Intrusion detection is important in the defensein-depth network security framework. This paper presents an effective method for anomaly intrusion detection with low overhead and high efficiency. The method is based on rough set theory to extract a set of detection rules with a minimal size as the normal behavior model from the system call sequences generated during the normal execution of a process. It is capable of detecting the abnormal operating status of a process and thus reporting a possible intrusion. Compared with other methods, the method requires a smaller size of training data set and less effort to collect training data and is more suitable for real-time detection. Empirical results show that the method is promising in terms of detection accuracy, required training data set and efficiency.
The classical one-dimension chaotic maps are not adequately secure, and some improved maps usually have a high time complexity. To address these problems, this paper presents a new Piecewise-Logistic-Sine map (PLSM). The bifurcation diagrams, Lyapunov exponent, and running time of the proposed PLSM are analyzed, and the outcomes show that it has better chaotic behavior with low time complexity. Furthermore, diffusion by certain rules is vulnerable to attack, so a PLSM-based image encryption scheme with random exclusive OR diffusion is proposed. Using a 256-bit secret key, the initial value and parameters of PLSM are calculated by the key distribution method. Then four chaotic sequences are generated by PLSM, they are used in three rounds of random exclusive OR diffusion. This scheme can spread a small change in the original image to all pixels, and the performance evaluation shows the security of this image encryption scheme.INDEX TERMS Piecewise chaotic map, image security, chaos-based encryption, image encryption.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.