Skip to main content

Showing 1–16 of 16 results for author: Alkasassbeh, M

.
  1. arXiv:2203.04347  [pdf

    cs.CR cs.NI

    An accurate IoT Intrusion Detection Framework using Apache Spark

    Authors: Mohamed Abushwereb, Mouhammd Alkasassbeh, Mohammad Almseidin, Muhannad Mustafa

    Abstract: The internet has caused tremendous changes since its appearance in the 1980s, and now, the Internet of Things (IoT) seems to be doing the same. The potential of IoT has made it the center of attention for many people, but, where some see an opportunity to contribute, others may see IoT networks as a target to be exploited. The high number of IoT devices makes them the perfect setup for staging den… ▽ More

    Submitted 21 February, 2022; originally announced March 2022.

    Comments: 15 pages

  2. arXiv:2107.12299  [pdf

    cs.CR cs.NI

    Anomaly-based Intrusion Detection System Using Fuzzy Logic

    Authors: Mohammad Almseidin, Jamil Al-Sawwa, Mouhammd Alkasassbeh

    Abstract: Recently, the Distributed Denial of Service (DDOS) attacks has been used for different aspects to denial the number of services for the end-users. Therefore, there is an urgent need to design an effective detection method against this type of attack. A fuzzy inference system offers the results in a more readable and understandable form. This paper introduces an anomaly-based Intrusion Detection (I… ▽ More

    Submitted 22 June, 2021; originally announced July 2021.

  3. arXiv:2106.12545  [pdf

    eess.IV cs.CV cs.LG

    Diabetic Retinopathy Detection using Ensemble Machine Learning

    Authors: Israa Odeh, Mouhammd Alkasassbeh, Mohammad Alauthman

    Abstract: Diabetic Retinopathy (DR) is among the worlds leading vision loss causes in diabetic patients. DR is a microvascular disease that affects the eye retina, which causes vessel blockage and therefore cuts the main source of nutrition for the retina tissues. Treatment for this visual disorder is most effective when it is detected in its earliest stages, as severe DR can result in irreversible blindnes… ▽ More

    Submitted 22 June, 2021; originally announced June 2021.

  4. arXiv:2010.13852  [pdf

    cs.NI

    A State-of-the-Art Review on IoT botnet Attack Detection

    Authors: Zainab Al-Othman, Mouhammd Alkasassbeh, Sherenaz AL-Haj Baddar

    Abstract: The Internet as we know it Today, comprises several fundamental interrelated networks, among which is the Internet of Things (IoT). Despite their versatility, several IoT devices are vulnerable from a security perspective, which renders them as a favorable target for multiple security breaches, especially botnet attacks. In this study, the conceptual frameworks of IoT botnet attacks will be explor… ▽ More

    Submitted 2 October, 2020; originally announced October 2020.

    Comments: NA

  5. arXiv:2002.07223  [pdf

    cs.NI cs.CR

    Intelligent Methods for Accurately Detecting Phishing Websites

    Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin

    Abstract: With increasing technology developments, there is a massive number of websites with varying purposes. But a particular type exists within this large collection, the so-called phishing sites which aim to deceive their users. The main challenge in detecting phishing websites is discovering the techniques that have been used. Where phishers are continually improving their strategies and creating web… ▽ More

    Submitted 19 January, 2020; originally announced February 2020.

  6. arXiv:1909.02547  [pdf

    cs.NI

    Collecting MIB Data from Network Managed by SNMP using Multi Mobile Agents

    Authors: Nisreen Madi, Mouhammd Alkasassbeh

    Abstract: Network anomalies are destructive to networks. Intrusion detection systems monitor network component behavior to detect unusual activity (i.e., possible threats). Application-layer Simple Network Management Protocol (SNMP) has been used for decades via TCP/IP protocol to manage network devices. Raw data security evaluation in intrusion detection incurs latency in detection. Management Information… ▽ More

    Submitted 18 July, 2019; originally announced September 2019.

  7. arXiv:1906.00865  [pdf

    cs.NI cs.CR

    Network Attacks Anomaly Detection Using SNMP MIB Interface Parameters

    Authors: Ghazi Al-Naymatm, Ahmed Hambouz, Mouhammd Alkasassbeh

    Abstract: Many approaches have evolved to enhance network attacks detection anomaly using SNMP-MIBs. Most of these approaches focus on machine learning algorithms with a lot of SNMP-MIB database parameters, which may consume most of hardware resources (CPU, memory, and bandwidth). In this paper we introduce an efficient detection model to detect network attacks anomaly using Lazy.IBk as a machine learning c… ▽ More

    Submitted 19 October, 2019; v1 submitted 14 May, 2019; originally announced June 2019.

  8. arXiv:1906.00863  [pdf

    cs.NI

    Detecting network anomalies using machine learning and SNMP-MIB dataset with IP group

    Authors: Abdelrahman Manna, Mouhammd Alkasassbeh

    Abstract: SNMP-MIB is a widely used approach that uses machine learning to classify data and obtain results, but using SNMP-MIB huge dataset is not efficient and it is also time and resources consuming. In this paper, a REP Tree, J48(Decision Tree) and Random Forest classifiers were used to train a model that can detect the anomalies and predict the network attacks that my affect the Internet Protocol(IP) g… ▽ More

    Submitted 14 May, 2019; originally announced June 2019.

  9. arXiv:1811.08954  [pdf

    cs.NI cs.CR

    Fuzzy Rule Interpolation and SNMP-MIB for Emerging Network Abnormality

    Authors: Mohammad Almseidin, Mouhammd Alkasassbeh, Szilveszter Kovacs

    Abstract: It is difficult to implement an efficient detection approach for Intrusion Detection Systems (IDS) and many factors contribute to this challenge. One such challenge concerns establishing adequate boundaries and finding a proper data source. Typical IDS detection approaches deal with raw traffics. These traffics need to be studied in depth and thoroughly investigated in order to extract the require… ▽ More

    Submitted 21 November, 2018; originally announced November 2018.

    Comments: 10

  10. arXiv:1810.07252  [pdf

    cs.CY cs.CR cs.NI

    Classification of malware based on file content and characteristics

    Authors: Mouhammd Alkasassbeh, Samail Al-Daleen

    Abstract: In general, the industry of malware has come to be a market which brings on loads of money by investing and implementing high end technology to escape traditional detection while vendors of anti-malware spend thousands if not millions of dollars to stop the malware breach since it not only causes financial losses but also emotional ones. This paper study the classification of malware based on file… ▽ More

    Submitted 26 September, 2018; originally announced October 2018.

    Comments: 12

  11. arXiv:1809.02610  [pdf

    cs.NI cs.CR

    Machine Learning Methods for Network Intrusion Detection

    Authors: Mouhammad Alkasassbeh, Mohammad Almseidin

    Abstract: Network security engineers work to keep services available all the time by handling intruder attacks. Intrusion Detection System (IDS) is one of the obtainable mechanisms that is used to sense and classify any abnormal actions. Therefore, the IDS must be always up to date with the latest intruder attacks signatures to preserve confidentiality, integrity, and availability of the services. The speed… ▽ More

    Submitted 1 September, 2018; originally announced September 2018.

    Comments: ICCCNT 2018 - The 20th International Conference on Computing, Communication. arXiv admin note: substantial text overlap with arXiv:1805.10458

  12. arXiv:1801.05309  [pdf

    cs.NI

    A Novel Hybrid Method for Network Anomaly Detection Based on Traffic Prediction and Change Point Detection

    Authors: Mouhammd Alkasassbeh

    Abstract: In recent years, computer networks have become more and more advanced in terms of size, applications, complexity and level of heterogeneity. Moreover, availability and performance are important issues for end users. New types of cyber-attacks that can affect and damage network performance and availability are constantly emerging and some threats, such as Distributed Denial of Service (DDoS) attack… ▽ More

    Submitted 5 January, 2018; originally announced January 2018.

  13. arXiv:1801.02330  [pdf

    cs.CR cs.LG

    Evaluation of Machine Learning Algorithms for Intrusion Detection System

    Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh

    Abstract: Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task. In this paper, several experiments have been performed and evaluated to assess various machine learning classifiers based on KDD intrusion dataset. It succeeded… ▽ More

    Submitted 8 January, 2018; originally announced January 2018.

    Journal ref: Intelligent Systems and Informatics (SISY), 2017 IEEE 15th International Symposium

  14. arXiv:1712.09623  [pdf

    cs.NI cs.CR cs.LG

    An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

    Authors: Mouhammd Alkasassbeh

    Abstract: Despite the great developments in information technology, particularly the Internet, computer networks, global information exchange, and its positive impact in all areas of daily life, it has also contributed to the development of penetration and intrusion which forms a high risk to the security of information organizations, government agencies, and causes large economic losses. There are many tec… ▽ More

    Submitted 27 December, 2017; originally announced December 2017.

    Journal ref: Journal of Theoretical and Applied Information Technology 30th November 2017 -- Vol. 95. No. 22 -- 2017

  15. arXiv:1602.08313  [pdf

    cs.AI cs.NE

    Enhancing Genetic Algorithms using Multi Mutations

    Authors: Ahmad B. A. Hassanat, Esra'a Alkafaween, Nedal A. Al-Nawaiseh, Mohammad A. Abbadi, Mouhammd Alkasassbeh, Mahmoud B. Alhasanat

    Abstract: Mutation is one of the most important stages of the genetic algorithm because of its impact on the exploration of global optima, and to overcome premature convergence. There are many types of mutation, and the problem lies in selection of the appropriate type, where the decision becomes more difficult and needs more trial and error. This paper investigates the use of more than one mutation operato… ▽ More

    Submitted 10 January, 2018; v1 submitted 26 February, 2016; originally announced February 2016.

    Comments: 17 pages, 11 figures, 1 table, 41 references

    Journal ref: International Journal of Computer Science and Information Security 14, no. 7 (2016): 785

  16. arXiv:1501.00687  [pdf

    cs.LG

    On Enhancing The Performance Of Nearest Neighbour Classifiers Using Hassanat Distance Metric

    Authors: Mouhammd Alkasassbeh, Ghada A. Altarawneh, Ahmad B. A. Hassanat

    Abstract: We showed in this work how the Hassanat distance metric enhances the performance of the nearest neighbour classifiers. The results demonstrate the superiority of this distance metric over the traditional and most-used distances, such as Manhattan distance and Euclidian distance. Moreover, we proved that the Hassanat distance metric is invariant to data scale, noise and outliers. Throughout this wo… ▽ More

    Submitted 4 January, 2015; originally announced January 2015.

    Comments: Canadian Journal of Pure and Applied Sciences (CJPAS). volume 9, issue 1, Feb 2015