HB Tahir Naquash - Academia.edu (original) (raw)

Uploads

Papers by HB Tahir Naquash

Research paper thumbnail of Detection of Malware Using Machine Learning Algorithms

Zenodo (CERN European Organization for Nuclear Research), Feb 6, 2023

Malware is becoming a major cybersecurity threat with increasing frequency every day. There are s... more Malware is becoming a major cybersecurity threat with increasing frequency every day. There are several ways to classify the new malware based on signatures or code present. Traditional approaches are not very effective against newly emerging Malware-samples. More and more antivirus software offers protection against malware, but zero-day attacks have yet to be achieved. We use machine learning algorithms to improve the mechanism and accordingly provide excellent experimental results. To do Traditional signature approaches also fail, but the new malware does. This document defines malware and malware types as an overview, also defines new mechanisms that use machine learning algorithms, effective and efficient methods in classifying malware detection, and builds on existing research on malware detection. to introduce. Machine Learning Algorithms describes the main challenges faced in malware detection classification.

Research paper thumbnail of Prevention of Phishing Attack in Online Voting System by using Visual Cryptography

International journal of engineering research and technology, 2019

As per the survey conducted only few people go for voting because of their tight schedule. There ... more As per the survey conducted only few people go for voting because of their tight schedule. There are many reasons, few may be everyone has to go to voting center, they have to stand in a long queue, they will be tired because of their tight schedule. So we have proposed an online voting system that make use of internet, the possibility of cheating/threats has been increasing day by day. One such problem is phishing attack which can create problems in authentication. So, we have implemented secured online voting system using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. Keywords—Authentication, cryptography, image captcha, phishing, integer linear program, online voting.

Research paper thumbnail of Low Cost Energy Efficient Smart Security System with Information Stamping for IoT Networks

2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), 2018

A security system with CCTV and other network nodes in IoT deals with large amount of data, so th... more A security system with CCTV and other network nodes in IoT deals with large amount of data, so the need for devices with larger storage space comes into the picture which is a bit costlier. Traditional security systems are more power consuming as it has to record for 24x7 with more throughput but less efficient. Thus need human in middle to upload into cloud is needed. In this work, we propose a low-cost energy efficient smart security system for CCTV with other network nodes. Whenever motion is detected by passive infrared (PIR) sensor, at that time only the camera and all other security sensor nodes in network are activated (Switched on), the captured video and information (sensor data) are stamped on the image using image processing techniques on Python platform. It will be stored in a local storage device, after certain threshold (based on sensitivity of the location) data will be uploaded into the cloud along with data log created during processing stage by Python programming model. In this way, we can reduce the amount of data to be stored (as no recording when idle), consumed power (as device is switched off when idle), maintenance cost (as fully programmed). No need for human in middle for uploading data into the cloud (as program will upload data in to cloud). Because of time, date and information (data from sensor nodes) stamping on each frame of video using python programming model video access becomes easier, as data log will be created.

Research paper thumbnail of Phishing Website Detection

International Journal of Scientific Research in Science and Technology

It is a crime to practice phishing by employing technical tricks and social engineering to exploi... more It is a crime to practice phishing by employing technical tricks and social engineering to exploit the innocence of unaware users. This methodology usually covers up a trustworthy entity so as to influence a consumer to execute an action if asked by the imitated entity. Most of the times, phishing attacks are being noticed by the practiced users but security is a main motive for the basic users as they are not aware of such circumstances. However, some methodologies are limited to look after the phishing attacks only and the delay in detection is mandatory. In this paper we emphasize the various techniques used for the detection of phishing attacks. We have also discovered various techniques for detection and prevention of phishing. Apart from that, we have introduced a new model for detection and prevention of phishing attacks.

Research paper thumbnail of Collaborative Adaptive Down-Sampling And Upconversion - An Approach For Image Compression

In this paper, we are going to use a practical approach of uniform down sampling in image space a... more In this paper, we are going to use a practical approach of uniform down sampling in image space and yet making the sampling adaptive by spatially varying, directional lowpass pre-filtering. The resulting down-sampled pre-filtered image remains a conventional square sample grid, and, thus, it can be compressed and transmitted without any change to current image coding standards and systems. The decoder first decompresses the low-resolution image and then up-converts it to the original resolution in a constrained least squares restoration process, using a 2-D piecewise autoregressive model and the knowledge of directional low-pass prefiltering. The proposed compression approach of collaborative adaptive down-sampling and upconversion (CADU) outperforms JPEG 2000 in PSNR measure at low to medium bit rates and achieves superior visual quality, as well. The superior low bit-rate performance of the CADU approach seems to suggest that over-sampling not only wastes hardware resources and energy, and it could be counterproductive to image quality given a tight bit budget.

