5 results on '"Sarkhel H. Taher Karim"'
Search Results
2. AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
- Author
-
Amir Masoud Rahmani, Mokhtar Mohammadi, Jan Lansky, Stanislava Mildeova, Masoumeh Safkhani, Saru Kumari, Sarkhel H. Taher Karim, and Mehdi Hosseinzadeh
- Subjects
Global mobility network ,roaming ,stolen smart card attack ,traceability attack ,impersonation attack ,Scyther ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara et al. recently reported security vulnerabilities of Xu et al.’s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG’s security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.
- Published
- 2021
- Full Text
- View/download PDF
3. Deep Learning-Based Intrusion Detection Systems: A Systematic Review
- Author
-
Jan Lansky, Saqib Ali, Mokhtar Mohammadi, Mohammed Kamal Majeed, Sarkhel H. Taher Karim, Shima Rashidi, Mehdi Hosseinzadeh, and Amir Masoud Rahmani
- Subjects
Intrusion detection ,auto-encoder ,recurrent neural network ,Boltzmann machine ,CNN ,Electrical engineering. Electronics. Nuclear engineering ,TK1-9971 - Abstract
Nowadays, the ever-increasing complication and severity of security attacks on computer networks have inspired security researchers to incorporate different machine learning methods to protect the organizations’ data and reputation. Deep learning is one of the exciting techniques which recently are vastly employed by the IDS or intrusion detection systems to increase their performance in securing the computer networks and hosts. This survey article focuses on the deep learning-based intrusion detection schemes and puts forward an in-depth survey and classification of these schemes. It first presents the primary background concepts about IDS architecture and various deep learning techniques. It then classifies these schemes according to the type of deep learning methods utilized in each of them. It describes how deep learning networks are utilized in the intrusion detection process to recognize intrusions accurately. Finally, a complete analysis of the investigated IDS frameworks is provided, and concluding remarks and future directions are highlighted.
- Published
- 2021
- Full Text
- View/download PDF
4. AMAPG: Advanced Mobile Authentication Protocol for GLOMONET
- Author
-
Stanislava Mildeová, Saru Kumari, Mehdi Hosseinzadeh, Amir Masoud Rahmani, Jan Lansky, Mokhtar Mohammadi, Masoumeh Safkhani, and Sarkhel H. Taher Karim
- Subjects
Password ,Authentication ,General Computer Science ,Computer science ,business.industry ,Scyther ,General Engineering ,Cryptographic protocol ,Computer security ,computer.software_genre ,stolen smart card attack ,TK1-9971 ,impersonation attack ,Key (cryptography) ,traceability attack ,Foreign agent ,General Materials Science ,Global mobility network ,Electrical engineering. Electronics. Nuclear engineering ,Smart card ,Roaming ,roaming ,business ,Mobile device ,computer - Abstract
Roaming is when the mobile user goes out of his/her home agent network coverage and loses its signal. Loss of coverage and signals may be limited to a remote area or may occur when mobile user leaves the country and moves to a country where his/her mobile carrier network is not available. In this case, the mobile device is in roaming mode. In this mode, mobile user through connection to a Foreign Agent can still use its home agent services if his/her authentication be successful. In such situations, the authentication mechanism plays a key and important role, where the mobile user often needs to integrate and secure roaming service over multiple foreign agents. Designing a secure mechanism in Global Mobility Network (GLOMONET) is a difficult and complex task due to the computational and processing limitations of most mobile devices, as well as the wireless nature of communication environment. Unfortunately, most of the authentication schemes that have been proposed so far to meet this goal have failed to achieve their goal. In this line, Shashidhara et al. recently reported security vulnerabilities of Xu et al.’s mobile authentication scheme, and also presented an amended version of it. This paper shows that this proposed scheme has security flaws against impersonation, traceability, forward secrecy contradiction, and stolen smart card attacks, which implies that this protocol may not be a proper choice to be used on GLOMONET. On the other hand, we propose AMAPG, as a cost-efficient remedy version of the protocol which provides desired security against various attacks and also prove its security using BAN logic. We also evaluate AMAPG’s security using Scyther as a widely used formal tool to evaluate the security correctness of the cryptographic protocols.
- Published
- 2021
- Full Text
- View/download PDF
5. Deep Learning-Based Intrusion Detection Systems: A Systematic Review
- Author
-
Saqib Ali, Mehdi Hosseinzadeh, Mohammed Kamal Majeed, Sarkhel H. Taher Karim, Amir Masoud Rahmani, Jan Lansky, Mokhtar Mohammadi, and Shima Rashidi
- Subjects
General Computer Science ,Boltzmann machine ,business.industry ,Process (engineering) ,Computer science ,Deep learning ,auto-encoder ,Feature extraction ,General Engineering ,Intrusion detection system ,Machine learning ,computer.software_genre ,Autoencoder ,TK1-9971 ,Recurrent neural network ,Intrusion detection ,recurrent neural network ,General Materials Science ,Anomaly detection ,Electrical engineering. Electronics. Nuclear engineering ,Artificial intelligence ,business ,computer ,CNN - Abstract
Nowadays, the ever-increasing complication and severity of security attacks on computer networks have inspired security researchers to incorporate different machine learning methods to protect the organizations’ data and reputation. Deep learning is one of the exciting techniques which recently are vastly employed by the IDS or intrusion detection systems to increase their performance in securing the computer networks and hosts. This survey article focuses on the deep learning-based intrusion detection schemes and puts forward an in-depth survey and classification of these schemes. It first presents the primary background concepts about IDS architecture and various deep learning techniques. It then classifies these schemes according to the type of deep learning methods utilized in each of them. It describes how deep learning networks are utilized in the intrusion detection process to recognize intrusions accurately. Finally, a complete analysis of the investigated IDS frameworks is provided, and concluding remarks and future directions are highlighted.
- Published
- 2021
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.