Skip to main content

Showing 1–4 of 4 results for author: Manasrah, A M

Searching in archive cs. Search in all archives.
.
  1. arXiv:1108.1417  [pdf

    cs.CR

    A Novel Header Matching Algorithm for Intrusion Detection Systems

    Authors: Mohammad A. Alia, Adnan A. Hnaif, Hayam K. Al-Anie, Khulood Abu Maria, Ahmed M. Manasrah, M. Imran Sarwar

    Abstract: The evolving necessity of the Internet increases the demand on the bandwidth. Therefore, this demand opens the doors for the hackers' community to develop new methods and techniques to gain control over networking systems. Hence, the intrusion detection systems (IDS) are insufficient to prevent/detect unauthorized access the network. Network Intrusion Detection System (NIDS) is one example that st… ▽ More

    Submitted 5 August, 2011; originally announced August 2011.

    Comments: 15 pages, 7 Figures, 2 Tables

    Journal ref: International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.4, July 2011

  2. arXiv:1002.2222  [pdf

    cs.DC cs.DS

    An innovative platform to improve the performance of exact string matching algorithms

    Authors: Mosleh M. Abu Alhaj, M. Halaiyqah, Muhannad A. Abu Hashem, Adnan A. Hnaif, O. Abouabdalla, Ahmed M. Manasrah

    Abstract: Exact String Matching is an essential issue in many computer science applications. Unfortunately, the performance of Exact String Matching algorithms, namely, executing time, does not address the needs of these applications. This paper proposes a general platform for improving the existing Exact String Matching algorithms executing time, called the PXSMAlg platform. The function of this platform… ▽ More

    Submitted 11 February, 2010; originally announced February 2010.

    Comments: IEEE format, International Journal of Computer Science and Information Security, IJCSIS January 2010, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Journal of Computer Science, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 7, No. 1, pp. 280-283, January 2010, USA

  3. arXiv:1001.2280  [pdf

    cs.NI cs.MM

    Comparative Evaluation and Analysis of IAX and RSW

    Authors: Manjur S Kolhar, Mosleh M. Abu-Alhaj, Omar Abouabdalla, Tat Chee Wan, Ahmad M. Manasrah

    Abstract: Voice over IP (VoIP) is a technology to transport media over IP networks such as the Internet. VoIP has the capability of connecting people over packet switched networks instead of traditional circuit switched networks. Recently, the InterAsterisk Exchange Protocol (IAX) has emerged as a new VoIP which is gaining popularity among VoIP products. IAX is known for its simplicity, NAT friendliness,… ▽ More

    Submitted 13 January, 2010; originally announced January 2010.

    Comments: 3 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS December 2009, ISSN 1947 5500, http://sites.google.com/site/ijcsis/

    Report number: Volume 6, No. 3, ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 3, pp. 250-252, December 2009, USA

  4. arXiv:0911.0487  [pdf

    cs.NI cs.CR

    Detecting Botnet Activities Based on Abnormal DNS traffic

    Authors: Ahmed M. Manasrah, Awsan Hasan, Omar Amer Abouabdalla, Sureswaran Ramadass

    Abstract: IThe botnet is considered as a critical issue of the Internet due to its fast growing mechanism and affect. Recently, Botnets have utilized the DNS and query DNS server just like any legitimate hosts. In this case, it is difficult to distinguish between the legitimate DNS traffic and illegitimate DNS traffic. It is important to build a suitable solution for botnet detection in the DNS traffic an… ▽ More

    Submitted 2 November, 2009; originally announced November 2009.

    Comments: 8 pages IEEE format, International Journal of Computer Science and Information Security, IJCSIS 2009, ISSN 1947 5500, Impact Factor 0.423, http://sites.google.com/site/ijcsis/

    Report number: ISSN 1947 5500

    Journal ref: International Journal of Computer Science and Information Security, IJCSIS, Vol. 6, No. 1, pp. 097-104, October 2009, USA