Amira Kotb
Cairo University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Amira Kotb.
Procedia Computer Science | 2011
Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari
Abstract Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs) are required to develop a strong security scheme it is therefore necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol, an IDS mechanism to accurately detect and isolate misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The collaboration of a group of neighbor nodes is used to make accurate decisions. Creating and broadcasting attackers list to neighbor nodes enables other node to isolate misbehavior nodes by eliminating them from the routing table. Eliminating misbehavior node allows the source to select another trusted path to its destination. The simulation results show that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
International Journal of Advanced Computer Science and Applications | 2013
Ahmed Mohamed Abdalla; Ahmad H. Almazeed; Imane Aly Saroit; Amira Kotb
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security mechanism it is necessary to understand how malicious nodes can attack the MANETs. A new IDS mechanism is presented based on End-to-End connection for securing Optimized Link State Routing (OLSR) routing protocol. This new mechanism is named as Detection and Isolation Packet Dropped Attackers in MANETs (DIPDAM). DIPDAM mechanism based on three ID messages Path Validation Message (PVM) , Attacker Finder Message (AFM) and Attacker Isolation Message (AIM). DIPDAM mechanism based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
international conference on computer technology and development | 2010
Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari
Several approaches have been proposed for Intrusion Detection Systems (IDS) in Mobile Ad hoc Networks (MANETs). Due to lack of MANETs infrastructure and well defined perimeter MANETs are susceptible to a variety of attacker types. To develop a strong security scheme it is necessary to understand how malicious nodes can attack the MANETs. Focusing on the Optimized Link State Routing (OLSR) protocol an IDS mechanism to accurately detect misbehavior node(s) in OLSR protocol based on End-to-End (E2E) communication between the source and the destination is proposed. The simulation results showed that the proposed mechanism is able to detect any number of attackers while keeping a reasonably low overhead in terms of network traffic.
international conference on sciences of electronics technologies of information and telecommunications | 2012
Yousef Sabbah; Imane Aly Saroit; Amira Kotb
This paper presents a theoretical model for summative e-assessment in distance learning for the future, where exams can be conducted distantly, e.g. at home. This model aims to provide e-learning systems with an authentication approach that guarantees cheating-free summative e-assessment. It utilizes a combination of live video monitoring and a bimodal biometrics approach. Together they form a robust and highly secure model to ensure that the examinee is the correct person throughout the e-assessment period without a need for a proctor. Advanced techniques of image and video processing and feature extraction are required to implement this model.
Egyptian Informatics Journal | 2017
Hend Gamal El Din Hassan Ali; Imane Aly Saroit; Amira Kotb
International journal of advanced computer science | 2011
Ahmed Mohamed Abdalla; Imane Aly Saroit; Amira Kotb; Ali Hassan Afsari
Biometrics and Bioinformatics | 2012
Yousef Sabbah; Imane Aly Saroit; Amira Kotb
2011 RoEduNet International Conference 10th Edition: Networking in Education and Research | 2011
Yousef Sabbah; Imane Aly Saroit; Amira Kotb
Archive | 2011
Yousef Sabbah; Imane Aly Saroit; Amira Kotb
The Egyptian Computer Science Journal (ESC) | 2016
Hesham N. Elmahdy; Heba Sherif Sobhy; Amira Kotb