Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Saman Taghavi Zargar is active.

Publication


Featured researches published by Saman Taghavi Zargar.


foundations and practice of security | 2013

ONTIDS: A Highly Flexible Context-Aware and Ontology-Based Alert Correlation Framework

Alireza Sadighian; José M. Fernandez; Antoine Lemay; Saman Taghavi Zargar

Several alert correlation approaches have been proposed to date to reduce the number of non-relevant alerts and false positives typically generated by Intrusion Detection Systems (IDS). Inspired by the mental process of the contextualisation used by security analysts to weed out less relevant alerts, some of these approaches have tried to incorporate contextual information such as: type of systems, applications, users, and networks into the correlation process. However, these approaches are not flexible as they only perform correlation based on the narrowly defined contexts. information resources available to the security analysts while preserving the maximum flexibility and the power of abstraction in both the definition and the usage of such concepts, we propose ONTIDS, a context-aware and ontology-based alert correlation framework that uses ontologies to represent and store the alerts information, alerts context, vulnerability information, and the attack scenarios. ONTIDS employs simple ontology logic rules written in Semantic Query-enhance Web Rule Language (SQWRL) to correlate and filter out non-relevant alerts. We illustrate the potential usefulness and the flexibility of ONTIDS by employing its reference implementation on two separate case studies, inspired from the DARPA 2000 and UNB ISCX IDS evaluation datasets.


conference on risks and security of internet and systems | 2013

Semantic-based context-aware alert fusion for distributed Intrusion Detection Systems

Alireza Sadighian; Saman Taghavi Zargar; José M. Fernandez; Antoine Lemay

One of the fundamental challenges in real-world Intrusion Detection Systems (IDS) is the large number of redundant, non-relevant false positive alerts that they generate. In this paper, we propose an alert fusion approach that incorporates contextual information with the goal of leveraging the benefits of multi-sensor detection while reducing false positives. In order to allow for automated reasoning on the information resources available for the fusion process, we design a set of comprehensive and extensible ontologies, and implemented fusion and detection algorithms as simple rules in Ontologic Web Language Description Logic (OWL-DL), using the Semantic Query-Enhance Web Rule Language (SQWRL). To illustrate and evaluate our approach, we use one of the attack scenarios of the DARPA 2000 dataset. The results obtained show that our approach can reduce false positives, while achieving the same detection rates achieved by using the Snort and ISS RealSecure.


international conference on information and communication technologies | 2006

MMUF: An Optimized Scheduling Algorithm for Dynamically Reconfigurable Real-Time Systems

Saman Taghavi Zargar; Vahid Salmani; Mahmoud Naghibzadeh

In this paper we compare our proposed hybrid scheduling algorithm which is a modification of Maximum Urgency First (MUF) scheduling algorithm with MUF scheduling algorithm. The maximum urgency first algorithm combines the advantages of fixed and dynamic scheduling to provide the dynamically changing systems with flexible scheduling. This algorithm, however, has a major shortcoming due to its scheduling mechanism which may cause a critical task to miss its deadline. The modified maximum urgency first scheduling algorithm resolves the mentioned problem. We have made a comparison between our proposed algorithm and maximum urgency first algorithm using simulation and results are presented. It is shown that modified maximum urgency first is superior to maximum urgency first, since it usually has less task preemption and hence, less related overhead. It also leads to less failed non-critical tasks in overloaded situations and leads to less average response time for tasks. Moreover, in most cases, MMUF better utilizes the CPU than MUF does.


IEEE Communications Surveys and Tutorials | 2013

A Survey of Defense Mechanisms Against Distributed Denial of Service (DDoS) Flooding Attacks

Saman Taghavi Zargar; James B. D. Joshi; David Tipper


collaborative computing | 2011

DCDIDP: A distributed, collaborative, and data-driven intrusion detection and prevention framework for cloud computing environments

Saman Taghavi Zargar; Hassan Takabi; James B. D. Joshi


Archive | 2009

Security in Dynamic Spectrum Access Systems: A Survey

Saman Taghavi Zargar; Martin B. H. Weiss; Carlos E. Caicedo; James B. D. Joshi


collaborative computing | 2010

A collaborative approach to facilitate intrusion detection and response against DDoS attacks.

Saman Taghavi Zargar; James B. D. Joshi


information reuse and integration | 2014

DiCoTraM: A distributed and coordinated DDoS flooding attack tailored traffic monitoring

Saman Taghavi Zargar; James B. D. Joshi; David Tipper


Archive | 2009

Security Issues in Dynamic Spectrum Access

Saman Taghavi Zargar; Martin B. H. Weiss; James B. D. Joshi


color imaging conference | 2016

Differentially Private Distributed Data Analysis

Hassan Takabi; Samir Koppikar; Saman Taghavi Zargar

Collaboration


Dive into the Saman Taghavi Zargar's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hassan Takabi

University of North Texas

View shared research outputs
Top Co-Authors

Avatar

David Tipper

University of Pittsburgh

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Alireza Sadighian

École Polytechnique de Montréal

View shared research outputs
Top Co-Authors

Avatar

Antoine Lemay

École Polytechnique de Montréal

View shared research outputs
Top Co-Authors

Avatar

José M. Fernandez

École Polytechnique de Montréal

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

M. Amir Moulavi

Royal Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge