Maheyzah Md Siraj

Learn More
As security threats change and advance in a drastic way, most of the organizations implement multiple Network Intrusion Detection Systems (NIDSs) to optimize detection and to provide comprehensive view of intrusion activities. But NIDSs trigger a massive amount of alerts even for a day and overwhelmed security experts. Thus, automated and intelligent(More)
Information technology and information system have been used widely in many fields such as in business, education, marketing, transportation and medical. Security aspect plays a vital role and thus turns into a challenging issue. The security should be readily installed and resistance to various numbers of potential attacks likes Spyware, Phishing / Spam(More)
As security threats change and advance in a drastic way, most of the organizations implement multiple Network Intrusion Detection Systems (NIDSs) to optimize detection and to provide comprehensive view of intrusion activities. But NIDSs trigger a massive amount of alerts even for a day and overwhelmed security experts. Thus, automated and intelligent(More)
Grouping and clustering alerts for intrusion detection based on the similarity of features is referred to as structurally base alert correlation and can discover a list of attack steps. Previous researchers selected different features and data sources manually based on their knowledge and experience, which lead to the less accurate identification of attack(More)
As security threats advance in a drastic way, most of the organizations implement multiple Network Intrusion Detection Systems (NIDSs) to optimize detection and to provide comprehensive view of intrusion activities. But NIDSs trigger a massive amount of alerts even for a day and overwhelmed security experts. Thus, automated and intelligent clustering is(More)
Recognizing pattern of handwriting has long been identified as a difficult problem needs to be solved by a computer. The main challenges are handwriting dynamicity and various forms or shapes of alphabet. Thus, computer requires several complex processes which are image processing, feature extraction and alphabets recognition. This research proposes an(More)
This paper provides a fair comparison between four most common symmetric key cryptography algorithms: AES, DES, CAST 128 and Blowfish. The comparison takes into consideration the behavior and the performance of the algorithm when different data load are used as the main concern here, is to study the performance of the algorithms under different settings.(More)
As security threats advance in a drastic way, most of the organizations implemented multiple Network Intrusion Detection Systems (NIDSs) to optimize detection and to provide comprehensive view of intrusion activities. But NIDSs trigger a massive amount of alerts even for a day and overwhelmed security experts. Thus, automated and intelligent clustering is(More)
As security threats advance in a drastic way, most of the organizations apply various intrusion detection systems (IDSs) to optimize detection and to provide comprehensive view of intrusion activities. But IDS produces huge number of duplicated alerts information that overwhelm security operator. Alert aggregation addresses this issue by reducing, fusing(More)
Most of the organizations implemented various security sensors for increased information security and assurance. A popular choice is Network Intrusion Detection Systems (NIDSs). Unfortunately, NIDSs trigger a massive amount of alerts even for a day and overwhelmed security experts. Worse, a large number of these alerts are false positives, and redundant(More)
  • 1