Box counting-based multifractal analysis of network to detect Domain Name Server attack

2019 ◽  
Vol 32 (7) ◽  
pp. e3916
Author(s):  
Velusamy Rajakumareswaran ◽  
Subramaniam Nithiyanandam
2021 ◽  
Vol 10 (1) ◽  
pp. 533-540
Author(s):  
Wijdan Jaber AL-kubaisy ◽  
Maha Mahmood

The heterogeneous texture classifications with the complexity of structures provide variety of possibilities in image processing, as an example of the multifractal analysis features. The task of texture analysis is a highly significant field of study in the field of machine vision. Most of the real-life surfaces exhibit textures and an efficiently modelled vision system must have the ability to deal with this variety of surfaces. A considerable number of surfaces maintain a self-similarity quality as well as statistical roughness at different scales. Fractals could provide a great deal of advantages; also, they are popular in the process of modelling these properties in the tasks related to the field of image processing. With two distinct methods, this paper presents classification of texture using random box counting and binarization methods calculate the estimation measures of the fractal dimension BCM. There methods are the banalization and random selecting boxes. The classification of the white blood cells is presented in this paper based on the texture if it is normal or abnormal with the use of a number of various methods.


Author(s):  
Moussa Ouedraogo ◽  
Haralambos Mouratidis ◽  
Eric Dubois ◽  
Djamel Khadraoui

Today’s IT systems are ubiquitous and take the form of small portable devices, to the convenience of the users. However, the reliance on this technology is increasing faster than the ability to deal with the simultaneously increasing threats to information security. This paper proposes metrics and a methodology for the evaluation of operational systems security assurance that take into account the measurement of security correctness of a safeguarding measure and the analysis of the security criticality of the context in which the system is operating (i.e., where is the system used and/or what for?). In that perspective, the paper also proposes a novel classification scheme for elucidating the security criticality level of an IT system. The advantage of this approach lies in the fact that the assurance level fluctuation based on the correctness of deployed security measures and the criticality of the context of use of the IT system or device, could provide guidance to users without security background on what activities they may or may not perform under certain circumstances. This work is illustrated with an application based on the case study of a Domain Name Server (DNS).


2014 ◽  
Vol 667 ◽  
pp. 143-148
Author(s):  
Ning Zhang ◽  
Le Jun Chi ◽  
Hai Yan Xu

The success rate of domain name resolution has a direct influence on the service of DNS. Analytical performance of DNS server is the key to measure the satisfaction degree of users when they access to the network. This article establishes the dependence model for the domain name server. In order to get DNS fault model and analytical model, this article uses Fault Tree Analysis theory to describe the relationship of tree basic events and target events of fault tree of dependency. On the basis of fault tree model, dependencies of domain names are qualitative analyzed, including number of sets and element composition of fault model and analytical model. This study provided a theoretical basis for DNS dependencies and technical support for the DNS vulnerability analysis. It has a great importance for domain name system security.


Sign in / Sign up

Export Citation Format

Share Document