أبحاث أعضاء هيئة التدريس

أنت هنا

A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks Usman Tariq
Abstract: Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.  

Mustafa Al-Fayoumi, Yasir Ahmad and Usman Tariq, “A  Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks” International Journal of Advanced Computer Science and Applications (IJACSA), 7(12), 2016. http://dx.doi.org/10.14569/IJACSA.2016.071207 

...
Global Ranking, Web Accessibility and Visibility of Websites of Quran: An Evaluation Study - 2015 شوكت احمد د

The less visible contents on web are difficult to search, so web users choose other alternatives for desired information. Thus a successful website should be accessible and visible on search engines. This research aims to evaluate sample Quranic website’s web accessibility level and visibility features like: traffic rank, inlinks, Page load time, search percentage and country visitors.

The websites can play an effective role in disseminating the Message of Quran. A more visible website on search engines can be accessed by big number of users and can be beneficial for the people at large scale, which helps to increase its linkage to other websites also  A sample data set of 10 Quranic websites/portals are investigated for Web Visibility and Content Accessibility. It is found that the Quranexplorer.com has attained a best traffic ranking among sample dataset. Any website following the Web Content Accessibility Guidelines can disseminate its information to many users despite users having aging or any disability problem like difficulty in hearing or vision. The research revealed several accessibility issues in terms of number of problems in sample dataset and concludes with few recommendations for good quality websites/web portals.

...
SAUT CAPTCHA: A Security Verification System for Visually Impaired Web Users شوكت احمد د

CAPTCHAs are widely used by websites for security and privacy purposes. However, text or image-based CAPTCHAs are not suitable for individuals with visual impairments. Audio CAPTCHAs were introduced as an accessible alternative for those unable to use the more common visual CAPTCHAs, but anecdotal accounts have suggested that they may be more difficult to solve. We propose an audio CAPTCHA called SAUT CAPTCHA designed for visually impaired web users, which presents audio-based challenge in which the user has to recognize a word from specific voice type (male, female, child or old) and to read out specific word........

...
Multi-Modal CAPTCHA: A User Verification Scheme شوكت احمد د

CAPTCHA is an automated test that humans can pass, but current computer programs can't
pass: any program that has high success over a CAPTCHA can be used to solve an unsolved Articial
Intelligence (AI) problem. The most widely used CAPTCHAs rely on the sophisticated distortion of text
images rendering them unrecognizable to the state of the art of pattern recognition techniques, and these
text-based schemes have found widespread applications in commercial websites like free email service
providers, social networking sites and online auction sites. The increase in bots breaking CAPTCHAs
shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail
services today. Bots can easily read the distorted letters and words using optical character recognition
(OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is
summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case
study results and including other points which may pose difficulty for the OCR systems. In this paper we
proposed a new technique to build a CAPTCHA which is multi-modal (Picture and Text based). An
image is being rendered on the screen and many text labels drawn over it. A user has to identify the
correct name of the underlying image among the set of text labels that are scattered over it, in order to
pass a human verification test. We also proposed to use cursive text instead of plain text labels.

...
SECURED ARCHITECTURE STRATEGY FOR FIGHTING AGAINST BOTS Yasir احمد Ahmad

CAPTCHA stands for Completely Automated Public Turing Tests to Tell Computers and Humans Apart .A CAPTCHA is a program that protects websites against bots –automated scripts by generating and grading tests that humans can pass but current computer programs cannot. The aim is to allow the server to identify the visitor is a human or a computer, and only provide services to human. It can improve the current server system and user information security.The increase in bots breaking CAPTCHAs shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail services today. Bots can easily read the distorted letters and words using optical character recognition (OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case study results and including other points which may pose difficulty for the OCR systems. In this paper we proposed a new technique to build a CAPTCHA which is hybrid (both Picture and Text based with multiple fonts). An image is being rendered on the screen and many text labels of multiple fonts drawn over it. A user has to identify the correct name of the underlying image among the set of text labels that are scattered over it, in order to pass a human verification test. We proposed to use multiple fonts for each letter of a single word inside a Captcha which increases the more complexity of training OCR...

Detecting Cyber Attacks at Data Dribble Yasir احمد Ahmad
This research article proposes a new technique for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application [1,2]. This technique allows us to detect the most common types of network attack (DDoS and port scanning) and most importantly make a list of IP-addresses of trespassers. So, the technique can be used in intrusion detection systems, and in those systems which can track and lock these IP-addresses. ...
A New Approach in T-FA Authentication with OTP Using Mobile Phone Yasir احمد Ahmad
Security will never go out of style. The most existing network applications authenticate users with an username/password system. Such systems using the reusable passwords are susceptible to attacks based on the theft of the password. To overcome the above susceptibility in the existing applications There exist an authentication mechanism known as Two factor Authentication (T-FA). Two factor authentication is a process used to authenticate or verify the identity of a person or other entity requesting access under security constraints. It is a system wherein two different factors are used in conjunction to authenticate. Using two factors as opposed to one factor generally delivers a higher level of authentication assurance. With One-time password (OTP) a factor makes it more difficult to gain unauthorized access to restricted resources, like a computer account, bank account etc. In this paper, we propose a new approach in implementing the two factor authentication with one of the factor as one time password key generation using mobile phones. ...
Strategic of telework to promote the role of women and people with special needs in community development, study from a technical perspectiveStrategic of telework to promote the role of women and people with special needs in community development, study f ناهد عصري ابو زيد

Strategic of telework to promote the role of women and people with special needs in community development, study from a technical perspective

...
Studying Relations Between Websites Structural and Popularity Metrics ناهد عصري ابو زيد

Studying Relations Between Websites Structural and Popularity Metrics

...
Web structural metrics evaluation ناهد عصري ابو زيد

Dr Izzat Alsmadi, Dr. Ahmad T. Al-Taani, and Nahed Abu Zaid, In Proceeding of the Third International Conference on Developments in eSystems Engineering DESE 2010, UK. <cmsproj.cms.livjm.ac.uk/dese10>.

...
QR Code for https://cces.psau.edu.sa/ar/sources/research