Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mohssen Mohammed is active.

Publication


Featured researches published by Mohssen Mohammed.


Archive | 2013

Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks

Mohssen Mohammed; Al-Sakib Khan Pathan

Able to propagate quickly and change their payload with each infection, polymorphic worms have been able to evade even the most advanced intrusion detection systems (IDS). And, because zero-day worms require only seconds to launch flooding attacks on your servers, using traditional methodssuch as manually creating and storing signatures to defend against these threats is just too slow.Bringing together critical knowledge and research on the subject, Automatic Defense Against Zero-day Polymorphic Worms in Communication Networks details a new approach for generating automated signatures for unknown polymorphic worms. It presents experimental results on a new method for polymorphic worm detection and examines experimental implementation of signature-generation algorithms and double-honeynet systems.If you need some background, the book includes an overview of the fundamental terms and concepts in network security, including the various security models. Clearing up the misconceptions about the value of honeypots, it explains how they can be useful in securing your networks, and identifies open-source tools you can use to create your own honeypot. Theres also a chapter with references to helpful reading resources on automated signature generation systems.The authors describe cutting-edge attack detection approaches and detail new algorithms to help you generate your own automated signatures for polymorphic worms. Explaining how to test the quality of your generated signatures, the text will help you develop the understanding required to effectively protect your communication networks. Coverage includes intrusion detection and prevention systems (IDPS), zero-day polymorphic worm collection methods, double-honeynet system configurations, and the implementation of double-honeynet architectures.


Wireless Personal Communications | 2015

Building Customer Trust in Cloud Computing with an ICT-Enabled Global Regulatory Body

Al-Sakib Khan Pathan; Mohssen Mohammed

Building customer trust is a huge problem in the cloud computing paradigm. Today, hundreds of companies around the world are offering cloud services in major or minor scale with global or local reach. In spite of the availability of numerous establishments for cloud services, there is a critical link missing with the customers—and that is the lack of appropriate customer trust in the cloud provider’s services. The issue of trust in clouds has already been addressed from multiple technical perspectives where the researchers suggested solutions based on existing knowledge in other computing and communications systems. In this paper, we suggest a different concept of ensuring trust in cloud services by using the power of Information and Communications Technology. The basic idea lies in the fact that there should be a global standardization authority which would certify trusted cloud providers which in turn would earn customer trust. Novelty in this concept is mainly in its operational details presented in the paper. The main objective is to analyze various aspects of this proposed model from the policy making issues alongside slightly addressing technical issues. To make our work easily accessible to general readers and the experts, we also present the backgrounds of cloud computing and analyze the conceptual model with real-life challenges and issues.


international conference on advanced computer science applications and technologies | 2013

An Automated Signature Generation Method for Zero-Day Polymorphic Worms Based on Multilayer Perceptron Model

Mohssen Mohammed; H. Anthony Chan; Neco Ventura; Al-Sakib Khan Pathan

Polymorphic worms are considered as the most dangerous threats to the Internet security, and the danger lies in changing their payloads in every infection attempt to avoid the security systems. In this paper, we propose an accurate signature generation system for zero-day polymorphic worms. We have designed a novel Double-honeynet system, which is able to detect zero-day polymorphic worms that have not been seen before. To generate signatures for polymorphic worms we have two steps. The first step is the polymorphic worms sample collection which is done by the Double-honeynet system. The second step is the signature generation for the collected samples which is done by k-means clustering algorithm and a Multilayer Perceptron Model. The system collects different types of polymorphic worms, we used the k-means clustering algorithm to separate each type into a cluster. The Multilayer Perceptron Model is used to generate signatures for each cluster. The main goal for this system is to reduce the false positives and false negatives.


ubiquitous intelligence and computing | 2014

International Center for Monitoring Cloud Computing Providers (ICMCCP) for Ensuring Trusted Clouds

Mohssen Mohammed; Al-Sakib Khan Pathan

Cloud computing offers flexible and scalable IT (Information Technology) services for which many organizations are now interested in harnessing its benefit. In spite of the enthusiasm and great interest, Cloud computing has not yet earned full trust of the individual customers, banks, armed forces, governments, and companies who do sensitive computing tasks. While it is not the goal to persuade everyone to use the technology and some types of tasks are to be done with secrecy, for the general works done by the companies and customers, Cloud could be heavily used. However, it is very difficult to convince people that the Cloud Providers (CPs) would keep their data protected. To address this issue, what required is to employ some mechanism that can establish the trust of the users. With this motivation, in this paper, we present a novel concept for trust assurance in Cloud services with the proposal of implementing a Global Central Bank-like regulatory authority. Our initiative is termed International Center for Monitoring Cloud Computing Providers (ICMCCP). Various facets of ICMCCP model have been described alongside the policy making issues. Necessary backgrounds of Cloud are also presented.


Archive | 2013

The Fundamental Concepts

Mohssen Mohammed; Al-Sakib Khan Pathan

For example, our ability to sense cold and hot is only relative, with a selectivity of the order of 1 °C and only over a very limited temperature range. Measuring a high electric voltage with human senses is extremely hazardous. The reaction times involved in measuring the angles of side flaps of a supersonic jet fighter plane by human senses is simply far slower than what is required in a rapid maneuvering.


system analysis and modeling | 2009

A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection

Mohssen Mohammed; H. Anthony Chan; Neco Ventura; Mohsin Hashim; Izzeldin Amin


Archive | 2016

Machine Learning : Algorithms and Applications

Mohssen Mohammed; Muhammad Badruddin Khan; Eihab Bashier


International Journal for Information Security Research | 2011

An Automated Signature Generation Approach for Polymorphic Worms Using Principal Component Analysis

Mohssen Mohammed; H. Anthony Chan; Neco Ventura


Archive | 2014

Using routers and honeypots in combination for collecting Internet worm attacks

Mohssen Mohammed; Al-Sakib Khan Pathan


Archive | 2016

An Automated Signature Generation Approach for Polymorphic Worms Using Factor Analysis

Mohssen Mohammed; H. Anthony Chan; Neco Ventura; Eihab Bashier; Mohsin Hashim

Collaboration


Dive into the Mohssen Mohammed's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Neco Ventura

University of Cape Town

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Eisa Aleisa

Imam Muhammad ibn Saud Islamic University

View shared research outputs
Researchain Logo
Decentralizing Knowledge