Faisal Shahzad

@au.edu.pk

Department Of Cyber Security, Faculty of Computing and Artificial Intelligence
Air University, Islamabad, Pakistan



                    

https://researchid.co/faisalrwp

RESEARCH INTERESTS

Cyber Security

6

Scopus Publications

589

Scholar Citations

8

Scholar h-index

7

Scholar i10-index

Scopus Publications

  • Cloud-based multiclass anomaly detection and categorization using ensemble learning
    Faisal Shahzad, Abdul Mannan, Abdul Rehman Javed, Ahmad S. Almadhor, Thar Baker, and Dhiya Al-Jumeily OBE

    Springer Science and Business Media LLC
    AbstractThe world of the Internet and networking is exposed to many cyber-attacks and threats. Over the years, machine learning models have progressed to be integrated into many scenarios to detect anomalies accurately. This paper proposes a novel approach named cloud-based anomaly detection (CAD) to detect cloud-based anomalies. CAD consist of two key blocks: ensemble machine learning (EML) model for binary anomaly classification and convolutional neural network long short-term memory (CNN-LSTM) for multiclass anomaly categorization. CAD is evaluated on a complex UNSW dataset to analyze the performance of binary anomaly detection and categorization of multiclass anomalies. Furthermore, the comparison of CAD with other machine learning conventional models and state-of-the-art studies have been presented. Experimental analysis shows that CAD outperforms other studies by achieving the highest accuracy of 97.06% for binary anomaly detection and 99.91% for multiclass anomaly detection.

  • Future smart cities requirements, emerging technologies, applications, challenges, and future aspects
    Abdul Rehman Javed, Faisal Shahzad, Saif ur Rehman, Yousaf Bin Zikria, Imran Razzak, Zunera Jalil, and Guandong Xu

    Elsevier BV

  • Integration of Blockchain Technology and Federated Learning in Vehicular (IoT) Networks: A Comprehensive Survey
    Abdul Rehman Javed, Muhammad Abul Hassan, Faisal Shahzad, Waqas Ahmed, Saurabh Singh, Thar Baker, and Thippa Reddy Gadekallu

    MDPI AG
    The Internet of Things (IoT) revitalizes the world with tremendous capabilities and potential to be utilized in vehicular networks. The Smart Transport Infrastructure (STI) era depends mainly on the IoT. Advanced machine learning (ML) techniques are being used to strengthen the STI smartness further. However, some decisions are very challenging due to the vast number of STI components and big data generated from STIs. Computation cost, communication overheads, and privacy issues are significant concerns for wide-scale ML adoption within STI. These issues can be addressed using Federated Learning (FL) and blockchain. FL can be used to address the issues of privacy preservation and handling big data generated in STI management and control. Blockchain is a distributed ledger that can store data while providing trust and integrity assurance. Blockchain can be a solution to data integrity and can add more security to the STI. This survey initially explores the vehicular network and STI in detail and sheds light on the blockchain and FL with real-world implementations. Then, FL and blockchain applications in the Vehicular Ad Hoc Network (VANET) environment from security and privacy perspectives are discussed in detail. In the end, the paper focuses on the current research challenges and future research directions related to integrating FL and blockchain for vehicular networks.

  • Validation of Secure Wiping Applications for Android Phones
    Waqas Ahmad, Faisal Shahzad, Safina Naz, Luqman Shahzad, and Touseef Sadiq

    IEEE
    Identity theft and financial fraud are happening very frequently, and data privacy becomes one of the biggest challenges for Android phone users. Cyber thefts are particularly perceptive when recovering confidential information from user phones after users have deleted/erased their data from phone memory using the factory restore or by using data wiping applications available on Google Play Store and Internet. This research work proposed and developed an efficient data wiping application for Android phones according to the National Institute of Standard and Technology (NIST) SP800-88 Standard of USA. The proposed application is based on the data overwrite technique. It has two layers, data erasing and data overwriting. After erasing the user data from phone memory, it overwrites deleted data locations by three overwrite phases, zeros, ones, and random characters. The data overwrite layer makes deleted data permanently unrecoverable from phone memory.To validate existing wiping applications, we selected the following data wiping applications from Google Play Store: Secure Erase with iShredder-6, Secure Delete, and Shreddit-Data Eraser for data wiping experiments and picked the following data recovery applications and software to validate the above-selected wiping applications: DiskDigger, Dr Fone, FonePaw and EaseUS MobiSaver for data recovery experiments on following selected Android phones: Samsung Galaxy SM-J600F, Vivo 1908 and Huawei Honor 9-lite LLD-21 having Android version Oreo 8.0 and 8.1. The experiments result show that the chosen wiping applications are not working according to the standard, and the erased data is recoverable through the above-mentioned data recovery applications and software. On the other hand, data could not be recovered from the phones which are wiped with the proposed framework. We maintained the record of the recovered data from wiped Android phones and proposed an efficient overwrite-based data wiping application for Android phones based on the experiment results. Recommendation: A preinstall secure data wiping application must meet standards such as NIST SP800-88 for complete data erasure and should be available on all android phones for users.

  • WhatsApp Network Forensics: Discovering the IP Addresses of Suspects
    Waqas Ahmed, Faisal Shahzad, Abdul Rehman Javed, Farkhund Iqbal, and Liaqat Ali

    IEEE
    Call record analysis is the most critical task for the Law Enforcement Agencies (LEAs) in a cyber-investigation process. It provides valuable information in the investigation, such as time and date and the duration of incoming and outgoing calls. The technological advancement of smartphones and the versatility of Instant Messaging (IM) applications provide multiple communication channels to cybercriminals for communication, making it difficult for the LEAs to monitor/investigate using traditional forensics tools and techniques. The most challenging part is to retrieve specific information from the network traffic of a particular IM Application such as WhatsApp. This research article’s primary purpose is to find the IP address of the cybercriminal using WhatsApp through existing sniffing techniques and tools. A method called rule-based extraction for sniffing packets is proposed for extracting the most relevant data from the network traffic. The results support LEAs to identify the cybercriminals’ specific traffic and help in analyzing and comparing the mobile phone data with the network traffic.

  • On the use of CryptDB for securing Electronic Health data in the cloud: A performance study
    Faisal Shahzad, Waheed Iqbal, and Fawaz S. Bokhari

    IEEE
    Electronic Health Records (EHRs) are the very personal data and ensuring its privacy and security is an utmost priority. Various laws require the privacy of this data to be ensured and usually this is achieved using strict access control methods. However, these methods have limitations, specifically in case of a server breach. In this paper, we use CryptDB to ensure data confidentiality in EHR Systems. In particular, we investigate the performance of CryptDB with OpenEMR, on different deployment scenarios and varying workloads over the cloud and a local testbed. We identify that CryptDB successfully provides the data confidentiality on the database server when deployed on the cloud. We also find that for a mix workload, the average performance of the OpenEMR with CryptDB in the cloud remains under two seconds which makes CryptDB a viable option for providing security to EHR systems deployed in the cloud. This is the first study to integrate CryptDB with OpenEMR and to profile performance overhead to ensure the data confidentiality under different deployment and varying workload scenarios in the cloud.

RECENT SCHOLAR PUBLICATIONS

  • Cloud-based multiclass anomaly detection and categorization using ensemble learning
    F Shahzad, A Mannan, AR Javed, AS Almadhor, T Baker, DAJ OBE
    Journal Of Cloud Computing 11 (1), 74 2022

  • Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
    AR Javed, F Shahzad, S ur Rehman, YB Zikria, I Razzak, Z Jalil, G Xu
    Cities 129, 103794 2022

  • Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey
    AR Javed, MA Hassan, F Shahzad, W Ahmed, S Singh, T Baker, ...
    Sensors 22 (12), 4394 2022

  • Cyber Forensics with Machine Learning
    F Shahzad, AR Javed, Z Jalil, F Iqbal
    Encyclopedia of Machine Learning and Data Science Living Edition, Online Edition 2022

  • Validation of Secure Wiping Applications for Android Phones
    W Ahmad, F Shahzad, S Naz, L Shahzad, T Sadiq
    2022 International Conference on Decision Aid Sciences and Applications 2022

  • Future Smart Cities: Requirements, Emerging Technologies, Applications, Challenges, and Future Aspects
    F Shahzad, S Rehman, AR Javed, Z Jalil, YB Zikria
    techrxiv [Preprint] 2021

  • Security in Next Generation Mobile Payment Systems: A Comprehensive Survey
    W Ahmed, A Rasool, J Nebhen, N Kumar, F Shahzad, A RehmanJaved, ...
    arXiv preprint arXiv:2105.12097v1 2021

  • WhatsApp Network Forensics: Discovering the IP Addresses of Suspects
    W Ahmed, F Shahzad, AR Javed, F Iqbal, L Ali
    2021 11th IFIP International Conference on New Technologies, Mobility and 2021

  • On the Use of CryptDB for Securing Electronic Health Data in the Cloud: A Performance Study
    F Shahzad, W Iqbal, F Bokhari
    2015 17th International Conference on E-health Networking, Application 2015

  • Cost and Performance Evaluation Of Data Confidentiality In High Throughput / Cloud Based Multi-tier Applications
    F Shahzad
    Center For Advanced Studies In Engineering (CASE), Islamabad, Pakistan 2014

  • A STUDY OF BEHAVIORAL IMPACT ON INFORMATION SYSTEM PROJECTS SUCCESS IN PUBLIC SECTOR OF PAKISTAN
    F Shahzad
    http://dx.doi.org/10.13140/RG.2.2.19534.46400 1, 95 2011

MOST CITED SCHOLAR PUBLICATIONS

  • Future smart cities: Requirements, emerging technologies, applications, challenges, and future aspects
    AR Javed, F Shahzad, S ur Rehman, YB Zikria, I Razzak, Z Jalil, G Xu
    Cities 129, 103794 2022
    Citations: 234

  • Future Smart Cities: Requirements, Emerging Technologies, Applications, Challenges, and Future Aspects
    F Shahzad, S Rehman, AR Javed, Z Jalil, YB Zikria
    techrxiv [Preprint] 2021
    Citations: 113

  • Integration of blockchain technology and federated learning in vehicular (iot) networks: A comprehensive survey
    AR Javed, MA Hassan, F Shahzad, W Ahmed, S Singh, T Baker, ...
    Sensors 22 (12), 4394 2022
    Citations: 97

  • Security in Next Generation Mobile Payment Systems: A Comprehensive Survey
    W Ahmed, A Rasool, J Nebhen, N Kumar, F Shahzad, A RehmanJaved, ...
    arXiv preprint arXiv:2105.12097v1 2021
    Citations: 51

  • WhatsApp Network Forensics: Discovering the IP Addresses of Suspects
    W Ahmed, F Shahzad, AR Javed, F Iqbal, L Ali
    2021 11th IFIP International Conference on New Technologies, Mobility and 2021
    Citations: 33

  • Cloud-based multiclass anomaly detection and categorization using ensemble learning
    F Shahzad, A Mannan, AR Javed, AS Almadhor, T Baker, DAJ OBE
    Journal Of Cloud Computing 11 (1), 74 2022
    Citations: 27

  • On the Use of CryptDB for Securing Electronic Health Data in the Cloud: A Performance Study
    F Shahzad, W Iqbal, F Bokhari
    2015 17th International Conference on E-health Networking, Application 2015
    Citations: 25

  • Cyber Forensics with Machine Learning
    F Shahzad, AR Javed, Z Jalil, F Iqbal
    Encyclopedia of Machine Learning and Data Science Living Edition, Online Edition 2022
    Citations: 9