Browsing by Author "Khan, K.M."
Now showing items 1-13 of 13
-
CloudSafe: A tool for an automated security analysis for cloud computing
An S.; Eom T.; Park J.S.; Hong J.B.; Nhlabatsi A.; Fetais N.; Khan K.M.; Kim D.S.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Cloud computing has been adopted widely, providing on-demand computing resources to improve performance and reduce operational costs. However, these new functionalities also bring new ways to exploit the cloud computing ... -
Dynamic security metrics for measuring the effectiveness of moving target defense techniques
Hong J.B.; Enoch S.Y.; Kim D.S.; Nhlabatsi A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier Ltd , 2018 , Article)Moving Target Defense (MTD) utilizes granularity, flexibility and elasticity properties of emerging networking technologies in order to continuously change the attack surface. There are many different MTD techniques proposed ... -
Establishing trust in cloud computing
Khan, K.M.; Malluhi, Q. ( IEEE Computer Society , 2010 , Article)How can cloud providers earn their customers' trust when a third party is processing sensitive data in a remote machine located in various countries? Emerging technologies can help address the challenges of trust in cloud ... -
Flow-based intrusion detection algorithm for supervisory control and data acquisition systems: A real-time approach
Teixeira, M. A.; Zolanvari, M.; Khan, K. M.; Jain, R.; Meskin, Nader ( John Wiley and Sons Inc , 2021 , Article)Intrusion detection in supervisory control and data acquisition (SCADA) systems is integral because of the critical roles of these systems in industries. However, available approaches in the literature lack representative ... -
Hybrid attack detection framework for industrial control systems using 1D-convolutional neural network and isolation forest
Elnour, M.; Meskin, Nader; Khan, K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)Industrial control systems (ICSs) are used in various infrastructures and industrial plants for realizing their control operation and ensuring their safety. Concerns about the cybersecurity of industrial control systems ... -
Machine Learning-Based Network Vulnerability Analysis of Industrial Internet of Things
Zolanvari M.; Teixeira M.A.; Gupta L.; Khan K.M.; Jain R. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Article)It is critical to secure the Industrial Internet of Things (IIoT) devices because of potentially devastating consequences in case of an attack. Machine learning (ML) and big data analytics are the two powerful leverages ... -
Matrix Barcode Based Secure Authentication without Trusting Third Party
Wang Y.; Khan K.M. ( IEEE Computer Society , 2019 , Article)The user creates a JavaScript-enabled bookmark file once and opens this file to generate a QR code every time to use secure servers. The mobile device generates a secret to encrypt his/her credentials and saves it so that ... -
Multi-Objective Security Hardening Optimisation for Dynamic Networks
Enoch S.Y.; Hong J.B.; Ge M.; Khan K.M.; Kim D.S. ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)Hardening the dynamic networks is a very challenging task due to their complexity and dynamicity. Moreover, there may be multi-objectives to satisfy, while containing the solutions within the constraints (e.g., fixed budget, ... -
Requirements and specifications for adaptive security: Concepts and analysis
Tun T.T.; Yang M.; Bandara A.K.; Yu Y.; Nhlabatsi A.; Khan N.; Khan K.M.; Nuseibeh B.... more authors ... less authors ( IEEE Computer Society , 2018 , Conference Paper)In an adaptive security-critical system, security mechanisms change according to the type of threat posed by the environment. Specifying the behavior of these systems is difficult because conditions of the environment are ... -
SpiralSRA: A threat-specific security risk assessment framework for the cloud
Nhlabatsi A.; Hong J.B.; Kim D.S.; Fernandez R.; Fetais N.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Conventional security risk assessment approaches for cloud infrastructures do not explicitly consider risk with respect to specific threats. This is a challenge for a cloud provider because it may apply the same risk ... -
Stateless Security Risk Assessment for Dynamic Networks
Hong J.B.; Yusuf S.E.; Kim D.S.; Khan K.M. ( Institute of Electrical and Electronics Engineers Inc. , 2018 , Conference Paper)Emerging networking technologies, such as cloud and Software Defined Networking, provide flexibility, elasticity and functionalities to change the network configurations over time. However, changes also impose unpredictable ... -
Systematic identification of threats in the cloud: A Survey
Hong J.B.; Nhlabatsi A.; Kim D.S.; Hussein A.; Fetais N.; Khan K.M.... more authors ... less authors ( Elsevier B.V. , 2019 , Article)When a vulnerability is discovered in a system, some key questions often asked by the security analyst are what threat(s) does it pose, what attacks may exploit it, and which parts of the system it affects. Answers to those ... -
ThreatRiskEvaluator: A Tool for Assessing Threat-Specific Security Risks in the Cloud
Nhlabatsi A.; Hussein A.; Fernandez R.; Fetais N.; Hong J.; Kim D.; Khan K.M.... more authors ... less authors ( Institute of Electrical and Electronics Engineers Inc. , 2019 , Conference Paper)In cloud computing, security risks posed to individual clients are different based on their specific security requirements. In current practice, cloud providers usually apply generic protection mechanisms that may not be ...