Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Hatim Mohamad Tahir is active.

Publication


Featured researches published by Hatim Mohamad Tahir.


international conference on information and communication technologies | 2006

Implementation of IPv4 Over IPv6 using Dual Stack Transition Mechanism (DSTM) on 6iNet

Hatim Mohamad Tahir; Azman Ta'a; Norshakinah Nasir

Moving from Internet protocol version four (IPv4) to Internet protocol version six (IPv6) is not straightforward because IPv4 and IPv6 are incompatible protocols. To enable the smooth integration between IPv4 and IPv6, several transition mechanisms have been proposed by IETF IPng Transition Working Group (NGTrans). One of them is dual stack transition mechanism (DSTM). This paper reviews the implementation of DSTM over our IPv6 test-bed (6iNet) in University Utara Malaysia (UUM). This paper also describes our experience of configuring 6iNet. 6iNet is the first IPv6 test-bed in UUM and has become a platform for IPv6 research in UUM


Archive | 2015

Can Single Sign-on Improve Password Management? A Focus Group Study

Norliza Katuk; Hatim Mohamad Tahir; Nur Haryani Zakaria; Mohamad Subri Halim

This article presents a research concerning password management and single sign-on for accessing Internet applications. Many Internet applications require users to subscribe to their services and authenticate themselves through the use of login credentials. The number of such applications is increasing exponentially, which caused ineffective login credential management among users. This study was conducted with two objectives (i) to identify how users manage their usernames and passwords and (ii) to examine whether users see the benefits of single sign-on. To achieve these objectives, a focus group interview was conducted on students from a local university. The results of the study suggested that the students did not practise proper password management. Further, it suggested that single sign-on may not be the immediate solution to improve the students’ password management.


international conference on multimedia computing and systems | 2011

An investigation of TFRC over AODV and DSR routing protocols

Mohamad Rizal Abdul Rejab; Khuzairi Mohd Zaini; Fazli Azzali; Hatim Mohamad Tahir

This paper conduct a comprehensive simulation study on the behavior of TCP-friendly Rate Control (TFRC) protocol over Ad-Hoc On Demand Vector (AODV) routing protocol and Dynamic Source Routing (DSR) protocol. The aim are first, to measure the performance of TFRC in terms of throughput, delay and jitter. The second objective is to identify which Mobile Ad-Hoc Network (MANET) routing protocols work well with TFRC. We conduct the experiment by sending multimedia streaming traffic carried by TFRC over AODV and DSR respectively. Random-Waypoint mobility model is used for both experiments. Results obtained shows that in average TFRC over AODV has more throughput and less delay as compared with TFRC over DSR. However, in terms of jitter, TFRC over DSR gives better result.


international conference on multimedia computing and systems | 2014

Selection of access network using cost function method in heterogeneous wireless network

Hatim Mohamad Tahir; Abdullah Hussein Al-Ghushami; Zainor Ridzuan Yahya

the challenge for future generation of wireless environment is on how to choose the appropriate wireless access network connection when there are several different wireless networks are existed. Hence, a vertical handover network selection (VHONS) being used to aid in term of service quality for users satisfaction of the mobile terminal. This article intends to propose a new method of choosing the vertical handover network. This method covers the weight distribution and cost factor techniques. The weight distribution is used to measure different weights for existing wireless network based on the users preference and mobile terminal power. The cost factor technique is also used to identify the cost for performing handover target by considering every network parameters and its weight. Results obtained showed that the algorithm has the ability to increase users satisfaction compared to other algorithms, which consistently choose one accessible network.


International Journal of Future Computer and Communication | 2013

Towards increasing web application development productivity through object-oriented framework

Mohd Nuruzzaman; Azham Hussain; Hatim Mohamad Tahir

Software development remains complex, expensive and risky.Thus, the need for reusability has become obvious.Through reusability web developers/engineers can save countless hours and millions of dollars in development cost. Object-oriented (OO) framework mechanism provides a new vehicle for reuse and enables web engineers to customize or reuse various aspects in web engineering such as customizing one or more elements of user interface, automatically generate event handlers, data handlers or related data elements based on changes made by them.The OO framework mechanism includes tags and scripts that predefine some generic web application activities and a common programming interface for generating a framework customization environment. This study provides a novel solution to produce high quality web applications within a shortest development timeframe through the means of customization, reusability, extensibility and flexibility.At the end, this study will conduct a comprehensive evaluation on the proposed OO framework. Building on previous works, this study emphasized the reuse of design, code and testing as a tool to uncover strengths and weaknesses of the OO framework for dynamic web engineering.


