Meisam Eslahi, Ph.D.

Kuala Lumpur, Wilayah Persekutuan Kuala Lumpur, Malaysia Maklumat Hubungan
56K pengikut 500+ kenalan

Sertai untuk melihat profil

Perihal

Meisam is a technical cybersecurity practitioner with solid expertise in providing…

Aktiviti

Pengalaman & Pendidikan

  • EC-Council Global Services

Lihat pengalaman lengkap Meisam

Lihat jawatan, tempoh perkhidmatan dan banyak lagi.

atau

Dengan mengklik Teruskan untuk menyertai atau mendaftar masuk, anda bersetuju dengan Perjanjian Pengguna, Dasar Privasi dan Dasar Kuki LinkedIn.

Lesen & Pensijilan

Pengalaman Sukarelawan

  • Grafik EC-Council

    Certified EC-Council Instructor (C|EI)

    EC-Council

    - Kini 12 tahun 9 bulan

  • Grafik Blue Team Village

    Mentor

    Blue Team Village

    - Kini 3 tahun 1 bulan

  • Grafik CompTIA

    CompTIA Technical Trainer (CTT+)

    CompTIA

    - Kini 9 tahun 8 bulan

  • Grafik HTCIA

    Professional Memmber

    HTCIA

    - Kini 9 tahun 3 bulan

  • Grafik IEEE

    Professional Member

    IEEE

    - Kini 12 tahun 4 bulan

    Sains dan Teknologi

  • Panelists, C-Suite Risk Conference

    Malaysian Institute of Accountants (MIA)

    - Kini 8 tahun

  • Chair of Publication, SCOReD 15

    IEEE Malaysia

    - Kini 9 tahun

  • Session Chair, ISCAIE Symposium

    IEEE Malaysia

    - Kini 9 tahun

  • Session Chair, ISCAIE Symposium

    IEEE Malaysia

    - Kini 10 tahun

  • Session Chair, ISCI Symposium

    IEEE Malaysia

    - Kini 12 tahun

  • Grafik Mendeley

    Academic Advisor

    Mendeley

    - Kini 13 tahun 1 bulan

    Sains dan Teknologi

Penerbitan

  • HTTP-Botnets: The Dark Side of an Standard Protocol!(Full Version)

    Cyber Defense Magazine

    When the HTTP protocol was born at 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and Mobile Devices) and connect to each other, they form a network of bots or BotNet. A botnets consists of three main elements: the bots, the command and control servers (C&C), and a sophisticated…

    When the HTTP protocol was born at 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and Mobile Devices) and connect to each other, they form a network of bots or BotNet. A botnets consists of three main elements: the bots, the command and control servers (C&C), and a sophisticated attacker known as a botmaster who designed and control the botnet

    Lihat penerbitan
  • Mobile Botnets: From Anticipation to Reality!

    http://securityaffairs.co

    Anticipations on mobile botnets’ existence have been ended by the Damballa Research Laboratory official reports which discovered 40,000 infected mobile devices that have communicated through cybercriminal C&C servers for the first six months of 2011. Moreover, the McAfee research lab early prediction on advent of widely-distributed and more resilient mobile botnets come closer to reality as the Zeus botnet migrated from computers to mobile devices and targeted mobile banking. Recently nearby a…

    Anticipations on mobile botnets’ existence have been ended by the Damballa Research Laboratory official reports which discovered 40,000 infected mobile devices that have communicated through cybercriminal C&C servers for the first six months of 2011. Moreover, the McAfee research lab early prediction on advent of widely-distributed and more resilient mobile botnets come closer to reality as the Zeus botnet migrated from computers to mobile devices and targeted mobile banking. Recently nearby a million mobile devices has been infected by botnets in china via 7000 Trojanized applications.

    Lihat penerbitan
  • Mobile Botnets: Are All Around Us!

    Cyber Defense Magazine

    Although the mobile botnets are newly developed, they are growing extremely fast specially in
    popular platform such as Android.On the other hand, mobile environments are less protected compare to computers and computer networks and their specific characteristics bring notable challenges to mobile botnet and malware detection.

    Lihat penerbitan
  • An Efficient False Alarm Reduction Approach in HTTP-based Botnet Detection

    IEEE Symposium on Computers & Informatics (ISCI 2013)

    In recent years, bots and botnets have become one of the most dangerous infrastructure to carry out nearly every type of cyber-attack. Their dynamic and flexible nature along with sophisticated mechanisms makes them difficult to detect. One of the latest generations of botnet, called HTTP-based, uses the standard HTTP protocol to impersonate normal web traffic and bypass the current network security systems (e.g. firewalls). Besides, HTTP protocol is commonly used by normal applications and…

    In recent years, bots and botnets have become one of the most dangerous infrastructure to carry out nearly every type of cyber-attack. Their dynamic and flexible nature along with sophisticated mechanisms makes them difficult to detect. One of the latest generations of botnet, called HTTP-based, uses the standard HTTP protocol to impersonate normal web traffic and bypass the current network security systems (e.g. firewalls). Besides, HTTP protocol is commonly used by normal applications and services on the Internet, thus detection of the HTTP botnets with a low rate of false alarms (e.g. false negative and false positive) has become a notable challenge. In this paper, we review the current studies on HTTP-based botnet detection in addition to their shortcomings. We also propose a detection approach to improve the HTTP-based botnet detection regarding the rate of false alarms and the detection of HTTP bots with random patterns. The testing result shows that the proposed method is able to reduce the false alarm rates in HTTP-based botnet detection successfully.

