Mohamad Fadli Zolkipli - Academia.edu (original) (raw)

Papers by Mohamad Fadli Zolkipli

Research paper thumbnail of Review on Cloud Security and Challenges on Higher Education

Malaysian Journal of Applied Sciences, Apr 30, 2022

Many new developments are often plagued with security concerns. Although emerging innovations hav... more Many new developments are often plagued with security concerns. Although emerging innovations have all the potential to change systems and people's lives, security issues hinder them adoption and usage. The transformations of data management brought by cloud technologies have helped both individuals and companies. While the cloud allows data storage, connectivity, and recovery stability, it is not immune to the security threats that other new technologies pose. Concerns have been presented over the protection and privacy of cloud users' data. Data leakage, data manipulation, condemnation, a Lack of Services assault, impersonating personalities, also unauthorised access to data are all examples of activities which can appear while data is outsourced to a cloud. Individuals and organisations will orchestrate these attacks, which will jeopardise the reliability and security of cloud networks. The vast majority of colleges and universities are digitising their records, which are then stored in the cloud and handled by a third party. Despite the sacred importance of educational information, the study explores the impact of cloud security problems on schooling. According to the findings, security is crucial for the secure migration and application of cloud technology in the educational sector. It also shows that the growing security threats associated with cloud technology can prevent many education institutions from using cloud services.

Research paper thumbnail of Hermes Ransomware v2.1 Action Monitoring using Next Generation Security Operation Center (NGSOC) Complex Correlation Rules

International Journal on Advanced Science, Engineering and Information Technology

Research paper thumbnail of Challenges and Issues in Implementing Personal Data Protection

International Journal of Recent Contributions from Engineering, Science & IT (iJES)

This paper is to discuss the challenges and issues in implementing personal data protection. As t... more This paper is to discuss the challenges and issues in implementing personal data protection. As the cases related to the personal data breaches is increasing day-by-day among us, so any organizations, system, applications, software or technology components that deal with huge amount of personal data such as contact details, email addresses, addresses and others are in a higher risk sector as the data are valuable. This study highlights the challenges and issues such as the usage of IoT devices, social media, implementation of fourth industrial revolution and also the lack of awareness among users in the process of the implementation of personal data protection. However, all this challenges and issues can be resolved if the users follow the correct method or procedures. Finally, this finding also elaborates some methods that could help users protect their personal data.

Research paper thumbnail of A study in data security in cloud computing

2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014

The vision of 21st century computing is that users can access Internet services over lightweight ... more The vision of 21st century computing is that users can access Internet services over lightweight portable devices rather than via variants of the traditional desktop computer. Consequently, users will have no interest in large, powerful machines. How, then, will computing power be provided? The answer to this question lies in cloud computing. Cloud computing is a recent trend in IT in which computing power and knowledge are moved away from the desktop and desktop PCs into giant datacenters. In the cloud computing paradigm, applications are delivered as services over the Internet. The key driving forces behind cloud computing are the presence of broadband and wireless networking, falling storage prices, and progressive enhancements in Internet computing software packages. Cloud service shoppers can add additional capabilities at peak demand, reduce prices, experiment with new services, and remove unessential capabilities. Service suppliers can increase utilization via multiplexing and allow for larger investments in software packages and hardware.

Research paper thumbnail of Internet of Things (IoT): A Study of Security Issues and Challenges

International Journal of Recent Contributions from Engineering, Science & IT (iJES)

The Internet of Things is one of the most popular networking concepts. The Internet of Things arc... more The Internet of Things is one of the most popular networking concepts. The Internet of Things architecture promises to connect anybody, anywhere, with anything. Unlike the traditional Internet, the Internet of Things uses heterogeneous wired and wireless networks to connect a huge number of machines, resource-constrained devices, and sensors. Even though the Internet of Things might become one of the most popular networking concepts that provide many benefits to its users, it is also open to many security issues and challenges. Based on the study, shows that Perception, Network and Application layers are the most open to security issues. Next, the security challenges inside and across the Internet of Things are also highlighted in this study.

Research paper thumbnail of A Smart Framework for Mobile Botnet Detection Using Static Analysis

KSII Transactions on Internet and Information Systems, 2020

Botnets have become one of the most significant threats to Internet-connected smartphones. A botn... more Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

Research paper thumbnail of An approach for malware behavior identification and classification

2011 3rd International Conference on Computer Research and Development, 2011

Malware is one of the major security threats that can break computer operation. However, commerci... more Malware is one of the major security threats that can break computer operation. However, commercial antivirus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of threats. Nowadays malware writers try to avoid detection by using several techniques such as polymorphic, metamorphic and also hiding technique. In order to overcome that issue, we proposed a new framework for malware behavior identification and classification that apply dynamic approach. This framework consists of two major processes such as behavior identification and malware classification. These two major processes will integrate together as interrelated process in our proposed framework. Result from this study is a new framework that able to identify and classify malware based on it behaviors.

Research paper thumbnail of Personal Data Protection Awareness through the Use of YouTube among the Youths in UUM

Journal of ICT In Education, 2021

This paper is to discuss the awareness among the youth in UUM related to personal data protection... more This paper is to discuss the awareness among the youth in UUM related to personal data protection. The cases of personal data protection increased day by day among the youths. Several awareness programs were done. The purpose of this study was to raise awareness of the importance of protecting personal data among the youth in Universiti Utara Malaysia. The method used to do awareness programs by using YouTube and online surveys. Awareness program using YouTube is highly recommended. The finding reveals that it can use this type of media to conduct awareness programs.

Research paper thumbnail of Review on Dark Web and Its Impact on Internet Governance

Journal of ICT In Education, 2021

Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engin... more Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engines and normal users, to explore a variety of illegal products and services. In this paper, the Dark Web and its impact on internet governance were analyzed. The findings of a review of the literature provide in-depth knowledge on the increasing number of crimes committed on the Dark Web, considering the economic, social, along ethical consequences of cybercrime on the Dark Web, as well as analyzing the consequences and methods for locating the criminals, as well as their drawbacks. Fraudsters, militants, and government-sponsored secret agents used the Dark Web where is among the most popular difficult together with unidentifiable channels to achieve their illicit goals. Crimes that were committed on the Dark Web are similar to criminal offenses committed in the real world. Nevertheless, the sheer size of the Dark Web, the unpredictability of the ecosystem, as well as the privacy and conf...

Research paper thumbnail of Cloud computing and security challenge

Cloud computing is a network-based technology that provides computation, information, data, and s... more Cloud computing is a network-based technology that provides computation, information, data, and storage services. For effective product growth, the software industry is placing a greater focus on Quality Assurance (QA) and Testing criteria. Presently. Testing is an effective way to identify potential vulnerabilities before real-world situations arise to ensure a high degree of protection for cloud services and applications. As a result, several public cloud providers announced that businesses are increasingly encouraging Testing Centers of Excellence (COE) and software test automation. This paper examines cloud protection testing from a crucial standpoint. Gaps in recent related journals, testing tools, and software test automation deals are also exposed. The potential research implications are highlighted to improve understanding and relationships between current research fields. The cloud infrastructure paradigm has transformed the computing world as it offers improved reliability...

Research paper thumbnail of Study on Prevention and Solution of Ransomware Attack

Journal of IT in Asia, 2021

The development of science and technology in this era brought many advantages for peoples, organi... more The development of science and technology in this era brought many advantages for peoples, organizations, enterprises, and companies merely a lot of cyber threats are occurring nowadays. Ransomware is one of the families of malicious software that spread quickly and cause a critical impact around the world. Ransomware attacks the victim by infecting the malicious file into the device; they will encrypt and deny the victim to access it. A ransom demand message will prompt the user so that they will gain the money anonymously. The victims are only allowed to access after pay the demand using crypto-currencies such as Bitcoin. There is a lot of reason that cause the ransomware attack around the world, for example, the vulnerability of the system. Otherwise, the weaknesses of security knowledge also become one of the causes. However, many preventions allow the user to avoid the ransomware propagate but the system is not fully free from the ransomware attack. Thus, a lot of solutions are...

Research paper thumbnail of Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining

American Journal of Engineering and Applied Sciences, 2009

Problem statement: To distinguish the activities of the network traffic that the intrusion and no... more Problem statement: To distinguish the activities of the network traffic that the intrusion and normal is very difficult and to need much time consuming. An analyst must review all the data that large and wide to find the sequence of intrusion on the network connection. Therefore, it needs a way that can detect network intrusion to reflect the current network traffics. Approach: In this study, a novel method to find intrusion characteristic for IDS using decision tree machine learning of data mining technique was proposed. Method used to generate of rules is classification by ID3 algorithm of decision tree. Results: These rules can determine of intrusion characteristics then to implement in the firewall policy rules as prevention. Conclusion: Combination of IDS and firewall so-called the IPS, so that besides detecting the existence of intrusion also can execute by doing deny of intrusion as prevention.

Research paper thumbnail of Malware Behavior Analysis: Learning and Understanding Current Malware Threats

2010 Second International Conference on Network Applications, Protocols and Services, 2010

... my Aman Jantan School of Computer Science, Universiti Sains Malaysia, 11800 USM, Penang Malay... more ... my Aman Jantan School of Computer Science, Universiti Sains Malaysia, 11800 USM, Penang Malaysia e-mail: aman@cs.usm.my Abstract-Malware is one of the major security threats in computer and network environment. ...

Research paper thumbnail of A Framework for Malware Detection Using Combination Technique and Signature Generation

2010 Second International Conference on Computer Research and Development, 2010

... Aman Jantan* School of Computer Science Universiti Sains Malaysia, USM Penang, Malaysia e-mai... more ... Aman Jantan* School of Computer Science Universiti Sains Malaysia, USM Penang, Malaysia e-mail: aman@cs.usm.my Abstract—Malware detection must apply sophisticated technique to minimize malware thread that can break computer operation. ...

Research paper thumbnail of Taxonomy of Computational Offloading Approaches in Mobile Devices

Research paper thumbnail of Review on Confidentiality, Integrity and Availability in Information Security

Journal of ICT In Education

Information security is very significant needs to be secured due to people relying on networks an... more Information security is very significant needs to be secured due to people relying on networks and communication. Therefore, protecting information is a major challenge with the number of users increases rapidly in recent years. The aim of this article is to review Confidentiality, Integrity and Availability (CIA) in information security. This article focuses on the issues of information security and the requirements of information security. The articles, journals and conference papers are reviewed by researchers were published in 2016-2021. Security issues are analyzed in the recent methodologies. The result of the relationship between CIA in each information security requirement is at a moderate level. It is suggested cybersecurity risk awareness program for society is needed. Therefore, every user could get full advantages in networks and digital platforms.

Research paper thumbnail of Mobile Cloud Computing with SOAP and REST Web Services

Journal of Physics: Conference Series

Mobile computing in conjunction with Mobile web services drives a strong approach where the limit... more Mobile computing in conjunction with Mobile web services drives a strong approach where the limitations of mobile devices may possibly be tackled. Mobile Web Services are based on two types of technologies; SOAP and REST, which works with the existing protocols to develop Web services. Both the approaches carry their own distinct features, yet to keep the constraint features of mobile devices in mind, the better in two is considered to be the one which minimize the computation and transmission overhead while offloading. The load transferring of mobile device to remote servers for execution called computational offloading. There are numerous approaches to implement computational offloading a viable solution for eradicating the resources constraints of mobile device, yet a dynamic method of computational offloading is always required for a smooth and simple migration of complex tasks. The intention of this work is to present a distinctive approach which may not engage the mobile resources for longer time. The concept of web services utilized in our work to delegate the computational intensive tasks for remote execution. We tested both SOAP Web services approach and REST Web Services for mobile computing. Two parameters considered in our lab experiments to test; Execution Time and Energy Consumption. The results show that RESTful Web services execution is far better than executing the same application by SOAP Web services approach, in terms of execution time and energy consumption. Conducting experiments with the developed prototype matrix multiplication app, REST execution time is about 200% better than SOAP execution approach. In case of energy consumption REST execution is about 250% better than SOAP execution approach.

Research paper thumbnail of On Hybrid Extreme Learning Machine and Genetic Algorithm to Work as Intrusion Detection System in Cloud Computing

Today security is a major challenge, many tools provided in this issue of instant firewall and in... more Today security is a major challenge, many tools provided in this issue of instant firewall and intrusion-detection system (IDS) .IDS is one of the powerful tools in the security. IDS works depend on the fastest to detect and accuracy of detection. In other hand the IDS facing problem with high false alarm rate. This work proposes to solve this problem by hybrid between the Extreme Learning Machine (ELM) and Genetic Algorithm (GA). ELM work depends on two parameters weight (W) and biases (B) that will provide by GA. ELM has set of properties that make it attractive to be adopted for intrusion detection system in cloud environment. our work approach and integrate GA ELM work as IDS with high hopes detection rate and accuracy to the second problem and suggest dividing the training mode for virtual training and virtual testing to ensure selecting a best classifier.

Research paper thumbnail of A Review of Challenges and Security Risks of Cloud Computing

Journal of Telecommunication, Electronic and Computer Engineering, 2017

Cloud computing has been an attention in the new era of the IT technologies as there is an increa... more Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-demand services. Taking the advantage of low cost derived from the increase in efficiency and performance facilitated by cloud computing, governments and organizations around the globe are motivated to build or migrate to the cloud. However, there are still many technical issues relating to the features of cloud computing and the provision of quality service, leading to a delay in adopting cloud computing. This review paper highlights the security risks and challenges of cloud computing and study the security requirements for cloud computing. The primary aim of this review is to classify the security risks and challenges related to the differe...

Research paper thumbnail of Review on the Advantages and Disadvantages of Cryptocurrency Attacks

The advantages and disadvantages of blockchain technology in cryptocurrency attacks will be expla... more The advantages and disadvantages of blockchain technology in cryptocurrency attacks will be explained in this article. Digital currency has been widely used around the world. The soaring value of digital currencies has also led to an increase in the use of cryptocurrency. Cryptocurrency is a form of payment that can be exchanged online for goods and services. The increasingly popular use of cryptocurrency around the world is causing criminals, and hackers are starting to attack cryptocurrency on an ongoing basis. With the advent of blockchain technology, it managed to save the digital currency system with the availability of a decentralized database. Each block has many transactions, and for new transactions will be recorded and added to a decentralized database with a cryptographic signature that does not change making it difficult for abuse and theft. The authors have examined the strengths and weaknesses of the blockchain in cryptocurrency attacks. As a result, the authors suppor...

Research paper thumbnail of Review on Cloud Security and Challenges on Higher Education

Malaysian Journal of Applied Sciences, Apr 30, 2022

Many new developments are often plagued with security concerns. Although emerging innovations hav... more Many new developments are often plagued with security concerns. Although emerging innovations have all the potential to change systems and people's lives, security issues hinder them adoption and usage. The transformations of data management brought by cloud technologies have helped both individuals and companies. While the cloud allows data storage, connectivity, and recovery stability, it is not immune to the security threats that other new technologies pose. Concerns have been presented over the protection and privacy of cloud users' data. Data leakage, data manipulation, condemnation, a Lack of Services assault, impersonating personalities, also unauthorised access to data are all examples of activities which can appear while data is outsourced to a cloud. Individuals and organisations will orchestrate these attacks, which will jeopardise the reliability and security of cloud networks. The vast majority of colleges and universities are digitising their records, which are then stored in the cloud and handled by a third party. Despite the sacred importance of educational information, the study explores the impact of cloud security problems on schooling. According to the findings, security is crucial for the secure migration and application of cloud technology in the educational sector. It also shows that the growing security threats associated with cloud technology can prevent many education institutions from using cloud services.

Research paper thumbnail of Hermes Ransomware v2.1 Action Monitoring using Next Generation Security Operation Center (NGSOC) Complex Correlation Rules

International Journal on Advanced Science, Engineering and Information Technology

Research paper thumbnail of Challenges and Issues in Implementing Personal Data Protection

International Journal of Recent Contributions from Engineering, Science & IT (iJES)

This paper is to discuss the challenges and issues in implementing personal data protection. As t... more This paper is to discuss the challenges and issues in implementing personal data protection. As the cases related to the personal data breaches is increasing day-by-day among us, so any organizations, system, applications, software or technology components that deal with huge amount of personal data such as contact details, email addresses, addresses and others are in a higher risk sector as the data are valuable. This study highlights the challenges and issues such as the usage of IoT devices, social media, implementation of fourth industrial revolution and also the lack of awareness among users in the process of the implementation of personal data protection. However, all this challenges and issues can be resolved if the users follow the correct method or procedures. Finally, this finding also elaborates some methods that could help users protect their personal data.

Research paper thumbnail of A study in data security in cloud computing

2014 International Conference on Computer, Communications, and Control Technology (I4CT), 2014

The vision of 21st century computing is that users can access Internet services over lightweight ... more The vision of 21st century computing is that users can access Internet services over lightweight portable devices rather than via variants of the traditional desktop computer. Consequently, users will have no interest in large, powerful machines. How, then, will computing power be provided? The answer to this question lies in cloud computing. Cloud computing is a recent trend in IT in which computing power and knowledge are moved away from the desktop and desktop PCs into giant datacenters. In the cloud computing paradigm, applications are delivered as services over the Internet. The key driving forces behind cloud computing are the presence of broadband and wireless networking, falling storage prices, and progressive enhancements in Internet computing software packages. Cloud service shoppers can add additional capabilities at peak demand, reduce prices, experiment with new services, and remove unessential capabilities. Service suppliers can increase utilization via multiplexing and allow for larger investments in software packages and hardware.

Research paper thumbnail of Internet of Things (IoT): A Study of Security Issues and Challenges

International Journal of Recent Contributions from Engineering, Science & IT (iJES)

The Internet of Things is one of the most popular networking concepts. The Internet of Things arc... more The Internet of Things is one of the most popular networking concepts. The Internet of Things architecture promises to connect anybody, anywhere, with anything. Unlike the traditional Internet, the Internet of Things uses heterogeneous wired and wireless networks to connect a huge number of machines, resource-constrained devices, and sensors. Even though the Internet of Things might become one of the most popular networking concepts that provide many benefits to its users, it is also open to many security issues and challenges. Based on the study, shows that Perception, Network and Application layers are the most open to security issues. Next, the security challenges inside and across the Internet of Things are also highlighted in this study.

Research paper thumbnail of A Smart Framework for Mobile Botnet Detection Using Static Analysis

KSII Transactions on Internet and Information Systems, 2020

Botnets have become one of the most significant threats to Internet-connected smartphones. A botn... more Botnets have become one of the most significant threats to Internet-connected smartphones. A botnet is a combination of infected devices communicating through a command server under the control of botmaster for malicious purposes. Nowadays, the number and variety of botnets attacks have increased drastically, especially on the Android platform. Severe network disruptions through massive coordinated attacks result in large financial and ethical losses. The increase in the number of botnet attacks brings the challenges for detection of harmful software. This study proposes a smart framework for mobile botnet detection using static analysis. This technique combines permissions, activities, broadcast receivers, background services, API and uses the machine-learning algorithm to detect mobile botnets applications. The prototype was implemented and used to validate the performance, accuracy, and scalability of the proposed framework by evaluating 3000 android applications. The obtained results show the proposed framework obtained 98.20% accuracy with a low 0.1140 false-positive rate.

Research paper thumbnail of An approach for malware behavior identification and classification

2011 3rd International Conference on Computer Research and Development, 2011

Malware is one of the major security threats that can break computer operation. However, commerci... more Malware is one of the major security threats that can break computer operation. However, commercial antivirus or anti-spyware that used signature-based matching to detects malware cannot solve that kind of threats. Nowadays malware writers try to avoid detection by using several techniques such as polymorphic, metamorphic and also hiding technique. In order to overcome that issue, we proposed a new framework for malware behavior identification and classification that apply dynamic approach. This framework consists of two major processes such as behavior identification and malware classification. These two major processes will integrate together as interrelated process in our proposed framework. Result from this study is a new framework that able to identify and classify malware based on it behaviors.

Research paper thumbnail of Personal Data Protection Awareness through the Use of YouTube among the Youths in UUM

Journal of ICT In Education, 2021

This paper is to discuss the awareness among the youth in UUM related to personal data protection... more This paper is to discuss the awareness among the youth in UUM related to personal data protection. The cases of personal data protection increased day by day among the youths. Several awareness programs were done. The purpose of this study was to raise awareness of the importance of protecting personal data among the youth in Universiti Utara Malaysia. The method used to do awareness programs by using YouTube and online surveys. Awareness program using YouTube is highly recommended. The finding reveals that it can use this type of media to conduct awareness programs.

Research paper thumbnail of Review on Dark Web and Its Impact on Internet Governance

Journal of ICT In Education, 2021

Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engin... more Cyber attackers use the Dark Web, a collection of facilities that are not visible to search engines and normal users, to explore a variety of illegal products and services. In this paper, the Dark Web and its impact on internet governance were analyzed. The findings of a review of the literature provide in-depth knowledge on the increasing number of crimes committed on the Dark Web, considering the economic, social, along ethical consequences of cybercrime on the Dark Web, as well as analyzing the consequences and methods for locating the criminals, as well as their drawbacks. Fraudsters, militants, and government-sponsored secret agents used the Dark Web where is among the most popular difficult together with unidentifiable channels to achieve their illicit goals. Crimes that were committed on the Dark Web are similar to criminal offenses committed in the real world. Nevertheless, the sheer size of the Dark Web, the unpredictability of the ecosystem, as well as the privacy and conf...

Research paper thumbnail of Cloud computing and security challenge

Cloud computing is a network-based technology that provides computation, information, data, and s... more Cloud computing is a network-based technology that provides computation, information, data, and storage services. For effective product growth, the software industry is placing a greater focus on Quality Assurance (QA) and Testing criteria. Presently. Testing is an effective way to identify potential vulnerabilities before real-world situations arise to ensure a high degree of protection for cloud services and applications. As a result, several public cloud providers announced that businesses are increasingly encouraging Testing Centers of Excellence (COE) and software test automation. This paper examines cloud protection testing from a crucial standpoint. Gaps in recent related journals, testing tools, and software test automation deals are also exposed. The potential research implications are highlighted to improve understanding and relationships between current research fields. The cloud infrastructure paradigm has transformed the computing world as it offers improved reliability...

Research paper thumbnail of Study on Prevention and Solution of Ransomware Attack

Journal of IT in Asia, 2021

The development of science and technology in this era brought many advantages for peoples, organi... more The development of science and technology in this era brought many advantages for peoples, organizations, enterprises, and companies merely a lot of cyber threats are occurring nowadays. Ransomware is one of the families of malicious software that spread quickly and cause a critical impact around the world. Ransomware attacks the victim by infecting the malicious file into the device; they will encrypt and deny the victim to access it. A ransom demand message will prompt the user so that they will gain the money anonymously. The victims are only allowed to access after pay the demand using crypto-currencies such as Bitcoin. There is a lot of reason that cause the ransomware attack around the world, for example, the vulnerability of the system. Otherwise, the weaknesses of security knowledge also become one of the causes. However, many preventions allow the user to avoid the ransomware propagate but the system is not fully free from the ransomware attack. Thus, a lot of solutions are...

Research paper thumbnail of Intrusion Preventing System using Intrusion Detection System Decision Tree Data Mining

American Journal of Engineering and Applied Sciences, 2009

Problem statement: To distinguish the activities of the network traffic that the intrusion and no... more Problem statement: To distinguish the activities of the network traffic that the intrusion and normal is very difficult and to need much time consuming. An analyst must review all the data that large and wide to find the sequence of intrusion on the network connection. Therefore, it needs a way that can detect network intrusion to reflect the current network traffics. Approach: In this study, a novel method to find intrusion characteristic for IDS using decision tree machine learning of data mining technique was proposed. Method used to generate of rules is classification by ID3 algorithm of decision tree. Results: These rules can determine of intrusion characteristics then to implement in the firewall policy rules as prevention. Conclusion: Combination of IDS and firewall so-called the IPS, so that besides detecting the existence of intrusion also can execute by doing deny of intrusion as prevention.

Research paper thumbnail of Malware Behavior Analysis: Learning and Understanding Current Malware Threats

2010 Second International Conference on Network Applications, Protocols and Services, 2010

... my Aman Jantan School of Computer Science, Universiti Sains Malaysia, 11800 USM, Penang Malay... more ... my Aman Jantan School of Computer Science, Universiti Sains Malaysia, 11800 USM, Penang Malaysia e-mail: aman@cs.usm.my Abstract-Malware is one of the major security threats in computer and network environment. ...

Research paper thumbnail of A Framework for Malware Detection Using Combination Technique and Signature Generation

2010 Second International Conference on Computer Research and Development, 2010

... Aman Jantan* School of Computer Science Universiti Sains Malaysia, USM Penang, Malaysia e-mai... more ... Aman Jantan* School of Computer Science Universiti Sains Malaysia, USM Penang, Malaysia e-mail: aman@cs.usm.my Abstract—Malware detection must apply sophisticated technique to minimize malware thread that can break computer operation. ...

Research paper thumbnail of Taxonomy of Computational Offloading Approaches in Mobile Devices

Research paper thumbnail of Review on Confidentiality, Integrity and Availability in Information Security

Journal of ICT In Education

Information security is very significant needs to be secured due to people relying on networks an... more Information security is very significant needs to be secured due to people relying on networks and communication. Therefore, protecting information is a major challenge with the number of users increases rapidly in recent years. The aim of this article is to review Confidentiality, Integrity and Availability (CIA) in information security. This article focuses on the issues of information security and the requirements of information security. The articles, journals and conference papers are reviewed by researchers were published in 2016-2021. Security issues are analyzed in the recent methodologies. The result of the relationship between CIA in each information security requirement is at a moderate level. It is suggested cybersecurity risk awareness program for society is needed. Therefore, every user could get full advantages in networks and digital platforms.

Research paper thumbnail of Mobile Cloud Computing with SOAP and REST Web Services

Journal of Physics: Conference Series

Mobile computing in conjunction with Mobile web services drives a strong approach where the limit... more Mobile computing in conjunction with Mobile web services drives a strong approach where the limitations of mobile devices may possibly be tackled. Mobile Web Services are based on two types of technologies; SOAP and REST, which works with the existing protocols to develop Web services. Both the approaches carry their own distinct features, yet to keep the constraint features of mobile devices in mind, the better in two is considered to be the one which minimize the computation and transmission overhead while offloading. The load transferring of mobile device to remote servers for execution called computational offloading. There are numerous approaches to implement computational offloading a viable solution for eradicating the resources constraints of mobile device, yet a dynamic method of computational offloading is always required for a smooth and simple migration of complex tasks. The intention of this work is to present a distinctive approach which may not engage the mobile resources for longer time. The concept of web services utilized in our work to delegate the computational intensive tasks for remote execution. We tested both SOAP Web services approach and REST Web Services for mobile computing. Two parameters considered in our lab experiments to test; Execution Time and Energy Consumption. The results show that RESTful Web services execution is far better than executing the same application by SOAP Web services approach, in terms of execution time and energy consumption. Conducting experiments with the developed prototype matrix multiplication app, REST execution time is about 200% better than SOAP execution approach. In case of energy consumption REST execution is about 250% better than SOAP execution approach.

Research paper thumbnail of On Hybrid Extreme Learning Machine and Genetic Algorithm to Work as Intrusion Detection System in Cloud Computing

Today security is a major challenge, many tools provided in this issue of instant firewall and in... more Today security is a major challenge, many tools provided in this issue of instant firewall and intrusion-detection system (IDS) .IDS is one of the powerful tools in the security. IDS works depend on the fastest to detect and accuracy of detection. In other hand the IDS facing problem with high false alarm rate. This work proposes to solve this problem by hybrid between the Extreme Learning Machine (ELM) and Genetic Algorithm (GA). ELM work depends on two parameters weight (W) and biases (B) that will provide by GA. ELM has set of properties that make it attractive to be adopted for intrusion detection system in cloud environment. our work approach and integrate GA ELM work as IDS with high hopes detection rate and accuracy to the second problem and suggest dividing the training mode for virtual training and virtual testing to ensure selecting a best classifier.

Research paper thumbnail of A Review of Challenges and Security Risks of Cloud Computing

Journal of Telecommunication, Electronic and Computer Engineering, 2017

Cloud computing has been an attention in the new era of the IT technologies as there is an increa... more Cloud computing has been an attention in the new era of the IT technologies as there is an increase demand in the services or utility computing all over the wide world web. Security risk resulting from resource sharing throughout the cloud computing becomes one of the most challenging concerns in providing powerful processing and storage as on-demand services. Taking the advantage of low cost derived from the increase in efficiency and performance facilitated by cloud computing, governments and organizations around the globe are motivated to build or migrate to the cloud. However, there are still many technical issues relating to the features of cloud computing and the provision of quality service, leading to a delay in adopting cloud computing. This review paper highlights the security risks and challenges of cloud computing and study the security requirements for cloud computing. The primary aim of this review is to classify the security risks and challenges related to the differe...

Research paper thumbnail of Review on the Advantages and Disadvantages of Cryptocurrency Attacks

The advantages and disadvantages of blockchain technology in cryptocurrency attacks will be expla... more The advantages and disadvantages of blockchain technology in cryptocurrency attacks will be explained in this article. Digital currency has been widely used around the world. The soaring value of digital currencies has also led to an increase in the use of cryptocurrency. Cryptocurrency is a form of payment that can be exchanged online for goods and services. The increasingly popular use of cryptocurrency around the world is causing criminals, and hackers are starting to attack cryptocurrency on an ongoing basis. With the advent of blockchain technology, it managed to save the digital currency system with the availability of a decentralized database. Each block has many transactions, and for new transactions will be recorded and added to a decentralized database with a cryptographic signature that does not change making it difficult for abuse and theft. The authors have examined the strengths and weaknesses of the blockchain in cryptocurrency attacks. As a result, the authors suppor...