Skip to main content
ammar almomani

    ammar almomani

    Generally, malware has come to be known as one of the biggest threats, so malware is a program which operates malicious actions and steals information, to specifically identify it as software which is designed specifically to through... more
    Generally, malware has come to be known as one of the biggest threats, so malware is a program which operates malicious actions and steals information, to specifically identify it as software which is designed specifically to through breaking the system of a computer without consent from the owner. This chapter aimed to study feature selection and malware classification using machine learning. The identification of such features was done through the intuition that various parts of the PE files’ features can correlate with one another less than with the class files, being clean or dirty. Such features are implemented as algorithms in machine learning to help classify the malware, resulting in such classification to be properly implemented in antivirus programs to help enhance the rate of detection.
    This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify... more
    This article describes how as network traffic grows, attacks on traffic become more complicated and harder to detect. Recently, researchers have begun to explore machine learning techniques with cloud computing technologies to classify network threats. So, new and creative ways are needed to enhance intrusion detection system. This article addresses the source of the above issues through detecting an intrusion in cloud computing before it further disrupts normal network operations, because the complexity of malicious attack techniques have evolved from traditional malicious attack technologies (direct malicious attack), which include different malicious attack classes, such as DoS, Probe, R2L, and U2R malicious attacks, especially the zero-day attack in online mode. The proposed online intrusion detection cloud system (OIDCS) adopts the principles of the new spiking neural network architecture called NeuCube algorithm. It is proposed that this system is the first filtering system ap...
    Information management collects data from several online systems. They analyze the information. They issue reports about information for supporting decision-making management. Utilizing current modern innovations try to controlling many... more
    Information management collects data from several online systems. They analyze the information. They issue reports about information for supporting decision-making management. Utilizing current modern innovations try to controlling many obstacles such as, high cost, high battery power, and speed system, safety System without building a full system to solve all these problems together, we created a new internet of things ( IoT) system that provides attention to safety, and Security with low cost, low battery power, and high-speed System. As for the information management system. This paper aims at developing an active system for managing most of the smart farm and home obstacles, such issues to deal with the security system for the farm's and house and animal hanger, raining, irrigation and watering system, food supplement system, Also, a network was established to connect all those systems. Connected database storage was used, infra-red, The system is used for monitoring. They s...
    Medical image information can be exchanged remotely through cloud-based medical imaging services. Digital Imaging and Communication in Medicine (DICOM) is considered to be the most commonly used medical image format among hospitals. The... more
    Medical image information can be exchanged remotely through cloud-based medical imaging services. Digital Imaging and Communication in Medicine (DICOM) is considered to be the most commonly used medical image format among hospitals. The objective of this article is to enhance the secure transfer and storage of medical images on the cloud by using hybrid encryption algorithms, which are a combination of symmetric encryption algorithms and asymmetric encryption algorithms that make the encryption process faster and more secure. To this end, three different algorithms are chosen to build the framework. These algorithms are simple and suitable for hardware or software implementation because they require low memory and low computational power yet provide high security. Also, security was increased by using a digital signature technique. The results of the analyses showed that for a DICOM file with size 12.5 Mb, 2.957 minutes was required to complete the process. This was totaled from the...
    This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated... more
    This paper proposed ICMPv6 Flood Attack Detection using DENFIS algorithms to detect denial of service (DoS) attacks in IPv6 networks. We developed C# application to send the ICMPv6 flood attack packets the flooding packets were generated using different attack rates starting from 1000 Pings to 1500 Pings, and the normal traffic packets were generated using different ping rates starting from 10 Pings to 15 Pings, for each ICMPv6 Packet, RTT was calculated. The dataset consists of 2000 recorded, which divided into two sets: 80% for training and 20% for testing, the proposed proved that we can detect ICMPv6 Flood Attack with low root mean square error which about 0.26.
    Research Interests:
    Botnet is a thorny and a grave problem of today’s Internet, resulting in economic damage for organizations and individuals. Botnet is a group of compromised hosts running malicious software program for malicious purposes, known as bots.... more
    Botnet is a thorny and a grave problem of today’s Internet, resulting in economic damage for organizations and individuals. Botnet is a group of compromised hosts running malicious software program for malicious purposes, known as bots. It is also worth mentioning that the current trend of botnets is to hide their identities (i.e., the command and control server) using the DNS services to hinder their identification process. Fortunately, different approaches have been proposed and developed to tackle the problem of botnets; however, the problem still rises and emerges causing serious threat to the cyberspace-based businesses and individuals. Therefore, this paper comes up to explore the various botnet detection techniques through providing a survey to observe the current state of the art in the field of botnet detection techniques based on DNS traffic analysis. To the best of our knowledge, this is the first survey to discuss DNS-based botnet detection techniques in which the problems, existing solutions and the future research direction in the field of botnet detection based on DNS traffic analysis for effective botnet detection mechanisms in the future are explored and clarified.
    Research Interests:
    Research Interests:
    ABSTRACT
    ABSTRACT The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and... more
    ABSTRACT The art and science of using digital images for secret communication is known as image steganography. This paper presents a background on key concepts behind it. A representation of steganography area is graphically and mathematically shown. The origin and history of this area, its important properties, and major applications are outlined. An introduction to steganalysis is provided. Distinctions between steganography, cryptography, and watermarking in terms of technique and intent are briefly discussed. Details of the way images are represented are outlined. Benefits and drawbacks of steganography domains are highlighted. Common approaches used for embedding messages into images are discussed in some detail. Methods used for embedding messages into images are also explored. Current steganography tools are highlighted. A demonstration of how secret information is embedded into an image through the use of available steganographic tools is shown. Comparisons between different image steganography algorithms are also provided.
    Abstract: Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords,... more
    Abstract: Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and updating account information or fill billing information.
    Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to... more
    Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to the end user. The data centers are located at different geographic locations. However, these data centers can get overloaded with the increase number of client applications being serviced at the same time and location; this will degrade the overall QoS of the distributed services. Since different user applications may require different configuration and requirements, measuring the user applications performance of various resources is challenging. The service provider cannot make decisions for the right level of resources. Therefore, we propose a Variable Service Broker Routing Policy – VSBRP, which is a heuristic-based technique that aims to achieve minimum response time through considering the communication channel bandwidth, latency and the size of the job. The proposed service broker policy will also reduce the overloading of the data centers by redirecting the user requests to the next data center that yields better response and processing time. The simulation shows promising results in terms of response and processing time compared to other known broker policies from the literature.
    Research Interests: