Intrusion detection system (IDS) is another layer of protection as an important technology in information security. There are two major problems in the development of IDS, the algorithmic aspect of detection (computational), and aspects of the communication between components of detection (architectural). Computational problems including the ability of the novel-attack detection using ant colony clustering (ACC) is still lacking, large data traffic and computation overload. Architectural problems including the difficulty to overcome distributed and coordinated attacks, because it requires large amounts of distributed information, thus requiring synchronization between detection components of scattered information anyway.This paper proposes the multiagent architecture that implements distributed IDS based on ACC to recognize a new and coordinated attack, and the movement of large data handling, synchronization capabilities, the ability of cooperation between components without the presence of centralized computing components, good detection performance in real-time to turn on warning alarm.
Abstract. Intrusion detection systems (IDS) play an important role in information security. Two major problems in the development of IDSs are the computational aspect and the architectural aspect. The computational or algorithmic problems include lacking ability of novel-attack detection and computation overload caused by large data traffic. The architectural problems are related to the communication between components of detection, including difficulties to overcome distributed and coordinated attacks because of the need of large amounts of distributed information and synchronization between detection components. This paper proposes a multi-agent architecture for a distributed intrusion detection system (DIDS) based on ant-colony clustering (ACC), for recognizing new and coordinated attacks, handling large data traffic, synchronization, co-operation between components without the presence of centralized computation, and good detection performance in real-time with immediate alarm notification. Feature selection based on principal component analysis (PCA) is used for dimensional reduction of NSL-KDD. Initial features are transformed to new features in smaller dimensions, where probing attacks (Ra-Probe) have a characteristic sign in their average value that is different from that of normal activity. Selection is based on the characteristics of these factors, resulting in a two-dimensional subset of the 75% data reduction.Keywords: ACC; agent; ant colony clustering; distributed; IDS; intrusion detection system; PCA; principal component analysis. 1 B IntroductionMonitoring activities that occur in a computer system or network and analyzing them to recognize signs of an attack, identifying it as an attempt that endangers confidentiality, integrity and availability of the computer system or network or breaks through the security mechanism, is known as intrusion detection [1]. Signature-based detection capabilities rely on attack pattern information that has been collected in a database. A deficiency of this method lies in the inability to detect new patterns that do not exist in the database. Anomaly detection uses a history of normal patterns and detects deviations from these patterns. 214Muhammad N. Abdurrazaq, et al.Intrusion detection systems (IDS) can run in real-time or offline, using a centralized or distributed architecture. Centralized architectures are widely used to identify attacks on a single system that is being monitored. Distributed and coordinated attacks, such as DDoS, using many machines as attackers or victims, are likely to increase. Analysis based only one source location has difficulty to identify this type of attack. To overcome this, a distributed intrusion detection system (DIDS) is needed.Problems on attack detection can be reduced to problems of classification and clustering. Methods that have been developed in the direction of its application provide high quality results quickly and efficiently [2]. A clustering algorithm can be based on partitional or hierarchical clustering. Basic part...
The management of imarah which is applied by the mosque management in prospering the Islamic Center Syekh Abdul Manan Indramayu Mosque is the center of attention and how the mosque management faces the opportunities and challenges that exist because it is an icon of Indramayu. The purpose of this research is to find out how the management system of the Islamic Center Syekh Abdul Manan Indramayu Mosque in the field of emirates and to find out the opportunities and challenges in prospering the Islamic Center Syekh Abdul Manan Indramayu Mosque. The research method uses a qualitative approach with data collection techniques in the form of observation, interviews and documentation. The results of this research indicate that the process of prospering mosques implemented by mosque administrators has met the requirements of existing mosque management knowledge, therefore the author can say that the Islamic Center Syekh Abdul Manan Indramayu Mosque can be used as an example as well as a benchmark for mosques that others, especially those in the City of Indramayu, because the mosque management applied is almost close to perfection. Manajemen imarah yang diterapkan oleh pengurus masjid dalam memakmurkan Masjid Islamic Center Syekh Abdul Manan Indramayu menjadi pusat perhatian serta bagaimana pihak pengurus masjid dalam menghadapi peluang dan tantangan yang ada karena merupakan ikon Indramayu. Tujuan dari penelitian ini untuk mengetahui bagaimana sistem manajemen Masjid Islamic Center Syekh Abdul Manan Indramayu di bidang imarah serta untuk mengetahui peluang dan tantangan dalam memakmurkan Masjid Islamic Center Syekh Abdul Manan Indramayu. Metode penelitian menggunakan pendekatan kualitatif dengan teknik pengumpulan data berupa observasi, wawancara dan doumentasi. Hasil penelitian ini menunjukkan bahwa proses dari memakmurkan masjid yang diterapkan oleh pengurus masjid sudah memenuhi syarat-syarat ilmu manajemen masjid yang telah ada, maka dari itu penulis dapat mengatakan bahwa Masjid Islamic Center Syekh Abdul Manan Indramayu dapat dijadikan contoh sekaligus patokan untuk masjid-masjid yang lain, khususnya yang ada di Kota Indramayu, dikarenakan manajemen masjid yang diterapkan hampir saja mendekati kesempurnaan.
The purpose of this study is to quantify whether or not there is a significant relationship, as well as the nature of the relationship, between watching the Ngaji Filsafat Video Show on the MJS Channel Youtube Account and the Viewers’ Wisdom Response. This method of study employed a quantitative approach with survey techniques and a questionnaire instrument. The audience and fans of the Ngaji Filsafat video uploaded by the MJS Channel on YouTube comprised the population of this study. The Lemeshow formula was used to determine the number of samples, which resulted in 100 respondents. Simple random sampling was used in the sampling technique. According to the results of this study, there is a significant relationship between watching the Ngaji Filsafat Video Show on the MJS Channel Youtube Account and the Wisdom Response of the Viewers. The chi-square test between the two dimensions reveals a significant relationship at the 95% confidence level. Furthermore, through the Spearman-Rank test, it shows that the correlation of the total score of viewers' answers on the two variables measured using an ordinal scale turns out to be a value of 0.528 and shows significance at the 95% confidence level and the correlation level is strong and unidirectional. That is, the higher the size of watching the show for viewers, the higher the policy response of viewers
scite is a Brooklyn-based organization that helps researchers better discover and understand research articles through Smart Citations–citations that display the context of the citation and describe whether the article provides supporting or contrasting evidence. scite is used by students and researchers from around the world and is funded in part by the National Science Foundation and the National Institute on Drug Abuse of the National Institutes of Health.
hi@scite.ai
10624 S. Eastern Ave., Ste. A-614
Henderson, NV 89052, USA
Copyright © 2024 scite LLC. All rights reserved.
Made with 💙 for researchers
Part of the Research Solutions Family.