|
|
 |
Search published articles |
 |
|
Showing 5 results for Ebrahimi Atani
Ms Elham Abed, Dr Reza Ebrahimi Atani, Volume 4, Issue 1 (9-2015)
Abstract
Withe the growth rate of smartphones, we are daily witness malwares which sits on them confidential information such as financial information and transactions, mobile banking, contact information and even steal SMS messages. One of the major damage that malware can cause the formation of mobile cellular botnets. According to statistics published in 2014, F-secure site on mobile malware threats every 5 botnet threat is one of them. The term botnet refers to a group of mobile smartphones to remotely influenced by the Director of the bot command and control channel for the control activities. In this paper, the new plans provided by mobile botnets from three points of distribution, channel botnet command and control and topology will be reviewed and ways to deal with this threat are briefly presented.
Mr. Afshin Rashidi, Dr. Reza Ebrahimi Atani, Mr. Hamid Nasiri, Volume 4, Issue 1 (9-2015)
Abstract
In the past decade with distribution software such as browsers, online stores, Internet banking, electronic mail systems and the Internet, to carry out reverse engineering attacks, illegal use of illegal software or reproduce it is.A new attack techniques have failed and this creates competition between the attackers and software developers. So far, many techniques based architecture, hardware and software for this semester has been introduced to protect each aspect of the application process. In this paper, we introduce a variety of threats to software and then try to categorize and review of techniques to protect our software.
Mr Mohsen Rezaei, Dr Reza Ebrahimi Atani, Volume 4, Issue 2 (3-2016)
Abstract
Authenticated Encryption is a block cipher mode of operation which simultaneously provides confidentiality, integrity, and authenticity assurances on the data transmition. In this regard in 2014 CAESAR competition started which aims at finding authenticated encryption schemes that offer advantages over AES-GCM and are suitable for widespread adoption. This paper provides an easy-to-grasp overview over functional aspects, security parameters, and robustness offerings of the CAESAR candidates, clustered by their underlying designs (block-cipher-, stream-cipher-, permutation-/sponge-, compression-function-based, dedicated) and compares encryption/decryption speed of all CAESAR candidates implemented on three processors of three different architectures AMD64, armeabi and mipso32.
Mr. Mehdi Sadeghpour, Dr. Reza Ebrahimi Atani, Volume 5, Issue 2 (3-2017)
Abstract
Data collection and storage has facilitated by the growth in electronic services, and has led to recording vast amounts of personal information in public and private organizations' databases. These records often include sensitive personal information (such as income and diseases) and must be covered from others access. But in some cases, mining the data and extraction of knowledge from these valuable sources, creates the need for sharing them with other organizations. This would bring security challenges in users' privacy. “Privacy preserving data publishing” is a solution to ensure secrecy of sensitive information in a data set, after publishing it in a hostile environment. This process aimed to hide sensitive information and keep published data suitable for knowledge discovery techniques. Grouping data set records is a broad approach to data anonymization. This technique prevents access to sensitive attributes of a specific record by eliminating the distinction between a number of data set records. In this paper an overview of privacy preserving Data Publishing Techniques will be presented.
Fateme Pishdad, Reza Ebrahimi Atani, Volume 13, Issue 2 (12-2024)
Abstract
With the advancement and development of Internet of Things (IoT) applications, the need for securing infrastructure in this domain has gained particular importance due to the limitations of computational and storage resources. Botnets are among IoT security challenges in which, by infecting computational nodes of this technology, they are capble of turning the network into a collection of compromised machines under the control of attackers. This paper proposes an anomaly detection system based on ensemble learning to prevent and identify IoT botnet attacks at the initial scanning stage and DDoS attacks. This system uses feature selection and optimal hyperparameter tuning for each classifier to increase model accuracy and prevent overfitting. The data used in this paper is taken from the BoT-IoT dataset, which covers activities related to different stages of the botnet lifecycle. For feature selection and classification, two ensemble learning algorithms, LightGBM and Random Forest, are used, and hyperparameter optimization is performed using the TPE method. Results demonstrated that the LightGBM algorithm achieved an error rate of 0.98% and an accuracy of 99.02%, while the Random Forest algorithm exhibited an error rate of 0.01% and an accuracy of 99.99%, indicating highly satisfactory performance in attack detection. The proposed models, with increased training and prediction time, have offered significantly higher accuracy compared to previous models.
|
|