Preferred Language
Articles
/
joe-2119
Enhancement of the Detection of the TCP SYN Flooding (DDoS) Attack
...Show More Authors

The major of DDoS attacks use TCP protocol and the TCP SYN flooding attack is the most common one among them. The SYN Cookie mechanism is used to defend against the TCP SYN flooding attack. It is an effective defense, but it has a disadvantage of high calculations and it doesn’t differentiate spoofed packets from legitimate packets. Therefore, filtering the spoofed packet can effectively enhance the SYN Cookie activity. Hop Count Filtering (HCF) is another mechanism used at the server side to filter spoofed packets. This mechanism has a drawback of being not a perfect and final solution in defending against the TCP SYN flooding attack. An enhanced mechanism of Integrating and combining the SYN Cookie with Hop Count Filtering (HCF) mechanism is proposed to protect the server from TCP SYN flooding. The results show that the defense against SYN flood DDoS attack is enhanced, since the availability of legitimate packets is increased and the time of SYN Cookie activity is delayed.

Crossref
View Publication Preview PDF
Quick Preview PDF
Publication Date
Mon Jun 19 2023
Journal Name
Journal Of Engineering
Compound Heat Transfer Enhancement in Dimpled and Sinusoidal Metal Solar Wall Ducts Fitted with Wired Inserts
...Show More Authors

An improved Metal Solar Wall (MSW) with integrated thermal energy storage is presented in this research. The proposed MSW makes use of two, combined, enhanced heat transfer methods. One of the methods is characterized by filling the tested ducts with a commercially available copper Wired Inserts (WI), while the other one uses dimpled or sinusoidal shaped duct walls instead of plane walls. Ducts having square or semi-circular cross sectional areas are tested in this work.
A developed numerical model for simulating the transported thermal energy in MSW is solved by finite difference method. The model is described by system of three governing energy equations. An experimental test rig has been built and six new duct configurations have b

... Show More
View Publication Preview PDF
Crossref
Publication Date
Mon May 01 2017
Journal Name
Energy
Solidification enhancement in a triplex-tube latent heat energy storage system using nanoparticles-metal foam combination
...Show More Authors

View Publication
Scopus (174)
Crossref (170)
Scopus Clarivate Crossref
Publication Date
Sat Oct 09 2021
Journal Name
Nanomaterials
Investigation of Heat Transfer Enhancement in a Triple Tube Latent Heat Storage System Using Circular Fins with Inline and Staggered Arrangements
...Show More Authors

Inherent fluctuations in the availability of energy from renewables, particularly solar, remain a substantial impediment to their widespread deployment worldwide. Employing phase-change materials (PCMs) as media, saving energy for later consumption, offers a promising solution for overcoming the problem. However, the heat conductivities of most PCMs are limited, which severely limits the energy storage potential of these materials. This study suggests employing circular fins with staggered distribution to achieve improved thermal response rates of PCM in a vertical triple-tube heat exchanger involving two opposite flow streams of the heat-transfer fluid (HTF). Since heat diffusion is not the same at various portions of the PCM unit,

... Show More
View Publication Preview PDF
Scopus (40)
Crossref (37)
Scopus Clarivate Crossref
Publication Date
Fri May 17 2019
Journal Name
Lecture Notes In Networks And Systems
Features Selection for Intrusion Detection System Based on DNA Encoding
...Show More Authors

Intrusion detection systems detect attacks inside computers and networks, where the detection of the attacks must be in fast time and high rate. Various methods proposed achieved high detection rate, this was done either by improving the algorithm or hybridizing with another algorithm. However, they are suffering from the time, especially after the improvement of the algorithm and dealing with large traffic data. On the other hand, past researches have been successfully applied to the DNA sequences detection approaches for intrusion detection system; the achieved detection rate results were very low, on other hand, the processing time was fast. Also, feature selection used to reduce the computation and complexity lead to speed up the system

... Show More
Scopus (5)
Scopus
Publication Date
Sat Dec 01 2012
Journal Name
Journal Of Engineering
Development an Anomaly Network Intrusion Detection System Using Neural Network
...Show More Authors

Most intrusion detection systems are signature based that work similar to anti-virus but they are unable to detect the zero-day attacks. The importance of the anomaly based IDS has raised because of its ability to deal with the unknown attacks. However smart attacks are appeared to compromise the detection ability of the anomaly based IDS. By considering these weak points the proposed
system is developed to overcome them. The proposed system is a development to the well-known payload anomaly detector (PAYL). By
combining two stages with the PAYL detector, it gives good detection ability and acceptable ratio of false positive. The proposed system improve the models recognition ability in the PAYL detector, for a filtered unencrypt

... Show More
View Publication Preview PDF
Crossref
Publication Date
Sun Jul 09 2023
Journal Name
Journal Of Engineering
New Approach in Detection MAC Spoofing in a WiFi LAN
...Show More Authors

Medium Access Control (MAC) spoofing attacks relate to an attacker altering the manufacturer assigned MAC address to any other value. MAC spoofing attacks in Wireless Fidelity (WiFi) network are simple because of the ease of access to the tools of the MAC fraud on the Internet like MAC Makeup, and in addition to that the MAC address can be changed manually without software. MAC spoofing attacks are considered one of the most intensive attacks in the WiFi network; as result for that, many MAC spoofing detection systems were built, each of which comes with its strength and weak points. This paper logically identifies and recognizes the weak points
and masquerading paths that penetrate the up-to-date existing detection systems. Then the

... Show More
View Publication Preview PDF
Crossref
Publication Date
Tue Feb 01 2022
Journal Name
Svu-international Journal Of Engineering Sciences And Applications
Water Quality Detection using cost-effective sensors based on IoT
...Show More Authors

Crossref (1)
Crossref
Publication Date
Fri Jan 01 2021
Journal Name
Ieee Access
DNA Encoding and STR Extraction for Anomaly Intrusion Detection Systems
...Show More Authors

View Publication
Scopus (9)
Crossref (7)
Scopus Clarivate Crossref
Publication Date
Fri Feb 08 2019
Journal Name
Journal Of The College Of Education For Women
Minimum Spanning Tree Algorithm for Skin Cancer Image Object Detection
...Show More Authors

This paper proposes a new method Object Detection in Skin Cancer Image, the minimum
spanning tree Detection descriptor (MST). This ObjectDetection descriptor builds on the
structure of the minimum spanning tree constructed on the targettraining set of Skin Cancer
Images only. The Skin Cancer Image Detection of test objects relies on their distances to the
closest edge of thattree. Our experimentsshow that the Minimum Spanning Tree (MST) performs
especially well in case of Fogginessimage problems and in highNoisespaces for Skin Cancer
Image.
The proposed method of Object Detection Skin Cancer Image wasimplemented and tested on
different Skin Cancer Images. We obtained very good results . The experiment showed that

... Show More
View Publication Preview PDF
Publication Date
Sun Dec 01 2019
Journal Name
Al-nahrain Journal Of Science
Enhancing Sparse Adjacency Matrix for Community Detection in Large Networks
...Show More Authors

View Publication
Crossref (1)
Crossref