"This site requires JavaScript to work correctly"

Amar Almaini, M.Sc.

Academic Staff

ITC2+ 1.08

0991/3615-531


Sortierung:
Vortrag

  • Amar Almaini

Intelligent dynamic resource allocation across edge cloud resources in secure manner

In: Konferenz des berufsbegleitenden Masterstudiengangs Cybersecurity: Ausgewählte Themen der Security Forschung

Technische Hochschule Deggendorf (THD)/Technologie Campus Vilshofen Online

  • 19.01.2023 (2023)
  • Institut ProtectIT
  • 30 S: TC Vilshofen S_EN: TC Vilshofen
  • DIGITAL
Beitrag in Sammelwerk/Tagungsband

  • Amar Almaini
  • Jakob Folz
  • D. Wölfl
  • A. Al Dubai
  • Martin Schramm
  • Michael Heigl

A New Scalable Distributed Homomorphic Encryption Scheme for High Computational Complexity Models

  • (2023)
Due to the increasing privacy demand in data processing, Fully Homomorphic Encryption (FHE) has recently received growing attention for its ability to perform calculations over encrypted data. Since the data can be processed in encrypted form and the output remains encrypted, only an authorized user or a user who holds the key can decrypt the data and understand its meaning. Hence, it is possible to securely outsource data processing to untrustworthy but powerful public computing resources on the edge. However, due to the high computational complexity, FHE-based data processing experiences scalability related concerns. It is currently unclear whether FHE can be used to solve large-scale problems. In this paper, we propose a novel general distributed FHE-based data processing approach as a concrete step towards solving the scalability challenge. The main idea behind our approach is to use slightly more communication overhead for a shorter computing circuit in FHE, hence, reducing the overall complexity. We verify our new model’s efficiency and effectiveness by comparing the distributed approach with the central approach over various FHE schemes (CKKS, BGV, and BFV). This is performed using one of the more popular libraries of FHE “Microsoft SEAL”, by performing specific mathematical operations and observing the time consumed. The empirical results demonstrate that the proposed approach results in a significant reduction in time, up to 54% compared to the traditional central approach.
  • Institut ProtectIT
  • DIGITAL
Zeitschriftenartikel

  • Amar Almaini
  • A. Al Dubai
  • I. Romdhani
  • Martin Schramm
  • A. Alsarhan

Lightweight edge authentication for software defined networks

In: Computing (Special Issue)

  • (2020)

DOI: 10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN’s logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the edge or, to be precise, the switches can offload the controllers from local state based decisions that do not require global network wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by programming protocol-independent packet processors (P4) language to present two authentication techniques to assure that only legitimate nodes are able to access the network. The first technique is the port knocking and the second technique is the One-Time Password. Our experimental results indicate that our proposed techniques improve the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches’ performance.
  • 30 S: TC Vilshofen S_EN: TC Vilshofen
  • Institut ProtectIT
  • Angewandte Informatik
  • DIGITAL
Beitrag in Sammelwerk/Tagungsband

  • Amar Almaini
  • A. Al Dubai
  • I. Romdhani
  • Martin Schramm

Delegation of Authentication to the Data Plane in Software Defined Networks

pg. 58-65.

  • (2019)

DOI: 10.1109/IUCC/DSCI/SmartCNS.2019.00038

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.
  • 30 S: TC Vilshofen S_EN: TC Vilshofen
  • Institut ProtectIT
  • Angewandte Informatik
  • DIGITAL
Vortrag

  • Amar Almaini

Authentication and port scan mitigation in the Software Defined Network Switches . Posterpräsentation

In: 6. Tag der Forschung

Technische Hochschule Deggendorf Deggendorf

  • 10.04.2019 (2019)
  • Elektrotechnik und Medientechnik
  • 30 S: TC Vilshofen S_EN: TC Vilshofen
  • Institut ProtectIT
  • DIGITAL
Vortrag

  • A. Hawbani
  • Y. Zhang
  • Amar Almaini
  • A. Yassin
  • L. Zhao
  • R. Cao

2020 Master's Programs in Suzhou

  • December 2019 (2019)

DOI: 10.13140/RG.2.2.28640.43522

How to get a free scholarship at the most prestigious Chinese universities. This program is available for students with an undergraduate degree, and it often takes one to two years to complete.
  • 30 S: TC Vilshofen S_EN: TC Vilshofen
  • Institut ProtectIT
  • Angewandte Informatik
Beitrag in Sammelwerk/Tagungsband

  • Michael Heigl
  • Laurin Dörr
  • Amar Almaini
  • D. Fiala
  • Martin Schramm

Incident Reaction Based on Intrusion Detections’ Alert Analysis

pg. 1-6.

  • (2018)

DOI: 10.23919/AE.2018.8501419

The protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as a fundamental part in holistic security eco-systems in the previous years. However, the interpretation of and reaction on detected incidents is still a challenging task. In this paper an incident handling environment with relevant components and exemplary functionality is proposed that involves the processes from the detection of incidents over their analysis to the execution of appropriate reactions. An evaluation of a selection of implemented interacting components using technology such as OpenFlow or Snort generally proofs the concept.
  • Elektrotechnik und Medientechnik
  • 30 S: TC Vilshofen S_EN: TC Vilshofen
  • Institut ProtectIT
  • DIGITAL