Zair Abdelouahab

Learn More
The intrusion detection system (IDS) has as objective to identify individuals that try to use a system in way not authorized or those that have authorization to use but they abuse of their privileges. The IDS to accomplish its function must, in some way, to guarantee reliability and availability to its own application, so that it gets to give continuity to(More)
Mobile devices suffer daily threats of various kinds, in particular in a digital form, where users without consent receives and installs malware on their mobile devices via wireless networks, getting their information vulnerable to unauthorized persons. Aiming to learn more targeted attacks on mobile devices, this paper presents a mechanism that emulates(More)
A Rapid evolution of mobile technologies has led to the development of more sophisticated mobile devices with better storage, processing and transmission power. These factors enable support to many types of application but also give rise to a necessity to find a model of service development. Actually, SOA (Service Oriented Architecture) is a good option to(More)
In the past, multi-agent systems were used in proprietary environments. Nowadays, these systems have been used broadly in open distributed networks, such as e-commerce applications for Internet. An environment such as the Internet cannot be considered a safe place. Thus, multi-agent systems should have security mechanisms, e.g. confidentiality and(More)
This paper describes a method for requirements elicitation based on goals for electronic commerce systems in agreement with security and privacy polices of the site. The method integrates the UWA approach [18] with the GBRAM method [3] for developing requirements policies for secure electronic commerce systems. The resulting method has the objective to(More)
The elasticity and abundant availability of computational resources are attractive to intruders exploit cloud vulnerabilities and were able to launch attacks against legitimate users to gain access to private and privileged information. The Intrusion Detection Systems are presented as a possible solution for protection; however, to effectively protect the(More)
In this paper, we present a model, an architecture and an implementation of a Remote IDS (Intrusion Detection System) using the technology of Multi-agent Systems, Web Services and MDA (Model-Driven Architecture). This model adapts and extends the NIDIA (Network Intrusion Detection System based on Intelligent Agents) to provide a remote IDS on the Internet.(More)
A multiagent filtering information system is proposed in this paper. The agents improve the teaching-learning process in a computer-based learning environment by means of information filtering. The system is developed using the PASSI agent development methodology. Furthermore, the paper describes agents specification and implementations for NetClass..