Skip to main content

    Dr. Ahmed Manasrah

    Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion, but the IDS is triggering alerts for... more
    Intrusion Detection System (IDS) is the most powerful system that can handle the intrusions of the computer environments by triggering alerts to make the analysts take actions to stop this intrusion, but the IDS is triggering alerts for any suspicious activity which means thousand alerts that the analysts should take care of it. These Alerts has different severities and most of them don’t require big attention because of the huge number of the false alerts among them. Deleting the false alerts or reducing the amount of the alerts (false alerts or real alerts) from the entire amount alerts lead the researchers to create many methods such as the alert correlation which is this paper tries to investigate.
    ABSTRACT
    ABSTRACT
    ... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Penang, Malaysia {sures ... the incoming E-mail messages are retrieved to the client's mailbox or... more
    ... R. Sureswaran, Hussein Al Bazar, O. Abouabdalla, Ahmed M.Manasrah National Advanced IPv6 Centre (NAv6) Universiti Sains Malaysia Penang, Malaysia {sures ... the incoming E-mail messages are retrieved to the client's mailbox or the client makes a decision to read it and ...
    ... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Universiti Sains Malaysia {anbar,ahmad@nav6.org} ... 11, pp. 10-18, 2009. [5] I. Farag, M. Shouman, T. Sobh, E. Forces, and H. El-Fiqi,... more
    ... Network Mohammed Anbar , Ahmed manasrah National Advanced IPv6 Centre of Excellence (NAV6) Universiti Sains Malaysia {anbar,ahmad@nav6.org} ... 11, pp. 10-18, 2009. [5] I. Farag, M. Shouman, T. Sobh, E. Forces, and H. El-Fiqi, "Intelligent System for Worm Detection." [6 ...
    Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper... more
    Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform is to parallelize the
    Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the... more
    Since the first intrusion detection system and up to this moment all IDSs had generated thousands and thousands of alerts and most of these alerts are false alerts, which lead the researchers to develop an idea to reduce the rate of the alerts or at least the false alerts of them. One of the ideas was to create correlation methods
    Abstract The purpose of Grid monitoring and management is to monitor services in Grid environment for fault detection, performance analysis, performance tuning, load balancing and scheduling. This paper emphasis on presenting a new... more
    Abstract The purpose of Grid monitoring and management is to monitor services in Grid environment for fault detection, performance analysis, performance tuning, load balancing and scheduling. This paper emphasis on presenting a new framework namely iNet-Grid ...
    DOAJ Directory of Open Access Journals, SPARC Europe Award 2009 English. Free, full text, quality controlled scientific and scholarly journals, covering all subjects and many languages. ...
    DOAJ Directory of Open Access Journals, SPARC Europe Award 2009 English. Free, full text, quality controlled scientific and scholarly journals, covering all subjects and many languages. ...
    Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to... more
    Cloud computing depends on sharing distributed computing resources to handle different services such as servers, storage and applications. The applications and infrastructures are provided as pay per use services through data center to the end user. The data centers are located at different geographic locations. However, these data centers can get overloaded with the increase number of client applications being serviced at the same time and location; this will degrade the overall QoS of the distributed services. Since different user applications may require different configuration and requirements, measuring the user applications performance of various resources is challenging. The service provider cannot make decisions for the right level of resources. Therefore, we propose a Variable Service Broker Routing Policy – VSBRP, which is a heuristic-based technique that aims to achieve minimum response time through considering the communication channel bandwidth, latency and the size of the job. The proposed service broker policy will also reduce the overloading of the data centers by redirecting the user requests to the next data center that yields better response and processing time. The simulation shows promising results in terms of response and processing time compared to other known broker policies from the literature.
    Research Interests:
    Botnet is a thorny and a grave problem of today’s Internet, resulting in economic damage for organizations and individuals. Botnet is a group of compromised hosts running malicious software program for malicious purposes, known as bots.... more
    Botnet is a thorny and a grave problem of
    today’s Internet, resulting in economic damage for organizations
    and individuals. Botnet is a group of compromised
    hosts running malicious software program for
    malicious purposes, known as bots. It is also worth mentioning
    that the current trend of botnets is to hide their
    identities (i.e., the command and control server) using the
    DNS services to hinder their identification process. Fortunately,
    different approaches have been proposed and
    developed to tackle the problem of botnets; however, the
    problem still rises and emerges causing serious threat to the
    cyberspace-based businesses and individuals. Therefore,
    this paper comes up to explore the various botnet detection
    techniques through providing a survey to observe the current
    state of the art in the field of botnet detection techniques
    based on DNS traffic analysis. To the best of our
    knowledge, this is the first survey to discuss DNS-based
    botnet detection techniques in which the problems, existing
    solutions and the future research direction in the field of
    botnet detection based on DNS traffic analysis for effective
    botnet detection mechanisms in the future are explored and
    clarified.
    Research Interests: