Faculty Members researchs

You are here

Constrained region-space control for medical robot manipulator, Journal of Computers and Electrical Engineering Yassine Salah BOUTERAA
Constrained region-space control for medical robot manipulator, Journal of Computers and Electrical Engineering ...
A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks Yasir M Ahmad

Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.

...
A Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks Usman Tariq
Abstract: Wireless sensor network (WSN) has been broadly implemented in real world applications, such as monitoring of forest fire, military targets detection, medical and/or science areas and above all in our daily home life as well. Nevertheless, WSNs are effortlessly compromised by adversaries due to their broadcast transmission medium as a means of communication which are lacking in tamper resistance. Consequently, an intruder can over hear all traffic, replay previous messages, inject malicious data packets, or can compromise a node. Commonly, sensor nodes are very much vulnerable of two main issues in security aspect that are node authentication and compromising a node. In this paper, a heterogeneous framework of node capture and intrusion detection for WSNs is proposed. This framework efficiently detects the captured nodes by using a novel technique, embedded with an Intrusion Detection mechanism which aggregates Signature and Anomaly based approach with Neural Network Multi-Layer Perceptron (MLP) classification in a clustering environment. Moreover, the proposed framework achieves efficiency at reasonable computation and communication costs and it can be a security shield to real WSN applications.  

Mustafa Al-Fayoumi, Yasir Ahmad and Usman Tariq, “A  Heterogeneous Framework to Detect Intruder Attacks in Wireless Sensor Networks” International Journal of Advanced Computer Science and Applications (IJACSA), 7(12), 2016. http://dx.doi.org/10.14569/IJACSA.2016.071207 

...
Global Ranking, Web Accessibility and Visibility of Websites of Quran: An Evaluation Study - 2015 Shouket Ahmad .

The less visible contents on web are difficult to search, so web users choose other alternatives for desired information. Thus a successful website should be accessible and visible on search engines. This research aims to evaluate sample Quranic website’s web accessibility level and visibility features like: traffic rank, inlinks, Page load time, search percentage and country visitors.

The websites can play an effective role in disseminating the Message of Quran. A more visible website on search engines can be accessed by big number of users and can be beneficial for the people at large scale, which helps to increase its linkage to other websites also  A sample data set of 10 Quranic websites/portals are investigated for Web Visibility and Content Accessibility. It is found that the Quranexplorer.com has attained a best traffic ranking among sample dataset. Any website following the Web Content Accessibility Guidelines can disseminate its information to many users despite users having aging or any disability problem like difficulty in hearing or vision. The research revealed several accessibility issues in terms of number of problems in sample dataset and concludes with few recommendations for good quality websites/web portals.

...
Secured architecture strategy for fighting against bots Shouket Ahmad .

The increase in bots breaking CAPTCHAs shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail services today. Bots can easily read the distorted letters and words using optical character recognition (OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case study results and including other points which may pose difficulty for the OCR systems. In this paper we proposed a new technique to build a CAPTCHA which is hybrid (both Picture and Text based with multiple fonts). An image is being rendered on the screen and many text labels of multiple fonts drawn over it.......

...
SAUT CAPTCHA: A Security Verification System for Visually Impaired Web Users Shouket Ahmad .

CAPTCHAs are widely used by websites for security and privacy purposes. However, text or image-based CAPTCHAs are not suitable for individuals with visual impairments. Audio CAPTCHAs were introduced as an accessible alternative for those unable to use the more common visual CAPTCHAs, but anecdotal accounts have suggested that they may be more difficult to solve. We propose an audio CAPTCHA called SAUT CAPTCHA designed for visually impaired web users, which presents audio-based challenge in which the user has to recognize a word from specific voice type (male, female, child or old) and to read out specific word........

...
Evaluation of World Ranking, Web Visibility and Content Accessibility of Quran Web Portals Shouket Ahmad .

The use of search engines is the most common way of finding the information. This means that less visible contents (for search engines) are increasingly difficult or even almost impossible to find. Thus, Web users are forced to accept alternative services or contents only because they are visible and offered to users by search engines..Therefore, it is fundamental to assure that one’s Web site will be indexed and, consequently, visible and accessible to as many Web users as possible. The websites are the most useful platform to disseminate Quran knowledge and information.

...
Multi-Modal CAPTCHA: A User Verification Scheme Shouket Ahmad .

CAPTCHA is an automated test that humans can pass, but current computer programs can't
pass: any program that has high success over a CAPTCHA can be used to solve an unsolved Articial
Intelligence (AI) problem. The most widely used CAPTCHAs rely on the sophisticated distortion of text
images rendering them unrecognizable to the state of the art of pattern recognition techniques, and these
text-based schemes have found widespread applications in commercial websites like free email service
providers, social networking sites and online auction sites. The increase in bots breaking CAPTCHAs
shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail
services today. Bots can easily read the distorted letters and words using optical character recognition
(OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is
summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case
study results and including other points which may pose difficulty for the OCR systems. In this paper we
proposed a new technique to build a CAPTCHA which is multi-modal (Picture and Text based). An
image is being rendered on the screen and many text labels drawn over it. A user has to identify the
correct name of the underlying image among the set of text labels that are scattered over it, in order to
pass a human verification test. We also proposed to use cursive text instead of plain text labels.

...
SECURED ARCHITECTURE STRATEGY FOR FIGHTING AGAINST BOTS Yasir M Ahmad

CAPTCHA stands for Completely Automated Public Turing Tests to Tell Computers and Humans Apart .A CAPTCHA is a program that protects websites against bots –automated scripts by generating and grading tests that humans can pass but current computer programs cannot. The aim is to allow the server to identify the visitor is a human or a computer, and only provide services to human. It can improve the current server system and user information security.The increase in bots breaking CAPTCHAs shows the ineffectiveness of the text-based CAPTCHAs that are used on most websites and Webmail services today. Bots can easily read the distorted letters and words using optical character recognition (OCR) or break the CAPTCHA using a dictionary attack. The weakness of each CAPTCHA scheme is summarized and accordingly we make an approach to build our CAPTCHA scheme. Considering the case study results and including other points which may pose difficulty for the OCR systems. In this paper we proposed a new technique to build a CAPTCHA which is hybrid (both Picture and Text based with multiple fonts). An image is being rendered on the screen and many text labels of multiple fonts drawn over it. A user has to identify the correct name of the underlying image among the set of text labels that are scattered over it, in order to pass a human verification test. We proposed to use multiple fonts for each letter of a single word inside a Captcha which increases the more complexity of training OCR...

Detecting Cyber Attacks at Data Dribble Yasir M Ahmad
This research article proposes a new technique for detecting unauthorized network intrusions, based on a traffic flow model and Cisco NetFlow protocol application [1,2]. This technique allows us to detect the most common types of network attack (DDoS and port scanning) and most importantly make a list of IP-addresses of trespassers. So, the technique can be used in intrusion detection systems, and in those systems which can track and lock these IP-addresses. ...
QR Code for https://cces.psau.edu.sa/en/sources/research