Jamal Karimian

Work place: Department of Computer Engineering, Imam Reza International University, Mashhad, Iran

E-mail: jamal.karimian@Imamreza.ac.ir

Website:

Research Interests: Computer systems and computational processes, Artificial Intelligence, Computer Architecture and Organization, Computer Networks, Data Mining, Data Structures and Algorithms

Biography

Jamal Karimian (born September 17, 1989) is an Iranian Software Engineer. He received his Master degree from Imam Reza University in Mashhad in 2014 and has been researching in various fields of computer science such as data mining, artificial intelligence and Network. He has a lower academic level He spent his time at the Montazeri Shahid University and Jahad Daneshgahi, and became one of his most distinguished students.

Author Articles
A DOS and Network Probe Attack Detection based on HMM using Fuzzy Inference

By Mohsen Salehi Jamal Karimian Majid Vafaei Jahan

DOI: https://doi.org/10.5815/ijcnis.2019.04.05, Pub. Date: 8 Apr. 2019

This paper aims to provide an intrusion detection system for network traffic that achieves to the low false positive rate with having high attack detection rate. This system will identify anomalies by monitoring network traffic. So, Features extracted from the network traffic by the number of HMM, are modeled as a Classifier ensemble. Then by integrating the outputs of the HMM within a group, probability value is generated. In this system each feature receives a weight and rather than a threshold value, using the fuzzy inference to decide between normal and abnormal network traffic. So at first, the fuzzy rules of decide module are formed manually and based on the value of the security of extraction feature. Then probability output of each HMM groups converted to fuzzy values according to fuzzy rules. These values are applied by a fuzzy inference engine and converted to an output indicating the being normal or abnormal of network traffic. Experiments show that the proposed system in detecting attacks that are the main candidate error is working well. Also, measures recall, precision and F1-measure respectively with 100%, 99.38% and 99.69% will pass. Finally, attack detection rate close to 100% and false positive rate of 0.62%, showing that the proposed system is improved compared to previous systems.

[...] Read more.
A Trust-based Security Approach in Hierarchical Wireless Sensor Networks

By Mohsen Salehi Jamal Karimian

DOI: https://doi.org/10.5815/ijwmt.2017.06.06, Pub. Date: 8 Nov. 2017

In recent decades Significant expansion and popularity of wireless sensor networks in various applications have attracted the attention of many researchers. The main challenges of WSN for the researchers are Energy and security restrictions. Recently trust as a new, efficient and soft method has been able to provide satisfactory security in WSN. In this study by using a simple method, first each node calculates the trust values of neighbors and according to these values exchanges data with neighbor nodes, then from each cluster, a node whose trust is greater than a threshold value can be candidate for being cluster head. Finally by using fuzzy logic a node with the most trusted neighbors and desirable energy level among the candidate nodes is selected as a cluster head. Simulation results show that proposed system has been able to greatly improve security and prevent untrusted and malicious nodes from becoming the cluster head.

[...] Read more.
Other Articles