445 research outputs found

    Evaluation of Intelligent Intrusion Detection Models

    Get PDF
    This paper discusses an evaluation methodology that can be used to assess the performance of intelligent techniques at detecting, as well as predicting, unauthorised activities in networks. The effectiveness and the performance of any developed intrusion detection model will be determined by means of evaluation and validation. The evaluation and the learning prediction performance for this task will be discussed, together with a description of validation procedures. The performance of developed detection models that incorporate intelligent elements can be evaluated using well known standard methods, such as matrix confusion, ROC curves and Lift charts. In this paper these methods, as well as other useful evaluation approaches, are discussed.Peer reviewe

    Joseph A. Johnston, MD: An Appreciation

    Get PDF
    EDITOR\u27S NOTE: Over the years many fine and distinguished physicians have helped make Henry Ford Hospital one of the leading medical institutions in Michigan and throughout the United States. With this issue we begin our tribute to those pioneers who have played an integral part in the history of Henry Ford Hospital. At the first meeting of the Henry Ford Hospital Joseph A. Johnston Pediatric Society, October 11. 1985. Dr Gordon Manson honored the late Dr Johnston. The following is Dr Manson\u27s personal presentation and tribute to his long-time friend and colleague, Johnny Johnston

    Bayesian Learning Networks Approach to Cybercrime Detection

    Get PDF
    The growing dependence of modern society on telecommunication and information networks has become inevitable. The increase in the number of interconnected networks to the Internet has led to an increase in security threats and cybercrimes such as Distributed Denial of Service (DDoS) attacks. Any Internet based attack typically is prefaced by a reconnaissance probe process, which might take just a few minutes, hours, days, or even months before the attack takes place. In order to detect distributed network attacks as early as possible, an under research and development probabilistic approach, which is known by Bayesian networks has been proposed. This paper shows how probabilistically Bayesian network detects communication network attacks, allowing for generalization of Network Intrusion Detection Systems (NIDSs). Learning Agents which deploy Bayesian network approach are considered to be a promising and useful tool in determining suspicious early events of Internet threats and consequently relating them to the following occurring activities.Peer reviewe

    Immunoglobulin Levels in Serum of Normal Infants and Pre-School Children as Determined by Immunochemical Analysis

    Get PDF
    Standards for determining serum immunoglobulin (Ig) levels in infants and preschool children are now possible as a result of data compiled and presented in this paper. These can be compared with adult standards used in this hospital and presented in earlier issues of the MEDICAL JOURNAL. The Hospital\u27s laboratory technique is compared with other methods for measuring IgM, IgA and IgG serum levels

    Integrating Security and Systems Engineering: Towards the Modelling of Secure Information Systems

    Get PDF
    Security is a crucial issue for information systems. Traditionally, security is considered after the definition of the system. However, this approach often leads to problems, which translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and systems engineering. This paper argues for the need to develop a methodology that considers security as an integral part of the whole system development process. The paper contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a case study; a health and social care information system

    Testing the Suitability and the Limitations of Agent Technology to Support Integrated Assessment of Health and Social Care Needs of Older People

    Get PDF
    This paper explores the potential and the limitations of agent technology to support delivery of integrated information systems for the health and social care sector. In doing so, it points out the similarities and the mutual characteristics (such as distribution of expertise) of integrated health and social care information systems and agent technology. On the other hand, it identifies an important limitation of agent technology in the development of health and social care systems, which is the lack of a complete and mature analysis and design methodology that will provide guidance in the analysis and design of complex computer-based systems for health and social care. The Single Assessment Process (SAP) [http://www.doh.gov.uk/scg/sap/], an integrated assessment of health and social care needs of older people is used as an example of an integrated health and social care information system throughout the paper

    When Security meets Software Engineering: A case of modelling secure information systems

    Get PDF
    Although security is a crucial issue for information systems, traditionally, it is considered after the definition of the system. This approach often leads to problems, which most of the times translate into security vulnerabilities. From the viewpoint of the traditional security paradigm, it should be possible to eliminate such problems through better integration of security and software engineering. This paper firstly argues for the need to develop a methodology that considers security as an integral part of the whole system development process, and secondly it contributes to the current state of the art by proposing an approach that considers security concerns as an integral part of the entire system development process and by relating this approach with existing work. The different stages of the approach are described with the aid of a real-life case study; a health and social care information system

    An Ontology for Modelling Security: The Tropos Approach

    Get PDF
    It has been argued that security concerns should inform all the stages of the development process of an agent-based system. However, this is not the case since current agent-oriented methodologies do not, usually, consider security concepts within their modelling ontology. In this paper we present extensions to the Tropos ontology to enable it to model security

    Using Security Attack Scenarios to Analyse Security During Information Systems Design

    Get PDF
    It has been widely argued in the literature that security concerns should be integrated with software engineering practices. However, only recently work has been initiated towards this direction. Most of this work, however, only considers how security can be analysed during the development lifecycles and not how the security of an information system can be tested during the analysis and design stages. In this paper we present results from the development of a technique, which is based on the use of scenarios, to test the reaction of an information system against potential security attacks
    • …
    corecore