2019 International Conference on Frontiers of Information Technology (FIT), 2019
Traffic situation in smart cities is getting worse day by day, which needs optimized control of t... more Traffic situation in smart cities is getting worse day by day, which needs optimized control of traffic signals. This paper proposes a complete solution for real-time traffic signal control to reduce traffic congestion. For providing efficient solutions, we develop two machine-learning approaches, namely Edge based Traffic Light Control (ETLC) and Global Traffic Light Control (GTLC). The former approach is used to control traffic congestion for a smaller congested area and latter one provides the solution for the whole city. Both the approaches utilize real-time traffic data, generated from a vehicular traffic simulator, to solve the congestion problem in real-time. The ETLC approach identifies the most congested area through K-Means clustering and applies fuzzy logic for congestion removal. The GTLC approach identifies multiple congested areas using an occupancy threshold and reduces congestion. Our model is flexible to run each approach individually or integrate both the approaches to run sequentially. Comparison of the two approaches shows that the ETLC approach works better than GTLC approach for small areas. However, GTLC gives good results in peak congestions spanning larger areas.
Smart city brings enormous opportunities and exciting challenges. In a smart city, operations and... more Smart city brings enormous opportunities and exciting challenges. In a smart city, operations and services such as traffic, transport, electric power, and water distribution are monitored, operated, and controlled through ICT based infrastructure, smartly. This allows efficient management of resources and facilitates smooth access to services. However, it also induces stringent requirements and challenges for uninterrupted operation and execution of ICT-based monitoring and controlled infrastructure. Cybersecurity is one of the foremost challenges in a smart city network. That is, protecting the smart city application services from cyber-attacks and ensuring continuity of services is utmost desirable. As smart city services typically comprised of web based applications, application level distributed denial of service (AL-DDoS) attack is a major cybersecurity threat that can have catastrophic impact on an extremely critical smart city network. This paper presents an efficient framewo...
The effect of network-based malware can be massive on Internet Service Providers (ISPs). Maliciou... more The effect of network-based malware can be massive on Internet Service Providers (ISPs). Malicious users, that are among the ISP customers, can consume large amount of network bandwidth. This behavior could be overwhelmingly damaging as legitimate ISP users may experience performance degradation or complete denial of service. Subsequently, as network-based malware spreads out, number of malicious users increase, causing distributed denial of service (DDoS) attack. This paper proposes a novel idea of mitigating networkbased malwares at ISP level. The proposed solution ISPMonitor, monitors various traffic patterns to detect the timely onset of malware attack. It detects the attack and applies a mitigation mechanism to protect the ISP network. The ISPMonitor, is a DNS based solution that monitors the rate of DNS lookup requests. An anomaly based approach is used to detect malware. The proposed mechanism was investigated on a live wireless ISP with 80,000 customers spanned across three ...
2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017
Graphic Processing Units have emerged as a popular platform for many computationally expensive ta... more Graphic Processing Units have emerged as a popular platform for many computationally expensive tasks. The availability of hundreds to thousands of cores embedded together using shared memory, provides enhanced speed for many parallel programs. Motivated by this inherent parallelism in GPUs, General Purpose Graphic Processing Unit (GPGPU) computing has been adopted in many applications. These include Data Analytics, Robotics, Health, Driverless cars, DNA sequencing, High speed network processing, and Image Recognition. This talk will provide an overview of increased adaptation of GPGPU computing in many such applications. The talk will also enlighten open research areas in these applications.
2015 Conference on Information Assurance and Cyber Security (CIACS), 2015
Android has become a major player in smartphone software arena, thanks to the massively positive ... more Android has become a major player in smartphone software arena, thanks to the massively positive reception of Google Play by the developers and users alike. In general, Android applications follow a set of permissions, which are used for access control. However, through the privilege-escalation vulnerability, a malicious application can escalate itself and access an un-permitted resource. Consequently, serious security and safety exploits such as privacy violation, reverse-shell access to the device, and drive-by downloads may occur. We propose a flexible and efficient defense mechanism against such exploits. Our solution - SAndroid, is an extensible and a lightweight application. It provides enhanced safety and security against privilege escalation attacks through rapid detection. SAndroid is based on active monitoring and detection of malicious applications through tracking of system logs and malicious process signatures. The assurance of safety provided by SAndroid is confirmed through design, testing, and verification. SAndroid follows modular approach permitting high flexibility and efficiency. Through real experiments, we confirmed that SAndroid is an efficient and low cost solution having negligible false-positives. This paper describes the architecture and design of the SAndroid framework and provides details of our experiments.
Cyberinterventions such as attacks and exploitations could have a severe impact on people's e... more Cyberinterventions such as attacks and exploitations could have a severe impact on people's everyday activities. In this context, we must understand the dimensions and scope of attacks in cyberspace and assess measures to enhance the security of cybersystems. A global scenario should be considered given that entities could involve individuals, organizations, and state-sponsored actors.
2019 International Conference on Frontiers of Information Technology (FIT), 2019
Traffic situation in smart cities is getting worse day by day, which needs optimized control of t... more Traffic situation in smart cities is getting worse day by day, which needs optimized control of traffic signals. This paper proposes a complete solution for real-time traffic signal control to reduce traffic congestion. For providing efficient solutions, we develop two machine-learning approaches, namely Edge based Traffic Light Control (ETLC) and Global Traffic Light Control (GTLC). The former approach is used to control traffic congestion for a smaller congested area and latter one provides the solution for the whole city. Both the approaches utilize real-time traffic data, generated from a vehicular traffic simulator, to solve the congestion problem in real-time. The ETLC approach identifies the most congested area through K-Means clustering and applies fuzzy logic for congestion removal. The GTLC approach identifies multiple congested areas using an occupancy threshold and reduces congestion. Our model is flexible to run each approach individually or integrate both the approaches to run sequentially. Comparison of the two approaches shows that the ETLC approach works better than GTLC approach for small areas. However, GTLC gives good results in peak congestions spanning larger areas.
Smart city brings enormous opportunities and exciting challenges. In a smart city, operations and... more Smart city brings enormous opportunities and exciting challenges. In a smart city, operations and services such as traffic, transport, electric power, and water distribution are monitored, operated, and controlled through ICT based infrastructure, smartly. This allows efficient management of resources and facilitates smooth access to services. However, it also induces stringent requirements and challenges for uninterrupted operation and execution of ICT-based monitoring and controlled infrastructure. Cybersecurity is one of the foremost challenges in a smart city network. That is, protecting the smart city application services from cyber-attacks and ensuring continuity of services is utmost desirable. As smart city services typically comprised of web based applications, application level distributed denial of service (AL-DDoS) attack is a major cybersecurity threat that can have catastrophic impact on an extremely critical smart city network. This paper presents an efficient framewo...
The effect of network-based malware can be massive on Internet Service Providers (ISPs). Maliciou... more The effect of network-based malware can be massive on Internet Service Providers (ISPs). Malicious users, that are among the ISP customers, can consume large amount of network bandwidth. This behavior could be overwhelmingly damaging as legitimate ISP users may experience performance degradation or complete denial of service. Subsequently, as network-based malware spreads out, number of malicious users increase, causing distributed denial of service (DDoS) attack. This paper proposes a novel idea of mitigating networkbased malwares at ISP level. The proposed solution ISPMonitor, monitors various traffic patterns to detect the timely onset of malware attack. It detects the attack and applies a mitigation mechanism to protect the ISP network. The ISPMonitor, is a DNS based solution that monitors the rate of DNS lookup requests. An anomaly based approach is used to detect malware. The proposed mechanism was investigated on a live wireless ISP with 80,000 customers spanned across three ...
2017 International Conference on Innovations in Electrical Engineering and Computational Technologies (ICIEECT), 2017
Graphic Processing Units have emerged as a popular platform for many computationally expensive ta... more Graphic Processing Units have emerged as a popular platform for many computationally expensive tasks. The availability of hundreds to thousands of cores embedded together using shared memory, provides enhanced speed for many parallel programs. Motivated by this inherent parallelism in GPUs, General Purpose Graphic Processing Unit (GPGPU) computing has been adopted in many applications. These include Data Analytics, Robotics, Health, Driverless cars, DNA sequencing, High speed network processing, and Image Recognition. This talk will provide an overview of increased adaptation of GPGPU computing in many such applications. The talk will also enlighten open research areas in these applications.
2015 Conference on Information Assurance and Cyber Security (CIACS), 2015
Android has become a major player in smartphone software arena, thanks to the massively positive ... more Android has become a major player in smartphone software arena, thanks to the massively positive reception of Google Play by the developers and users alike. In general, Android applications follow a set of permissions, which are used for access control. However, through the privilege-escalation vulnerability, a malicious application can escalate itself and access an un-permitted resource. Consequently, serious security and safety exploits such as privacy violation, reverse-shell access to the device, and drive-by downloads may occur. We propose a flexible and efficient defense mechanism against such exploits. Our solution - SAndroid, is an extensible and a lightweight application. It provides enhanced safety and security against privilege escalation attacks through rapid detection. SAndroid is based on active monitoring and detection of malicious applications through tracking of system logs and malicious process signatures. The assurance of safety provided by SAndroid is confirmed through design, testing, and verification. SAndroid follows modular approach permitting high flexibility and efficiency. Through real experiments, we confirmed that SAndroid is an efficient and low cost solution having negligible false-positives. This paper describes the architecture and design of the SAndroid framework and provides details of our experiments.
Cyberinterventions such as attacks and exploitations could have a severe impact on people's e... more Cyberinterventions such as attacks and exploitations could have a severe impact on people's everyday activities. In this context, we must understand the dimensions and scope of attacks in cyberspace and assess measures to enhance the security of cybersystems. A global scenario should be considered given that entities could involve individuals, organizations, and state-sponsored actors.
Uploads
Papers by Jawwad Shamsi