Waqas Tariq - Profile on Academia.edu (original) (raw)

Waqas Tariq

Supervisors: Mr. Fasee Ullah Khan and Mr. Muhammad Saqib
Phone: +923159081429

less

Hasan Shalabi related author profile picture

International Research Journal Commerce arts science related author profile picture

hussain awad related author profile picture

Dr. Neelesh Jain related author profile picture

Soo Mou related author profile picture

Noura AKNIN related author profile picture

Ahmad Shukor related author profile picture

Suzana Basaruddin related author profile picture

wawan setiawan related author profile picture

Wawan Setiawan related author profile picture

Uploads

Papers by Waqas Tariq

Research paper thumbnail of Comparative Study of Amazon.com, Wikipedia.com and SZABIST-isb.edu.pk in the context of the Web 2.0 Attributes and Services

This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are on... more This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are one of the most popular websites in the filed of education and business respectively. Most of the web 2.0 attributes have been added in these two web sites due to which they are more feasible, popular and well-organized websites. These two web sites provide common community portal such as online searching, online digital library, online shopping, sharing thoughts, feedbacks etc and last is SZABIST university website (www.szabist-isb.edu.pk) which has its own style of representation of web 2.0 attributes. Many of the web 2.0 services have not been included in SZABIST university website such as searching ideas (very limited), community based discussion, sharing views etc.

Research paper thumbnail of Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic

In Computer Network number of security techniques provide security consolation but not up to opt... more In Computer Network number of security techniques provide
security consolation but not up to optimal security extent. There
are massive attacks and efficient viruses travel across the
network which incapacitates computer system and default
configuration of the operating system. Preceding techniques can
capture anomalous activates and previous known attacks but
unknown Security attacks have learned to survive in a high
secure precinct, it must be noticed by every technical person that
virus has an augmenting influence, so it is very difficult to detect
unknown attacks at application layer on the run time.
This study analyzes some of the best well known Intrusion
detection techniques and challenging number of attacks including
unknown attacks. This paper presents some of appropriate
techniques which are proposed for intrusion detection and
anomaly detection.

Keywords: Security; operating system; Network intrusion
detection; anomaly detection; Attacks;

Research paper thumbnail of Operating System Based Analysis of Security Tools for Detecting Suspicious Events in Network Traffic

Computer networks have important role regarding communication between the machines. Providing fi... more Computer networks have important role regarding
communication between the machines. Providing finite
number of connections could be a little difficult to secure
every connection from security hazards. Researchers have
proposed many solutions for possible security hazards and
known attacks but unfortunately it does not provide
consolation up to satisfactory extents. Security engineers
tried their best to scan the network for possible security
hazards but attackers also have a very dedicated community,
trying to find the best techniques for network intrusion
attempts.
Many tools are designed for avoiding intrusion attempts, but
we are still far away from optimal solution. This paper
presents some of appropriated tools which are still in use for
network security, anomaly detection, network intrusion
detection and port analyzing.

Research paper thumbnail of Comparative Study of Amazon.com, Wikipedia.com and SZABIST-isb.edu.pk in the context of the Web 2.0 Attributes and Services

This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are on... more This paper analyses the web 2.0 attributes presented in wikipedia.com and amazon.com. They are one of the most popular websites in the filed of education and business respectively. Most of the web 2.0 attributes have been added in these two web sites due to which they are more feasible, popular and well-organized websites. These two web sites provide common community portal such as online searching, online digital library, online shopping, sharing thoughts, feedbacks etc and last is SZABIST university website (www.szabist-isb.edu.pk) which has its own style of representation of web 2.0 attributes. Many of the web 2.0 services have not been included in SZABIST university website such as searching ideas (very limited), community based discussion, sharing views etc.

Research paper thumbnail of Analysis of Security Techniques for Detecting Suspicious Activities and Intrusion Detection in Network Traffic

In Computer Network number of security techniques provide security consolation but not up to opt... more In Computer Network number of security techniques provide
security consolation but not up to optimal security extent. There
are massive attacks and efficient viruses travel across the
network which incapacitates computer system and default
configuration of the operating system. Preceding techniques can
capture anomalous activates and previous known attacks but
unknown Security attacks have learned to survive in a high
secure precinct, it must be noticed by every technical person that
virus has an augmenting influence, so it is very difficult to detect
unknown attacks at application layer on the run time.
This study analyzes some of the best well known Intrusion
detection techniques and challenging number of attacks including
unknown attacks. This paper presents some of appropriate
techniques which are proposed for intrusion detection and
anomaly detection.

Keywords: Security; operating system; Network intrusion
detection; anomaly detection; Attacks;

Research paper thumbnail of Operating System Based Analysis of Security Tools for Detecting Suspicious Events in Network Traffic

Computer networks have important role regarding communication between the machines. Providing fi... more Computer networks have important role regarding
communication between the machines. Providing finite
number of connections could be a little difficult to secure
every connection from security hazards. Researchers have
proposed many solutions for possible security hazards and
known attacks but unfortunately it does not provide
consolation up to satisfactory extents. Security engineers
tried their best to scan the network for possible security
hazards but attackers also have a very dedicated community,
trying to find the best techniques for network intrusion
attempts.
Many tools are designed for avoiding intrusion attempts, but
we are still far away from optimal solution. This paper
presents some of appropriated tools which are still in use for
network security, anomaly detection, network intrusion
detection and port analyzing.

Log In