Abdullah Yasin Nur

Abdullah Yasin Nur
University of New Orleans | UNO · Department of Computer Science

PhD

About

17
Publications
5,226
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
194
Citations
Introduction
I am an Assistant Professor in the Department of Computer Science at the University of New Orleans. I received my Ph.D. degree in Computer Science from the University of Louisiana at Lafayette in 2018. My research interests are Network Measurement and Analysis, Network Topology Discovering and Modeling, Network Security and Graph Theory.
Additional affiliations
August 2014 - December 2018
University of Louisiana at Lafayette
Position
  • PhD

Publications

Publications (17)
Conference Paper
Full-text available
This paper introduces a new approach for detecting unusual activities in network traffic, a critical aspect in maintaining network security. We propose an innovative model that combines the strengths of Contractive Autoencoders (CAEs) and K-means clustering, specifically designed for effective anomaly detection in network environments. Our model em...
Conference Paper
Full-text available
Securing Internet of Things (IoT) devices against threats is crucial due to their significant impact on cyber-physical systems. Traditional intrusion detection systems often fall short in protecting the vast and diverse array of IoT devices. One key limitation is their lack of an anomaly detection objective, which is essential for identifying sophi...
Article
Full-text available
Due to the extensive use and evolution in the cyber world, different network attacks have recently increased significantly. Distributed Denial-of-Service (DDoS) attack has become one of the fatal threats to the Internet, where attackers send massive amounts of packets to the target system to make online systems unavailable to legitimate users. Prop...
Conference Paper
Full-text available
The design of IP protocol creates difficulties in identifying the true source of any packet, which makes it one of the most arduous problems to defend against Denial of Service (DoS) attacks. This paper introduces an Autonomous System (AS) traceback mechanism based on probabilistic packet marking, which allows the victim to trace the attack-origina...
Article
Full-text available
The Internet not only facilitates our daily activities, such as communication, entertainment and shopping but also serves as the enabling technology for many critical services, including finance, manufacturing, healthcare and transportation. On the other hand, a wide spectrum of attacks targets its communication infrastructure to disable or disrupt...
Article
Full-text available
The Internet is a network of networks consisting of tens of thousands of Autonomous Systems (ASes). These ASes connect to each other in different forms to enable the “global” Internet communication. In this study, we investigate the geographical characteristics of the visible Internet as well as examine the relation between geography and intra-AS a...
Article
Full-text available
The global communication infrastructure of the Internet is formed by tens of thousands of Autonomous Systems (ASes) connecting various organizations and individuals together. In the last two decades researchers have developed many techniques to infer the topology of individual ASes as well as the whole Internet at the interface, router, subnet, poi...
Article
Full-text available
The Internet introduces a variety of vulnerabilities that put the security and privacy of computer based systems under risk. One of the most perilous threats in the Internet is the Denial of Service (DoS) attack and its variants such as Distributed DoS (DDoS).In this work we propose a novel probabilistic packet marking scheme to infer forward paths...
Conference Paper
Full-text available
Recent advances in Cyber-Physical Systems (CPSs) promote the Internet as the main communication technology for monitoring, controlling and managing the physical entities as well as exchanging information between the physical entities and human users. On the other hand, the Internet introduces a variety of vulnerabilities that may put the security a...

Network

Cited By