Match!
Maryam Var Naseri
Universiti Teknologi Malaysia
Mobile computingBotnetComputer securityMobile searchComputer science
6Publications
3H-index
59Citations
What is this?
Publications 6
Newest
#1Meisam Eslahi (Asia Pacific University of Technology & Innovation)H-Index: 1
#2Wardah Zainal Abidin (UTM: Universiti Teknologi Malaysia)H-Index: 3
Last. Maryam Var Naseri (UTM: Universiti Teknologi Malaysia)H-Index: 3
view all 3 authors...
The latest generation of Botnets use HTTP protocol and port 80 as their communication medium to impersonate themselves as normal web users and avoid current security solutions. In addition, the Botmasters who control the infected devices employ several techniques, such as encryption, code obfuscation, anti-honeypot capabilities and random communication patterns to keep their Bots undetectable as long as possible. However, Bots are designed to be a coordinated form of organized cyberattack in whi...
2 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Moslem Yousefi (TNB: Universiti Tenaga Nasional)H-Index: 13
Last. Habibah HashimH-Index: 11
view all 6 authors...
The dynamic nature of Botnets along with their sophisticated characteristics makes them one of the biggest threats to cyber security. Recently, the HTTP protocol is widely used by Botmaster as they can easily hide their command and control traffic amongst the benign web traffic. This paper proposes a Neural Network based model to detect mobile HTTP Botnets with random intervals independent of the packet payload, commands content, and encryption complexity of Bot communications. The experimental ...
3 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Moslem YousefiH-Index: 13
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 6 authors...
Recently, the mobile devices are well integrated with Internet and widely used by normal users and organizations which employ Bring Your Own Device technology. On the other hand, the mobile devices are less protected in comparison to computers. Therefore, the mobile devices and networks have now become attractive targets for attackers. Amongst several types of mobile threats, the mobile HTTP Botnets can be considered as one of the most sophisticated attacks. A HTTP Bots stealthily infect mobile ...
2 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Mohd Saufy Rohmad (UiTM: Universiti Teknologi MARA)H-Index: 3
Last. Habibah Hashim (UiTM: Universiti Teknologi MARA)H-Index: 11
view all 6 authors...
Recently, the HTTP based Botnet threat has become a serious challenge for security experts as Bots can be distributed quickly and stealthily. With the HTTP protocol, Bots hide their communication flows within the normal HTTP flows making them more stealthy and difficult to detect. Furthermore, since the HTTP service is being widely used by the Internet applications, it is not easy to block this service as a precautionary measure and other techniques are required to detect and deter the Bot menac...
15 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Mohammad Reza Rostami (UTM: Universiti Teknologi Malaysia)H-Index: 1
Last. Maryam Var Naseri (Asia Pacific University of Technology & Innovation)H-Index: 3
view all 5 authors...
Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capabilities has made them an environment of interest for cyber criminals. Therefore, the spread of sophisticated malware such as Botnets has significantly increased in mobile devices and networks. On the other hand, the Bots and Botnets are newly migrated to mobile devices and have not ...
7 CitationsSource
#1Meisam Eslahi (UiTM: Universiti Teknologi MARA)H-Index: 6
#2Maryam Var Naseri (Asia Pacific University of Technology & Innovation)H-Index: 3
Last. Ezril Hisham Mat Saad (UiTM: Universiti Teknologi MARA)H-Index: 1
view all 5 authors...
Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees' satisfaction and...
30 CitationsSource
1