About
16
Publications
10,163
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
155
Citations
Introduction
Current institution
Publications
Publications (16)
Services and applications online involve information transmitted across the network, and therefore, the issue of security during data transmission has become crucial. Botnet is one of the prominent methods used by cybercriminals to retrieve information from internet users because of the massive impact caused by the bot armies. Thus, this chapter pr...
Malware attack cases continue to rise in our current day. The Trojan attack, which may be extremely destructive by unlawfully controlling other users' computers in order to steal their data. As a result, Trojan horse detection is essential to identify the Trojan and limit Trojan attacks. In this study, we proposed a Trojan detection system that emp...
Many applications today are using an encrypted channel to secure their communication and transactions. Though, their security is often challenged by adversaries such as Botnet. Botnet leverages the encrypted channel to launch attacks and amplify the impact of attacks. The numbers of Botnet attacks over an encrypted channel are increasing and contin...
This paper focuses on the study of Botnet and its Command and Control (C&C) structure. It also reviews the state of the art in machine learning-based Botnet detection system. In order to survive, Botnet implemented various evasion techniques, and one of the famous vision technique is by manipulating an encrypted channel to perform their C&C communi...
The purpose of this study was to review various machine learning techniques for Botnet detection system by looking at their advantage and limitation, and propose our Botnet detection system. In this paper, we summarized different machine learning techniques used in previous research. Recently, machine learning has become prominent in developing Bot...
The research on developing networking
subjects’ courseware has been started at the kulliyyah and
our goal is to produce networking courseware which is
module base that consist the topics in the particular
subjects. Hopefully, this will increase students
understanding and interest in networking subjects.
Network in reality is not a tough subject if...
Mobile Ad Hoc Network (MANET) is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. It is a wireless network and has dynamic topology due to its node mobility. Networks are being used in various areas and the demand of users nowadays has motivated the emergence of the hetero...
Networks are being used in various areas and the demand of users nowadays has motivated the emergence of the Mobile Ad Hoc Network (MANET). MANET is a dynamic network without fixed infrastructure due to their wireless nature and can be deployed as multi-hop packet networks. It is a wireless network and has dynamic topology due to its node mobility....
Problem statement: Mobile Ad hoc Network (MANET), a type of network with special characteristics, needs a special mechanism to bear with its ad hoc behavior. Approach: The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. Results: In this study we foc...
Mobile Ad Hoc Network (MANET) is a type of network with special characteristics and it needs special mechanism to bear with its ad hoc behavior. The important issue in MANET is routing protocol. Routing protocol is a standard used to determine the route path taken during the transmission of data. In this paper we will focus on Ad Hoc On Demand Dist...
Managing heterogeneous network systems is a difficult task because each of these networks has its own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and service...
Managing today's increasingly complex networks requires extra information, knowledge and autonomic training. Network is being used in various areas and it requires a tool to manage it. Configuration management is one of the functional areas of network management that monitor network and system configuration information so that the effects on networ...
Managing heterogeneous network systems is a difficult task because each of them has their own curious management system. These networks usually are constructed on independent management protocols which are not compatible with each other. This results in the coexistence of many management systems with different managing functions and services across...
Mobile Ad Hoc Network (MANET) is infrastructureless networks which are often considered as the extension of Internet access range that provide multi hop wireless access. MANET is a wireless networks and has dynamic topology due to its node mobility. MANET can integrate with other types of network to satisfy the user needs for example cellular netwo...
Questions
Question (1)
I read several articles about integrating Snort with machine learning for optimization, however I never found the methodology on how to do that. I am really interested to know further about this topic.