Search results for: Madihah%20Mohd%20Saudi
Commenced in January 2007
Frequency: Monthly
Edition: International
Paper Count: 4

Search results for: Madihah%20Mohd%20Saudi

4 Efficient STAKCERT KDD Processes in Worm Detection

Authors: Madihah Mohd Saudi, Andrea J Cullen, Mike E Woodward

Abstract:

This paper presents a new STAKCERT KDD processes for worm detection. The enhancement introduced in the data-preprocessing resulted in the formation of a new STAKCERT model for worm detection. In this paper we explained in detail how all the processes involved in the STAKCERT KDD processes are applied within the STAKCERT model for worm detection. Based on the experiment conducted, the STAKCERT model yielded a 98.13% accuracy rate for worm detection by integrating the STAKCERT KDD processes.

Keywords: data mining, incident response, KDD processes, security metrics and worm detection.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1609
3 An Efficient Framework to Build Up Malware Dataset

Authors: Madihah Mohd Saudi, Zul Hilmi Abdullah

Abstract:

This research paper presents a framework on how to build up malware dataset.Many researchers took longer time to clean the dataset from any noise or to transform the dataset into a format that can be used straight away for testing. Therefore, this research is proposing a framework to help researchers to speed up the malware dataset cleaningprocesses which later can be used for testing. It is believed, an efficient malware dataset cleaning processes, can improved the quality of the data, thus help to improve the accuracy and the efficiency of the subsequent analysis. Apart from that, an in-depth understanding of the malware taxonomy is also important prior and during the dataset cleaning processes. A new Trojan classification has been proposed to complement this framework.This experiment has been conducted in a controlled lab environment and using the dataset from VxHeavens dataset. This framework is built based on the integration of static and dynamic analyses, incident response method and knowledge database discovery (KDD) processes.This framework can be used as the basis guideline for malware researchers in building malware dataset.

Keywords: Dataset, knowledge database discovery (KDD), malware, static and dynamic analyses.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 3427
2 Performance Analysis of Routing Protocol for WSN Using Data Centric Approach

Authors: A. H. Azni, Madihah Mohd Saudi, Azreen Azman, Ariff Syah Johari

Abstract:

Sensor Network are emerging as a new tool for important application in diverse fields like military surveillance, habitat monitoring, weather, home electrical appliances and others. Technically, sensor network nodes are limited in respect to energy supply, computational capacity and communication bandwidth. In order to prolong the lifetime of the sensor nodes, designing efficient routing protocol is very critical. In this paper, we illustrate the existing routing protocol for wireless sensor network using data centric approach and present performance analysis of these protocols. The paper focuses in the performance analysis of specific protocol namely Directed Diffusion and SPIN. This analysis reveals that the energy usage is important features which need to be taken into consideration while designing routing protocol for wireless sensor network.

Keywords: Data Centric Approach, Directed Diffusion, SPIN WSN Routing Protocol.

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 2490
1 Induction of Apoptosis by Newcastle Disease Virus Strains AF220 and V4-UPM in Human Promyelocytic Leukemia (HL60) and Human T-Lymphoblastic Leukemia (CEM-SS) Cells

Authors: Siti Aishah Abu Bakar, Madihah Zawawi, Abdul Manaf Ali, Aini Ideris

Abstract:

Newcastle Disease Virus (NDV), an avian paramyxovirus, is a highly contagious, generalised virus disease of domestic poultry and wild birds characterized by gastro-intestinal, respiratory and nervous signs. In this study, it was shown that NDV strain AF2240 and V4-UPM are cytolytic to Human Promyelocytic Leukemia, HL60 and Human T-lymphoblastic Leukemia, CEM-SS cells. Results from MTT cytolytic assay showed that CD50 for NDV AF2240 against HL60 was 130 HAU and NDV V4-UPM against HL60 and CEM-SS were 110.6 and 150.9 HAU respectively. Besides, both strains were found to inhibit the proliferation of cells in a dose dependent manner. The mode of cell death either by apoptosis or necrosis was further analyzed using acridine orange and propidium iodide (AO/PI) staining. Our results showed that both NDV strains induced primarily apoptosis in treated cells at CD50 concentration. In conclusion, both NDV strains caused cytolytic effects primarily via apoptosis in leukemia cells.

Keywords: Apoptosis, Cytolytic, Leukaemia, Newcastle DiseaseVirus

Procedia APA BibTeX Chicago EndNote Harvard JSON MLA RIS XML ISO 690 PDF Downloads 1927