Dr. Ahmed Manasrah | Yarmouk University (original) (raw)
Uploads
Papers by Dr. Ahmed Manasrah
International Journal of Information Security
Indian Journal of Science and Technology, 2015
2015 First International Conference on Anti-Cybercrime (ICACC), 2015
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of th... more Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion, but the IDS is triggering alerts for any suspicious activity which means thousand alerts that the analysts should take care of it. These Alerts has different severities and most of them don’t require big attention because of the huge number of the false alerts among them. Deleting the false alerts or reducing the amount of the alerts (false alerts or real alerts) from the entire amount alerts lead the researchers to create many methods such as the alert correlation which is this paper tries to investigate.
The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popu... more The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popularity of Real time SWitching (RSW) has increased due to its ability to easily combine voice and video services. Incidentally, these two heterogeneous clients pose considerable problems for users who have to choose between two solutions offering different advantages and disadvantages. While RSW is being used in many areas, IAX is being deployed in many VoIP products. Hence, RSW interoperability and coexistence with IAX is considered very important when maximizing the return on current investments and to support new deployments that could be RSW as an alternative packet telephony signaling protocol. We used IAX as opposed to SIP, which although started as a simple and an attractive method for VoIP, has become a complex and heavy protocol to implement. Similarly, H.323 is a very complex protocol suite that can result in the transmission of many unnecessary messages across the network.
Proceedings of the Annual International Conference on Advances in Distributed and Parallel Computing ADPC 2010 ADPC 2010, 2010
ABSTRACT
2010 10th IEEE International Conference on Computer and Information Technology, 2010
Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. ... more Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. Unfortunately, its applications are injecting a huge number of small packets in the network, which produces high overhead and therefore wastes network bandwidth. This paper proposed the use of a novel multiplexing technique, Delta-Multiplexing, to save the wasted bandwidth. In the Delta-Multiplexing technique, the VoIP packets destined to the same destination gateway are aggregated in a single UDP/IP header, therefore reducing the header overhead and saving network bandwidth. Moreover, the Delta-Multiplexing technique reduces the size of the packets payload by transmitting the difference between the consecutive packets payloads. Accordingly, the Delta-Multiplexing technique greatly saves bandwidth. We have simulated the Delta-Multiplexing technique using a 14-byte LPC codec. The result showed that Delta-Multiplexing is capable of saving between 68% and 72% as compared to conventional techniques (without multiplexing). Moreover, the Delta-Multiplexing technique reduces the number of VoIP packets running over the network, therefore reducing network traffic, overload, and congestion, thus improving the overall network performance.
TENCON 2009 - 2009 IEEE Region 10 Conference, 2009
... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Cent... more ... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Penang, Malaysia {sures ... the incoming E-mail messages are retrieved to the client's mailbox or the client makes a decision to read it and ...
2011 UkSim 13th International Conference on Computer Modelling and Simulation, 2011
... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Un... more ... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Universiti Sains Malaysia {anbar,ahmad@nav6.org} ... 11, pp. 10-18, 2009. [5] I. Farag, M. Shouman, T. Sobh, E. Forces, and H. El-Fiqi, "Intelligent System for Worm Detection." [6 ...
International Journal of Digital Content Technology and its Applications, 2010
Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In th... more Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In this paper the researchers have developed a LAN-based using client/server and Peer to peer architecture for transmitting and receiving multimedia. We have proposed Custom protocol to make the LAN clients of this application can use any sort of platform and provides many other useful utilities for heterogeneous system such as A/V Streaming and security issues. The second goal is to develop plug-in for proxy server to support our system because proxy users are unable to use such type of applications on the Internet. The experimental results show that the Live Audio and Video Coverage is p2p system and it is new revolution in the field of distributed world and it really tough work, to understand networking, network bandwidth, A/V encoding, A/V decoding, format setting and compression techniques. In addition, when the authors compared CUSTP with JMF RTP, the CUSTP almost equal JMF RTP in terms of jitter but is much better than JMF RTP in delay.
Computing Research Repository, 2010
Exact String Matching is an essential issue in many computer science applications. Unfortunately,... more Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform is to parallelize the
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010
Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer env... more Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer environments. These systems trigger thousands of alerts per day and become a headache issue to the analyst, because they need to analyze the severity of the alerts and other fields, such as the IP addresses. This paper Investigates the most popular aggregation methods, which deals with IDS alerts. In addition, we propose Threshold Aggregation Framework (TAF) to handle IDS alerts. TAF is based on time as a main component to aggregate the alerts while TAF support aggregating alerts without threshold by setting the threshold value to 0.
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology, 2009
Since the first intrusion detection system and up to this moment all IDSs had generated thousands... more Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the alerts or at least the false alerts of them. One of the ideas was to create correlation methods
International Journal of Information Security
Indian Journal of Science and Technology, 2015
2015 First International Conference on Anti-Cybercrime (ICACC), 2015
Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of th... more Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion, but the IDS is triggering alerts for any suspicious activity which means thousand alerts that the analysts should take care of it. These Alerts has different severities and most of them don’t require big attention because of the huge number of the false alerts among them. Deleting the false alerts or reducing the amount of the alerts (false alerts or real alerts) from the entire amount alerts lead the researchers to create many methods such as the alert correlation which is this paper tries to investigate.
The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popu... more The InterAsterisk eXchange (IAX) protocol has been available for a few years. Meanwhile, the popularity of Real time SWitching (RSW) has increased due to its ability to easily combine voice and video services. Incidentally, these two heterogeneous clients pose considerable problems for users who have to choose between two solutions offering different advantages and disadvantages. While RSW is being used in many areas, IAX is being deployed in many VoIP products. Hence, RSW interoperability and coexistence with IAX is considered very important when maximizing the return on current investments and to support new deployments that could be RSW as an alternative packet telephony signaling protocol. We used IAX as opposed to SIP, which although started as a simple and an attractive method for VoIP, has become a complex and heavy protocol to implement. Similarly, H.323 is a very complex protocol suite that can result in the transmission of many unnecessary messages across the network.
Proceedings of the Annual International Conference on Advances in Distributed and Parallel Computing ADPC 2010 ADPC 2010, 2010
ABSTRACT
2010 10th IEEE International Conference on Computer and Information Technology, 2010
Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. ... more Gradually, Voice over Internet Protocol (VoIP) has been dominating the telecommunications world. Unfortunately, its applications are injecting a huge number of small packets in the network, which produces high overhead and therefore wastes network bandwidth. This paper proposed the use of a novel multiplexing technique, Delta-Multiplexing, to save the wasted bandwidth. In the Delta-Multiplexing technique, the VoIP packets destined to the same destination gateway are aggregated in a single UDP/IP header, therefore reducing the header overhead and saving network bandwidth. Moreover, the Delta-Multiplexing technique reduces the size of the packets payload by transmitting the difference between the consecutive packets payloads. Accordingly, the Delta-Multiplexing technique greatly saves bandwidth. We have simulated the Delta-Multiplexing technique using a 14-byte LPC codec. The result showed that Delta-Multiplexing is capable of saving between 68% and 72% as compared to conventional techniques (without multiplexing). Moreover, the Delta-Multiplexing technique reduces the number of VoIP packets running over the network, therefore reducing network traffic, overload, and congestion, thus improving the overall network performance.
TENCON 2009 - 2009 IEEE Region 10 Conference, 2009
... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Cent... more ... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Penang, Malaysia {sures ... the incoming E-mail messages are retrieved to the client's mailbox or the client makes a decision to read it and ...
2011 UkSim 13th International Conference on Computer Modelling and Simulation, 2011
... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Un... more ... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Universiti Sains Malaysia {anbar,ahmad@nav6.org} ... 11, pp. 10-18, 2009. [5] I. Farag, M. Shouman, T. Sobh, E. Forces, and H. El-Fiqi, "Intelligent System for Worm Detection." [6 ...
International Journal of Digital Content Technology and its Applications, 2010
Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In th... more Tremendous amount of research work is underway on peer to peer Systems and Video Streaming. In this paper the researchers have developed a LAN-based using client/server and Peer to peer architecture for transmitting and receiving multimedia. We have proposed Custom protocol to make the LAN clients of this application can use any sort of platform and provides many other useful utilities for heterogeneous system such as A/V Streaming and security issues. The second goal is to develop plug-in for proxy server to support our system because proxy users are unable to use such type of applications on the Internet. The experimental results show that the Live Audio and Video Coverage is p2p system and it is new revolution in the field of distributed world and it really tough work, to understand networking, network bandwidth, A/V encoding, A/V decoding, format setting and compression techniques. In addition, when the authors compared CUSTP with JMF RTP, the CUSTP almost equal JMF RTP in terms of jitter but is much better than JMF RTP in delay.
Computing Research Repository, 2010
Exact String Matching is an essential issue in many computer science applications. Unfortunately,... more Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform is to parallelize the
2010 Fourth International Conference on Emerging Security Information, Systems and Technologies, 2010
Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer env... more Intrusion Detection Systems (IDS) are one of the powerful systems used to secure the computer environments. These systems trigger thousands of alerts per day and become a headache issue to the analyst, because they need to analyze the severity of the alerts and other fields, such as the IP addresses. This paper Investigates the most popular aggregation methods, which deals with IDS alerts. In addition, we propose Threshold Aggregation Framework (TAF) to handle IDS alerts. TAF is based on time as a main component to aggregate the alerts while TAF support aggregating alerts without threshold by setting the threshold value to 0.
2009 2nd IEEE International Conference on Broadband Network & Multimedia Technology, 2009
Since the first intrusion detection system and up to this moment all IDSs had generated thousands... more Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the alerts or at least the false alerts of them. One of the ideas was to create correlation methods