A Comprehensive protection method for securing the organization's network against cyberattacks
- Authors: Kbar, Ghassan , Alazab, Ammar
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 Cybersecurity and Cyberforensics Conference (CCC); Melbourne, VIC, Australia; 8-9 May 2019 p. 118-122
- Full Text: false
- Reviewed:
- Description: The advance in technologies helped in providing efficient system that connect people worldwide such as the use of internet. At the same time cyber attackers exploited the vulnerabilities existed in these technologies to conduct large variety of attack activities against the information and systems. Researchers and solution's providers implemented different countermeasure mechanisms to protect the system against attacks and saved the discovered type of attack in attack database for future analysis and decision. Intrusion Detection (ID) system is an example for protecting the system against attacks by monitoring the network activities and updating the attack database for future analysis and protection decision. In addition to IDs, firewall, intrusion prevention, encryption, authorization and authentication are used to protect the system. Furthermore, a supplementary configurations honeypot systems can be used to strengthen the system security.
- Description: The advance in technologies helped in providing efficient system that connect people worldwide such as the use of internet. At the same time cyber attackers exploited the vulnerabilities existed in these technologies to conduct large variety of attack activities against the information and systems. Researchers and solution's providers implemented different countermeasure mechanisms to protect the system against at-tacks and saved the discovered type of attack in attack database for future analysis and decision. Intrusion Detection (ID) system is an example for protecting the system against attacks by monitoring the network activities and updating the attack data-base for future analysis and protection decision. In addition to IDs, firewall, intrusion prevention, encryption, authorization and authentication are used to protect the sys-tem. Furthermore, a supplementary configurations honeypot systems can be used to strengthen the system security.
A critical review of intrusion detection systems in the internet of things : techniques, deployment strategy, validation strategy, attacks, public datasets and challenges
- Authors: Khraisat, Ansam , Alazab, Ammar
- Date: 2021
- Type: Text , Journal article
- Relation: Cybersecurity Vol. 4, no. 1 (2021), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack on the end nodes. To this end, Numerous IoT intrusion detection Systems (IDS) have been proposed in the literature to tackle attacks on the IoT ecosystem, which can be broadly classified based on detection technique, validation strategy, and deployment strategy. This survey paper presents a comprehensive review of contemporary IoT IDS and an overview of techniques, deployment Strategy, validation strategy and datasets that are commonly applied for building IDS. We also review how existing IoT IDS detect intrusive attacks and secure communications on the IoT. It also presents the classification of IoT attacks and discusses future research challenges to counter such IoT attacks to make IoT more secure. These purposes help IoT security researchers by uniting, contrasting, and compiling scattered research efforts. Consequently, we provide a unique IoT IDS taxonomy, which sheds light on IoT IDS techniques, their advantages and disadvantages, IoT attacks that exploit IoT communication systems, corresponding advanced IDS and detection capabilities to detect IoT attacks. © 2021, The Author(s).
A novel ensemble of hybrid intrusion detection system for detecting internet of things attacks
- Authors: Khraisat, Ansam , Gondal, Iqbal , Vamplew, Peter , Kamruzzaman, Joarder , Alazab, Ammar
- Date: 2019
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 8, no. 11 (2019), p.
- Full Text:
- Reviewed:
- Description: The Internet of Things (IoT) has been rapidly evolving towards making a greater impact on everyday life to large industrial systems. Unfortunately, this has attracted the attention of cybercriminals who made IoT a target of malicious activities, opening the door to a possible attack to the end nodes. Due to the large number and diverse types of IoT devices, it is a challenging task to protect the IoT infrastructure using a traditional intrusion detection system. To protect IoT devices, a novel ensemble Hybrid Intrusion Detection System (HIDS) is proposed by combining a C5 classifier and One Class Support Vector Machine classifier. HIDS combines the advantages of Signature Intrusion Detection System (SIDS) and Anomaly-based Intrusion Detection System (AIDS). The aim of this framework is to detect both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the Bot-IoT dataset, which includes legitimate IoT network traffic and several types of attacks. Experiments show that the proposed hybrid IDS provide higher detection rate and lower false positive rate compared to the SIDS and AIDS techniques. © 2019 by the authors. Licensee MDPI, Basel, Switzerland.
A Reinforcement learning based algorithm towards energy efficient 5G Multi-tier network
- Authors: Islam, Nahina , Alazab, Ammar , Alazab, Mamoun
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 Cybersecurity and Cyberforensics Conference (CCC); Melbourne, Vic; 8th-9th May, 2019 p. 96-101
- Full Text:
- Reviewed:
- Description: Energy efficiency is a key factor in the next generation wireless communication systems. Sleep mode implementation in multi-tier 5G networks has proven to be a very good approach for improving the energy efficiency. In this paper, we propose a novel reinforcement learning based decision making algorithm to implement sleep mode in the base stations (BSs) used in multi-tier 5G networks. We propose a Markovian Decision process (MDP) based algorithm to switch between three different power consumption modes of a BS for improving the energy efficiency of the 5G network. The MDP based approach intelligently switches between the states of the BS based on the offered traffic whilst maintaining a prescribed minimum channel rate per user. Our results show that there is a significant gain in the energy efficiency when using our proposed MDP algorithm together with the three-state BSs. We have also shown the energy-delay tradeoff in order to design a delay aware network.
An optimal transportation routing approach using GIS-based dynamic traffic flows
- Authors: Alazab, Ammar , Venkatraman, Sitalakshmi , Abawajy, Jemal , Alazab, Mamoun
- Date: 2010
- Type: Text , Conference proceedings
- Full Text: false
- Description: This paper examines the value of real-time traffic information gathered through Geographic Information Systems for achieving an optimal vehicle routing within a dynamically stochastic transportation network. We present a systematic approach in determining the dynamically varying parameters and implementation attributes that were used for the development of a Web-based transportation routing application integrated with real-time GIS services. We propose and implement an optimal routing algorithm by modifying Dijkstra’s algorithm in order to incorporate stochastically changing traffic flows. We describe the significant features of our Web application in making use of the real-time dynamic traffic flow information from GIS services towards achieving total costs savings and vehicle usage reduction. These features help users and vehicle drivers in improving their service levels and productivity as the Web application enables them to interactively find the optimal path and in identifying destinations effectively.
Applying genetic alogorithm for optimizing broadcasting process in ad-hoc network
- Authors: Elaiwat, Said , Alazab, Ammar , Venkatraman, Sitalakshmi , Alazab, Mamoun
- Date: 2011
- Type: Text , Journal article
- Relation: International Journal of Recent Trends in Engineering & Technology Vol. 4, no. 1 (2011), p. 68-72
- Full Text: false
- Reviewed:
- Description: Optimizing broadcasting process in mobile ad hoc network (MANET) is considered as a main challenge due to many problems, such as Broadcast Storm problem and high complexity in finding the optimal tree resulting in an NP-hard problem. Straight forward techniques like simple flooding give rise to Broadcast Storm problem with a high probability. In this work, genetic algorithm (GA) that searches over a population that represents a distinguishable ‘structure’ is adopted innovatively to suit MANETs. The novelty of the GA technique adopted here to provide the means to tackle this MANET problem lies mainly on the proposed method of searching for a structure of a suitable spanning tree that can be optimized, in order to meet the performance indices related to the broadcasting problem. In other words, the proposed genetic model (GM) evolves with the structure of random trees (individuals) ‘genetically’ generated using rules that are devised specifically to capture MANET behaviour in order to arrive at a minimal spanning tree that satisfies certain fitness function. Also, the model has the ability to give different solutions depending on the main factors specified such as, ‘time’ (or speed) in certain situations and ‘reachability’ in certain others.
Crime toolkits: The productisation of cybercrime
- Authors: Alazab, Ammar , Abawajy, Jemal , Hobbs, Michael , Layton, Robert , Khraisat, Ansam
- Date: 2013
- Type: Text , Conference paper
- Relation: Proceedings - 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, TrustCom 2013 p. 1626-1632
- Full Text: false
- Reviewed:
Cybercrime : The case of obfuscated malware
- Authors: Alazab, Mamoun , Venkatraman, Sitalakshmi , Watters, Paul , Alazab, Moutaz , Alazab, Ammar
- Date: 2011
- Type: Text , Conference paper
- Relation: Joint 7th International Conference on Global Security, Safety and Sustainability, ICGS3 2011, and the 4th Conference on e-Democracy Vol. 99 LNICST, p. 204-211
- Full Text: false
- Reviewed:
- Description: Cybercrime has rapidly developed in recent years and malware is one of the major security threats in computer which have been in existence from the very early days. There is a lack of understanding of such malware threats and what mechanisms can be used in implementing security prevention as well as to detect the threat. The main contribution of this paper is a step towards addressing this by investigating the different techniques adopted by obfuscated malware as they are growingly widespread and increasingly sophisticated with zero-day exploits. In particular, by adopting certain effective detection methods our investigations show how cybercriminals make use of file system vulnerabilities to inject hidden malware into the system. The paper also describes the recent trends of Zeus botnets and the importance of anomaly detection to be employed in addressing the new Zeus generation of malware. © 2012 ICST Institute for Computer Science, Social Informatics and Telecommunications Engineering.
