Longkou City is a coastal area,and lacks water resources.The overexploitation of groundwater causes seawater intrusion.At present,seawater intrudes an area of 68 km2.With the decrease of groundwater extraction,the sea...Longkou City is a coastal area,and lacks water resources.The overexploitation of groundwater causes seawater intrusion.At present,seawater intrudes an area of 68 km2.With the decrease of groundwater extraction,the seawater intrusion area has generally declined.The paper expounds the development process of seawater intrusion as well as the corresponding prevention and control measures of using groundwater replenishment and groundwater throttling in Longkou City.In view of the seawater intrusion problem in Longkou City,some adaptive management countermeasures are put forward,which include:Adjusting industrial and agricultural structure,promoting economic and social development to match water resources;improving water usage structure,optimizing the utilization of water resources;advancing the construction of a water-saving society,using water resources efficiently;implementing inter-basin water transfer,using water resources rationally;developing and utilizing unconventional water sources,making full use of water resources;strengthening water infrastructure construction,increasing the development and utilization potential of water resources;carrying out ecological restoration,protecting water resources and ecological environment;improving the management informationalization level,strengthening the capabilities of groundwater monitoring and management;increasing publicity,improving public awareness of participation.展开更多
Global temperature is predicted to increase in the end of the century and one of the primary consequences of this warming is the sea level rise. Considering the vulnerabilities on coastal systems and water resources, ...Global temperature is predicted to increase in the end of the century and one of the primary consequences of this warming is the sea level rise. Considering the vulnerabilities on coastal systems and water resources, it is important to evaluate the potential effects of this rising in coastal areas, since the saline intrusion on rivers would be intensified, leading to problems related to water quality. In this context, the present work aimed to verify saline intrusion changes along an important river, São Francisco Canal, located in Rio de Janeiro State, Brazil. For this purpose, a hydrodynamic modeling was performed using SisBaHiA, considering different sea levels and tide conditions. According to the results, it was verified the intensification on saline intrusion and higher salinity values due to a sea level rise of 0.5 m. These results show that new licenses for water withdrawals must be carefully analyzed as the fluvial flow plays an important role to contain the saltwater intrusion on the studied river. Accordingly, it is recommended the evaluation of climate change effects in order to choose best strategies to reduce coastal vulnerability, and the use of this theme on environmental licensing and territorial planning, integrating water planning with coastal management.展开更多
A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Que...A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.展开更多
Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,hi...Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances.展开更多
In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. ...In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective.展开更多
Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,a...Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner.展开更多
This paper explains various factors that contribute to saltwater intrusion, including overexploitation of freshwater resources and climate change as well as the different techniques essential for effective saltwater i...This paper explains various factors that contribute to saltwater intrusion, including overexploitation of freshwater resources and climate change as well as the different techniques essential for effective saltwater intrusion management. The impact of saltwater intrusion along coastal regions and its impact on the environment, hydrogeology and groundwater contamination. It suggests potential solutions to mitigate the impact of saltwater intrusion, including effective water management and techniques for managing SWI. The application of A.I (assessment index) serves as a guideline to correctly identify wells with SWI ranging from no intrusion, slight intrusion and strong intrusion. The challenges of saltwater intrusion in Lagos and the salinization of wells were investigated using the hydro-chemical parameters. The study identifies four wells (“AA”, “CMS”, “OBA” and “VIL”) as having high electric conductivities, indicating saline water intrusion, while other wells (“EBM”, “IKJ, and “IKO”) with lower electric conductivities, indicate little or no salt-water intrusion, and “AJ” well shows slight intrusion. The elevation of the wells also played a vital role in the SWI across coastal regions of Lagos. The study recommends continuous monitoring of coastal wells to help sustain and reduce saline intrusion. The findings of the study are important for policymakers, researchers, and practitioners who are interested in addressing the challenges of saltwater intrusion along coastal regions. We assessed the SWI across the eight (8) wells using the Assessment Index to identify wells with SWI. Wells in “CMS” and “VIL” has strong intrusions. A proposed classification system based on specific ion ratios categorizes water quality from good (+) to highly (-) contaminated (refer to Table 4). These findings underscore the need for attention and effective management strategies to address groundwater unsuitability for various purposes.展开更多
Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques....Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it’s an effective method and can improve the performance of SVM-based intrusion detection system further.展开更多
Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural N...Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions.展开更多
The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash...The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.展开更多
基金funded by the National Key Research and Development Program of China(No.2016YFC0402800)
文摘Longkou City is a coastal area,and lacks water resources.The overexploitation of groundwater causes seawater intrusion.At present,seawater intrudes an area of 68 km2.With the decrease of groundwater extraction,the seawater intrusion area has generally declined.The paper expounds the development process of seawater intrusion as well as the corresponding prevention and control measures of using groundwater replenishment and groundwater throttling in Longkou City.In view of the seawater intrusion problem in Longkou City,some adaptive management countermeasures are put forward,which include:Adjusting industrial and agricultural structure,promoting economic and social development to match water resources;improving water usage structure,optimizing the utilization of water resources;advancing the construction of a water-saving society,using water resources efficiently;implementing inter-basin water transfer,using water resources rationally;developing and utilizing unconventional water sources,making full use of water resources;strengthening water infrastructure construction,increasing the development and utilization potential of water resources;carrying out ecological restoration,protecting water resources and ecological environment;improving the management informationalization level,strengthening the capabilities of groundwater monitoring and management;increasing publicity,improving public awareness of participation.
文摘Global temperature is predicted to increase in the end of the century and one of the primary consequences of this warming is the sea level rise. Considering the vulnerabilities on coastal systems and water resources, it is important to evaluate the potential effects of this rising in coastal areas, since the saline intrusion on rivers would be intensified, leading to problems related to water quality. In this context, the present work aimed to verify saline intrusion changes along an important river, São Francisco Canal, located in Rio de Janeiro State, Brazil. For this purpose, a hydrodynamic modeling was performed using SisBaHiA, considering different sea levels and tide conditions. According to the results, it was verified the intensification on saline intrusion and higher salinity values due to a sea level rise of 0.5 m. These results show that new licenses for water withdrawals must be carefully analyzed as the fluvial flow plays an important role to contain the saltwater intrusion on the studied river. Accordingly, it is recommended the evaluation of climate change effects in order to choose best strategies to reduce coastal vulnerability, and the use of this theme on environmental licensing and territorial planning, integrating water planning with coastal management.
文摘A new secured database management system architecture using intrusion detection systems(IDS)is proposed in this paper for organizations with no previous role mapping for users.A simple representation of Structured Query Language queries is proposed to easily permit the use of the worked clustering algorithm.A new clustering algorithm that uses a tube search with adaptive memory is applied to database log files to create users’profiles.Then,queries issued for each user are checked against the related user profile using a classifier to determine whether or not each query is malicious.The IDS will stop query execution or report the threat to the responsible person if the query is malicious.A simple classifier based on the Euclidean distance is used and the issued query is transformed to the proposed simple representation using a classifier,where the Euclidean distance between the centers and the profile’s issued query is calculated.A synthetic data set is used for our experimental evaluations.Normal user access behavior in relation to the database is modelled using the data set.The false negative(FN)and false positive(FP)rates are used to compare our proposed algorithm with other methods.The experimental results indicate that our proposed method results in very small FN and FP rates.
基金The authors would like to thank Princess Nourah bint Abdulrahman University for funding this project through the Researchers Supporting Project(PNURSP2023R319)this research was funded by the Prince Sultan University,Riyadh,Saudi Arabia.
文摘Intrusion detection systems(IDS)are essential in the field of cybersecurity because they protect networks from a wide range of online threats.The goal of this research is to meet the urgent need for small-footprint,highly-adaptable Network Intrusion Detection Systems(NIDS)that can identify anomalies.The NSL-KDD dataset is used in the study;it is a sizable collection comprising 43 variables with the label’s“attack”and“level.”It proposes a novel approach to intrusion detection based on the combination of channel attention and convolutional neural networks(CNN).Furthermore,this dataset makes it easier to conduct a thorough assessment of the suggested intrusion detection strategy.Furthermore,maintaining operating efficiency while improving detection accuracy is the primary goal of this work.Moreover,typical NIDS examines both risky and typical behavior using a variety of techniques.On the NSL-KDD dataset,our CNN-based approach achieves an astounding 99.728%accuracy rate when paired with channel attention.Compared to previous approaches such as ensemble learning,CNN,RBM(Boltzmann machine),ANN,hybrid auto-encoders with CNN,MCNN,and ANN,and adaptive algorithms,our solution significantly improves intrusion detection performance.Moreover,the results highlight the effectiveness of our suggested method in improving intrusion detection precision,signifying a noteworthy advancement in this field.Subsequent efforts will focus on strengthening and expanding our approach in order to counteract growing cyberthreats and adjust to changing network circumstances.
基金Supported by the National Natural Science Foundation of China (No. 60774029)
文摘In this paper,we propose a novel Intrusion Detection System (IDS) architecture utilizing both the evidence theory and Rough Set Theory (RST). Evidence theory is an effective tool in dealing with uncertainty question. It relies on the expert knowledge to provide evidences,needing the evidences to be independent,and this make it difficult in application. To solve this problem,a hybrid system of rough sets and evidence theory is proposed. Firstly,simplification are made based on Variable Precision Rough Set (VPRS) conditional entropy. Thus,the Basic Belief Assignment (BBA) for all evidences can be calculated. Secondly,Dempster’s rule of combination is used,and a decision-making is given. In the proposed approach,the difficulties in acquiring the BBAs are solved,the correlativity among the evidences is reduced and the subjectivity of evidences is weakened. An illustrative example in an intrusion detection shows that the two theories combination is feasible and effective.
文摘Wireless sensor networks(WSN)gather information and sense information samples in a certain region and communicate these readings to a base station(BS).Energy efficiency is considered a major design issue in the WSNs,and can be addressed using clustering and routing techniques.Information is sent from the source to the BS via routing procedures.However,these routing protocols must ensure that packets are delivered securely,guaranteeing that neither adversaries nor unauthentic individuals have access to the sent information.Secure data transfer is intended to protect the data from illegal access,damage,or disruption.Thus,in the proposed model,secure data transmission is developed in an energy-effective manner.A low-energy adaptive clustering hierarchy(LEACH)is developed to efficiently transfer the data.For the intrusion detection systems(IDS),Fuzzy logic and artificial neural networks(ANNs)are proposed.Initially,the nodes were randomly placed in the network and initialized to gather information.To ensure fair energy dissipation between the nodes,LEACH randomly chooses cluster heads(CHs)and allocates this role to the various nodes based on a round-robin management mechanism.The intrusion-detection procedure was then utilized to determine whether intruders were present in the network.Within the WSN,a Fuzzy interference rule was utilized to distinguish the malicious nodes from legal nodes.Subsequently,an ANN was employed to distinguish the harmful nodes from suspicious nodes.The effectiveness of the proposed approach was validated using metrics that attained 97%accuracy,97%specificity,and 97%sensitivity of 95%.Thus,it was proved that the LEACH and Fuzzy-based IDS approaches are the best choices for securing data transmission in an energy-efficient manner.
文摘This paper explains various factors that contribute to saltwater intrusion, including overexploitation of freshwater resources and climate change as well as the different techniques essential for effective saltwater intrusion management. The impact of saltwater intrusion along coastal regions and its impact on the environment, hydrogeology and groundwater contamination. It suggests potential solutions to mitigate the impact of saltwater intrusion, including effective water management and techniques for managing SWI. The application of A.I (assessment index) serves as a guideline to correctly identify wells with SWI ranging from no intrusion, slight intrusion and strong intrusion. The challenges of saltwater intrusion in Lagos and the salinization of wells were investigated using the hydro-chemical parameters. The study identifies four wells (“AA”, “CMS”, “OBA” and “VIL”) as having high electric conductivities, indicating saline water intrusion, while other wells (“EBM”, “IKJ, and “IKO”) with lower electric conductivities, indicate little or no salt-water intrusion, and “AJ” well shows slight intrusion. The elevation of the wells also played a vital role in the SWI across coastal regions of Lagos. The study recommends continuous monitoring of coastal wells to help sustain and reduce saline intrusion. The findings of the study are important for policymakers, researchers, and practitioners who are interested in addressing the challenges of saltwater intrusion along coastal regions. We assessed the SWI across the eight (8) wells using the Assessment Index to identify wells with SWI. Wells in “CMS” and “VIL” has strong intrusions. A proposed classification system based on specific ion ratios categorizes water quality from good (+) to highly (-) contaminated (refer to Table 4). These findings underscore the need for attention and effective management strategies to address groundwater unsuitability for various purposes.
基金This work was supported by the Research Grant of SEC E-Institute :Shanghai High Institution Grid and the Science Foundation ofShanghai Municipal Commission of Science and Technology No.00JC14052
文摘Support vector machine (SVM) technique has recently become a research focus in intrusion detection field for its better generalization performance when given less priori knowledge than other soft-computing techniques. But the randomicity of parameter selection in its implement often prevents it achieving expected performance. By utilizing genetic algorithm (GA) to optimize the parameters in data preprocessing and the training model of SVM simultaneously, a hybrid optimization algorithm is proposed in the paper to address this problem. The experimental results demonstrate that it’s an effective method and can improve the performance of SVM-based intrusion detection system further.
文摘Intrusion Detection Systems (IDS) are pivotal in safeguarding computer networks from malicious activities. This study presents a novel approach by proposing a Hybrid Dense Neural Network-Radial Basis Function Neural Network (DNN-RBFNN) architecture to enhance the accuracy and efficiency of IDS. The hybrid model synergizes the strengths of both dense learning and radial basis function networks, aiming to address the limitations of traditional IDS techniques in classifying packets that could result in Remote-to-local (R2L), Denial of Service (Dos), and User-to-root (U2R) intrusions.
基金The National Natural Science Foundation of China(No.71071033)the Innovation Project of Jiangsu Postgraduate Education(No.CX10B_058Z)
文摘The integrated linkage control problem based on attack detection is solved with the analyses of the security model including firewall, intrusion detection system (IDS) and vulnerability scan by game theory. The Nash equilibrium for two portfolios of only deploying IDS and vulnerability scan and deploying all the technologies is investigated by backward induction. The results show that when the detection rates of IDS and vulnerability scan are low, the firm will not only inspect every user who raises an alarm, but also a fraction of users that do not raise an alarm; when the detection rates of IDS and vulnerability scan are sufficiently high, the firm will not inspect any user who does not raise an alarm, but only inspect a fraction of users that raise an alarm. Adding firewall into the information system impacts on the benefits of firms and hackers, but does not change the optimal strategies of hackers, and the optimal investigation strategies of IDS are only changed in certain cases. Moreover, the interactions between IDS & vulnerability scan and firewall & IDS are discussed in detail.