{"title":"Filter Versus Wrapper Feature Selection for Network Intrusion Detection System","authors":"Mahmoud M. Sakr, Medhat A. Tawfeeq, A. El-Sisi","doi":"10.1109/ICICIS46948.2019.9014797","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014797","url":null,"abstract":"With the increased usage of the Internet, the need for providing security and privacy to protect computer networks is increased too. Network intrusion detection system (NIDS) is intended to observe and inspect the activities in a network. This system is highly dependent on the features of the input network data as these features describe the behaviour of the current network activities. Not only do the irrelevant and redundant network features cause the learning algorithm to build an inaccurate detection model, but they also increase the time complexity and exhaust computation resources as well. In this paper, several feature selection techniques are applied to boost the performance of the NIDS. Categories of the applied selection techniques are of the filter (Information Gain (IG), Principal Component Analysis (PCA), and Correlation Feature Selection (CFS)) and of the wrapper (Genetic Algorithm (GA), Artificial Bee Colony (ABC) and Particle Swarm Optimization (PSO)). Support vector machine (SVM) is utilized to classify the network connections. The benchmark network traffic NSL-KDD dataset is selected to build and test the NIDS. The impact of the applied selection approaches on enhancing the detection model performance is compared and discussed. Evaluation results stated that the wrapper approaches achieved better classification performance for the NIDS in terms of high classification accuracy, detection rate, true positive rates, and low false-positive rates than the filter approaches. Our ABC-NIDS is compared with other related NIDSs and the comparison result proved that our system achieved the best performance.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125947619","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Algorithm for Automatic Crack Analysis and Severity Identification","authors":"Sara Ashraf, I. Hegazy, T. Elarif","doi":"10.1109/ICICIS46948.2019.9014762","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014762","url":null,"abstract":"Concrete structures are increasing every day, to facilitate people's lives. With this expansion, the traditional manual maintenance method becomes unpractical, costly and time-wasting. The fast detection and maintenance of concrete surfaces defects is necessary to save people's lives, reducing maintenance cost, and increase the lifetime of concrete structures. Thus, the researches came up over the last twenty years to find an automatic way in order to maintain, apply regularly check-ups over concrete structures and assist engineers to take fast decisions. The most researches came up with high precision algorithms to allocate cracks and defects over the concrete surfaces with no human intervention. Nowadays, the computer programs can be dependable to capture large data sets of concrete structure, and then give precise locations of cracks. However, there exists a lack of researches that work on crack interpretation and automatic decision-making, which is considered as a critical part of those systems. Therefore, there exists a need for methods that describe the crack characteristics in terms of width, length, and other morphological attributes. In this paper, a crack interpretation algorithm is proposed to extract crack geometrical attributes and support the decision maker.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127499982","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Broad Learning on Big Data via Fusion of Heterogeneous Information","authors":"Philip S. Yu","doi":"10.1109/icicis46948.2019.9014730","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014730","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123660772","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Ahmed Ramzy Shaaban, Essam Abd-Elwanis, Mohamed Hussein
{"title":"DDoS attack detection and classification via Convolutional Neural Network (CNN)","authors":"Ahmed Ramzy Shaaban, Essam Abd-Elwanis, Mohamed Hussein","doi":"10.1109/ICICIS46948.2019.9014826","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014826","url":null,"abstract":"Distributed Denial of Service (DDoS) attacks became the most widely spread attack because it is easily designed and executed but it is very difficult to detect and mitigate. Several artificial neural network (ANN) techniques were considered to detect and classify DDoS attacks. Mission control center (MCC) is responsible for controlling the spacecraft, so MCC network should maintain the availability i.e. should be protected from any kind of malicious traffic affect its availability such as DDoS attack. In this paper, convolutional neural network (CNN) technique is presented to detect and classify the DDoS traffic into normal and malicious information with an accuracy of 99 % using two different datasets. One is captured from simulated MCC network by Wireshark and the other one was a predefined open source dataset. The results are compared with other classification algorithms like decision tree (D-Tree), support vector machine (SVM), K-nearest neighbors (K-NN), and neural network (NN).","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123814516","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Moshira S. Ghaleb, H. M. Ebied, Howida A. Shedeed, M. Tolba
{"title":"Image Retrieval Based on Self-Organizing Feature Map and Multilayer Perceptron Neural Networks Classifier","authors":"Moshira S. Ghaleb, H. M. Ebied, Howida A. Shedeed, M. Tolba","doi":"10.1109/ICICIS46948.2019.9014768","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014768","url":null,"abstract":"Content-based image retrieval (CBIR), is a type of computer vision application. It searches for an image by image content not text in large database images. According to the huge existence of image databases, the searching time and high accuracy retrieved images become a great challenge. This paper aims to find a solution to retrieve images with high accuracy results. Neural network became a hot topic in the image processing field for the past few years. This paper presents two approaches to Content-based image retrieval. The first approach used the Self-Organized Feature Map (SOFM) as a clustering method to image retrieval. The second approach consists of two phases. The first one used the SOFM as a feature extraction method. The second phase used the Multilayer Perceptron (MLP) as a classifier method. The paper studied the impact of changing some parameters values on recognition accuracy. The experiments carried out using the Wang Corel 1000 database. The results show that the SOFM+MLP improved the recognition accuracy compared to SOFM. The SOFM+MLP achieved approximately 99% average recognition accuracy.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"94 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131057907","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Testing Techniques in IoT-based Systems","authors":"N. Medhat, Sherin M. Moussa, N. Badr, M. Tolba","doi":"10.1109/ICICIS46948.2019.9014711","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014711","url":null,"abstract":"Internet of Things (IoT) systems are fast evolving nowadays, in which huge amounts of data are produced rapidly from heterogeneous sources. The nature of IoT-based systems implies many challenges, in terms of operation, security, quality control and data management. Thus, testing such systems is a key element to their success. In this paper, we present a comprehensive study for the main testing techniques and tools that have been considered for the IoT-based systems. Detailed comparison and analytical criticism are conducted, identifying the different testing types that have been applied for the main application domains. The research gaps are addressed, which highlight the future directions that can be adopted.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"130554674","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Future Generation Education Technological Model","authors":"S. Cakula, Ginta Majore","doi":"10.1109/ICICIS46948.2019.9014852","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014852","url":null,"abstract":"Today's economy is inconceivable without the application of new technologies. The need to keep up with the new requirements of the labor market is growing rapidly, and the need for further education is increasing. Continuous lifelong education and skills developing for adults becomes an integral part of everyday life. Adult learning requires additional motivation, facilitated by easy-to-understand and engaging technological solutions. Mutual cooperation is also becoming increasingly important. New individually oriented smart learning education model has been developed based on main psychological and pedagogical theories for fast growing information and technological society.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"21 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126477676","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Big Data for Better Life","authors":"Yi Guo","doi":"10.1109/icicis46948.2019.9014800","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014800","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"113 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121245387","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proceedings Publication","authors":"","doi":"10.1109/icicis46948.2019.9014850","DOIUrl":"https://doi.org/10.1109/icicis46948.2019.9014850","url":null,"abstract":"","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"120 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"121363237","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A Review on Iris Liveness Detection Techniques","authors":"Manar Ramzy Dronky, W. Khalifa, Mohamed Roushdy","doi":"10.1109/ICICIS46948.2019.9014719","DOIUrl":"https://doi.org/10.1109/ICICIS46948.2019.9014719","url":null,"abstract":"Iris recognition systems have been widely deployed for authentication in many sensitive security areas for their accuracy and consistency. However, as the iris technology evolves, ways to attack it evolve too. Fake iris samples could be used to spoof the iris recognition system. As a result, Iris liveness detection methods have been developed. These methods read the users physiological signs of life to verify if the iris pattern acquired for identification is fake or real. In this paper, a review for the previous work done in iris liveness detection is presented.","PeriodicalId":200604,"journal":{"name":"2019 Ninth International Conference on Intelligent Computing and Information Systems (ICICIS)","volume":"49 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2019-12-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123477726","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}