Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ali Hadi is active.

Publication


Featured researches published by Ali Hadi.


2016 Cybersecurity and Cyberforensics Conference (CCC) | 2016

A Preliminary Analysis of Drive-by Email Attacks in Educational Institutes

Ja'far Alqatawna; Ali Hadi; Malek Al-Zwairi; Mariam Khader

In this study we investigate malicious spam emails in the context of educational institutes. The goal of the study is two folds, first, is to explore spam types of attacks and what their malicious contents may include and secondly, to analyze if these attacks exhibit discriminative characteristics. This study offers an empirical analysis of spam emails dataset and provides a rich set of features that exist in the dataset. The features could then be used by researchers to build new intelligent systems that are capable of classifying and blocking spam emails.


Archive | 2017

Using IPython for Teaching Web Scraping

Ali Hadi; Malek Al-Zewairi

Web scraping constitutes an indispensable part of information gathering and data intelligence. IPython has been the de facto project for data science since 2001. In this chapter, IPython is employed to support educators in teaching the fundamentals of web scraping. The authors identify providing detailed labs as free online resources together with model answers as the main contribution of this chapter.


2016 Cybersecurity and Cyberforensics Conference (CCC) | 2016

Covert Communication Using Port Knocking

Mariam Khader; Ali Hadi; Amjad Hudaib

Data theft and espionage attacks, which is evolved rapidly, impose the need to develop new and stealthy communication techniques to protect sensitive data that is transferred over the Internet. These new techniques should be built in different way than traditional and known communication techniques, in order to eschew detection and monitoring tools. This paper proposes a new covert channel for stealthy communication. The communication channel uses Least Significant Bit steganography and Tariq port knocking to hide data, besides that GnuPG encryption is applied before hiding the data to add another layer of protection. The communication efficiency has been evaluated using Peak Signal to Noise Ratio, and the result indicates better image quality compared with other techniques. Also, the maximum capacity and transfer rate of the channel have been evaluated, the channel is capable to achieve 152 bps as a maximum transmission rate in its current implementation.


2015 Fourth International Conference on Cyber Security, Cyber Warfare, and Digital Forensic (CyberSec) | 2015

MLDED: Multi-layer Data Exfiltration Detection System

Mohammad Ahmad Abu Allawi; Ali Hadi; Arafat Awajan

Due to the growing advancement of crime ware services, the computer and network security becomes a crucial issue. Detecting sensitive data exfiltration is a principal component of each information protection strategy. In this research, a Multi-Level Data Exfiltration Detection (MLDED) system that can handle different types of insider data leakage threats with staircase difficulty levels and their implications for the organization environment has been proposed, implemented and tested. The proposed system detects exfiltration of data outside an organization information system, where the main goal is to use the detection results of a MLDED system for digital forensic purposes. MLDED system consists of three major levels Hashing, Keywords Extraction and Labeling. However, it is considered only for certain type of documents such as plain ASCII text and PDF files. In response to the challenging issue of identifying insider threats, a forensic readiness data exfiltration system is designed that is capable of detecting and identifying sensitive information leaks. The results show that the proposed system has an overall detection accuracy of 98.93%.


Archive | 2010

Network Security Using Hybrid Port Knocking

Hussein Al-Bahadili; Ali Hadi


International Journal of Computer Network and Information Security | 2015

A Model for Detecting Tor Encrypted Traffic using Supervised Machine Learning

Alaeddin Almubayed; Ali Hadi; Jalal Atoum


Archive | 2012

A Hybrid Port-Knocking Technique for Host Authentication

Ali Hadi; Hussein Al-Bahadili


2017 2nd International Conference on the Applications of Information Technology in Developing Renewable Energy Processes & Systems (IT-DREPS) | 2017

Vulnerability scanning of IoT devices in Jordan using Shodan

Haneen Al-Alami; Ali Hadi; Hussein Al-Bahadili


Int'l J. of Communications, Network and System Sciences | 2015

Ultrasurf Traffic Classification: Detection and Prevention

Raed Al-Qura’n; Ali Hadi; Jalal Atoum; Malek Al-Zewairi


Digital Investigation | 2018

HDFS file operation fingerprints for forensic investigations

Mariam Khader; Ali Hadi; Ghazi Al-Naymat

Collaboration


Dive into the Ali Hadi's collaboration.

Top Co-Authors

Avatar

Mariam Khader

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Jalal Atoum

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Malek Al-Zewairi

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Ghazi Al-Naymat

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Alaeddin Almubayed

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Arafat Awajan

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Haneen Al-Alami

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Malik Qasaimeh

Princess Sumaya University for Technology

View shared research outputs
Top Co-Authors

Avatar

Mohammad Ahmad Abu Allawi

Princess Sumaya University for Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge