Intrusion detection has gain a broad attention and become a fertile field for several researches, and still being the subject of widespread interest by researchers. The intrusion detection community still confronts difficult problems even after many years of research. Reducing the large number of false alerts during the process of detecting unknown attack patterns remains unresolved problem. However, several research results recently have shown that there are potential solutions to this problem. Anomaly detection is a key issue of intrusion detection in which perturbations of normal behavior indicates a presence of intended or unintended induced attacks, faults, defects and others. This paper presents an overview of research directions for applying supervised and unsupervised methods for managing the problem of anomaly detection. The references cited will cover the major theoretical issues, guiding the researcher in interesting research directions.
Intrusion detection continues to be an active research field. Even after 20 years of research, the intrusion detection community still faces several difficult problems. Detecting unknown patterns of attack without generating too many false alerts remains an unresolved problem. Although recently, several results have shown that there is a potential resolution to this problem. Anomaly detection is a key element of intrusion detection in which perturbations of normal behavior suggest the presence of intentionally or unintentionally induced attacks, faults, and defects. This paper proposes a hybrid machine learning model based on combining the unsupervised and supervised classification techniques. Clustering approach based on combining the K-means , fuzzy C-means and GSA algorithms to obtain the normal patterns of a user's activity, the technique is used as the first component for pre-classification to improve attack detection. Then, a hybrid classification approach of Support Vector Machine (SVM) and Gravitational Search Algorithm (GSA) algorithm will be used to enhance the detection accuracy.this research used the KDD CUP 1999 to get initial results, which were encouraging.
Countries all over the world pursue to improve their government system in order to provide efficient e-services to stakeholders in real time with minimum efforts. Regardless the inclusive adoption and benefits of using ICT, many developing countries face several implementation and adoption challenges. To understand the user adoption of e-services, several model are developed. However, most models concentrated on technological and social dimensions. Moreover, none of the former studies has made any further effort to develop and validate a unified model of e-government includes all the micro-environmental factors affecting e-government adoption. Consequently, this research develops a conceptual model based on PESTLE framework to address the effect of these factors with considering the moderated effect of government support. Taking into account, the effect of PESTLE factors significantly contributes to manage expenses, mitigate risks and attain competitive benefits.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.