Mohammed Anbar
Universiti Sains Malaysia

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Earlier stage for straggler detection and handling using combined CPU test and LATE methodology Anwar H. Katrawi; Rosni Abdullah; Mohammed Anbar; Ammar Kamal Abasi
International Journal of Electrical and Computer Engineering (IJECE) Vol 10, No 5: October 2020
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | Full PDF (650.355 KB) | DOI: 10.11591/ijece.v10i5.pp4910-4917

Abstract

Using MapReduce in Hadoop helps in lowering the execution time and power consumption for large scale data. However, there can be a delay in job processing in circumstances where tasks are assigned to bad or congested machines called "straggler tasks"; which increases the time, power consumptions and therefore increasing the costs and leading to a poor performance of computing systems. This research proposes a hybrid MapReduce framework referred to as the combinatory late-machine (CLM) framework. Implementation of this framework will facilitate early and timely detection and identification of stragglers thereby facilitating prompt appropriate and effective actions.
Performance evaluation of route optimization management of producer mobility in information-centric networking Xian Wee Low; Yu-Beng Leau; Zhiwei Yan; Yong-Jin Park; Mohammed Anbar
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 5: October 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i5.pp5260-5271

Abstract

Named data networking (NDN) is a network service evolving the Internet's host-based packet delivery model. The idea of NDN is to use named data for routing, which specifies what they are looking for, instead of using location addresses that determine where they expect it to be provided. This architecture is expected to solve many issues that are currently faced by transmission control protocol/internet protocol (TCP/IP) architecture, such as scalability, robustness, mobility, security, and etcetera. One of the problems is about handling producer mobility. Considering the explosion growth rate of Internet connection in public transport vehicles, this is a challenge that needs to be overcome. Therefore, we have proposed a new scheme called route optimization management of producer mobility (ROM-P) with new features such as distributing anchor points and caching by using the same data name and com-paring our previous scheme, efficient producer mobility support (EPMS). This paper shows the analysis result between the ROM-P and EPMS by using simulation. All simulations were conducted using ndnSIM 2.4 NS-3 based. Throughout the simulation ROM-P shows a promising development in better performing compares to EPMS.
Machine and deep learning techniques for detecting internet protocol version six attacks: a review Arkan Hammoodi Hasan Kabla; Mohammed Anbar; Shady Hamouda; Abdullah Ahmed Bahashwan; Taief Alaa Al-Amiedy; Iznan Husainy Hasbullah; Serri Faisal
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 5: October 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i5.pp5617-5631

Abstract

The rapid development of information and communication technologies has increased the demand for internet-facing devices that require publicly accessible internet protocol (IP) addresses, resulting in the depletion of internet protocol version 4 (IPv4) address space. As a result, internet protocol version 6 (IPv6) was designed to address this issue. However, IPv6 is still not widely used because of security concerns. An intrusion detection system (IDS) is one example of a security mechanism used to secure networks. Lately, the use of machine learning (ML) or deep learning (DL) detection models in IDSs is gaining popularity due to their ability to detect threats on IPv6 networks accurately. However, there is an apparent lack of studies that review ML and DL in IDS. Even the existing reviews of ML and DL fail to compare those techniques. Thus, this paper comprehensively elucidates ML and DL techniques and IPv6-based distributed denial of service (DDoS) attacks. Additionally, this paper includes a qualitative comparison with other related works. Moreover, this work also thoroughly reviews the existing ML and DL-based IDSs for detecting IPv6 and IPv4 attacks. Lastly, researchers could use this review as a guide in the future to improve their work on DL and ML-based IDS.