Abdalla Hanashi - Academia.edu (original) (raw)
Papers by Abdalla Hanashi
European Journal of Theoretical and Applied Sciences
In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other ... more In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm aggravates a high number of unnecessary packet rebroadcasts, causing contention and packet collisions. Proper use of probabilistic method can reduce the number of rebroadcasting, therefore reduce the chance of contention and collision among neighboring nodes. A good probabilistic broadcast protocol can achieve high save rebroadcast and low collision. In this paper, we propose a dynamic probabilistic approach when nodes move according to way point mobility and compare it with simple flooding AODV and fixed probabilistic scheme. Our approach dynamically set the rebroadcasting probability according to the number of nieghbors nodes distributed in the ad hoc network. Simulation results show our approach performs better than both simple flooding and...
Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues... more Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non_real time traffic in congested networks by considering channel status.
Network Intrusion Detection Systems (NIDS) are considered as one of the essential mechanisms to e... more Network Intrusion Detection Systems (NIDS) are considered as one of the essential mechanisms to ensure reliable security. Intrusive model is used in signature-based NIDS by defining attack patterns and applying signature-matching on incoming packets. However, detection of novel and multi-stage attacks are not efficiently achieved by the signature-based systems. This is due to lack of mechanism to perform sophisticated analysis to identify relationship between attack events. Hence, the systematic analysis of attack initiation has become a stressing demand in current research. Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule-based mechanisms which are tedious and error prone. Other methods are based on statistical modeling; these are unable to identify causal relationships between the events.In this paper, we have identified the limitations of the current techniques and propose a model for alert correlation that overcomes the shortcomings. An improved "require/provide" model is presented which established a cooperation between statistical and knowledge-based model, to achieve higher detection rate with the minimal false positives. A knowledge-based model with vulnerability and extensional conditions provide manageable and meaningful attack graphs. The proposed model has been implemented in real-time and has successfully generated security events on establishing a correlation between attack signatures. The system has been evaluated to detect one of the most serious multi-stage attacks in cyber crime-Botnet. Zeus Botnet is analyzed within the realm of simulated malicious activities normally used by cyber criminals. The system has efficiently established a correlation in attack behaviors and has generated an attack map. The map can be used to discretely analyze the correlated attack activities which in other case may go undetected thus facilitating the multi-stage attack recognition process.
In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other ... more In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm aggravates a high number of unnecessary packet rebroadcasts, causing contention and packet collisions. Proper use of probabilistic method can reduce the number of rebroadcasting, therefore reduce the chance of contention and collision among neighboring nodes. A good probabilistic broadcast protocol can achieve high save rebroadcast and low collision. In this paper, we propose a dynamic probabilistic approach when nodes move according to way point mobility and compare it with simple flooding AODV and fixed probabilistic scheme. Our approach dynamically set the rebroadcasting probability according to the number of nieghbors nodes distributed in the ad hoc network. Simulation results show our approach performs better than both simple flooding and...
Broadcasting is a basic data dissemination technique, which has a number of applications such as ... more Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution, route discovery, as well as many other network services. While data broadcasting has many advantages, it introduces some problems known as broadcast storm problems, which causing a lot of contention, redundant retransmission and collision. In this paper our objective is to reduce the number of retransmission in the broadcast as well as to obtain less number of collisions in the network. An appropriate probabilistic broadcast method can attain high save rebroadcast and low collision. In this paper, we propose a probabilistic approach that calculates the rebroadcast probability according to the number of neighbour’s nodes distributed in the ad hoc network for routing request packets (RREQs). The performance of the proposed approach is investigated and compared with the simple AODV, adjusted probabilistic flooding [4,7] and dynamic probabilistic flooding [13] using the GloMoSim network simulator under waypoint mobility model. Simulation results show our improved approach performs better than simple flooding, adjusted probabilistic flooding [4,7] and dynamic probabilistic flooding [13]. The simulation results reveal that the proposed approach demonstrates better performance than the existing approaches.
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009
Broadcasting is a basic data dissemination technique, which has a number of applications such as ... more Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution and route discovery. While data broadcasting has many advantages, it introduces some problems known as broadcast storm problems, which causing a lot of contention, redundant retransmission and collision. In this paper our objective is to reduce the number of retransmission as well as
Mobile Information Systems, 2009
Broadcasting is an essential and effective data propagation mechanism, with several of important ... more Broadcasting is an essential and effective data propagation mechanism, with several of important applications such as route discovery, address resolution, as well as many other network services. As data broadcasting has many advantages, also causing a lot of contention, collision, and congestion, which induces what is known as "broadcast storm problems". Broadcasting has traditionally been based on the flooding protocol, which simply overflows the network with high number of rebroadcast messages until the messages reach to all network nodes. A good probabilistic broadcasting protocol can achieve higher saved rebroadcast, low collisions and less number of relays. In this paper, we propose a dynamic probabilistic approach that dynamically fine-tunes the rebroadcasting probability according to the number of neighbour's nodes distributed in the ad hoc network for routing request packets (RREQs). The performance of the proposed approach is investigated and compared with the...
2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014
Rain attenuation is a major factor to demean the system performance at frequencies above 10 GHz. ... more Rain attenuation is a major factor to demean the system performance at frequencies above 10 GHz. This paper deals with wet antenna attenuation at Ku band with different elevation angles and rain rate. throughout the Ku-band propagation experiment, it was discovered that the rain water on the antenna caused significant attenuation. It is necessary to estimate the losses caused by water on the antenna in order to separate these losses from the atmospheric propagation losses. The experiment was done at USM Engineering Campus to study the attenuation for the physical parameters. At Ku band the RF signal was generated by a signal generator and transmitted via horn antenna. The signal was received using a smooth offset antenna of 61 cm by 54 cm (Astro dish) and measured using a spectrum analyzer. To simulate the rain rate, PVC pipes with equally distant bores were implemented. Three cases were considered: First, one pipe was used to simulate low rain rate; second, two pipes were used to simulate medium rain rate; third, three pipes were used to simulate heavy rain rate. In addition, the tap was used to control the flow of water to get more values of rain rate. The total attenuation of RF signals due to water layer on the feed and on the reflector feed was found to be 3.1 dB, at worst case. On the other hand, the attenuation of the RF signal due only to feed was 2.81 dB, so major attenuation occurred was from feed.
Broadcasting is an essential and effective data propagation mechanism with several important appl... more Broadcasting is an essential and effective data propagation mechanism with several important applications, such as route discovery, address resolution and many other network services. Though data broadcasting has many advantages, it can also cause a high degree of contention, collision and congestion, leading to what is known as “broadcast storm problems”. Broadcasting has traditionally been based on the flooding protocol, which simply overflows the network with a high number of rebroadcast messages until these reach all the network nodes. A good probabilistic broadcast protocol can achieve high saved rebroadcast (SRB), low collision and a lower number of relays. When a node is in a sparse region of the network, rebroadcasting is relatively more important while the potential redundancy of rebroadcast is low because there are few neighbours which might rebroadcast the packet unnecessarily. Further, in such a situation, contention over the wireless medium resulting from Redundant broa...
Simulation Modelling Practice and Theory
Broadcasting is a basic data dissemination technique, which has a number of applications such as ... more Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution, route discovery, as well as many other network services. While data broadcasting has many advantages, it introduces some problems known as broadcast storm problems, which causing a lot of contention, redundant retransmission and collision. In this paper our objective is to reduce the number of retransmission in the broadcast as well as to obtain less number of collisions in the network. An appropriate probabilistic broadcast method can attain high save rebroadcast and low collision. In this paper, we propose a probabilistic approach that calculates the rebroadcast probability according to the number of neighbour’s nodes distributed in the ad hoc network for routing request packets (RREQs). The performance of the proposed approach is investigated and compared with the simple AODV, adjusted probabilistic flooding [4,7] and dynamic probabilistic flooding [13] using the G...
2008 International Conference on Complex, Intelligent and Software Intensive Systems, 2008
Abstract In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and m... more Abstract In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm aggravates a high number of ...
Lecture Notes on Software Engineering, 2013
Network layer indications are not readily available upon a link change; therefore, general depend... more Network layer indications are not readily available upon a link change; therefore, general dependence on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handover. If information could be gathered at link layer to determine the need for network layer signaling, then both the delay and signaling load could be really improved over the current standards of Mobile IP. This paper presents a Cross-layer decision on two layer network and link layers to improve the performance of Enhanced Mobile IP (E-Mobile IP) handover in which reducing packet loss and latency during handover process.
I hereby declare that the thesis is based on my original work except for quotations and citations... more I hereby declare that the thesis is based on my original work except for quotations and citations that have been duly acknowledged. I also declare that it has not �en previously or concurrently submitted for any other degree at UPM or other institutions Date: Z5-08-Lao) xi
Simulation Modelling Practice and Theory, 2009
In mobile ad hoc networks (MANETs), flooding is a required message dissemination technique for ne... more In mobile ad hoc networks (MANETs), flooding is a required message dissemination technique for network-wide broadcast. The conventional blind flooding algorithm causes broadcast storm problem, a high number of unnecessary packet rebroadcasts thus resulting in high ...
European Journal of Theoretical and Applied Sciences
In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other ... more In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm aggravates a high number of unnecessary packet rebroadcasts, causing contention and packet collisions. Proper use of probabilistic method can reduce the number of rebroadcasting, therefore reduce the chance of contention and collision among neighboring nodes. A good probabilistic broadcast protocol can achieve high save rebroadcast and low collision. In this paper, we propose a dynamic probabilistic approach when nodes move according to way point mobility and compare it with simple flooding AODV and fixed probabilistic scheme. Our approach dynamically set the rebroadcasting probability according to the number of nieghbors nodes distributed in the ad hoc network. Simulation results show our approach performs better than both simple flooding and...
Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues... more Worldwide Interoperability for Microwave Access (WiMAX) became one of the most challenging issues, since it was responsible for distributing available resources of the network among all users this leaded to the demand of constructing and designing high efficient scheduling algorithms in order to improve the network utilization, to increase the network throughput, and to minimize the end-to-end delay. In this study, the proposed algorithm focuses on an efficient mechanism to serve non_real time traffic in congested networks by considering channel status.
Network Intrusion Detection Systems (NIDS) are considered as one of the essential mechanisms to e... more Network Intrusion Detection Systems (NIDS) are considered as one of the essential mechanisms to ensure reliable security. Intrusive model is used in signature-based NIDS by defining attack patterns and applying signature-matching on incoming packets. However, detection of novel and multi-stage attacks are not efficiently achieved by the signature-based systems. This is due to lack of mechanism to perform sophisticated analysis to identify relationship between attack events. Hence, the systematic analysis of attack initiation has become a stressing demand in current research. Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule-based mechanisms which are tedious and error prone. Other methods are based on statistical modeling; these are unable to identify causal relationships between the events.In this paper, we have identified the limitations of the current techniques and propose a model for alert correlation that overcomes the shortcomings. An improved "require/provide" model is presented which established a cooperation between statistical and knowledge-based model, to achieve higher detection rate with the minimal false positives. A knowledge-based model with vulnerability and extensional conditions provide manageable and meaningful attack graphs. The proposed model has been implemented in real-time and has successfully generated security events on establishing a correlation between attack signatures. The system has been evaluated to detect one of the most serious multi-stage attacks in cyber crime-Botnet. Zeus Botnet is analyzed within the realm of simulated malicious activities normally used by cyber criminals. The system has efficiently established a correlation in attack behaviors and has generated an attack map. The map can be used to discretely analyze the correlated attack activities which in other case may go undetected thus facilitating the multi-stage attack recognition process.
In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other ... more In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm aggravates a high number of unnecessary packet rebroadcasts, causing contention and packet collisions. Proper use of probabilistic method can reduce the number of rebroadcasting, therefore reduce the chance of contention and collision among neighboring nodes. A good probabilistic broadcast protocol can achieve high save rebroadcast and low collision. In this paper, we propose a dynamic probabilistic approach when nodes move according to way point mobility and compare it with simple flooding AODV and fixed probabilistic scheme. Our approach dynamically set the rebroadcasting probability according to the number of nieghbors nodes distributed in the ad hoc network. Simulation results show our approach performs better than both simple flooding and...
Broadcasting is a basic data dissemination technique, which has a number of applications such as ... more Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution, route discovery, as well as many other network services. While data broadcasting has many advantages, it introduces some problems known as broadcast storm problems, which causing a lot of contention, redundant retransmission and collision. In this paper our objective is to reduce the number of retransmission in the broadcast as well as to obtain less number of collisions in the network. An appropriate probabilistic broadcast method can attain high save rebroadcast and low collision. In this paper, we propose a probabilistic approach that calculates the rebroadcast probability according to the number of neighbour’s nodes distributed in the ad hoc network for routing request packets (RREQs). The performance of the proposed approach is investigated and compared with the simple AODV, adjusted probabilistic flooding [4,7] and dynamic probabilistic flooding [13] using the GloMoSim network simulator under waypoint mobility model. Simulation results show our improved approach performs better than simple flooding, adjusted probabilistic flooding [4,7] and dynamic probabilistic flooding [13]. The simulation results reveal that the proposed approach demonstrates better performance than the existing approaches.
2009 International Conference on Advanced Information Networking and Applications Workshops, 2009
Broadcasting is a basic data dissemination technique, which has a number of applications such as ... more Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution and route discovery. While data broadcasting has many advantages, it introduces some problems known as broadcast storm problems, which causing a lot of contention, redundant retransmission and collision. In this paper our objective is to reduce the number of retransmission as well as
Mobile Information Systems, 2009
Broadcasting is an essential and effective data propagation mechanism, with several of important ... more Broadcasting is an essential and effective data propagation mechanism, with several of important applications such as route discovery, address resolution, as well as many other network services. As data broadcasting has many advantages, also causing a lot of contention, collision, and congestion, which induces what is known as "broadcast storm problems". Broadcasting has traditionally been based on the flooding protocol, which simply overflows the network with high number of rebroadcast messages until the messages reach to all network nodes. A good probabilistic broadcasting protocol can achieve higher saved rebroadcast, low collisions and less number of relays. In this paper, we propose a dynamic probabilistic approach that dynamically fine-tunes the rebroadcasting probability according to the number of neighbour's nodes distributed in the ad hoc network for routing request packets (RREQs). The performance of the proposed approach is investigated and compared with the...
2014 World Congress on Computer Applications and Information Systems (WCCAIS), 2014
Rain attenuation is a major factor to demean the system performance at frequencies above 10 GHz. ... more Rain attenuation is a major factor to demean the system performance at frequencies above 10 GHz. This paper deals with wet antenna attenuation at Ku band with different elevation angles and rain rate. throughout the Ku-band propagation experiment, it was discovered that the rain water on the antenna caused significant attenuation. It is necessary to estimate the losses caused by water on the antenna in order to separate these losses from the atmospheric propagation losses. The experiment was done at USM Engineering Campus to study the attenuation for the physical parameters. At Ku band the RF signal was generated by a signal generator and transmitted via horn antenna. The signal was received using a smooth offset antenna of 61 cm by 54 cm (Astro dish) and measured using a spectrum analyzer. To simulate the rain rate, PVC pipes with equally distant bores were implemented. Three cases were considered: First, one pipe was used to simulate low rain rate; second, two pipes were used to simulate medium rain rate; third, three pipes were used to simulate heavy rain rate. In addition, the tap was used to control the flow of water to get more values of rain rate. The total attenuation of RF signals due to water layer on the feed and on the reflector feed was found to be 3.1 dB, at worst case. On the other hand, the attenuation of the RF signal due only to feed was 2.81 dB, so major attenuation occurred was from feed.
Broadcasting is an essential and effective data propagation mechanism with several important appl... more Broadcasting is an essential and effective data propagation mechanism with several important applications, such as route discovery, address resolution and many other network services. Though data broadcasting has many advantages, it can also cause a high degree of contention, collision and congestion, leading to what is known as “broadcast storm problems”. Broadcasting has traditionally been based on the flooding protocol, which simply overflows the network with a high number of rebroadcast messages until these reach all the network nodes. A good probabilistic broadcast protocol can achieve high saved rebroadcast (SRB), low collision and a lower number of relays. When a node is in a sparse region of the network, rebroadcasting is relatively more important while the potential redundancy of rebroadcast is low because there are few neighbours which might rebroadcast the packet unnecessarily. Further, in such a situation, contention over the wireless medium resulting from Redundant broa...
Simulation Modelling Practice and Theory
Broadcasting is a basic data dissemination technique, which has a number of applications such as ... more Broadcasting is a basic data dissemination technique, which has a number of applications such as address resolution, route discovery, as well as many other network services. While data broadcasting has many advantages, it introduces some problems known as broadcast storm problems, which causing a lot of contention, redundant retransmission and collision. In this paper our objective is to reduce the number of retransmission in the broadcast as well as to obtain less number of collisions in the network. An appropriate probabilistic broadcast method can attain high save rebroadcast and low collision. In this paper, we propose a probabilistic approach that calculates the rebroadcast probability according to the number of neighbour’s nodes distributed in the ad hoc network for routing request packets (RREQs). The performance of the proposed approach is investigated and compared with the simple AODV, adjusted probabilistic flooding [4,7] and dynamic probabilistic flooding [13] using the G...
2008 International Conference on Complex, Intelligent and Software Intensive Systems, 2008
Abstract In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and m... more Abstract In mobile ad hoc networks (MANET), broadcasting is widely used in route discovery and many other network services. The efficiency of broadcasting protocol can affect the performance of the entire network. As such, the simple flooding algorithm aggravates a high number of ...
Lecture Notes on Software Engineering, 2013
Network layer indications are not readily available upon a link change; therefore, general depend... more Network layer indications are not readily available upon a link change; therefore, general dependence on the network layer may introduce unnecessary delays due to network layer signaling for a simple link layer handover. If information could be gathered at link layer to determine the need for network layer signaling, then both the delay and signaling load could be really improved over the current standards of Mobile IP. This paper presents a Cross-layer decision on two layer network and link layers to improve the performance of Enhanced Mobile IP (E-Mobile IP) handover in which reducing packet loss and latency during handover process.
I hereby declare that the thesis is based on my original work except for quotations and citations... more I hereby declare that the thesis is based on my original work except for quotations and citations that have been duly acknowledged. I also declare that it has not �en previously or concurrently submitted for any other degree at UPM or other institutions Date: Z5-08-Lao) xi
Simulation Modelling Practice and Theory, 2009
In mobile ad hoc networks (MANETs), flooding is a required message dissemination technique for ne... more In mobile ad hoc networks (MANETs), flooding is a required message dissemination technique for network-wide broadcast. The conventional blind flooding algorithm causes broadcast storm problem, a high number of unnecessary packet rebroadcasts thus resulting in high ...