Samer Khamaiseh

ORCID: 0000-0001-9339-1685
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Software-Defined Networks and 5G
  • Internet Traffic Analysis and Secure E-voting
  • Adversarial Robustness in Machine Learning
  • Software System Performance and Reliability
  • Software Testing and Debugging Techniques
  • Anomaly Detection Techniques and Applications
  • Scientific Computing and Data Management
  • Generative Adversarial Networks and Image Synthesis
  • Software Reliability and Analysis Research
  • Ethics and Social Impacts of AI
  • Advanced Image Processing Techniques
  • Software Engineering Research
  • Access Control and Trust
  • Bacillus and Francisella bacterial research
  • Privacy-Preserving Technologies in Data
  • Cloud Computing and Resource Management
  • IoT Networks and Protocols
  • Security and Verification in Computing
  • Optical Wireless Communication Technologies
  • Digital Media Forensic Detection
  • Advanced Clustering Algorithms Research
  • Advanced Wireless Communication Technologies
  • Privacy, Security, and Data Protection
  • Geographic Information Systems Studies

Miami University
2022-2025

Monmouth University
2020

Midwestern State University
2019-2020

Boise State University
2016-2019

The popularity of adapting deep neural networks (DNNs) in solving hard problems has increased substantially. Specifically, the field computer vision, DNNs are becoming a core element developing many image and video classification recognition applications. However, vulnerable to adversarial attacks, which, given well-trained model, malicious input can be crafted by adding mere perturbations misclassify image. This phenomena raise security concerns utilizing critical life applications which...

10.1109/access.2022.3208131 article EN cc-by IEEE Access 2022-01-01

10.5220/0013146800003890 article EN Proceedings of the 14th International Conference on Agents and Artificial Intelligence 2025-01-01

As a new networking paradigm, Software-Defined Networking (SDN) separates data and control planes to facilitate programmable functions improve the efficiency of packet delivery. Recent studies have shown that there exist various security threats in SDN. For example, saturation attack may disturb normal delivery packets even make SDN system out service by flooding plane, or both. The existing research has focused on attacks caused SYN flooding. This paper presents an anomaly detection method,...

10.1109/tnsm.2019.2959268 article EN IEEE Transactions on Network and Service Management 2019-12-13

Software Defined Networking (SDN) is a new network paradigm that facilitates management by separating the control plane from data plane. Studies have shown an SDN may experience high packet loss rate and long delay in forwarding messages when OpenFlow channel overwhelmed saturation attack. The existing approaches focused on detection of attacks caused TCP-SYN flooding through periodic analysis traffic. However, there are two issues. First, previous incapable detecting other types, especially...

10.1109/cccs.2019.8888049 article EN 2019-10-01

Adversarial attacks have been extensively studied in the domain of deep image classification, but their impacts on other domains such as Machine and Deep Learning-based Network Intrusion Detection Systems (NIDSs) received limited attention. While adversarial images are generally more straightforward due to fewer constraints input domain, generating examples network poses greater challenges diverse types traffic need maintain its validity. Prior research has introduced generate against NIDSs,...

10.1109/tnsm.2024.3357316 article EN IEEE Transactions on Network and Service Management 2024-01-22

Recently, different machine learning-based detection systems are proposed to detect DDoS saturation attacks in Software-defined Networking (SDN). Meanwhile, research studies highlight the vulnerabilities of adapting such SDN. For instance, an adversary can fool learning classifiers these by crafting specific adversarial attack samples, preventing DoS attacks. To better understand security properties settings, this paper investigates robustness supervised and unsupervised against First, we...

10.1109/nfv-sdn50289.2020.9289908 article EN 2020-11-10

While the decoupling of control and data planes in software-defined networking (SDN) facilitates orchestrating network traffic, it suffers from security threats. For example, saturation attacks can make SDN out service by exhausting controller' switch's computational resources. The existing research has focused on defense against limited types attacks. In this paper, we propose vSwitchGuard, a framework for detection countermeasure known unknown SDN. vSwitchGuard aims to identify victim...

10.1109/compsac48688.2020.0-157 article EN 2022 IEEE 46th Annual Computers, Software, and Applications Conference (COMPSAC) 2020-07-01

Spatial data clustering has long been used to facilitate the knowledge discovery process. Several approaches have proposed in literature for detecting and understanding hidden patterns. These are based on different perspectives can be roughly categorized into several main categories, including centroid-based, density-based, grid-based, hierarchy-based clustering. In spite of being a very mature research area, existing spatial techniques usually depend user parameters continue utilize...

10.1109/access.2023.3252374 article EN cc-by-nc-nd IEEE Access 2023-01-01

The design of existing machine-learning-based DoS detection systems in software-defined networking (SDN) suffers from two major problems. First, the proper time window for conducting network traffic analysis is unknown and has proven challenging to determine. Second, it unable detect types saturation attacks. An attack an that not represented training data. In this paper, we evaluate three supervised classifiers detecting a family DDoS flooding attacks (UDP, TCP-SYN, IP-Spoofing, TCP-SARFU,...

10.3390/fi14060164 article EN cc-by Future Internet 2022-05-27

Software security testing is an important technique for discovering software vulnerabilities that violate requirements. Existing methods, however, seldom generate tests directly from requirements specifications. To address this issue, paper presents approach constructing test models the artifacts of misuse case modeling (i.e., use/misuse cases and mitigation use cases), which a popular method specification in development process. The can then be used to automatically tests, consist inputs...

10.1109/dasc-picom-datacom-cyberscitec.2017.98 article EN 2017-11-01

Attribute-based access control (ABAC) with obligations is a new technique for achieving fine-grained and accountability. An obligatory ABAC system can be implemented incorrectly various reasons, such as programming errors incorrect obligation specification. To reveal these implementation defects, this paper presents an approach to model-based testing of systems. In approach, we first build test model by specifying functional policy. The policy represents constraints on the model. Then weave...

10.1109/qrs.2018.00054 article EN 2018-07-01

HPC typically employs parallelization in software and hardware order to accelerate the computing processing. The underlying network itself is used collectively by all experiments. In this paper, we propose a for based on different running experiments or jobs. Each experiment/job will be logically sliced isolated from other Additionally, each includes logical nodes across cluster. SDN controller manage control slicing process. We evaluated model using Opendaylight controller, FlowVisor...

10.1109/csci.2016.0116 article EN 2021 International Conference on Computational Science and Computational Intelligence (CSCI) 2016-12-01

By exposing the programmable interfaces, software-defined networking (SDN) facilitates development of network applications, specifically, machine-learningbased flooding attack detection systems. Despite their promising results in detecting attacks, adoption into operational environments is limited. This partially because incapability unknown attacks. An an that not comprised training dataset machine learning classifier. In this paper, we propose FloodDetector, efficient framework for known...

10.1109/itia50152.2020.9312310 article EN 2020-11-27
Coming Soon ...