Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sheharbano Khattak is active.

Publication


Featured researches published by Sheharbano Khattak.


IEEE Communications Surveys and Tutorials | 2014

A Taxonomy of Botnet Behavior, Detection, and Defense

Sheharbano Khattak; Naurin Rasheed Ramay; Kamran Riaz Khan; Affan A. Syed; Syed Ali Khayam

A number of detection and defense mechanisms have emerged in the last decade to tackle the botnet phenomenon. It is important to organize this knowledge to better understand the botnet problem and its solution space. In this paper, we structure existing botnet literature into three comprehensive taxonomies of botnet behavioral features, detection and defenses. This elevated view highlights opportunities for network defense by revealing shortcomings in existing approaches. We introduce the notion of a dimension to denote different criteria which can be used to classify botnet detection techniques. We demonstrate that classification by dimensions is particularly useful for evaluating botnet detection mechanisms through various metrics of interest. We also show how botnet behavioral features from the first taxonomy affect the accuracy of the detection approaches in the second taxonomy. This information can be used to devise integrated detection strategies by combining complementary approaches. To provide real-world context, we liberally augment our discussions with relevant examples from security research and products.


internet measurement conference | 2014

A Look at the Consequences of Internet Censorship Through an ISP Lens

Sheharbano Khattak; Mobin Javed; Syed Ali Khayam; Zartash Afzal Uzmi; Vern Paxson

Internet censorship artificially changes the dynamics of resource production and consumption, affecting a range of stakeholders that include end users, service providers, and content providers. We analyze two large-scale censorship events in Pakistan: blocking of pornographic content in 2011 and of YouTube in 2012. Using traffic datasets collected at home and SOHO networks before and after the censorship events, we: a) quantify the demand for blocked content, b) illuminate challenges encountered by service providers in implementing the censorship policies, c) investigate changes in user behavior (e.g., with respect to circumvention) after censorship, and d) assess benefits extracted by competing content providers of blocked content.


privacy enhancing technologies | 2016

SoK: Making Sense of Censorship Resistance Systems

Sheharbano Khattak; Tariq Elahi; Laurent Simon; Colleen M. Swanson; Steven J. Murdoch; Ian Goldberg

Abstract An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes it hard to contextualize the censor’s capabilities and censorship resistance strategies. To address these challenges, we conducted a comprehensive survey of CRSs-deployed tools as well as those discussed in academic literature-to systematize censorship resistance systems by their threat model and corresponding defenses. To this end, we first sketch a comprehensive attack model to set out the censor’s capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor’s decision. Next, we present an evaluation framework to systematize censorship resistance systems by their security, privacy, performance and deployability properties, and show how these systems map to the attack model. We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client to join the censorship resistance system; and conversation, where actual exchange of information takes place. Our evaluation leads us to identify gaps in the literature, question the assumptions at play, and explore possible mitigations.


(2016) | 2016

Research data supporting "Adblocking and Counter-Blocking: A Slice of the Arms Race"

Rishab Nithyanand; Sheharbano Khattak; Narseo Vallina-Rodriguez; Mobin Javed; Marjan Falahrastegar; Julia E. Powles; Emiliano De Cristofaro; Hamed Haddadi; Steven J. Murdoch

Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop a scalable approach for identifying third-party services shared across multiple web-sites and use it to provide a first characterization of anti-adblocking across the Alexa Top-5K websites. We map websites that perform anti-adblocking as well as the entities that provide anti-adblocking scripts. We study the modus operandi of these scripts and their impact on popular adblockers. We find that at least 6.7% of websites in the Alexa Top-5K use anti-adblocking scripts, acquired from 12 distinct entities -- some of which have a direct interest in nourishing the online advertising industry.


foundations of computational intelligence | 2013

Towards Illuminating a Censorship Monitor's Model to Facilitate Evasion

Sheharbano Khattak; Mobin Javed; Philip D. Anderson; Vern Paxson


network and distributed system security symposium | 2016

Do You See What I See? Differential Treatment of Anonymous Users

Sheharbano Khattak; David Fifield; Sadia Afroz; Mobin Javed; Srikanth Sundaresan; Vern Paxson; Steven J. Murdoch; Damon McCoy


foundations of computational intelligence | 2016

Ad-Blocking and Counter Blocking: A Slice of the Arms Race

Rishab Nithyanand; Sheharbano Khattak; Mobin Javed; Narseo Vallina-Rodriguez; Marjan Falahrastegar; Julia E. Powles; Emiliano De Cristofaro; Hamed Haddadi; Steven J. Murdoch


arXiv: Cryptography and Security | 2014

Systemization of Pluggable Transports for Censorship Resistance

Sheharbano Khattak; Laurent Simon; Steven J. Murdoch


Journal of Network and Computer Applications | 2015

BotFlex: A community-driven tool for botnet detection

Sheharbano Khattak; Zaafar Ahmed; Affan A. Syed; Syed Ali Khayam


;login: The USENIX Magazine , 41 (4) pp. 41-43. (2016) | 2016

The Adblocking Tug-of-War

Hamed Haddadi; Rishab Nithyanand; Sheharbano Khattak; Mobin Javed; Narseo Vallina-Rodriguez; Marjan Falahrastegar; Julia E. Powles; Emiliano De Cristofaro; Steven J. Murdoch

Collaboration


Dive into the Sheharbano Khattak's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Mobin Javed

University of California

View shared research outputs
Top Co-Authors

Avatar

Syed Ali Khayam

National University of Sciences and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Hamed Haddadi

University College London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Marjan Falahrastegar

Queen Mary University of London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Vern Paxson

University of California

View shared research outputs
Top Co-Authors

Avatar

Affan A. Syed

National University of Computer and Emerging Sciences

View shared research outputs
Researchain Logo
Decentralizing Knowledge