Skip to main content
—Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud... more
—Nowadays, the organizations are emphasizing on the security and resilient aspect of the cloud computing to protect the privacy and confidentiality of their data information. However, the hypervisor attack remains a hot issue by the cloud user even though enormous research have accomplished to inhibit the vulnerabilities in the virtualized cloud environment.Therefore, we have proposed the Virtual Machines and Hypervisor Intrusion Detection System, VMHIDS as our technique in detecting and preventing the hypervisor attacks in the virtualized cloud environment. The VMHIDS has adopted several features from the other techniques by inspecting the tasks frequently which then prevent suspicious event occur. Through the VMHIDS, the hypervisor attack is mitigated.
Research Interests:
The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time... more
The web application has become a primary target for cyber criminals by injecting malware especially JavaScript to perform malicious activities for impersonation. Thus, it becomes an imperative to detect such malicious code in real time before any malicious activity is performed. This study proposes an efficient method of detecting previously unknown malicious java scripts using an interceptor at the client side by classifying the key features of the malicious code. Feature subset was obtained by using wrapper method for dimensionality reduction. Supervised machine learning classifiers were used on the dataset for achieving high accuracy. Experimental results show that our method can efficiently classify malicious code from benign code with promising results.
Research Interests:
... 2] M.Mosko and JJ Garcia-Luna-Aceves, “Multipath Routing in Wireless Mesh Networks” [3] H. Rangarajan and J. Garcia-Luna-Aceves, “Using ... IEEE, Vol.2, Iss., 2000, pp:1034-1037 vol.2 [22] J.Abdullah and DJParish, “Impact of QoS... more
... 2] M.Mosko and JJ Garcia-Luna-Aceves, “Multipath Routing in Wireless Mesh Networks” [3] H. Rangarajan and J. Garcia-Luna-Aceves, “Using ... IEEE, Vol.2, Iss., 2000, pp:1034-1037 vol.2 [22] J.Abdullah and DJParish, “Impact of QoS Routing Metrics for MANETs in the Pervasive ...
The design of QoS routing protocols for mobile ad hoc networks is a challenging issue. In selecting the most optimal route from source to destination, one has to choose from a set of routes with the corresponding connectivity qualities.... more
The design of QoS routing protocols for mobile ad hoc networks is a challenging issue. In selecting the most optimal route from source to destination, one has to choose from a set of routes with the corresponding connectivity qualities. In this paper, we proposed a modeling scheme that implement QoS routing using genetic algorithm. The route selected had to satisfy
Research Interests:
Abstract The design of QoS routing protocol for mobile ad hoc networks is a challenging issue. In selecting the most optimal route from source to destination, one has to choose from a set of routes with the corresponding connectivity... more
Abstract The design of QoS routing protocol for mobile ad hoc networks is a challenging issue. In selecting the most optimal route from source to destination, one has to choose from a set of routes with the corresponding connectivity qualities. This paper describes the QoS ...
... of Three MANET Routing Protocols N. Adam Department of Science Physics, Faculty of Science and Technology, University of Malaysia Terengganu, 21030 K. Terengganu, Terengganu.nabilah@umt.edu.my MY Ismail Dept. of Communications Eng.,... more
... of Three MANET Routing Protocols N. Adam Department of Science Physics, Faculty of Science and Technology, University of Malaysia Terengganu, 21030 K. Terengganu, Terengganu.nabilah@umt.edu.my MY Ismail Dept. of Communications Eng., Fac. ...
The problem of QoS routing for MANET posses several challenges that must be addressed within the pervasive computing environment. QoS routing has the association of two main components, one related to the metrics acquisition and... more
The problem of QoS routing for MANET posses several challenges that must be addressed within the pervasive computing environment. QoS routing has the association of two main components, one related to the metrics acquisition and distribution and the other related to the QoS route selection mechanism. The challenges inherent to these components are presented. QoS routing can impact the performance of MANET in the pervasive computing environment, by selecting the most optimal route from source to destination. Its dynamic nature inferred that the metrics which indicate the quality of the node connectivity and bandwidth must be taken into account. A method of bandwidth and node connectivity index calculation is shown.
... In: Proceedings of the Joint Conference on Informatics and Research on Women in ICT (RWICT) 2004 , 28 - 30 July 2004 , Putra World Trade Center ... [4] Woit, D. ; Mason, D., “Effectiveness of Online Assessment”, Proceedings of SIGSCE... more
... In: Proceedings of the Joint Conference on Informatics and Research on Women in ICT (RWICT) 2004 , 28 - 30 July 2004 , Putra World Trade Center ... [4] Woit, D. ; Mason, D., “Effectiveness of Online Assessment”, Proceedings of SIGSCE '03 (Feb 19-23, 2003, Reno, NV), ACM. ...
... General Terms Algorithms, Measurement, Performance, Design, Experimentation Keywords MANET, QoS Routing, node connectivity index, Genetic Algorithm, Performance Evaluations, Mobility Models, Contraction and Expansion Models ...
Research Interests: