Sameer Hasan Albakri
Universiti Teknologi Malaysia
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sameer Hasan Albakri.
Journal of Medical Systems | 2014
Miss Laiha Mat Kiah; Sameer Hasan Albakri; A. A. Zaidan; B. B. Zaidan; Muzammil Hussain
One of the applications of modern technology in telemedicine is video conferencing. An alternative to traveling to attend a conference or meeting, video conferencing is becoming increasingly popular among hospitals. By using this technology, doctors can help patients who are unable to physically visit hospitals. Video conferencing particularly benefits patients from rural areas, where good doctors are not always available. Telemedicine has proven to be a blessing to patients who have no access to the best treatment. A telemedicine system consists of customized hardware and software at two locations, namely, at the patient’s and the doctor’s end. In such cases, the video streams of the conferencing parties may contain highly sensitive information. Thus, real-time data security is one of the most important requirements when designing video conferencing systems. This study proposes a secure framework for video conferencing systems and a complete management solution for secure video conferencing groups. Java Media Framework Application Programming Interface classes are used to design and test the proposed secure framework. Real-time Transport Protocol over User Datagram Protocol is used to transmit the encrypted audio and video streams, and RSA and AES algorithms are used to provide the required security services. Results show that the encryption algorithm insignificantly increases the video conferencing computation time.
international conference on computer communications | 2014
Sameer Hasan Albakri; Bharanidharan Shanmgam; Ganthan Narayana Samy; Norbik Bashah Idris; Azuan Ahmed
Cloud computing is not just a service of computing or how the computing service is delivered. It is transforming the computing landscape, which means many big technical, economic and business changes will happen. Cloud computing has emerged with a promise to decrease the cost of computing implementation and deliver the computing as service, where the client pay only for what he needed and used. On the other hand, many security concerns arise with cloud computing. This paper introduces a practical study for cloud computing security threats. This study was conducted on a real SaaS provider with more than one thousand and five hundred clients for 285 days.
2013 International Conference on Informatics and Creative Multimedia, ICICM 2013 | 2013
Hairil Annuar; Bharanidharan Shanmugam; Azuan Ahmad; Norbik Bashah Idris; Sameer Hasan Albakri; Ganthan Narayana Sami
The demand for protecting the enterprise network infrastructure from network security threats has shown an increase in recent years. Therefore, a security enforcement mechanism for the network is required to protect the network against the threats especially from internal. Generally, staffs and visitors that use their computer everywhere could bring a threat as it escape from the protective measures imposed by an organization. Therefore, it is necessary to secure enterprise network from being compromised by using endpoint security solution. Network Access Control (NAC) is capable to provide solution for determining the integrity of endpoints which serve as a basis for trustworthy communication. However, literature review reveals several types of NAC architecture that have been implemented by solution providers such as CISCO NAC and Microsoft NAP employs proprietary standard and the deployment method used is not comprehensive. In addition, previous architecture only complies with one of the NAC characteristic such as in-band or out-band, managed or unmanaged LAN, agent or agentless, pre-admission or postadmission and limited OS support. Hence, this study will focus on reviewing all those NAC architecture as a baseline to produce an enhanced NAC architecture which can cater for all NAC characteristics. The results shows that proposed NAC architecture which is combination of all the NAC characteristics can effectively control the network access by endpoint device. This proposed NAC architecture maybe useful as a basis for reference not only for researchers in this field but also for network administrator. It is necessary to review the NAC architecture from time to time to ensure that the security is remain intact.
Archive | 2018
Ganthan Narayana Samy; Sameer Hasan Albakri; Nurazean Maarop; Pritheega Magalingam; Doris Hooi-Ten Wong; Bharanidharan Shanmugam; Sundresan Perumal
Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.
International Conference of Reliable Information and Communication Technology | 2017
Ganthan Narayana Samy; Bharanidharan Shanmugam; Nurazean Maarop; Pritheega Magalingam; Sundresan Perumal; Sameer Hasan Albakri
The cloud computing model has been developed with promises to overcome the difficulties of other computing models. The low cost of computing resources, availability, location independence, and more focus on business objectives that this model promises are the most attractive features for companies. However, security issues are still the main obstacle that prevent widespread cloud computing adaptation. Digital forensics, a necessary process after any security incident, is faced with many challenges in the cloud computing environment. In this paper, we discuss the challenges digital forensics face in a cloud computing environment.
Informatics and Creative Multimedia (ICICM), 2013 International Conference on | 2014
Hairil Annuar; Bharanidharan Shanmugam; Azuan Ahmad; Norbik Bashah Idris; Sameer Hasan Albakri; Ganthan Nayarana Samy
The demand for protecting the enterprise network infrastructure from network security threats has shown an increase in recent years. Therefore, a security enforcement mechanism for the network is required to protect the network against the threats especially from internal. Generally, staffs and visitors that use their computer everywhere could bring a threat as it escape from the protective measures imposed by an organization. Therefore, it is necessary to secure enterprise network from being compromised by using endpoint security solution. Network Access Control (NAC) is capable to provide solution for determining the integrity of endpoints which serve as a basis for trustworthy communication. However, literature review reveals several types of NAC architecture that have been implemented by solution providers such as CISCO NAC and Microsoft NAP employs proprietary standard and the deployment method used is not comprehensive. In addition, previous architecture only complies with one of the NAC characteristic such as in-band or out-band, managed or unmanaged LAN, agent or agentless, pre-admission or postadmission and limited OS support. Hence, this study will focus on reviewing all those NAC architecture as a baseline to produce an enhanced NAC architecture which can cater for all NAC characteristics. The results shows that proposed NAC architecture which is combination of all the NAC characteristics can effectively control the network access by endpoint device. This proposed NAC architecture maybe useful as a basis for reference not only for researchers in this field but also for network administrator. It is necessary to review the NAC architecture from time to time to ensure that the security is remain intact.
International Journal of Physical Sciences | 2011
Sameer Hasan Albakri; Miss Laiha Mat Kiah; A. A. Zaidan; B. B. Zaidan; Gazi Mahabubul Alam
International Journal of Physical Sciences | 2011
Miss Laiha Mat Kiah; B. B. Zaidan; A. A. Zaidan; A. Mohammed Ahmed; Sameer Hasan Albakri
Security and Communication Networks | 2014
Sameer Hasan Albakri; Bharanidharan Shanmugam; Ganthan Narayana Samy; Norbik Bashah Idris; Azuan Ahmed
Journal of Medical Systems | 2015
Hamdan O. Alanazi; A. A. Zaidan; B. B. Zaidan; Miss Laiha Mat Kiah; Sameer Hasan Albakri