Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Sumayah A. Alrwais is active.

Publication


Featured researches published by Sumayah A. Alrwais.


dependable systems and networks | 2015

Detection of Early-Stage Enterprise Infection by Mining Large-Scale Log Data

Alina Oprea; Zhou Li; Ting-Fang Yen; Sang H. Chin; Sumayah A. Alrwais

Recent years have seen the rise of sophisticated attacks including advanced persistent threats (APT) which pose severe risks to organizations and governments. Additionally, new malware strains appear at a higher rate than ever before. Since many of these malware evade existing security products, traditional defenses deployed by enterprises today often fail at detecting infections at an early stage. We address the problem of detecting early-stage APT infection by proposing a new framework based on belief propagation inspired from graph theory. We demonstrate that our techniques perform well on two large datasets. We achieve high accuracy on two months of DNS logs released by Los Alamos National Lab (LANL), which include APT infection attacks simulated by LANL domain experts. We also apply our algorithms to 38TB of web proxy logs collected at the border of a large enterprise and identify hundreds of malicious domains overlooked by state-of-the-art security products.


ieee symposium on security and privacy | 2014

Hunting the Red Fox Online: Understanding and Detection of Mass Redirect-Script Injections

Zhou Li; Sumayah A. Alrwais; XiaoFeng Wang; Eihal Alowaisheq

Compromised websites that redirect web traffic to malicious hosts play a critical role in organized web crimes, serving as doorways to all kinds of malicious web activities (e.g., drive-by downloads, phishing etc.). They are also among the most elusive components of a malicious web infrastructure and extremely difficult to hunt down, due to the simplicity of redirect operations, which also happen on legitimate sites, and extensive use of cloaking techniques. Making the detection even more challenging is the recent trend of injecting redirect scripts into JavaScript (JS) files, as those files are not indexed by search engines and their infections are therefore more difficult to catch. In our research, we look at the problem from a unique angle: the adversarys strategy and constraints for deploying redirect scripts quickly and stealthily. Specifically, we found that such scripts are often blindly injected into both JS and HTML files for a rapid deployment, changes to the infected JS files are often made minimum to evade detection and also many JS files are actually JS libraries (JS-libs) whose uninfected versions are publicly available. Based upon those observations, we developed JsRED, a new technique for the automatic detection of unknown redirect-script injections. Our approach analyzes the difference between a suspicious JS-lib file and its clean counterpart to identify malicious redirect scripts and further searches for similar scripts in other JS and HTML files. This simple, lightweight approach is found to work effectively against redirect injection campaigns: our evaluation shows that JsRED captured most of compromised websites with almost no false positives, significantly outperforming a commercial detection service in terms of finding unknown JS infections. Based upon the compromised websites reported by JsRED, we further conducted a measurement study that reveals interesting features of redirect payloads and a new Peer-to-Peer network the adversary constructed to evade detection.


ieee symposium on security and privacy | 2017

Under the Shadow of Sunshine: Understanding and Detecting Bulletproof Hosting on Legitimate Service Provider Networks

Sumayah A. Alrwais; Xiaojing Liao; Xianghang Mi; Peng Wang; XiaoFeng Wang; Feng Qian; Raheem A. Beyah; Damon McCoy

BulletProof Hosting (BPH) services provide criminal actors with technical infrastructure that is resilient to complaints of illicit activities, which serves as a basic building block for streamlining numerous types of attacks. Anecdotal reports have highlighted an emerging trend of these BPH services reselling infrastructure from lower end service providers (hosting ISPs, cloud hosting, and CDNs) instead of from monolithic BPH providers. This has rendered many of the prior methods of detecting BPH less effective, since instead of the infrastructure being highly concentrated within a few malicious Autonomous Systems (ASes) it is now agile and dispersed across a larger set of providers that have a mixture of benign and malicious clients. In this paper, we present the first systematic study on this new trend of BPH services. By collecting and analyzing a large amount of data (25 snapshots of the entire Whois IPv4 address space, 1.5 TB of passive DNS data, and longitudinal data from several blacklist feeds), we are able to identify a set of new features that uniquely characterizes BPH on sub-allocations and that are costly to evade. Based upon these features, we train a classifier for detecting malicious sub-allocated network blocks, achieving a 98% recall and 1.5% false discovery rates according to our evaluation. Using a conservatively trained version of our classifier, we scan the whole IPv4 address space and detect 39K malicious network blocks. This allows us to perform a large-scale study of the BPH service ecosystem, which sheds light on this underground business strategy, including patterns of network blocks being recycled and malicious clients being migrated to different network blocks, in an effort to evade IP address based blacklisting. Our study highlights the trend of agile BPH services and points to potential methods of detecting and mitigating this emerging threat.


ieee symposium on security and privacy | 2016

Seeking Nonsense, Looking for Trouble: Efficient Promotional-Infection Detection through Semantic Inconsistency Search

Xiaojing Liao; Kan Yuan; XiaoFeng Wang; Zhongyu Pei; Hao Yang; Jianjun Chen; Haixin Duan; Kun Du; Eihal Alowaisheq; Sumayah A. Alrwais; Luyi Xing; Raheem A. Beyah

Promotional infection is an attack in which the adversary exploits a websites weakness to inject illicit advertising content. Detection of such an infection is challenging due to its similarity to legitimate advertising activities. An interesting observation we make in our research is that such an attack almost always incurs a great semantic gap between the infected domain (e.g., a university site) and the content it promotes (e.g., selling cheap viagra). Exploiting this gap, we developed a semantic-based technique, called Semantic Inconsistency Search (SEISE), for efficient and accurate detection of the promotional injections on sponsored top-level domains (sTLD) with explicit semantic meanings. Our approach utilizes Natural Language Processing (NLP) to identify the bad terms (those related to illicit activities like fake drug selling, etc.) most irrelevant to an sTLDs semantics. These terms, which we call irrelevant bad terms (IBTs), are used to query search engines under the sTLD for suspicious domains. Through a semantic analysis on the results page returned by the search engines, SEISE is able to detect those truly infected sites and automatically collect new IBTs from the titles/URLs/snippets of their search result items for finding new infections. Running on 403 sTLDs with an initial 30 seed IBTs, SEISE analyzed 100K fully qualified domain names (FQDN), and along the way automatically gathered nearly 600 IBTs. In the end, our approach detected 11K infected FQDN with a false detection rate of 1.5% and over 90% coverage. Our study shows that by effective detection of infected sTLDs, the bar to promotion infections can be substantially raised, since other non-sTLD vulnerable domains typically have much lower Alexa ranks and are therefore much less attractive for underground advertising. Our findings further bring to light the stunning impacts of such promotional attacks, which compromise FQDNs under 3% of .edu, .gov domains and over one thousand gov.cn domains, including those of leading universities such as stanford.edu, mit.edu, princeton.edu, havard.edu and government institutes such as nsf.gov and nih.gov. We further demonstrate the potential to extend our current technique to protect generic domains such as .com and .org.


network and system security | 2009

A Context-Aware Access Control Model for Pervasive Environments

Sumayah A. Alrwais; Jalal Al-Muhtadi

Pervasive environments are dynamically changing environments with enormous amounts of information available for access from anywhere. This paper presents a framework for context-aware access control using threshold cryptography (CAAC-TC) where the administration of access control is distributed between different context services. CAAC-TC encrypts information using threshold cryptography where the private key is split up between the different context conditions which must be captured or realized. The idea here is that not all specified context conditions must be captured, k captured contexts are enough. The management of access decisions is distributed among the different contexts. In CAAC-TC, multiple encryption layers can be specified where each layer is an encryption scheme of either n-out-of-n or k-out-of-n. Multiple layers simulate the use of an ‘AND’ operator. Some of the main characteristics of CAAC-TC are: decentralization, context error tolerant (distributed trust), extensibility, flexibility and scalability.


ieee symposium on security and privacy | 2013

Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures

Zhou Li; Sumayah A. Alrwais; Yinglian Xie; Fang Yu; XiaoFeng Wang


usenix security symposium | 2014

Understanding the dark side of domain parking

Sumayah A. Alrwais; Kan Yuan; Eihal Alowaisheq; Zhou Li; XiaoFeng Wang


annual computer security applications conference | 2012

Dissecting ghost clicks: ad fraud via misdirected human clicks

Sumayah A. Alrwais; Alexandre Gerber; Christopher W. Dunn; Oliver Spatscheck; Minaxi Gupta; Eric Osterweil


Journal of King Saud University - Computer and Information Sciences archive | 2011

Original Article: Access control using threshold cryptography for ubiquitous computing environments

Jalal Al-Muhtadi; Raquel Hill; Sumayah A. Alrwais


Iete Technical Review | 2010

A Context-aware Access Control Model for Pervasive Environments

Sumayah A. Alrwais; Jalal Al-Muhtadi

Collaboration


Dive into the Sumayah A. Alrwais's collaboration.

Top Co-Authors

Avatar

XiaoFeng Wang

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Zhou Li

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Eihal Alowaisheq

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Kan Yuan

Indiana University Bloomington

View shared research outputs
Top Co-Authors

Avatar

Xiaojing Liao

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Raheem A. Beyah

Georgia Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Luyi Xing

Indiana University Bloomington

View shared research outputs
Researchain Logo
Decentralizing Knowledge