Mohammed S. Gadelrab

Learn More
With the massive surges of new malware, the intuitive detection techniques currently used in most security tools deem ineffective. Consequently, we urgently need better solutions that are established on solid theoretical basis. It becomes, thus, necessary to search for more efficient techniques and algorithms as well as taxonomies and models for attacks and(More)
Testing network-based security tools such as Intrusion Detection and Prevention Systems (IDS/IPS) differs from testing ordinary network tools (e.g., routers and switches). Basically, in addition to the parameters (such as bandwidth utilization, routing information and packets timing) that are important for network tools, security tools are more sensitive to(More)
To ameliorate the quality of protection provided by intrusion detection systems (IDS) we strongly need more effective evaluation and testing procedures. Evaluating an IDS against all known and unknown attacks is probably impossible. Nevertheless, a sensible selection of representative attacks is necessary to obtain an unbiased evaluation of such systems. To(More)
!" ! ! # " $ # # ! # $ " $ ! $ ! ! ! ! # ! ! ! ! ! ! ! %# ! # ! ! ! $ $ # ! # # ! ! ! # ! ! ! ! % #! # # ! " # ! ! ! ! ! ! " # &# # %# ! ' ( ! " ! ! ! " ! ! ! %# ! ! # ! " # ! ) ! ! %# ! ! ! ! * % # ! %# ! ! # ! ! ! " ! ! ! $ ! ! # " ! ! ! $ ! " # ! $ ! ! ! ! ! ) " ! # ! ! # # ! ! ! " $ ! ! ! # ! ! ! ! ! ! ! + # # ! ! , # + ! ! ! ! ! ! ( , -! # # ! " ! ! !!(More)
Datasets are very important for network and security research and development. Despite the continuous growth in the number of available datasets, there is no effective publishing and sharing mechanisms so that realistic and representative datasets are not only hard to construct but it is difficult to select from tens of thousands of datasets scattered in(More)
  • 1