scholarly journals An Efficient Alert Aggregation Method Based on Conditional Rough Entropy and Knowledge Granularity

Entropy ◽  
2020 ◽  
Vol 22 (3) ◽  
pp. 324
Author(s):  
Jiaxuan Sun ◽  
Lize Gu ◽  
Kaiyuan Chen

With the emergence of network security issues, various security devices that generate a large number of logs and alerts are widely used. This paper proposes an alert aggregation scheme that is based on conditional rough entropy and knowledge granularity to solve the problem of repetitive and redundant alert information in network security devices. Firstly, we use conditional rough entropy and knowledge granularity to determine the attribute weights. This method can determine the different important attributes and their weights for different types of attacks. We can calculate the similarity value of two alerts by weighting based on the results of attribute weighting. Subsequently, the sliding time window method is used to aggregate the alerts whose similarity value is larger than a threshold, which is set to reduce the redundant alerts. Finally, the proposed scheme is applied to the CIC-IDS 2018 dataset and the DARPA 98 dataset. The experimental results show that this method can effectively reduce the redundant alerts and improve the efficiency of data processing, thus providing accurate and concise data for the next stage of alert fusion and analysis.

Cyber Security is the protection of unauthorized access of the information. Different threat and issues are present in the network which stole unpredictable amount of data every year. For the information technology and computer systems, a cyber security rule is required to compel different group as well as businesses to secure their systems and information from cyber-attacks. In the healthcare sector huge amount of data can be theft every year which is dangerous for both government and personal view. The technical advancements have increased the risk’s potential in the network in Cloud and Cyber. Security & privacy cracks are the vital issues which need to mitigate to maintain the dignity of the network. This paper conducted a review to secure the network from network security issues. There are various attacks which are vulnerable to the network like DoS, DDoS and Spoofing. These attacks have been described to identify the attacker’s capability. In order to facilitate this, networks such as cloud, ad-hoc, cyber has been described to determine the security, a paradigm. A literature from past studies has been conducted to identify the threats and their behavior. Different types of attacks and their behavior is also studied, and a tabular structure is also presented for better understanding.


2020 ◽  
pp. 108705472096456
Author(s):  
Yue Yang ◽  
Gang Peng ◽  
Hongwu Zeng ◽  
Diangang Fang ◽  
Linlin Zhang ◽  
...  

Objective: The present study aimed to examine the effects of SNAP25 on the integration ability of intrinsic brain functions in children with ADHD, and whether the integration ability was associated with working memory (WM). Methods: A sliding time window method was used to calculate the spatial and temporal concordance among five rs-fMRI regional indices in 55 children with ADHD and 20 healthy controls. Results: The SNAP25 exhibited significant interaction effects with ADHD diagnosis on the voxel-wise concordance in the right posterior central gyrus, fusiform gyrus and lingual gyrus. Specifically, for children with ADHD, G-carriers showed increased voxel-wise concordance in comparison to TT homozygotes in the right precentral gyrus, superior frontal gyrus, postcentral gyrus, and middle frontal gyrus. The voxel-wise concordance was also found to be related to WM. Conclusion: Our findings provided a new insight into the neural mechanisms of the brain function of ADHD children.


2014 ◽  
Vol 971-973 ◽  
pp. 1684-1687
Author(s):  
Xiu Juan Sun

this article from the various security threats facing the computer network, systematically introduces the network security technology. And in view of the campus network security issues, firstly analyzes the hidden dangers to the safety of network system in colleges and universities, and then from the build two aspects of security defense system and strengthen the safety management design of the campus network security policy. This paper study, the first thing I learned the main threat to the network security problem, and use the knowledge of security network security problems are analyzed. Secondly, based on the research of the network technology, campus network will also be faced with the security threat. Finally, the idea of established with P2DR model to establish campus network security defense system. And it is concluded that the building of a set of effective network security defense system is the solution Campus network main threats and hidden trouble of necessary ways and measures.


