Skip to main content

Showing 1–6 of 6 results for author: Alabduljabbar, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2304.14359  [pdf, other

    cs.CY cs.CR cs.PF

    Measuring and Modeling the Free Content Web

    Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen

    Abstract: Free content websites that provide free books, music, games, movies, etc., have existed on the Internet for many years. While it is a common belief that such websites might be different from premium websites providing the same content types, an analysis that supports this belief is lacking in the literature. In particular, it is unclear if those websites are as safe as their premium counterparts.… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 30 pages, 3 tables, 9 figures. Under review by Computer Networks

  2. arXiv:2304.13278  [pdf, other

    cs.CR cs.CY cs.PF

    Understanding the Security and Performance of the Web Presence of Hospitals: A Measurement Study

    Authors: Mohammed Alkinoon, Abdulrahman Alabduljabbar, Hattan Althebeiti, Rhongho Jang, DaeHun Nyang, David Mohaisen

    Abstract: Using a total of 4,774 hospitals categorized as government, non-profit, and proprietary hospitals, this study provides the first measurement-based analysis of hospitals' websites and connects the findings with data breaches through a correlation analysis. We study the security attributes of three categories, collectively and in contrast, against domain name, content, and SSL certificate-level feat… ▽ More

    Submitted 26 April, 2023; originally announced April 2023.

    Comments: 10 pages, 5 tables, 10 figures

  3. arXiv:2210.12083  [pdf, other

    cs.CR cs.CY

    Do Content Management Systems Impact the Security of Free Content Websites? A Correlation Analysis

    Authors: Mohammed Alaqdhi, Abdulrahman Alabduljabbar, Kyle Thomas, Saeed Salem, DaeHun Nyang, David Mohaisen

    Abstract: This paper investigates the potential causes of the vulnerabilities of free content websites to address risks and maliciousness. Assembling more than 1,500 websites with free and premium content, we identify their content management system (CMS) and malicious attributes. We use frequency analysis at both the aggregate and per category of content (books, games, movies, music, and software), utilizi… ▽ More

    Submitted 21 October, 2022; originally announced October 2022.

    Comments: 7 pages, 1 figure, 6 tables

  4. arXiv:2108.13373  [pdf, other

    cs.CR cs.LG

    ML-based IoT Malware Detection Under Adversarial Settings: A Systematic Evaluation

    Authors: Ahmed Abusnaina, Afsah Anwar, Sultan Alshamrani, Abdulrahman Alabduljabbar, RhongHo Jang, Daehun Nyang, David Mohaisen

    Abstract: The rapid growth of the Internet of Things (IoT) devices is paralleled by them being on the front-line of malicious attacks. This has led to an explosion in the number of IoT malware, with continued mutations, evolution, and sophistication. These malicious software are detected using machine learning (ML) algorithms alongside the traditional signature-based methods. Although ML-based detectors imp… ▽ More

    Submitted 30 August, 2021; originally announced August 2021.

    Comments: 11 pages

  5. arXiv:2103.14221  [pdf, other

    cs.CR

    ShellCore: Automating Malicious IoT Software Detection by Using Shell Commands Representation

    Authors: Hisham Alasmary, Afsah Anwar, Ahmed Abusnaina, Abdulrahman Alabduljabbar, Mohammad Abuhamad, An Wang, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The Linux shell is a command-line interpreter that provides users with a command interface to the operating system, allowing them to perform a variety of functions. Although very useful in building capabilities at the edge, the Linux shell can be exploited, giving adversaries a prime opportunity to use them for malicious activities. With access to IoT devices, malware authors can abuse the Linux s… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.

  6. arXiv:2103.14217  [pdf, other

    cs.CR

    Understanding Internet of Things Malware by Analyzing Endpoints in their Static Artifacts

    Authors: Afsah Anwar, **chun Choi, Abdulrahman Alabduljabbar, Hisham Alasmary, Jeffrey Spaulding, An Wang, Songqing Chen, DaeHun Nyang, Amro Awad, David Mohaisen

    Abstract: The lack of security measures among the Internet of Things (IoT) devices and their persistent online connection gives adversaries a prime opportunity to target them or even abuse them as intermediary targets in larger attacks such as distributed denial-of-service (DDoS) campaigns. In this paper, we analyze IoT malware and focus on the endpoints reachable on the public Internet, that play an essent… ▽ More

    Submitted 25 March, 2021; originally announced March 2021.