
Azizol AbdullahUniversiti Putra Malaysia | UPM · Faculty of Computer Science and Information Technology
Azizol Abdullah
Doctor of Philosophy
About
188
Publications
79,499
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,597
Citations
Introduction
Security in Cloud based Application such as IoT, Healthcare, Big Data Analytic and others related to distributed system security
Publications
Publications (188)
In the era of big data, managing dynamic data flows efficiently is crucial as traditional storage models struggle with real-time regulation and risk overflow. This paper introduces Data Dams, a novel framework designed to optimize data inflow, storage, and outflow by dynamically adjusting flow rates to prevent congestion while maximizing resource u...
Random number generation plays a vital role in cryptographic systems and computational applications, where uniformity, unpredictability, and robustness are essential. This paper presents the Entropy Mixing Network (EMN), a novel hybrid random number generator designed to enhance randomness quality by combining deterministic pseudo-random generation...
This paper discusses a simulation based file replication for Malaysian Research and Education Network (MYREN) Data Grid topology. This simulation evaluates a novel replication strategy, based on an economic model, which optimizes both the selection of replicas for running jobs and the dynamic creation of replicas in MYREN Grid sites. The optimizati...
Replication is a useful technique for distributed database systems and has been implemented in EU data grid and HEP in CERN for handling huge data access. Replica selection in their prototypes still can be enhanced to provide high availability, fault tolerant and low in communication cost. This paper introduces a new replica control protocol, named...
Disaster recovery is a persistent problem in IT platforms. This problem is more crucial in cloud computing, because Cloud Service Providers (CSPs) have to provide the services to their customers even if the data center is down, due to a disaster. In the past few years, researchers have shown interest to disaster recovery using cloud computing, and...
This review article provides a comprehensive analysis of the latest advancements and persistent challenges in Software-Defined Wide Area Networks (SD-WANs), with a particular emphasis on the multi-objective Controller Placement Problem (CPP). As SD-WAN technology continues to gain prominence for its capacity to offer flexible and efficient network...
In the context of widespread global information sharing, information security andprivacy protection have become focal points. Steganographic systems enhanceinformation security by embedding confidential information into public carriers; however, existing generative text steganography methods face challenges inhandling the long-tail distribution of...
Spam detection is a critical cybersecurity and information management task with significant implications for security decision-making processes. Traditional machine learning algorithms such as Logistic Regression (LR), K-Nearest Neighbors (KNN), Decision Trees (DT), and Support Vector Machines (SVM) have been employed to mitigate this challenge. Ho...
In the context of widespread global information sharing, information security and privacy protection have become focal points. Steganographic systems enhance information security by embedding confidential information into public carriers; however, existing generative text steganography methods face challenges in handling the long-tail distribution...
The Internet of Medical Things (IoMT) brings advanced patient monitoring and predictive analytics to healthcare but also raises cybersecurity and data privacy issues. This paper introduces a deep-learning model for IoMT intrusion detection, utilizing the WUSTL EHMS 2020 dataset, which focuses on cyber threats like man-in-the-middle attacks and data...
Data leakage during machine learning (ML) preprocessing is a critical issue where unintended external information skews the training process, resulting in artificially high-performance metrics and undermining model reliability. This study addresses the insufficient exploration of data leakage across diverse ML domains, highlighting the necessity of...
The ongoing challenge against network security issues persists, necessitating the exploration of alternative approaches. Anomaly-based strategies, diverging from traditional signature-based methods, gain popularity for their effectiveness in detecting new attacks. However, accurately defining normal network behavior becomes increasingly challenging...
This article presents an evaluation of BukaGini, a stability-aware Gini index feature selection algorithm designed to enhance model performance in machine learning applications. Specifically, the study focuses on assessing BukaGini’s effectiveness within the domain of intrusion detection systems (IDS). Recognizing the need for improved feature inte...
Cyber warfare has emerged as a critical aspect of modern conflict, as state and non-state actors increasingly leverage cyber capabilities to achieve strategic objectives. The rapidly evolving cyber threat landscape demands robust and adaptive approaches to protect against advanced cyberattacks and mitigate their impact on national security. Traditi...
The Internet of Things (IoT) and cloud computing are rapidly gaining momentum as decentralized internet-based technologies and have led to an increase in information in nearly every technical and commercial industry. However, ensuring the security of IoT systems is a pressing issue due to the complexities involved in connected and shared environmen...
Food security, as defined by the United Nations' Committee on World Food Security, means that “all people, at all times, have physical, social, and economic access to sufficient, safe, and nutritious food that meets their food preferences and dietary needs for an active and healthy life”. Food security is not just ensuring food sufficiency, but als...
Turnkey technology has emerged as a game-changing tool in cyber warfare, offering state and non-state actors unprecedented access to advanced cyber capabilities. The advantages of turnkey technology include rapid deployment and adaptability, lower costs and resource requirements, the democratization of cyber warfare capabilities, and enhanced offen...
This paper investigates the challenges and opportunities of implementing the African Union Convention on Cyber Security and Personal Data Protection (AUDPC) across Africa. Focusing on legal, regulatory, technical, infrastructural, capacity building, awareness, Harmonization, and cross-border cooperation challenges, the paper identifies key findings...
This paper proposes a lightweight machine learning (ML) based spam detection model using word frequency patterns and the Random Forest (RF) algorithm to address the limitations of existing methods. The proposed model considers the class imbalance issue through a random oversampling strategy to improve the efficiency and effectiveness of spam detect...
In this paper, we investigate the impact of pattern leakage during data preprocessing on the reliability of Machine Learning (ML) based intrusion detection systems (IDS). Data leakage, also known as pattern leakage, occurs during data preprocessing when information from the testing set is used in training, leading to overfitting and inflated accura...
Reliable processing capacity and flexible storage space make Cloud computing the most recent favourable technology. Many organizations have converted their conventional processing data centre to a Cloud data centre. Cloud computing provides promising execution and storage, which leads to massive growth in processing demand by Cloud users. It makes...
Cyber security has recently garnered enormous attention due to the popularity of the Internet of Things (IoT), intelligent devices’ rapid growth, and a vast number of real-life applications. As a result, detecting threats and constructing an efficient Intrusion detection system (IDS) have become crucial in today's security requirements. Withal, the...
Internet of Things networks (IoT) are becoming very important in industrial, medical, and commercial applications. The security aspect of IoT networks is critical, especially the authentication of the devices in the network. The current security model in IoT networks uses centralized key exchange servers that present a security weak point. IoT netw...
Data communication over the Internet has increased significantly, resulting in high data traffic and concerns over data security. Information sent over the Internet always gets the attention of intruders, which causes the effort to increase the security of sensitive data and the need to prevent leakage. Steganography is one of the techniques to pro...
To realise the true potential of Grid computing, resource management is playing a crucial role. Nevertheless, due to the nature of dynamism and heterogeneity in Grid computing, Grid resource management with the capability of effective and efficient load distribution and balancing remains a challenge. In this study, a dynamic load balancing algorith...
Feature interaction is a vital aspect of Machine Learning (ML) algorithms, and gaining a deep understanding of these interactions can significantly enhance model performance. This paper introduces the BukaGini algorithm, an innovative and robust approach for feature interaction analysis that capitalizes on the Gini impurity index. By exploiting the...
As the amount of data continues to grow rapidly, the variety of data produced by applications is becoming more affluent than ever. Cloud computing is the best technology evolving today to provide multi-services for the mass and variety of data. The cloud computing features are capable of processing, managing, and storing all sorts of data. Although...
Due to the increased usage of the Internet of Things and heterogeneous distributed devices, the development of effective and reliable intrusion detection systems (IDS) has become more critical. The massive volume of data with various dimensions and security features, on the other hand, can influence detection accuracy and raise the computation comp...
In the past few years nature-inspired algorithms are experiencing rapid growth where most optimisation problems in different domains are addressed using it. As a result of this development come the issue of handling a complex optimisation problem within a short period remains very difficult. Symbiotic organisms search (SOS) algorithm is one of the...
