Skip to main content
User Image

Muhammad Nasir

Lecturer

Lecturer

علوم الحاسب والمعلومات
mnasir@KSU.EDU.SA
publication
Journal Article
2012
Published in:

POSSIBLE INTRUSIONS AND THEIR DETECTION BASED ON THE PROPOSED MODEL FOR C4I SYSTEMS

Alelaiwi, Abdulhameed . 2012

The protection of Command, Control, Communications, Computers, and Intelligence (C4I) systems during times of both war and peace is a major issue. There are many traditional mechanisms to provide such protection, but they have many limitations related to inaccuracy and false alarms. In this paper, we discuss possible types of attacks in the context of C4I systems, including Denial-of-Service (DoS), Distributed Denial-of-Service (DDoS), Probe, User-to-Root (U2R), and Root-to-Local (R2L) attacks, and propose a fundamental model to prevent such attacks.

Volume Number
3
Issue Number
24
Pages
219-223
more of publication
publications

This paper describes assessment techniques utilized for assessing undergraduate students studying in a software engineering program. The purpose behind this work is to get the program accredited…

by Abdullah S Alghamdi, Muhammad Nasir, Khalid Alnafjan
2011
publications

The protection of Command, Control, Communications, Computers, and Intelligence (C4I) systems during times of both war and peace is a major issue. There are many traditional mechanisms to provide…

by Abdulhameed Alelaiwi, Muhammad Nasir
2012
publications

An ESB is a platform that provides services such as message routing and transformation. Along with this, it has the capabilities to ease the pains of connecting heterogeneous C4I systems among…

2010