Skip to main content

Showing 1–7 of 7 results for author: Rehman, M U

Searching in archive cs. Search in all archives.
.
  1. A Systematic Literature Review of Cyber Security Monitoring in Maritime

    Authors: Risto Vaarandi, Leonidas Tsiopoulos, Gabor Visky, Muaan Ur Rehman, Hayretdin Bahsi

    Abstract: In recent years, many cyber incidents have occurred in the maritime sector, targeting the information technology (IT) and operational technology (OT) infrastructure. One of the key approaches for handling cyber incidents is cyber security monitoring, which aims at timely detection of cyber attacks with automated methods. Although several literature review papers have been published in the field of… ▽ More

    Submitted 21 May, 2025; v1 submitted 23 March, 2025; originally announced March 2025.

    Comments: Accepted for publication in IEEE Access

    Journal ref: IEEE Access, vol. 13, pp. 85307-85329, 2025

  2. arXiv:2503.09939  [pdf

    cs.CR

    A Chaotic Image Encryption Scheme Using Novel Geometric Block Permutation and Dynamic Substitution

    Authors: Muhammad Ali, Jawad Ahmad, Muhammad Abdullah Hussain Khan, Safee Ullah, Mujeeb Ur Rehman, Syed Aziz Shah, Muhammad Shahbaz Khan

    Abstract: In this digital era, ensuring the security of digital data during transmission and storage is crucial. Digital data, particularly image data, needs to be protected against unauthorized access. To address this, this paper presents a novel image encryption scheme based on a confusion diffusion architecture. The diffusion module introduces a novel geometric block permutation technique, which effectiv… ▽ More

    Submitted 12 March, 2025; originally announced March 2025.

  3. arXiv:2408.04281  [pdf, other

    cs.CR cs.AI

    AI-Driven Chatbot for Intrusion Detection in Edge Networks: Enhancing Cybersecurity with Ethical User Consent

    Authors: Mugheez Asif, Abdul Manan, Abdul Moiz ur Rehman, Mamoona Naveed Asghar, Muhammad Umair

    Abstract: In today's contemporary digital landscape, chatbots have become indispensable tools across various sectors, streamlining customer service, providing personal assistance, automating routine tasks, and offering health advice. However, their potential remains underexplored in the realm of network security, particularly for intrusion detection. To bridge this gap, we propose an architecture chatbot sp… ▽ More

    Submitted 8 August, 2024; originally announced August 2024.

  4. arXiv:2407.18832  [pdf, other

    cs.CR

    Accurate and Scalable Detection and Investigation of Cyber Persistence Threats

    Authors: Qi Liu, Muhammad Shoaib, Mati Ur Rehman, Kaibin Bao, Veit Hagenmeyer, Wajih Ul Hassan

    Abstract: In Advanced Persistent Threat (APT) attacks, achieving stealthy persistence within target systems is often crucial for an attacker's success. This persistence allows adversaries to maintain prolonged access, often evading detection mechanisms. Recognizing its pivotal role in the APT lifecycle, this paper introduces Cyber Persistence Detector (CPD), a novel system dedicated to detecting cyber persi… ▽ More

    Submitted 26 July, 2024; originally announced July 2024.

    Comments: 16 pages

  5. A DNA Based Colour Image Encryption Scheme Using A Convolutional Autoencoder

    Authors: Fawad Ahmed, Muneeb Ur Rehman, Jawad Ahmad, Muhammad Shahbaz Khan, Wadii Boulila, Gautam Srivastava, Jerry Chun-Wei Lin, William J. Buchanan

    Abstract: With the advancement in technology, digital images can easily be transmitted and stored over the Internet. Encryption is used to avoid illegal interception of digital images. Encrypting large-sized colour images in their original dimension generally results in low encryption/decryption speed along with exerting a burden on the limited bandwidth of the transmission channel. To address the aforement… ▽ More

    Submitted 7 November, 2022; originally announced November 2022.

    Journal ref: (2022) ACM Trans. Multimedia Comput. Commun. Appl

  6. arXiv:2105.13435  [pdf, other

    cs.CR

    Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

    Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad

    Abstract: Due to an exponential increase in the number of cyber-attacks, the need for improved Intrusion Detection Systems (IDS) is apparent than ever. In this regard, Machine Learning (ML) techniques are playing a pivotal role in the early classification of the attacks in case of intrusion detection within the system. However, due to a large number of algorithms available, the selection of the right method… ▽ More

    Submitted 27 May, 2021; originally announced May 2021.

  7. arXiv:2104.10015  [pdf, other

    cs.CR

    Voting Classifier-based Intrusion Detection for IoT Networks

    Authors: Muhammad Almas Khan, Muazzam A Khan, Shahid Latif, Awais Aziz Shah, Mujeeb Ur Rehman, Wadii Boulila, Maha Driss, Jawad Ahmad

    Abstract: Internet of Things (IoT) is transforming human lives by paving the way for the management of physical devices on the edge. These interconnected IoT objects share data for remote accessibility and can be vulnerable to open attacks and illegal access. Intrusion detection methods are commonly used for the detection of such kinds of attacks but with these methods, the performance/accuracy is not optim… ▽ More

    Submitted 25 April, 2021; v1 submitted 20 April, 2021; originally announced April 2021.