- Network Security and Intrusion Detection
- Network Packet Processing and Optimization
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Context-Aware Activity Recognition Systems
- Wireless Body Area Networks
- User Authentication and Security Systems
- Biometric Identification and Security
- Bluetooth and Wireless Communication Technologies
- Software-Defined Networks and 5G
Nottingham Trent University
2020-2021
Omar Al-Mukhtar University
2019
Coventry University
2013-2018
With the various and increasingly malicious attacks on networks wireless systems, traditional security tools such as anti-virus programs firewalls are not sufficient to provide free, integrated, reliable secure networks. Intrusion detection systems (IDSs) one of most tested technologies monitor incoming outgoing network traffic identify unauthorized usage mishandling computer system It is critical implement intrusion (NIDSs) in that have high high-speed connectivity. Due fact software NIDSs...
This paper presents an investigation, involving experiments, which shows that current network intrusion, detection, and prevention systems (NIDPSs) have several shortcomings in detecting or preventing rising unwanted traffic threats high-speed environments. It the NIDPS performance can be weak face of high-load malicious terms packet drops, outstanding packets without analysis, failing to detect/prevent traffic. A novel quality service (QoS) architecture has been designed increase intrusion...
Internet of Medical Things is the internet connection medical devices to perform services and processes support healthcare sector. Wearable Technology in Healthcare has seen tremendous growth recent times. This due a global increase aging population, need for disease management, effective patient monitoring. The prevalent technology wearable Bluetooth its low cost, energy, size. Despite recorded adoption IoMT, there are concerns by users other stakeholders about security privacy issues with...
This paper presents a comprehensive investigation, backed up by detailed simulations, that the default settings of software based open source Intrusion Detection and Prevention Systems (IDPs) are not enough to thwart network attacks in modern high-speed IPv6-only environment. It aims solve this problem improving processing capabilities an IDPS more than one way, with each method being totally independent from other. The proposed solution can be implemented any user running IDPS, without...