A Survey of Anomaly Detection Approaches in Internet of Things

M. Behniafar; A.R. Nowroozi; H.R. Shahriari

Volume 10, Issue 2 , July 2018, , Pages 79-92


  Internet of Things is an ever-growing network of heterogeneous and constraint nodes which are connected to each other and the Internet. Security plays an important role in such networks. Experience has proved that encryption and authentication are not enough for the security of networks and an Intrusion ...  Read More

BotRevealer: Behavioral Detection of Botnets based on Botnet Life-cycle

E. Khoshhalpour; H. R. Shahriari

Volume 10, Issue 1 , January 2018, , Pages 55-61


  Nowadays, botnets are considered as essential tools for planning serious cyber attacks. Botnets are used to perform various malicious activities such as DDoS attacks and sending spam emails. Different approaches are presented to detect botnets; however most of them may be ineffective when ...  Read More

Dwarf Frankenstein is still in your memory: tiny code reuse attacks

A.A Sadeghi; F. Aminmansour; H.R. Shahriari

Volume 9, Issue 1 , January 2017, , Pages 53-72


  Code reuse attacks such as return oriented programming and jump oriented programming are the most popular exploitation methods among attackers. A large number of practical and non-practical defenses are proposed that differ in their overhead, the source code requirement, detection rate and implementation ...  Read More

Aggrandizing the beast's limbs: patulous code reuse attack on ARM architecture

F. Aminmansour; H. R. Shahriari

Volume 8, Issue 1 , January 2016, , Pages 39-52


  Since smartphones are usually personal devices full of private information, they are a popular target for a vast variety of real-world attacks such as Code Reuse Attack (CRA). CRAs enable attackers to execute any arbitrary algorithm on a device without injecting an executable code. Since the standard ...  Read More

A hybrid approach for database intrusion detection at transaction and inter-transaction levels

M. Doroudian; H. R. Shahriari

Volume 6, Issue 2 , July 2014, , Pages 155-167


  Nowadays, information plays an important role in organizations. Sensitive information is often stored in databases. Traditional mechanisms such as encryption, access control, and authentication cannot provide a high level of confidence. Therefore, the existence of Intrusion Detection Systems in databases ...  Read More

Prediction of user's trustworthiness in web-based social networks via text mining

H. Mohammadhassanzadeh; H. R. Shahriari

Volume 5, Issue 2 , July 2013, , Pages 171-187


  In Social networks, users need a proper estimation of trust in others to be able to initialize reliable relationships. Some trust evaluation mechanisms have been offered, which use direct ratings to calculate or propagate trust values. However, in some web-based social networks where users only have ...  Read More