Browsing by Author "Islam Khan, Burhan UI"
Now showing 1 - 7 of 7
Results Per Page
Sort Options
Item Open Access Adoption of Cloud Computing in Higher Learning Institutions: A Systematic Review(Department of Computer Science, Nasarawa State University Keffi, 2017-09-10) Olanrewaju, Rashidah F.; Islam Khan, Burhan UI; Mueen, M. Islam Mattoo Islam UIObjectives: The goal of this paper is to comprehend the significance of adopting Cloud Computing (CC) in establishments of higher learning. This paper plots a portion of the advantages that can be conveyed to advanced education using cloud computing, analyzes probably the most imperative difficulties that can be faced by the academia due to its adoption, and proposes some early strides towards its adoption while alleviating the risks involved. Methods/Statistical Analysis: This paper recognizes an expansiveness of institutional variables and CC appropriation procedures by including the diverse perspectives of sources from various backgrounds and contexts on a single phenomenon. The different aids and contributions in this paper are based on the consolidation of research works available in various papers. Findings: The discoveries from this analysis demonstrate that the adoption of CC in establishments of higher learning can be comprehended through a few factors that have an essential impact on CC adoption methodologies like administrative bodies and governments, internal stakeholders, cloud suppliers, firm attributes, socio-political changes, IT framework, and so on. Applications/ Improvements: This investigation offers open doors for future research besides giving an understanding into how cloud suppliers, advisors, governments, and scholastics see several market requests, and how they react to these demands while advancing services offered by CC in higher learning institutions. The consequences for practice can help decision makers in adopting services provided by CC legitimately.Item Open Access Analysis of Packet Reordering Delay for Bandwidth Aggregation in Heterogeneous Wireless Networks(Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.Bandwidth aggregation in heterogeneous wireless networks (HWN) can be one of the effective solutions in providing quality data transmission for real-time applications. However, transmitting the data through multiple networks create packet reordering issues that result in transmission delay and degrades the overall quality of services. This paper addresses packet reordering issues both for single and multiple paths with a reordering delay in the transmission system. An algorithm has proposed to mitigate the associated delay that has been simulated in network simulator 3 (NS3). The simulation results have benchmarked with the well known Earliest Delivery Path First (EDPF) method and shown better performance over the EDPF results. Moreover, the simulation has been done to analyze the packet scheduling including to measuring packet reordering delay, and reordering entropy. CBR and VBR applications have been transmitted for 1800ms from sender to receiver in a heterogeneous wireless environment created in NS3. The results show the proposed method achieved to reduce the reordering delay and reordering entropy both for CBR and VBR applications.Item Open Access Bandwidth Allocation Policy using the Game Theory Model in Heterogeneous Wireless Networks(Department of Computer Science, Nasarawa State University Keffi, 2018-07-06) Anwar, Farhat; Masud, Mosharrof H.; Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Latif, Suhaimi A.In Heterogeneous Wireless Network (WHN), a Mobile Device (MD) can be connected with multiple access technologies available in a particular geographical area. Selection of appropriate access technology is a challenge for the MD where game theory policy can be applied. Shapley Value is one of the game-theoretic models that can be applied to allocate appropriate bandwidth for i number of users for k number of services from N access technologies. It proposes the fairest allocation of the collectively gained profits among the collaborative players in the game. The primary focus is to find the relative contribution of every player in a cooperative game. This paper has drawn a numerical analysis of Shapley Value for three wireless access technologies, namely WiFi, Cellular and WiMAX. It has been shown how much bandwidth can be allocated from an access technology for a required bandwidth for a specific service. It can be noted from the results that 225Kbps, 141.67Kbps and 233.33Kbps can be allocated from WiFi, Cellular and WiMAX respectively to transmit the 600Kbps data in an HWN network.Item Open Access A critical insight into the effectiveness of research methods evolved to secure IoT ecosystem(Department of Computer Science, Nasarawa State University Keffi, 2020-03-03) Islam Khan, Burhan UI; Olanrewaju, Rashidah F.; Anwar, Farhat; Roohie, Naaz Mir; Najeeb, Rahman AthaurIncreasing proliferation of IoT has led to an evolution of various devices for realising the smart features of ubiquitous applications. However, the inclusion of such a massive pool of devices with different computational capabilities, network protocols, hardware configurations, etc. also causes a higher number of security threats. Security professionals, organisations, and researchers are consistently investigating the security problems associated with IoT ecosystem and are coming up with different forms of solution sets. This paper presents a snapshot of the existing research work being carried out towards the security of IoT and assesses their strengths and weaknesses. The paper also explores the current research trend and presents the latest security methods being implemented and outlines the open research issues associated with it. The paper contributes to offering an accurate picture of the effectiveness of the existing security system in IoT.Item Open Access Secure Annihilation of Out-of-Band Authorization for Online Transactions(Department of Computer Science, Nasarawa State University Keffi, 2018-02-02) Hussain, Sabahat; Islam Khan, Burhan UI; Anwar, Farhat; Olanrewaju, Rashidah F.Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time- Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic truncation to produce human-readable OTP. An inimitable authentication scheme has been presented in which a unique initial seed is used for generating a series of OTPs on the user’s handheld gadget (i.e. a mobile phone). Findings: The proposed scheme demonstrated better results than the previous schemes of authorization after a security analysis was conducted on it. This is attributed to the eradication of cellular network within the authorization process. A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. The application of hash functions to that seed eliminates the necessity to send one time passwords to the users via Short Message Service and decreases the limitations posed by out-of-band systems, thus making it suitable to be employed in online banking and other financial organizationsItem Open Access Snort-Based Smart and Swift Intrusion Detection System(Department of Computer Science, Nasarawa State University Keffi, 2017-01-01) Olanrewaju, Rashidah F.; Islam Khan, Burhan UI; Najeeb, Rahman Athaur; Zahir, Ku Afiza Ku Nor; Hussain, SabahatObjectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. Then, only these relevant features are trained with the help of multi-layer perceptron supervised neural network. The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. Besides, the intrusions have been classified into four categories as Denial-of-Service (DoS), User-to-root (U2R), Remote-to-Local (R2L) and Probe attacks; and the alerts are stored and shared via a central log. Thus, the unknown attacks detected by other Intrusion Detection Systems can be sensed by any IDS in the network thereby reducing computational cost as well as enhancing the overall detection rate. Applications/Improvements: The proposed system does not waste time by considering and analysing all the features but takes into consideration only relevant ones for the specific attack and supervised learning neural network is used for intrusion detection. By the application of Snort before backpropagation algorithm, the latter has only one function to perform – detection of unknown attacks. In this way, the time for attack detection is reduced.Item Open Access SSM: Secure-Split-Merge Data Distribution in Cloud Infrastructure(Department of Computer Science, Nasarawa State University Keffi, 2015-02-02) Islam Khan, Burhan UI; Baba, Asifa Mehraj; Olanrewaju, Rashidah F.; Lone, Sajad Ahmad; Zulkurnain, Nurul FarizaWith the advancement of cloud storage services the vulnerabilities associated with cloud-related data has increased. It affects the cloud distributed data servers that are not only used for data storage, but also used for managing a huge amount of data with distributed file structures in collaborative sharing. The data sharing processes of cloud computing infrastructure are susceptible to various kinds of attacks where many traditional cryptographic techniques fail to provide a proper and efficient authentication mechanism. In this paper, a novel approach namely Secure-Split-Merge (SSM) is introduced for the security of data. The proposed SSM scheme uses a unique mechanism of performing splitting of data using AES 128 bit encryption key. The chunks of encrypted splits are being maintained on various rack servers of different types of cloud zones. The comparative analysis shows that the proposed system gives effective outcomes as compared to various existing and traditional security standards.