Selvakumar Manickam
Universiti Sains Malaysia

Published : 12 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 12 Documents
Search

Detection of ICMPv6-based DDoS attacks using anomaly based intrusion detection system: A comprehensive review Adnan Hasan Bdair Alghuraibawi; Rosni Abdullah; Selvakumar Manickam; Zaid Abdi Alkareem Alyasseri
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5216-5228

Abstract

Security network systems have been an increasingly important discipline since the implementation of preliminary stages of Internet Protocol version 6 (IPv6) for exploiting by attackers. IPv6 has an improved protocol in terms of security as it brought new functionalities, procedures, i.e., Internet Control Message Protocol version 6 (ICMPv6). The ICMPv6 protocol is considered to be very important and represents the backbone of the IPv6, which is also responsible to send and receive messages in IPv6. However, IPv6 Inherited many attacks from the previous internet protocol version 4 (IPv4) such as distributed denial of service (DDoS) attacks. DDoS is a thorny problem on the internet, being one of the most prominent attacks affecting a network result in tremendous economic damage to individuals as well as organizations. In this paper, an exhaustive evaluation and analysis are conducted anomaly detection DDoS attacks against ICMPv6 messages, in addition, explained anomaly detection types to ICMPv6 DDoS flooding attacks in IPv6 networks. Proposed using feature selection technique based on bio-inspired algorithms for selecting an optimal solution which selects subset to have a positive impact of the detection accuracy ICMPv6 DDoS attack. The review outlines the features and protection constraints of IPv6 intrusion detection systems focusing mainly on DDoS attacks.
Distributed reflection denial of service attack: A critical review Riyadh Rahef Nuiaa; Selvakumar Manickam; Ali Hakem Alsaeedi
International Journal of Electrical and Computer Engineering (IJECE) Vol 11, No 6: December 2021
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v11i6.pp5327-5341

Abstract

As the world becomes increasingly connected and the number of users grows exponentially and “things” go online, the prospect of cyberspace becoming a significant target for cybercriminals is a reality. Any host or device that is exposed on the internet is a prime target for cyberattacks. A denial-of-service (DoS) attack is accountable for the majority of these cyberattacks. Although various solutions have been proposed by researchers to mitigate this issue, cybercriminals always adapt their attack approach to circumvent countermeasures. One of the modified DoS attacks is known as distributed reflection denial-of-service attack (DRDoS). This type of attack is considered to be a more severe variant of the DoS attack and can be conducted in transmission control protocol (TCP) and user datagram protocol (UDP). However, this attack is not effective in the TCP protocol due to the three-way handshake approach that prevents this type of attack from passing through the network layer to the upper layers in the network stack. On the other hand, UDP is a connectionless protocol, so most of these DRDoS attacks pass through UDP. This study aims to examine and identify the differences between TCP-based and UDP-based DRDoS attacks.
A new proactive feature selection model based on the enhanced optimization algorithms to detect DRDoS attacks Riyadh Rahef Nuiaa; Selvakumar Manickam; Ali Hakem Alsaeedi; Esraa Saleh Alomari
International Journal of Electrical and Computer Engineering (IJECE) Vol 12, No 2: April 2022
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijece.v12i2.pp1869-1880

