Ahsan Ayub

Ahsan Ayub

Doctor of Philosophy
Computer Science Ph.D. from Tennessee Tech University | Focused in Cybersecurity & Artificial Intelligence

About

14
Publications
15,536
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
146
Citations
Introduction
I earned Ph.D. in Computer Science from Tennessee Tech University with an emphasis on Cybersecurity and Machine Learning. Throughout my doctoral research, I contributed to the experimental research of static and dynamic ransomware analysis to develop multi-layered endpoint protection for prompt and robust detection on Windows environment by incorporating Machine Learning and Reverse Engineering techniques.
Education
August 2018 - May 2023
Tennessee Technological University
Field of study
  • Computer Science
August 2018 - May 2022
Tennessee Technological University
Field of study
  • Computer Science
May 2013 - February 2017
American International University-Bangladesh
Field of study
  • Computer Science & Engineering

Publications

Publications (14)
Conference Paper
Full-text available
Large Language Models (LLMs) are seeing significant adoption in every type of organization due to their exceptional generative capabilities. However, LLMs are found to be vulnerable to various adversarial attacks, particularly prompt injection attacks, which trick them into producing harmful or inappropriate content. Adversaries execute such attack...
Conference Paper
Full-text available
The everlasting fight between security researchers and ransomware authors, including cyber criminals who leverage ransomware to cripple organizations worldwide, has continued to evolve as novel techniques are used to evade ransomware detection. The victim not only endures paramount financial loss from business downtime for several days and/or payin...
Conference Paper
Full-text available
Industries of diverse sizes, ranging from retail to critical infrastructure, are experiencing a worldwide upswing in ransomware attacks. On a daily basis, ransomware researchers encounter fresh samples and uncover novel ransomware families in the wild. This research investigates ransomware's I/O Request Packet (IRP), a low-level file system I/O log...
Article
Full-text available
Ransomware attacks have captured news headlines worldwide for the last few years due to their criticality and intensity. Ransomware-as-a-service (RaaS) kits are aiding adversaries to launch such powerful attacks with little to no technical knowledge. Eventually, with the successful progression of ransomware attacks, organizations suffer financial l...
Conference Paper
Full-text available
Threats, posed by ransomware, are rapidly increasing, and its cost on both national and global scales is becoming significantly high as evidenced by the recent events. Ransomware carries out an irreversible process, where it encrypts victims' digital assets to seek financial compensations. Adversaries utilize different means to gain initial access...
Conference Paper
The use of Intrusion Detection System (IDS) as one of the most trusted layers of security to an organization to defend against all sorts of cyber attacks is ubiquitous. The uniqueness as well as the severity of recent cyber threats is significant. The ability of state-of-the-art machine learning techniques to discover new types of malicious network...
Conference Paper
Full-text available
In recent times, there has been a global surge of ransomware attacks targeted at industries of various types and sizes from retail to critical infrastructure. Ransomware researchers are constantly coming across new kinds of ransomware samples everyday and discovering various novel ransomware families out in the wild. To mitigate this ever-growing m...
Conference Paper
Full-text available
Intrusion Detection Systems (IDS) have a long history as an effective network defensive mechanism. The systems alert defenders of suspicious and / or malicious behavior detected on the network. With technological advances in AI over the past decade, machine learning (ML) has been assisting IDS to improve accuracy, perform better analysis, and disco...
Conference Paper
Full-text available
RSA algorithm is an asymmetric encryption algorithm used to maintain confidentiality and integrity of data as it is transported across networks. As time has gone on, security and confidentiality has grown in importance leading to more data requiring encryption. Parallelization has become an important aspect in improving the speed and efficiency of...
Conference Paper
Full-text available
Network covert channels are used in various cyber-attacks, including disclosure of sensitive information and enabling stealth tunnels for botnet commands. With time and technology, covert channels are becoming more prevalent, complex, and difficult to detect. The current methods for detection are protocol and pattern specific. This requires the inv...
Conference Paper
Full-text available
Constraint Satisfaction Problem (CSP) is observed in various applications, i.e., scheduling problems, timetabling problems, assignment problems, etc. Researchers adopt a CSP technique to tackle a certain problem; however, each technique follows different approaches and ways to solve a problem network. In this exhaustive study, it has been possible...

Network

Cited By