Zobrazeno 1 - 10
of 18
pro vyhledávání: '"Hamad Binsalleeh"'
Publikováno v:
IEEE Access, Vol 12, Pp 90707-90725 (2024)
DDoS attacks pose serious threats to the availability and reliability of computer networks. With the increasing complexity of DDoS attacks, the accurate detection and classification of these attacks is essential to ensure the protection of network sy
Externí odkaz:
https://doaj.org/article/c75848b36b014d29898064a374edb4cb
Autor:
Sharoug Alzaidy, Hamad Binsalleeh
Publikováno v:
Applied Sciences, Vol 14, Iss 4, p 1673 (2024)
In the field of behavioral detection, deep learning has been extensively utilized. For example, deep learning models have been utilized to detect and classify malware. Deep learning, however, has vulnerabilities that can be exploited with crafted inp
Externí odkaz:
https://doaj.org/article/1fe12da5e9394f3fbde2214d0806c9c9
Publikováno v:
Applied Sciences, Vol 13, Iss 15, p 8820 (2023)
With the rise of DDoS attacks, several machine learning-based attack detection models have been used to mitigate malicious behavioral attacks. Understanding how machine learning models work is not trivial. This is particularly true for complex and no
Externí odkaz:
https://doaj.org/article/aebf5f15763a414d8c618661e3b82135
Autor:
Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan, Francisco J. Aparicio-Navarro, Basil Assadhan, Hamad Binsalleeh, Diab M. Diab
Publikováno v:
IEEE Access, Vol 7, Pp 99508-99520 (2019)
Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced persistent threats (APTs) have emerged as a new and complex version of multi-stage attacks (MSAs), t
Externí odkaz:
https://doaj.org/article/0d32df2849f14f7eb4071f7aae4946b3
Autor:
Ibrahim Ghafir, Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil Assadhan, Hamad Binsalleeh
Publikováno v:
IEEE Access, Vol 6, Pp 40008-40023 (2018)
The broadcast nature of wireless local area networks has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication, and rogue access point attacks. The implementation of n
Externí odkaz:
https://doaj.org/article/8aaa4c29ec82489aa08b74ff74c0dcfe
Autor:
Sangarapillai Lambotharan, Abraham Alzoghaiby, Basil AsSadhan, Konstantinos G. Kyriakopoulos, Hamad Binsalleeh
Publikováno v:
International Journal of Network Management. 30
The detection of anomalies in network traffic is an important task in today’s Internet. Among various anomaly detection methods, the techniques based on examination of the long-range dependence (LRD) behavior of network traffic stands out to be pow
Autor:
Hamad Binsalleeh, Ibrahim Ghafir, Diab M. Diab, Konstantinos G. Kyriakopoulos, Sangarapillai Lambotharan, Basil AsSadhan
Publikováno v:
CSE/EUC
Analyzing network traffic behavior is essential for detecting network anomalies. However, it remains a challenge to effectively analyze this behavior for anomaly diagnosis. One promising approach is to decompose network traffic into control and data
Autor:
Francisco J. Aparicio-Navarro, Sangarapillai Lambotharan, Basil AsSadhan, Ibrahim Ghafir, Diab M. Diab, Hamad Binsalleeh, Konstantinos G. Kyriakopoulos
Publikováno v:
IEEE Access, Vol 7, Pp 99508-99520 (2019)
Cyber security has become a matter of a global interest, and several attacks target industrial companies and governmental organizations. The advanced persistent threats (APTs) have emerged as a new and complex version of multi-stage attacks (MSAs), t
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::3b63dfe6ad19c2724e560b1e04fb4d4f
https://doi.org/10.1109/access.2019.2930200
https://doi.org/10.1109/access.2019.2930200
Autor:
Konstantinos G. Kyriakopoulos, Francisco J. Aparicio-Navarro, Basil AsSadhan, Ibrahim Ghafir, Sangarapillai Lambotharan, Hamad Binsalleeh
Publikováno v:
IEEE Access, Vol 6, Pp 40008-40023 (2018)
open access article The broadcast nature of Wireless Local Area Networks (WLANs) has made them prone to several types of wireless injection attacks, such as Man-in-the-Middle (MitM) at the physical layer, deauthentication and rogue access point attac
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::b41410f03d73b4dafd637b34ba4f1638
https://dspace.lboro.ac.uk/2134/34208
https://dspace.lboro.ac.uk/2134/34208
Publikováno v:
Digital Investigation. 11:S114-S123
During November 2013, the operational cyber/network security community reported an unprecedented increase of traffic originating from source port 0. This event was deemed as malicious although its core aim and mechanism were obscured. This paper inve