Derar Eleyan

Work place: Palestine Technical University Kadoorie

E-mail: d.eleyan@ptuk.edu.ps

Website:

Research Interests: Information Engineering, Information Systems, Software Engineering

Biography

Professor Derar Eleyan currently works as the Vice President, Palestine Technical University- Kadoorie. He researches Software Engineering and Information Systems (Business Informatics). Their most recent publication is 'Conceptualizing a Model for the Effect of Information Culture on Electronic Commerce Adoption'.

Author Articles
Enhancing Web Security through Machine Learning-based Detection of Phishing Websites

By Najla Odeh Derar Eleyan Amna Eleyan

DOI: https://doi.org/10.5815/ijcnis.2025.01.04, Pub. Date: 8 Feb. 2025

The rise of cyberattacks has led to an increase in the creation of fake websites by attackers, who use these sites for advertising products, transmit malware, or steal valuable login credentials. Phishing, the act of soliciting sensitive information from users by masquerading as a trustworthy entity, is a common technique used by attackers to achieve their goals. Spoofed websites and email spoofing are often used in phishing attacks, with spoofed emails redirecting users to phishing websites in order to trick them into revealing their personal information. Traditional solutions for detecting phishing websites rely on signature-based approaches that are not effective in detecting newly created spoofed websites. To address this challenge, researchers have been exploring machine-learning methods for detecting phishing websites. In this paper, we suggest a new approach that combines the use of blacklists and machine learning techniques such that a variety of powerful features, including domain-based features, abnormal features, and abnormal features based on URLs, HTML, and JavaScript, to rank web pages and improve classification accuracy. Our experimental results show that using the proposed approach, the random forest classifier offers the best accuracy of 93%, with FPR and FNR as 0.12 and 0.02, with a Precision of 90%, Recall of 97% an F1 Score of 93%, and MCC of 0.85.

[...] Read more.
Evaluation of Machine Learning Techniques for Email Spam Classification

By Mahmoud Jazzar Rasheed F. Yousef Derar Eleyan

DOI: https://doi.org/10.5815/ijeme.2021.04.04, Pub. Date: 8 Aug. 2021

Electronic mail (Email) is one of the official and very common way of exchanging data and information over digital and electronic devices. Millions of users worldwide use email to exchange data and information between email servers. On the other hand, unwanted emails or spam became phenomenon challenging major companies and organizations due to the volume of spam which is increasing dramatically every year. Spam is annoying and may contain harmful contents. In addition, spam consume computers, servers, and network resources, causes harmful bottleneck, effect on computing memory and speed of digital devices. Moreover, the time consumed by the users to remove unwanted emails is huge. There are many methods developed to filter spam like keyword matching blacklist/whitelist and header information processing. Though, classical methods like blocking the source to prevent the spam are not effective. This study demonstrates and reviews the performance evaluation of the most popular and effective machine learning techniques and algorithms such as Support Vector Machine, ANN, J48, and Naïve Bayes for email spam classification and filtering. In con conclusion, support vector machine performs better than any individual algorithm in term of accuracy. This research contributes on the for the development of methods and techniques for better detection and prevention of spam.

[...] Read more.
SQL Injection Detection Tools Advantages and Drawbacks

By Hazem M. Harb Derar Eleyan Amna Eleyan

DOI: https://doi.org/10.5815/ijwmt.2021.03.03, Pub. Date: 8 Jun. 2021

SQL injection attack is a major threat to web application security. It has been rated as one of the most dangerous vulnerabilities for a web-based application. Based on the Open Web Application Security Project (OWASP), it is measured as one of the top ten.  Many types of research have been made to face this attack either by preventing the threat or at least detecting it. We aim in this paper to give an overview of the SQL injection (SQLI) attack and classify these attacks and prevention and detection tools. We introduce the most current techniques and tools that are used to prevent and detect SQLI and highlight their strengths and weaknesses.

[...] Read more.
Cybercrimes during COVID -19 Pandemic

By Raghad Khweiled Mahmoud Jazzar Derar Eleyan

DOI: https://doi.org/10.5815/ijieeb.2021.02.01, Pub. Date: 8 Apr. 2021

COVID-19 pandemic has changed the lifestyle of all aspects of life. These circumstances have created new patterns in lifestyle that people had to deal with. As such, full and direct dependence on the use of the unsafe Internet network in running all aspects of life. As example, many organizations started officially working through the Internet, students moved to e-education, online shopping increased, and more. These conditions have created a fertile environment for cybercriminals to grow their activity and exploit the pressures that affected human psychology to increase their attack success. The purpose of this paper is to analyze the data collected from global online fraud and cybersecurity service companies to demonstrate on how cybercrimes increased during the COVID-19 epidemic. The significance and value of this research is to highlight by evident on how criminals exploit crisis, and for the need to develop strategies and to enhance user awareness for better detection and prevention of future cybercrimes.

[...] Read more.
Other Articles