Content based image retrieval (CBIR) is well-known in the field of image retrieval. It uses contents of an image from image processing and analysis to retrieve images that users were looking for from an image search. ...
详细信息
Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved importance, promoting act...
详细信息
ISBN:
(纸本)9788988678312
Currently Intrusion detection systems have grown to be an ordinary component of network security infrastructure. With mounting global network connectivity, the issue of intrusion has achieved importance, promoting active research on efficient Intrusion Detection systems (IDS). Artificial Immune system (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security. The unique features AIS encourage the researchers to employ this techniques in variety of applications and especially in intrusion detection systems. Proper IDS design is essential to improve the performance of the IDS. The centralized design of this IDS has disadvantage of central processing for massive processes for each packets passing trough network. In this paper we proposed a distributed multi-layerd framework to enhance the detection performance and efficiency of this IDS. In our design the genetic algorithm is used for enhancing the secondary immune response. The fundamental design of our proposed AIS based IDS consists of 2 main components: IDS central engine and detection sensors. Each of these components is composed of some agents which correlate with each other in order to detect the anomalies and intrusions. Our design goal is to decrease the detection time for each connection by distributing the detectors to each host.
Nowadays, we use cryptography keys to secure our communications. One of the common ways for securing data exchanging is via the use of symmetric keys to encipher transmitted data over network. Today's practices fo...
详细信息
In order to achieve secure access to color medical image, a symmetric color medical image encryption is proposed in this paper. The proposed algorithm is base on combination of scrambling and confusion processes. 2D l...
详细信息
ISBN:
(纸本)9788988678275
In order to achieve secure access to color medical image, a symmetric color medical image encryption is proposed in this paper. The proposed algorithm is base on combination of scrambling and confusion processes. 2D lower triangular map used for scrambling the addresses of image pixels, and the proposed propeller algorithm is used to confuse the gray values of image pixels. A number of security analyses conducted to evaluate the proposed algorithm including key space analysis, statistical analysis and lossless analysis. The experimental results indicate that the proposed algorithm robust against brute-force attack and statistical attack. Finally the proposed algorithm is lossless algorithm.
Website Personalization is one of strategic technique in delivering services in online applications. A part of process for building personalization applications is to collect particular information from the user which...
详细信息
The article briefly analyzes the vibration mechanism of the gear fault and kinds of typical signal characteristics of the gears, and introduces successive fuzzy reasoning into the fault diagnosis of the gears. For the...
详细信息
A large network delay is likely to obstruct human interaction in telecommunication systems such as telephony or video conferencing systems. In spite of the extensive investigations that have been carried out on networ...
详细信息
The Iris based identification systems have been noticed exceedingly, presently. In this process, the iris should be segmented from captured eye image. The low contrast between pupil and iris, usually, will harden the ...
详细信息
The Iris based identification systems have been noticed exceedingly, presently. In this process, the iris should be segmented from captured eye image. The low contrast between pupil and iris, usually, will harden the segmenting process and will decrease the accuracy of detecting boundary between them. In order to segment the iris more precise, we propose a new technique using a difference function and a factor matrix. We also modify the segmentation operator to detect the pupil and iris as ellipse instead of circle. Experiments show that the proposed technique can segment the iris region and pupil region precisely. Based on our result, 99.34% of eyes have been segmented accurately in 1.24s averagely.
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots)...
详细信息
Botnet is most widespread and occurs commonly in today's cyber attacks, resulting in serious threats to our network assets and organization's properties. Botnets are collections of compromised computers (Bots) which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. In this paper, we proposed a new general Botnet detection framework. Since Artificial Immune system (AIS) is a new bio-inspired model which is applied for solving various problems in the field of information security, we used this concept in our proposed framework to make it more efficient. Our framework is based on definition of Botnets. Botnet has been defined as a group of bots that perform similar communication and malicious activity patterns within the same Botnet. We utilized AIS to effectively detect malicious activities such as spam and port scanning in bot infected hosts.
暂无评论