Papers by saifuladli ismail

Journal of Computer Networks and Communications, 2019
With increment in dependency on web technology, a commensurate increase has been noted in destruc... more With increment in dependency on web technology, a commensurate increase has been noted in destructive attempts to disrupt the essential web technologies, hence leading to service failures. Web servers that run on Hypertext Transfer Protocol (HTTP) are exposed to denial-of-service (DoS) attacks. A sophisticated version of this attack known as distributed denial of service (DDOS) is among the most dangerous Internet attacks, with the ability to overwhelm a web server, thereby slowing it down and potentially taking it down completely. This paper reviewed 12 recent detection of DDoS attack at the application layer published between January 2014 and December 2018. A summary of each detection method is summarised in table view, along with in-depth critical analysis, for future studies to conduct research pertaining to detection of HTTP DDoS attack.
The Review of Security Issues in Grid Computing
In this paper, we provide a current review of the different methods of addressing the security is... more In this paper, we provide a current review of the different methods of addressing the security issues in grid computing. The framework presented here includes an overview of grid computing security, types of grid security, and current architecture for grid computing security. This research review will shape the future research in encryption, access controls, and other security solutions for the grid computing environment.
Current grid compuitng security isues
New security authentication mechanisms in grid computing web environment
2011 International Conference on Research and Innovation in Information Systems, 2011
Abstract The fundamental of the authentication of grid computing web-based environment is to ensu... more Abstract The fundamental of the authentication of grid computing web-based environment is to ensure the security of local and remote entities in the environment. The existing authentication mechanisms mostly use public key infrastructure (PKI), but the potential PKI ...
Rivisit grid computing security
Jurnal Teknologi Maklumat, 2008
Abstract: Recent studies have shown that Grid Computing provide computational power, data storage... more Abstract: Recent studies have shown that Grid Computing provide computational power, data storage and network bandwidth of under utilized resources at a minimal cost to the end user. It integrates geographically distributed resources and perform collaborative task. Since ...
Uploads
Papers by saifuladli ismail