Browsing by Author "Seman, K"
Now showing 1 - 12 of 12
Results Per Page
Sort Options
- Some of the metrics are blocked by yourconsent settings
Publication Agent Verification Protocol in Agent-based IDS(IEEE Computer SOC, 2008) ;Nasir, LM ;Seman, KSaudi, MMAgent-based IDS is a powerful technique used by network administrator to monitor traffic activities in their network. However, the widespread network coverage has introduced a possibility of a hacker installing unauthorized agents or fake agents secretly within the network. This is considered as a very serious threat to the network security. This paper proposes a protocol that is used to detect the presence of a fake agent upon its installation. The technique is a combination of Elgamal encryption, Elgamal digital signature, and SHA-1 message digest function. A simple implementation was developed to test the proposed protocol. - Some of the metrics are blocked by yourconsent settings
Publication The Comparison Of Internet Pricing Scheme In Multi Link Bottleneck Multi Service Network(Univ Utari Malaysia-Uum, 2017) ;Puspita, FM ;Seman, K ;Taib, BMAbdullah, IIn this research we set up pricing scheme of multilink internet bottleneck for multi-service network by giving the modified models and the solution. This model is based on the local server data in Palembang. Internet Service Provider (ISP) requires the appropriate pricing schemes in order to maximize revenue and provide quality services that can satisfy the Internet users. The model established by setting the base price (a) as constants and the premium quality of service (beta) as variables and constants. Then the model will be solved using Program LINGO 13.0 to obtain the optimal solution. From the results obtained shows the optimal solution that ISP can use the models to generate maximum revenue and gives options according to the user needs in accordance with the goal of ISP. The optimal solution results compared to previous work show that the larger dimension of the problem, the goals can also change according to the needs. From LINGO 13.0, the solution for four services and 3 links offered were maximized when we set up the base price (a) as constants and the premium quality of service (beta) as constants for Ii = Ii-1. So ISP can use the modification scheme to achieve its goals. The realistic case to be solved by LINGO 13.0 is limited to have only four services and three links. - Some of the metrics are blocked by yourconsent settings
Publication EDOWA worm classification(Int Assoc Engineers-Iaeng, 2008) ;Saudi, MM ;Tamil, EM ;Nor, SAM ;Idris, MYISeman, KWorms have become a real threat for computer users for the past few years. Worm is more prevalent today than ever before, and both home users and system administrators need to be on the alert to protect their network or company against attacks. It is coming out so fast these days that even the most accurate scanners cannot track all of the new ones. Indeed until now there is no specific way to classify the worm. To understand the threats posed by the worms, this research had been carried out. In this paper the researchers proposed a new way to classify the worms which later is used as the basis to build up a system which is called as the EDOWA system to detect worms attack. Details on how the new worm of classification which is called as EDOWA worm classification is produced are explained in this paper. Hopefully this new worm classification can be used as the basis model to produce a system either to detect or defend organization from worms attack. - Some of the metrics are blocked by yourconsent settings
Publication Enhanced TCPW's Fast Retransmission and Fast Recovery Mechanism over High Bit Errors Networks(IEEE, 2015) ;Al-Hasanat, M ;Seman, KSaadan, KIn this paper we introduced two enhancement modifications to the well-known TCP Westwood fast retransmission and fast recovery mechanisms. Firstly, a new modification is introduced to fasten the fast retransmission procedure by preventing the TCP sender side from waiting the third duplicate ACKs to retransmit lost packets. Secondly, further modification is presented to achieve better recovery for the congestion window size in the fast recovery phase based on last round trip time and bandwidth estimation. The two modifications are implemented and evaluated using ns-3 simulator. We compared the throughput and congestion window size of the new proposed modifications to TCPW and NewReno. As a result, the proposed algorithm has shown significant improvement over the two implementations. - Some of the metrics are blocked by yourconsent settings
Publication Identifying False Alarm Rates for Intrusion Detection System with Data Mining(Int Journal Computer Science & Network Security-Ijcsns, 2011) ;Sabri, FNM ;Norwawi, NMSeman, KIntrusion Detection Systems (IDS) are very important in determining how secure a system is, and to discover several types of attack such as Denial of Service (DOS), Probes and User to Root (U2R) attacks. However, recently false alarm rates and accuracy of detection are happens to be the most important issues and challenges in designing effective IDS. Therefore, this study is aimed at detecting denial of services attack and normal traffic using Knowledge Discovery and Data Mining Cup 99(KDD CUP 99) dataset to reduce the false alarm rates. Data mining is used to extract the useful information from large databases. The results have shown that the data mining technique reduces the false alarm rates and increase the accuracy of the system. - Some of the metrics are blocked by yourconsent settings
Publication Implementation of Multi-Class Shared Buffer with Finite Memory Size(IEEE, 2011) ;Rahman, AAA ;Seman, K ;Saadan, KAzman, AHigh packet network have become an essential in modern multimedia communication. Shared buffer is commonly used to utilize the buffer in the switch. In this paper, we analyse the performance of shared buffer with different memory sizes. The architecture of the multi-class shared buffer is developed for 16x16 ports switch that is targeted in Xilinx FPGA. The performance of the multi-class shared buffer switch is analysed in term of throughput and mean delay. Based on the simulation with different memory sizes, it is observed that the optimum selection of memory size under uniform traffic depends on the maximum traffic load of the switch. - Some of the metrics are blocked by yourconsent settings
Publication Modified A5/1 Based Stream Cipher For Secured GSM Communication(Int Journal Computer Science & Network Security-Ijcsns, 2011) ;Zakaria, NH ;Seman, KAbdullah, IA5/1 is the stream cipher algorithm used in GSM communication in order to provide over the air communication privacy. The objective of this paper is to modify the algorithm of the existing A5/1 stream cipher in order to improve the security of GSM communication. Several statistical tests such as frequency test, serial test, runs test, long runs of ones test, and linear complexity test were used to test the strength of the algorithm. Two proposed modified A5/1 algorithms successfully passed all the basic statistical tests. - Some of the metrics are blocked by yourconsent settings
Publication On the Symbolic Manipulation for the Cardinality of Certain Degree Polynomials(Amer Inst Physics, 2016) ;Abdullah, I ;Seman, K ;Taib, BMPuspita, FMThe research on cardinality of polynomials was started by Mohd Atan [I] when he considered a set, V ((f) under bar ;p(alpha))= {u mod p(alpha) : (f) under bar (u) congruent to 0 mod p(alpha)}, where alpha > 0 and (f) under bar =(f(1),f(2),...,f(n)). The term (f) under bar (u)congruent to (0) under bar mod p(alpha) mod pa means that we are considering all congruence equations of modulo p(alpha) and we are looking for u that makes the congruence equation equals zero. This is called the zeros of polynomials. The total numbers of such zeros is termed as N((f) under bar ;p(alpha)). The above p is a prime number and Z(p) is the ring of p-adic integers, and (x) under bar = (x(1),x(2),...,x(n)). He later let N((f) under bar ;p(alpha))= card V((f) under bar ;p(alpha)). The notation N((f) under bar ;p(alpha)) means the number of zeros for that the polynomials f. For a polynomial f(x) defined over the ring of integers Z, Sandor [2] showed that N((f) under bar ;p(alpha))<= mp(1/2ord pD), where D not equal 0,alpha > ord(p)D and D is the discriminant of f. In this paper we will try to introduce the concept of symbolic manipulation to ease the process of transformation from two -variables polynomials to one -variable polynomials. - Some of the metrics are blocked by yourconsent settings
Publication The Improved Models of Internet Pricing Scheme of Multi Service Multi Link Networks with Various Capacity Links(Springer, 2015) ;Puspita, FM ;Seman, KTaib, BMInternet Service Providers (ISPs) nowadays deal with high demand to promote good quality information. However, the knowledge to develop new pricing scheme that serve both customers and supplier is known, but only a few pricing plans involve QoS networks. This study will seek new proposed pricing plans are offered with multi service multi link networks involved. The multi service multi link Networks scheme is solved as an optimization model by comparing two models in multi QoS networks. The results showed that by fixing the base price and varying the quality premium or varying the base price and quality and setting up the equal capacity link values, ISP achieved the goal to maximize the profit. - Some of the metrics are blocked by yourconsent settings
Publication TM600E: An ATCA-based 10-Gigabit Metro Ethernet Switch(IEEE, 2008) ;Khyasudeen, MF ;Ramli, MR ;Daud, WNSeman, KTelecom Service Providers (TSPs) are facing big challenges in today's telecom markets due to the introduction of packet-based network. Users demand more on higher and flexible bandwidth together with high Quality of Set-vice (QoS). These problems require TSPs to seek new network technology that can meet such challenges. Metro Ethernet has been regarded as the technology of choice due to its universality, and high flexibility. This paper is about the design of Telekom Malaysia's TM600E that is a 10Gigabit switch to be used as the Edge Provider Edge (EPE) device in the Metro Ethernet Network. The Advanced Telecom Computing Architecture (ATCA) has been chosen for providing the open architecture platform. Performance testing conducted confirms that the switch has high throughput, low latency, and low packet loss. - Some of the metrics are blocked by yourconsent settings
Publication Users' perspective on ICT infrastructure in a higher learning institution(Int Business Information Management Assoc-Ibima, 2008) ;Alwi, NHM ;Azizan, N ;Ismail, SSeman, KInformation and Communication Technology (ICT) has been created to simplify human tasks. Nowadays, ICT is becoming more widely used by higher learning institutions to support their academic activities particularly in teaching and research. Users play an important role in any situation; therefore a study to evaluate the ICT infrastructure was conducted in a public university in Malaysia known as the Islamic Science University of Malaysia (USIM). The study was conducted to gather information from the users of the ICT facilities. This paper will discuss findings of the study in terms of the computer functions, system set-vices, training and the ICT maintenance from the users' perspective. An evaluation of current ICT infrastructure was needed in order to understand how users and the organization could best benefit front services provided. The results indicate that ICT needs to be improved to ensure that more benefits can be gained. - Some of the metrics are blocked by yourconsent settings
Publication Worm analysis through computer simulation (WAtCoS)(Int Assoc Engineers-Iaeng, 2008) ;Saudi, MM ;Seman, K ;Tamil, EMIdris, MYIComputer viruses have received a lot of attention. In fact, the best-known viruses have not been viruses at all, but worms, programs that spread through networks instead of modifying programs. Both viruses and worms reproduce themselves and defensive measures have focused on stopping or slowing their spread. Ultimately, though, there is no defense better than a comprehensive security strategy that embraces user education, crisis-response teams, and technologically sound security measures including, but not limited to, those that relate specifically to the threats posed by viruses and worms. Defense against harm can consist of preventing the harm from occurring, limiting the extent of the harm, or recovering from the harm after it has occurred. This research aims to resolve the confusion in identifying visualization, simulation and games in teaching malware analysis. Computer simulation has greater impact and based on research that had been carried out it is identified as one of the best approach in teaching worm analysis.