Research paper thumbnail of Detection of Malware Using Machine Learning Algorithms

Zenodo (CERN European Organization for Nuclear Research), Feb 6, 2023

Malware is becoming a major cybersecurity threat with increasing frequency every day. There are s... more Malware is becoming a major cybersecurity threat with increasing frequency every day. There are several ways to classify the new malware based on signatures or code present. Traditional approaches are not very effective against newly emerging Malware-samples. More and more antivirus software offers protection against malware, but zero-day attacks have yet to be achieved. We use machine learning algorithms to improve the mechanism and accordingly provide excellent experimental results. To do Traditional signature approaches also fail, but the new malware does. This document defines malware and malware types as an overview, also defines new mechanisms that use machine learning algorithms, effective and efficient methods in classifying malware detection, and builds on existing research on malware detection. to introduce. Machine Learning Algorithms describes the main challenges faced in malware detection classification.

Research paper thumbnail of Prevention of Phishing Attack in Online Voting System by using Visual Cryptography

International journal of engineering research and technology, 2019

As per the survey conducted only few people go for voting because of their tight schedule. There ... more As per the survey conducted only few people go for voting because of their tight schedule. There are many reasons, few may be everyone has to go to voting center, they have to stand in a long queue, they will be tired because of their tight schedule. So we have proposed an online voting system that make use of internet, the possibility of cheating/threats has been increasing day by day. One such problem is phishing attack which can create problems in authentication. So, we have implemented secured online voting system using Visual Cryptography (VC) aims at providing a facility to cast vote for critical and confidential internal corporate decisions. Keywords—Authentication, cryptography, image captcha, phishing, integer linear program, online voting.

Research paper thumbnail of Low Cost Energy Efficient Smart Security System with Information Stamping for IoT Networks

2018 3rd International Conference On Internet of Things: Smart Innovation and Usages (IoT-SIU), 2018

A security system with CCTV and other network nodes in IoT deals with large amount of data, so th... more A security system with CCTV and other network nodes in IoT deals with large amount of data, so the need for devices with larger storage space comes into the picture which is a bit costlier. Traditional security systems are more power consuming as it has to record for 24x7 with more throughput but less efficient. Thus need human in middle to upload into cloud is needed. In this work, we propose a low-cost energy efficient smart security system for CCTV with other network nodes. Whenever motion is detected by passive infrared (PIR) sensor, at that time only the camera and all other security sensor nodes in network are activated (Switched on), the captured video and information (sensor data) are stamped on the image using image processing techniques on Python platform. It will be stored in a local storage device, after certain threshold (based on sensitivity of the location) data will be uploaded into the cloud along with data log created during processing stage by Python programming model. In this way, we can reduce the amount of data to be stored (as no recording when idle), consumed power (as device is switched off when idle), maintenance cost (as fully programmed). No need for human in middle for uploading data into the cloud (as program will upload data in to cloud). Because of time, date and information (data from sensor nodes) stamping on each frame of video using python programming model video access becomes easier, as data log will be created.

Research paper thumbnail of Phishing Website Detection

International Journal of Scientific Research in Science and Technology

It is a crime to practice phishing by employing technical tricks and social engineering to exploi... more It is a crime to practice phishing by employing technical tricks and social engineering to exploit the innocence of unaware users. This methodology usually covers up a trustworthy entity so as to influence a consumer to execute an action if asked by the imitated entity. Most of the times, phishing attacks are being noticed by the practiced users but security is a main motive for the basic users as they are not aware of such circumstances. However, some methodologies are limited to look after the phishing attacks only and the delay in detection is mandatory. In this paper we emphasize the various techniques used for the detection of phishing attacks. We have also discovered various techniques for detection and prevention of phishing. Apart from that, we have introduced a new model for detection and prevention of phishing attacks.

Research paper thumbnail of Collaborative Adaptive Down-Sampling And Upconversion - An Approach For Image Compression

In this paper, we are going to use a practical approach of uniform down sampling in image space a... more In this paper, we are going to use a practical approach of uniform down sampling in image space and yet making the sampling adaptive by spatially varying, directional lowpass pre-filtering. The resulting down-sampled pre-filtered image remains a conventional square sample grid, and, thus, it can be compressed and transmitted without any change to current image coding standards and systems. The decoder first decompresses the low-resolution image and then up-converts it to the original resolution in a constrained least squares restoration process, using a 2-D piecewise autoregressive model and the knowledge of directional low-pass prefiltering. The proposed compression approach of collaborative adaptive down-sampling and upconversion (CADU) outperforms JPEG 2000 in PSNR measure at low to medium bit rates and achieves superior visual quality, as well. The superior low bit-rate performance of the CADU approach seems to suggest that over-sampling not only wastes hardware resources and energy, and it could be counterproductive to image quality given a tight bit budget.