scholarly journals Intrusion Detection through DCSYS Propagation Compared to Auto-encoders

2021 ◽  
Vol 3 (3) ◽  
Author(s):  
Fatima Isiaka ◽  
Zainab Adamu

In network settings, one of the major disadvantages that threaten the network protocols is the insecurity. In most cases, unscrupulous people or bad actors can access information through unsecured connections by planting software or what we call malicious software otherwise anomalies. The presence of anomalies is also one of the disadvantages, internet users are constantly plagued by virus on their system and get activated when a harmless link is clicked on, this a case of true benign detected as false. Deep learning is very adept at dealing with such cases, but sometimes it has its own faults when dealing benign cases. Here we tend to adopt a dynamic control system (DCSYS) that addresses data packets based on benign scenario to truly report on false benign and exclude anomalies. Its performance is compared with artificial neural network auto-encoders to define its predictive power. Results show that though physical systems can adapt securely, it can be used for network data packets to identify true benign cases.

Author(s):  
Kenneth C. C. Yang ◽  
Yowei Kang

On February 4, 2015, China announced its new regulations that require all Chinese Internet users to register with their real names. The heightened control of Internet clearly demonstrates Chinese government's concerns over increasing social unrests and the abilities of Chinese Internet users to access information not censored by the government. However, the real-name registration regime has posed the greatest challenge to the anonymity of the Internet that many Chinese users have valued in an authoritarian society. Furthermore, the real-name registration system also impinges on Chinese Internet users' privacy, political freedom, and freedom of speech. This book chapter analyzes microblog discussions to examine existing Chinese censorship and control systems on the Internet, to investigate government's rhetoric to justify its censorship and control systems, and to identify major themes in Chinese netizens' reactions and discourses.


2005 ◽  
Vol 2005.58 (0) ◽  
pp. 225-226
Author(s):  
Naoki NODA ◽  
Yoshihiro UJIMOTO ◽  
Yasuhiro MINAMIYAMA ◽  
Takumi SASAKI ◽  
Takanori KIYOTA ◽  
...  

1997 ◽  
Vol 30 (1) ◽  
pp. 297-302
Author(s):  
Jang M. Lee ◽  
M.C. Lee ◽  
K. Son ◽  
M.H. Lee ◽  
S.H . Han

2014 ◽  
Vol 693 ◽  
pp. 80-85
Author(s):  
German Michalconok ◽  
Martin Nemeth ◽  
Maximilian Stremy

The combined dynamic control system is executing control algorithm based on time and control algorithm based on the data change in one sampling period. Processing time of control algorithm is based on the data change that has a random character. Previous shows that the deviation between the sampling period of the entire system and desired sampling period has also random character. The aim of this article is to find boundaries, in which the sampling period can be changed and by which the control algorithm of time-based technological processes remains in the required quality.


2014 ◽  
Vol 543-547 ◽  
pp. 3173-3176 ◽  
Author(s):  
Dong Sheng Zhang

To date, network security analysts depend only on some network secure products to study large amounts of log information as to analyze and cope with network anomalies. With dramatic increase of network data volumes, diversities of attack types and more complexity, the traditional analytical means are no longer effective. How to enable those analysts to quickly figure out network status by advantage of cumbersome high-dimensional data information has become a critical concern in the field of network safety. Here it develops a visualized technique for detecting network safety information by port scanning. After the analysis of network data packets and the use of information visualization technique, the visualized port scanning and detection system ScanViewer is designed and developed. The experiment reveals that it can detect slow scan, distributed scan, various TCP stealth scan and so on. With the method, people have got out of helpless embarrassment by the weak scan.


2013 ◽  
Vol 380-384 ◽  
pp. 2585-2588
Author(s):  
Kun Wang ◽  
Yun Pan

Network Coding is used to increase network throughput. In the network coding, network data packets will be encoded by the sender and the encoded data packets can be used by different receivers to recovery the same original data packets. This increases the network transmission efficiency. Coding on data will consume the computing resources and this becomes the bottleneck of network codings practicability. In this paper, we assume that the coding happens at the end of the network and we conduct some tests on the pc and hand-devices. Our results show that network coding can work well on current PC, and we need a native device support to make the network coding working on the hand-devices.


2017 ◽  
Vol 1 (2) ◽  
Author(s):  
Hu Weitao

Abstract: This article emphatically about laigangsteel mills bof dynamic steelmaking control system.Detailed introduces the characteristics of the dynamic steelmaking converter characteristics and its key of technology is described.


Sign in / Sign up

Export Citation Format

Share Document