Rosli Salleh
Information Technology University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Rosli Salleh.
Digital Investigation | 2015
Ali Feizollah; Nor Badrul Anuar; Rosli Salleh; Ainuddin Wahid Abdul Wahab
The widespread use of mobile devices in comparison to personal computers has led to a new era of information exchange. The purchase trends of personal computers have started decreasing whereas the shipment of mobile devices is increasing. In addition, the increasing power of mobile devices along with portability characteristics has attracted the attention of users. Not only are such devices popular among users, but they are favorite targets of attackers. The number of mobile malware is rapidly on the rise with malicious activities, such as stealing users data, sending premium messages and making phone call to premium numbers that users have no knowledge. Numerous studies have developed methods to thwart such attacks. In order to develop an effective detection system, we have to select a subset of features from hundreds of available features. In this paper, we studied 100 research works published between 2010 and 2014 with the perspective of feature selection in mobile malware detection. We categorize available features into four groups, namely, static features, dynamic features, hybrid features and applications metadata. Additionally, we discuss datasets used in the recent research studies as well as analyzing evaluation measures utilized.
international conference on communication software and networks | 2009
Xichun Li; Abudulla Gani; Rosli Salleh; Omar Zakaria
The future of mobile wireless communication networks will be experienced several generations as which have been experienced. This kind of development will drive the researches of information technology in industrial area. In this paper, we predict the future generations of mobile wireless communication networks including 4th, 5th, 6th and 7th generations. The main objective of this paper is to propose a technical frame for industry in the future. Thus, this paper is focused on the specification of future generations of wireless mobile communication networks.
ACM Computing Surveys | 2017
Kimberly Tam; Ali Feizollah; Nor Badrul Anuar; Rosli Salleh; Lorenzo Cavallaro
With the integration of mobile devices into daily life, smartphones are privy to increasing amounts of sensitive information. Sophisticated mobile malware, particularly Android malware, acquire or utilize such data without user consent. It is therefore essential to devise effective techniques to analyze and detect these threats. This article presents a comprehensive survey on leading Android malware analysis and detection techniques, and their effectiveness against evolving malware. This article categorizes systems by methodology and date to evaluate progression and weaknesses. This article also discusses evaluations of industry solutions, malware statistics, and malware evasion techniques and concludes by supporting future research paths.
Journal of Zhejiang University Science C | 2014
Ahmad Karim; Rosli Salleh; Muhammad Shiraz; Syed Adeel Ali Shah; Irfan Awan; Nor Badrul Anuar
In recent years, the Internet has enabled access to widespread remote services in the distributed computing environment; however, integrity of data transmission in the distributed computing platform is hindered by a number of security issues. For instance, the botnet phenomenon is a prominent threat to Internet security, including the threat of malicious codes. The botnet phenomenon supports a wide range of criminal activities, including distributed denial of service (DDoS) attacks, click fraud, phishing, malware distribution, spam emails, and building machines for illegitimate exchange of information/materials. Therefore, it is imperative to design and develop a robust mechanism for improving the botnet detection, analysis, and removal process. Currently, botnet detection techniques have been reviewed in different ways; however, such studies are limited in scope and lack discussions on the latest botnet detection techniques. This paper presents a comprehensive review of the latest state-of-the-art techniques for botnet detection and figures out the trends of previous and current research. It provides a thematic taxonomy for the classification of botnet detection techniques and highlights the implications and critical aspects by qualitatively analyzing such techniques. Related to our comprehensive review, we highlight future directions for improving the schemes that broadly span the entire botnet detection research field and identify the persistent and prominent research challenges that remain open.
international symposium on industrial electronics | 2012
Meisam Eslahi; Rosli Salleh; Nor Badrul Anuar
Mobile devices are now well integrated with advanced capabilities and technologies such as the Internet. Today, mobile security has become a globally critical issue due to the high usage of mobile devices, their convenience and mobility. However, they are not properly protected compared to computer and computer networks, and the users pay less attention to the security updates. Recently, mobile devices and networks have been targeted by one of the most dangerous cyber threats, known as botnets. Mobile botnets have not yet been fully explored as they have only recently migrated to mobile infrastructures. Therefore, in this paper, we present an overview of mobile botnets including studies on the new command and control mechanisms, actual examples and malicious activities. We also review the current challenges and limitations of botnet detection in mobile environments, as well as existing solutions.
world conference on information systems and technologies | 2014
Ahmad Karim; Syed Adeel Ali Shah; Rosli Salleh
Mobile botnets have recently evolved owing to the rapid growth of smartphone technologies. The implications of botnets have inspired attention from the academia and industry alike, which includes vendors, investors, hackers and researcher community. Above all, the capability of botnets is exploited in a wide range of criminal activities, such as, Distributed Denial of Service (DDoS) attacks, stealing business information, remote access, online/click fraud, phishing, malware distribution, spam emails, and building mobile devices for illegitimate exchange of information/materials. In this paper, we investigate mobile botnet attacks by exploring attack vectors and a subsequent presentation of a well-defined thematic taxonomy. Through identification of significant parameters from the taxonomy, we conduct a comparison to explore effects of existing mobile botnets on commercial as well as open source mobile operating system platforms. The parameters for comparison include mobile botnet architecture, platform, target audience, vulnerabilities/loopholes, operational impact and detection approaches. Related to our findings, we present open research challenges in this domain.
