Khairul Akram Zainol Ariffin

Khairul Akram Zainol Ariffin
Universiti Kebangsaan Malaysia | ukm · Research Center for Cyber Security

Doctor of Philosophy

About

32
Publications
26,339
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
465
Citations
Citations since 2016
29 Research Items
463 Citations
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
2016201720182019202020212022050100150200
Introduction
Khairul Akram Zainol Ariffin currently works at the Research Center for Cyber Security, National University of Malaysia. Khairul Akram does research in Cyber Security and Reliability, Digital Forensics, and Algorithms

Publications

Publications (32)
Article
Full-text available
The nonlinear system of equations (NSE) is the basis of many engineering and scientific models. However, these models must have accurate solutions to be successful. Several optimization algorithms, including Butterfly Optimization Algorithm (BOA), can be applied to solving NSE problems. However, optimization algorithms lack accurate solutions due t...
Article
Full-text available
Cyberattacks have changed dramatically and have become highly advanced. This latest phenomenon has a massive negative impact on organizations, such as financial losses and shutting-down of operations. Therefore, developing and implementing the Cyber Security Operations Centre (SOC) is imperative and timely. Based on previous research, there are no...
Article
In recent years, the demand for computer networks has grown rapidly, thus allowing for higher risk of novel attack incidents. Traditional network intrusion detection systems (IDSs) usually have difficulties detecting these attacks because they need to adapt to more advanced or challenging technologies of novel attacks, yet updating them can be comp...
Article
Full-text available
Systems of nonlinear equations are known as the basis for many models of engineering and data science, and their accurate solutions are very critical in achieving progress in these fields. However, solving a system with multiple nonlinear equations, usually, is not an easy task. Consequently, finding a robust and accurate solution can be a very cha...
Article
Network security is a mechanism of protecting the usability and integrity of any given network and its transmitted data. Network security's effectiveness is crucial to the network environment to ensure it is free from any threat, especially in the critical infrastructure (CI). The supervisory control and data acquisition systems in the CI are getti...
Conference Paper
The steady growth of cryptowallets users and the widespread of cryptocurrencies adoption has inadvertently risen the numbers of cybercrime. The decentralized and pseudo-anonymous nature of cryptocurrencies impose a unique challenge to the investigators. Unlike investigation on fiat currency where banks can be contacted to freeze account, cryptocurr...
Conference Paper
In the recent few years, data communication through the Internet of Things (IoT) network is increased exponentially. However, the data is prone to several attacks on the network. The most popular attacks are eavesdropping, replay, man-in-the-middle attack, etc. To prevent these attacks, cryptography algorithms are used. The devices are deployed in...
Article
Full-text available
The study of malware behaviors, over the last years, has received tremendous attention from researchers for the purpose of reducing malware risks. Most of the investigating experiments are performed using either static analysis or behavior analysis. However, recent studies have shown that both analyses are vulnerable to modern malware files that us...
Chapter
Crimes related to cryptocurrencies are on the rise. In Malaysia, reported losses is increasing from USD2.67 million in 2017 to USD55.32 million in 2018. This raise a concern whether the current process, tools and trainings are sufficient for Malaysian investigators to conduct cryptocurrencies forensics. A survey questionnaire was conducted to answe...
Article
The introduction of Industrial Revolution 4.0 (IR 4.0) brings benefits to the industries and our daily life. Innovation such as the Internet of Things, cloud computing, and blockchain is not only confined to the manufacturing industry but covers the whole of human life. Notwithstanding the said innovation, it also gives rise to cybercrimes with the...
Article
Full-text available
The Industrial Internet of things (IIoT) helps several applications that require power control and low cost to achieve long life. The progress of IIoT communications, mainly based on cognitive radio (CR), has been guided to the robust network connectivity. The low power communication is achieved for IIoT sensors applying the Low Power Wide Area Net...
Article
Full-text available
The Internet of Things (IoT) is susceptible to several identities, primarily based on attacks. However, these attacks are controlling for IoT due to extraordinary growth in consumers' density and slight analysis with low power access nodes. In this work, we explore the possible flaws associated with security for IoT environment insensitively meant...
Article
Full-text available