Internet of Things (IoT) networks are large peer-to-peer networks of small devices that require a competent security system that is scalable and adaptable to the limited resources of the IoT devices. Node authentication is a crucial part of IoT security. The current authentication solutions require a centralized trusted party for authentication, wh...
Model-based testing is a substantial approach that is based on and involving models. It is well known for achieving test coverage and for generating and executing test cases automatically. The main and core activity of model-based testing is the modelling activity. Models are used to explain and represent the behaviour of the product. The requireme...
Domain Generation Algorithm (DGA) has been used by botnets to obfuscate the connections between the bot master and its bots. The recent DGAs, namely dictionary-based, or word-list DGAs are more sophisticated and difficult to detect. They have high resemblance with the legit domain names as they use a set of words from the dictionary to construct me...
Effective and efficient management of the Software-Defined networks (SDN) requires that the controller has the current or detailed information on the network, and its topology. The controller achieves topology discovery in SDN when an appropriate channel; that permits all network devices and communication channels between links to be recognized by...
Cloud Computing is a mass platform to serve high volume data from multi-devices and numerous technologies. Cloud tenants have a high demand to access their data faster without any disruptions. Therefore, cloud providers are struggling to ensure every individual data is secured and always accessible. Hence, an appropriate replication strategy capabl...
Digital data is establishing enormously across the globe, which is considered highly valuable due to its significant contributions to facilitate different individuals’ lives. Even though technology evolving rapidly, data availability remains a major challenge due to the heterogeneity of the data with different types, platforms, and technologies. Ad...
By successfully infecting certain numbers of nodes in an Internet of Things (IoT) platform, botmaster often relies on specific bots (infected nodes) to scan and gather information about the target nodes for onward propagation of the attack. Therefore, the bot’s processing capability to scan and executes the botmaster’s instructions relied on its me...
The Acknowledgements section in the initial online publication was incomplete. The original article has been corrected.
Recently, cloud computing has begun to experience tremendous growth because government agencies and private organisations are migrating to the cloud environment. Hence, having a task scheduling strategy that is efficient is paramount for effectively improving the prospects of cloud computing. Typically, a certain number of tasks are scheduled to us...
An intrusion detection system (IDS) is an active research topic and is regarded as one of the important applications of machine learning. An IDS is a classifier that predicts the class of input records associated with certain types of attacks. In this article, we present a review of IDSs from the perspective of machine learning. We present the thre...
An intrusion detection system (IDS) is an active research topic and is regarded as one
of the important applications of machine learning. An IDS is a classifier that predicts the class of input records associated with certain types of attacks. In this article, we present a review of IDSs from the perspective of machine learning. We present the thre...
Energy saving, and clock synchronization are critical to Internet of Things (IoT). In recent time, several energy efficient clock synchronization techniques have been proposed by different authors with the aim of finding solution to energy saving in IoT network. However, some of this technique (R-sync) utilizes a lot of energy with unsynchronized n...
A crucial performance concern in distributed decentralized environments, like clouds, is how to guarantee that jobs complete their execution within the estimated completion times using the available resources' bandwidth fairly and efficiently while considering the resource performance variations. Formerly, several models including reservation, migr...
Attackers, spread all around the world, have become a major threat to SCADA systems, since they started using opened-standard networks, integrated to corporate networks and accessing the Internet. It is true that there are also many different security solutions and techniques available, such as firewalls, encryption, network traffic analysis and a...
Existing stream data learning models with limited labeling have many limitations, most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data, which is called concept drift. Hence, the algorithm must overcome the problem of dynamic update in the internal parameters or countering the concept drift. Howe...
Existing stream data learning models with limited labeling have many limitations, most importantly, algorithms that suffer from a limited capability to adapt to the evolving nature of data, which is called concept drift. Hence, the algorithm must overcome the problem of dynamic update in the internal parameters or countering the concept drift. Howe...
This article provides a systematic review of Bring Your Own Device (BYOD) authentication technique. The review main goal is to identify the existing BYOD authentication technique and to categorize the technique according to BYOD security threat as well as to analyze the technique limitation. The review result shows that there are 25 authentication...
