240 research outputs found

    Intelligent zero-day intrusion detection framework for internet of things

    Get PDF
    Zero-day intrusion detection system faces serious challenges as hundreds of thousands of new instances of malware are being created every day to cause harm or damage to the computer system. Cyber-attacks are becoming more sophisticated, leading to challenges in intrusion detection. There are many Intrusion Detection Systems (IDSs), which are proposed to identify abnormal activities, but most of these IDSs produce a large number of false positives and low detection accuracy. Hence, a significant quantity of false positives could generate a high-level of alerts in a short period of time as the normal activities are classified as intrusion activities. This thesis proposes a novel framework of hybrid intrusion detection system that integrates the Signature Intrusion Detection System (SIDS) with the Anomaly Intrusion Detection System (AIDS) to detect zero-day attacks with high accuracy. SIDS has been used to identify previously known intrusions, and AIDS has been applied to detect unknown zero-day intrusions. The goal of this research is to combine the strengths of each technique toward the development of a hybrid framework for the efficient intrusion detection system. A number of performance measures including accuracy, F-measure and area under ROC curve have been used to evaluate the efficacy of our proposed models and to compare and contrast with existing approaches. Extensive simulation results conducted in this thesis show that the proposed framework is capable of yielding excellent detection performance when tested with a number of widely used benchmark datasets in the intrusion detection system domain. Experiments show that the proposed hybrid IDS provides higher detection rate and lower false-positive rate in detecting intrusions as compared to the SIDS and AIDS techniques individually.Doctor of Philosoph

    Re-habitation of Heritage Areas in As-Salt City and Its Effect on the Urban Identity Case Study: Oqba Bin Nafe' Project

    Get PDF
    The architectural heritage of the area represents a reversal identity and culture of the region and the link between past and present and the evidence is clear on the originality and authenticity, it must maintain this architectural heritage and rehabilitation to protect it and developed to suit the circumstances of the times and the ongoing transformation of civilization. This study aims to highlight the architectural and urban heritage in the city of Salt, and partly an attempt to document and detailed solutions to revive and re - private examples. This paper deals with the general definition of the terms of her problem and its importance and its objectives as well as the definition of the study area and also to identify assumptions study plan and methodology, while the theoretical framework of the study includes topics you talk about the architectural heritage and the other talking about preserving, and also deals with topics related to the central city of Salt in terms of their and evolution. And architectural elements and the factors which influenced and problems, and systematic study of references and books on these subjects are followed in this research. The study phase and analysis of the study area, a Salt downtown, especially the old ones the region, namely Uqba Among other things, it involves this stage detailed analysis of open spaces in the city center as well as an analytical study of these spaces currently, has been selected study area to the theme of revitalization of a number of historical reasons and civilization as well as a number of reasons for planning and architectural features and possibilities that the region has been followed the analytical descriptive approach in this steps to gain access to the results of applied research hypotheses. He graduated a number of study results based on all of the above, as well as develop a vision and general targets for maintaining operations and rehabilitation that must be applied to the old areas and develop strategies for the implementation and realization of this vision and these goals, and also graduated As well as a number of recommendations  to the concerned authorities with regard to the revival of the old areas in general, and the revival of Uqba in particular. Keywords: Re-habitation, Architectural Style & Construction, Random Sites, Visual Noise

    A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges

    Get PDF
    The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks. © 2021, The Author(s)

    Novel Design of Emergency Exit Slide for High Rises

    Get PDF
    As the number of high rises buildings increases rabidly these days, residents safety and emergency escape solutions became crucial issue. Several hundreds of persons died or critically injured, each month, due to fire or emergency escape problems during fire or other emergency accidents in high rises around the world. This work aims to find a solution to this problem by proposing a novel design of emergency exit slide for high rises in order to reduce the number of victims during such emergencies. An emergency escaping volute slide or spiraled chute inside a tunnel including extendable accordion pleated tubing made of asbestos fabric, supported with vacuum-deposited aluminized materials padded on its inner side. A ring to its upper end, which made its base attachable with the top of the building supported with Artificial Spider Silk launchers to hold the slide during emergencies. Attachable to small slides from the escape openings of a building, the lower end of the tubing having a soft pad with low angle allowing a person sliding down the main slide can step up to assembly points on ground level, outside the building. The proposed technique resulted in enhanced results in comparison with previous techniques

    Malware detection and prevention system based on multi-stage rules

    Full text link
    The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection System (SIDS) and Anomaly Intrusion Detection System (AIDS)

    Using response action with Intelligent Intrusion detection and prevention System against web application malware

    Full text link
    Findings: After evaluating the new system, a better result was generated in line with detection efficiency and the false alarm rate. This demonstrates the value of direct response action in an intrusion detection system

    Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine

    Get PDF
    Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single classifier for identifying intrusions. Single classifier IDSs are unable to achieve high accuracy and low false alarm rates due to polymorphic, metamorphic, and zero-day behaviors of malware. In this paper, a Hybrid IDS (HIDS) is proposed by combining the C5 decision tree classifier and One Class Support Vector Machine (OC-SVM). HIDS combines the strengths of SIDS) and Anomaly-based Intrusion Detection System (AIDS). The SIDS was developed based on the C5.0 Decision tree classifier and AIDS was developed based on the one-class Support Vector Machine (SVM). This framework aims to identify both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the benchmark datasets, namely, Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Australian Defence Force Academy (ADFA) datasets. Studies show that the performance of HIDS is enhanced, compared to SIDS and AIDS in terms of detection rate and low false-alarm rates. © 2020 by the authors. Licensee MDPI, Basel, Switzerland

    A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks

    Get PDF
    The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack to the end nodes. Due to the large number and diverse types of IoT devices, it is a challenging task to protect the IoT infrastructure using a traditional intrusion detection system. To protect IoT devices, a novel ensemble Hybrid Intrusion Detection System (HIDS) is proposed by combining a C5 classifier and One Class Support Vector Machine classifier. HIDS combines the advantages of Signature Intrusion Detection System (SIDS) and Anomaly-based Intrusion Detection System (AIDS). The aim of this framework is to detect both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the Bot-IoT dataset, which includes legitimate IoT network traffic and several types of attacks. Experiments show that the proposed hybrid IDS provide higher detection rate and lower false positive rate compared to the SIDS and AIDS techniques. © 2019 by the authors. Licensee MDPI, Basel, Switzerland

    Dinamikus homlokzatok = Qashmar, Dreen–Khraisat, Dema: Dynamic elevations

    Get PDF
    MASDAR INSTITUTE FOR SCIENCE AND TECHNOLOGY, ABU DHABI, U.A.E., PEARL RIVER TOWER, GUANGZHOU, CHINA; ARCHITECTS: FOSTER AND PARTNERS and S.O.M The concept often mentioned regarding multifunctional elevations is that of employing a technology that opti�mizes energy consumption. By examination of materials used, shading devices and ventilation methods a dynamic elevation can be developed that suits the climate needs of projects located in the U.A.E. Shading devices prove to be dominant in balancing solar gains in all the examples studied, when applied as a double skin method of construction. Likewise, the same concepts could be adjusted to suit alternative climatic requirements
    • …
    corecore