Abstract

Cyberattacks have grown steadily over the last few years. The distributed reflection denial of service (DRDoS) attack has been rising, a new variant of distributed denial of service (DDoS) attack. DRDoS attacks are more difficult to mitigate due to the dynamics and the attack strategy of this type of attack. The number of features influences the performance of the intrusion detection system by investigating the behavior of traffic. Therefore, the feature selection model improves the accuracy of the detection mechanism also reduces the time of detection by reducing the number of features. The proposed model aims to detect DRDoS attacks based on the feature selection model, and this model is called a proactive feature selection model proactive feature selection (PFS). This model uses a nature-inspired optimization algorithm for the feature subset selection. Three machine learning algorithms, i.e., k-nearest neighbor (KNN), random forest (RF), and support vector machine (SVM), were evaluated as the potential classifier for evaluating the selected features. We have used the CICDDoS2019 dataset for evaluation purposes. The performance of each classifier is compared to previous models. The results indicate that the suggested model works better than the current approaches providing a higher detection rate (DR), a low false-positive rate (FPR), and increased accuracy detection (DA). The PFS model shows better accuracy to detect DRDoS attacks with 89.59%.
Proposed security mechanism for preventing fake router advertisement attack in IPv6 link-local network Mahmood A. Al-Shareeda; Selvakumar Manickam; Murtaja Ali Saare; Navaneethan C. Arjuman
Indonesian Journal of Electrical Engineering and Computer Science Vol 29, No 1: January 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v29.i1.pp518-526

Abstract

The design of router discovery (RD) is a trust mechanism to confirm the legitimacy of the host and router. Fake router advertisement (RA) attacks have been made possible by this RD protocol design defect. Studies show that the standard RD protocol is vulnerable to a fake RA attack where the host will be denied a valid gateway. To cope with this problem, several prevention techniques have been proposed in the past to secure the RD process. Nevertheless, these methods have a significant temporal complexity as well as other flaws, including the bootstrapping issue and hash collision attacks. Thus, the SecMac-secure router discovery (SecMac-SRD) technique, which requires reduced processing time and may thwart fake RA assaults, is proposed in this study as an improved secure RD mechanism. SecMac-SRD is built based on a UMAC hashing algorithm with ElGamal public key distribution cryptosystem that hides the RD message exchange in the IPv6 link-local network. Based on the obtained expected results display that the SecMac-SRD mechanism achieved less processing time compared to the existing secure RD mechanism and can resist fake RA attacks. The outcome of the expected results clearly proves that the SecMac-SRD mechanism effectively copes with the fake RA attacks during the RD process.
DDoS attacks detection using machine learning and deep learning techniques: analysis and comparison Mahmood A. Al-Shareeda; Selvakumar Manickam; Murtaja Ali Saare
Bulletin of Electrical Engineering and Informatics Vol 12, No 2: April 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/eei.v12i2.4466

Abstract

The security of the internet is seriously threatened by a distributed denial of service (DDoS) attacks. The purpose of a DDoS assault is to disrupt service and prevent legitimate users from using it by flooding the central server with a large number of messages or requests that will cause it to reach its capacity and shut down. Because it is carried out by numerous bots that are managed (infected) by a single botmaster using a fake IP address, this assault is dangerous because it does not involve a lot of work or special tools. For the purpose of identifying and analyzing DDoS attacks, this paper will discuss various machine learning (ML) and deep learning (DL) techniques. Additionally, this study analyses and comparatives the significant distinctions between ML and DL techniques to aid in determining when one of these techniques should be used.
Unmanned aerial vehicle: a review and future directions Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam
Indonesian Journal of Electrical Engineering and Computer Science Vol 30, No 2: May 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v30.i2.pp778-786

Abstract

The use of unmanned aerial vehicles (UAVs) will be crucial in the next generation of wireless communications infrastructure. When compared to traditional ground-based solutions, it is expected that their use in a variety of communication-based applications will increase coverage and spectrum efficiency. In this paper, we provide a detailed review of all relevant research works as follows. This paper presents types of UAVs (e.g., wireless coverage, military, agriculture, medical applications, environment, and climate, and delivery and transportation), characteristics of UAVs (e.g., node density, altering system topology, node mobility, radio broadcasting mode, frequency band, localization, and power consumption and network lifetime), the application of UAVs (e.g., Multi-UAV cooperation, UAV-to-VANET collaborations, and UAV-to-ground tasks). Additionally, this paper reviews the routing protocols of UAVs (e.g., topology-based, position-based, heterogeneous, delay-tolerant networks (DTNs), swarm-Based, and cluster-based) and simulation tools (e.g., OMNeT++, AVENS, MATLAB, NS3, SUMO, and OPNET). The design and development of any new methods for UAVs may use this work as a guide and reference.
Proposed enhanced link failure rerouting mechanism for software-defined exchange point Abdijalil Abdullahi; Selvakumar Manickam; Shankar Karuppayah; Mahmood A. Al-Shareeda
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 1: July 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i1.pp259-270

Abstract

Internet eXchange point (IXP) is a way to optimize network bandwidth. It enables a platform in the different providers like internet service providers (ISPs) and content delivery providers (CDNs) to share their traffic through a common point. A software defined exchange point (SDX) is an IXP comprising of a programmable deployed software defined network (SDN) switching fabric to enhance the management of their services, but they met the performance issues. The previous studies proposed various mechanisms and frameworks that tackled with these issues, but they don’t overcome overall challenges like link failure recovery for multi-hop-based SDX particularly packet processing delay and switch memory overhead. To cope with these issues, this paper proposed an enhanced link failure rerouting (ELFR) mechanism for multi-hop-based SDX. The objective of the proposed ELFR mechanism is to reduce the delay of packet processing to recover the link failure quickly and improve the path computation while ensuring the switch storage overhead. The present paper is an effort to retrospect and analyze the critical review of existing work for SDX. Furthermore, this paper provides a background of SDX, its components and its applications. Finally, this paper presents and compares the expected results of ELFR mechanism and related work.
Bluetooth low energy for internet of things: review, challenges, and open issues Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam; Shankar Karuppayah
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1182-1189

Abstract

As a result of its ultra-low power consumption, simple development, sufficient network coverage, and rapid data transfer speed, Bluetooth low energy (BLE) has emerged as the standard communication standard for internet of things (IoT) nodes. Therefore, in this review paper introduces the concept of Bluetooth low energy for the internet of things (BLE-IoT) in terms of Bluetooth classic, Bluetooth version, applications for BLE-IoT, and new features of BLE-IoT. We then provide a taxonomy of literature reviews based on the parameter adjustment approach (e.g., advertiser side schemes, scanner side schemes, hybrid schemes) and collision avoidance approach (e.g., advertiser side schemes and scanner side schemes). Finally, we discuss research challenges and future opportunities for BLE-IoT.
Validation of the toolkit for fake news awareness in social media Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam; Shankar Karuppayah
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1171-1181

Abstract

Fake news has gained attention in recent years, particularly among social media users. The quick spread of fake news has been made possible by the increased usage of social media as a platform to get the most recent news and information. As a consequence, it is getting harder to distinguish between real news and fake news. This essay will outline a study that evaluated the usefulness of a toolset for identifying false news. The first hypothesis is that an increase in media literacy will result in a rise in awareness of fake news. The second theory is that fake news toolkits significantly increase students’ and working adults’ awareness of false news. On the staff of a manufacturing company and an institution, a survey was undertaken. The organization’s employees were given approximately 150 questionnaires, and 110 responses were received. The project includes the creation of a web application-a false news awareness toolkit-that will raise user awareness of fake news in terms of knowledge, behaviour, and attitude among students and workers.
Wireless sensor networks in the internet of things: review, techniques, challenges, and future directions Fu Zijie; Mahmood A. Al-Shareeda; Murtaja Ali Saare; Selvakumar Manickam; Shankar Karuppayah
Indonesian Journal of Electrical Engineering and Computer Science Vol 31, No 2: August 2023
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v31.i2.pp1190-1200

Abstract

Wireless sensor networks (WSN) are an emerging multidisciplinary intersection of cutting-edge research fields, and their advantages in terms of freedom of formation, high signal-to-noise ratio, high strength, and unattended, which makes WSN have good prospects for application in the field of internet of things (IoT). Considering all the benefits that WSN offer, this paper reviews the development history of wireless sensor networks internet of things (WSN-IoT), analyses the technologies used by sensors in the IoT, and illustrates the future developing patterns and remaining challenges, in conjunction with the main technologies in the perception layer of the current network of things industry.