Publications

Publications

Paper: Android Users Privacy Awareness Survey

ABSTRACT

Having a share of over 80% of the smartphone market, Android has become an important mobile operating system that is used by billions of users on daily basis. With the widespread use of smartphones in general, and Android in specific, privacy concerns grow with that expansion in the user base. With the millions of applications being downloaded by users daily, it is becoming increasingly difficult to differentiate between the good and the bad in terms of security and privacy. In this paper, we present the results of a survey conducted among 4027 Android users worldwide. This survey was conducted to measure the awareness of Android users regarding their privacy. The study measures the users’ interaction with the permissions required by different applications they install. The results of the survey show apparent weakness in the awareness of Android users regarding the privacy of their data.

Citation Info:

Mohammed M. Alani, “Android Users Privacy Awareness Survey”, International Journal of Interactive Mobile Technology (i-JIM), Vol 11, No 3, pp 130-144.

Full-text (open-access) can be accessed through the link: https://doi.org/10.3991/ijim.v11i3.6605

Book: Elements of Cloud Computing Security

This work serves as a thorough, yet simple-to-read, reference on various aspects of cloud computing security. The text opens with an introduction to the general concepts of cloud computing necessary to build a basic understanding of the cloud, followed by a discussion of aspects of security. The work then examines how cloud security differs from conventional information security, and reviews cloud-specific classes of threats and attacks. A range of varying threats in cloud computing are covered, from threats of data loss and data breaches, to threats to availability and threats posed by malicious insiders. The text discusses cloud security attacks on different levels, including attacks on the hypervisor, and on the confidentiality of data. Newer attacks, such as side-channel attacks and resource-freeing attacks, are also described. The work concludes with a set of general security recommendations for the cloud.

 

eBook ISBN 978-3-319-41411-9

Softcover ISBN 978-3-319-41410-2

Link: Elements of Cloud Computing Security: A Survey of Key Practicalities

Paper: MANET Security: A Survey

ABSTRACT

Mobile Ad hoc Networks are being adopted in more and more applications in our daily life. Mobile computing and mobile ad hoc networks in particular have become a daily need. As mobile ad hoc networks have been target for many attacks, the security of these networks has become an essential part of their existence. This paper provides a review of the current threats and how these threats are mitigated. The paper also discusses common attacks on mobile ad hoc networks and classifies these attacks in various classification types. The paper also discusses various countermeasures to mitigate the risks of attacks.

 

Citation Info:

Mohammed M. Alani, MANET Security: A Survey, published in the 4th IEEE International Conference on Control System, Computing, and Engineering, Penang, Malaysia, November 2014.

Full text available on IEEE Xplore on this link: http://dx.doi.org/10.1109/ICCSCE.2014.7072781

Paper: Securing the Cloud against Distributed Denial of Service Attacks: A Review

ABSTRACT

Distributed denial of service attacks are becoming a serious threat that no business involved in providing services over the Internet can ignore. The rapidly growing frequency and magnitude in which these attacks are occurring is an alarming indicator. As cloud services are being adopted by many enterprises, the cloud infrastructure resilience to such attacks becomes a growing concern. In this paper, we discuss the types and possible impacts of DDoS attacks on cloud computing and the suggested mitigation techniques. These attacks were categorized into three categories; external, internal, and cloud-to-outside attacks.

 

Published in the Proceedings of the 2nd International Conference on Applied Information and Communication Technology, Muscat, Oman. 28-29 April, 2014.

Book: Guide to OSI and TCP/IP Models

  • Provides a simplified introduction to computer networks
  • Requires no prior background in the field
  • Discusses the fundamentals of the network, transport and application layers
This work opens with an accessible introduction to computer networks, providing general definitions of commonly used terms in networking. This is followed by a detailed description of the OSI model, including the concepts of connection-oriented and connectionless communications. The text carefully elaborates the specific functions of each layer, along with what is expected of protocols operating at each layer. Next, the journey of a single packet, from source to destination, is described in detail. The final chapter is devoted to the TCP/IP model, beginning with a discussion of IP protocols and the supporting ARP, RARP, and InARP protocols. The work also discusses the TCP and UDP protocols operating at the transport layer, and the application layer protocols HTTP, DNS, FTP, TFTP, SMTP, POP3, and Telnet. Important facts and definitions are highlighted in gray boxes found throughout the text.
Published: March, 2014 by Springer.
Guide to OSI and TCP/IP Model

Guide to OSI and TCP/IP Model

Paper: Mathematical Approximation of Delay in Voice over IP

ABSTRACT

This paper introduces a novel method of approximate calculation of delay in voice over IP systems. The proposed method relies on mathematical operations like interpolation and integration to produce a continuous function. This continuous function shows the delay in different times. The paper shows a detailed example of applying this method successfully to a sample call. The resulting delay function can help in better understanding of the variations of delay in different times and how it is affected by network load.

Download

Citation Information:

Mohammed M. Alani, Mathematical Approximation of Delay in Voice over IP, International Journal of Computer and Information Technology (IJCIT), ISSN: 2279-0764, Vol. 3, Issue 1, pp. 78-82, January 2014.

Book: Guide to Cisco Routers Configuration

  • Provides a guide to the configuration of Cisco routers
  • Presents detailed and easy-to-follow “how-to” instructions
  • For beginners and advanced users alike

This work provides a guide to the configuration of Cisco routers, from tasks for beginners to advanced operations. A collection of detailed “how-to” instructions are presented, which will be of use to all professionals and students who engage with Cisco routers in the field or in the lab. The guide starts with the simple step-by-step task of connecting the router and performing basic configuration, before building up to complex and sensitive operations such as router IOS upgrade and Site-to-Site VPNs.

Published: August, 2012 by Springer

Guide to Cisco Routers Configuration

Guide to Cisco Routers Configuration