16 results on '"Mamoun Qasem"'
Search Results
2. Cyber Security Education and Future Provision.
- Author
-
Gaynor Davies, Mamoun Qasem, and Ahmed M. Elmisery
- Published
- 2020
- Full Text
- View/download PDF
3. Addressing the DAO Insider Attack in RPL's Internet of Things Networks.
- Author
-
Baraq Ghaleb, Ahmed Yassin Al-Dubai, Elias Ekonomou, Mamoun Qasem, Imed Romdhani, and Lewis M. Mackenzie
- Published
- 2019
- Full Text
- View/download PDF
4. A new efficient objective function for routing in Internet of Things paradigm.
- Author
-
Mamoun Qasem, Ahmed Yassin Al-Dubai, Imed Romdhani, Baraq Ghaleb, and Wajeb Gharibi
- Published
- 2016
- Full Text
- View/download PDF
5. Trickle-plus: Elastic Trickle algorithm for low-power networks and Internet of Things.
- Author
-
Baraq Ghaleb, Ahmed Yassin Al-Dubai, Elias Ekonomou, Ben Paechter, and Mamoun Qasem
- Published
- 2016
- Full Text
- View/download PDF
6. A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things.
- Author
-
Mamoun Qasem, Ahmed Yassin Al-Dubai, Imed Romdhani, and Muneer O. Bani Yassein
- Published
- 2015
- Full Text
- View/download PDF
7. Performance Evaluation of RPL Objective Functions.
- Author
-
Mamoun Qasem, Hussien Altawssi, Muneer O. Bani Yassein, and Ahmed Yassin Al-Dubai
- Published
- 2015
- Full Text
- View/download PDF
8. Cyber Security Education and Future Provision
- Author
-
Mamoun Qasem, Gaynor Davies, and Ahmed M. Elmisery
- Subjects
2019-20 coronavirus outbreak ,Coronavirus disease 2019 (COVID-19) ,Higher education ,Computer science ,business.industry ,Control (management) ,Exceptional circumstances ,Computer security ,computer.software_genre ,Cybercrime ,Workforce ,Element (criminal law) ,business ,computer - Abstract
Cybersecurity education is a crucial element to provide a workforce for the future to have an awareness together with the skills and knowledge enabling them to adapt and diversify in the field. Cybercrime is covered by the need for distinct aspects of security and measures of control on subsequent systems and devices. As the need for Cybersecurity specialists has increased in recent years and during the exceptional circumstances of the Covid-19 pandemic, the provision of education in secondary, post-16 and higher education sectors needs to be met. Utilisation of strategies and innovations to meet industry and educational expectations is key for future provision. Drive for different strategies and innovations in place by governments and organisations throughout the world, as provision in education is not balanced enough to cope with the increasing demand for a cybersecurity workforce. This study will inform recommendations for effective provision of future cybersecurity education.
- Published
- 2021
- Full Text
- View/download PDF
9. Efficient Threat Hunting Methodology for Analyzing Malicious Binaries in Windows Platform
- Author
-
Mamoun Qasem, Ahmed M. Elmisery, and Mirela Sertovic
- Subjects
Computer science ,Incident response ,Early detection ,Malware ,Data breach ,Set (psychology) ,Computer security ,computer.software_genre ,computer ,Blocking (computing) ,Security controls ,Cyber threats - Abstract
The rising cyber threat puts organizations and ordinary users at risk of data breaches. In many cases, Early detection can hinder the occurrence of these incidents or even prevent a full compromise of all internal systems. The existing security controls such as firewalls and intrusion prevention systems are constantly blocking numerous intrusions attempts that happen on a daily basis. However, new situations may arise where these security controls are not sufficient to provide full protection. There is a necessity to establish a threat hunting methodology that can assist investigators and members of the incident response team to analyse malicious binaries quickly and efficiently. The methodology proposed in this research is able to distinguish malicious binaries from benign binaries using a quick and efficient way. The proposed methodology consists of static and dynamic hunting techniques. Using these hunting techniques, the proposed methodology is not only capable of identifying a range of signature-based anomalies but also to pinpoint behavioural anomalies that arise in the operating system when malicious binaries are triggered. Static hunting can describe any extracted artifacts as malicious depending on a set of pre-defined patterns of malicious software. Dynamic hunting can assist investigators in finding behavioural anomalies. This work focuses on applying the proposed threat hunting methodology on samples of malicious binaries, which can be found in common malware repositories and presenting the results.
- Published
- 2021
- Full Text
- View/download PDF
10. Addressing the DAO Insider Attack in RPL’s Internet of Things Networks
- Author
-
Mamoun Qasem, Imed Romdhani, Lewis M. Mackenzie, Baraq Ghaleb, Ahmed Al-Dubai, and Elias Ekonomou
- Subjects
Routing protocol ,Exploit ,Computer science ,QA75 Electronic computers. Computer science ,Node (networking) ,Reliability (computer networking) ,621.3821 Communications Networks ,020206 networking & telecommunications ,02 engineering and technology ,Network topology ,Computer security ,computer.software_genre ,AI and Technologies ,Computer Science Applications ,Insider ,Side effect (computer science) ,Modelling and Simulation ,Modeling and Simulation ,Centre for Distributed Computing, Networking and Security ,0202 electrical engineering, electronic engineering, information engineering ,Network performance ,Networks ,Electrical and Electronic Engineering ,computer - Abstract
In RPL routing protocol, the destination advertisement object (DAO) control messages are announced by the child nodes to their parents to build downward routes. A malicious insider node can exploit this feature to send fake DAOs to its parents periodically, triggering those parents, in turn, to forward the fake messages upward to the root node. In this letter, we show how this behavior can have a detrimental side effect on the performance of the network, increasing power consumption, latency, and reducing reliability. To address this problem, a new scheme is introduced to mitigate significantly the effect of the DAO attack on network performance.
- Published
- 2019
- Full Text
- View/download PDF
11. A new efficient objective function for routing in Internet of Things paradigm
- Author
-
Wajeb Gharibi, Mamoun Qasem, Imed Romdhani, Baraq Ghaleb, and Ahmed Al-Dubai
- Subjects
Routing protocol ,Mathematical optimization ,business.industry ,Computer science ,Network packet ,Distributed computing ,Message format ,Node (networking) ,020208 electrical & electronic engineering ,020206 networking & telecommunications ,02 engineering and technology ,Bottleneck ,IPv6 ,0202 electrical engineering, electronic engineering, information engineering ,Overhead (computing) ,Routing (electronic design automation) ,business ,Computer network - Abstract
Low Power and Lossy Networks (LLNs) have a crucial role in the Internet of Things (IoT) paradigm. For the IPv6 Routing Protocol for LLNs (RPL), two objective functions (OF) have been standardized so far, namely (Objective Function zero (OF0), and the Minimum Rank with Hysteresis Objective Function (MRHOF). However, these particular objective functions are used to build a topology where bottleneck nodes may suffer from an excessive unbalanced traffic load. As a result, a part of the network may be disconnected as the energy of the overburdened preferred parent node will drain much faster than other candidate parent nodes. Thus, in this paper, we propose a new objective function that balances the number of children nodes for the overburdened nodes to ensure node lifetime maximization. To implement this OF, we amended the DIO message format. By using a new utilization technique, we also mitigated any potential extra overhead. Finally, a new RPL metric has been introduced to balance the traffic load over the network. Simulation experiments have been conducted to examine the performance of our new approach. Collected results corroborate the superiority of our objective function over the existing ones in terms of lifetime, power consumption and packet delivery ratio.
- Published
- 2016
- Full Text
- View/download PDF
12. An energy-efficient technique for constrained application protocol of Internet of Things
- Author
-
Ahmad Bani Amer, Qusai Abuein, Muneer Bani Yasin, and Mamoun Qasem
- Subjects
Resource (project management) ,business.industry ,Computer science ,Lightweight Directory Access Protocol ,Server ,Node (networking) ,Overhead (computing) ,Directory ,business ,Constrained Application Protocol ,Efficient energy use ,Computer network - Abstract
The CoRE Working Group has proposed a resource directory (RD) in the centralized resource discovery of the constrained application protocol (CoAP). This directory contains a description for resources held in the servers, in which the servers register their resources in the RD while the clients are allowed to perform a lookup operation on these resources, and ask for any resource using single request. In order of making the resource directory fully updated, all nodes are periodically sending update messages (after fixed period of time) to the RD contains the latest status of their information, these update messages will result in extra signaling overhead and consume more power from node's battery, this will drain the batteries and reduce the overall network lifetime. We have proposed a dynamic tuning technique to adjust the update message interval in CoAP, the proposed algorithm is depending on the battery level of the sending node, in which the update interval increased as battery level decreased. The results of experiments show that the dynamic approach can extend the network lifetime by 25%.
- Published
- 2016
- Full Text
- View/download PDF
13. Trickle-Plus: Elastic Trickle algorithm for Low-power networks and Internet of Things
- Author
-
Ben Paechter, Baraq Ghaleb, Mamoun Qasem, Elias Ekonomou, and Ahmed Al-Dubai
- Subjects
Routing protocol ,Dynamic Source Routing ,Computer science ,Equal-cost multi-path routing ,Routing table ,Distributed computing ,Enhanced Interior Gateway Routing Protocol ,Wireless Routing Protocol ,02 engineering and technology ,Routing Information Protocol ,Convergence (routing) ,0202 electrical engineering, electronic engineering, information engineering ,Destination-Sequenced Distance Vector routing ,Hierarchical routing ,Static routing ,Zone Routing Protocol ,business.industry ,Policy-based routing ,020206 networking & telecommunications ,Supernetwork ,Energy consumption ,Distance-vector routing protocol ,Routing domain ,Link-state routing protocol ,Multipath routing ,Interior gateway protocol ,020201 artificial intelligence & image processing ,Hazy Sighted Link State Routing Protocol ,business ,Algorithm ,Computer network - Abstract
Constrained Low-power and Lossy networks (LLNs) represent the building block for the ever-growing Internet of Things (IoT) that deploy the Routing Protocol for Low Power and Lossy networks (RPL) as a key routing standard. RPL, along with other routing protocols, relies on Trickle algorithm as a mechanism for controlling and maintaining the routing traffic frequency. The efficiency of Trickle has been approved in terms of power consumption and scalability. However, different settings of Trickle parameters affect differently the routing behavior, energy consumption and network convergence time. In particular, a network could be only configured to have either lower convergence time with high power consumption or vice versa using Trickle. Thus, motivated by this observation, the paper presents Trickle-Plus as an extended version of the Trickle algorithm. Trickle-Plus increases the elasticity of the protocol, enabling the network configuration within guaranteed optimality for both convergence time and energy consumption. Our simulation experiments confirm the gains of the proposed Trickle-Plus under different operating conditions.
- Published
- 2016
- Full Text
- View/download PDF
14. Performance Evaluation of RPL Objective Functions
- Author
-
Ahmed Al-Dubai, Mamoun Qasem, Hussien Altawssi, and Muneer Bani Yassien
- Subjects
Routing protocol ,Linear programming ,Computer science ,business.industry ,Network packet ,Node (networking) ,Topology (electrical circuits) ,business ,Network topology ,Grid ,Wireless sensor network ,Computer network - Abstract
Recently, IETF standardised a powerful and flexible Routing Protocol for Low Power and Lossy Networks (RPL). It selects the ideal routes from a source to a destination node based on certain metrics injected into the Objective Function (OF). In this study, the performance of RPL has been investigated in terms of two OFs (i.e. Minimum Rank with Hysteresis Objective Function (MRHOF) and Objective Function Zero (OF0)) in various topologies (grid, random) which makes this work distinctive. To study the RPL OFs performance, various parameters are considered Packet Delivery Ratio (PDR), Power Consumption and RX. The evaluation has been conducted based on these parameters (RX, topology) and compared for both OFs. The simulation results revealed that these parameters have a great impact on the PDR and achieved saved energy levels in the given networks. Our results have also indicated that the performance of RPL within light density networks for MRHOF can provide a better RPL behavior that OF0 could not provide.
- Published
- 2015
- Full Text
- View/download PDF
15. A Dynamic Power Tuning for the Constrained Application Protocol of Internet of Things
- Author
-
Muneer Bani Yassien, Romdhani, Imed, Mamoun Qasem, and Ahmed Al-Dubai
- Subjects
business.industry ,Computer science ,Node (networking) ,Dynamic demand ,Process (computing) ,Overhead (computing) ,Energy consumption ,business ,Protocol (object-oriented programming) ,Wireless sensor network ,Computer network ,Constrained Application Protocol - Abstract
Constrained application protocol (CoAP) has been designed for M2M and IoT applications. The resource directory (RD) in CoAP requires periodical updates by other nodes. However, a regular update process causes extra signaling overhead and drains the node's battery, which consequently reduces the battery lifetime of all nodes. Thus, there is a need to adjust the update interval to prolong the lifetime of the entire network. Although this problem has been investigated in the literature, it is still in its infancy as existing works do not consider the dynamic periodic adjustments of the update messages. To fill in this gap, this paper devise a new adaptive tuning approach between CoAP clients and their CoAP-RD to adjust the frequency of updates based on the battery level of the transmitting node. We evaluated our protocol using simulation experiments. The simulation results confirm that the adaptive tuning approach outperforms its traditional counterpart by 10 to 15% with respect to the overall network lifetime.
- Published
- 2015
- Full Text
- View/download PDF
16. ATP
- Author
-
Muneer Bani Yassien, Ahmed Al-Dubai, Romdhani Imed, and Mamoun Qasem
- Subjects
Stateless protocol ,Engineering ,Service (systems architecture) ,Stateful firewall ,business.industry ,Node (computer science) ,Service discovery ,Overhead (computing) ,business ,Protocol (object-oriented programming) ,Wireless sensor network ,Computer network - Abstract
Energy is a precious resource in Internet of Things (IoT) especially with battery operated nodes, the overhead that consumes the battery power of the sensor nodes is a fundamental problem. This overhead is mainly caused by the frequent update messages sent to service directories. Although this problem has been investigated in the literature, it is still in its infancy as existing works do not consider the dynamic adjustments of the update messages. To fill in this gap, this paper presents a new adaptive tuning approach between sensor nodes and the resource directory to adjust the frequency of updates based on the battery level of the sensing node. Our protocol works dynamically in both modes, stateless and stateful service registration mechanisms.
- Published
- 2015
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.