Volume 4 Number 2 June 2013

    
A New Off-Line Intrusion Detection System

M. Daoudi, A. Boukra

https://doi.org/

Abstract The problem of intrusion detection is studied extensively in computer security. The development of security mechanisms, like Intrusion Detection Systems, is of great importance in order to preserve the confidentiality, integrity and availability of data stored in computers. Off-line intrusion detection can be accomplished by searching audit trail logs of user activities for matches to patterns of events required for... Read More


Determining the Number of Hidden Neurons in a Multi Layer Feed Forward Neural Network

Lynn Ray

https://doi.org/

Abstract A neural network intrusion detection system (IDS) can be effective against network attacks. However, their effectiveness can be reduced by changes in the neural network architecture. One problem is determining the number of hidden layer neurons. This can lead to reduced detection and high failure rates. This paper describes the affects of architecture on the performance of IDSs while finding... Read More


Adaptive Authentication: Issues and Challenges

Khairul Azmi Abu Bakar, Galoh Rashidah

https://doi.org/

Abstract Authentication is a mechanism to establish proof of identities. Common practise for authentication is to challenge user to present authentication credential. User who can present the valid credential is considered as authenticated identity. Traditional authentication systems have a static security requirement which does not consider the change of user behavior or environment. In contrast, adaptive authentication systems are risk-based authentication... Read More


A Managerial Issues-aware Cost Estimation of Enterprise Security Projects

Boutheina A. Fessi, Yosra Miaoui, Noureddine Boudriga

https://doi.org/

Abstract While several models are provided in the literature to estimate different features of projects management: duration, effort, cost, and investment, they are not tailored to the cost estimation of security projects. We provide in this paper a new model for the managerial aware estimation of the effort required to conduct a security project. This model takes into consideration the effort... Read More


Initial Trust Toward an Unknown Website

Manel KHADRAOUI, Jamel-Eddine GHARBI

https://doi.org/

Abstract Trust is a dynamic concept that evolves during a relationship. We study the initiation phase of trust toward an unknown website. We propose three sets of drives of initial trust: relational concepts (perceived value and satisfaction), in individual concept (trust propensity) and a contextual concept (structural assurance). We adopted the quasi- experimentation method for data collection. We have obtained 388... Read More