Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Nor Badrul Anuar is active.

Publication


Featured researches published by Nor Badrul Anuar.


International Journal of Information Management | 2016

Big data

Ibrar Yaqoob; Ibrahim Abaker Targio Hashem; Abdullah Gani; Salimah Binti Mokhtar; Ejaz Ahmed; Nor Badrul Anuar; Athanasios V. Vasilakos

We use structuralism and functionalism paradigms to analyze the origins of big data applications.Current trends and sources of big data.Processing technologies, methods and analysis techniques for big data are compared in detail.We analyze major challenges with big data and also discussed several opportunities.Case studies and emerging technologies for big data problems are discussed. Big data is a potential research area receiving considerable attention from academia and IT communities. In the digital world, the amounts of data generated and stored have expanded within a short period of time. Consequently, this fast growing rate of data has created many challenges. In this paper, we use structuralism and functionalism paradigms to analyze the origins of big data applications and its current trends. This paper presents a comprehensive discussion on state-of-the-art big data technologies based on batch and stream data processing. Moreover, strengths and weaknesses of these technologies are analyzed. This study also discusses big data analytics techniques, processing methods, some reported case studies from different vendors, several open research challenges, and the opportunities brought about by big data. The similarities and differences of these techniques and technologies based on important parameters are also investigated. Emerging technologies are recommended as a solution for big data problems.


International Journal of Information Management | 2016

The role of big data in smart city

Ibrahim Abaker Targio Hashem; Victor Chang; Nor Badrul Anuar; Kayode Sakariyah Adewole; Ibrar Yaqoob; Abdullah Gani; Ejaz Ahmed; Haruna Chiroma

We provide a vision of big data analytics to support smart cities.We proposed future business model with the aim of managing big data for smart city.We identify and discuss business and technological research challenges.We provide a description of existing communication technologies used in smart cities. The expansion of big data and the evolution of Internet of Things (IoT) technologies have played an important role in the feasibility of smart city initiatives. Big data offer the potential for cities to obtain valuable insights from a large amount of data collected through various sources, and the IoT allows the integration of sensors, radio-frequency identification, and Bluetooth in the real-world environment using highly networked services. The combination of the IoT and big data is an unexplored research area that has brought new and interesting challenges for achieving the goal of future smart cities. These new challenges focus primarily on problems related to business and technology that enable cities to actualize the vision, principles, and requirements of the applications of smart cities by realizing the main smart environment characteristics. In this paper, we describe the state-of-the-art communication technologies and smart-based applications used within the context of smart cities. The visions of big data analytics to support smart cities are discussed by focusing on how big data can fundamentally change urban populations at different levels. Moreover, a future business model of big data for smart cities is proposed, and the business and technological research challenges are identified. This study can serve as a benchmark for researchers and industries for the future progress and development of smart cities in the context of big data.


The Scientific World Journal | 2014

Cloud Service Selection Using Multicriteria Decision Analysis

Whaiduzzaman; Abdullah Gani; Nor Badrul Anuar; Muhammad Shiraz; Mohammad Nazmul Haque; Israat Tanzeena Haque

Cloud computing (CC) has recently been receiving tremendous attention from the IT industry and academic researchers. CC leverages its unique services to cloud customers in a pay-as-you-go, anytime, anywhere manner. Cloud services provide dynamically scalable services through the Internet on demand. Therefore, service provisioning plays a key role in CC. The cloud customer must be able to select appropriate services according to his or her needs. Several approaches have been proposed to solve the service selection problem, including multicriteria decision analysis (MCDA). MCDA enables the user to choose from among a number of available choices. In this paper, we analyze the application of MCDA to service selection in CC. We identify and synthesize several MCDA techniques and provide a comprehensive analysis of this technology for general readers. In addition, we present a taxonomy derived from a survey of the current literature. Finally, we highlight several state-of-the-art practical aspects of MCDA implementation in cloud computing service selection. The contributions of this study are four-fold: (a) focusing on the state-of-the-art MCDA techniques, (b) highlighting the comparative analysis and suitability of several MCDA methods, (c) presenting a taxonomy through extensive literature review, and (d) analyzing and summarizing the cloud computing service selections in different scenarios.


Engineering Applications of Artificial Intelligence | 2014

Cooperative game theoretic approach using fuzzy Q-learning for detecting and preventing intrusions in wireless sensor networks

Shahaboddin Shamshirband; Ahmed Patel; Nor Badrul Anuar; Miss Laiha Mat Kiah; Ajith Abraham

Abstract Owing to the distributed nature of denial-of-service attacks, it is tremendously challenging to detect such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a game theoretic method is introduced, namely cooperative Game-based Fuzzy Q-learning (G-FQL). G-FQL adopts a combination of both the game theoretic approach and the fuzzy Q-learning algorithm in WSNs. It is a three-player strategy game consisting of sink nodes, a base station, and an attacker. The game performs at any time a victim node in the network receives a flooding packet as a DDoS attack beyond a specific alarm event threshold in WSN. The proposed model implements cooperative defense counter-attack scenarios for the sink node and the base station to operate as rational decision-maker players through a game theory strategy. In order to evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using NS-2 simulator. The model is subsequently compared against other existing soft computing methods, such as fuzzy logic controller, Q-learning, and fuzzy Q-learning, in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed model׳s attack detection and defense accuracy yield a greater improvement than existing above-mentioned machine learning methods. In contrast to the Markovian game theoretic, the proposed model operates better in terms of successful defense rate.


Digital Investigation | 2015

A review on feature selection in mobile malware detection

Ali Feizollah; Nor Badrul Anuar; Rosli Salleh; Ainuddin Wahid Abdul Wahab

The widespread use of mobile devices in comparison to personal computers has led to a new era of information exchange. The purchase trends of personal computers have started decreasing whereas the shipment of mobile devices is increasing. In addition, the increasing power of mobile devices along with portability characteristics has attracted the attention of users. Not only are such devices popular among users, but they are favorite targets of attackers. The number of mobile malware is rapidly on the rise with malicious activities, such as stealing users data, sending premium messages and making phone call to premium numbers that users have no knowledge. Numerous studies have developed methods to thwart such attacks. In order to develop an effective detection system, we have to select a subset of features from hundreds of available features. In this paper, we studied 100 research works published between 2010 and 2014 with the perspective of feature selection in mobile malware detection. We categorize available features into four groups, namely, static features, dynamic features, hybrid features and applications metadata. Additionally, we discuss datasets used in the recent research studies as well as analyzing evaluation measures utilized.


Journal of Network and Computer Applications | 2014

Co-FAIS: Cooperative fuzzy artificial immune system for detecting intrusion in wireless sensor networks

Shahaboddin Shamshirband; Nor Badrul Anuar; Miss Laiha Mat Kiah; Vala Ali Rohani; Dalibor Petković; Sanjay Misra; Abdul Nasir Khan

Abstract Due to the distributed nature of Denial-of-Service attacks, it is tremendously challenging to identify such malicious behavior using traditional intrusion detection systems in Wireless Sensor Networks (WSNs). In the current paper, a bio-inspired method is introduced, namely the cooperative-based fuzzy artificial immune system (Co-FAIS). It is a modular-based defense strategy derived from the danger theory of the human immune system. The agents synchronize and work with one another to calculate the abnormality of sensor behavior in terms of context antigen value (CAV) or attackers and update the fuzzy activation threshold for security response. In such a multi-node circumstance, the sniffer module adapts to the sink node to audit data by analyzing the packet components and sending the log file to the next layer. The fuzzy misuse detector module (FMDM) integrates with a danger detector module to identify the sources of danger signals. The infected sources are transmitted to the fuzzy Q-learning vaccination modules (FQVM) in order for particular, required action to enhance system abilities. The Cooperative Decision Making Modules (Co-DMM) incorporates danger detector module with the fuzzy Q-learning vaccination module to produce optimum defense strategies. To evaluate the performance of the proposed model, the Low Energy Adaptive Clustering Hierarchy (LEACH) was simulated using a network simulator. The model was subsequently compared against other existing soft computing methods, such as fuzzy logic controller (FLC), artificial immune system (AIS), and fuzzy Q-learning (FQL), in terms of detection accuracy, counter-defense, network lifetime and energy consumption, to demonstrate its efficiency and viability. The proposed method improves detection accuracy and successful defense rate performance against attacks compared to conventional empirical methods.


Science of The Total Environment | 2014

Evaluation of traditional and consolidated rice farms in Guilan Province, Iran, using life cycle assessment and fuzzy modeling.

Benyamin Khoshnevisan; Mohammad Ali Rajaeifar; Sean Clark; Shahaboddin Shamahirband; Nor Badrul Anuar; Nor Liyana Mohd Shuib; Abdullah Gani

In this study the environmental impact of consolidated rice farms (CF) - farms which have been integrated to increase the mechanization index - and traditional farms (TF) - small farms with lower mechanization index - in Guilan Province, Iran, were evaluated and compared using Life cycle assessment (LCA) methodology and adaptive neuro-fuzzy inference system (ANFIS). Foreground data were collected from farmers using face-to-face questionnaires and background information about production process and inventory data was taken from the EcoInvent®2.0 database. The system boundary was confined to within the farm gate (cradle to farm gate) and two functional units (land and mass based) were chosen. The study also included a comparison of the input-output energy flows of the farms. The results revealed that the average amount of energy consumed by the CFs was 57 GJ compared to 74.2 GJ for the TFs. The energy ratios for CFs and TFs were 1.6 and 0.9, respectively. The LCA results indicated that CFs produced fewer environmental burdens per ton of produced rice. When compared according to the land-based FU the same results were obtained. This indicates that the differences between the two types of farms were not caused by a difference in their production level, but rather by improved management on the CFs. The analysis also showed that electricity accounted for the greatest share of the impact for both types of farms, followed by P-based and N-based chemical fertilizers. These findings suggest that the CFs had superior overall environmental performance compared to the TFs in the study area. The performance metrics of the model based on ANFIS show that it can be used to predict the environmental burdens of rice production with high accuracy and minimal error.


Journal of Network and Computer Applications | 2014

Routing protocol design for secure WSN: Review and open research issues

Shazana Md Zin; Nor Badrul Anuar; Miss Laiha Mat Kiah; Al-Sakib Khan Pathan

Wireless sensor networks (WSNs) have gained a substantial attention in wireless research community as these networks are envisioned to support a large number of practical applications. Due to salient features of sensor networks, the security design for WSN is significantly challenging. Despite a good number of available surveys on this particular topic, we feel that there is a gap in the existing literature in terms of timeliness, emphasis, and comprehensiveness. This paper reviews the state-of-the-art for secure WSN routing protocols that illustrates the issues and challenges in the context design matters. Further, we propose the schematic taxonomy of key design issues for WSN routing protocols. We also define design factors categorization relevant to secure routing: basic, essential, and optional. The similarities and differences of secure routing approaches are summarized on the basis of key design attributes, security objectives, and attacks prevention. Finally, we outline possible future research trends on secure routing design in WSN.


ACM Computing Surveys | 2017

The Evolution of Android Malware and Android Analysis Techniques

Kimberly Tam; Ali Feizollah; Nor Badrul Anuar; Rosli Salleh; Lorenzo Cavallaro

With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.


Journal of Zhejiang University Science C | 2014

Botnet detection techniques: review, future trends, and issues

Ahmad Karim; Rosli Salleh; Muhammad Shiraz; Syed Adeel Ali Shah; Irfan Awan; Nor Badrul Anuar

In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of malicious codes. The botnet phenomenon supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malware distribution, spam emails, and building machines for illegitimate exchange of information/materials. Therefore, it is imperative to design and develop a robust mechanism for improving the botnet detection, analysis, and removal process. Currently, botnet detection techniques have been reviewed in different ways; however, such studies are limited in scope and lack discussions on the latest botnet detection techniques. This paper presents a comprehensive review of the latest state-of-the-art techniques for botnet detection and figures out the trends of previous and current research. It provides a thematic taxonomy for the classification of botnet detection techniques and highlights the implications and critical aspects by qualitatively analyzing such techniques. Related to our comprehensive review, we highlight future directions for improving the schemes that broadly span the entire botnet detection research field and identify the persistent and prominent research challenges that remain open.

Collaboration


Dive into the Nor Badrul Anuar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Miss Laiha Mat Kiah

Information Technology University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Ainuddin Wahid Abdul Wahab

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Rosli Salleh

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Omar Zakaria

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Ali Feizollah

Information Technology University

View shared research outputs
Top Co-Authors

Avatar

Amirrudin Kamsin

Information Technology University

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge