Output list
Conference paper
Blockchain-based Secure CIDS Operation
Published 2021
2021 5th Cyber Security in Networking Conference (CSNet)
5th Cyber Security in Networking Conference (CSNet) 2021, 12/10/2021–14/10/2021, Abu Dhabi, United Arab Emirates
For large, intricate, and multi-layered networks like that of Industrial IoT, an individual instance of intrusion detection system cannot efficiently work against advanced attack strategies. The reason is that it would not be aware of the overall context, environment, and relevant incidents in other networks. This necessitates a collaborative intrusion detection system that allows multiple intrusion detection systems to communicate with each other and share information on emerging cyber-attack incidents. Thus, immunizing themselves and preventing the attack from escalating. However, the main challenge here is to manage the trust among the peers, where an insider attacker may input false attack signatures to the network, thus degrading the performance. Hence, we propose a blockchain-based trustfree collaborative intrusion detection system, in which threat alert messages will only be propagated in the network after network consensus.
Conference paper
Internet traffic classification using an ensemble of deep convolutional neural networks
Published 2021
Proceedings of the 4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility, 38 - 43
4th FlexNets Workshop on Flexible Networks Artificial Intelligence Supported Network Flexibility and Agility (Part of SIGCOMM '21), 23/08/2021, Virtual
Network traffic classification (NTC) has attracted considerable attention in recent years. The importance of traffic classification stems from the fact that data traffic in modern networks is extremely complex and ever-evolving in different aspects, e.g. volume, velocity and variety. The inherent security requirements of Internet-based applications also highlights further the role of traffic classification. Gaining clear insights into the network traffic for performance evaluation and network planning purposes, network behavior analysis, and network management is not a trivial task. Fortunately, NTC is a promising technique to gain valuable insights into the behavior of the network, and consequently improve the network operations. In this paper, we provide a method based on deep ensemble learning to classify the network traffic in communication systems and networks. More specifically, the proposed method combines a set of Convolutional Neural Network (CNN) models into an ensemble of classifiers. The outputs of the models are then combined to generate the final prediction. The results of performance evaluation show that the proposed method provides an average accuracy rate of 98% for the classification of traffic (e.g., FTP-DATA, MAIL, etc.) in the Cambridge Internet traffic dataset.
Conference paper
Blockchain-based Secure CIDS Operation
Published 2021
5th Cyber Security in Networking Conference (CSNet 2021), 12/10/2014–14/10/2014, Abu Dhabi, UAE
Conference paper
User identity preservation and data protection in the Internet of Things
Published 2020
2nd African International Conference on Industrial Engineering and Operations Management, 07/12/2020–10/12/2020, Harare, Zimbabwe
Conference paper
Security and privacy preserving in precision agriculture
Published 2020
2nd African International Conference on Industrial Engineering and Operations Management, 07/12/2020–10/12/2020, Harare, Zimbabwe
Conference paper
Shaping and regulating privacy statements to increase customer satisfaction
Published 2015
Customer Service in the Public Sector Conference, 17/11/2015–19/11/2015, The Saudi Ministry of Civil Service, Saudi Arabia
Conference paper
Smart home base safe playground for kids
Published 2015
Playground Conference KSU, 13/07/2015, Ryadh, KSA
Conference paper
MTTG: An efficient technique for test data generation
Published 2014
The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014)
The 8th International Conference on Software, Knowledge, Information Management and Applications (SKIMA 2014), 18/12/2014–20/12/2014, Dhaka, Bangladesh
Test data generation is a significant part of software and/or hardware testing. It is a complex problem and researchers have proposed various solutions to generate optimum number of test data in an acceptable polynomial time. However, most of the solutions are highly complex (NP-hard), interaction limitation and takes substantial time to generate test data set. Therefore, it is an open challenge to propose the best solution. This paper proposes a novel technique called MTTG (Multi-Tuple based T-way Test Generator) which relies on Kid's Card game strategy. The proposed technique finds optimum matching value by searching through all possible combination of similarity matching, based on data generation principle. Our empirical results demonstrate that the proposed MTTG is very efficient in test data generation based on time and interaction strength/level, compared to other existing strategies.
Conference paper
An approach for enhancing message security in audio steganography
Published 2014
16th Int'l Conf. Computer and Information Technology
16th International Conference on Computer and Information Technology, 08/03/2014–10/03/2014, Khulna, Bangladesh
Concealing a message and ensuring its security is inevitable in data transmission. Among various concepts, one approach is steganography that encodes secret message in indiscernible way. In this paper, we present an audio steganographic technique and propose a novel approach to hide data in the least significant bit (LSB) of the stereo-audio samples with CD-quality. Here, on the basis of stego-key and its parity, message bits are encoded into cover audio samples. In terms of security and imperceptibility, this method is a significant improvement of LSB method for hiding information in audio.
Conference paper
What is the first step in designing an application protocol for wireless sensor networks (WSNs)?
Published 2014
2014 IEEE Sensors Applications Symposium (SAS)
IEEE Sensors Applications Symposium (SAS) 2014, 18/02/2014–20/02/2014, Queenstown, New Zealand
This paper introduces a novel notion in the application protocol design paradigm for wireless sensor networks (WSNs). The traditional approaches of designing application protocols tend to focus primarily on developing the protocols first, and then using them on different topologies for implementation. We, however, argue that the logical topology of WSNs should be considered before designing application protocols. The argument is made on the basis that the logical topology of WSNs dictates the communication abstraction, the structure, and the hierarchy of the network. Thus, a well-designed logical topology helps in minimising the constraints of the WSNs and provides benefits to design various application protocols. In this paper we demonstrate how a well-designed logical topology influences the performances of protocols developed in WSNs. In doing so, the logical structure and the communication abstraction of the logical topology are used to design a number of application protocols, and their performances are evaluated.