Anwar Haque

ORCID: 0000-0002-5253-0455
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Advanced Optical Network Technologies
  • Internet Traffic Analysis and Secure E-voting
  • Software-Defined Networks and 5G
  • Traffic Prediction and Management Techniques
  • Network Traffic and Congestion Control
  • Anomaly Detection Techniques and Applications
  • Vehicular Ad Hoc Networks (VANETs)
  • Advanced Malware Detection Techniques
  • Optical Network Technologies
  • IoT and Edge/Fog Computing
  • Smart Grid Energy Management
  • Blockchain Technology Applications and Security
  • Advanced Photonic Communication Systems
  • Cloud Computing and Resource Management
  • Advanced MIMO Systems Optimization
  • Time Series Analysis and Forecasting
  • Transportation and Mobility Innovations
  • Building Energy and Comfort Optimization
  • Robotics and Sensor-Based Localization
  • Robotic Path Planning Algorithms
  • Smart Grid Security and Resilience
  • Privacy-Preserving Technologies in Data
  • Software System Performance and Reliability
  • Energy Efficiency and Management

Western University
2017-2024

Institute of Business Administration Karachi
2018-2024

Bell (Canada)
2006-2015

Sidra Medical and Research Center
2015

University of Waterloo
2003-2012

Prague Institute of Planning and Development
2008

University of Windsor
2001

Prevention of security breaches completely using the existing technologies is unrealistic. As a result, intrusion detection an important component in network security. However, many current systems (IDSs) are rule-based systems, which have limitations to detect novel intrusions. Moreover, encoding rules time-consuming and highly depends on knowledge known Therefore, we propose new systematic frameworks that apply data mining algorithm called random forests misuse, anomaly,...

10.1109/tsmcc.2008.923876 article EN IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews) 2008-08-20

Unmanned aerial vehicles (UAV), or drones, have gained a lot of popularity over the last decade. The use autonomous drones appears to be viable and low-cost solution problems in many applications. Path planning capabilities are essential for control systems. An drone must able rapidly compute feasible energy-efficient paths avoid collisions. In this study, we review two key aspects path planning: environmental representation generation techniques. Common techniques analyzed, their...

10.3390/drones7030169 article EN cc-by Drones 2023-02-28

Proper security solutions in the cyber world are crucial for enforcing network by providing real-time protection against vulnerabilities and data exploitation. An effective intrusion detection strategy is capable of taking a holistic approach protecting critical systems unauthorized access or attack. In this paper, we describe machine learning (ML) based comprehensive solution using ensemble supervised ML framework feature selection methods. addition, provide comparative analysis several...

10.1109/tnsm.2021.3138457 article EN IEEE Transactions on Network and Service Management 2021-12-27

Our increasingly connected world continues to face an ever-growing number of network-based attacks. An Intrusion Detection System (IDS) is essential security technology used for detecting these Although numerous Machine Learning-based IDSs have been proposed the detection malicious network traffic, majority difficulty properly and classifying more uncommon attack types. In this paper, we implement a novel hybrid technique using synthetic data produced by Generative Adversarial Network (GAN)...

10.3390/s24092746 article EN cc-by Sensors 2024-04-25

Cyber-attacks are increasing rapidly, so developing effective intrusion detection and prevention tools for a secure safer cyberspace is crucial. DDoS (Distributed Denial of Services) one the most well-known digital threats, endangering any cyber-physical system. prevents host from serving legitimate traffic by overflowing node with unwanted service requests. Nowadays, machine learning-based IDS (Intrusion Detection System) uses different Feature Selection (FS) methods to extract feature...

10.1109/ccnc49033.2022.9700569 article EN 2022-01-08

The task of predicting Internet traffic is challenging, particularly in multi-step forecasting due to the volatile and random nature data. In addition, real-world may contain outlier data points, so developing a prediction model that integrates anomaly detection mitigation necessary. This paper compares several deep sequence models, such as Recurrent Neural Network (RNN), Long Short-Term Memory (LSTM), LSTM Encoder-Decoder (LSTM_En_De), with attention layer (LSTM_En_De_Atn), Gated Unit...

10.1109/tnsm.2023.3262406 article EN IEEE Transactions on Network and Service Management 2023-03-27

The internet has made massive progress since the 1990s. amount of traffic that crosses Internet now is 22 million times more than what was generated in 1992. Although fiber optic cables replaced century-old copper to transmit trillions bits per second, end user at a local area still hungry for bandwidth run new emerging applications. This put both ISPs and mobile network operators under challenges: Are they ready Mammoth Internet? Will be able offer capacity meet growing demand? Is their...

10.1109/access.2019.2941110 article EN cc-by IEEE Access 2019-01-01

Shared segment protection (SSP), compared with shared path (SPP), and link (SLP), provides an optimal configuration due to the ability of maximizing spare capacity sharing, reducing restoration time in cases a single failure. This paper thorough study on SSP under GMPLS-based recovery framework, where effective survivable routing algorithm for is proposed. The tradeoff between price (i.e., cost representing amount resources, blocking probability), extensively studied by simulations three...

10.1109/tr.2008.923480 article EN IEEE Transactions on Reliability 2008-06-01

Cloud provides resources to the users based on their requirements by using several resource allocation schemes. Reliable is one of major issues cloud computing. The objective this paper provide a reliable approach for computing while minimizing cost. existing research works in mostly address cost and utilization whereas we most crucial feature, which reliability. main novelty our work that consider not only reliability but also allocating appropriate users. aim proposed maximize In regard,...

10.1109/sc2.2017.46 article EN 2017-11-01

Vehicle-to-everything (V2X) services are attracting a lot of attention in the research and industry communities due to their applicability landscape connected autonomous vehicles. Such applications have stringent performance requirements terms complex data processing low latency communications which utilized ensure road safety improve conditions. To address these challenges, placement V2X through leveraging edge computing paradigm, that distributes capabilities access points proximity...

10.1109/icc40277.2020.9148960 article EN 2020-06-01

The ISP (Internet Service Provider) industry relies heavily on internet traffic forecasting (ITF) for long-term business strategy planning and proactive network management. Effective ITF frameworks are necessary to manage these networks prevent congestion over-provisioning. This study introduces an model designed It innovatively combines outlier detection mitigation techniques with advanced gradient descent boosting algorithms, including Gradient Boosting Regressor (GBR), Extreme (XGB),...

10.3390/s24061871 article EN cc-by Sensors 2024-03-14

A distributed denial of service (DDoS) attack is widely regarded as a major threat for the current Internet because its ability to create huge volume unwanted traffic. It hard detect and respond DDoS attacks due large complex network environments. In this paper, we introduce two distance-based detection techniques: average distance estimation traffic separation. They by analyzing values rates. The information packet can be inferred from time- to-live (TTL) value IP header. technique,...

10.1109/icc.2007.208 article EN IEEE International Conference on Communications 2007-06-01

Network service providers tend to focus on the quality of (QoS) they provide their customers. This entails analysis various QoS metrics (such as bandwidth, packet loss and jitter) in order be able improve services. is a single-dimensional approach problem that needs analyzed not only from business improvement perspective but also customer satisfaction perspective. do directly translate experience, which more qualitative than quantitative. Thus, it necessary correlate customers relate with...

10.1109/iwcmc.2019.8766591 article EN 2019-06-01

Network traffic is growing at an outpaced speed globally. The modern network infrastructure makes classic intrusion detection methods inefficient to classify inflow of vast traffic. This paper aims present a approach towards building system (NIDS) by using various deep learning methods. To further improve our proposed scheme and make it effective in real-world settings, we use transfer techniques where the knowledge learned model source domain with plentiful computational data resources...

10.1109/trustcom50675.2020.00144 article EN 2021 IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) 2020-12-01

Designing survivable communication networks to achieve carrier-grade five-nines reliability is of paramount importance for the network operators. This article addresses service and its related aspects such as nodal reachability, connectivity, edge-disjoint routing in both traditional software defined (SDNs). The proposed roadmap based on two phases: Fundamental analytical phase performance evaluation phase. In first phase, a graph operator analyze characteristics metric associated...

10.1109/tr.2021.3066526 article EN cc-by IEEE Transactions on Reliability 2021-04-13

With recent advancements in artificial intelligence (AI) and next-generation communication technologies, the demand for Internet-based applications intelligent digital services is increasing, leading to a significant rise cyber-attacks such as Distributed Denial-of-Service (DDoS). AI-based DoS detection systems promise adequate identification accuracy with lower false alarms, significantly associated data quality used train model. Several works have been proposed earlier select optimum...

10.3390/s22239144 article EN cc-by Sensors 2022-11-25

A flooding-based distributed denial of service (DDoS) attack sends a large amount unwanted traffic to victim machine. Existing network-level congestion control mechanisms are inadequate in preventing quality from deteriorating because these attacks. We propose framework defend against DDoS It has three major components: detection, traceback, and control. present the component detail this paper. distance-based rate limit mechanism is proposed allow at end request defense systems source set up...

10.1109/ares.2008.69 article EN 2008-03-01

The era of deep learning has enabled various dimensions predictive and preventive healthcare in medical science. However, the applications dimension are limited due to sparse availability data computing resources, also required expertise understanding, modeling training is not common yet. These limitations forcing a barrier widespread use healthcare. In this research we propose decentralized transfer mechanism based on smart contracts using private blockchain. idea involve stakeholders which...

10.1109/icoin48656.2020.9016456 article EN 2022 International Conference on Information Networking (ICOIN) 2020-01-01

While technology advancements are continuously improving, the energy efficiency of household appliances, consumption analysis, and providing feedback to consumers on this analysis remains a critical issue in ensuring effectiveness such improvements. Visual is promising technique for promoting conservation by applying demand response (DR) smart home management systems (SHEMSs). In article, we propose visualization (SHEV) system, an SHEMS that comprises three components: Appliance Profile...

10.1109/icjece.2021.3134499 article EN Canadian Journal of Electrical and Computer Engineering 2022-01-01

DDoS (Distributed Denial of Service) attacks have emerged as a serious menace to the security and integrity data information systems. The primary aim this attack is take down targeted system prevent legitimate users from accessing its services. Identifying challenging task, it must be performed before initiating any countermeasure. detection has been effectively applied in many studies using Machine Learning (ML) Deep (DL). However, existing models are unable recognize distinct dynamic...

10.1109/iwcmc55113.2022.9824189 article EN 2022 International Wireless Communications and Mobile Computing (IWCMC) 2022-05-30

Spare capacity allocation serves as one of the most critical tasks in dynamic GMPLS networks to meet stringent network availability constraint stipulated SLA each connection. In this paper, an availability-aware spare reconfiguration scheme based on shared backup path protection (SBPP) is proposed, aiming guarantee E2E LSP. We first provide model for a SBPP connection that composed working and SRG-disjoint LSP pair presence all possible single, dual simultaneous failures. Partial restoration...

10.1109/tr.2008.2006037 article EN IEEE Transactions on Reliability 2008-11-12

Vehicles are becoming increasingly connected to the outside world. We can connect our devices vehicle's infotainment system and internet is being added as a functionality. Therefore, security major concern attack surface has become much larger than before. Consequently, attackers creating malware that infect vehicles perform life-threatening activities. For example, compromise vehicle ECUs cause unexpected consequences. Hence, ensuring of software networks extremely important gain consumer...

10.1109/vtcspring.2019.8746516 article EN 2022 IEEE 95th Vehicular Technology Conference: (VTC2022-Spring) 2019-04-01
Coming Soon ...