Intrusion detection system (IDS) is the process of monitoring the events occurring in a computer system or network and analyzing them for signs of possible incidents, which are violations or imminent threats of violation of computer security policies. An intrusion prevention system (IPS) is software that has all the capabilities of an intrusion detection system and can also attempt to stop possible incidents. If anomaly traffic pass through the network IDS would generate a false positive which means it only detects the malicious traffic, takes no action and generates only alerts but IPS detects the malicious traffic or suspicious activity, takes the actions like terminate, block or drop the connections. This paper provides an explanation of network intrusion, detection, and prevention to overcome them.
Magnetic Resonance Image (MRI) brain images have an essential role in medical analysis and cancer identification .In this paper multi kernel SVM algorithm is used for MRI brain tumor detection. The proposed work is involving the following stages: image acquisition, image preprocessing, feature extraction and tumor classification. An automatic threshold selection region based segmentation method called Otsu is used for thresholding during preprocessing stage. SVM classification algorithm with four different kernels are used to determine the normal and abnormal images. SVM with quadratic kernel results in best classification accuracy of 86.5%.
In the current digitalized world human race confront huge and fast technical progress in communication networks, That contribute to exposure of data and information that is transmitted through these networks to different levels of exposure and attack Also, the authentication of the digital products and services become very important to both makers and customers and can be separated from those that are invalid , The science of transfer secret data in several multimedia carriers like audio , text, video or image so that can achieve the authentication requirements that were mentioned is called steganography. This paper introduces a new steganography technique that will increase the difficulty of exhaustive key search, it based on book cipher combined with ASCII (American Standard for Information interchange) mapping technique using image as reference key.
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.