Yazar "Alsaadi, Husam Ibrahiem Husain" seçeneğine göre listele
Listeleniyor 1 - 3 / 3
Sayfa Başına Sonuç
Sıralama seçenekleri
Öğe An adapting soft computing model for intrusion detection system(Wiley, 2021) Alsaadi, Husam Ibrahiem Husain; ALmuttari, Rafah M.; Uçan, Osman Nuri; Bayat, OğuzNetwork security in smart cities has become a key problem in the rapid development of computer networks over the past few years. Intrusion detection systems play a fundamental part in the integrity, confidentiality, and resource accessibility among the multiple network security policies. The classification of the genuineness of packets is main object of the presents research work, the soft computing has applied to classify the genuineness of packets. The complexity of soft computing is greatly reduced if the numbers of features in a dataset are reduced. Managing and analysis of the dimensionality reduction is novelty of the proposed model. The existence of uncertainty and the imprecise nature of the intrusions appear to create suitable fuzzy logic systems for such structures. The neural-fuzzy algorithm is one of the effective methods that incorporate fuzzy logic systems into adaptive and analysis capacities. In this research work, soft computing fuzzy logic system is proposed to enhance network security through intrusion detection. Three network datasets are demonstrated to test and estimate the proposed system. Feature selection has used to remove irrelevant features from entire network data which are obstacle classification processes. The Information Gain method was applied to select importance features for detection intrusion. Adaptive Neuro-Fuzzy Inference System (ANFIS) is further used to process the significant features of the classification network data as normal or attacks packets. Two functions named Jang's Neuro-fuzzy and faster-scaled conjugate gradient (SCG) based on the ANFIS system. Obviously, the experimental results demonstrate the proposed system has attained higher precision in detecting normal or attack. The experimental results have suggested that the proposed system results are better in accuracy and time process for classification compared with the existing models. The Overall Results show that the proposed system can be able to detect various intrusions efficiently and effectively.Öğe Conceal existence of encoded data system (CEEDS)(Ieee, 2019) Al-Anni, Maad Kamal; Alsaadi, Husam Ibrahiem Husain; Almuttairi, Rafah M.; Bayat, Oğuz; Uçan, Osman NuriThe awareness of importance of secure sensitive Data, make growing need for the technology to store or transmission data over the network with complete confidentiality. Steganography can be used as a means of transmitting sensitive data, but the use of the simple and general domain of information hiding techniques can lead to discover that something has been hidden quite easily where the interceptor expects a hidden message inside a file. Reliability methods have been consistently improved. The power of concealment comes when the encrypted data is hidden in a file that interceptor cannot predict. To conceal the terrible existence of the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data is hidden in a file that interceptor cannot predict. To hide the encoded data, Zigzag Hybrid Embedded algorithm is used in the proposed system. DES and LSB methods used to encrypt data and then embedded it in the Excel sheet, implying to have a color pallet which allow us to scattering the encrypted data upon Cover Excel File (CEF) with a slightly changes in Background Color Schema. The change is so clear that the brute force, that isn't specifically trying to find which is improbable to notice the change, has no chance to guess any changes by visual look.Öğe Un-imperceptible image steganography approach (U-IISA) in excel sheet(University of Bahrain, 2020) Al-Anni, Maad Kamal; Almuttairi, Rafah M.; Alsaadi, Husam Ibrahiem Husainobliquely, the obfuscation becomes the vital mannerism for preserving the surreptitious data, so far it is necessary to pay more attention to the art of hiding important images for the purpose of sending crucial decisions through the public media. It is usually happened to hide important data in the image file to keep them away from being hacked illegally. The current work, a unique and efficient method for hiding images in the MS Excel file is proposed, where data can be transferred with speed and security with slight changes in the file size or any doubts from whom previously read its specifications or even the naked eye could not recognize the variation, could be un-imperceptible for interceptors. The proposed method is to hide the colour or gray image with varied sizes impeded in the Excel file in order to be transferred from the sender to the recipient without any change in its resolution. It also involves transferring the colored image with its resolution details if the recipient is interested in such details, or it could be transferred as a gray image if the color is not a required datum. In both cases, the color does not affect the safety instead of the involving speed through the process of sending and the speed of image recovery by the recipient where the size of the data decreased, the main strength of Propose System is the method does not affect the file used for hiding along with the mannerism of handling the information header with its technique is unique so far being involved in literature survey. Wheras there is no difference in the technology of embedding, but a difference in the method of embedding, we do not use traditional approach or sequential approach to embed the data, we use zigzag approach, and likewise, the coding method is unconventional, it is new approach as we mentioned in the manuscript. © 2020 University of Bahrain. All rights reserved.