The significant increase in technology development over the internet makes network security a crucial issue. An intrusion detection system (IDS) shall be introduced to protect the networks from various attacks. Even with the increased amount of works in the IDS research, there is a lack of studies that analyze the available IDS datasets. Therefore,...
Chapter
Cloud computing is widely used but with an undefined term for a multitude of different resources that are automatically distributed. Cloud computing can be called a double edge weapon from law enforcement and forensic investigation standpoint. Digital evidence collected from cloud sources, on the one hand, can present complex technical and cross-ju...
Article
Full-text available
The rapid increase in data volume and features dimensionality have a negative influence on machine learning and many other fields, such as decreasing classification accuracy and increasing computational cost. Feature selection technique has a critical role as a preprocessing step in reducing these issues. It works by eliminating the features that m...
Article
Full-text available
Cuttlefish algorithm (CFA) is a metaheuristic bio-inspired algorithm that mimics the color-changing behavior by the cuttlefish. It is produced by light reflected from different layers of cells and involves two processes, i.e., reflection and visibility. The reflection process simulates the light reflection mechanism, while the visibility process si...
Article
Full-text available
The need to detect malware before it harms computers, mobile phones and other electronic devices has caught the attention of researchers and the anti-malware industry for many years. To protect users from malware attacks, anti-virus software products are downloaded on the computer. The anti-virus mainly uses signature-based techniques to detect mal...
Article
Recently, an active development of network communication technology has brought inspiration to new cyber-attack such as malware. This possesses a massive threat to network organization, users and security. Consequently, many researchers have developed novel algorithms for attack detection. Nevertheless, they still face the problem of building relia...
Article
Full-text available
Now a day the threat of malware is increasing rapidly. A software that sneaks to your computer system without your knowledge with a harmful intent to disrupt your computer operations. Due to the vast number of malware, it is impossible to handle malware by human engineers. Therefore, security researchers are taking great efforts to develop accurate...
Article
Full-text available
Gait recognition using the energy image representation of the average silhouette image in one complete cycle becomes a baseline in model-free approaches research. Nevertheless, gait is sensitive to any changes. Up to date in the area of feature extraction, image feature representation method based on the spatial gradient is still lacking in efficie...
Article
Full-text available
p>Pedestrian detection is one of the important features in autonomous ground vehicle (AGV). It ensures the capability for safety navigation in urban environment. Therefore, the detection accuracy became a crucial part which leads to implementation using Laser Range Finder (LRF) for better data representation. In this study, an improved laser config...
Article
Full-text available
Wireless sensor networks, due to their nature, are more prone to security threats than other networks. Developments in WSNs have led to the introduction of many protocols specially developed for security purposes. Most of these protocols are not efficient in terms of putting an excessive computational and energy consumption burden on small nodes in...
Article
Full-text available
In this paper, a fully automatic 2.5D facial technique for forensic applications is presented. Feature extraction and classification are fundamental processes in any face identification technique. Two methods for feature extraction and classification are proposed in this paper subsequently. Active Appearance Model (AAM) is one of the familiar featu...
Article
Full-text available
Over the past few years, memory analysis has been an issue that has been discussed in digital forensics. With the introduction of cloud computing, the analysis on memory has become critical as the hard disk is no longer the primary choice to store information and data on the computer system. The online storages with password protected such as ADriv...
Conference Paper
Full-text available
Over the past few years, memory analysis has been an issue that has been discussed in digital forensics. A number of tools have been released that focus on memory acquisition of Windows system. However, the implementation of memory analysis is still limited as it encounters a lot of difficulties. The aim of this paper is to outline one of the diffi...

Network

Cited By

Projects

Projects (4)
Project
Feature Selection: The purpose is to select the least number of benign and malicious features that can provide the highest classification accuracy and low positive rate. Also, it can reduce the complexity of the detection model.