IEEE Systems Journal | 2016
Hero Modares; Amirhosein Moravejosharieh; Jaime Lloret; Rosli Salleh
As wireless technologies have been improving in recent years, a mobility management mechanism is required to provide seamless and ubiquitous mobility for end users who are roaming among points of attachment in wireless networks. Thus, Mobile IPv6 was developed by the Internet Engineering Task Force (IETF) to support the mobility service. However, Mobile IPv6 is unable to fulfill the requirements of real-time applications, such as video streaming service and voice over IP service, due to its high handover (HO) latency. To address this problem, Proxy Mobile IPv6 (PMIPv6) has been introduced by the IETF. In PMIPv6, which is a network-based approach, the serving network controls mobility management on behalf of the mobile node (MN). Thus, the MN is not required to participate in any mobility-related signaling. However, the PMIPv6 still suffers from lengthy HO latency and packet loss during a HO. This paper explores an elaborated survey on the HO procedure of PMIPv6 protocols and proposed approaches accompanied by a discussion about their points of weakness.
Journal of Network and Computer Applications | 2014
Hero Modares; Amirhossein Moravejosharieh; Jaime Lloret; Rosli Salleh
Mobile IPv6, also known as MIPv6, is an IP-layer protocol that offers mobility support. The MIPv6 protocol allows Mobile Nodes (MNs) to remain connected to Correspondent Nodes (CNs), even when moving to foreign networks. Basically, MNs may change their position throughout the IPv6 network while retaining their existing connections by managing address variations in the Internet layer. Numerous advantages are thus attained, but security remains a fundamental concern. According to our research, a number of protocols can form a secure connection environment between MNs and CNs, though each has advantages and disadvantages. This paper presents a state-of-the art survey of security protocols in MIPv6. Moreover, we propose taxonomy, and comparative study that does not exist in the surveys in the literature. Along with the location management feature within these protocols, potential attacks and security threats, together with the security services and requirements are necessary for minimizing such problems, are subsequently presented.
international conference on intelligent systems, modelling and simulation | 2012
Amirhossein Moravejosharieh; Hero Modares; Rosli Salleh
Mobile IP enables a mobile node to be recognized via a single IP address even though the node may travel from one network to another. Despite reposition between different networks, connectivity at different positions is attained continuously with no user intervention. Mobile IP grants connectivity to nodes everywhere, whether within home networks or away from home. General improvement in MIPv6 may offer enhanced security, however, there are areas still prone to attacks. Security solutions for the mobile IP protocol are still in progress. IP Security (IPsec) in the IPv6 protocol can secure Mobile IPv6 more than IPv4. IPsec presents security services for the application and transportation layer protocols of the TCP/IP stack. However, there are several unsolved concerns and problems with Mobile IPv6 in most cases which justifies development of new methods to provide acceptable level of security. This article focuses on how IPsec works, Mobile IPv6 security, potential threats and security considerations.
Journal of Network and Computer Applications | 2016
Mohd Faizal Ab Razak; Nor Badrul Anuar; Rosli Salleh; Ahmad Firdaus
Malicious software (malware) is a computer program designed to create harmful and undesirable effects. It considered as one of the many dangerous threats for Internet users. Rootkit, botnet, worm, spyware and Trojan horse are the most common types of malware. Most malware studies aim to investigate novel approaches of preventing, detecting and responding to malware threats. However, despite the many articles published to support the research activities, there is still no trace of any bibliometric report that demonstrates the research trends. This paper aims to fill in that gap by presenting a comprehensive evaluation of malware research practices. It begins by looking at a pool of over 4000 articles that are published between 2005 and 2015 in the ISI Web of Science database. Using bibliometric analysis, this paper discusses the research activities done in both North America, Asia and other continents. This paper performed a detailed analysis by looking at the number of articles published, citations, research area, keywords, institutions, terms, and authors. A summary of the research activities continues by listing the terms into a classification of malware detection system which underlines the important area of malware research. From the analysis, it was concluded that there are several significant impacts of research activities in Asia, in comparison to other continents. In particular, this paper discusses the number of papers published by Asian countries such as China, Korea, India, Singapore and Malaysia in relation to the Middle East and North America. Presents a bibliometric analysis of malware using the Web of Knowledge database.Presents the discussion upon the research trends related to malware.Review on malware detection systems.Highlights the challenges and future trends in malware detection system.