- Description: 2003010650
Designing security intelligent agent for petrol theft prevention
- Authors: Bakkar, Mahmoud , Alazab, Ammar
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 Cybersecurity and Cyberforensics Conference CCC 2019; Melbourne, VIC, Australia; 8-9 May 2019 p. 123-128
- Full Text: false
- Reviewed:
- Description: Automotive industry has increased exponentially in recent years, and the number of car drivers has increased in the street as well, that lead to the increasing demand for using fuel stations. The increasing demand causes an increase of theft cases in the fuel stations particularly customers filling their cars and not paying for it. Although, there are several anti-petrol theft initiatives which include the use of Closed-Circuit Television Cameras (CCTV) to recognize vehicle number plates or people's faces. However, the record shows that existing methods for detecting petrol theft are less ineffective and time-consuming as it has been delayed in detecting the offenders and it is not a good measure to deter offenders as it is weak to be precise on evidence/mapping features. In this paper, Media Access Control (MAC) address detection of mobile devices used for preventing the petrol theft. Mac addresses are extracted from the customer mobile devices to develop a framework that can prevent and detect petrol theft. Also, car plate number is captured as well to develop this framework.
Energy efficient and delay aware 5g multi-tier network
- Authors: Islam, Nahina , Alazab, Ammar , Agbinya, Johnson
- Date: 2019
- Type: Text , Journal article
- Relation: Remote sensing Vol. 11, no. 9 (2019), p. 1019
- Full Text: false
- Reviewed:
- Description: Multi-tier heterogeneous Networks (HetNets) with dense deployment of small cells in 5G networks are expected to effectively meet the ever increasing data traffic demands and offer improved coverage in indoor environments. However, HetNets are raising major concerns to mobile network operators such as complex distributed control plane management, handover management issue, increases latency and increased energy expenditures. Sleep mode implementation in multi-tier 5G networks has proven to be a very good approach for reducing energy expenditures. In this paper, a Markov Decision Process (MDP)-based algorithm is proposed to switch between three different power consumption modes of a base station (BS) for improving the energy efficiency and reducing latency in 5G networks. The MDP-based approach intelligently switches between the states of the BS based on the offered traffic while maintaining a prescribed minimum channel rate per user. Simulation results show that the proposed MDP algorithm together with the three-state BSs results in a significant gain in terms of energy efficiency and latency.
GOM: New Genetic Optimizing Model for broadcasting tree in MANET
- Authors: Elaiwat, Said , Alazab, Ammar , Venkatraman, Sitalakshmi , Alazab, Mamoun
- Date: 2010
- Type: Text , Conference proceedings
- Full Text:
- Description: Data broadcasting in a mobile ad-hoc network (MANET) is the main method of information dissemination in many applications, in particular for sending critical information to all hosts. Finding an optimal broadcast tree in such networks is a challenging task due to the broadcast storm problem. The aim of this work is to propose a new genetic model using a fitness function with the primary goal of finding an optimal broadcast tree. Our new method, called Genetic Optimisation Model (GOM) alleviates the broadcast storm problem to a great extent as the experimental simulations result in efficient broadcast tree with minimal flood and minimal hops. The result of this model also shows that it has the ability to give different optimal solutions according to the nature of the network. © 2010 IEEE.
Hybrid intrusion detection system based on the stacking ensemble of C5 decision tree classifier and one class support vector machine
- Authors: Khraisat, Ansam , Gondal, Iqbal , Vamplew, Peter , Kamruzzaman, Joarder , Alazab, Ammar
- Date: 2020
- Type: Text , Journal article
- Relation: Electronics (Switzerland) Vol. 9, no. 1 (2020), p.
