Search results

1 – 2 of 2
Article
Publication date: 17 March 2012

Makhlouf Derdour, Philippe Roose, Marc Dalmau and Nacira Ghoualmi‐Zine

The purpose of this paper is to present a supervised adaptation platform for applications‐based components.

Abstract

Purpose

The purpose of this paper is to present a supervised adaptation platform for applications‐based components.

Design/methodology/approach

The platform is designed using a model based top‐down approach. The authors use UML diagrams and particularly scenarios and activity diagrams.

Findings

The CSC (component, service and connector) platform is based on a component/service model that allows adaptation of component‐based applications and uses service‐oriented architecture for providing adaptation services to be embedded in adaptation connectors.

Originality/value

The paper proposes CSC, a self‐adaptation platform based on MMSA, to describe software architectures for multimedia‐oriented application and providing adaptation capabilities. The platform is based on services and offer architecture, with three layers particularly adapted to adaptation of multimedia flow (types, formats, properties) and which allows solving the heterogeneity problems of components.

Details

Journal of Systems and Information Technology, vol. 14 no. 1
Type: Research Article
ISSN: 1328-7265

Keywords

Article
Publication date: 9 March 2015

Ahmed Ahmim and Nacira Ghoualmi Zine

The purpose of this paper is to build a new hierarchical intrusion detection system (IDS) based on a binary tree of different types of classifiers. The proposed IDS model must…

Abstract

Purpose

The purpose of this paper is to build a new hierarchical intrusion detection system (IDS) based on a binary tree of different types of classifiers. The proposed IDS model must possess the following characteristics: combine a high detection rate and a low false alarm rate, and classify any connection in a specific category of network connection.

Design/methodology/approach

To build the binary tree, the authors cluster the different categories of network connections hierarchically based on the proportion of false-positives and false-negatives generated between each of the two categories. The built model is a binary tree with multi-levels. At first, the authors use the best classifier in the classification of the network connections in category A and category G2 that clusters the rest of the categories. Then, in the second level, they use the best classifier in the classification of G2 network connections in category B and category G3 that represents the different categories clustered in G2 without category B. This process is repeated until the last two categories of network connections. Note that one of these categories represents the normal connection, and the rest represent the different types of abnormal connections.

Findings

The experimentation on the labeled data set for flow-based intrusion detection, NSL-KDD and KDD’99 shows the high performance of the authors' model compared to the results obtained by some well-known classifiers and recent IDS models. The experiments’ results show that the authors' model gives a low false alarm rate and the highest detection rate. Moreover, the model is more accurate than some well-known classifiers like SVM, C4.5 decision tree, MLP neural network and naïve Bayes with accuracy equal to 83.26 per cent on NSL-KDD and equal to 99.92 per cent on the labeled data set for flow-based intrusion detection. As well, it is more accurate than the best of related works and recent IDS models with accuracy equal to 95.72 per cent on KDD’99.

Originality/value

This paper proposes a novel hierarchical IDS based on a binary tree of classifiers, where different types of classifiers are used to create a high-performance model. Therefore, it confirms the capacity of the hierarchical model to combine a high detection rate and a low false alarm rate.

Details

Information & Computer Security, vol. 23 no. 1
Type: Research Article
ISSN: 2056-4961

Keywords

1 – 2 of 2