2021 ◽  
Vol 14 (2) ◽  
pp. 268-277
Author(s):  
Etza nofarita

Security issues of a system are factors that need to be considered in the operation of information systems, which are intended to prevent threats to the system and detect and correct any damage to the system. Distributed Denial of Services (DDOS) is a form of attack carried out by someone, individuals or groups to damage data that can be attacked through a server or malware in the form of packages that damage the network system used. Security is a mandatory thing in a network to avoid damage to the data system or loss of data from bad people or heckers. Packages sent in the form of malware that attacks, causing bandwidth hit continuously. Network security is a factor that must be maintained and considered in an information system. Ddos forms are Ping of Death, flooding, Remote controled attack, UDP flood, and Smurf Attack. The goal is to use DDOS to protect or prevent system threats and improve damaged systems. Computer network security is very important in maintaining the security of data in the form of small data or large data used by the user.


Author(s):  
Ibraim Didmanidze ◽  
Zebur Beridze ◽  
Vladimir Zaslavski

In the people's lives wireless networks play a big role. It is necessary to understand the basic concept of wireless networks, to consider the security issues related to them, and then observe how they work and what benefits they can bring in different cases. In this regard the given research paper presents the fundamental principles of security as well as related open questions. It reviews the security issues of the wireless networks. Security of protocols of wireless network routing has become an urgent necessity to stimulate the network launching and expand the area of its usage. Therefore, the presented research paper proposes and defines different solutions and concepts for security.  


Author(s):  
Yongli Liu ◽  
Weifang Zhai ◽  
Song Ji

With the “Internet +” era of arrival, the major colleges and universities are in the construction of the wisdom of the campus, students and teachers living with the campus network is more and more closely related, Campus network security has become the protection of the wisdom of the campus construction. Campus network security issues become increasingly serious; a single security protection has been unable to meet the current security needs. This paper analyzes the major security threats facing the campus network, and presents the campus network security protection measures from the physical layer, network layer, system layer, application layer and management of five aspects, thus constructing the campus network's overall security defense system. The system has multiple security protection for Campus Network, thus improving the security of the campus network.


2020 ◽  
Vol 32 ◽  
pp. 03006
Author(s):  
D. Suneetha ◽  
D. Rathna Kishore ◽  
P. Narendra Babu

Data Compression in Cryptography is one of the interesting research topic. The compression process reduces the amount of transferring data as well as storage space which in turn effects the usage of bandwidth. Further, when a plain text is converted to cipher text, the length of the cipher text becomes large. This adds up to tremendous information storing. It is extremely important to address the storage capacity issue along with the security issues of exponentially developing information. This problem can be resolved by compressing the ciphertext based on a some compression algorithm. In this proposed work used the compression technique called palindrome compression technique. The compression ratio of the proposed method is better than the standard method for both colored and gray scaled images. An experimental result for the proposed methods is better than existing methods for different types of image.


2019 ◽  
Vol 9 (1) ◽  
Author(s):  
Liqi Yu ◽  
Jialin Sun ◽  
Xinjing Lv ◽  
Qi Feng ◽  
Huimei He ◽  
...  

AbstractPhotoacoustic imaging has the advantages of high contrast and deep imaging depth. However, with the increasing of imaging depth, the signal-to-noise ratio (SNR) of the detected signal decreases, due to the light scattering that seriously affects the recovery image quality. In this paper, we experimentally demonstrated that higher contrast photoacoustic imaging was achieved using photoacoustic wavefront shaping technology in the presence of light scattering and low SNR signals. The imaging contrast is improved from 1.51 to 5.30. More importantly, we propose a dynamic time window method for the photoacoustic signal extraction algorithm, named correlation detection of adaptive time window, which further improves the contrast of photoacoustic imaging to 9.57. Our method effectively improves the contrast of photoacoustic imaging through scattering media.


Sign in / Sign up

Export Citation Format

Share Document