Faheem Ullah’s research while affiliated with Zayed University and other places

What is this page?


This page lists works of an author who doesn't have a ResearchGate profile or hasn't added the works to their profile yet. It is automatically generated from public (personal) data to further our legitimate goal of comprehensive and accurate scientific recordkeeping. If you are this author and want this page removed, please let us know.

Publications (12)


Taxonomy of microservice vulnerabilities
CyberWise predictor architecture
CVSS labels imbalances
Distribution of CVSS availability
Tokenization of text

+1

Towards deep learning enabled cybersecurity risk assessment for microservice architectures
  • Article
  • Publisher preview available

June 2025

Cluster Computing

Majid Abdulsatar

·

·

·

Faheem Ullah

The widespread adoption of microservice architectures has given rise to a new set of software security challenges. These challenges stem from the unique features inherent in microservices. It is important to systematically assess and address these software security issues through effective security risk assessments. However, existing risk assessment approaches, such as expert-based manual assessment, prove inefficient in accurately evaluating the security risks of microservices. Furthermore, the absence of security vulnerability metrics hampers the evaluation of these risks. To address these issues, we propose CyberWise Predictor, a framework designed for predicting and assessing security risks associated with microservice architectures. Our framework employs transformers, which are deep learning-based natural language processing models, to analyze descriptions of vulnerabilities for predicting vulnerability metrics to assess security risks. Our experimental evaluation shows the effectiveness of CyberWise Predictor, achieving an average accuracy of 92% in automatically predicting vulnerability metrics for their risk assessment.

View access options

A Survey on Immersive Cyber Situational Awareness Systems

June 2025

·

3 Reads

Journal of Cybersecurity and Privacy

Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data occlusion and convolution issues due to the burgeoning complexity, dimensionality, and heterogeneity of cybersecurity data, which damages cyber situational awareness of end-users. Moreover, conventional forms of human–computer interactions, such as mouse and keyboard, increase the mental effort and cognitive load of cybersecurity practitioners when analyzing cyber situations of large-scale infrastructures. Therefore, immersive technologies, such as virtual reality, augmented reality, and mixed reality, are employed in the cybersecurity realm to create intuitive, engaging, and interactive cyber common operating pictures. Immersive cyber situational awareness (ICSA) systems provide several unique visualization techniques and interaction features for the perception, comprehension, and projection of cyber situational awareness. However, there has been no attempt to comprehensively investigate and classify the existing state of the art in the use of immersive technologies for cyber situational awareness. Therefore, in this paper, we have gathered, analyzed, and synthesized the existing body of knowledge on ICSA systems. In particular, our survey has identified visualization and interaction techniques, evaluation mechanisms, and different levels of cyber situational awareness (i.e., perception, comprehension, and projection) for ICSA systems. Consequently, our survey has enabled us to propose (i) a reference framework for designing and analyzing ICSA systems by mapping immersive visualization and interaction techniques to the different levels of ICSA; (ii) future research directions for advancing the state of the art on ICSA systems; and (iii) an in-depth analysis of the industrial implications of ICSA systems to enhance cybersecurity operations.


Figure 1: Research methodology used for conducting this study
Figure 2: Terms used for searching Stack Overflow posts.
Figure 3: Search terms for cyber roles and certifications
Figure 5: Programming languages scores of cybersecurity-related posts on Stack Overflow.
What Skills Do Cyber Security Professionals Need?

February 2025

·

176 Reads

Faheem Ullah

·

Xiaohan Ye

·

Uswa Fatima

·

[...]

·

Hussain Ahmad

Purpose: The increasing number of cyber-attacks has elevated the importance of cybersecurity for organizations. This has also increased the demand for professionals with the necessary skills to protect these organizations. As a result, many individuals are looking to enter the field of cybersecurity. However, there is a lack of clear understanding of the skills required for a successful career in this field. In this paper, we identify the skills required for cybersecurity professionals. We also determine how the demand for cyber skills relates to various cyber roles such as security analyst and security architect. Furthermore, we identify the programming languages that are important for cybersecurity professionals. Design/Methodology: For this study, we have collected and analyzed data from 12,161 job ads and 49,002 Stack Overflow posts. By examining this, we identified patterns and trends related to skill requirements, role-specific demands, and programming languages in cybersecurity. Findings: Our results reveal that (i) communication skills and project management skills are the most important soft skills, (ii) as compared to soft skills, the demand for technical skills varies more across various cyber roles, and (iii) Java is the most commonly used programming language. Originality: Our findings serve as a guideline for individuals aiming to get into the field of cybersecurity. Moreover, our findings are useful in terms of informing educational institutes to teach the correct set of skills to students doing degrees in cybersecurity.


A Survey on Immersive Cyber Situational Awareness Systems

August 2024

·

57 Reads

Cyber situational awareness systems are increasingly used for creating cyber common operating pictures for cybersecurity analysis and education. However, these systems face data occlusion and convolution issues due to the burgeoning complexity, dimensionality, and heterogeneity of cybersecurity data, which damages cyber Situational Awareness (SA) of end-users. Moreover, conventional ways of human-computer interactions, such as mouse and keyboard, increase the mental effort and cognitive load of cybersecurity practitioners, when analyzing cyber situations of large-scale infrastructures. Therefore, immersive technologies, such as virtual reality, augmented reality, and mixed reality, are employed in the cybersecurity realm to create intuitive, engaging, and interactive cyber common operating pictures. The Immersive Cyber Situational Awareness (ICSA) systems provide several unique visualization techniques and interaction features for the perception, comprehension, and projection of cyber SA. However, there has been no attempt to comprehensively investigate and classify the existing state of the art in the use of immersive technologies for cyber SA. Therefore, in this paper, we have gathered, analyzed, and synthesized the existing body of knowledge on ICSA systems. In particular, our survey has identified visualization and interaction techniques, evaluation mechanisms, and different levels of cyber SA (i.e., perception, comprehension, and projection) for ICSA systems. Consequently, our survey has enabled us to propose: (i) a reference framework for designing and analyzing ICSA systems by mapping immersive visualization and interaction techniques to the different levels of ICSA; (ii) future research directions for advancing the state-of-the-art on ICSA systems; and (iii) an in-depth analysis of the industrial implications of ICSA systems to enhance cybersecurity operations.


Figure 2: Study Selection Process.
Figure 4: Vulnerability Criticality Ratings.
Microservice Vulnerability Analysis: A Literature Review with Empirical Insights

July 2024

·

260 Reads

Microservice architectures are revolutionizing both small businesses and large corporations, igniting a new era of innovation with their exceptional advantages in maintainability, reusability, and scalability. However, these benefits come with significant security challenges, as the increased complexity of service interactions, expanded attack surfaces, and intricate dependency management introduce a new array of cybersecurity vulnerabilities. While security concerns are mounting, there is a lack of comprehensive research that integrates a review of existing knowledge with empirical analysis of microservice vulnerabilities. This study aims to fill this gap by gathering, analyzing, and synthesizing existing literature on security vulnerabilities associated with microservice architectures. Through a thorough examination of 62 studies, we identify, analyze, and report 126 security vulnerabilities inherent in microservice architectures. This comprehensive analysis enables us to (i) propose a taxonomy that categorizes microservice vulnerabilities based on the distinctive features of microservice architectures; (ii) conduct an empirical analysis by performing vulnerability scans on four diverse microservice benchmark applications using three different scanning tools to validate our taxonomy; and (iii) map our taxonomy vulnerabilities with empirically identified vulnerabilities, providing an in-depth vulnerability analysis at microservice, application, and scanning tool levels. Our study offers crucial guidelines for practitioners and researchers to advance both the state-of-the-practice and the state-of-the-art in securing microservice architectures.



Figure 2: Study Selection Process.
Figure 4: Vulnerability Criticality Ratings.
Number of Vulnerabilities Identified
Microservice Vulnerability Analysis: A Literature Review With Empirical Insights

January 2024

·

58 Reads

·

8 Citations

IEEE Access

Microservice architectures are revolutionizing both small businesses and large corporations, igniting a new era of innovation with their exceptional advantages in maintainability, reusability, and scalability. However, these benefits come with significant security challenges, as the increased complexity of service interactions, expanded attack surfaces, and intricate dependency management introduce a new array of cybersecurity vulnerabilities. While security concerns are mounting, there is a lack of comprehensive research that integrates a review of existing knowledge with empirical analysis of microservice vulnerabilities. This study aims to fill this gap by gathering, analyzing, and synthesizing existing literature on security vulnerabilities associated with microservice architectures. Through a thorough examination of 62 studies, we identify, analyze, and report 126 security vulnerabilities inherent in microservice architectures. This comprehensive analysis enables us to (i) propose a taxonomy that categorizes microservice vulnerabilities based on the distinctive features of microservice architectures; (ii) conduct an empirical analysis by performing vulnerability scans on four diverse microservice benchmark applications using three different scanning tools to validate our taxonomy; and (iii) map our taxonomy vulnerabilities with empirically identified vulnerabilities, providing an in-depth vulnerability analysis at microservice, application, and scanning tool levels. Our study offers crucial guidelines for practitioners and researchers to advance both the state-of-the-practice and the state-of-the-art in securing microservice architectures.



Guidance Models for Designing Big Data Cyber Security Analytics Systems

September 2023

·

15 Reads

Lecture Notes in Computer Science

Big Data Cyber Security Analytics (BDCA) systems leverage big data technologies to collect, store, and analyze a large volume of security event data for detecting cyber-attacks. Architecting BDCA systems is a complex design activity, which involves critical decisions about the selection of architectural tactics for the satisfaction of various quality goals. Software architects need to consider associated dependencies, constraints, and impact on quality goals, which makes the design process quite challenging. To facilitate the design process, we propose guidance models for supporting the systematic design of BDCA systems. The guidance models facilitate architects to map functional and non-functional requirements for BDCA systems to a set of architectural tactics.KeywordsSecurityBig DataArchitectural TacticDesign


Resource Utilization of Distributed Databases in Edge-Cloud Environment

June 2023

·

105 Reads

·

10 Citations

IEEE Internet of Things Journal

A benchmark study of modern distributed databases (e.g., Cassandra, MongoDB, Redis, and MySQL) is an important source of information for selecting the right technology for managing data in edge-cloud deployments. While most of the existing studies have investigated the performance and scalability of distributed databases in cloud computing, there is a lack of focus on resource utilization (e.g., energy, bandwidth, and storage consumption) of workload offloading for distributed databases deployed in edge-cloud environments. For this purpose, we conducted experiments on various physical and virtualized computing nodes including variously powered servers, Raspberry Pi, and hybrid cloud (OpenStack and Azure). Our extensive experimental results reveal insights into which database under which offloading scenario is more efficient in terms of energy, bandwidth, and storage consumption.


Citations (4)


... Despite the numerous benefits of microservices, they introduce distinct security vulnerabilities stemming from their inherent characteristics, such as the containerization of services, protocols for inter-service communication, and the platforms used for container orchestration [8][9][10]. Additionally, the integration of third-party components within microservice architectures introduces a new array of cybersecurity vulnerabilities, which expands the potential attack surface for malicious actors [11,12]. The assessment of cybersecurity risks within microservices is critical and depends on the severity of these vulnerabilities [13,14]. ...

Reference:

Towards deep learning enabled cybersecurity risk assessment for microservice architectures
Microservice Vulnerability Analysis: A Literature Review With Empirical Insights

IEEE Access

... Ullah et al. [21] conducted a comprehensive evaluation of distributed data processing frameworks in hybrid cloud environments, aiming to assess their performance, scalability, and adaptability. The study compares popular frameworks such as Hadoop, Spark, and Flink under varying workload conditions and deployment scenarios that span public and private cloud resources. ...

Evaluation of distributed data processing frameworks in hybrid clouds
  • Citing Article
  • February 2024

Journal of Network and Computer Applications

... In order to improve the robustness of the algorithm, we introduce adversarial samples into the training process, so that the model can generalize to adversarial perturbations, so as to maintain stable performance in the face of unknown adversarial attacks. 20,21 In addition, we employ data transformation processing techniques, such as denoising,¯ltering, or quantization, to reduce the e®ects of adversarial perturbations, in an attempt to convert adversarial samples into forms that can be classi¯ed more accurately by the model. In the loss function of the model, we add a regularization term to promote the model to learn a smoother decision boundary, so as to reduce the impact of adversarial perturbation on the model's decision. ...

Defending SDN against packet injection attacks using deep learning
  • Citing Article
  • October 2023

Computer Networks

... Edge computing extends the capabilities of cloud computing by performing computing at the edge of the network, closer to the end user [7]. This approach helps to resolve the latency and delay challenges often encountered in centralized cloud computing [42]. Edge computing extends cloud computing by utilizing edge nodes for localized computing tasks, while relying on the cloud for more complex large-scale processing tasks [42]. ...

Resource Utilization of Distributed Databases in Edge-Cloud Environment
  • Citing Article
  • June 2023

IEEE Internet of Things Journal