- Full Text:
- Reviewed:
- Description: Cyberttacks are becoming increasingly sophisticated, necessitating the efficient intrusion detection mechanisms to monitor computer resources and generate reports on anomalous or suspicious activities. Many Intrusion Detection Systems (IDSs) use a single classifier for identifying intrusions. Single classifier IDSs are unable to achieve high accuracy and low false alarm rates due to polymorphic, metamorphic, and zero-day behaviors of malware. In this paper, a Hybrid IDS (HIDS) is proposed by combining the C5 decision tree classifier and One Class Support Vector Machine (OC-SVM). HIDS combines the strengths of SIDS) and Anomaly-based Intrusion Detection System (AIDS). The SIDS was developed based on the C5.0 Decision tree classifier and AIDS was developed based on the one-class Support Vector Machine (SVM). This framework aims to identify both the well-known intrusions and zero-day attacks with high detection accuracy and low false-alarm rates. The proposed HIDS is evaluated using the benchmark datasets, namely, Network Security Laboratory-Knowledge Discovery in Databases (NSL-KDD) and Australian Defence Force Academy (ADFA) datasets. Studies show that the performance of HIDS is enhanced, compared to SIDS and AIDS in terms of detection rate and low false-alarm rates. © 2020 by the authors. Licensee MDPI, Basel, Switzerland.
Information security: Definitions, threats and management in Dubai hospitals context
- Authors: Bakkar, Mahmoud , Alazab, Ammar
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 Cybersecurity and Cyberforensics Conference CCC 2019;Melbourne, VIC, Australia; 8-9 May 2019 p. 152-159
- Full Text: false
- Reviewed:
- Description: Information technology and high-tech systems used daily in hospitals increase the demand for measuring information security threats in the healthcare industry. The impact of complexity of using new healthcare information and communications technology (ICT) devices places more pressure on the healthcare community to perceive different information systems (IS) security threats as they involve different IS management models. This research study focused on measuring the healthcare community perceptions and on the following issues to include definition of information security perception of information security threats perception of information security management and perception of information security in the context of another healthcare community. To assess to plan, design and implement a national information security strategy for their healthcare sector. A survey was developed and interviewed 60 healthcare employees from three hospitals based in Dubai. The research results assist in creating awareness for easy access to hands-on guidelines for the healthcare community, thereby increasing the awareness levels of information security in the United Arab Emirates (UAE). These results assist the UAE government to further adapt the training and education programs for the healthcare community to increase their effectiveness and efficiency levels of IT and subsequent IS development. A discussion of the current status of Dubai hospitals privacy, confidentiality and security challenge is presented.
Malware detection and prevention system based on multi-stage rules
- Authors: Alazab, Ammar , Hobbs, Michael , Abawajy, Jemal , Khraisat, Ansam
- Date: 2013
- Type: Text , Journal article
- Relation: International Journal of Information Security and Privacy Vol. 7, no. 2 (2013), p. 29-43
- Full Text: false
- Reviewed:
- Description: The continuously rising Internet attacks pose severe challenges to develop an effective Intrusion Detection System (IDS) to detect known and unknown malicious attack. In order to address the problem of detecting known, unknown attacks and identify an attack grouped, the authors provide a new multi stage rules for detecting anomalies in multi-stage rules. The authors used the RIPPER for rule generation, which is capable to create rule sets more quickly and can determine the attack types with smaller numbers of rules. These rules would be efficient to apply for Signature Intrusion Detection System (SIDS) and Anomaly Intrusion Detection System (AIDS). Copyright © 2013, IGI Global.
Maximising competitive advantage on e-Business websites : A data mining approach
- Authors: Alazab, Ammar , Bevinakoppa, Savitri , Khraisat, Ansam
- Date: 2018
- Type: Text , Conference proceedings , Conference paper
- Relation: 2018 IEEE Conference on Big Data and Analytics, ICBDA 2018; Langkawi, Malaysia; 21st-22nd November 2018 p. 111-116
- Full Text: false
- Reviewed:
- Description: Many organizations are interested in analyzing and evaluating the web data for their websites because websites are a very important platform to carry out their business. However, website evaluations face many challenges in using analytics, especially with the huge amount of data that the websites are collecting from various sources. This explosive growth in data requires a complex tool for analyzing and automatically convert the data into valuable information. However, without using a proper analysis tool, it is very difficult to understand the user's behaviour, user's interaction patterns on the website and how users involve in the site. This paper explains methods to examine, understand and visualize the huge amounts of stored data collected from the websites. In this paper, a framework is developed for identifying user's behaviours on websites. Firstly, the attributes are extracted from different websites using Google Analytics and other API tools. Secondly, data mining techniques such as clustering, classification and information gain are applied to build this framework. The findings of these study can be used to evaluate the website and provide some guidelines for the web team to increase user engagement on the website and understand the influence of user behaviour. In addition, this framework is able to identify which behaviour features influence user decisions. Our proposed framework for identifying user's behaviours on websites is tested on a large dataset that contains a variety of individual users from different websites. © 2018 IEEE.
Multi-factor based enhancing students' motivations
- Authors: Kbar, Ghassan , Alazab, Ammar , Agbinya, Johnson
- Date: 2019
- Type: Text , Conference proceedings
- Relation: 2019 IEEE International Conference on Industrial Technology (ICIT); 2019 IEEE International Conference on Industrial Technology (ICIT); 13-15 Feb. 2019 p. 1054-1059
- Full Text: false
- Reviewed:
- Description: Student motivations are affected by many factors that are classified as intrinsic or/and extrinsic. This will influence students' engagement and consequently impacting their performance. To build a better judgment on the factors that affect student motivation, a comprehensive study should be applied in order to identify all factors and their drivers and how they influence student's motivation. Some of these factors have negative impact on motivation, while other have positive impact. In this paper, a multifactor based motivation has been assessed to distinguish the positive from negative factors. Then controlling student's motivation to enhance student engagement can be done through controlling these factors. The negative factors would be minimized or eliminated, and the positive factors will be encouraged and improved. Teaching institutions, universities and teachers play essential role in controlling these factors toward better motivation. A recommendation has been given to control the motivation factors that would lead to better student's engagement and performance.
Six sigma approach to improve quality in e-services: An empirical study in Jordan
- Authors: Alhyari, Salah , Alazab, Moutaz , Venkatraman, Sitalakshmi , Alazab, Mamoun , Alazab, Ammar
- Date: 2012
- Type: Text , Journal article
- Relation: International Journal of Electronic Government Research Vol. 8, no. 2 (April, 2012), p. 57-74
- Full Text: false
- Reviewed:
- Description: This paper investigates the application of the Six Sigma approach to improve quality in electronic services (e-services) as more countries are adopting e-services as a means of providing services to their people through the Web. This paper presents a case study about the use of Six Sigma model to measure customer satisfaction and quality levels achieved in e-services that were recently launched by public sector organisations in a developing country, such as Jordan. An empirical study consisting of 280 customers of Jordan's e-services is conducted and problems are identified through the DMAIC phases of Six Sigma. The service quality levels are measured and analysed using six main criteria: Website Design, Reliability, Responsiveness, Personalization, Information Quality, and System Quality. The study indicates a 74% customer satisfaction with a Six Sigma level of 2.12 has enabled the Greater Amman Municipality to identify the usability issues associated with their e-services offered by public sector organisations. The aim of the paper is not only to implement Six Sigma as a measurement-based strategy for improving e-customer service in a newly launched e-service programme, but also widen its scope in investigating other service dimensions and perform comparative studies in other developing countries.
Trends in Crime Toolkit Development
- Authors: Khraisat, Ansam , Alazab, Ammar , Hobbs, Michael , Abawajy, Jemal , Azab, Ahmad
- Date: 2014
- Type: Text , Book chapter
- Relation: Network Security Technologies : Design and Applications p. 1-330
- Full Text: false
- Reviewed:
- Description: Cybercriminals continue to target online users of banks. They are improving their techniques and using high levels of skill in their attacks. Their continued search for different methods to commit crime makes the existing protection system less effective. They have developed crime toolkits which have become more accessible and simpler to use, and this has attracted more cybercriminals to cybercrime. In this chapter, the authors study the methods that are used in crime toolkits. They present the development and current trend of crime toolkits and reveal the methods that have been used to commit cybercrime successfully.