Water is probably the oldest factor receiving attention from the population, since the beginning of the human race. The evolution of water supply systems is directly related to the urban growth of the cities and their geographical location. This study focuses on SCADA (Supervisory Control And Data Acquisition) systems used to control and managing w...
In this paper, we evaluate Round Trip Time (RTT) estimation of MultiPath Transport (MPT) using Concurrent Multipath Transfer Stream Control Transport Protocol (CMT-SCTP) over asymmetric paths. Our results show that Delayed Acknowledgement for CMT (DAC) overly conservative behavior adversely affects RTT estimation. Accordingly, we present a strategy...
In this paper, we evaluate different heuristic retransmission strategies for MultiPath Transport using Concurrent Multipath Transfer Stream Control Transport Protocol over asymmetric paths. Our results show that for better timeliness of data the combination of loss rate and delay should take into consideration. Accordingly, we present the Rtx-HYBRI...
Nodes in wireless sensor networks (WSN) are characterized particularly by their limited power and memory capabilities. Limited memory is an important parameter as it defines the size of the operating system and the processing code. As established previously, energy and memory efficiency is the most important evaluation factors of WSNs as they are d...
In mobile cloud computing (MCC), data are stored and processed by more powerful computing platforms located in clouds to enhance the capability of mobile devices. Although MCC brings many benefits to users and organizations, security has become the main concern for MCC because it involves third party environment where data confidentiality is not a...
Considering the large number of devices connected to the Internet of Things(IoT), identifying malicious devices for the purpose of "search & seizure" remainsa critical issue for digital investigators. Consequently, the need for techniques that automatically identify malicious devices can speed up the process of digital investigation. However, few c...
The increasing demand for network applications, such as teleconferencing, multimedia messaging and mobile TV, which have diverse requirements, has resulted in the introduction of Long Term Evolution (LTE) by the Third Generation Partnership Project (3GPP). LTE networks implement resource allocation algorithms to distribute radio resource to satisfy...
BYOD is a practice by many organizations where employees can use their personal devices for work purpose. BYOD may bring a lot of advantages, but it also leads to security issues such as data leakages. Data can be leaked because of the weak authentication technique used to verify the user and the device. A secure authentication technique is what th...
WiMAX networks offer quality assurance for various communication services, such as Voice over IP (VoIP), Video on Demand (VoD), File Transfer Protocol (FTP), and Hyper Text Transfer Protocol (HTTP). Over the past few years, communication services, such as streaming audio, video, and multimedia for residential and business users, have experienced ra...
Many organizations implement BYOD without understanding the risks they face. Every year, many cases involving data leakage happen in the organization due to a lack of understanding of security. Organizations always focus on user authentication only for accessing the BYOD environment without having a comprehensive security solution that covers most...
Many organizations implement BYOD without understanding the risks they face. Every year, many cases involving data leakage happen in the organization due to a lack of understanding of security. Organizations always focus on user authentication only for accessing the BYOD environment without having a comprehensive security solution that covers most...
The IoT network is a decentralized type of network which can sense information and transmit the information to a base station. Due to small size of the sensor nodes, energy consumption and security is seen as the major challenget o the IoT network. The LEACH is the energy efficient protocol which can divide the whole network into fixed size cluster...
Provision Quality of Service (QoS) is a crucial challenge in any vehicular multimedia wireless application. In wireless applications, maintaining QoS requirements of various calls is a more challenging issue because of the concurrent need to prioritize the handoff calls and new calls trying to access the network. In this paper, a novel call admissi...
When some intermediate nodes fail or are suddenly removed in a mobile IP network, a node failure can disconnect paths and decrease network efficiency due to loss of some packets. In this case, the movement of the remaining nodes must be controlled such that to prevent further network efficiency drop. In the present research, we will study the inter...
The Vehicular Ad hoc Networks are a special type of ad hoc network, which along with lacking in infrastructure, contain communicating entities that move with different accelerations. Hence, this obstructs the establishment of more consistent end-to-end communicating pathways and efficiently transferring data. Therefore, the VANETs display many netw...