Publikationen


Suche nach „[Amar] [Almaini]“ hat 4 Publikationen gefunden
Suchergebnis als PDF
    DigitalAngewandte InformatikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Amar Almaini, A. Al Dubai, I. Romdhani, Martin Schramm

    Delegation of Authentication to the Data Plane in Software Defined Networks

    Proceedings of the 18th IEEE International Conference on Ubiquitous Computing and Communications (IUCC 2019) [October 21-23, 2019, Shenyang, China]

    2019

    Abstract anzeigen

    OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Vortrag

    Amar Almaini

    Authentication and port scan mitigation in the Software Defined Network Switches

    Posterpräsentation

    6. Tag der Forschung, Deggendorf

    2019

    DigitalElektrotechnik und MedientechnikInstitut ProtectIT

    Beitrag (Sammelband oder Tagungsband)

    Michael Heigl, Laurin Dörr, Amar Almaini, D. Fiala, Martin Schramm

    Incident Reaction Based on Intrusion Detections’ Alert Analysis

    Proceedings of the 23rd International Conference on Applied Electronics (AE) 2018 (University of West Bohemia, Pilsen, Czech Republic; September 11-12, 2018)

    2018

    DOI: 10.23919/AE.2018.8501419

    Abstract anzeigen

    The protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as a fundamental part in holistic security eco-systems in the previous years. However, the interpretation of and reaction on detected incidents is still a challenging task. In this paper an incident handling environment with relevant components and exemplary functionality is proposed that involves the processes from the detection of incidents over their analysis to the execution of appropriate reactions. An evaluation of a selection of implemented interacting components using technology such as OpenFlow or Snort generally proofs the concept.

    Angewandte InformatikInstitut ProtectIT

    Vortrag

    A. Hawbani, Y. Zhang, Amar Almaini, A. Yassin, L. Zhao, R. Cao

    2020 Master's Programs in Suzhou

    DOI: 10.13140/RG.2.2.28640.43522

    Abstract anzeigen

    How to get a free scholarship at the most prestigious Chinese universities. This program is available for students with an undergraduate degree, and it often takes one to two years to complete.