Papers by Aymen H AlAwadi

Annals of Telecommunications
Data center networks (DCNs) act as critical infrastructures for emerging technologies. In general... more Data center networks (DCNs) act as critical infrastructures for emerging technologies. In general, a DCN involves a multi-rooted tree with various shortest paths of equal length from end to end. The DCN fabric must be maintained and monitored to guarantee high availability and better QoS. Traditional traffic engineering (TE) methods frequently reroute large flows based on the shortest and least-congested paths to maintain high service availability. This procedure results in a weak link utilization with frequent packet reordering. Moreover, DCN link failures are typical problems. State-of-the-art approaches address such challenges by modifying the network components (switches or hosts) to discover and avoid broken connections. This study proposes Oddlab (Odds labels), a novel deployable TE method to guarantee the QoS of multi-rooted data center (DC) traffic in symmetric and asymmetric modes. Oddlab creatively builds a heuristic model for efficient flow scheduling and faulty link dete...

Abstract— Mobile IP technology considers as one of the buzzwords in world of wireless technology.... more Abstract— Mobile IP technology considers as one of the buzzwords in world of wireless technology. Nowadays, a lot of Internet applications depend on this technology to deploy their services like VOIP, VANET and so on. However, the main goal of this technology is to maintain high connectivity among the mobile nodes. The assumption here is that the Mobile Node (MN) should remain connected to its Home Agent (HA) during its mobility from one scope to another. The new scope is called Foreign Agent (FA) whereby the Mobile node can remain connected (routed) to the original scope (HA) by getting a new IP from FA which is called Care of Address (CoA). This paper will address the certain aspects belonging to the Mobile IP technology such as Mobile IPV4 and its relationship to Mobile IPV6 and some advantages and disadvantages of using Mobile IP. Vi-Fi (Vehicle Wi-Fi) descried as one of most advanced technology of Mobile IP.
Research Journal of Applied Sciences, Engineering and Technology, 2016

Botnets are considered one of the most dangerous and serious security threats facing the networks... more Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing with the other security threats, botnet members have the ability to be directed and controlled via C&C messages from the botmaster over common protocols such as IRC and HTTP, or even over covert and unknown applications. As for IRC botnets, general security instances like firewalls and IDSes do not provide by themselves a viable solution to prevent them completely. These devices could not differentiate well between the legitimate and malicious traffic of the IRC protocol. So, this paper is proposing an IDS-based and multi-phase IRC botnet and botnet behavior detection model based on C&C responses messages and malicious behaviors of the IRC bots inside the network environment. The proposed model has been evaluated on five network traffic traces from two different network environments (Virtual network and DARPA 2000 Windows NT Attack Data Set). The results show...

Recent years, many applications have exploited graph-based computations for searching massive dat... more Recent years, many applications have exploited graph-based computations for searching massive data through distributed processors and memories. In this study, we present Breadth First Search algorithm as a graph-based algorithm to organize large DNA dataset and parallelize the algorithm using two highly tuned parallel approaches named OpenMP and MPI on a cluster, besides tuning the serial version of the algorithm. OpenMP is implemented using domain decomposition method. MPI is applied after dividing the dataset into equal parts and changing it to a two-dimensional array. Both approaches are tested in Khwarizmi cluster with 8 Intel Xeon Processors at the School of Computer Sciences in USM. The two aforementioned experiments are implemented and evaluated with certain characteristics and the results show high performance is achieved in terms of speedup and efficiency in comparison with the serial version of the algorithm.

Mobile IP technology considers as one of the buzzwords in world of wireless technology. Nowadays,... more Mobile IP technology considers as one of the buzzwords in world of wireless technology. Nowadays, a lot of Internet applications depend on this technology to deploy their services like VOIP, VANET and so on. However, the main goal of this technology is to maintain high connectivity among the mobile nodes. The assumption here is that the Mobile Node (MN) should remain connected to its Home Agent (HA) during its mobility from one scope to another. The new scope is called Foreign Agent (FA) whereby the Mobile node can remain connected (routed) to the original scope (HA) by getting a new IP from FA which is called Care of Address (CoA). This paper will address the certain aspects belonging to the Mobile IP technology such as Mobile IPV4 and its relationship to Mobile IPV6 and some advantages and disadvantages of using Mobile IP. Vi-Fi (Vehicle Wi-Fi) descried as one of most advanced technology of Mobile IP.

Botnets are considered one of the most dangerous and serious security threats facing the networks... more Botnets are considered one of the most dangerous and serious security threats facing the networks and the Internet. Comparing with the other security threats, botnet members have the ability to be directed and controlled via C&C messages from the botmaster over common protocols such as IRC and HTTP, or even over covert and unknown applications. As for IRC botnets, general security instances like firewalls and IDSes do not provide by themselves a viable solution to prevent them completely. These devices could not differentiate well between the legitimate and malicious traffic of the IRC protocol. So, this paper is proposing an IDS-based and multi-phase IRC botnet and botnet behavior detection model based on C&C responses messages and malicious behaviors of the IRC bots inside the network environment. The proposed model has been evaluated on five network traffic traces from two different network environments (Virtual network and DARPA 2000 Windows NT Attack Data Set). The results show that the proposed model could detect all the infected IRC botnet member(s), state their current status of attack, filter their malicious IRC messages, pass the other normal IRC messages and detect the botnet behavior regardless of the botnet communication protocol with very low false positive rate. The proposed model has been compared with some of the existing and well-known approaches, including BotHunter, BotSniffer and Rishi regarding botnet characteristics taken in each approach. The comparison showed that the proposed model has made a progress on the comparative models by not to rely on a certain time window or specific bot signatures.
Books by Aymen H AlAwadi
Uploads
Papers by Aymen H AlAwadi
Books by Aymen H AlAwadi