Match!
Meisam Eslahi
Universiti Teknologi MARA
Mobile computingBotnetComputer securityMobile searchMobile Web
9Publications
6H-index
136Citations
What is this?
Publications 9
Newest
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Moslem Yousefi (TNB: Universiti Tenaga Nasional)H-Index: 13
Last. Habibah HashimH-Index: 11
view all 6 authors...
The dynamic nature of Botnets along with their sophisticated characteristics makes them one of the biggest threats to cyber security. Recently, the HTTP protocol is widely used by Botmaster as they can easily hide their command and control traffic amongst the benign web traffic. This paper proposes a Neural Network based model to detect mobile HTTP Botnets with random intervals independent of the packet payload, commands content, and encryption complexity of Bot communications. The experimental ...
3 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Moslem YousefiH-Index: 13
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 6 authors...
Recently, the mobile devices are well integrated with Internet and widely used by normal users and organizations which employ Bring Your Own Device technology. On the other hand, the mobile devices are less protected in comparison to computers. Therefore, the mobile devices and networks have now become attractive targets for attackers. Amongst several types of mobile threats, the mobile HTTP Botnets can be considered as one of the most sophisticated attacks. A HTTP Bots stealthily infect mobile ...
2 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Mohd Saufy Rohmad (UiTM: Universiti Teknologi MARA)H-Index: 3
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 6 authors...
Recently, the HTTP based Botnet threat has become a serious challenge for security experts as Bots can be distributed quickly and stealthily. With the HTTP protocol, Bots hide their communication flows within the normal HTTP flows making them more stealthy and difficult to detect. Furthermore, since the HTTP service is being widely used by the Internet applications, it is not easy to block this service as a precautionary measure and other techniques are required to detect and deter the Bot menac...
15 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Mohammad Reza Rostami (UTM: Universiti Teknologi Malaysia)H-Index: 1
Last. Maryam Var Naseri (Asia Pacific University of Technology & Innovation)H-Index: 3
view all 5 authors...
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capabilities has made them an environment of interest for cyber criminals. Therefore, the spread of sophisticated malware such as Botnets has significantly increased in mobile devices and networks. On the other hand, the Bots and Botnets are newly migrated to mobile devices and have not ...
7 CitationsSource
#2Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
Last. Zuraini IsmailH-Index: 9
view all 4 authors...
In recent years, the HTTP has become dominant protocol among other protocols for the Internet services as it provides a set of rules to manage the data exchange between servers and browsers. On the other hand, this standard protocol has been widely used in the latest generation of botnets to establish their command and control channel and hide their malicious activities among normal Web traffic. Therefore, analyzing HTTP traffic has become a common method in current HTTP-based botnet detection s...
4 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Maryam Var Naseri (Asia Pacific University of Technology & Innovation)H-Index: 3
Last. Ezril Hisham Mat Saad (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees' satisfaction and...
30 CitationsSource
#1Meisam Eslahi (UM: University of Malaya)H-Index: 6
#2Habibah HashimH-Index: 11
Last. Nooritawati Md TahirH-Index: 12
view all 3 authors...
In recent years, bots and botnets have become one of the most dangerous infrastructure to carry out nearly every type of cyber-attack. Their dynamic and flexible nature along with sophisticated mechanisms makes them difficult to detect. One of the latest generations of botnet, called HTTP-based, uses the standard HTTP protocol to impersonate normal web traffic and bypass the current network security systems (e.g. firewalls). Besides, HTTP protocol is commonly used by normal applications and serv...
21 CitationsSource
Dec 1, 2012 in ISIE (International Symposium on Industrial Electronics)
#1Meisam Eslahi (UM: University of Malaya)H-Index: 6
#2Rosli Salleh (UM: University of Malaya)H-Index: 15
Last. Nor Badrul Anuar (UM: University of Malaya)H-Index: 31
view all 3 authors...
Mobile devices are now well integrated with advanced capabilities and technologies such as the Internet. Today, mobile security has become a globally critical issue due to the high usage of mobile devices, their convenience and mobility. However, they are not properly protected compared to computer and computer networks, and the users pay less attention to the security updates. Recently, mobile devices and networks have been targeted by one of the most dangerous cyber threats, known as botnets. ...
31 CitationsSource
#1Meisam Eslahi (UM: University of Malaya)H-Index: 6
#2Rosli Salleh (UM: University of Malaya)H-Index: 15
Last. Nor Badrul Anuar (UM: University of Malaya)H-Index: 31
view all 3 authors...
Recently, botnets have become the biggest threat to cyber security and have been used as an infrastructure to carry out nearly every type of cyber attack. They have a dynamic and flexible nature and the botmasters, who control them, update the bots and change their codes from day to day to avoid the current detection methods. In this paper, we present an overview of botnets' characteristics along with their malicious activities. We also review the current botnet detection methods in addition to ...
23 CitationsSource
1