7th International Conference on Networking, Systems and Security, 2020
The growing trend of attacking Android smart phones using malicious app has started posing signif... more The growing trend of attacking Android smart phones using malicious app has started posing significant threats for the users. Many approaches have been introduced for protecting the users against such malware. However, those solutions tend to use many features to get better accuracy in detecting Android malware which eventually results in higher complexity in creating machine learning based models. Hence, an effective model is required to find the most significant features resulting in a faster model yet having better accuracy. In this paper, we have proposed a robust approach to detect android malwares using only selective features that are extracted using Ranker search method and Gain Ratio attribute evaluator. We have used machine learning algorithms which include J48 Decision Tree, Random Forest and Random Tree to classify the preprocessed dataset into malware and benign. We have produced faster results using Random Tree algorithm and obtained higher accuracy using Random Forest algorithm. Further, we have measured and compared various performance metrics with respect to different numbers of attributes and different classifiers. Our proposed detection method can help users distinguish malicious applications from benign ones in a faster yet precise manner.
2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), 2016
MANET is one kind of non-infrastructure network which is composed of various mobile nodes. Due to... more MANET is one kind of non-infrastructure network which is composed of various mobile nodes. Due to the battery energy constraints in MANET, energy efficiency is an important factor while designing ad hoc wireless networks. Previous works tried to optimize the AODV protocol by proposing different schemes. In this paper, two solutions have been proposed to control the congestion problem of wireless ad-hoc network in MANET. Some changes have been made in the RREQ packet to calculate the drop factor. The energy-based proposed scheme has been simulated with network simulator 2.35. It is seen from the result that the solutions proposed has performed comparatively better than the traditional AODV with respect of packet delivery ratio, throughput and delay.
Hypertext Transfer Protocol (HTTP) cookies are pieces of information shared between HTTP server a... more Hypertext Transfer Protocol (HTTP) cookies are pieces of information shared between HTTP server and client to remember stateful information for the stateless HTTP protocol or to record a user’s browsing activity. Cookies are often used in web applications to identify a user and corresponding authenticated session. Thus, stealing a cookie can lead to hijacking an authenticated user’s session. To prevent this type of attack, a cookie protection mechanism is required. In this paper, we have proposed a secure and efficient cookie protection system. We have used one time cookies to prevent attacker from performing cookie injection. To ensure cookie integrity and confidentiality, we have encrypted sensitive information in the cookie. We have verified that our proposed system can ensure confidentiality, authenticity and integrity through security analysis. Our proposed system can efficiently prevent session hijacking performed through replay attack and cookie poisoning attack.
In modern era of information technology, broadcasting is an integral part of communication engine... more In modern era of information technology, broadcasting is an integral part of communication engineering. To develop the broadcast technology, a lot of researches have been done in the fields of protocols, scheduling schemes, caching strategies and also using multi-channel communication. In this paper, we have proposed a hierarchical broadcast model of GRSB [1] (Guaranteed, Reliable and Secure Broadcast) protocol, where 1 level broadcast mostly maintains the traditional GRSB model. 2 level broadcast has two types of nodes where nodes of 1 kind i.e. nodes that are directly connected with the attachment nodes, can be temporarily in ‘not alive’ condition and hence follow the traditional GRSB model as well. On the other hand, nodes of 2 kind i.e. nodes that are not directly connected with the attachment nodes, must be ‘alive’ all the time and have to follow two phases to finish the broadcast.
Vaccinating dogs against rabies is an effective means of reducing human rabies. We subjected 1327... more Vaccinating dogs against rabies is an effective means of reducing human rabies. We subjected 1327 clinically diagnosed human rabies death and mass dog vaccination (MDV) data during 2006–2018 to quantify the impacts of MDV on human rabies incidence in Bangladesh and a subset of rabies death data (422) for clinico-epidemiological analysis. A positive and increasing trend of MDV (p = 0.01 and tau = 0.71) and a negative and declining trend (p < 0.001 and tau = −0.88) of human rabies cases (Correlation coefficient: −0.82) have been observed. Among 422 deaths, the majority (78%) of the victims sought treatment from traditional healers, and 12% received post-exposure prophylaxis (PEP). The mean incubation period of rabies in cases with exposure sites on the head & neck (35 days) was shorter than the upper limb (mean = 64 days, p = 0.02) and lower limb (mean = 89 days, p < 0.01). MDV has been found to be effective for reducing human rabies cases in Bangladesh. Creating awareness among...
2012 15th International Conference on Computer and Information Technology (ICCIT), 2012
Terminal-based mobility protocols require mobile devices to participate in mobility signaling tha... more Terminal-based mobility protocols require mobile devices to participate in mobility signaling that consumes lots of processing power and memory. Network-based mobility protocol, such as, Proxy Mobile IPv6, solves this problem by excluding low-end mobile devices from signaling requirement. In this paper, we have explained Proxy Mobile IPv6 architecture along with its detailed signaling diagram. We have identified the major advantages and limitations of this protocol. We have also performed the signaling cost analysis of its key mobility entities to obtain the amount of overhead on them. Results show interesting relationships among various network parameters, such as, network size, mobility rate, traffic rate. Our critical analysis can help researchers better understand the strengths and weaknesses of this protocol and our signaling analysis can be used by network engineers to estimate the resource requirements of its entities in actual deployment.
The magnitude of animal bite and utilization of rabies vaccine was determined at the Infectious D... more The magnitude of animal bite and utilization of rabies vaccine was determined at the Infectious Disease Hospital, Dhaka, Bangladesh. From January 2004 to December 2008, 150,068 patients with animal bite visited the hospital, 86.2% and 13.8% of them received nerve tissue and tissue culture vaccine (TCV), respectively. Dog bite was most frequent, found in 90.7% cases. In 794 rabies cases only 24.4% had a history of post-exposure vaccination. Only a negligible number of patients received rabies immunoglobulin (RIG). To prevent further human deaths and economic losses intra-dermal TCV regime and equine RIG should be immediately introduced in Bangladesh.
Dhaka University Journal of Pharmaceutical Sciences, 2007
The triterpinoids, betulinic acid, lupeol and betulinaldehyde, were isolated from the ethyl aceta... more The triterpinoids, betulinic acid, lupeol and betulinaldehyde, were isolated from the ethyl acetate extract of the stem bark of Avicennia officinalis (Avicenniaceae) by a combination of column and preparative thin-layer chromatography over silica gel. The structures of these compounds were determined by spectroscopic analysis (UV, IR, 1H NMR, 13CNMR and EIMS). This is the first report of a systematic phytochemical investigation and the presence of these triterpoids from this plant. Key words: Triterpenoid, Avicenniaceae, Betulinic acid, Lupeol and Betulinaldehyde Dhaka Univ. J. Pharm. Sci. Vol.5(1-2) 2006 The full text is of this article is available at the Dhaka Univ. J. Pharm. Sci. website
2013 International Conference on Informatics, Electronics and Vision (ICIEV), 2013
ABSTRACT Mobile users can move between the different wireless networks because several heterogene... more ABSTRACT Mobile users can move between the different wireless networks because several heterogeneous wireless networks are deployed and can be used in a small area. So there need vertical handover issues in an effective manner. This paper proposed two vertical handover scheme based on fuzzy interference system and subtracting clustering method in a heterogeneous environment and simulates to verify performance. This will be a method for easy and fast handover between different protocol users according to priority based.
7th International Conference on Networking, Systems and Security, 2020
The growing trend of attacking Android smart phones using malicious app has started posing signif... more The growing trend of attacking Android smart phones using malicious app has started posing significant threats for the users. Many approaches have been introduced for protecting the users against such malware. However, those solutions tend to use many features to get better accuracy in detecting Android malware which eventually results in higher complexity in creating machine learning based models. Hence, an effective model is required to find the most significant features resulting in a faster model yet having better accuracy. In this paper, we have proposed a robust approach to detect android malwares using only selective features that are extracted using Ranker search method and Gain Ratio attribute evaluator. We have used machine learning algorithms which include J48 Decision Tree, Random Forest and Random Tree to classify the preprocessed dataset into malware and benign. We have produced faster results using Random Tree algorithm and obtained higher accuracy using Random Forest algorithm. Further, we have measured and compared various performance metrics with respect to different numbers of attributes and different classifiers. Our proposed detection method can help users distinguish malicious applications from benign ones in a faster yet precise manner.
2016 3rd International Conference on Electrical Engineering and Information Communication Technology (ICEEICT), 2016
MANET is one kind of non-infrastructure network which is composed of various mobile nodes. Due to... more MANET is one kind of non-infrastructure network which is composed of various mobile nodes. Due to the battery energy constraints in MANET, energy efficiency is an important factor while designing ad hoc wireless networks. Previous works tried to optimize the AODV protocol by proposing different schemes. In this paper, two solutions have been proposed to control the congestion problem of wireless ad-hoc network in MANET. Some changes have been made in the RREQ packet to calculate the drop factor. The energy-based proposed scheme has been simulated with network simulator 2.35. It is seen from the result that the solutions proposed has performed comparatively better than the traditional AODV with respect of packet delivery ratio, throughput and delay.
Hypertext Transfer Protocol (HTTP) cookies are pieces of information shared between HTTP server a... more Hypertext Transfer Protocol (HTTP) cookies are pieces of information shared between HTTP server and client to remember stateful information for the stateless HTTP protocol or to record a user’s browsing activity. Cookies are often used in web applications to identify a user and corresponding authenticated session. Thus, stealing a cookie can lead to hijacking an authenticated user’s session. To prevent this type of attack, a cookie protection mechanism is required. In this paper, we have proposed a secure and efficient cookie protection system. We have used one time cookies to prevent attacker from performing cookie injection. To ensure cookie integrity and confidentiality, we have encrypted sensitive information in the cookie. We have verified that our proposed system can ensure confidentiality, authenticity and integrity through security analysis. Our proposed system can efficiently prevent session hijacking performed through replay attack and cookie poisoning attack.
In modern era of information technology, broadcasting is an integral part of communication engine... more In modern era of information technology, broadcasting is an integral part of communication engineering. To develop the broadcast technology, a lot of researches have been done in the fields of protocols, scheduling schemes, caching strategies and also using multi-channel communication. In this paper, we have proposed a hierarchical broadcast model of GRSB [1] (Guaranteed, Reliable and Secure Broadcast) protocol, where 1 level broadcast mostly maintains the traditional GRSB model. 2 level broadcast has two types of nodes where nodes of 1 kind i.e. nodes that are directly connected with the attachment nodes, can be temporarily in ‘not alive’ condition and hence follow the traditional GRSB model as well. On the other hand, nodes of 2 kind i.e. nodes that are not directly connected with the attachment nodes, must be ‘alive’ all the time and have to follow two phases to finish the broadcast.
Vaccinating dogs against rabies is an effective means of reducing human rabies. We subjected 1327... more Vaccinating dogs against rabies is an effective means of reducing human rabies. We subjected 1327 clinically diagnosed human rabies death and mass dog vaccination (MDV) data during 2006–2018 to quantify the impacts of MDV on human rabies incidence in Bangladesh and a subset of rabies death data (422) for clinico-epidemiological analysis. A positive and increasing trend of MDV (p = 0.01 and tau = 0.71) and a negative and declining trend (p < 0.001 and tau = −0.88) of human rabies cases (Correlation coefficient: −0.82) have been observed. Among 422 deaths, the majority (78%) of the victims sought treatment from traditional healers, and 12% received post-exposure prophylaxis (PEP). The mean incubation period of rabies in cases with exposure sites on the head & neck (35 days) was shorter than the upper limb (mean = 64 days, p = 0.02) and lower limb (mean = 89 days, p < 0.01). MDV has been found to be effective for reducing human rabies cases in Bangladesh. Creating awareness among...
2012 15th International Conference on Computer and Information Technology (ICCIT), 2012
Terminal-based mobility protocols require mobile devices to participate in mobility signaling tha... more Terminal-based mobility protocols require mobile devices to participate in mobility signaling that consumes lots of processing power and memory. Network-based mobility protocol, such as, Proxy Mobile IPv6, solves this problem by excluding low-end mobile devices from signaling requirement. In this paper, we have explained Proxy Mobile IPv6 architecture along with its detailed signaling diagram. We have identified the major advantages and limitations of this protocol. We have also performed the signaling cost analysis of its key mobility entities to obtain the amount of overhead on them. Results show interesting relationships among various network parameters, such as, network size, mobility rate, traffic rate. Our critical analysis can help researchers better understand the strengths and weaknesses of this protocol and our signaling analysis can be used by network engineers to estimate the resource requirements of its entities in actual deployment.
The magnitude of animal bite and utilization of rabies vaccine was determined at the Infectious D... more The magnitude of animal bite and utilization of rabies vaccine was determined at the Infectious Disease Hospital, Dhaka, Bangladesh. From January 2004 to December 2008, 150,068 patients with animal bite visited the hospital, 86.2% and 13.8% of them received nerve tissue and tissue culture vaccine (TCV), respectively. Dog bite was most frequent, found in 90.7% cases. In 794 rabies cases only 24.4% had a history of post-exposure vaccination. Only a negligible number of patients received rabies immunoglobulin (RIG). To prevent further human deaths and economic losses intra-dermal TCV regime and equine RIG should be immediately introduced in Bangladesh.
Dhaka University Journal of Pharmaceutical Sciences, 2007
The triterpinoids, betulinic acid, lupeol and betulinaldehyde, were isolated from the ethyl aceta... more The triterpinoids, betulinic acid, lupeol and betulinaldehyde, were isolated from the ethyl acetate extract of the stem bark of Avicennia officinalis (Avicenniaceae) by a combination of column and preparative thin-layer chromatography over silica gel. The structures of these compounds were determined by spectroscopic analysis (UV, IR, 1H NMR, 13CNMR and EIMS). This is the first report of a systematic phytochemical investigation and the presence of these triterpoids from this plant. Key words: Triterpenoid, Avicenniaceae, Betulinic acid, Lupeol and Betulinaldehyde Dhaka Univ. J. Pharm. Sci. Vol.5(1-2) 2006 The full text is of this article is available at the Dhaka Univ. J. Pharm. Sci. website
2013 International Conference on Informatics, Electronics and Vision (ICIEV), 2013
ABSTRACT Mobile users can move between the different wireless networks because several heterogene... more ABSTRACT Mobile users can move between the different wireless networks because several heterogeneous wireless networks are deployed and can be used in a small area. So there need vertical handover issues in an effective manner. This paper proposed two vertical handover scheme based on fuzzy interference system and subtracting clustering method in a heterogeneous environment and simulates to verify performance. This will be a method for easy and fast handover between different protocol users according to priority based.
Uploads
Papers by Shohrab Hossain