Work place: Department of Computing, Sunway University, Bandar Sunway, 47500, Malaysia
E-mail: mohsenk@sunway.edu.my
Website:
Research Interests: Data Mining, Intrusion Detection System, Systems Architecture, Computational Learning Theory, Computer systems and computational processes, Detection Theory
Biography
MOHSEN KAKAVAND received his Ph.D. degree in intelligent computing from the University Putra Malaysia (UPM), Malaysia in 2017. He is currently a Lecturer with the Department of Computing and Information Systems, Faculty of Science and Technology, Sunway University in Malaysia. His research interests include aspects of data mining, intelligent computing, machine learning, intrusion detection systems (IDSs), and cybersecurity.
By Arshia Foroozan Yazdani Ali Bozorgi Mehr Iman Showkatyan Amin Hashemi Mohsen Kakavand
DOI: https://doi.org/10.5815/ijigsp.2021.01.03, Pub. Date: 8 Feb. 2021
The present study, the main idea of which was based on one of the questions of I.P.T.2018 competition, aimed to develop a high-precision relationship between the fluid temperature and the sound produced when colliding with different surfaces, by creating a data collection tool. In fact, this paper was provided based on a traditional phenomenological project using the well-known deep neural networks, in order to achieve an acceptable accuracy in this project. In order to improve the quality of the paper, the data were analyzed in two ways:
I. Using the images of data spectrogram and the known V.G.G.16 network.
II. Applying the data audio signal and a convolutional neural network (C.N.N.).
Finally, both methods have obtained an acceptable precision above 85%.
By Ahamed K. H. Hussain Mohsen Kakavand Mira Silval Lingges Arulsamy
DOI: https://doi.org/10.5815/ijcnis.2020.01.03, Pub. Date: 8 Feb. 2020
Android is the most popular operating system in the world, with numerous applications having been developed for the platform since its inception, however, it has its fair share of security issues. Despite security precautions taken by developers and the system itself when it comes to permission delegation for applications, privilege escalation attacks are still possible up till Android API level 25. Unfortunately, many existing detection and prevention solutions fall short of the standard necessary or are taxing in resources not found on most Android devices. Proof is shown that a custom created malicious application can elevate its privileges, beyond the permissions it was given, in the existing Android system. In this paper, a modification to the existing Android framework is proposed, one that can detect inter-component communication messages between malicious apps attempting to elevate their privileges and benign applications. Part of this framework is the ability for the user to decide if permissions should be elevated, allowing them some measure of control. The results of the experimental evaluation demonstrate that the solution proposed is effective in preventing privilege escalation attacks on Android API level 24.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals