Ahsan Ayub
Ahsan Ayub
Doctor of Philosophy
Computer Science Ph.D. from Tennessee Tech University | Focused in Cybersecurity & Artificial Intelligence
About
14
Publications
15,536
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
146
Citations
Introduction
I earned Ph.D. in Computer Science from Tennessee Tech University with an emphasis on Cybersecurity and Machine Learning. Throughout my doctoral research, I contributed to the experimental research of static and dynamic ransomware analysis to develop multi-layered endpoint protection for prompt and robust detection on Windows environment by incorporating Machine Learning and Reverse Engineering techniques.
Education
August 2018 - May 2023
August 2018 - May 2022
May 2013 - February 2017
Publications
Publications (14)
Large Language Models (LLMs) are seeing significant adoption in every type of organization due to their exceptional generative capabilities. However, LLMs are found to be vulnerable to various adversarial attacks, particularly prompt injection attacks, which trick them into producing harmful or inappropriate content. Adversaries execute such attack...
The everlasting fight between security researchers and ransomware authors, including cyber criminals who leverage ransomware to cripple organizations worldwide, has continued to evolve as novel techniques are used to evade ransomware detection. The victim not only endures paramount financial loss from business downtime for several days and/or payin...
Industries of diverse sizes, ranging from retail to critical infrastructure, are experiencing a worldwide upswing in ransomware attacks. On a daily basis, ransomware researchers encounter fresh samples and uncover novel ransomware families in the wild. This research investigates ransomware's I/O Request Packet (IRP), a low-level file system I/O log...
Ransomware attacks have captured news headlines worldwide for the last few years due to their criticality and intensity. Ransomware-as-a-service (RaaS) kits are aiding adversaries to launch such powerful attacks with little to no technical knowledge. Eventually, with the successful progression of ransomware attacks, organizations suffer financial l...
Threats, posed by ransomware, are rapidly increasing, and its cost on both national and global scales is becoming significantly high as evidenced by the recent events. Ransomware carries out an irreversible process, where it encrypts victims' digital assets to seek financial compensations. Adversaries utilize different means to gain initial access...
The use of Intrusion Detection System (IDS) as one
of the most trusted layers of security to an organization to defend
against all sorts of cyber attacks is ubiquitous. The uniqueness
as well as the severity of recent cyber threats is significant. The
ability of state-of-the-art machine learning techniques to discover
new types of malicious network...
In recent times, there has been a global surge of ransomware attacks targeted at industries of various types and sizes from retail to critical infrastructure. Ransomware researchers are constantly coming across new kinds of ransomware samples everyday and discovering various novel ransomware families out in the wild. To mitigate this ever-growing m...
Intrusion Detection Systems (IDS) have a long history as an effective network defensive mechanism. The systems alert defenders of suspicious and / or malicious behavior detected on the network. With technological advances in AI over the past decade, machine learning (ML) has been assisting IDS to improve accuracy, perform better analysis, and disco...
RSA algorithm is an asymmetric encryption algorithm used to maintain confidentiality and integrity of data as it is transported across networks. As time has gone on, security and confidentiality has grown in importance leading to more data requiring encryption. Parallelization has become an important aspect in improving the speed and efficiency of...
Network covert channels are used in various cyber-attacks, including disclosure of sensitive information and enabling stealth tunnels for botnet commands. With time and technology, covert channels are becoming more prevalent, complex, and difficult to detect. The current methods for detection are protocol and pattern specific. This requires the inv...
Constraint Satisfaction Problem (CSP) is observed in various applications, i.e., scheduling problems, timetabling problems, assignment problems, etc. Researchers adopt a CSP technique to tackle a certain problem; however, each technique follows different approaches and ways to solve a problem network. In this exhaustive study, it has been possible...