Sufyan Almajali
Princess Sumaya University for Technology
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Sufyan Almajali.
international conference on networking | 2006
Sufyan Almajali; Tzilla Elrad
Computer networks and network applications change continuously. New laws and policies are released constantly in every field. Many of these laws and policies have a great impact on network operations and applications. To support new policies and laws, network administrators and application developers perform many activities, such as changing application programs to support the new policies, downloading, installing, configuring, and activating the new versions of the application. In this paper, we introduce a new networking framework called Aspect Oriented Network Framework (AONF). AONF simplifies network management and dynamic policies support. By using our framework, organizations will better control their networks through easier management of organization policies. It allows the network and network applications to adapt dynamically to different organization policies. Furthermore, many of the network administration tasks can be automated and a higher degree of network transparency can be provided for network users.
IEEE Internet of Things Journal | 2018
Haythem Bany Salameh; Sufyan Almajali; Moussa Ayyash; Hany Elgala
The expected widespread usage of Internet-of-Things (IoT) devices and the associated diversity of applications will place extra pressure on network resources including bandwidth availability. In networking within IoT, spectrum scarcity requires the consideration of the adaptive cognitive radio (CR) technology to achieve interference-free and on-demand IoT solutions for a number of applications. However, CR networks share the same security weaknesses of legacy wireless networks. Jamming is considered a common attack, where jammers can attack networks in a proactive or reactive approach. In this paper, we study the channel assignment problem under both proactive and reactive jamming attacks. Specifically, we propose a novel probabilistic-based channel assignment mechanism that aims at minimizing the invalidity ratio of CR packet transmissions subject to delay constraints. The proposed scheme exploits the statistical information of licensed primary users activities, fading conditions and jamming attacks over idle channels to provide communicating CR IoT devices with the most secured channels of lowest invalidity ratios. Simulation results show that our proposed security, availability, and quality-aware channel assignment algorithm can significantly improve network performance.
international conference on future networks | 2018
Ayah Atiyah; Sufyan Almajali
Denial of Service attack is a cyber-attack that overwhelms the victim resources (system resources and network bandwidth) and makes them unavailable to legitimate users. To take the edge of this problem, packet filtering schemes at the front end of network monitoring systems (such as an Intrusion Detection System) have been proposed. Detecting suspicious activities and abnormal high traffic activities are challenging tasks as existing packet filtering and monitoring algorithms perform poorly when the given time budget of execution is minimum. Satisfying such a standard requires a packet filtering algorithm to be capable of controlling its execution time to provide much superior average case performance. Our proposal consists of developing a traffic monitoring algorithm that uses Binary Search Tree along with a shortcut to speed up the detection of active traffic sources in the network. The research paper presents the performance efficiency and the time complexity of the proposed algorithm. Results show that the shortcut traffic monitoring algorithm will result in performance improvement compared to the conventional algorithms of detecting top active nodes. This can be utilized in detecting quickly suspicious active nodes and take early actions.
computer and information technology | 2017
Mariam Khader; Marwah Alian; Raghda Hraiz; Sufyan Almajali
Internet of things is promising to change the world to a better one with its tremendous applications in our daily lives where all physical objects will be connected to each other including humans. One major category of Internet of Things applications falls in the health industry, where sensors collect and register critical measurements such as updates about pressure and glucose. Encryption is a crucial issue to consider for maintaining the privacy of data in health applications. An efficient way of encryption with low power consumption is desired for Internet of Things. In this research, an energy-efficient encryption mechanism is proposed by modifying the AES algorithm to be suitable for Internet of Things sensors. The updated algorithm is evaluated and session time is compared to brute force time.
2017 Second International Conference on Fog and Mobile Edge Computing (FMEC) | 2017
Sufyan Almajali; Dhiah el Diehn I. Abou-Tair
Developing applications with intelligent context access capabilities is challenged by the difficulty of obtaining advanced context information. The complexity of the logic required for processing context information adds another barrier for developing advanced context-aware applications. In this research paper, we propose a solution that allows context information sharing and extension toward the generation of easily accessible specialized context information. The proposed solution allows forming context data providers specialized in certain context types with their own unique services. As a result, the solution provides application developers with new abilities in building apps that utilize intelligent context service with minimum development efforts.
2017 Fourth International Conference on Software Defined Systems (SDS) | 2017
Malek Al-Zewairi; Dima Suleiman; Sufyan Almajali
Software Defined Networking is an emerging technology that permits computer network infrastructure to be scaled dynamically as needed while enhancing the manageability of the various network devices in heterogeneous environment as opposed to classical networking. These capabilities emerge from the separation of the data plane from the control plane; thus, allowing the network devices to be programmatically managed and controlled. Similarly, the concept of Software Defined Security allows security solutions such as Firewalls and Intrusion Detection Systems to be dynamically implemented, controlled and managed using programmable interfaces. In this research, the authors propose an experimental software defined security controller based on the Open vSwitch Controller to detect and prevent IP and MAC spoofing attacks on the network. The proposed controller is simulated using Mininet. The simulation results confirm that the proposed controller is capable to detect and prevent the aforementioned attacks with high precision.
Journal of Computer Science | 2013
Jess Nielsen; Sufyan Almajali
This article describes a way to build a consolidated log that can be used to facilitate the state of Windows services at runtime. It makes a side by side introduction of code instrumentation techniques and autonomic techniques that can be used to collected data from running systems in order to construct a consolidated log. The techniques try to deal with the non-standardized syntaxes and contents that come with heterogeneous logs. The collected data might be a foundation for a replacement to such logs hence the behavior can be determined by such collected data. These behaviors can be mapped to common, standardized and easy-understandable high level events that can be used as a log themselves.
wireless telecommunications symposium | 2006
Sufyan Almajali; Tzilla Elrad
In this paper, we present a new open software design model for developing adaptive, evolvable, and interoperable software for wireless network applications, devices, protocols, and platforms. The new model relies on two main components: an open software development technology structure and a new suggested standardization for inter-applications interface. The model gives the different wireless vendors the capability to address and implement wireless applications, protocols and concerns in an easy modular way that is more evolvable and suitable for wireless networks
Archive | 2005
Sufyan Almajali; Tzilla Elrad
international conference on e learning and e technologies in education | 2012
Sufyan Almajali