Advanced Science Letters | 2017

The Requirement Model for Improved OpenID Single Sign-On (SSO) Authentication to Thwart Phishing Attack

Nur Haryani Zakaria; Nadia Hasidah Mat Nayan; Hatim Mohamad Tahir; Norliza Katuk; Abubakar Mohammed

The problem of password memorability among users has led to the introduction of Single Sign-On (SSO) authentication. It enables users to login using a set of username and password which then allows an access into multiple websites without the hassle of repeating the same usernames and passwords. One of the most common SSO protocol is OpenID which is said to offer flexibility and security. Unfortunately, the existing OpenID model is prone to phishing attack whereby there is a lack of mechanism to ensure the authenticity of the OpenID provider. This scenario complicates the situation especially when there exists tools to generate phishing attacks are easily available without requiring much technical expertise. Moreover, users awareness are claimed to be insufficient to rely on since statistics of phishing attacks are shown to be increasing. Thus, this research attempts to propose page token as a mechanism to thwart phishing attack. This research produced and evaluated an improved requirement model that incorporates the page token as proposed mechanism. The outcomes show promising result towards the effort of thwarting phishing attacks.


international conference on computer and information sciences | 2016

Oving K-Means Clustering using discretization technique in Network Intrusion Detection System

Hatim Mohamad Tahir; Abas Md Said; Nor Hayani Osman; Nur Haryani Zakaria; Puteri Nurul 'Ain M Sabri; Norliza Katuk

Network Intrusion Detection Systems (NIDSs) have always been designed to enhance and improve the network security issue by detecting, identifying, assessing and reporting any unauthorized and illegal network connections and activities. The purpose of this research is to improve on the existing Anomaly Based Intrusion Detection (ABID) method using K-Means clustering technique as to maximize the detection rate and accuracy while minimizing the false alarm. The problem with outliers may disturb the K-Means clustering process as it might be avoided in the clustering process from mixing with the normal data that make the NIDSs become less accurate. Thus this research aims to improve the performance of the ABID systems that balance the loss of information or ignored data in clustering. An integrated machine learning algorithm using K-Means Clustering with discretization technique and Naïve Bayes Classifier (KMC-D+NBC) is proposed against ISCX 2012 Intrusion Detection Evaluation Dataset. The outcome depicts that the proposed method generates better detection rate and accuracy up to 99.3% and 99.5% respectively and reduces the false alarm to 1.2% with better efficiency of 0.03 seconds time taken to build model.


international conference on digital information processing and communications | 2011

Improving Network Performance by Enabling Explicit Congestion Notification (ECN) in SCTP Control Chunks

Hatim Mohamad Tahir; Abas Md Said; Mohammed J. M. Elhalabi; Nurnasran Puteh; Azliza Othman; Nurzaid Muhd Zain; Zulkhairi Md Dahalin; Muhammad Hafiz Ismail; Khuzairi Mohd Zaini; Mohd Zabidin Hussin

The need for a reliable transmission protocol that can cover the Transport Control Protocol (TCP) and User Datagram Protocol (UDP) has prompted the Internet Engineering Task Force (IETF) to define a new protocol called the Stream Control Transmission Protocol (SCTP). This paper proposes adding Explicit Congestion Notification (ECN) mechanism into SCTP chunks (INIT chunk, and INIT-ACK chunk) to reduce the delay of transferring important data during congestion as compared with the TCP and UDP protocols. This paper also discusses the details of adding ECN, and the reason for choosing Random Early Detection (RED). Through the experimental analysis, we compare SCTP enabled ECN in INIT-ACK chunk to SCTP without ECN enabled in INIT-ACK chunk and demonstrate the result of ECN impact on SCTP delay time.


Archive | 2005

A taxonomy of security faults in the window operating system

Hatim Mohamad Tahir; Roshidi Din


Archive | 2015

Hybrid machine learning technique for intrusion detection system

Hatim Mohamad Tahir; Wail Hasan; Abas Md Said; Nur Haryani Zakaria; Norliza Katuk; Nur Farzana Kabir; Mohd Hasbullah Omar; Osman Ghazali; Noor Izzah Yahya

Collaboration


Dive into the Hatim Mohamad Tahir's collaboration.

Top Co-Authors

Avatar

Norliza Katuk

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar

Abas Md Said

Universiti Teknologi Petronas

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azham Hussain

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nurnasran Puteh

Universiti Utara Malaysia

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge