
Mahmoud Said Elsayed- Doctor of Philosophy
- Information Security at University College Dublin
Mahmoud Said Elsayed
- Doctor of Philosophy
- Information Security at University College Dublin
About
25
Publications
27,825
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,514
Citations
Introduction
Mahmoud Said Elsayed currently works at the School of Computer Science, University College Dublin. Mahmoud does research in Their current project is 'machine learning SDN'.
Current institution
Publications
Publications (25)
Exploiting modern software requires sophisticated attack vectors to bypass software protection mechanisms. Code-reuse Attacks (CRAs) are a widely used approach to attack modern software, even after applying memory protection defenses. The underlying vulnerabilities in the software codes or design enable the use of the program’s own code and manipul...
Ransomware is a type of malicious software that encrypts a victim’s files and demands payment in exchange for the decryption key. It is a rapidly growing and evolving threat that has caused significant damage and disruption to individuals and organizations around the world. In this paper, we propose a comprehensive ransomware classification approac...
The Internet of Things (IoT) is rapidly growing and is projected to develop in future years. The IoT connects everything from Closed Circuit Television (CCTV) cameras to medical equipment to smart home appliances to smart automobiles and many more gadgets. Connecting these gadgets is revolutionizing our lives today by offering higher efficiency, be...
The internet of things (IoT) has prepared the way for a highly linked world, in which everything is interconnected, and information exchange has become more easily accessible via the internet, making it feasible for various applications that enrich the quality of human life. Despite such a potential vision, users’ privacy on these IoT devices is a...
Software Defined Networking (SDN) is an emerging network platform, which facilitates centralised network management. The SDN enables the network operators to manage the overall network consistently and holistically, regardless the complexity of infrastructure devices. The promising features of the SDN enhance network security and facilitate the impl...
InSDN dataset
Elsayed, Mahmoud Said, Nhien-An Le-Khac, and Anca D. Jurcut. "InSDN: A novel SDN intrusion dataset." IEEE Access 8 (2020): 165263-165284.
It is critical to successfully identify, mitigate, and fight against Android malware assaults, since Android malware has long been a significant threat to the security of Android applications. Identifying and categorizing dangerous applications into categories that are similar to one another are especially important in the development of a safe And...
Software-Defined Networking (SDN) is a promising technology for the future Internet. However, the SDN paradigm introduces new attack vectors that do not exist in the conventional distributed networks. This paper develops a hybrid Intrusion Detection System (IDS) by combining the Convolutional Neural Network (CNN) and Long Short-Term Memory Network...
Software-defined networking (SDN) is a new networking paradigm that separates the controller from the network devices i.e. routers and switches. The centralised architecture of the SDN facilitates the overall network management and addresses the requirement of current data centres. While there are high benefits offered by the SDN architecture, the...
An intrusion detection system (IDS) is an essential component of computer networks to detect and secure the system and environment from malicious activities and anomalous attacks. The convolutional neural network (CNN) is a popular deep learning algorithm that has been broadly applied in the field of computer vision. More recently, several research...
An intrusion detection system (IDS) is an essential component of computer networks to detect and secure the system and environment from malicious activities and anomalous attacks. The convolu-tional neural network (CNN) is a popular deep learning algorithm that has been broadly applied in the field of computer vision. More recently, several researc...
InSDN is a comprehensive Software-Defined Network (SDN) dataset for Intrusion detection system evaluation. The new dataset includes the benign and various attack categories that can occur in different elements of the SDN standard. InSDN considers different attack, including DoS, DDoS, brute force attack, web applications, exploitation, probe, and b...
The novel severe acute respiratory syndrome coronavirus 2 and its associated disease, COVID-19, have increased the amount of time that people spend working from home and in social isolation. In 2020, the number of users worldwide who relied on the Internet for work, education, and entertainment increased significantly. This growth is causing a subs...
Anomaly detection aims to discover patterns in data that do not conform to the expected normal behaviour. One of the significant issues for anomaly detection techniques is the availability of labeled data for training/validation of models. In this paper, we proposed a hyper approach based on Long Short Term Memory (LSTM) autoencoder and One-class S...
With the rapid technological advancements, organizations need to rapidly
scale up their information technology (IT) infrastructure viz. hardware,
software, and services, at a low cost. However, the dynamic growth in the
network services and applications creates security vulnerabilities and new
risks that can be exploited by various attacks. For exa...
Software-Defined Network (SDN) has been developed to reduce network complexity through control and manage the whole network from a centralized location. Today, SDN is widely implemented in many data center’s network environments. Nevertheless, emerging technology itself can lead to many vulnerabilities and threats which are still challenging for ma...
With the rapid technological advancements, organizations need to rapidly scale up their information technology (IT) infrastructure viz. hardware, software, and services, at a low cost. However, the dynamic growth in the network services and applications creates security vulnerabilities and new risks that can be exploited by various attacks. For exa...
Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the...
Software-Defined Networking (SDN) is an emerging paradigm, which evolved in recent years to address the weaknesses in traditional networks. The significant feature of the SDN, which is achieved by disassociating the control plane from the data plane, facilitates network management and allows the network to be efficiently programmable. However, the...
With the advent of Software Defined Networks (SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the d...
With the advent of Software Defined Networks(SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the de...
With the advent of Software Defined Networks (SDNs), there has been a rapid advancement in the area of cloud computing. It is now scalable, cheaper, and easier to manage. However, SDNs are more prone to security vulnerabilities as compared to legacy systems. Therefore, machine-learning techniques are now deployed in the SDN infrastructure for the d...
Questions
Questions (4)
I have one question related to time series dataset,
Are you have any idea how to extract the time series features from PCAP file, to conduct it in anomalies using LSTM?
There are many tools can be used like tranalyzer, CICFlowMeter or TSHARK but I confused how we can modify the time step to be 10 min. for example using one of these tools.
Thank you very much
How to get Network flows-based features extracted for each thirty minutes using tranalyzer?
I worked in time series for anomalies detection. I still confused, how to get the time series .csv from PCAP file, as mentioned ‘Network Anomaly Detection based ON Wavelet Analysis’ from KDD-tcpdump data.
As mentioned in this paper, the author first use editcap to split the raw tcpdump file into different tcpdump files based and set the time interval as one minute for each. Then, using tshark through the following command
tshark -r 1.pcap -q -n -z conv,tcp.
When I applied the above command for 1-min length file, I get the following snapshot example
So, how can I get the flow log per min for the entire dataset in time series? In addition, I I need change the length of the time step from 1min to 10 min each. How can I do that?.
If i training Machine learning algorithm using well know dataset like NSL-KDD and then I create a detection module, how to use it to detect abnormal in SDN environment and which feature I need to collect from SDN-Controller for ML module.
Thanks