Waqas Tariq | City university of Science and information Technology Peshawar (original) (raw)
Supervisors: Mr. Fasee Ullah Khan and Mr. Muhammad Saqib
Phone: +923159081429
less
Uploads
Papers by Waqas Tariq
The impact of social websites can be good on students but if we have a closer look on the real im... more The impact of social websites can be good on students but if we
have a closer look on the real impact of social networks. Today it
is ruining the future and carrier of students. The social
networking websites like https://www.linkedin.com,
http://www.facebook.com/, https://twitter.com/ and
https://www.orkut.com/ etc. are continuously distracting students
from their studies. The main focus of student should be education
but unfortunately today’s student are emphasizing on such sites
which can be a complete wastage of time. Social Networks was
only an electronic connection between users but unfortunately it
has become an addiction for students, teenagers and even adults.
This paper presents impact of social networks on education,
students and impact on life of teenagers, further it describes how
social networking websites are auditory and dangerous for youth
and teenagers.
This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are on... more This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are one of the most popular websites in the filed of education and business respectively. Most of the web 2.0 attributes have been added in these two web sites due to which they are more feasible, popular and well-organized websites. These two web sites provide common community portal such as online searching, online digital library, online shopping, sharing thoughts, feedbacks etc and last is SZABIST university website (www.szabist-isb.edu.pk) which has its own style of representation of web 2.0 attributes. Many of the web 2.0 services have not been included in SZABIST university website such as searching ideas (very limited), community based discussion, sharing views etc.
In Computer Network number of security techniques provide security consolation but not up to opt... more In Computer Network number of security techniques provide
security consolation but not up to optimal security extent. There
are massive attacks and efficient viruses travel across the
network which incapacitates computer system and default
configuration of the operating system. Preceding techniques can
capture anomalous activates and previous known attacks but
unknown Security attacks have learned to survive in a high
secure precinct, it must be noticed by every technical person that
virus has an augmenting influence, so it is very difficult to detect
unknown attacks at application layer on the run time.
This study analyzes some of the best well known Intrusion
detection techniques and challenging number of attacks including
unknown attacks. This paper presents some of appropriate
techniques which are proposed for intrusion detection and
anomaly detection.
Keywords: Security; operating system; Network intrusion
detection; anomaly detection; Attacks;
Computer networks have important role regarding communication between the machines. Providing fi... more Computer networks have important role regarding
communication between the machines. Providing finite
number of connections could be a little difficult to secure
every connection from security hazards. Researchers have
proposed many solutions for possible security hazards and
known attacks but unfortunately it does not provide
consolation up to satisfactory extents. Security engineers
tried their best to scan the network for possible security
hazards but attackers also have a very dedicated community,
trying to find the best techniques for network intrusion
attempts.
Many tools are designed for avoiding intrusion attempts, but
we are still far away from optimal solution. This paper
presents some of appropriated tools which are still in use for
network security, anomaly detection, network intrusion
detection and port analyzing.
The impact of social websites can be good on students but if we have a closer look on the real im... more The impact of social websites can be good on students but if we
have a closer look on the real impact of social networks. Today it
is ruining the future and carrier of students. The social
networking websites like https://www.linkedin.com,
http://www.facebook.com/, https://twitter.com/ and
https://www.orkut.com/ etc. are continuously distracting students
from their studies. The main focus of student should be education
but unfortunately today’s student are emphasizing on such sites
which can be a complete wastage of time. Social Networks was
only an electronic connection between users but unfortunately it
has become an addiction for students, teenagers and even adults.
This paper presents impact of social networks on education,
students and impact on life of teenagers, further it describes how
social networking websites are auditory and dangerous for youth
and teenagers.
This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are on... more This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are one of the most popular websites in the filed of education and business respectively. Most of the web 2.0 attributes have been added in these two web sites due to which they are more feasible, popular and well-organized websites. These two web sites provide common community portal such as online searching, online digital library, online shopping, sharing thoughts, feedbacks etc and last is SZABIST university website (www.szabist-isb.edu.pk) which has its own style of representation of web 2.0 attributes. Many of the web 2.0 services have not been included in SZABIST university website such as searching ideas (very limited), community based discussion, sharing views etc.
In Computer Network number of security techniques provide security consolation but not up to opt... more In Computer Network number of security techniques provide
security consolation but not up to optimal security extent. There
are massive attacks and efficient viruses travel across the
network which incapacitates computer system and default
configuration of the operating system. Preceding techniques can
capture anomalous activates and previous known attacks but
unknown Security attacks have learned to survive in a high
secure precinct, it must be noticed by every technical person that
virus has an augmenting influence, so it is very difficult to detect
unknown attacks at application layer on the run time.
This study analyzes some of the best well known Intrusion
detection techniques and challenging number of attacks including
unknown attacks. This paper presents some of appropriate
techniques which are proposed for intrusion detection and
anomaly detection.
Keywords: Security; operating system; Network intrusion
detection; anomaly detection; Attacks;
Computer networks have important role regarding communication between the machines. Providing fi... more Computer networks have important role regarding
communication between the machines. Providing finite
number of connections could be a little difficult to secure
every connection from security hazards. Researchers have
proposed many solutions for possible security hazards and
known attacks but unfortunately it does not provide
consolation up to satisfactory extents. Security engineers
tried their best to scan the network for possible security
hazards but attackers also have a very dedicated community,
trying to find the best techniques for network intrusion
attempts.
Many tools are designed for avoiding intrusion attempts, but
we are still far away from optimal solution. This paper
presents some of appropriated tools which are still in use for
network security, anomaly detection, network intrusion
detection and port analyzing.