Monis Akhlaq

Learn More
Network Intrusion Detection Systems (NIDS) are considered as essential mechanisms to ensure reliable security. Intrusive model is used in signature-based NIDS by defining attack patterns and applying signature-matching on incoming traffic packets. Thousands of signatures and rules are created to specify different attacks and variations of a single attack.(More)
The recent era has witnessed tremendous increase in the usage of computer network applications. Users of any type and requirement are compelled to be on a network. Today, the computer has become a network machine rather than a standalone system. This has generated challenges to the network security devices in terms of accuracy and reliability.Intrusion(More)
Many applications of Wireless Sensor Networks (WSNs) require accurate time synchronization for data consistency and coordination. While the existing protocols for time synchronization provide sufficient accuracy, they consume high energy and poorly synchronize the distant nodes. We propose a Recursive Time Synchronization Protocol (RTSP) which provides(More)
Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule -- based mechanisms which are tedious and error prone. Other methods are based on statistical modeling, these(More)
The Ad Hoc on demand distance vector (AODV) routing protocol is designed for mobile ad hoc networks (MANETs). AODV offers quick adaptation to dynamic link conditions; it is characterized by low memory overhead and low network utilization. The security issues related to the protocol remain challenging for the wireless network designers. Numerous schemes have(More)
Alerts correlation techniques have been widely used to provide intelligent and stateful detection methodologies. This is to understand attack steps and predict the expected sequence of events. However, most of the proposed systems are based on rule-based mechanisms which are tedious and error prone. Other methods are based on statistical modeling; these are(More)
The virtualization concept was developed a few decades back to facilitate the sharing of expensive and robust main-frame hardware among different applications. In the current scenario, virtualization has gone through a conceptual transformation from cost effectiveness to resource sharing. The research community has found virtualization to be reliable,(More)
The current research on privacy assurance in Vehicular Ad hoc Networks (VANETs) by pseudonym generation and network accountability through revocation has not achieved the desired results. Our research has identified the problems associated with the current techniques. We have revisited the pseudonym generation concept to address the privacy need of the(More)