Intrusion Detection System (IDS) which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional IDS relies on the extensive knowledge of ...
详细信息
Intrusion Detection System (IDS) which are increasingly a key part of system defense are used to identify abnormal activities in a computer system. In general, the traditional IDS relies on the extensive knowledge of security experts, in particular, on their familiarity with the computer system to be protected. To reduce this dependence, various data-mining and machine learning techniques have been used in the literature. The experiments and evaluations of the proposed intrusion detection system are performed with the NSL-KDD intrusion detection dataset. We will apply different learning algorithms on NSL-KDD data set, to recognize between normal and attack connections and compare their performing in different scenarios- discretization, features selections and algorithm method for classification- using a powerful statistical analysis: ANOVA. In this study, both the accuracy of the configuration of different system and methodologies used, and also the computational time and complexity of the methodologies are analyzed.
Semantic Web Services (SWSs) provide a semantic representation of web services that provides a well-defined semantics in order to make them computer-interpretable, use-apparent, and agent-ready. In the last years it i...
详细信息
Semantic Web Services (SWSs) provide a semantic representation of web services that provides a welldefined semantics in order to make them computerinterpretable, use-apparent, and agent-ready. In the last years it i...
详细信息
Semantic Web Services (SWSs) provide a semantic representation of web services that provides a welldefined semantics in order to make them computerinterpretable, use-apparent, and agent-ready. In the last years it is becoming more and more accepted the idea that current Semantic Web technologies are not appropriate to deal with imprecise and vague knowledge, inherent to several real world domains. This paper proposes a fuzzy logic-based framework that makes service description, discovery and selection more flexible, and that includes support for non-functional properties. In particular, we extend OWL-S services by including a fuzzy domain ontology, which improves the definition of functional properties, and a fuzzy Quality of Service ontology, which improves the definition of non-functional properties. We also show how to enhance the tasks of SWS selection and ranking by means of fuzzy reasoning.
Many new attacks targeting web applications have been showing up one after another. However, when implementing a new vulnerability detection technique, the existing vulnerability scanners impose a burdensome task of m...
详细信息
Many new attacks targeting web applications have been showing up one after another. However, when implementing a new vulnerability detection technique, the existing vulnerability scanners impose a burdensome task of modifying source code and installing many auxiliary functions. In this paper, we introduce the design of Amberate;a web vulnerability scanner that alleviates the burden of them and makes it easier to develop a new vulnerability detection technique.
Advanced parallel Multi-Objective Evolutionary Algorithms (MOEA) have been used in order to solve a wide array of problems, including the planning of greenhouse crops. This paper shows the application of MOEA using th...
详细信息
Electron tomography combines the acquisition of projection images through electronic microscope and techniques of tomographic reconstruction to allow structure determination of complex biological specimens. This kind ...
详细信息
This paper presents a semantic model which delivers personalized audio information. The personalization process is automated and decentralized. The metadata which support personalization are separated in two categorie...
详细信息
The two-dimensional bin-packing problem (2D-BPP) with rotations is an important optimization problem which has a large number of practical applications. It consists of the non-overlapping placement of a set of rectang...
详细信息
Multicast peer-to-peer overlays are being progressively adopted in commercial platforms in spite of some childhood problems. One of the major issues that need further development is key distribution and conditional ac...
详细信息
Physical Unclonable Functions (PUFs) based on Ring Oscillators (ROs) are a promising primitive for FPGA security. However, the quality of their implementation depends on several design parameters. In this paper, we sh...
详细信息
暂无评论