Tawfiq Barhoom

Learn More
Nowadays, Denial of service (DoS) attacks, have become a major security threat to networks and to the Internet, DoS is harmful to networks as it delays legitimate users from accessing the server, In general, some researches were done to detect and prevent DoS from occurring in a wide area network (WAN), but fewer researches were done on Local Area Network(More)
Security has become ubiquitous in every area of malware newly emerging today pose a growing threat from ever perilous systems. As a result to that, Worms are in the upper part of the malware threats attacking the computer system despite the evolution of the worm detection techniques. Early detection of unknown worms is still a problem. In this paper, we(More)
i Acknowledgements Praise is to Allah, First and foremost, I wish to thank Allah for giving me strength and courage to complete this thesis and research. I would like to express my gratitude to my supervisor Dr. Tawfiq Barhoom, for providing me the opportunity to develop this work over the master years. He was not only a good advisor; he also introduced me(More)
This study proposes a method for encrypting the sender's messages using new algorithm with a secret key which is generated from using color image and the difference in the LSB of the image pixels. This key will be used for encrypting and decrypting the messages which are transmitted between two sides. The length of the key varies according to the size of(More)
E-learning systems are powerful way for enriching learning and teaching process. With the spread of this culture, there is a need for Learning management system as MOODLE, aTutor, canvas and Sakai. Modular Object-Oriented Dynamic Learning Environment (MOODLE) allows students and instructors to interact easily and effectively in various ways, especially via(More)
Attack Graph is very useful technique for administrator to map the system vulnerabilities, the information mapped are attack's goals and paths. In this paper we introduce a novel way to draw an Attack Graph, by using Decision Tree to preprocessing the vulnerabilities information collecting from government institution using NESSUS tool. Decision Tree is a(More)
  • Ibrahim S. Alfayoumi, Tawfiq Barhoom, +20 authors Areej N. El-Buhaisi
  • 2015
Pharming attacks can be performed at the client-side or into the internet. In pharming attack, attackers need not targeting individual user. If pharming is performed by modifying the DNS entries, than it will be affecting to all users who is accessing the web page through that DNS. We propose an approach to protect user at client-side from pharming attacks(More)
Steganography refers to information or a file that has been hidden inside a digital image, video or audio file. There are different carrier file formats can be used such as Text Steganography, Image Steganography, Audio/Video Steganography, but Image Steganography are the most popular because of their frequency on the Internet. It is the first common(More)
  • 1