Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Azween Abdullah is active.

Publication


Featured researches published by Azween Abdullah.


international conference on computer modelling and simulation | 2010

Comparative Analysis of Intrusion Detection Approaches

Iftikhar Ahmad; Azween Abdullah; Abdullah Sharaf Alghamdi

Information security is a serious issue especially in present age because a solo attack may cause a big harm in computer and network systems. Several intrusion detection approaches exist to tackle this critical issue but the problem is which one is more suitable in the field of intrusion. Further, these approaches are used in intrusion detection systems. Therefore, in this paper, we evaluated them so that a suitable approach may be advised to intrusion detection systems. This work describes the concepts, tool and methodology being used for evaluation analysis of different intrusion detection approaches using multi-criteria decision making technique. Moreover, conclusion on results is made and direction for future works is presented.


2015 5th National Symposium on Information Technology: Towards New Smart World (NSITNSW) | 2015

Predictive modeling for intrusions in communication systems using GARMA and ARMA models

Thulasy Ramiah Pillai; Sellappan Palaniappan; Azween Abdullah; Hafiz Muhammad Imran

The strength of time series modeling is generally not used in almost all current intrusion detection and prevention systems. By having time series models, system administrators will be able to better plan resource allocation and system readiness to defend against malicious activities. In this paper, we address the knowledge gap by investigating the possible inclusion of a statistical based time series modeling that can be seamlessly integrated into existing cyber defense system. Cyber-attack processes exhibit long range dependence and in order to investigate such properties a new class of Generalized Autoregressive Moving Average (GARMA) can be used. In this paper, GARMA (1,2; δ,1) model is fitted to cyber-attack data sets. Three different estimation methods are used to estimate the parameters. The Hannan-Rissanen Algorithm, Whittle Estimation Method and Maximum Likelihood Estimation methods are used to estimate the parameters of the GARMA (1,2;δ,1). Point forecasts to predict the attack rate possibly hours ahead of time also has been done and the performance of the models and estimation methods are discussed. The investigation of the case-study will confirm that by exploiting the statistical properties, it is possible to predict cyber-attacks (at least in terms of attack rate) with good accuracy. This kind of forecasting capability would provide sufficient early-warning time for defenders to adjust their defense configurations or resource allocations.


International Journal of Information Engineering and Electronic Business | 2012

Energy Optimization through Position Responsive Routing Protocol (PRRP) in Wireless Sensor Network

Noor Zaman; Azween Abdullah

Wireless Sensor Networks (WSNs) are consist of very tiny nodes structure, with very small batteries without having facility to recharge it. It works under any hard circumstances, hence this type of network is gaining high importance day by day. Maximum focus of researchers is to enhance or optimized its energy efficiency level. Routing protocol is the main energy expensive operation of sensor networks which utilize maximum energy resources of sensor network. Already a good number of routing protocols has been designed for energy efficiency or optimization with different approaches under controlled conditions. With this research we try to propose energy optimization of wireless sensor network through our proposed position response routing protocol (PRRP), under certain controlled parametric consideration. Research results shows a significant energy optimization in the life cycle of WSN. Index Terms—WSN, energy efficient, WSN routing protocol, GPS, PRRP, energy optimization


international conference on software engineering | 2015

Towards gamification in software traceability: Between test and code artifacts

Reza Meimandi Parizi; Asem Kasem; Azween Abdullah

With the ever-increasing dependence of our civil and social infrastructures to the correct functioning of software systems, the need for approaches to engineer reliable and validated software systems grows rapidly. Traceability is the ability to trace the influence of one software artifact on another by linking dependencies. Test-to-code traceability (relationships between test and system code) plays a vital role in the production, verification, reliability and certification of highly software-intensive dependable systems. Prior work on test-to-code traceability in contemporary software engineering environments and tools is not satisfactory and is limited with respect to the need regarding results accuracy, lack of motivation, and high required effort by developers/testers. This paper argues that a new research is necessary to tackle the above weaknesses. Thus, it advocates for the induction of gamification concepts in software traceability, and takes a position that the use of gamificaiton metrics can contribute to software traceability tasks in validating software and critical systems. We propose a research agenda to execute this position by providing a unifying foundation for gamified software traceability that combines self-adaptive, visualization, and predictive features for trace links.


International Symposium on Big Data Management and Analytics 2016 | 2017

Composite Visualization Features in PEVNET: A Framework for Visualization of Criminal Networks

Amer Rasheed; Uffe Kock Wiil; Azween Abdullah

Grouping of data is recognized as an effective way of managing a huge amount of data. Groups are very important for exploratory analysis of visualized networks. There are different issues with grouping; for instance data gets meshed up together which makes the interaction between the group members difficult to trace, the analysts find it difficult to analyze the data properly, and thus visualizing data for finding patterns become complex. We have studied different techniques for visualization of criminal data and found that by using different features of composites, the interaction between the different sub-groups can be improved to a large extent. In our proposed framework for visualization of networks, PEVNET, we have made an implementation with which the analysts can drag and drop data for efficient manipulation and have introduced two novel ways of grouping individual and composite data which include grouping the selected nodes and merging group into another group. Finally un-grouping groups is performed. We hope that by including these features, the PEVNET will serve as a handy tool for the analysts, since each and every feature of PEVNET is fulfilling most of the requirements that are needed to conduct a comprehensive analysis.


Advanced Science Letters | 2017

A Novel Fast Reroute Signaling Cost for Multicast Proxy Mobility

Azana Hafizah Mohd Aman; Aisha Hassan Abdalla Hashim; Azween Abdullah; Huda Adibah Mohd Ramli

 References  Citations  Supplementary Data  Article Media  Metrics  Suggestions  


international conference on computer and communication engineering | 2016

Performance Evaluation on Packet Loss Cost of an Enhanced Mobile Multicast Service in Proxy Network Mobility

Azana Hafizah Mohd Aman; Aisha-Hassan A. Hasim; Azween Abdullah; Huda Adibah Mohd Ramli

As forecasted by recent research, mobile Internet video traffic is reaching zettabyte capacity in 2019. The fast increments and great usage boost demand in providing high internet service performance. It has become an ongoing research trend to enhance available schemes to comply such demand. The aim of this paper is to propose a new mobile multicast scheme that is able to support high usage of mobile IP traffic. The new scheme is named as route optimized context with multicast fast reroute (RCMFR). The proposed scheme improved network mobility management multicast services support. The network mobility management is known as Proxy Mobile IPv6 (PMIPv6). The high performance of the proposed scheme is evaluated mathematically. The selected parameters are service recovery time and packet loss cost. The equations for the parameters are derived from signaling flow of the proposed scheme. Base solution is taken as the benchmark, therefore results are analyzed and compared with this scheme. The strengths of the suggested scheme is emphasized using quantitative analysis.


Archive | 2016

Position-Based Unicast Routing Protocols for Mobile Ad Hoc Networks Using the Concept of Blacklisting

Muhammad Aman; Asfandyar Khan; Azween Abdullah; Israr Ullah

Routing is the backbone of any computer network and mobile ad hoc networks (MANETs) are no exception to this rule. Position-based routing protocols are special kind of routing protocol that uses position information to route packet from source to destination. These protocols are considered as the most scalable solution, as they do not cause flooding in the whole network. Although performance of these protocols is better than most of their competitors but their recovery procedures create some burden on the network. After taking inspirations from different design principles adapted by the community, we have proposed a new simple position-based routing protocol using the concept of blacklisting. The goal of our protocol is reduce the load involved in recovery procedure and make it relatively simpler. Results of simulation show that our proposed protocol performs much better than its competitors.


Journal of Internet Technology | 2016

Towards Improving Security in VANET: Some New Possible Attacks and Their Possible Solutions

Irshad Ahmed Sumra; Azween Abdullah; Iftikhar Ahmad; Abdullah Sharaf Alghamdi

Vehicular ad hoc network (VANET) is taken more attention from the end user due to its potential safety and non-safety applications. The basic design objective of these applications to serve the users and provide safety of human lives during their journey. The role of the end user is more prominent for next generation vehicular networks. An attacker is one of type of end user, but their role in the network is negative and creates problems for other components of network. So in this paper, we will discuss two new types of attacks which are called road side traffic signal attack and also Internet attack in vehicular network. The authors will explain an attackers behaviour and how he/she will launch an attack on a road side traffic signal and Internet services and create problems for other users of network. Through different scenarios, it will explain the effect of these attacks on other components of network. Trusted Platform module (TPM) is a security hardware module and it is provided the secure communication in network, so we will discuss in detail how this security module will handle these newly address attacks in network.


Archive | 2015

Learning of Web Quality Evaluation: A Case Study of Malaysia National Museum Web Site Using WebQEM Approach

Reza Meimandi Parizi; Azween Abdullah; Hemalatha Ramalingam

The World Wide Web offers museums the possibility to disseminate information about their collections publically so they may attract people to come and visit the actual museum. In attributing communicative and interactive functions to a museum’s Web site, it is especially important to keep in mind the users and their needs for easy interaction. Sometimes, many museums’ Web sites exclude this matter or consider it in a weakly manner. The attractiveness of these virtual museums depends on many issues, especially their quality, as it is such a complex solution. In this paper, we present a quantitative quality evaluation on Malaysia’s national museum (Museum Negara) Web site by utilizing the Web site quality evaluation method (QEM). This is conducted to (1) assess and highlight the main quality issues that can arise within this Web site domain and (2) demonstrate the application of QEM methodology using a practical example. Surveying and measuring such quality criteria can improve the quality of Web products based on the existing level of quality at hand, as well as fulfilling the needs of specific users that may contribute to various industries and learning process.

Collaboration


Dive into the Azween Abdullah's collaboration.

Top Co-Authors

Avatar

Aisha Hassan Abdalla Hashim

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Azana Hafizah Mohd Aman

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Huda Adibah Mohd Ramli

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar

Shayla Islam

International Islamic University Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Noor Zaman

King Faisal University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hafiz Muhammad Imran

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Sellappan Palaniappan

University of Science and Technology

View shared research outputs
Top Co-Authors

Avatar

Asfandyar Khan

University of Science and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge