Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Mouhammd Alkasassbeh is active.

Publication


Featured researches published by Mouhammd Alkasassbeh.


Journal of Network and Computer Applications | 2009

Network fault detection with Wiener filter-based agent

Mouhammd Alkasassbeh; Mo Adda

Over the last few decades, network domains have become more and more advanced in terms of their size, complexity and level of heterogeneity. Existing centralized-based network management approaches suffer from problems such as insufficient scalability, availability and flexibility, as networks become more distributed. Mobile agents (MA), upgraded with intelligence, can present a reasonable new technology that will help to achieve distributed management. These agents migrate from one node to another, accessing an appropriate subset of Management Information Base (MIB) variables from each node analysing them locally and retaining the results of this analysis during their subsequent migration. One of the network fault management tasks is fault detection, and in this paper our purpose was to carry out a statistical method based on Wiener filter to capture the abnormal changes in the behaviour of the MIB variables. Our algorithm was implemented on data obtained from two different scenarios in the laboratory, with four different fault case studies. The purpose of this is to provide the manager node with a high level of information, such as a set of conclusions or recommendations, rather than large volumes of data relating to each management task. The filtering process is carried out concurrently by each agent responsible for a particular domain and device, proving to be more scalable and efficient.


Journal of Network and Computer Applications | 2008

Analysis of mobile agents in network fault management

Mouhammd Alkasassbeh; Mo Adda

Network domains have become more and more advanced in terms of their size, complexity and the level of heterogeneity. Comprehensive fault management is the most significant challenge in network management. Fault management can help increase the availability of the network by quickly identifying the faults and then, proactively, start the recovery process. Current centralized configured network management systems suffer from problems such as insufficient scalability, availability and flexibility as networks become more distributed. Mobile agents (MAs), with integral intelligence, can present a reasonable new technology that will help to achieve distributed management, several researchers have embraced these approaches. In this paper, we introduce a general analytical model for network management client/server (CS) and MA paradigms. We express how to build up an analytical framework, which can be used to quantitatively assess the performances of the MA and CS paradigms under different scenarios. We present some numerical and experimental results that demonstrate the applicability of our proposed framework, which will be based on a combination of MA and CS schemes called Adaptive Intelligent Mobile Agent.


International Journal of Advanced Computer Science and Applications | 2016

Detecting Distributed Denial of Service Attacks Using Data Mining Techniques

Mouhammd Alkasassbeh; Ghazi Al-Naymat; Ahmad B. A. Hassanat; Mohammad Almseidin

Users and organizations find it continuously challenging to deal with distributed denial of service (DDoS) attacks. . The security engineer works to keep a service available at all times by dealing with intruder attacks. The intrusion-detection system (IDS) is one of the solutions to detecting and classifying any anomalous behavior. The IDS system should always be updated with the latest intruder attack deterrents to preserve the confidentiality, integrity and availability of the service. In this paper, a new dataset is collected because there were no common data sets that contain modern DDoS attacks in different network layers, such as (SIDDoS, HTTP Flood). This work incorporates three well-known classification techniques: Multilayer Perceptron (MLP), Naive Bayes and Random Forest. The experimental results show that MLP achieved the highest accuracy rate (98.63%).


international symposium on intelligent systems and informatics | 2017

Evaluation of machine learning algorithms for intrusion detection system

Mohammad Almseidin; Maen Alzubi; Szilveszter Kovács; Mouhammd Alkasassbeh

Intrusion detection system (IDS) is one of the implemented solutions against harmful attacks. Furthermore, attackers always keep changing their tools and techniques. However, implementing an accepted IDS system is also a challenging task. In this paper, several experiments have been performed and evaluated to assess various machine learning classifiers based on KDD intrusion dataset. It succeeded to compute several performance metrics in order to evaluate the selected classifiers. The focus was on false negative and false positive performance metrics in order to enhance the detection rate of the intrusion detection system. The implemented experiments demonstrated that the decision table classifier achieved the lowest value of false negative while the random forest classifier has achieved the highest average accuracy rate.


International Journal of Innovative Research in Computer and Communication Engineering | 2017

Comparative Analysis of Clustering Techniques in Network Traffic Faults Classification

Karwan Qader; Mo Adda; Mouhammd Alkasassbeh

Ubiquitous high-speed communication networks play a crucial role in the modern life, demanding the highest level of reliability and availability. Due to the rapid growth of computer networks in terms of size, complexity and heterogeneity, the probability of network faults increases. Manual network administration is hopelessly outdated; complex automated fault diagnosis and management are essential to ensure the provision and maintenance of high quality service in computer networks. Guaranteed Service with higher levels of reliability and availability for real-time applications can be achieved with a systematic approach for real-time classification of network faults, which helps in well-informed (often-automated) decision making. In this paper we discuss three different data mining algorithms as part of the proposed solution for network fault classification: K-Means, Fuzzy C Means, and Expectation Maximization. The proposed approach can help capture abnormal behavior in communication networks, thus paving the way for real-time fault classification and management. We used datasets obtained from a network with heavy and light traffic scenarios in the router and server and built a prototype to demonstrate the network traffic fault classification under given scenarios. Our empirical results reveal that the FCM is more accurate while causing computational overhead. The other two algorithms attain almost the same performance.


Signal, Image and Video Processing | 2018

Magnetic energy-based feature extraction for low-quality fingerprint images

Ahmad B. A. Hassanat; V. B. Surya Prasath; Mouhammd Alkasassbeh; Ahmad S. Tarawneh; Ahmad J. Al-shamailh

In fingerprint recognition systems, feature extraction is an important part because of its impact on the final performance of the overall system, particularly, in the case of low-quality images, which poses significant challenges to traditional fingerprint feature extraction methods. In this work, we make two major contributions: First, a novel feature extraction method for low-quality fingerprints images is proposed, which mimics the magnetic energy when attracting iron fillings, and this method is based on image energies attracting uniformly distributed points to form the final features that can describe a fingerprint. Second, we created a new low-quality fingerprints image database to evaluate the proposed method. We used a mobile phone camera to capture the fingerprints of 136 different persons, with five samples for each to obtain 680 fingerprint images in total. To match the computed features, we used the dynamic time warping and evaluated the performance of our system based on k-nearest neighbor classifier. Further, we represent the features using their probability density functions to evaluate the method using some other classifiers. The highest identification accuracy recorded by several experiments reached 95.11% using our in-house database. The experimental results show that the proposed method can be used as a general feature extraction method for other applications.


PeerJ | 2016

Enhancing genetic algorithms using multi mutations

Ahmad B. A. Hassanat; Esra'a Alkafaween; Nedal Alnawaiseh; Mohammad Ali Abbadi; Mouhammd Alkasassbeh; Mahmoud B. Alhasanat

Mutation is one of the most important stages of the genetic algorithm because of its impact on the exploration of global optima, and to overcome premature convergence. There are many types of mutation, and the problem lies in selection of the appropriate type, where the decision becomes more difficult and needs more trial and error. This paper investigates the use of more than one mutation operator to enhance the performance of genetic algorithms. Novel mutation operators are proposed, in addition to two selection strategies for the mutation operators, one of which is based on selecting the best mutation operator and the other randomly selects any operator. Several experiments on some Travelling Salesman Problems (TSP) were conducted to evaluate the proposed methods, and these were compared to the well-known exchange mutation and rearrangement mutation. The results show the importance of some of the proposed methods, in addition to the significant enhancement of the genetic algorithms performance, particularly when using more than one mutation operator.


Archive | 2013

Prediction of PM10 and TSP Air Pollution Parameters Using Artificial Neural Network Autoregressive, External Input Models: A Case Study in Salt, Jordan

Mouhammd Alkasassbeh; Alaa Sheta; Hossam Faris; Hamza Turabieh


International Journal of Computer Applications | 2012

Detection of Oil Spills in SAR Images using Threshold Segmentation Algorithms

Alaa F. Sheta; Mouhammd Alkasassbeh; Malik Braik; Hafsa Abu Ayyash


Polish Journal of Environmental Studies | 2014

Artificial Neural Networks for Surface Ozone Prediction: Models and Analysis

Hossam Faris; Mouhammd Alkasassbeh; Ali Rodan

Collaboration


Dive into the Mouhammd Alkasassbeh's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mo Adda

University of Portsmouth

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ghazi Al-Naymat

University of New South Wales

View shared research outputs
Top Co-Authors

Avatar

Mohammad Almseidin

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Amanda Peart

University of Portsmouth

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge