Dr. Ahmed Manasrah | Yarmouk University (original) (raw)

Uploads

Papers by Dr. Ahmed Manasrah

Research paper thumbnail of Key pre-distribution approach using block LU decomposition in wireless sensor network

International Journal of Information Security

Research paper thumbnail of A privacy-preserving multi-keyword search approach in cloud computing

Research paper thumbnail of Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies

Research paper thumbnail of Real Time Distributed Network Monitoring and Security Monitoring Platform (RTD-NMS)

Research paper thumbnail of Battling the threat of the Internet

Research paper thumbnail of BADUW: Behavioural based Approach for Detecting UDP Worm

Indian Journal of Science and Technology, 2015

Research paper thumbnail of A real time distributed network monitoring and security monitoring platform (rtdnms)

Research paper thumbnail of Toward improving university students awareness of spam email and cybercrime: Case study of Jordan

2015 First International Conference on Anti-Cybercrime (ICACC), 2015

Research paper thumbnail of False Positive Reduction by Correlating the Intrusion Detection System Alerts: investigation Study

Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of th... more Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion, but the IDS is triggering alerts for any suspicious activity which means thousand alerts that the analysts should take care of it. These Alerts has different severities and most of them don’t require big attention because of the huge number of the false alerts among them. Deleting the false alerts or reducing the amount of the alerts (false alerts or real alerts) from the entire amount alerts lead the researchers to create many methods such as the alert correlation which is this paper tries to investigate.

Research paper thumbnail of Correlating IDS Alerts to Reduce the False Positive Problem

Research paper thumbnail of A NEW DYNAMIC-AUTO-STATIC TECHNIQUE FOR DHCPv4 IP ADDRESS ALLOCATION

Research paper thumbnail of Conference gateway for heterogeneous clients: Real time switching clients and interasterisk exchange clients

The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popu... more The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popularity of Real time SWitching (RSW) has increased due to its ability to easily combine voice and video services. Incidentally, these two heterogeneous clients pose considerable problems for users who have to choose between two solutions offering different advantages and disadvantages. While RSW is being used in many areas, IAX is being deployed in many VoIP products. Hence, RSW interoperability and coexistence with IAX is considered very important when maximizing the return on current investments and to support new deployments that could be RSW as an alternative packet telephony signaling protocol. We used IAX as opposed to SIP, which although started as a simple and an attractive method for VoIP, has become a complex and heavy protocol to implement. Similarly, H.323 is a very complex protocol suite that can result in the transmission of many unnecessary messages across the network.

Research paper thumbnail of On Fuzziness in Hybrid Network Device Discovery

Proceedings of the Annual International Conference on Advances in Distributed and Parallel Computing ADPC 2010 ADPC 2010, 2010

ABSTRACT

Research paper thumbnail of Delta-Multiplexing: A Novel Technique to Improve VoIP Bandwidth Utilization between VoIP Gateways

2010 10th IEEE International Conference on Computer and Information Technology, 2010

Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. ... more Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. Unfortunately, its applications are injecting a huge number of small packets in the network, which produces high overhead and therefore wastes network bandwidth. This paper proposed the use of a novel multiplexing technique, Delta-Multiplexing, to save the wasted bandwidth. In the Delta-Multiplexing technique, the VoIP packets destined to the same destination gateway are aggregated in a single UDP/IP header, therefore reducing the header overhead and saving network bandwidth. Moreover, the Delta-Multiplexing technique reduces the size of the packets payload by transmitting the difference between the consecutive packets payloads. Accordingly, the Delta-Multiplexing technique greatly saves bandwidth. We have simulated the Delta-Multiplexing technique using a 14-byte LPC codec. The result showed that Delta-Multiplexing is capable of saving between 68% and 72% as compared to conventional techniques (without multiplexing). Moreover, the Delta-Multiplexing technique reduces the number of VoIP packets running over the network, therefore reducing network traffic, overload, and congestion, thus improving the overall network performance.

Research paper thumbnail of Active E-mail system protocols monitoring algorithm

TENCON 2009 - 2009 IEEE Region 10 Conference, 2009

... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Cent... more ... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Penang, Malaysia {sures ... the incoming E-mail messages are retrieved to the client's mailbox or the client makes a decision to read it and ...

Research paper thumbnail of An Investigation Towards Worms Detection Approaches over Network

2011 UkSim 13th International Conference on Computer Modelling and Simulation, 2011

... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Un... more ... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Universiti Sains Malaysia {anbar,ahmad@nav6.org} ... 11, pp. 10-18, 2009. [5] I. Farag, M. Shouman, T. Sobh, E. Forces, and H. El-Fiqi, "Intelligent System for Worm Detection." [6 ...

Research paper thumbnail of CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks

International Journal of Digital Content Technology and its Applications, 2010

Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In th... more Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In this paper the researchers have developed a LAN-based using client/server and Peer to peer architecture for transmitting and receiving multimedia. We have proposed Custom protocol to make the LAN clients of this application can use any sort of platform and provides many other useful utilities for heterogeneous system such as A/V Streaming and security issues. The second goal is to develop plug-in for proxy server to support our system because proxy users are unable to use such type of applications on the Internet. The experimental results show that the Live Audio and Video Coverage is p2p system and it is new revolution in the field of distributed world and it really tough work, to understand networking, network bandwidth, A/V encoding, A/V decoding, format setting and compression techniques. In addition, when the authors compared CUSTP with JMF RTP, the CUSTP almost equal JMF RTP in terms of jitter but is much better than JMF RTP in delay.

Research paper thumbnail of An innovative platform to improve the performance of exact string matching algorithms

Computing Research Repository, 2010

Exact String Matching is an essential issue in many computer science applications. Unfortunately,... more Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform is to parallelize the

Research paper thumbnail of Forthcoming Aggregating Intrusion Detection System Alerts Framework

2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010

Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer env... more Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer environments. These systems trigger thousands of alerts per day and become a headache issue to the analyst, because they need to analyze the severity of the alerts and other fields, such as the IP addresses. This paper Investigates the most popular aggregation methods, which deals with IDS alerts. In addition, we propose Threshold Aggregation Framework (TAF) to handle IDS alerts. TAF is based on time as a main component to aggregate the alerts while TAF support aggregating alerts without threshold by setting the threshold value to 0.

Research paper thumbnail of False positive reduction in intrusion detection system: A survey

2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology, 2009

Since the first intrusion detection system and up to this moment all IDSs had generated thousands... more Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the alerts or at least the false alerts of them. One of the ideas was to create correlation methods

Research paper thumbnail of Key pre-distribution approach using block LU decomposition in wireless sensor network

International Journal of Information Security

Research paper thumbnail of A privacy-preserving multi-keyword search approach in cloud computing

Research paper thumbnail of Bank Web Sites Phishing Detection and Notification System Based on Semantic Web technologies

Research paper thumbnail of Real Time Distributed Network Monitoring and Security Monitoring Platform (RTD-NMS)

Research paper thumbnail of Battling the threat of the Internet

Research paper thumbnail of BADUW: Behavioural based Approach for Detecting UDP Worm

Indian Journal of Science and Technology, 2015

Research paper thumbnail of A real time distributed network monitoring and security monitoring platform (rtdnms)

Research paper thumbnail of Toward improving university students awareness of spam email and cybercrime: Case study of Jordan

2015 First International Conference on Anti-Cybercrime (ICACC), 2015

Research paper thumbnail of False Positive Reduction by Correlating the Intrusion Detection System Alerts: investigation Study

Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of th... more Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion, but the IDS is triggering alerts for any suspicious activity which means thousand alerts that the analysts should take care of it. These Alerts has different severities and most of them don’t require big attention because of the huge number of the false alerts among them. Deleting the false alerts or reducing the amount of the alerts (false alerts or real alerts) from the entire amount alerts lead the researchers to create many methods such as the alert correlation which is this paper tries to investigate.

Research paper thumbnail of Correlating IDS Alerts to Reduce the False Positive Problem

Research paper thumbnail of A NEW DYNAMIC-AUTO-STATIC TECHNIQUE FOR DHCPv4 IP ADDRESS ALLOCATION

Research paper thumbnail of Conference gateway for heterogeneous clients: Real time switching clients and interasterisk exchange clients

The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popu... more The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popularity of Real time SWitching (RSW) has increased due to its ability to easily combine voice and video services. Incidentally, these two heterogeneous clients pose considerable problems for users who have to choose between two solutions offering different advantages and disadvantages. While RSW is being used in many areas, IAX is being deployed in many VoIP products. Hence, RSW interoperability and coexistence with IAX is considered very important when maximizing the return on current investments and to support new deployments that could be RSW as an alternative packet telephony signaling protocol. We used IAX as opposed to SIP, which although started as a simple and an attractive method for VoIP, has become a complex and heavy protocol to implement. Similarly, H.323 is a very complex protocol suite that can result in the transmission of many unnecessary messages across the network.

Research paper thumbnail of On Fuzziness in Hybrid Network Device Discovery

Proceedings of the Annual International Conference on Advances in Distributed and Parallel Computing ADPC 2010 ADPC 2010, 2010

ABSTRACT

Research paper thumbnail of Delta-Multiplexing: A Novel Technique to Improve VoIP Bandwidth Utilization between VoIP Gateways

2010 10th IEEE International Conference on Computer and Information Technology, 2010

Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. ... more Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. Unfortunately, its applications are injecting a huge number of small packets in the network, which produces high overhead and therefore wastes network bandwidth. This paper proposed the use of a novel multiplexing technique, Delta-Multiplexing, to save the wasted bandwidth. In the Delta-Multiplexing technique, the VoIP packets destined to the same destination gateway are aggregated in a single UDP/IP header, therefore reducing the header overhead and saving network bandwidth. Moreover, the Delta-Multiplexing technique reduces the size of the packets payload by transmitting the difference between the consecutive packets payloads. Accordingly, the Delta-Multiplexing technique greatly saves bandwidth. We have simulated the Delta-Multiplexing technique using a 14-byte LPC codec. The result showed that Delta-Multiplexing is capable of saving between 68% and 72% as compared to conventional techniques (without multiplexing). Moreover, the Delta-Multiplexing technique reduces the number of VoIP packets running over the network, therefore reducing network traffic, overload, and congestion, thus improving the overall network performance.

Research paper thumbnail of Active E-mail system protocols monitoring algorithm

TENCON 2009 - 2009 IEEE Region 10 Conference, 2009

... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Cent... more ... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Penang, Malaysia {sures ... the incoming E-mail messages are retrieved to the client's mailbox or the client makes a decision to read it and ...

Research paper thumbnail of An Investigation Towards Worms Detection Approaches over Network

2011 UkSim 13th International Conference on Computer Modelling and Simulation, 2011

... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Un... more ... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Universiti Sains Malaysia {anbar,ahmad@nav6.org} ... 11, pp. 10-18, 2009. [5] I. Farag, M. Shouman, T. Sobh, E. Forces, and H. El-Fiqi, "Intelligent System for Worm Detection." [6 ...

Research paper thumbnail of CUSTP: Custom Protocol for Audio and Video Conferencing System over P2P Networks

International Journal of Digital Content Technology and its Applications, 2010

Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In th... more Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In this paper the researchers have developed a LAN-based using client/server and Peer to peer architecture for transmitting and receiving multimedia. We have proposed Custom protocol to make the LAN clients of this application can use any sort of platform and provides many other useful utilities for heterogeneous system such as A/V Streaming and security issues. The second goal is to develop plug-in for proxy server to support our system because proxy users are unable to use such type of applications on the Internet. The experimental results show that the Live Audio and Video Coverage is p2p system and it is new revolution in the field of distributed world and it really tough work, to understand networking, network bandwidth, A/V encoding, A/V decoding, format setting and compression techniques. In addition, when the authors compared CUSTP with JMF RTP, the CUSTP almost equal JMF RTP in terms of jitter but is much better than JMF RTP in delay.

Research paper thumbnail of An innovative platform to improve the performance of exact string matching algorithms

Computing Research Repository, 2010

Exact String Matching is an essential issue in many computer science applications. Unfortunately,... more Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform is to parallelize the

Research paper thumbnail of Forthcoming Aggregating Intrusion Detection System Alerts Framework

2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010

Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer env... more Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer environments. These systems trigger thousands of alerts per day and become a headache issue to the analyst, because they need to analyze the severity of the alerts and other fields, such as the IP addresses. This paper Investigates the most popular aggregation methods, which deals with IDS alerts. In addition, we propose Threshold Aggregation Framework (TAF) to handle IDS alerts. TAF is based on time as a main component to aggregate the alerts while TAF support aggregating alerts without threshold by setting the threshold value to 0.

Research paper thumbnail of False positive reduction in intrusion detection system: A survey

2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology, 2009

Since the first intrusion detection system and up to this moment all IDSs had generated thousands... more Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the alerts or at least the false alerts of them. One of the ideas was to create correlation methods