Sheharbano Khattak
University of Cambridge
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sheharbano Khattak.
IEEE Communications Surveys and Tutorials | 2014
Sheharbano Khattak; Naurin Rasheed Ramay; Kamran Riaz Khan; Affan A. Syed; Syed Ali Khayam
A number of detection and defense mechanisms have emerged in the last decade to tackle the botnet phenomenon. It is important to organize this knowledge to better understand the botnet problem and its solution space. In this paper, we structure existing botnet literature into three comprehensive taxonomies of botnet behavioral features, detection and defenses. This elevated view highlights opportunities for network defense by revealing shortcomings in existing approaches. We introduce the notion of a dimension to denote different criteria which can be used to classify botnet detection techniques. We demonstrate that classification by dimensions is particularly useful for evaluating botnet detection mechanisms through various metrics of interest. We also show how botnet behavioral features from the first taxonomy affect the accuracy of the detection approaches in the second taxonomy. This information can be used to devise integrated detection strategies by combining complementary approaches. To provide real-world context, we liberally augment our discussions with relevant examples from security research and products.
internet measurement conference | 2014
Sheharbano Khattak; Mobin Javed; Syed Ali Khayam; Zartash Afzal Uzmi; Vern Paxson
Internet censorship artificially changes the dynamics of resource production and consumption, affecting a range of stakeholders that include end users, service providers, and content providers. We analyze two large-scale censorship events in Pakistan: blocking of pornographic content in 2011 and of YouTube in 2012. Using traffic datasets collected at home and SOHO networks before and after the censorship events, we: a) quantify the demand for blocked content, b) illuminate challenges encountered by service providers in implementing the censorship policies, c) investigate changes in user behavior (e.g., with respect to circumvention) after censorship, and d) assess benefits extracted by competing content providers of blocked content.
privacy enhancing technologies | 2016
Sheharbano Khattak; Tariq Elahi; Laurent Simon; Colleen M. Swanson; Steven J. Murdoch; Ian Goldberg
Abstract An increasing number of countries implement Internet censorship at different scales and for a variety of reasons. Several censorship resistance systems (CRSs) have emerged to help bypass such blocks. The diversity of the censor’s attack landscape has led to an arms race, leading to a dramatic speed of evolution of CRSs. The inherent complexity of CRSs and the breadth of work in this area makes it hard to contextualize the censor’s capabilities and censorship resistance strategies. To address these challenges, we conducted a comprehensive survey of CRSs-deployed tools as well as those discussed in academic literature-to systematize censorship resistance systems by their threat model and corresponding defenses. To this end, we first sketch a comprehensive attack model to set out the censor’s capabilities, coupled with discussion on the scope of censorship, and the dynamics that influence the censor’s decision. Next, we present an evaluation framework to systematize censorship resistance systems by their security, privacy, performance and deployability properties, and show how these systems map to the attack model. We do this for each of the functional phases that we identify for censorship resistance systems: communication establishment, which involves distribution and retrieval of information necessary for a client to join the censorship resistance system; and conversation, where actual exchange of information takes place. Our evaluation leads us to identify gaps in the literature, question the assumptions at play, and explore possible mitigations.
(2016) | 2016
Rishab Nithyanand; Sheharbano Khattak; Narseo Vallina-Rodriguez; Mobin Javed; Marjan Falahrastegar; Julia E. Powles; Emiliano De Cristofaro; Hamed Haddadi; Steven J. Murdoch
Adblocking tools like Adblock Plus continue to rise in popularity, potentially threatening the dynamics of advertising revenue streams. In response, a number of publishers have ramped up efforts to develop and deploy mechanisms for detecting and/or counter-blocking adblockers (which we refer to as anti-adblockers), effectively escalating the online advertising arms race. In this paper, we develop a scalable approach for identifying third-party services shared across multiple web-sites and use it to provide a first characterization of anti-adblocking across the Alexa Top-5K websites. We map websites that perform anti-adblocking as well as the entities that provide anti-adblocking scripts. We study the modus operandi of these scripts and their impact on popular adblockers. We find that at least 6.7% of websites in the Alexa Top-5K use anti-adblocking scripts, acquired from 12 distinct entities -- some of which have a direct interest in nourishing the online advertising industry.
foundations of computational intelligence | 2013
Sheharbano Khattak; Mobin Javed; Philip D. Anderson; Vern Paxson
network and distributed system security symposium | 2016
Sheharbano Khattak; David Fifield; Sadia Afroz; Mobin Javed; Srikanth Sundaresan; Vern Paxson; Steven J. Murdoch; Damon McCoy
foundations of computational intelligence | 2016
Rishab Nithyanand; Sheharbano Khattak; Mobin Javed; Narseo Vallina-Rodriguez; Marjan Falahrastegar; Julia E. Powles; Emiliano De Cristofaro; Hamed Haddadi; Steven J. Murdoch
arXiv: Cryptography and Security | 2014
Sheharbano Khattak; Laurent Simon; Steven J. Murdoch
Journal of Network and Computer Applications | 2015
Sheharbano Khattak; Zaafar Ahmed; Affan A. Syed; Syed Ali Khayam
;login: The USENIX Magazine , 41 (4) pp. 41-43. (2016) | 2016
Hamed Haddadi; Rishab Nithyanand; Sheharbano Khattak; Mobin Javed; Narseo Vallina-Rodriguez; Marjan Falahrastegar; Julia E. Powles; Emiliano De Cristofaro; Steven J. Murdoch