Raed Al-Shaikh
King Fahd University of Petroleum and Minerals
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Raed Al-Shaikh.
international conference on computer modelling and simulation | 2012
Sadiq M. Sait; Raed Al-Shaikh
As high performance clusters (HPC) expand in terms of nodes count and processing cores, internet work congestion and bottlenecks at the host and network levels become one of the main concerns in clustered computing. Considerably, the Infiniband Architecture (IBA) Specification provides six different routing algorithms to better optimize the HPC internet work traffic. In this paper, we present these algorithms and then evaluate QLogics dispersive routing using a large-scale Infiniband cluster, equipped with Intels latest Westmere processor. The paper presents the cluster configuration and evaluates its performance using High Performance LINPACK (HPL) and Intel MPI (IMB) benchmarks. Our results show that whilst the default Min Hop algorithm suits most of the serial and point-to-point benchmarks, the dispersive routing algorithm exhibits improved performance when running specific computational and parallel transfer routines.
recent advances in intrusion detection | 2010
Mohammed H. Sqalli; Raed Al-Shaikh; Ezzat Ahmed
The main objectives of this work is to present our preliminary experience in simulating a virtual distributed honeynet environment at King Fahd University of Petroleum and Minerals (KFUPM) using Honeywall CDROM [1], Snort, Sebek and Tcpreplay [3] tools. In our honeynet design, we utilized the Honeywall CDROM to act as a centralized logging center for our distributed high-interaction honeypots. All honeypot servers, as well as the Honeywall CDROM itself, were built on top of a virtualized VMWare environment, while their logs were forwarded to the centralized server.
european symposium on computer modeling and simulation | 2010
Mohammed H. Sqalli; Raed Al-Shaikh; Ezzat Ahmed
In recent years, there has been a growing interest in information protection and security for large organizations. This has led to a growing demand for more aggressive forms of security to complement the existing techniques. One of these security methods involves the use of distributed honey nets. Honey nets are network systems deployed for the sole purpose of being compromised, in order to assess adversaries. In this paper, we conduct a comprehensive survey for implementing distributed honey nets and explain their architecture and design. We also present our experience in simulating a virtual distributed honey net environment at King Fahd University of Petroleum and Minerals (KFUPM) using Honey wall CDROM, Snort and Sebek tools. Our experience shows that Honey wall CDROM proved to be a solid tool that is capable of capturing great deal of information and assisting in analyzing traffic on the distributed honey pots. The honey net designer, nevertheless, needs to consider few issues related to scalability and resource utilization.
software engineering artificial intelligence networking and parallel distributed computing | 2014
Raed Al-Shaikh; Sadiq M. Sait
international conference on computational intelligence, modelling and simulation | 2011
Sadiq M. Sait; Muhammed Al-Mulhem; Raed Al-Shaikh
european symposium on computer modeling and simulation | 2010
Basem Madai; Raed Al-Shaikh
Archive | 2015
Raed Al-Shaikh; Sadiq M. Sait
Archive | 2015
Raed Al-Shaikh; Sadiq M. Sait
Archive | 2014
Raed Al-Shaikh; Sadiq M. Sait
Archive | 2014
Raed Al-Shaikh; Sadiq M. Sait