Zul Hilmi Abdullah | Universiti Sains Islam Malaysia (USIM) (original) (raw)

Uploads

Papers by Zul Hilmi Abdullah

Research paper thumbnail of An Efficient Framework to Build Up Malware Dataset

This research paper presents a framework on how to build up malware dataset. Many researchers too... more This research paper presents a framework on how to build up malware dataset. Many researchers took longer time to clean the dataset from any noise or to transform the dataset into a format that can be used straight away for testing. Therefore, this research is proposing a framework to help researchers to speed up the malware dataset cleaning processes which later can be used for testing. It is believed, an efficient malware dataset cleaning processes, can improved the quality of the data, thus help to improve the accuracy and the efficiency of the subsequent analysis. Apart from that, an in-depth understanding of the malware taxonomy is also important prior and during the dataset cleaning processes. A new Trojan classification has been proposed to complement this framework. This experiment has been conducted in a controlled lab environment and using the dataset from Vx Heavens dataset. This framework is built based on the integration of static and dynamic analyses, incident response method and knowledge database discovery (KDD) processes. This framework can be used as the basis guideline for malware researchers in building malware dataset.

Research paper thumbnail of Study of the Availability and Awareness of E-services in Higher Education in Libya

A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -ser... more A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -services in higher education. Accordingly, the findings obtained from the data analysis were discussed .The reliability test was confirmed a Cronbach's alpha above (0.90).

Research paper thumbnail of File Integrity Monitor Scheduling Based on File Security Level Classification

Integrity of operating system components must be carefully handled in order to optimize the syste... more Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. Two methods, off-line and on-line file integrity monitoring have their own disadvantages. This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification.

Research paper thumbnail of A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool

Journal of Computer Science, 2015

Research paper thumbnail of A Framework of the Integrated Graduate Portal for Student Marketability

Most of the fresh graduates generally have difficulties to secure their first job in a short spac... more Most of the fresh graduates generally have difficulties to secure their first job in a short space of time after they have finished their study. One of the reasons was the lack of proper graduates' information available to potential employers. This has led to the use of electronic portfolio to facilitate graduates' marketability. The electronic portfolio is a new way of showcasing graduates' successes and achievements to potential employers. It is a means of language educational instruction and communication system to enable students tap opportunities and also project their worth to employers. Although the electronic portfolio have been shown to help showcasing graduates' work, there is still a problem of accessibility to the potential employers. Therefore, in this paper, a framework for an Integrated Graduate Portal (IGP) is proposed and discussed. The IGP is a proposed system that brings together important stakeholders, including potential employers, which are nece...

Research paper thumbnail of Study of the Availability and Awareness of E-services in Higher Education in Libya

A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -ser... more A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -services in higher education. Accordingly, the findings obtained from the data analysis were discussed .The reliability test was confirmed a Cronbach's alpha above (0.90).

Research paper thumbnail of Penggunaan Teknologi Maklumat Dalam Memacu Kebolehpasaran Graduan Institusi Pengajian Tinggi Islam (Ipti)

Institusi Pengajian Tinggi (IPT) termasuklah Institusi Pengajian Tinggi Islam (IPTI) yang berupay... more Institusi Pengajian Tinggi (IPT) termasuklah Institusi Pengajian Tinggi Islam (IPTI) yang berupaya melahirkan graduan yang mempunyai kebolehpasaran yang tinggi akan mempunyai reputasi yang tinggi dan ini berupaya melonjakkan institusi tersebut menjadi sebuah institusi yang menjadi rujukan, dihormati dan dikenali. Berdasarkan jumlah graduan yang menamatkan pengajian adalah begitu besar setiap tahun, sudah pasti isu kebolehpasaran untuk mendapat pekerjaan menjadi perkara utama dan perlu diberi perhatian. Pemasalahan kebolehpasaran graduan didapati membabitkan tiga faktor yang sering digariskan oleh pihak majikan atau industri, iaitu dari segi imej dan ketrampilan diri, boleh berkomunikasi dengan baik dan penguasaan dalam bahasa Inggeris. Di samping itu penyampaian dan pengaksesan maklumat yang mudah serta tepat adalah sangat penting dalam proses menilai kebolehpasaran seseorang graduan. Adalah menjadi satu harapan pihak IPTI untuk melahirkan graduan yang ber-kebolehpasaran yang tinggi...

Research paper thumbnail of Peranan Laman Web Dalam Melonjak Kegemilangan Institusi Pengajian Tinggi Islam (Ipti)

Pelbagai cabaran perlu dihadapi oleh sesebuah Institusi Pengajian Tinggi Islam (IPTI) dalam usaha... more Pelbagai cabaran perlu dihadapi oleh sesebuah Institusi Pengajian Tinggi Islam (IPTI) dalam usaha menjadi sebuah institusi yang menjadi rujukan, dihormati dan dikenali. Salah satu cabaran adalah cabaran menyampaikan maklumat yang penting dan kritikal kepada kumpulan sasar (bakal pelajar, bakal rakan penyelidik, ibubapa serta orang ramai). Penyampaian maklumat yang mudah serta tepat adalah sangat penting dalam mencerminkan keadaan, kebolehan (kebolehpercayaan) serta reputasi sesebuah institusi. Penggunaan teknologi terkini termasuk laman web boleh diaplikasikan dalam mencapai maksud tersebut agar penyebaran maklumat adalah lebih berkesan dan sampai kepada kumpulan sasar. Kertaskerja ini membincangkan elemen yang diperlukan dalam menyediakan laman web yang efektif dari segi penyediaan kandungan, antaramuka, interaktiviti, dan sambungan bagi tujuan menyampaikan maklumat tentang IPTI dengan berkesan. Selain itu isu-isu keselamatan laman web yang merupakan elemen penting dalam menjaga re...

Research paper thumbnail of E-Learning Tool: A Review on Trends in Automated Programming Codes Assessment

The students' assessment is done in order to gauge their progress in a learning process. The ... more The students' assessment is done in order to gauge their progress in a learning process. The ratio of one lecturer to a small number of students is considered a practical solution. However, the numbers of students are increasing, which could lead to a significant increase of workload for the lecturer. Teaching a programming course to a large number of students is a challenging. There are tradeoffs between giving a lot of assessments to the students to boost their understanding of the subject matter versus the amount of extra work for the lecturer to mark the assessments given. Since an assessment related to programming code merely deals with programming logic, it is desirable that an automated assessment tool is used to relieve the unnecessary load. Over the past few years, there are studies that offers solutions for automated marking of programming codes. Each solution has its own characteristics and mechanism. This study explores the trends in the e-learning tool (automated pr...

Research paper thumbnail of Development of Integrated Portal (IP) as an E-Tool for the Enhancement of Job Marketability

This paper analyses the need to develop an Integrated Portal (IP) to facilitate jobmarketability ... more This paper analyses the need to develop an Integrated Portal (IP) to facilitate jobmarketability and lists its components.The IP will be in form of a website which allows known stakeholders to make use of it. The stakeholders are identified in this paper and the features of the Integrated Portal are also briefly explained. It also goes further to explain the benefits and some basic requirements needed for the IP. The eportfolio is used as the main system while other small systems are linked to it.

Research paper thumbnail of An Efficient Framework to Build Up Malware Dataset

This research paper presents a framework on how to build up malware dataset. Many researchers too... more This research paper presents a framework on how to build up malware dataset. Many researchers took longer time to clean the dataset from any noise or to transform the dataset into a format that can be used straight away for testing. Therefore, this research is proposing a framework to help researchers to speed up the malware dataset cleaning processes which later can be used for testing. It is believed, an efficient malware dataset cleaning processes, can improved the quality of the data, thus help to improve the accuracy and the efficiency of the subsequent analysis. Apart from that, an in-depth understanding of the malware taxonomy is also important prior and during the dataset cleaning processes. A new Trojan classification has been proposed to complement this framework. This experiment has been conducted in a controlled lab environment and using the dataset from Vx Heavens dataset. This framework is built based on the integration of static and dynamic analyses, incident response method and knowledge database discovery (KDD) processes. This framework can be used as the basis guideline for malware researchers in building malware dataset.

Research paper thumbnail of File Integrity Monitor Scheduling Based on File Security Level Classification

Communications in Computer and Information Science, 2011

Integrity of operating system components must be carefully handled in order to optimize the syste... more Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity ...

Research paper thumbnail of Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization

Lecture Notes in Electrical Engineering, 2014

Malwares attack such as by the worm, virus, trojan horse and botnet have caused lots of troubleso... more Malwares attack such as by the worm, virus, trojan horse and botnet have caused lots of troublesome for many organisations and users which lead to the cybercrime. Living in a cyber world, being infected by these malwares becoming more common. Nowadays the malwares attack especially by the trojan horse is becoming more sophisticated and intelligent, makes it is harder to be detected than before. Therefore, in this research paper, a new model called ETDMo (Efficient Trojan Detection Model) is built to detect trojan horse attacks more efficiently. In this model, the static, dynamic and automated analyses were conducted and the machine learning algorithms were applied to optimize the performance. Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2% of true positive rate and with 1.7% of false positive rate.

Research paper thumbnail of Towards a Dynamic File Integrity Monitor through a Security Classification

File is a component of a computer system that has importance value of its own, either in terms of... more File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended changes happen on the related file, it may affect the security of related computer system. File integrity monitor (FIM) tools is widely used to minimize the file security risk. This paper proposed dynamic schedule for FIM. This paper presents a dynamic scheduling for FIM by combining on-line and off-line monitoring based on related files security requirement. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification.

Research paper thumbnail of An Efficient Trojan Horse Classification (ETC)

For the past few years, malware or also known as malicious code is seen as one of the biggest thr... more For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organizations and end users. Malicious code can be divided into many categories such as viruses, worms and trojan horses. Each of these categories has it owns implications and threats, and trojan horse has been chosen as the domain of this research paper. Prior to the formation of a new trojan horse detection model, an in-depth study and investigation of the existing trojan horse classification is presented in this paper. Surprisingly, not much research related with trojan horse has been done. On 16 th January 2013, Troj/Invo-Zip has caused chaos by masquerading as an invoice from Europcar and spreading via email. Therefore, in this research paper, a new trojan horse classification called Efficient Trojan Horse Classification (ETC) is developed. This ETC later is used as a basis to build a model to detect trojan horse efficiently. The methods used to develop the ETC are the static and dynamic analyses. As for the dynamic analysis, cuckoo sandbox has been integrated to speed up the analysis and reverse engineering processes.

Research paper thumbnail of An Efficient Framework to Build Up Malware Dataset

This research paper presents a framework on how to build up malware dataset. Many researchers too... more This research paper presents a framework on how to build up malware dataset. Many researchers took longer time to clean the dataset from any noise or to transform the dataset into a format that can be used straight away for testing. Therefore, this research is proposing a framework to help researchers to speed up the malware dataset cleaning processes which later can be used for testing. It is believed, an efficient malware dataset cleaning processes, can improved the quality of the data, thus help to improve the accuracy and the efficiency of the subsequent analysis. Apart from that, an in-depth understanding of the malware taxonomy is also important prior and during the dataset cleaning processes. A new Trojan classification has been proposed to complement this framework. This experiment has been conducted in a controlled lab environment and using the dataset from Vx Heavens dataset. This framework is built based on the integration of static and dynamic analyses, incident response method and knowledge database discovery (KDD) processes. This framework can be used as the basis guideline for malware researchers in building malware dataset.

Research paper thumbnail of Study of the Availability and Awareness of E-services in Higher Education in Libya

A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -ser... more A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -services in higher education. Accordingly, the findings obtained from the data analysis were discussed .The reliability test was confirmed a Cronbach's alpha above (0.90).

Research paper thumbnail of File Integrity Monitor Scheduling Based on File Security Level Classification

Integrity of operating system components must be carefully handled in order to optimize the syste... more Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity monitoring tools are widely used to detect any malicious modification to these critical files. Two methods, off-line and on-line file integrity monitoring have their own disadvantages. This paper proposes an enhancement to the scheduling algorithm of the current file integrity monitoring approach by combining the off-line and on-line monitoring approach with dynamic inspection scheduling by performing file classification technique. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification.

Research paper thumbnail of A Framework for a Multi-Layered Security of an Automated Programming Code Assessment Tool

Journal of Computer Science, 2015

Research paper thumbnail of A Framework of the Integrated Graduate Portal for Student Marketability

Most of the fresh graduates generally have difficulties to secure their first job in a short spac... more Most of the fresh graduates generally have difficulties to secure their first job in a short space of time after they have finished their study. One of the reasons was the lack of proper graduates' information available to potential employers. This has led to the use of electronic portfolio to facilitate graduates' marketability. The electronic portfolio is a new way of showcasing graduates' successes and achievements to potential employers. It is a means of language educational instruction and communication system to enable students tap opportunities and also project their worth to employers. Although the electronic portfolio have been shown to help showcasing graduates' work, there is still a problem of accessibility to the potential employers. Therefore, in this paper, a framework for an Integrated Graduate Portal (IGP) is proposed and discussed. The IGP is a proposed system that brings together important stakeholders, including potential employers, which are nece...

Research paper thumbnail of Study of the Availability and Awareness of E-services in Higher Education in Libya

A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -ser... more A survey was conducted to examine Libyan student's adoption and use of the national Libyan e -services in higher education. Accordingly, the findings obtained from the data analysis were discussed .The reliability test was confirmed a Cronbach's alpha above (0.90).

Research paper thumbnail of Penggunaan Teknologi Maklumat Dalam Memacu Kebolehpasaran Graduan Institusi Pengajian Tinggi Islam (Ipti)

Institusi Pengajian Tinggi (IPT) termasuklah Institusi Pengajian Tinggi Islam (IPTI) yang berupay... more Institusi Pengajian Tinggi (IPT) termasuklah Institusi Pengajian Tinggi Islam (IPTI) yang berupaya melahirkan graduan yang mempunyai kebolehpasaran yang tinggi akan mempunyai reputasi yang tinggi dan ini berupaya melonjakkan institusi tersebut menjadi sebuah institusi yang menjadi rujukan, dihormati dan dikenali. Berdasarkan jumlah graduan yang menamatkan pengajian adalah begitu besar setiap tahun, sudah pasti isu kebolehpasaran untuk mendapat pekerjaan menjadi perkara utama dan perlu diberi perhatian. Pemasalahan kebolehpasaran graduan didapati membabitkan tiga faktor yang sering digariskan oleh pihak majikan atau industri, iaitu dari segi imej dan ketrampilan diri, boleh berkomunikasi dengan baik dan penguasaan dalam bahasa Inggeris. Di samping itu penyampaian dan pengaksesan maklumat yang mudah serta tepat adalah sangat penting dalam proses menilai kebolehpasaran seseorang graduan. Adalah menjadi satu harapan pihak IPTI untuk melahirkan graduan yang ber-kebolehpasaran yang tinggi...

Research paper thumbnail of Peranan Laman Web Dalam Melonjak Kegemilangan Institusi Pengajian Tinggi Islam (Ipti)

Pelbagai cabaran perlu dihadapi oleh sesebuah Institusi Pengajian Tinggi Islam (IPTI) dalam usaha... more Pelbagai cabaran perlu dihadapi oleh sesebuah Institusi Pengajian Tinggi Islam (IPTI) dalam usaha menjadi sebuah institusi yang menjadi rujukan, dihormati dan dikenali. Salah satu cabaran adalah cabaran menyampaikan maklumat yang penting dan kritikal kepada kumpulan sasar (bakal pelajar, bakal rakan penyelidik, ibubapa serta orang ramai). Penyampaian maklumat yang mudah serta tepat adalah sangat penting dalam mencerminkan keadaan, kebolehan (kebolehpercayaan) serta reputasi sesebuah institusi. Penggunaan teknologi terkini termasuk laman web boleh diaplikasikan dalam mencapai maksud tersebut agar penyebaran maklumat adalah lebih berkesan dan sampai kepada kumpulan sasar. Kertaskerja ini membincangkan elemen yang diperlukan dalam menyediakan laman web yang efektif dari segi penyediaan kandungan, antaramuka, interaktiviti, dan sambungan bagi tujuan menyampaikan maklumat tentang IPTI dengan berkesan. Selain itu isu-isu keselamatan laman web yang merupakan elemen penting dalam menjaga re...

Research paper thumbnail of E-Learning Tool: A Review on Trends in Automated Programming Codes Assessment

The students' assessment is done in order to gauge their progress in a learning process. The ... more The students' assessment is done in order to gauge their progress in a learning process. The ratio of one lecturer to a small number of students is considered a practical solution. However, the numbers of students are increasing, which could lead to a significant increase of workload for the lecturer. Teaching a programming course to a large number of students is a challenging. There are tradeoffs between giving a lot of assessments to the students to boost their understanding of the subject matter versus the amount of extra work for the lecturer to mark the assessments given. Since an assessment related to programming code merely deals with programming logic, it is desirable that an automated assessment tool is used to relieve the unnecessary load. Over the past few years, there are studies that offers solutions for automated marking of programming codes. Each solution has its own characteristics and mechanism. This study explores the trends in the e-learning tool (automated pr...

Research paper thumbnail of Development of Integrated Portal (IP) as an E-Tool for the Enhancement of Job Marketability

This paper analyses the need to develop an Integrated Portal (IP) to facilitate jobmarketability ... more This paper analyses the need to develop an Integrated Portal (IP) to facilitate jobmarketability and lists its components.The IP will be in form of a website which allows known stakeholders to make use of it. The stakeholders are identified in this paper and the features of the Integrated Portal are also briefly explained. It also goes further to explain the benefits and some basic requirements needed for the IP. The eportfolio is used as the main system while other small systems are linked to it.

Research paper thumbnail of An Efficient Framework to Build Up Malware Dataset

This research paper presents a framework on how to build up malware dataset. Many researchers too... more This research paper presents a framework on how to build up malware dataset. Many researchers took longer time to clean the dataset from any noise or to transform the dataset into a format that can be used straight away for testing. Therefore, this research is proposing a framework to help researchers to speed up the malware dataset cleaning processes which later can be used for testing. It is believed, an efficient malware dataset cleaning processes, can improved the quality of the data, thus help to improve the accuracy and the efficiency of the subsequent analysis. Apart from that, an in-depth understanding of the malware taxonomy is also important prior and during the dataset cleaning processes. A new Trojan classification has been proposed to complement this framework. This experiment has been conducted in a controlled lab environment and using the dataset from Vx Heavens dataset. This framework is built based on the integration of static and dynamic analyses, incident response method and knowledge database discovery (KDD) processes. This framework can be used as the basis guideline for malware researchers in building malware dataset.

Research paper thumbnail of File Integrity Monitor Scheduling Based on File Security Level Classification

Communications in Computer and Information Science, 2011

Integrity of operating system components must be carefully handled in order to optimize the syste... more Integrity of operating system components must be carefully handled in order to optimize the system security. Attackers always attempt to alter or modify these related components to achieve their goals. System files are common targets by the attackers. File integrity ...

Research paper thumbnail of Designing a New Model for Trojan Horse Detection Using Sequential Minimal Optimization

Lecture Notes in Electrical Engineering, 2014

Malwares attack such as by the worm, virus, trojan horse and botnet have caused lots of troubleso... more Malwares attack such as by the worm, virus, trojan horse and botnet have caused lots of troublesome for many organisations and users which lead to the cybercrime. Living in a cyber world, being infected by these malwares becoming more common. Nowadays the malwares attack especially by the trojan horse is becoming more sophisticated and intelligent, makes it is harder to be detected than before. Therefore, in this research paper, a new model called ETDMo (Efficient Trojan Detection Model) is built to detect trojan horse attacks more efficiently. In this model, the static, dynamic and automated analyses were conducted and the machine learning algorithms were applied to optimize the performance. Based on the experiment conducted, the Sequential Minimal Optimization (SMO) algorithm has outperformed other machine learning algorithms with 98.2% of true positive rate and with 1.7% of false positive rate.

Research paper thumbnail of Towards a Dynamic File Integrity Monitor through a Security Classification

File is a component of a computer system that has importance value of its own, either in terms of... more File is a component of a computer system that has importance value of its own, either in terms of availability, integrity, confidentiality and functionality to a system and application. If unintended changes happen on the related file, it may affect the security of related computer system. File integrity monitor (FIM) tools is widely used to minimize the file security risk. This paper proposed dynamic schedule for FIM. This paper presents a dynamic scheduling for FIM by combining on-line and off-line monitoring based on related files security requirement. Files are divided based on their security level group and integrity monitoring schedule is defined based on related groups. The initial testing result shows that our system is effective in on-line detection of file modification.

Research paper thumbnail of An Efficient Trojan Horse Classification (ETC)

For the past few years, malware or also known as malicious code is seen as one of the biggest thr... more For the past few years, malware or also known as malicious code is seen as one of the biggest threats of the cyber attacks. It has caused lot of damages, loss of money and productivity to many organizations and end users. Malicious code can be divided into many categories such as viruses, worms and trojan horses. Each of these categories has it owns implications and threats, and trojan horse has been chosen as the domain of this research paper. Prior to the formation of a new trojan horse detection model, an in-depth study and investigation of the existing trojan horse classification is presented in this paper. Surprisingly, not much research related with trojan horse has been done. On 16 th January 2013, Troj/Invo-Zip has caused chaos by masquerading as an invoice from Europcar and spreading via email. Therefore, in this research paper, a new trojan horse classification called Efficient Trojan Horse Classification (ETC) is developed. This ETC later is used as a basis to build a model to detect trojan horse efficiently. The methods used to develop the ETC are the static and dynamic analyses. As for the dynamic analysis, cuckoo sandbox has been integrated to speed up the analysis and reverse engineering processes.