Ihab Darwish

Ihab Darwish
Fairleigh Dickinson University

PhD - Electrical Engineering
Director of the Cybersecurity Program - FDU Florham Campus

About

11
Publications
21,549
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
187
Citations
Additional affiliations
January 2017 - February 2017
City College of New York
Position
  • Lecturer
October 2011 - present
DeVry University
Position
  • Professor

Publications

Publications (11)
Conference Paper
Full-text available
P4 (Programming Protocol-Independent Packet Processors) represents a paradigm shift in network programmability by providing a high-level language to define packet processing behavior in network switches/devices. The importance of P4 lies in its ability to overcome the limitations of OpenFlow, the previous de facto standard for software-defined netw...
Conference Paper
Full-text available
Detection and mitigation strategies using statistical Bayesian approach is performed to analyze attacks on Distributed Network Protocol 3 (DNP3) environment related to Industrial Control Systems (ICS) and the smart power grid. Our novel approach in this research paper is to create an attack detection model based on the Round Trip Time Delay (RTTD)...
Data
This holds the wireshark packet capture (in .pcap format) used for our paper and its extracted dataset in .csv: Paper: Deterministic Dendritic Cell Algorithm Application to Smart Grid Cyber-Attack Detection ----->> USING THIS PCAP/CSV FILE REQUIRES THAT YOU CITE THE ABOVE PAPER
Conference Paper
Full-text available
The Distributed Network Protocol v3.0 (DNP3) is one of the most widely used protocols for smart grid communications. Security challenges which could cause great scale of damages to critical infrastructure like the smart grid have emerged in recent years. This paper investigates the attacks that target smart grids which utilize the DNP3 protocol, an...
Chapter
Full-text available
Security is an essential way to promote safety, protection, and data privacy. Security in critical infrastructure is about making data available only to authorized and authenticated users and ensuring the reliability of a system’s operation with confidentiality and integrity. It is a balance between having the right mix of policies, strategies, and...
Article
Full-text available
Smart-grids security is becoming a challenging research area that has emerged in recent years facing the energy sector. Threats are arising every day that could cause great scale of damages in critical infrastructure. Our paper will assess vulnerabilities pertaining to internal security threats associated with the smart grid.We will perform penetra...
Conference Paper
Full-text available
Intrusion detection is the identification of unauthorized use, misuse, and abuse of computer system infrastructures by both system insiders and external intruders. Detecting intrusion in distributed network from outside network segment as well as from inside is a difficult problem. Network based Intrusion Detection System (NIDS) must analyze a larg...
Article
Full-text available
Smart-grids security is becoming a challenging research area that has emerged in recent years facing the energy sector. Threats are arising every day that could cause great scale of damages in critical infrastructure. Our paper will assess vulnerabilities pertaining to internal security threats associated with the smart grid. We will perform penetr...
Conference Paper
Full-text available
This paper highlights different security threats and vulnerabilities that is being challenged in smart-grid utilizing Distributed Network Protocol (DNP3) as a real time communication protocol. Experimentally, we will demonstrate two scenarios of attacks; unsolicited message attack and data set injection. The experiments were run on a computer virtu...
Conference Paper
Full-text available
Security challenges have emerged in recent years facing smart-grids in the energy sector. Threats are arising every day that could cause great scale of damages in critical infrastructure. Our paper will address internal security threats associated with smart grid in a simulated virtual environment involving DNP3 protocol. We will analyze vulnerabil...
Conference Paper
Full-text available
The IEEE 802.11 protocols are used by millions of smartphone and tablet devices to access the Internet via Wi-Fi wireless networks or communicate with one another directly in a peer-to-peer mode. Insider attacks are those originating from a trusted node that had initially passed all the authentication steps to access the network and then got compro...

Questions

Questions (2)
Question
Dear All--
In order to implement Modbus in my research related to power grid and smart grid environment as part of the energy sector, I am looking for a complete C++ open source code on Linux for Modbus TCP/IP version with full capability involving master and slave operation. I have tried so many sources but implementation was extremely difficult with lack of documentation. Awaiting to receive your feedback and help!
Question
For the purpose of attack analysis in smart grid network, I am trying to locate a traffic capture or PCAP data set with various attack types. Data set should be related to smart grid implementation in the power industry using DNP3 protocol. The environment could be real or it could be a large testbed setup.
Thanks,,

Network

Cited By