Recently Published Papers
A. Secure Resilient Edge Cloud Network
- T. Saadawi, A. Kawaguchi, M. Lee, A. Mowshowitz; "Secure Resilient Edge Cloud Designed Network" IEICE Transactions on Communications, Japan, Vol.E103-B, No.4, pp.292-301, paper no: 2019NRI0002, April 2020
B. Blockchain in Cybersecurity
O. Ajayi and T. Saadawi, “Blockchain-based Architecture for Secured Cyber-Attack features Exchange” Submitted to Elsevier Journal of Computer Communications. May 25, 2020.
Oluwaseyi Ajayi; Melvin Cherian; Tarek Saadawi, "Secured Cyber-Attack Signatures Distribution using Blockchain Technology". 2019 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE. International Conference on Embedded and Ubiquitous Computing (EUC)
Oluwaseyi Ajayi; Obinna Igbe; Tarek Saadawi, “Consortium Blockchain-Based Architecture for Cyber-attack Signatures and Features Distribution” 2019 IEEE 10th Annual Ubiquitous Computing, Electronics & Mobile Communication Conference (UEMCON)
C. Blockchain in eHealth
O. Ajayi, M. Abouali, and T. Saadawi, “Blockchain Architecture for Secured Inter-Healthcare Electronic Health Records Exchange” accepted for oral presentation at the 12th International workshop on information Network and Design (WIND 2020), August 31- September 2, 2020. University of Victoria, Victoria, Canada.
D. Intrusion Detection System (IDS)
Virtual Machine Introspection
- Huseyn Huseynov; Kenichi Kourai; Tarek Saadawi; Obinna Igbe, "Virtual Machine Introspection for Anomaly-Based Keylogger Detection”. 2020 IEEE 21st International Conference on High-Performance Switching and Routing (HPSR).
- Artificial Immune System
- Obinna Igbe; Ihab Darwish; Tarek Saadawi, "Distributed Network Intrusion Detection Systems: An Artificial Immune System Approach”. 2016 IEEE First International Conference on Connected Health: Applications, Systems and Engineering Technologies (CHASE)
- Game Theory
Ihab Darwish; Obinna Igbe; Tarek Saadawi, “Experimental and theoretical modeling of DNP3 attacks in smart grids”.2015 36th IEEE Sarnoff Symposium.
Blockchain Technology Protecting Cybersecurity
Digital Immune System for Intrusion Detection on Data Processing Systems and Networks
A method for detecting the intrusion is provided using a combination of two AIS algorithms: Negative Selection Algorithm (NSA) and Dendritic Cell Algorithm (DCA). The method includes the following steps, or some functional subset of these steps: periodic monitoring of a data processing system for anomalous behavior that may indicate the presence of an intruder or an undesirable software; using the NSA for the generation of a population of detectors that are used for detecting anomalies in the monitored system via a matching criterion; using the DCA (which runs in parallel to the NSA) to sample traffic and signals coming in or out of the data processing system; using an aggregation system to combine the individual decisions of the NSA and the DCA to form a single final decision.