Hussein, Abdelrahman
Unknown Affiliation

Published : 2 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 2 Documents
Search

Encountering social engineering activities with a novel honeypot mechanism Abualhija, Mwaffaq; Al-Shaf’i, Nid’a; Turab, Nidal M.; Hussein, Abdelrahman
International Journal of Electrical and Computer Engineering (IJECE) Vol 13, No 6: December 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v13i6.pp7056-7064

Abstract

Communication and conducting businesses have eventually transformed to be performed through information and communication technology (ICT). While computer network security challenges have become increasingly significant, the world is facing a new era of crimes that can be conducted easily, quickly, and, on top of all, anonymously. Because system penetration is primarily dependent on human psychology and awareness, 80% of network cyberattacks use some form of social engineering tactics to deceive the target, exposing systems at risk, regardless of the security system's robustness. This study highlights the significance of technological solutions in making users more safe and secure. Throughout this paper, a novel approach to detecting and preventing social engineering attacks will be proposed, combining multiple security systems, and utilizing the concept of Honeypots to provide an automated prevention mechanism employing artificial intelligence (AI). This study aims to merge AI and honeypot with intrusion prevention system (IPS) to detect social engineering attacks, threaten the attacker, and restrict his session to keep users away from these manipulation tactics.
Optimizing blockchain for healthcare IoT: a practical guide to navigating scalability, privacy, and efficiency trade-offs Alhija, Mwaffaq Abu; Al-Baik, Osama; Hussein, Abdelrahman; Abdeljaber, Hikmat
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1773-1785

Abstract

The adoption of blockchain technology provides significant disruptive benefits to internet-of-things (IoT) applications in healthcare in vital aspects like security, integrity, transparency, and efficiency. Nevertheless, in order to fully realize the potential of blockchain-driven solutions, healthcare organizations have to address intricate compromises between essential factors including scalability, privacy and resource utilization considering that the data sensitivity alongside strict regulatory compliance requirements characterize this sector. This research discusses the fundamental aspects of these trade-offs, including the range of consensus protocols (e.g. proof-of-work, proof-of-stake) and cryptographic techniques (e.g. zero-knowledge proofs, homomorphic encryption). A systematic choice matrix is created, which relates specific use cases of the healthcare IoT to the optimal tailored blockchain structures on such critical metrics as transaction volume, frequency, privacy level and resource restrictions. The suggested framework provides solid, actionable recommendations to healthcare organizations in order to help them benefit from the enormous promise of the blockchain for connected IoT healthcare by finding a balance between decentralization advantages and performance, security and compliance requirements.