Academia.edu no longer supports Internet Explorer.
To browse Academia.edu and the wider internet faster and more securely, please take a few seconds to upgrade your browser.
2012, International Journal of Computer Applications
…
4 pages
1 file
Today, security is a major concern. Cloud computing and Intrusion Detection and Prevention Systems are one such measure to mitigate these attacks. Different researchers have proposed different IDSs time to time some of these IDS's combine features of two or more IDSs which are called as Hybrid Intrusion Detection Systems. Most of the researchers combine the features of Signature based detection methodology and Anomaly based detection methodology. For a signature based IDS if an attacker attacks slowly and organized, the attack may go undetected through the IDS, as signatures include factors which are based on duration of the events and the actions of attacker do not match. Sometimes, for an unknown attack there is no signature updated or an attacker attack in the mean time when the database is updating. Thus, signature-based IDS fail to detect unknown attacks. Anomaly based IDS suffer from many false-positive readings. Thus there is a need to hybridize those IDS which can overcome the shortcomings of each other. In this paper we proposed a new approach to IDS (Intrusion Detection System) which is more efficient than the traditional IDS (Intrusion Detection System). The IDS is based on Honeypot Technology and Anomaly based Detection Methodology. We have designed Architecture for the IDS in a packet tracer and then implemented it in real time.
2022
Cloud Computing is now one of the industry buzz words. It lays its foundation on advancement of researches in distributed computing, grid computing, virtualization, and utility computing. The study focused on intrusion detection system built on a hybrid cloud environment, the issue of non-detection of attacks not interacting with the host and gives much false positives due to its ability detect only known attacks, which necessitated the need to have the intrusion patterns measured through filtering of selected network protocols on the server using Wireshark. The implementation of an IDS model that is network and host-based to inspect all incoming and outgoing network activities using Snort and OSSEC and evaluation of the performance of the IDS using alert logs which is the objectives of the study to improve the shortfall of the existing study. Rules were set on both the N-IDS and H-IDS to monitor connections and activities of the system. The research methodology follows the fundamental of waterfall process with the three components of measuring the pattern of intrusion, design and implementation of model and evaluation of the performance of the system through confusion matrix, the comparation between the metrics: accuracy, detection rate and false alarm rate. The optimal performance shows that accuracy, detection rate and false alarm rate with probability of 0.971, 0.941 and of 0.002, given that their coefficient are less than 1.0. This shows that main objective of study is met with best performance. The system is deemed to be effective with its ability to identify attacks and send a real-time alert with very low chance of reporting or logging false positives. The study recommended that the IDS system architecture could be design to serve as both Intrusion Detection System (IDS) and Intrusion Prevention System (IPS).
International Journal of Computer Applications, 2013
Nowadays, many public sectors lead their services to cloud to perform the various tasks. It is creates their computing process available more easily to users. However, it is also together brings new security attacks and challenges about safety and reliability. The propose system plan to deploy a Honeypot in the IDPS architecture to ensure improve performance, it is desire to increase the level of security in the Cloud computing environment and decrease the threats to Cloud environments through concentrating on the problem of how data are stored in the Cloud. The propose system is effective and efficient model term as the integrated Intrusion Detection and Prevention System (IDPS) and Honeypot that can be used to guard an organization. In this system also integrates two methods namely, Anomaly Detection (AD) and Signature Detection (SD) that can do in cooperation to detect various attacks and deny them through the ability of IPS. The goal of this paper is to detect internal attackers by Honeypot.
IFIP Advances in Information and Communication Technology, 2012
Cloud services delivered as utility computing over the Internet makes it an attractive target for cyber intruders. Protecting network accessible Cloud resources and services from ever increasing cyber threats is of great concern. Most of the Network based Intrusion Detection System (NIDS) being rule based and therefore only capable of identifying known attacks (through pattern matching). Traditional Anomaly Detection based IDS may generate more number of false positives. In this paper, we attempt to amalgamate IDS with Cloud computing. Introducing Honeypot in Cloud IDS design can greatly help in detecting potential attacks with reduced number of false positives. This research work provides an impetus to strengthen network security aspects related to Cloud computing to make it more trustworthy.
International Journal for Research in Applied Science and Engineering Technology, 2018
The Cloud computing environment provide low cost and on demand service to the user anytime and anywhere. But rapid development security challenges are numerous. User are sceptical and security of cloud based services to detect various attack pattern there are different deployment scenario and detection method of intrusion detection system a cloud administrator can adopt. The IDS technique have gone long away in detection of known and unknown attack cloud infrastructure as a service. This paper focus on signature based, anomaly based, IP based detection techniques. The result evaluate the performance measure of IDS and management of the alert generated due to malicious and non-malicious traffic at varying speed.
International Journal of Managment, IT and Engineering, 2013
Denial of Service (DoS) and Distributed DoS (DDoS) attacks are evolving continuously. These attacks make network resources unavailable for legitimate users which results in massive loss of data, resources and money. Combination of Intrusion detection System and Firewall is used by Business Organizations to detect and prevent Organizations’ network from these attacks. But this combination cannot prevent network from novel attacks as Signatures to detect them are not available. This paper presents a light-Weight mechanism to detect novel DoS/DDoS (Resource Consumption) attacks and automatic Signature generation process to represent them in real time. Experimental results are provided to support the proposed mechanism.
2020
Information security is a vital issue about data transmission in a cloud-computing environment, along with possessing potential challenges. Cloud services play a significant role in offering Information Technology (IT) services. However, security challenges will remain a serious threat to such services. The Intrusion Detection System (IDS) plays a central role in the protection of network security by detecting the occurrence of an attack. The rising incidences of the cyber-attacks have raised the demand for an efficient IDS security system. Detecting accuracy and stability are the two key indicators to evaluate the efficiency of IDS. In this paper, the authors presented an inclusive framework to explore the surveys that notify the researchers of the novel mechanisms and techniques being developed for IDS. Types of intrusions and relative effects that have been studied until now are presented in the paper. An examination was conducted to enlighten better perspectives to have availabl...
Small Axe: A Journal of Caribbean Criticism, 2024
What is the role of art amid climate disaster? This question has often been overshadowed by well-justified public attention to the state's (in)actions in the face of environmental catastrophes. 1 Recent discussions of twenty-first-century Caribbean disasters, however, recognize the exhaustion of the state's potential to address crises and instead look beyond it to artistic and collective action for innovative ways of confronting calamity. 2 In the aftermath of Hurricane Maria in 2017, for example, the Museo de las Américas in Old San Juan launched Catársis, an exhibition whose opening event featured art, music, dance, and spoken-word poetry that protested the government's weak response to the storm, mobilized art as a collective healing practice, and, more broadly, emphasized the interdependence between Puerto Ricans and their 1 Since the eighteenth century the responsibility for hurricane preparation and recovery in the Greater Caribbean has shifted from religious and philanthropic institutions to the government.
Annals of General Psychiatry, 2012
The topic of sexual obsessions as a psychiatric symptom has not been well investigated. The aim of this study was twofold: 1) to explore the presence of sexual obsessions in patients with mood disorders (n=156), panic disorder (n=54) and schizophrenia (n=79), with respect to non-psychiatric subjects (n=100); 2) to investigate the relationship between sexual obsessions and suicidal behaviors, taking into account socio-demographic variables ad mental disorders. Methods: 289 psychiatric patients with mood disorders, panic disorder or schizophrenia, were recruited at the Italian University departments of psychiatry along with 100 non-psychiatric subjects, who presented for a routine eye exam at the ophthalmology department of the same Universities. The assessments included: the Structured Clinical Interview for DSM-IV-TR, the Brief Psychiatric Rating Scale (BPRS), the Obsessive-Compulsive Spectrum Self-Report (OBS-SR), for sexual obsession, and the Mood Spectrum-Self Report lifetime version (MOODS-SR). Suicidality was assessed by means of 6 items of the MOODS-SR. Results: Sexual obsessions were more frequent in schizophrenia (54.4%), followed by mood disorders (35.9%). Among schizophrenia patients, males reported more sexual obsessions than females (P<0.01). Subjects who were more likely to report suicidal behaviors (suicidal ideation, plans and attempts) were female (adjusted OR=1.99), patients with mental disorders, specifically mood disorders (adjusted OR=11.5), schizophrenia (adjusted OR=3.7) or panic disorder (adjusted OR=2.9), and subjects who reported lifetime sexual obsessions (adjusted OR= 3.6). Sexual obsessions remained independently associated with all aspects of suicidal behaviors. Age, education, marital and employment status were not related to suicidal behaviors.
La línea consta de un número infinito de puntos; el plano, de un número infinito de líneas; el volumen, de un número infinito de planos; el hipervolumen, de un número infinito de volúmenes... No, decididamente no es éste, more geométrico, el mejor modo de iniciar mi relato. Afirmar que es verídico es ahora una convención de todo relato fantástico; el mío, sin embargo, es verídico.
The maintenance activity is as important as the production activity. In order to reduce production cost and increase production efficiency, Total Productive Maintenance (TPM) is employed. TPM has several key principles; 5S, selfmaintenance, continuous improvement, planned maintenance, education and training, quality maintenance, occupational safety and health, senior management support and participation of all departments. By implementing these principles, productivity can be improved by reducing downtime, improving quality, adhering to specified delivery times, improving working conditions, and increasing employee morale. This research focuses on the effective role of the TPM principles in achieving the objectives of the industrial companies, enhancing the cooperation and coordination between different departments of the company, especially the participation of all workers in the production and maintenance process, 6th October City has been selected for Gamal H.Shehata/et al/ Engineering Research Journal 160 (December 8102) M1-M25 M2 application and measurement. A program has been designed and implemented in the form of checklists to measure TPM performance within industrial plants. The aims of research are: first, to reduce the gap between production and maintenance which is usually found in the standard independent maintenance. Second, to put a clear plan for predictive maintenance and provide adequate training for the company staff to apply TPM principles. Improvement in the Mean and Standard Deviation of applying the TPM which are 6% and 5.29% respectively have been achieved by applying TPM program.
Archaeological and Anthropological Sciences, 2023
Journal of Cancer Policy, 2023
Advances in Intelligent Systems and Computing, 2018
Clinical Infectious Diseases, 2009
New England Journal of Medicine, 2010
Gerión. Revista de Historia Antigua, 1985
Behaviour, 2008
Süleyman Demirel Üniversitesi Fen Bilimleri Enstitüsü Dergisi, 2020
Journal of Advances in Medicine and Medical Research, 2018
International Journal of Infectious Diseases, 2008