Abdulnaser A. Hagar - Academia.edu (original) (raw)
Papers by Abdulnaser A. Hagar
Computational Intelligence and Neuroscience, Aug 26, 2022
Keeping computers secure is becoming challenging as networks grow and new network-based technolog... more Keeping computers secure is becoming challenging as networks grow and new network-based technologies emerge. Cybercriminals' attack surface expands with the release of new internet-enabled products. As many cyberattacks a ect businesses' con dentiality, availability, and integrity, network intrusion detection systems (NIDS) show an essential role. Network-based intrusion detection uses datasets like CSE-CIC-IDS2018 to train prediction models. With fourteen types of attacks included, the latest big data set for intrusion detection is available to the public. is work proposes three models, two deep learning convolutional neural networks (CNN), long short-term memory (LSTM), and Apache Spark, to improve the detection of all types of attacks. To reduce the dimensionality, random forests (RF) was employed to select the important features; it gave 19 from 84 features. e dataset is imbalanced; thus, oversampling and undersampling techniques reduce the imbalance ratio. e Apache Spark model produced the best results across all 15 classes, with accuracy as high as 100% for all classes, as seen by the experiments' ndings. For the F1-score, Apache Spark showed the highest results with 1.00 for most classes. e ndings of the three models showed outstanding results for multiclassi cation network intrusion detection.
Lecture notes on data engineering and communications technologies, Jul 20, 2022
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
The current revolution in data is focused in reshaping the overall knowledge and data which are p... more The current revolution in data is focused in reshaping the overall knowledge and data which are produced, the manner in which the business is performed and handled in an effective manner. The application of big data offers major insights and opportunities in many industries, moreover it also raises many issues and difficulties which needs to be addressed so as to achieve the overall sustainable development. It has been stated that the critical development of big data can offer real time information which will enable in taking effective action, identify the nature of issues and needs, provide feedback on the critical effectiveness related to the policy. In the present digital environment, the information is collated and saved at a rate which rapidly exceeds the overall range. Currently, nearly 4.5 billion individuals are connected through internet and advanced technologies and this is expected to grow many folds in the next 10 years. However, it can be stated that the big data is still in earlier stage and the domains needs to be reviewed and analysed in an effective manner. The big data presents the overall challenges for the digital earth to process and share the data. The usage of cloud computing offers fundamental support to enhance the challenges through computing resources, storage of data and other aspects. This paper intends to recognised the application of multiple big data technologies and its related issues, difficulties and opportunities, the researchers apply secondary data in collating the data from various sources, the different sources include Google Scholar, ProQuest, published articles in Scopus journals etc.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
As block chain technology is a new approach in security world. So, hereby we will describe the mu... more As block chain technology is a new approach in security world. So, hereby we will describe the multilayer security network authentication system development through block chain technology as this article describes a multi-layer secure Internet of Things network concept block chain-based. The approach decreases the difficulties of real block chain technology deployment by separating the Iot devices into a cross de-centric networking and adopting block chain platform at all stages of the network, while keeping the block chain technology's heavily guarded and credibility assurance. It offers an Internet of Things wide-area networking solution. Block chain is a series of information-containing blocks. The data recorded within a block is determined by the kind of block chain. A Bit coin Block, for example, comprises information on the Sender, Receiver, and the quantity of bit coin to be transmitted. The Genesis block is the initial block in the chain. The block chain's objective is to distribute information among all persons that access it through an application. Reading and writing accessibility to this ledger can be unfettered ('permission less') or controlled ('permission'). It is now possible to securely communicate, read, and save digital information using block chain. Furthermore, it employs cryptographic encryption to safeguard each transaction. Banks may raise their present security and transparency standards to new heights by doing so.
The current revolution in data is focused in reshaping the overall knowledge and data which are p... more The current revolution in data is focused in
reshaping the overall knowledge and data which are produced,
the manner in which the business is performed and handled in
an effective manner. The application of big data offers major
insights and opportunities in many industries, moreover it also
raises many issues and difficulties which needs to be addressed
so as to achieve the overall sustainable development. It has
been stated that the critical development of big data can offer
real time information which will enable in taking effective
action, identify the nature of issues and needs, provide
feedback on the critical effectiveness related to the policy.
In the present digital environment, the information is
collated and saved at a rate which rapidly exceeds the overall
range. Currently, nearly 4.5 billion individuals are connected
through internet and advanced technologies and this is
expected to grow many folds in the next 10 years. However, it
can be stated that the big data is still in earlier stage and the
domains needs to be reviewed and analysed in an effective
manner. The big data presents the overall challenges for the
digital earth to process and share the data. The usage of cloud
computing offers fundamental support to enhance the
challenges through computing resources, storage of data and
other aspects.
This paper intends to recognised the application of multiple
big data technologies and its related issues, difficulties and
opportunities, the researchers apply secondary data in
collating the data from various sources, the different sources
include Google Scholar, ProQuest, published articles in Scopus
journals etc.
As block chain technology is a new approach in security world. So, hereby we will describe the mu... more As block chain technology is a new approach in security world. So, hereby we will describe the multilayer security network authentication system development through block chain technology as this article describes a multi-layer secure Internet of Things network concept block chain-based. The approach decreases the difficulties of real block chain technology deployment by separating the Iot devices into a cross de-centric networking and adopting block chain platform at all stages of the network, while keeping the block chain technology's heavily guarded and credibility assurance. It offers an Internet of Things wide-area networking solution. Block chain is a series of information-containing blocks. The data recorded within a block is determined by the kind of block chain. A Bit coin Block, for example, comprises information on the Sender, Receiver, and the quantity of bit coin to be transmitted. The Genesis block is the initial block in the chain. The block chain's objective is to distribute information among all persons that access it through an application. Reading and writing accessibility to this ledger can be unfettered ('permission less') or controlled ('permission'). It is now possible to securely communicate, read, and save digital information using block chain. Furthermore, it employs cryptographic encryption to safeguard each transaction. Banks may raise their present security and transparency standards to new heights by doing so.
Through the increasing amounts of data day by day, big data analytics has appeared as an importan... more Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems, such as cybersecurity, healthcare, marketing, intrusion detection, and fraud. An intrusion detection system (IDS) work as observers and evaluates the data in order to detect at all intrusion that may occur in the network or system. The huge data that is a high speed, high volume, and variety of data produced through the network has prepared for the process of the data analysis to detect any attacks through traditional techniques that cause big challenges. Big data analytic uses in IDS to increase accuracy and more efficient for detecting the attacks. we present a survey of eight machine learning algorithms use for IDS, intrusion detection techniques, advantages and disadvantages of intrusion detection techniques, all types of an intrusion detection ...
International Journal of Mechanical and Production Engineering Research and Development (IJMPERD), 2020
Through the increasing amounts of data day by day, big data analytics has appeared as an importan... more Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems, such as cybersecurity, healthcare, marketing, intrusion detection, and fraud. An intrusion detection system (IDS) work as observers and evaluates the data in order to detect at all intrusion that may occur in the network or system. The huge data that is a high speed, high volume, and variety of data produced through the network has prepared for the process of the data analysis to detect any attacks through traditional techniques that cause big challenges. Big data analytic uses in IDS to increase accuracy and more efficient for detecting the attacks. we present a survey of eight machine learning algorithms use for IDS, intrusion detection techniques, advantages and disadvantages of intrusion detection techniques, all types of an intrusion detection system, advantages and disadvantages for each type of IDS, and five datasets that use on the intrusion detection system. Moreover, the authors attempt to present a strong picture of algorithms and datasets that use for IDS in all aspects through their extensive survey.
International Journal of Mechanical and Production Engineering Research and Development , 2020
Through the increasing amounts of data day by day, big data analytics has appeared as an importan... more Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems, such as cybersecurity, healthcare, marketing, intrusion detection, and fraud. An intrusion detection system (IDS) work as observers and evaluates the data in order to detect at all intrusion that may occur in the network or system. The huge data that is a high speed, high volume, and variety of data produced through the network has prepared for the process of the data analysis to detect any attacks through traditional techniques that cause big challenges. Big data analytic uses in IDS to increase accuracy and more efficient for detecting the attacks. we present a survey of eight machine learning algorithms use for IDS, intrusion detection techniques, advantages and disadvantages of intrusion detection techniques, all types of an intrusion detection system, advantages and disadvantages for each type of IDS, and five datasets that use on the intrusion detection system. Moreover, the authors attempt to present a strong picture of algorithms and datasets that use for IDS in all aspects through their extensive survey.
Computational Intelligence and Neuroscience, Aug 26, 2022
Keeping computers secure is becoming challenging as networks grow and new network-based technolog... more Keeping computers secure is becoming challenging as networks grow and new network-based technologies emerge. Cybercriminals' attack surface expands with the release of new internet-enabled products. As many cyberattacks a ect businesses' con dentiality, availability, and integrity, network intrusion detection systems (NIDS) show an essential role. Network-based intrusion detection uses datasets like CSE-CIC-IDS2018 to train prediction models. With fourteen types of attacks included, the latest big data set for intrusion detection is available to the public. is work proposes three models, two deep learning convolutional neural networks (CNN), long short-term memory (LSTM), and Apache Spark, to improve the detection of all types of attacks. To reduce the dimensionality, random forests (RF) was employed to select the important features; it gave 19 from 84 features. e dataset is imbalanced; thus, oversampling and undersampling techniques reduce the imbalance ratio. e Apache Spark model produced the best results across all 15 classes, with accuracy as high as 100% for all classes, as seen by the experiments' ndings. For the F1-score, Apache Spark showed the highest results with 1.00 for most classes. e ndings of the three models showed outstanding results for multiclassi cation network intrusion detection.
Lecture notes on data engineering and communications technologies, Jul 20, 2022
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
The current revolution in data is focused in reshaping the overall knowledge and data which are p... more The current revolution in data is focused in reshaping the overall knowledge and data which are produced, the manner in which the business is performed and handled in an effective manner. The application of big data offers major insights and opportunities in many industries, moreover it also raises many issues and difficulties which needs to be addressed so as to achieve the overall sustainable development. It has been stated that the critical development of big data can offer real time information which will enable in taking effective action, identify the nature of issues and needs, provide feedback on the critical effectiveness related to the policy. In the present digital environment, the information is collated and saved at a rate which rapidly exceeds the overall range. Currently, nearly 4.5 billion individuals are connected through internet and advanced technologies and this is expected to grow many folds in the next 10 years. However, it can be stated that the big data is still in earlier stage and the domains needs to be reviewed and analysed in an effective manner. The big data presents the overall challenges for the digital earth to process and share the data. The usage of cloud computing offers fundamental support to enhance the challenges through computing resources, storage of data and other aspects. This paper intends to recognised the application of multiple big data technologies and its related issues, difficulties and opportunities, the researchers apply secondary data in collating the data from various sources, the different sources include Google Scholar, ProQuest, published articles in Scopus journals etc.
2022 2nd International Conference on Advance Computing and Innovative Technologies in Engineering (ICACITE)
As block chain technology is a new approach in security world. So, hereby we will describe the mu... more As block chain technology is a new approach in security world. So, hereby we will describe the multilayer security network authentication system development through block chain technology as this article describes a multi-layer secure Internet of Things network concept block chain-based. The approach decreases the difficulties of real block chain technology deployment by separating the Iot devices into a cross de-centric networking and adopting block chain platform at all stages of the network, while keeping the block chain technology's heavily guarded and credibility assurance. It offers an Internet of Things wide-area networking solution. Block chain is a series of information-containing blocks. The data recorded within a block is determined by the kind of block chain. A Bit coin Block, for example, comprises information on the Sender, Receiver, and the quantity of bit coin to be transmitted. The Genesis block is the initial block in the chain. The block chain's objective is to distribute information among all persons that access it through an application. Reading and writing accessibility to this ledger can be unfettered ('permission less') or controlled ('permission'). It is now possible to securely communicate, read, and save digital information using block chain. Furthermore, it employs cryptographic encryption to safeguard each transaction. Banks may raise their present security and transparency standards to new heights by doing so.
The current revolution in data is focused in reshaping the overall knowledge and data which are p... more The current revolution in data is focused in
reshaping the overall knowledge and data which are produced,
the manner in which the business is performed and handled in
an effective manner. The application of big data offers major
insights and opportunities in many industries, moreover it also
raises many issues and difficulties which needs to be addressed
so as to achieve the overall sustainable development. It has
been stated that the critical development of big data can offer
real time information which will enable in taking effective
action, identify the nature of issues and needs, provide
feedback on the critical effectiveness related to the policy.
In the present digital environment, the information is
collated and saved at a rate which rapidly exceeds the overall
range. Currently, nearly 4.5 billion individuals are connected
through internet and advanced technologies and this is
expected to grow many folds in the next 10 years. However, it
can be stated that the big data is still in earlier stage and the
domains needs to be reviewed and analysed in an effective
manner. The big data presents the overall challenges for the
digital earth to process and share the data. The usage of cloud
computing offers fundamental support to enhance the
challenges through computing resources, storage of data and
other aspects.
This paper intends to recognised the application of multiple
big data technologies and its related issues, difficulties and
opportunities, the researchers apply secondary data in
collating the data from various sources, the different sources
include Google Scholar, ProQuest, published articles in Scopus
journals etc.
As block chain technology is a new approach in security world. So, hereby we will describe the mu... more As block chain technology is a new approach in security world. So, hereby we will describe the multilayer security network authentication system development through block chain technology as this article describes a multi-layer secure Internet of Things network concept block chain-based. The approach decreases the difficulties of real block chain technology deployment by separating the Iot devices into a cross de-centric networking and adopting block chain platform at all stages of the network, while keeping the block chain technology's heavily guarded and credibility assurance. It offers an Internet of Things wide-area networking solution. Block chain is a series of information-containing blocks. The data recorded within a block is determined by the kind of block chain. A Bit coin Block, for example, comprises information on the Sender, Receiver, and the quantity of bit coin to be transmitted. The Genesis block is the initial block in the chain. The block chain's objective is to distribute information among all persons that access it through an application. Reading and writing accessibility to this ledger can be unfettered ('permission less') or controlled ('permission'). It is now possible to securely communicate, read, and save digital information using block chain. Furthermore, it employs cryptographic encryption to safeguard each transaction. Banks may raise their present security and transparency standards to new heights by doing so.
Through the increasing amounts of data day by day, big data analytics has appeared as an importan... more Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems, such as cybersecurity, healthcare, marketing, intrusion detection, and fraud. An intrusion detection system (IDS) work as observers and evaluates the data in order to detect at all intrusion that may occur in the network or system. The huge data that is a high speed, high volume, and variety of data produced through the network has prepared for the process of the data analysis to detect any attacks through traditional techniques that cause big challenges. Big data analytic uses in IDS to increase accuracy and more efficient for detecting the attacks. we present a survey of eight machine learning algorithms use for IDS, intrusion detection techniques, advantages and disadvantages of intrusion detection techniques, all types of an intrusion detection ...
International Journal of Mechanical and Production Engineering Research and Development (IJMPERD), 2020
Through the increasing amounts of data day by day, big data analytics has appeared as an importan... more Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems, such as cybersecurity, healthcare, marketing, intrusion detection, and fraud. An intrusion detection system (IDS) work as observers and evaluates the data in order to detect at all intrusion that may occur in the network or system. The huge data that is a high speed, high volume, and variety of data produced through the network has prepared for the process of the data analysis to detect any attacks through traditional techniques that cause big challenges. Big data analytic uses in IDS to increase accuracy and more efficient for detecting the attacks. we present a survey of eight machine learning algorithms use for IDS, intrusion detection techniques, advantages and disadvantages of intrusion detection techniques, all types of an intrusion detection system, advantages and disadvantages for each type of IDS, and five datasets that use on the intrusion detection system. Moreover, the authors attempt to present a strong picture of algorithms and datasets that use for IDS in all aspects through their extensive survey.
International Journal of Mechanical and Production Engineering Research and Development , 2020
Through the increasing amounts of data day by day, big data analytics has appeared as an importan... more Through the increasing amounts of data day by day, big data analytics has appeared as an important trend for many organizations. These collected data can have important information that possibly will be key to solving extensive problems, such as cybersecurity, healthcare, marketing, intrusion detection, and fraud. An intrusion detection system (IDS) work as observers and evaluates the data in order to detect at all intrusion that may occur in the network or system. The huge data that is a high speed, high volume, and variety of data produced through the network has prepared for the process of the data analysis to detect any attacks through traditional techniques that cause big challenges. Big data analytic uses in IDS to increase accuracy and more efficient for detecting the attacks. we present a survey of eight machine learning algorithms use for IDS, intrusion detection techniques, advantages and disadvantages of intrusion detection techniques, all types of an intrusion detection system, advantages and disadvantages for each type of IDS, and five datasets that use on the intrusion detection system. Moreover, the authors attempt to present a strong picture of algorithms and datasets that use for IDS in all aspects through their extensive survey.