Basheer Al-Duwairi Jordan University of Science & Technology



Similar documents
Basheer Al-Duwairi Jordan University of Science & Technology

MS in Computer Science with specialization in Computer Security. Prof. Clifford Neuman

Department of Electronic Information Engineering, Beihang Univerisity Specialization: Electrical Engineering, Completion: July 2004

FEDERATED CLOUD: A DEVELOPMENT IN CLOUD COMPUTING AND A SOLUTION TO EDUCATIONAL NEEDS

Security Infrastructure for Trusted Offloading in Mobile Cloud Computing

BSc in Information Technology Degree Programme. Syllabus

BSc in Information Systems & BSc in Information Technology Degree Programs

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Analyze & Classify Intrusions to Detect Selective Measures to Optimize Intrusions in Virtual Network

DBaaS Using HL7 Based on XMDR-DAI for Medical Information Sharing in Cloud

Security and Privacy in Big Data, Blessing or Curse?

Ch. 4 - Topics of Discussion

Trust Model for Hybrid Security Architecture Based on Reputation for Secure Execution of Mobile Agents

TECHNOLOGY ANALYSIS FOR INTERNET OF THINGS USING BIG DATA LEARNING

M.Tech. Software Systems

Cyber-Physical System Security of the Power Grid

Logical Data Models for Cloud Computing Architectures

A NOVEL APPROACH FOR PROTECTING EXPOSED INTRANET FROM INTRUSIONS

Mobile Cloud Computing In Business

Experiments in Collaborative Cloud-based Distance Learning

2. What are your learning objectives or outcomes associated with each student learning goal?

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

How To Protect Your Mobile From Attack From A Signalling Storm

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DIR Contract Number DIR-TSO-2621 Appendix C Pricing Index

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.

Master's Degree Program in Computer Science

International Journal of Scientific & Engineering Research, Volume 6, Issue 5, May ISSN

CURRICULUM VITAE. Dept. of Mechanical Engineering and Industrial Design Τ.Ε.Ι. of Western Macedonia KOZANI, GREECE

Denial of Service Attacks and Resilient Overlay Networks

Turgut Ozal University. Computer Engineering Department. TR Ankara, Turkey

Pedagogical Use of Tablet PC for Active and Collaborative Learning

CURRICULUM VITAE. De Montfort University - Leicester - UK 2008 PhD Degree in Architecture-Product and Spatial Design

CIO and Cyber Security Overview Argonne National Laboratory. Michael A. Skwarek CIO Matthew A. Kwiatkowski CISO Oct. 12, 2011

Publications of Ugo Fiore

Infrastructure as a Service (IaaS)

Curriculum Vitae of. Vicky G. Papadopoulou

Seminar: Security Metrics in Cloud Computing ( se)

Using Business Intelligence to Mitigate Graduation Delay Issues

Dr. Shashank Srivastava. Contact. Telephone: Teaching. Courses Taught: Current Courses: Past Courses:

Securing Cloud From Ddos Attacks Using Intrusion Detection System In Virtual Machine

Curriculum Vitae... Education: 2001 Ph.D. Computer Machines, Systems and Networks; Lviv University, Lviv

ASSESSMENT PLAN: M.S. in Computer Science

A Secure Strategy using Weighted Active Monitoring Load Balancing Algorithm for Maintaining Privacy in Multi-Cloud Environments

Authentication. Authorization. Access Control. Cloud Security Concerns. Trust. Data Integrity. Unsecure Communication

IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 1, Issue 1, March, 2013 ISSN:

Firewalls and Intrusion Detection

Curriculum Vitae RESEARCH INTERESTS EDUCATION. SELECTED PUBLICATION Journal. Current Employment: (August, 2012 )

Cloud Computing for Agent-based Traffic Management Systems

RESUME. Rashid Alammari, Ph.D Associate Professor

B.Sc. in Computer Engineering, School of Electrical and Computer Engineering,

Alessia Garofalo. Critical Infrastructure Protection Cyber Security for Wireless Sensor Networks. Fai della Paganella, 10-12/02/2014

UNCLASSIFIED. UNCLASSIFIED Office of Secretary Of Defense Page 1 of 8 R-1 Line #50

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

CIS 253. Network Security

Network Security Using Hybrid Port Knocking

University of Maryland Cybersecurity Center (MC 2 )

Centers of Academic Excellence in Cyber Security (CAE-C) Knowledge Units Review

A SYSTEM FOR VALIDATING AND COMPARING HOST-BASED DDOS DETECTION MECHANISMS

Ming-Hsing Chiu. Home: (985) Chapel Loop Office: (985) EDUCATION

A Survey on Security Threats and Security Technology Analysis for Secured Cloud Services

Cyber Security of the Power Grid

Prairie View A&M University Computer Science Department 招 生 简 介

Ashok Kumar Gonela MTech Department of CSE Miracle Educational Group Of Institutions Bhogapuram.

HA THU LE. Biography EDUCATION

An Efficient Methodology for Detecting Spam Using Spot System

Detecting Image Spam Using Image Texture Features

FACULTY OF VIENNA UNIVERSITY OF TECHNOLOGY (TU WIEN) Science and Technology in the Information Age

CONTENT. King Abdullah II Faculty of Engineering

ATTACKS ON CLOUD COMPUTING. Nadra Waheed

DoS Attack and Its Countermeasure in Energy-Constrained Wireless Networks

A Survey on Methods to Defend against DDoS Attack in Cloud Computing

Identifying Potentially Useful Header Features for Spam Filtering

Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System

3-12 Autonomous Access Control among Nodes in Sensor Networks with Security Policies

C.V. Personal Information

CURRICULUM VITAE. Taha Abdelshafy Abdelhakim Khalaf. Assistant Professor. Electrical Engineering Dept. Assiut University. Assiut, Egypt.

Glasnost or Tyranny? You Can Have Secure and Open Networks!

Information Security at ETH Zurich Institute of Information Security at ETH Zurich Zurich Information Security and Privacy Center

A Model-based Methodology for Developing Secure VoIP Systems

Transcription:

Basheer Al-Duwairi Jordan University of Science & Technology

Assistant Professor Department of Network Engineering & Security @ JUST Education: PhD, Iowa State University, 2005 Ms, Iowa State University, 2002 BSc, Jordan University of Science & Technology Research interests Network security DDoS attacks Botnets Cloud security

Established 1986 Type Public Students 25,000 International 5,000 Location Al-Ramtha, Jordan Campus Area Urban 11 square Kilometers Faculty members 850 Colleges 10

Department Computer Engineering (CPE) Network Engineering & Security (NES) Computer Science (CS) Computer & Information Systems (CIS) Software Engineering (SE) Programs BSc, MS BSc BSc, MS BSc BSc Service Science Management & Engineering (SSME) (under construction jointly with IBM). Total # students 1500 # Faculty members 50 BSc

Network Engineering & Security Department Established in 2009 11 Faculty members 350 Students Rich curriculum Computers Networks (4 courses) Computer & Network Security (3 courses) Wireless Networking (2 courses) Multimedia systems (2 courses) Advanced topics (3 elective courses)

Basheer Al-Duwairi DDoS attacks, mitigation and traceback Botnets Smartphone security Cloud Security Ahmad Al-Hammouri Cyber-Physical Systems (also known as Networked Control Systems), Smart power grid, Monther Al-Duwairi hardware algorithms and architectures for network processing and security Intrusion detection systems Graduate students & Research Assistants 7 Ms students 4 research assistants

Developing techniques to provide DDoS protection service Zakaria Al-Qudah, Basheer Al-Duwairi, and Osama Al-Khaleel, DDoS Protection as a Service: Hiding Behind the Giants, To appear in International Journal of Computational Science and Engineering B. Al-Duwairi and Abdul-Raheem Mustafa, Request diversion: a novel mechanism to counter P2P-based DDoS attacks, In Proc. Int. J. Internet Protocol Technology. Vol. 5, Nos. 1/2, 2010 B. Al-Duwairi and G. Manimaran, JUST-Google: A search engine based defense against botnet-based DDoS attacks,. In Proc. IEEE ICC 2009, Dersen, Germany. Collaboration project with a team from TU Berlin, Summer

Fast Flux Characterization and Detection Smartphone Botnets Detection algorithms for SMS-based mobile botnets New designs (centralized, P2P, Hybrid) Botnet Detection B. Al-Duwairi and Lina Al-Ibbini, BotDigger: Autonomous and Intelligent Botnet Detector. In Proc. of the 5 th International Conference for Internet Monitoring and Protection (ICIMP 2010), Barcelona, Spain.

Email spam detection Omar Al-Jarrah, Ismail Khater, and Basheer Al-Duwairi, Identifying Potentially useful header features for email spam filtering. In Proc. of the Sixth International Conference on Digital Society (ICDS ), Valencia, Spain, Feb.. B. Al-Duwairi, Ismail Khater, and Omar Al-Jarrah, Texture Analysis Based Image Spam Filtering. In Proc. the 6th International Conference for Internet Technology and Secured Transactions (ICITST-2011), Abu Dhabi, Dec. 2011. ConTest: A GUI-Based Tool to Manage Internet-Scale Experiments over PlanetLab SOA Based Migration of JUST Enterprise Systems to the Cloud