  • HTTP-Botnets: The Dark Side of an Standard Protocol!

    http://securityaffairs.co

    When the HTTP protocol was born at 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and Mobile Devices) and connect to each other, they form a network of bots or BotNet. A botnets consists of three main elements: the bots, the command and control servers (C&C), and a sophisticated…

    When the HTTP protocol was born at 1999, no one ever thought it will be used by one of the most dangerous Cyber threats called Botnet. A bot is an application that can perform and repeat a particular task faster than a human. When a large number of bots infect different targets (e.g. Computers and Mobile Devices) and connect to each other, they form a network of bots or BotNet. A botnets consists of three main elements: the bots, the command and control servers (C&C), and a sophisticated attacker known as a botmaster who designed and control the botnet.

    Lihat penerbitan
  • A Data Collection Approach for Mobile Botnet Analysis and Detection

    IEEE Symposium on Wireless Technology & Applications (ISWTA 2014)

    Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capabilities has made them an environment of interest for cyber criminals. Therefore, the spread of sophisticated malware such as Botnets has significantly increased in mobile devices and networks. On the other hand, the Bots and Botnets are newly migrated to mobile devices and have not…

    Recently, MoBots or Mobile Botnets have become one of the most critical challenges in mobile communication and cyber security. The integration of Mobile devices with the Internet along with enhanced features and capabilities has made them an environment of interest for cyber criminals. Therefore, the spread of sophisticated malware such as Botnets has significantly increased in mobile devices and networks. On the other hand, the Bots and Botnets are newly migrated to mobile devices and have not been fully explored yet. Thus, the efficiency of current security solutions is highly limited due to the lack of available Mobile Botnet datasets and samples. As a result providing a valid dataset to analyse and understand the Mobile botnets has become a crucial issue in mobile security and privacy. In this paper we present an overview of the current available
    data set and samples and we discuss their advantages and disadvantages. We also propose a model to implement a mobile Botnet test bed to collect data for further analysis.

    Pengarang lain
  • Botnet Evolution: Network Traffic Indicators

    International Symposium on Biometrics and Security Technologies (ISBAST 2014)

    In recent years, the HTTP has become dominant protocol among other protocols for the Internet services as it provides a set of rules to manage the data exchange between servers and browsers. On the other hand, this standard protocol is widely used in the latest generation of botnets to
    establish their command and control channel and hide their malicious activities among normal Web traffic. Therefore, analyzing HTTP traffic has become a common method in current HTTP-based botnet detection…

    In recent years, the HTTP has become dominant protocol among other protocols for the Internet services as it provides a set of rules to manage the data exchange between servers and browsers. On the other hand, this standard protocol is widely used in the latest generation of botnets to
    establish their command and control channel and hide their malicious activities among normal Web traffic. Therefore, analyzing HTTP traffic has become a common method in current HTTP-based botnet detection studies. Since the HTTP botnets are a new phenomenon, they have not been
    fully explored yet. Therefore, in this paper we present an overview of the features and parameters that have been used in existing studies to detect HTTP botnets along with their shortcomings. We also propose a number of HTTP protocol characteristics that can be used for further botnet analysis and detection.

  • Bots and Botnets: An Overview of Characteristics, Detection and Challenges

    IEEE International Conference on Control System, Computing and Engineering (ICCSCE 2012)

    Recently, botnets have become the biggest threat to cyber security and have been used as an infrastructure to carry out nearly every type of cyber attack. They have a dynamic and flexible nature and the botmasters, who control them, update the bots and change their codes from day to day to avoid the current detection methods. In this paper, we present an overview of botnets’ characteristics along with their malicious activities. We also review the current botnet detection methods in addition to…

    Recently, botnets have become the biggest threat to cyber security and have been used as an infrastructure to carry out nearly every type of cyber attack. They have a dynamic and flexible nature and the botmasters, who control them, update the bots and change their codes from day to day to avoid the current detection methods. In this paper, we present an overview of botnets’ characteristics along with their malicious activities. We also review the current botnet detection methods in addition to their advantages and disadvantages. Finally we discuss the new generation of botnets on cloud and mobile environments.

  • BYOD: Current State and Security Challenges

    IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE 2014)

    Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees’ satisfaction…

    Recently, BYOD or Bring Your own Device has become one of the most popular models for enterprises to provide mobility and flexibility in workplaces. The emergence of new technologies and features of mobile devices makes them integral parts of every aspect of daily business activities. Also, mobile networks are now well integrated with the Internet (e.g. 3G, 4G and LTE technologies), therefore, in BYOD, the personal devices (i.e. mobile devices) can be used to increase employees’ satisfaction and reduce an organization’s device costs. Mobile devices are not well protected compared to computer and computer networks and users pay less attention to security updates and solutions. As a result, mobile security has become a crucial issue in BYOD as employees use their own mobile devices to access an organization’s data and systems. Therefore, in this paper we present an overview of the current state of BYOD security and we discuss some future challenges in this area.

    Pengarang lain
  • MoBots: A New Generation of Botnets on Mobile Devices and Networks.

    IEEE Symposium on Computer Applications and Industrial Electronics (ISCAIE 2012)

    Mobile devices are now well integrated with advanced capabilities and technologies such as the Internet. Today, mobile security has become a globally critical issue due to the high usage of mobile devices, their convenience and mobility. However, they are not properly protected compared to computer and computer networks, and the users pay less attention to the security updates. Recently, mobile devices and networks have been targeted by one of the most dangerous cyber threats, known as…

    Mobile devices are now well integrated with advanced capabilities and technologies such as the Internet. Today, mobile security has become a globally critical issue due to the high usage of mobile devices, their convenience and mobility. However, they are not properly protected compared to computer and computer networks, and the users pay less attention to the security updates. Recently, mobile devices and networks have been targeted by one of the most dangerous cyber threats, known as botnets. Mobile botnets have not yet been fully explored as they have only recently migrated to mobile infrastructures. Therefore, in this paper, we present an overview of Mobile botnets including studies on the new command and control mechanisms, actual examples and malicious activities. We also review the current challenges and limitations of botnet detection
    in mobile environments, as well as existing solutions.

Pengiktirafan & Anugerah

  • Project Obsidian @ DEF CON 32 Second Place Award

    Blue Team Village

    Blue Team Village Project Obsidian CTF at DEF CON 32 - A dynamic event simulating real-world cyber defense covering intricate kill chains, secure the OWASP JuiceShop, and sponsor-led challenges.

  • Champion- IT Security Competition 2016

    F-Secure Malaysia

    I was the APU teams Coach and Adviser in this competition.

  • Winner - Computer Forensics Challenge - i-HACK 2016

    http://fskm.uitm.edu.my/ihack/

    I was the APU teams Coach and Adviser in this competition

  • Winner- Hack and Defense Competition - i-HACK 2016

    http://fskm.uitm.edu.my/ihack/

    I was the APU teams Coach and Adviser in this competition

  • Second Runner Up in IT Security Competition 2015

    F-Secure Malaysia

    I was the APU teams Coach and Adviser in this competition. Among the 60 teams which came from universities nationwide, both of the APU teams BigMacAlaC and EZ qualified for final round, where the BigMacAlaC team achieved a remarkable 2nd Runner Up Place.

  • First Runner Up in UTP-HAX National Hacking Competition 2014

    Universiti Teknologi PETRONAS

    I was the APU University teams' Coach and Advisor at UTP-HAX’14 which was a multi-tier, team-based, hacking competition operating based on Cyberlympic Hacking Competition under the EC-Council. UTP-HAX National Hacking Competition 2014 (UTP-HAX’14) was Universiti Teknologi PETRONAS’s own competition acts as the preliminary round for all Malaysian teams to advance to the Regional Asia and World Hacking Competition.

  • FRGS Grant Under Ministry of Higher Education Malaysia

    Ministry of Higher Education Malaysia

  • Second Prize of Best Model Designed for Software as a Service

    IBM Smart Cloud Camp -Malaysia

    This camp was organized by IBM in Malaysia to explore latest research and developments on cloud computing. This event was held in 23 - 25 Feb 2012 at Kolej Tunku Abdul Rahman.

Bahasa

  • English

    Kemahiran profesional

  • Persian

    Penutur asli atau dwibahasa

Organisasi

  • Asia Pacific University of Technology and Innovation (APU / APIIT)

    Lecturer, Advisor and Security Team Coach

    - Kini
  • EC-Council Asia Pacific (Malaysia)

    Certified Instructor

    - Kini
  • Institute of Electrical and Electronics Engineers (IEEE)

    Professional Member

    - Kini
  • Mendeley Advisor

    Advisor

    - Kini
  • University of Malaya

    Part Time Lecturer

    - Kini
  • University of Malaya

    Academic Tutor

    - Kini
  • University of Malaya

    Research Assistant

    -
  • Arvin Pardaz Institute

    Security Analyst and Trainer

    -
  • Azad University - Mahshahr Branch

    Head of Student Research Centre

    -

Cadangan diterima

Lihat profil penuh Meisam

  • Lihat kenalan yang anda berdua kenali
  • Minta diperkenalkan
  • Hubungi Meisam secara terus
Sertai untuk melihat profil penuh

Profil lain yang serupa

Tambahkan kemahiran baharu melalui pengambilan kursus ini