Zahian Ismail

Zahian Ismail
  • Senior Lecturer at Universiti Malaysia Pahang Al-Sultan Abdullah

About

16
Publications
10,163
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
155
Citations
Current institution
Universiti Malaysia Pahang Al-Sultan Abdullah
Current position
  • Senior Lecturer

Publications

Publications (16)
Chapter
Full-text available
Services and applications online involve information transmitted across the network, and therefore, the issue of security during data transmission has become crucial. Botnet is one of the prominent methods used by cybercriminals to retrieve information from internet users because of the massive impact caused by the bot armies. Thus, this chapter pr...
Article
Full-text available
Malware attack cases continue to rise in our current day. The Trojan attack, which may be extremely destructive by unlawfully controlling other users' computers in order to steal their data. As a result, Trojan horse detection is essential to identify the Trojan and limit Trojan attacks. In this study, we proposed a Trojan detection system that emp...
Article
Full-text available
Many applications today are using an encrypted channel to secure their communication and transactions. Though, their security is often challenged by adversaries such as Botnet. Botnet leverages the encrypted channel to launch attacks and amplify the impact of attacks. The numbers of Botnet attacks over an encrypted channel are increasing and contin...
Article
Full-text available
This paper focuses on the study of Botnet and its Command and Control (C&C) structure. It also reviews the state of the art in machine learning-based Botnet detection system. In order to survive, Botnet implemented various evasion techniques, and one of the famous vision technique is by manipulating an encrypted channel to perform their C&C communi...
Conference Paper
Full-text available
The purpose of this study was to review various machine learning techniques for Botnet detection system by looking at their advantage and limitation, and propose our Botnet detection system. In this paper, we summarized different machine learning techniques used in previous research. Recently, machine learning has become prominent in developing Bot...
Research
Full-text available
The research on developing networking subjects’ courseware has been started at the kulliyyah and our goal is to produce networking courseware which is module base that consist the topics in the particular subjects. Hopefully, this will increase students understanding and interest in networking subjects. Network in reality is not a tough subject if...
Article
Full-text available
Mobile Ad Hoc Network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. It is a wireless network and has dynamic topology due to its node mobility. Networks are being used in various areas and the demand of users nowadays has motivated the emergence of the hetero...
Article
Full-text available
Networks are being used in various areas and the demand of users nowadays has motivated the emergence of the Mobile Ad Hoc Network (MANET). MANET is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. It is a wireless network and has dynamic topology due to its node mobility....
Article
Full-text available
Problem statement: Mobile Ad hoc Network (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results: In this study we foc...
Conference Paper
Full-text available
Mobile Ad Hoc Network (MANET) is a type of network with special characteristics and it needs special mechanism to bear with its ad hoc behavior. The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. In this paper we will focus on Ad Hoc On Demand Dist...
Article
Full-text available
Managing heterogeneous network systems is a difficult task because each of these networks has its own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and service...
Conference Paper
Full-text available
Managing today's increasingly complex networks requires extra information, knowledge and autonomic training. Network is being used in various areas and it requires a tool to manage it. Configuration management is one of the functional areas of network management that monitor network and system configuration information so that the effects on networ...
Article
Full-text available
Managing heterogeneous network systems is a difficult task because each of them has their own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and services across...
Article
Mobile Ad Hoc Network (MANET) is infrastructureless networks which are often considered as the extension of Internet access range that provide multi hop wireless access. MANET is a wireless networks and has dynamic topology due to its node mobility. MANET can integrate with other types of network to satisfy the user needs for example cellular netwo...

Questions

Question (1)
Question
I read several articles about integrating Snort with machine learning for optimization, however I never found the methodology on how to do that. I am really interested to know further about this topic.

Network

Cited By