Najla Odeh

Work place: Palestine Technical University – Kadoorie / Department of Computer Science, Tulkarm, P.O Box 305, Palestine

E-mail: najlaa.odeh@ptuk.edu.ps

Website: https://orcid.org/0000-0003-1089-9243

Research Interests: Network Security, Information Security

Biography

Najla Odeh received the B.S. degree in computer information system from the Al-Quds Open University, Tulkarm, Palestine, in 2011. She is currently working toward the M.S. degree in Computer Science at Palestine Technical University Kadoorie PTUK, Tulkarm, Palestine. She was a Programmer and web designer in IDEX Company, Tulkarm, Palestine. From 2011 to 2015. Currently, she is working as Technical Support at PTUK. Her specific areas of research interest mainly focus on deep learning, network technologies, information system, and network security.

Author Articles
Enhancing Web Security through Machine Learning-based Detection of Phishing Websites

By Najla Odeh Derar Eleyan Amna Eleyan

DOI: https://doi.org/10.5815/ijcnis.2025.01.04, Pub. Date: 8 Feb. 2025

The rise of cyberattacks has led to an increase in the creation of fake websites by attackers, who use these sites for advertising products, transmit malware, or steal valuable login credentials. Phishing, the act of soliciting sensitive information from users by masquerading as a trustworthy entity, is a common technique used by attackers to achieve their goals. Spoofed websites and email spoofing are often used in phishing attacks, with spoofed emails redirecting users to phishing websites in order to trick them into revealing their personal information. Traditional solutions for detecting phishing websites rely on signature-based approaches that are not effective in detecting newly created spoofed websites. To address this challenge, researchers have been exploring machine-learning methods for detecting phishing websites. In this paper, we suggest a new approach that combines the use of blacklists and machine learning techniques such that a variety of powerful features, including domain-based features, abnormal features, and abnormal features based on URLs, HTML, and JavaScript, to rank web pages and improve classification accuracy. Our experimental results show that using the proposed approach, the random forest classifier offers the best accuracy of 93%, with FPR and FNR as 0.12 and 0.02, with a Precision of 90%, Recall of 97% an F1 Score of 93%, and MCC of 0.85.

[...] Read more.
Detecting and Preventing Common Web Application Vulnerabilities: A Comprehensive Approach

By Najla Odeh Sherin Hijazi

DOI: https://doi.org/10.5815/ijitcs.2023.03.03, Pub. Date: 8 Jun. 2023

Web applications are becoming very important in our lives as many sensitive processes depend on them. Therefore, it is critical for safety and invulnerability against malicious attacks. Most studies focus on ways to detect these attacks individually. In this study, we develop a new vulnerability system to detect and prevent vulnerabilities in web applications. It has multiple functions to deal with some recurring vulnerabilities. The proposed system provided the detection and prevention of four types of vulnerabilities, including SQL injection, cross-site scripting attacks, remote code execution, and fingerprinting of backend technologies. We investigated the way worked for every type of vulnerability; then the process of detecting each type of vulnerability; finally, we provided prevention for each type of vulnerability. Which achieved three goals: reduce testing costs, increase efficiency, and safety. The proposed system has been validated through a practical application on a website, and experimental results demonstrate its effectiveness in detecting and preventing security threats. Our study contributes to the field of security by presenting an innovative approach to addressing security concerns, and our results highlight the importance of implementing advanced detection and prevention methods to protect against potential cyberattacks. The significance and research value of this survey lies in its potential to enhance the security of online systems and reduce the risk of data breaches.

[...] Read more.
Other Articles