (SaaSIDS) where the traffic at different points of the network is sniffed and the interested packets would be transferred to the SaaSIDS for further inspection. The main engine of SaaSIDS is the hybrid analysis engine where the signature based engine and anomaly based engine which using artificial immune system will work in parallel. The SaaSIDS is able to identify malicious activity and would generate appropriate alerts and notification accordingly
    corecore