Khalid Rashid
COMSATS Institute of Information Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Khalid Rashid.
Information Security Journal: A Global Perspective | 2009
Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid; Aneel Rahim
ABSTRACT A packet-based network to provide telecommunication services independent from the underlying access and transport technologies is known as a next generation network. An IP multimedia subsystem (IMS) provides an architectural framework for the next generation networks and includes variety of services such as presence, instant messaging, push-to-talk over cellular, multiparty conference, and so forth. IMS-based instant messaging is available in two flavors (immediate messaging and session-based messaging). Both flavors are subject to different types of security threats. An attacker can generate an immediate messaging flood by sending enormous number of messages to deny the services to a group of users or to an individual. Session-based messaging is facing threats such as invite flooding attack, session modification attack, and session teardown attack. In this paper, we developed a security mechanism, consisting of three layers, to secure the messaging service from flooding attacks and session-based attacks and the like. The simulation results show a good improvement in the existing security mechanism of the IMS-based instant messaging service.
Computers & Mathematics With Applications | 2010
Zeeshan Shafi Khan; Khalid Rashid; Fahad Bin Muhaya; Qutbuddin; Aneel Rahim
In order to provide essential data services, the cellular networks have opened interface with Internet enabling communication with the users beyond the coverage of their wireless signals across the globe. Besides economical expansion of the global system for mobile communication (GSM) services, this interface has given birth to new security challenges. Especially recent research has divulged that an adversary equipped with little more than a cable modem can block all voice communication in a metropolitan area or even in entire country of the size of USA by sending enormous short message service (SMS) traffic via Internet. To overcome this threat in particular and other client-server communication problems in general, a new secure protocol, Call-Back Authentication (CBA), for web to phone SMS communication is proposed. The protocol introduces two-tier server architecture and pulls data traffic control (PDTC) mechanism for secure communication. The protocol is aimed to throat-knot malicious traffic at GSM-Internet interface gateway. The results show that the CBA protocol secures all GSM services from Internet originated SMS floods. Moreover the authentication mechanism of the CBA protocol identifies and blocks the spoofed as well as the zombie requests. The CBA server requires lesser resources to deliver SMS as compared to existing mechanism.
Information Technology Journal | 2004
Muhammad Kamran Naseem; Sohail Iqbal; Khalid Rashid
Information Technology Journal | 2006
Muhammad Rashid; Khalid Rashid
Archive | 2009
Zeeshan Shafi Khan; S. Shokat; F. Azam; R. Shafi; Aneel Rahim; Khalid Rashid; Muhammad Sher
Journal of Applied Sciences | 2004
Nasir Rehan; Khalid Rashid
Archive | 2009
Zeeshan Shafi Khan; Muhammad Sher; Khalid Rashid; Imran Razzak
Information Technology Journal | 2006
Haroon Muneer; Khalid Rashid
Journal of Applied Sciences | 2005
M. Sikander Hayat Khiyal .; Khalid Rashid
Information Technology Journal | 2005
Khurram Shahzad; Khalid Rashid