Ehab Al‐Shaer

ORCID: 0000-0002-7665-8293
Publications
Citations
Views
---
Saved
---
About
Contact & Profiles
Research Areas
  • Network Security and Intrusion Detection
  • Information and Cyber Security
  • Network Packet Processing and Optimization
  • Internet Traffic Analysis and Secure E-voting
  • Advanced Malware Detection Techniques
  • Software-Defined Networks and 5G
  • Smart Grid Security and Resilience
  • Software System Performance and Reliability
  • Network Traffic and Congestion Control
  • Security and Verification in Computing
  • Spam and Phishing Detection
  • Cloud Computing and Resource Management
  • Software Engineering Research
  • Peer-to-Peer Network Technologies
  • Formal Methods in Verification
  • Software Reliability and Analysis Research
  • Mobile Agent-Based Network Management
  • Access Control and Trust
  • Distributed systems and fault tolerance
  • Multimedia Communication and Technology
  • Software Testing and Debugging Techniques
  • Service-Oriented Architecture and Web Services
  • Topic Modeling
  • Energy Efficient Wireless Sensor Networks
  • Advanced Software Engineering Methodologies

Carnegie Mellon University
2020-2024

Qatar University
2024

University of North Carolina at Charlotte
2011-2020

Interface (United Kingdom)
2013

University of North Carolina at Chapel Hill
2011-2012

North Carolina State University
2011

Cyber University
2011

DePaul University
2000-2009

University of Waterloo
2007-2008

Marymount University
2008

Static configurations serve great advantage for adversaries in discovering network targets and launching attacks. Identifying active IP addresses a target domain is precursory step many Frequently changing hosts' novel proactive moving defense (MTD) that hides assets from external/internal scanners. In this paper, we use OpenFlow to develop MTD architecture transparently mutates host with high unpredictability rate, while maintaining configuration integrity minimizing operation overhead. The...

10.1145/2342441.2342467 article EN 2012-08-13

Firewalls are core elements in network security. However, managing firewall rules, particularly multi-firewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered distributed carefully order avoid policy anomalies that might cause vulnerability. Therefore, inserting or modifying any requires thorough intra- inter-firewall analysis determine the proper rule placement ordering firewalls. We identify all could exist single-...

10.1109/infcom.2004.1354680 article EN 2005-02-22

Firewalls are core elements in network security. However, managing firewall rules, particularly, multifirewall enterprise networks, has become a complex and error-prone task. Firewall filtering rules have to be written, ordered, distributed carefully order avoid policy anomalies that might cause vulnerability. Therefore, inserting or modifying any requires thorough intrafirewall interfirewall analysis determine the proper rule placement ordering firewalls. In this paper, we identify all...

10.1109/jsac.2005.854119 article EN IEEE Journal on Selected Areas in Communications 2005-10-01

It is difficult to build a real network test novel experiments. OpenFlow makes it easier for researchers run their own experiments by providing virtual slice and configuration on networks. Multiple users can share the same assigning different each one. Users are given responsibility maintain use writing rules in FlowTable. Misconfiguration problems arise when user writes conflicting single FlowTable or even within path of multiple switches that need FlowTables be maintained at time.

10.1145/1866898.1866905 article EN 2010-10-04

Firewalls are core elements in network security. However, managing firewall rules, especially for enterprise networks, has become complex and error-prone. Firewall filtering rules have to be carefully written organized order correctly implement the security policy. In addition, inserting or modifying a rule requires thorough analysis of relationship between this other determine proper commit updates. paper we present set techniques algorithms that provide automatic discovery policy anomalies...

10.1109/tnsm.2004.4623689 article EN IEEE Transactions on Network and Service Management 2004-04-01

Network security polices are essential elements in Internet devices that provide traffic filtering, integrity, confidentiality, and authentication. perimeter such as firewalls, IPSec, IDS/IPS operate based on locally configured policies. However, configuring network policies remains a complex error-prone task due to rule dependency semantics the interaction between network. This complexity is likely increase size increases. A successful deployment of system requires global analysis policy...

10.1109/mcom.2006.1607877 article EN IEEE Communications Magazine 2006-03-01

Recent studies show that configurations of network access control is one the most complex and error prone management tasks. For this reason, misconfiguration becomes main source for unreachablility vulnerability problems. In paper, we present a novel approach models global end-to-end behavior entire including routers, IPSec, firewalls, NAT unicast multicast packets. Our model represents as state machine where packet header location determines state. The transitions in are determined by...

10.1109/icnp.2009.5339690 article EN 2009-10-01

With the rapid growth of cyber attacks, sharing threat intelligence (CTI) becomes essential to identify and respond attack in timely cost-effective manner. However, with lack standard languages automated analytics information, analyzing complex unstructured text CTI reports is extremely time- labor-consuming. Without addressing this challenge, will be highly impractical, uncertainty time-to-defend continue increase.

10.1145/3134600.3134646 article EN 2017-12-04

Network reconnaissance of addresses and ports is prerequisite to a vast majority cyber attacks. Meanwhile, the static address configuration networks hosts simplifies adversarial for target discovery. Although randomization host has been suggested as proactive disruption mechanism against such reconnaissance, proposed approaches do not exploit full potentials in provision unpredictability attack adaptability. Moreover, these provide thorough analysis on effectiveness limitations relevant...

10.1109/tifs.2015.2467358 article EN IEEE Transactions on Information Forensics and Security 2015-08-13

In the current network protocol infrastructure, forwarding routes are mostly static except in case of failures or performance issues. However, route selection offers a significant advantage for adversaries to eavesdrop, launch DoS attacks on certain flows. Previous works multipath routing wireless networks propose using random avoid jamming and blackhole [18]. this work is far from being practical wired because many topological QoS constraints. Moreover, potential finding number disjoint...

10.1109/cns.2013.6682715 article EN 2013-10-01

The new attack surface being crafted by the huge influx of IoT devices is both formidable and unpredictable, as it introduces a rich set unexplored techniques unknown vulnerabilities. These are hard to perceive through traditional means, owing concealed cascaded inter-device, inter-system device-environment dependencies. In this paper, we present IoTSAT, formal framework for security analysis IoT. IoTSAT formally models generic behavior system systems, based on device configurations, network...

10.1109/cns.2016.7860484 article EN 2016-10-01

IPSec has become the defacto standard protocol for secure Internet communications, providing traffic integrity, confidentiality and authentication. Although supports a rich set of protection modes operations, its policy configuration remains complex error-prone task. The semantics IP Sec policies that allow triggering multiple rule actions with different security modes/operations coordinated between gateways in network increases significantly potential misconfiguration thereby insecure...

10.1109/icnp.2005.25 article EN 2006-10-11

State estimation plays a critically important role in ensuring the secure and reliable operation of electric grid. Recent works have shown that state process is vulnerable to stealthy attacks where an adversary can alter certain measurements corrupt solution process, but evade existing bad data detection algorithms remain invisible system operator. Since result used compute optimal power flow perform contingency analysis, incorrect undermine economic operation. However, needs sufficient...

10.1145/2663474.2663482 article EN 2014-11-03

The static one-to-one binding of hosts to IP addresses allows adversaries conduct thorough reconnaissance in order discover and enumerate network assets. Specifically, this fixed address mapping distributed scanners aggregate information gathered at multiple locations over different times construct an accurate persistent view the network. unvarying nature enables collaboratively share reuse their collected various stages attack planning execution. This paper presents a novel moving target...

10.1145/2663474.2663483 article EN 2014-11-03

Packet filtering plays a critical role in many of the current high speed network technologies such as firewalls and IPSec devices. The optimization firewall policies is critically important to provide performance packet particularly for security. Current techniques exploit characteristics policies, but they do not consider traffic behavior optimizing their search data structures. This results impractically space complexity, which undermines gain offered by these techniques. Also, offer upper...

10.1145/1128817.1128867 article EN 2006-03-21

Firewalls are core elements in network security. However, managing firewall rules, especially for enterprize networks, has become complex and error-prone. Firewall filtering rules have to be carefully written organized order correctly implement the security policy. In addition, inserting or modifying a rule requires thorough analysis of relationship between this other determine proper commit updates. paper, we present set techniques algorithms that provide (1) automatic discovery policy...

10.1109/inm.2003.1194157 article EN 2003-10-15

Firewall is the de facto core technology of today's network security and defense. However, management firewall rules has been proven to be complex, error-prone, costly inefficient for many large-networked organizations. These are mostly custom-designed hand-written thus in constant need tuning validation, due dynamic nature traffic characteristics, ever-changing environment its market demands. One main problems that we address this paper how much useful, up-to-dated, well-organized or...

10.1109/noms.2006.1687561 article EN 2006-01-01

Evaluation of network security is an essential step in securing any network. This evaluation can help professionals making optimal decisions about how to design countermeasures, choose between alternative architectures, and systematically modify configurations order improve security. However, the a depends on number dynamically changing factors such as emergence new vulnerabilities threats, policy structure traffic. Identifying, quantifying validating these using metrics major challenge this...

10.1109/infocom.2008.260 article EN 2008-04-01

Network reconnaissance of IP addresses and ports is prerequisite to many host network attacks. Meanwhile, static configurations networks hosts simplify this adversarial reconnaissance. In paper, we present a novel proactive-adaptive defense technique that turns end-hosts into untraceable moving targets, establishes dynamics systems by monitoring the behavior reconfiguring adaptively. This adaptability achieved discovering hazardous ranges evacuating from them quickly. Our approach maximizes...

10.1109/infocom.2015.7218443 article EN 2015-04-01

DDoS attacks have been a persistent threat to network availability for many years. Most of the existing mitigation techniques attempt protect against by filtering out attack traffic. However, as critical resources are usually static, adversaries able bypass sending stealthy low traffic from large number bots that mimic benign behavior. Sophisticated on links can cause devastating effect such partitioning domains and networks. In this paper, we propose defend proactively changing footprint in...

10.1109/infocom.2015.7218442 article EN 2015-04-01
Coming Soon ...