Search Results - "Hasbullah, Iznan H"

Refine Results
  1. 1

    A Systematic Literature Review on Machine Learning and Deep Learning Approaches for Detecting DDoS Attacks in Software-Defined Networking by Bahashwan, Abdullah Ahmed, Anbar, Mohammed, Manickam, Selvakumar, Al-Amiedy, Taief Alaa, Aladaileh, Mohammad Adnan, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (01-05-2023)
    “…Software-defined networking (SDN) is a revolutionary innovation in network technology with many desirable features, including flexibility and manageability…”
    Get full text
    Journal Article
  2. 2

    A Secure Pseudonym-Based Conditional Privacy-Preservation Authentication Scheme in Vehicular Ad Hoc Networks by Al-Shareeda, Mahmood A, Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (22-02-2022)
    “…Existing identity-based schemes utilized in Vehicular Ad hoc Networks (VANETs) rely on roadside units to offer conditional privacy-preservation authentication…”
    Get full text
    Journal Article
  3. 3

    SE-CPPA: A Secure and Efficient Conditional Privacy-Preserving Authentication Scheme in Vehicular Ad-Hoc Networks by Al-Shareeda, Mahmood A, Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H

    Published in Sensors (Basel, Switzerland) (08-12-2021)
    “…Communications between nodes in Vehicular Ad-Hoc Networks (VANETs) are inherently vulnerable to security attacks, which may mean disruption to the system…”
    Get full text
    Journal Article
  4. 4

    A Systematic Literature Review on Machine and Deep Learning Approaches for Detecting Attacks in RPL-Based 6LoWPAN of Internet of Things by Al-Amiedy, Taief Alaa, Anbar, Mohammed, Belaton, Bahari, Kabla, Arkan Hammoodi Hasan, Hasbullah, Iznan H, Alashhab, Ziyad R

    Published in Sensors (Basel, Switzerland) (29-04-2022)
    “…The IETF Routing Over Low power and Lossy network (ROLL) working group defined IPv6 Routing Protocol for Low Power and Lossy Network (RPL) to facilitate…”
    Get full text
    Journal Article
  5. 5

    An Efficient Identity-Based Conditional Privacy-Preserving Authentication Scheme for Secure Communication in a Vehicular Ad Hoc Network by Al-shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H.

    Published in Symmetry (Basel) (01-10-2020)
    “…The security and privacy issues in vehicular ad hoc networks (VANETs) are often addressed with schemes based on either public key infrastructure, group…”
    Get full text
    Journal Article
  6. 6

    Renyi Joint Entropy-Based Dynamic Threshold Approach to Detect DDoS Attacks against SDN Controller with Various Traffic Rates by Aladaileh, Mohammad Adnan, Anbar, Mohammed, Hintaw, Ahmed J., Hasbullah, Iznan H., Bahashwan, Abdullah Ahmed, Al-Sarawi, Shadi

    Published in Applied sciences (01-06-2022)
    “…The increasing incidence of distributed denial-of-service (DDoS) attacks has made software-defined networking (SDN) more vulnerable to the depletion of…”
    Get full text
    Journal Article
  7. 7

    Password-Guessing Attack-Aware Authentication Scheme Based on Chinese Remainder Theorem for 5G-Enabled Vehicular Networks by Al-Shareeda, Mahmood A., Anbar, Mohammed, Manickam, Selvakumar, Hasbullah, Iznan H.

    Published in Applied sciences (01-02-2022)
    “…The new fifth-generation (5G) cellular networks dramatically improve the speed of message transmissions. Most existing authentication schemes that secure 5G…”
    Get full text
    Journal Article
  8. 8

    Distributed Denial of Service Attacks against Cloud Computing Environment: Survey, Issues, Challenges and Coherent Taxonomy by Alashhab, Ziyad R., Anbar, Mohammed, Singh, Manmeet Mahinderjit, Hasbullah, Iznan H., Jain, Prateek, Al-Amiedy, Taief Alaa

    Published in Applied sciences (01-12-2022)
    “…Cloud computing (CC) plays a significant role in revolutionizing the information and communication technology (ICT) industry, allowing flexible delivery of new…”
    Get full text
    Journal Article
  9. 9

    Deep-Learning-Based Approach to Detect ICMPv6 Flooding DDoS Attacks on IPv6 Networks by Elejla, Omar E., Anbar, Mohammed, Hamouda, Shady, Faisal, Serri, Bahashwan, Abdullah Ahmed, Hasbullah, Iznan H.

    Published in Applied sciences (01-06-2022)
    “…Internet Protocol version six (IPv6) is more secure than its forerunner, Internet Protocol version four (IPv4). IPv6 introduces several new protocols, such as…”
    Get full text
    Journal Article
  10. 10

    Detection Techniques of Distributed Denial of Service Attacks on Software-Defined Networking Controller-A Review by AL-Adaileh, Mohammad A., Anbar, Mohammed, Hasbullah, Iznan H, Wey, Chong Yung, Sanjalawe, Yousef k.

    Published in IEEE access (01-01-2020)
    “…The wide proliferation of telecommunication technologies in the last decade gives rise to the number of more sophisticated security threats. Software-Defined…”
    Get full text
    Journal Article
  11. 11

    Effectiveness of an Entropy-Based Approach for Detecting Low- and High-Rate DDoS Attacks against the SDN Controller: Experimental Analysis by Aladaileh, Mohammad Adnan, Anbar, Mohammed, Hintaw, Ahmed J., Hasbullah, Iznan H., Bahashwan, Abdullah Ahmed, Al-Amiedy, Taief Alaa, Ibrahim, Dyala R.

    Published in Applied sciences (01-01-2023)
    “…Software-defined networking (SDN) is a unique network architecture isolating the network control plane from the data plane, offering programmable elastic…”
    Get full text
    Journal Article
  12. 12

    Flow-Based IDS Features Enrichment for ICMPv6-DDoS Attacks Detection by Elejla, Omar E., Anbar, Mohammed, Hamouda, Shady, Belaton, Bahari, Al-Amiedy, Taief Alaa, Hasbullah, Iznan H.

    Published in Symmetry (Basel) (01-12-2022)
    “…Internet Protocol version 6 (IPv6) and its core protocol, Internet Control Message Protocol version 6 (ICMPv6), need to be secured from attacks, such as Denial…”
    Get full text
    Journal Article
  13. 13

    Performance Analysis of Internet Key Exchange Algorithms on IPSec Security Association Initiation by Praptodiyono, Supriyanto, Furqon, Moh, Maulana, Alief, Hasbullah, Iznan H., Ul Rehman, Shafiq

    Published in MATEC Web of Conferences (01-01-2018)
    “…Naturally, the Internet as an open network allows millions of users to interact each other. Furthermore, the giant network vulnerable to various malicious…”
    Get full text
    Journal Article Conference Proceeding
  14. 14

    Neighbor discovery protocol anomaly-based detection system using neural network algorithm by Saad, Redhwan M. A., Anbar, Mohammed, Manickam, Selvakumar, Shaheen, Samir I., Hasbullah, Iznan H.

    “…The exponential increase in Internet-facing devices in the last decade has resulted in IP address exhaustion due to the limitations of the existing IPv4…”
    Get full text
    Journal Article
  15. 15

    IMPLEMENTATION OF TRUST NEIGHBOR DISCOVERY ON SECURING IPv6 LINK LOCAL COMMUNICATION by SUPRIYANTO PRAPTODIYONO, TEGUH FIRMANSYAH, IZNAN H. HASBULLAH, RAJA KUMAR MURUGESAN, AZLAN OSMAN, CHONG YUNG WEY

    “…Neighbour Discovery Protocol is a core IPv6 protocol used within the local network to provide functionalities such as Router Discovery and Neighbour Discovery…”
    Get full text
    Journal Article
  16. 16

    Review of Prevention schemes for Replay Attack in Vehicular Ad hoc Networks (VANETs) by Al-shareeda, Mahmood A., Anbar, Mohammed, Hasbullah, Iznan H., Manickam, Selvakumar, Abdullah, Nibras, Hamdi, Mustafa Maad

    “…Vehicular Ad hoc Networks (VANETs) are self-organizing wireless communication networks that allow vehicles to exchange traffic-related messages automatically…”
    Get full text
    Conference Proceeding
  17. 17

    Integration of Firewall and IDS on Securing Mobile IPv6 by Praptodiyono, Supriyanto, Jauhari, Moh, Fahrizal, Rian, Hasbullah, Iznan H., Osman, Azlan, Ul Rehman, Shafiq

    “…The number of Mobile device users in the word has evolved rapidly. Many internet users currently want to connect the internet for all utilities automatically…”
    Get full text
    Conference Proceeding
  18. 18

    Enhancing IPsec Performance in Mobile IPv6 Using Elliptic Curve Cryptography by Praptodiyono, Supriyanto, Santoso, M. Iman, Firmansyah, Teguh, Abdurrazaq, Ali, Hasbullah, Iznan H., Osman, Azlan

    “…Internet has become indispensable to the modern society nowadays. Due to the dynamic nature of human activities, the evolving mobile technology has played a…”
    Get full text
    Conference Proceeding
  19. 19

    Security mechanism for IPv6 stateless address autoconfiguration by Praptodiyono, Supriyanto, Hasbullah, Iznan H., Kadhum, Mohammed M., Murugesan, Raja Kumar, Chong Yung Wey, Osman, Azlan

    “…Internet Protocol version six (IPv6) was designed and developed to solve the problem of exhaustion of current Internet address. IPv6 also introduces a number…”
    Get full text
    Conference Proceeding
  20. 20

    Efficient conditional privacy preservation with mutual authentication in vehicular ad hoc networks by Al-Shareeda, Mahmood A., Anbar, Mohammed, Hasbullah, Iznan H., Manickam, Selvakumar, Hanshi, Sabri M.

    Published in IEEE access (01-01-2020)
    “…Vehicle Ad hoc Networks (VANETs) are an emergent wireless communication technology that has the potential to reduce the risk of accidents caused by drivers and…”
    Get full text
    Journal Article