Warusia Mohamed

Warusia Mohamed
  • PhD
  • Senior Lecturer at Technical University of Malaysia Malacca

Deepfake, Railway Cyber Security, Penetration Testing, Risk Management, Biometrics, IoT Cyber Security, Malware Analysis

About

56
Publications
53,787
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
1,034
Citations
Introduction
My research interests cover a fascinating and crucial area of computing security, Intrusion detection, malware analysis, and risk management are vital for protecting systems from threats. Machine learning and deep learning can enhance these processes by identifying patterns and predicting potential attacks. Deepfakes present unique challenges in security, and biometrics offer innovative ways to verify identities.
Current institution
Technical University of Malaysia Malacca
Current position
  • Senior Lecturer
Additional affiliations
November 2015 - November 2019
Technical University of Malaysia Malacca
Position
  • The Study of Intrusion Detection and Malware Analysis in Computing Elements.
July 2011 - July 2015
Universiti Putra Malaysia
Position
  • The Study of Intrusion Detection in Network Security and Cloud Computing
Description
  • Focusing in statistical and machine learning method to detect an intrusion. Come up with a novel framework which enable IDS to be adopt in cloud computing environment.
June 2009 - February 2011
Universiti Putra Malaysia
Position
  • An Hybrid Learning Approach for Better Intrusion Detection
Description
  • Research focused in detecting intrusion data via hybrid machine learning approach such as clustering, naive bayes, OneR and random forest.
Education
July 2011 - December 2014
Universiti Putra Malaysia
Field of study
  • Security in Computing
July 2009 - February 2012
Universiti Putra Malaysia
Field of study
  • Security in Computing
July 2006 - December 2008
Universiti Putra Malaysia
Field of study
  • Computer System

Publications

Publications (56)
Article
Full-text available
IPv6 over Low-Power Wireless Personal Area Networks (6LoWPAN) are specifically designed for applications that require lower data rates and reduced power consumption in wireless internet connectivity. In the context of 6LoWPAN, Internet of Things (IoT) devices with limited resources can now seamlessly connect to the network using IPv6. This study fo...
Article
Full-text available
The increasing prevalence of malware poses significant risks, including data loss and unauthorized access. These threats manifest in various forms, such as viruses, Trojans, worms, and ransomware. Each continually evolves to exploit system vulnerabilities. Ransomware has seen a particularly rapid increase, as evidenced by the devastating WannaCry a...
Chapter
Intelligent vehicles rely on accurate perception systems for safe navigation under challenging environmental conditions. However, adverse weather phenomena such as haze and fog significantly degrade the quality of visual input captured by onboard cameras. In this study, we propose a novel deep-learning algorithm specifically utilizes an advanced co...
Chapter
This chapter investigates the domain of unsupervised learning algorithms, delivering a detailed outline of its classifications and essential characteristics. Each algorithm is examined, assessing its appropriateness for different types of data. A systematic assessment is conducted with each algorithm and is checked using datasets that complement it...
Article
Full-text available
Ransomware attacks are currently one of cybersecurity's greatest and most alluring threats. Antivirus software is frequently ineffective against zero-day malware and ransomware attacks; consequently, significant network infections could result in substantial data loss. Such attacks are also becoming more dynamic and capable of altering their signat...
Chapter
Deepfakes have fascinated enormous attention in recent times ascribable to the consequences of threats in video manipulation. Consequently, such manipulation via intelligent algorithm contributes to more crucial circumstances as electronic media integrity become a challenging concern. Furthermore, such unauthentic content is being composed and outs...
Article
Full-text available
This paper provides a comprehensive examination of ransomware behavior on Windows endpoints, exploring the intrusion mechanisms, proliferation methods, and the mitigating strategies that can be employed. It provides a comparative analysis of several ransomware families and their effects on Windows systems, culminating with suggestions for future re...
Article
Full-text available
The internet of things (IoT) is one of data revolution area and is the following extraordinary mechanical jump after the internet. In terms of IoT, it is expected that electronic gadgets that are used on a regular basis would be connected to the current of the internet. IPv6 over low-power wireless personal area networks (6LoWPAN) is a one of IPv6...
Article
Full-text available
Teaching lower school mathematic could be easy for everyone. For teaching in the situation that cannot speak, using sign language is the answer especially someone that have infected with vocal cord infection or critical spasmodic dysphonia or maybe disable people. However, the situation could be difficult, when the sign language is not understandab...
Article
Full-text available
In this digital era, protecting an organisation's sensitive information system assets against cyberattacks is challenging. Globally, organisations spend heavily on information security (InfoSec) technological countermeasures. Public and private sectors often fail to secure their information assets because they depend primarily on technical solution...
Article
Business in cloud computing is very popular among Small and Medium Enterprises (SMEs). By leveraging services from the cloud, such companies can migrate all of their in-house operations to cloud at low costs with minimum IT facility requirements such as desktop machines and the Internet. Even though the cloud promises tremendous advantages in terms...
Article
Full-text available
Crypto ransomware is malware that locks its victim’s file for ransom using an encryption algorithm. Its popularity has risen at an alarming rate among the cyber community due to several successful worldwide attacks. The encryption employed had caused irreversible damage to the victim’s digital files, even when the victim chose to pay the ransom. As...
Article
Full-text available
Information security (IS) violations have a negative impact at both organisational and individual levels. Information security awareness (ISA) therefore plays a positive role in ensuring employees adhere to an organisation's security policies. The challenges that arise in protecting the information infrastructure in the Omani public sector are incr...
Article
Full-text available
Computer and network threats are serious issues that are becoming prevalent in our daily life. IDS meanwhile, is a mechanism as countermeasure for network threats. Many studies were conducted to improve the capability of an IDS. However, there is a lack of analysis about the IDS architecture. The objective of this paper is to analyze the issues and...
Article
Full-text available
Insider threat has become a widely accepted issue and one of the major challenges in cybersecurity. This phenomenon indicates that threats require special detection systems, methods, and tools, which entail the ability to facilitate accurate and fast detection of a malicious insider. Several studies on insider threat detection and related areas in...
Article
Full-text available
Awareness plays an important role in the field of information security (IS) due to its positive impact on staff adherence to security policies. With the development and increase in cases of information piracy and phishing attempts, the challenges inherent in protecting the information infrastructure of Omani public sector institutions are drastical...
Article
Full-text available
Insider threat is a significant challenge in cybersecurity. In comparison with outside attackers, inside attackers have more privileges and legitimate access to information and facilities that can cause considerable damage to an organization. Most organizations that implement traditional cybersecurity techniques, such as intrusion detection systems...
Article
Full-text available
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack...
Article
Full-text available
Ransomware has becoming a current trend of cyberattack where its reputation among malware that cause a massive amount recovery in terms of cost and time for ransomware victims. Previous studies and solutions have showed that when it comes to malware detection, malware behavior need to be prioritized and analyzed in order to recognize malware attack...
Article
Full-text available
Information exchange is a key aspect of using technology in everyday life. Crimes associated with the lack of information security awareness (ISA), misuse and carelessness are on the increase and often result in heavy losses and serious consequences. In order for ISA campaigns and programmes to be effective, the most successful and influential fact...
Article
Full-text available
Awareness plays an important role in the field of information security (IS) due to its positive impact on staff adherence to security policies. With the development and increase in cases of information piracy and phishing attempts, the challenges inherent in protecting the information infrastructure of Omani public sector institutions are drastical...
Article
Full-text available
An intrusion detection system (IDS) is used to detect numerous kinds of malware attacks, and many classification methods have been introduced by the researcher to detect malware behavior. However, even though various classification method has been proposed, the detection of malware behavior remains a challenging task as the detection method focusin...
Article
Numerous researchers have discovered multiple types of ransomware that has been rampaging in cybersecurity which is the main concern for business companies where most of their data has been digitalized. However, the main problem in detecting this type of malware, where it is known as sophisticated behavior is quite challenging since it capable to d...
Article
Full-text available
Numerous researchers have discovered multiple types of ransomware that has been rampaging in cybersecurity which is the main concern for business companies where most of their data has been digitalized. However, the main problem in detecting this type of malware, where it is known as sophisticated behavior is quite challenging since it capable to d...
Article
Full-text available
Insider threats become one of the most dangerous threats in the cyber world as compared to outsider as the insiders have knowledge of assets. In addition, the threats itself considered invisible and no one can predict what, when and how exactly the threat launched. Based on conducting literature, threat in Automated Manufacturing Execution Systems...
Article
Malware is considered as one of most emerging threats due to Cybercriminals work diligently to make most of the part of the users’ network of computers as their target. A number of researchers keep on proposing the various alternative framework consisting detection methods day by days in combating activities such as single classification and the ru...
Article
Full-text available
Anomaly Intrusion Detection Systems (ADSs) identify patterns of network data behaviour to determine whether they are normal or represent an attack using the learning detection model. Much research has been conducted on enhancing ADSs particularly in the area of data mining that focuses on intrusive behaviour detection. Unfortunately, the current de...
Article
Full-text available
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi-layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning sy...
Article
The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. The malicious software which is specifically designed to disrupt, damage, or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still i...
Article
The evolution of malware possesses serious threat ever since the concept of malware took root in the technology industry. The malicious software which is specifically designed to disrupt, damage, or gain authorized access to a computer system has made a lot of researchers try to develop a new and better technique to detect malware but it is still i...
Article
Full-text available
Insider threat represents one of the greatest challenges in the cyber security world. Insider attackers have more privileged and legitimate access to the information and facilities, compared to the outsider attackers. In fact, insider attacker has more accessibilities and higher potential to bring huge damage to the organization. However, the behav...
Article
Full-text available
Cyber-Physical Systems refer to systems that have an interaction between computers, communication channels and physical devices to solve a real-world problem. Towards industry 4.0 revolution, Cyber-Physical Systems currently become one of the main targets of hackers and any damage to them lead to high losses to a nation. According to valid resource...
Preprint
Full-text available
Malware represents one of the dangerous threats to computer security. Dynamic analysis has difficulties in detecting unknown malware. This paper developed an integrated multi-layer detection approach to provide more accuracy in detecting malware. User interface integrated with Virus Total was designed as a first layer which represented a warning sy...
Article
Full-text available
Data Mining algorithm which is applied as an anomaly detection system has been considered as one of the essential techniques in malicious behaviour detection. Unfortunately, such detection system is known for its inclination in detecting a cyber-malicious activity more accurately (i.e. maximizing malicious and non-malicious behaviours detection) an...
Article
Full-text available
Intrusion detection systems (IDS) effectively complement other security mechanisms by detecting malicious activities on a computer or network, and their development is evolving at an extraordinary rate. The anomaly-based IDS, which uses learning algorithms, allows detection of unknown attacks. Unfortunately, the major challenge of this approach is...
Article
As the influence of Internet and networking technologies as communication medium advance and expand across the globe, cyber attacks also grow accordingly. Anomaly detection systems (ADSs) are employed to scrutinize information such as packet behaviours coming from various locations on network to find those intrusive activities as fast as possible w...
Article
Intrusion detection is considered as one of the foremost research areas in network security, the challenge is to recognize unusual access that could lead to compromising the interconnected nodes. Anomaly-based intrusion detection system, that utilizes machine learning techniques such as single classifier and hybrid classifier have the capability to...
Article
In recent times, Intrusion Detection systems (IDSs) incarnate the high network security. Anomaly-based intrusion detection techniques, that utilize algorithms of machine learning, have the capability to recognize unpredicted malicious. Unluckily, an essential provocation of this method is to maximize accuracy, detection whereas minimize false alarm...
Article
Due to the widespread use of Internet and communication networks, a reliable and secure network plays a crucial role for Information Technology (IT) service providers and users. The hardness of network attacks as well as their complexities has also increased lately. The anomaly-based Intrusion Detection Systems (IDS) are able to detect unknown atta...
Chapter
The disclosure of network packets to recurrent cyber intrusion has upraised the essential for modelling various statistical-based anomaly detection methods lately. Theoretically, the statistical-based anomaly detection method fascinates researcher’s attentiveness, but technologically, the fewer intrusion detection rates persist as vulnerable disput...
Article
Intrusion Detection System (IDS) is one of the key security components in today's networking environment. A great deal of attention has been recently paid to anomaly detection to accomplish intrusion detection. However, a major problem with this approach is maximizing detection rate and accuracy, as well as minimizing false alarm i.e., inability to...
Conference Paper
Full-text available
Intrusion Detection System (IDS) have become increasingly popular over the past years as an important network security technology to detect cyber attacks in a wide variety of network communication. IDS monitors' network or host system activities by collecting network information, and analyze this information for malicious activities. Cloud computin...
Conference Paper
Intrusion detection system (IDS) is used to detect various kinds of attacks in interconnected network. Many machine learning methods have also been introduced by researcher recently to obtain high accuracy and detection rate. Unfortunately, a potential drawback of all those methods is the rate of false alarm. However, our proposed approach shows be...
Conference Paper
Full-text available
Intrusion Detection System (IDS) plays an effective way to achieve higher security in detecting malicious activities for a couple of years. Anomaly detection is one of intrusion detection system. Current anomaly detection is often associated with high false alarm with moderate accuracy and detection rates when it's unable to detect all types of att...
Article
Full-text available
Intrusion Detection Systems (IDS) have become an important building block of any sound defense network infrastructure. Malicious attacks have brought more adverse impacts on the networks than before, increasing the need for an effective approach to detect and identify such attacks more effectively. In this study two learning approaches, K-Means Clu...

Network

Cited By