Dr Suleman Khan

Lecturer
School of IT

suleman.khan@monash.edu
+603 5514 6071
Room 2-4-19
ORCID

Personal statement

Dr. Suleman Khan is a Lecturer at School of Information Technology, Monash University Malaysia. He received his PhD (Distinction) from Faculty of Computer Science and Information Technology, University of Malaya, Malaysia in 2017. Previously, he completed several Master programmes including Master of Science-MS (Distributed Systems) from Comsats Institute of Information Technology, Abbottabad, Pakistan (2011), Master of Business Administration (HRD) from Institute of Management of Sciences, Hayatabad, Pakistan (2007) and Master of Science M.Sc (Computer Science), from University of Peshawar, Pakistan (2006).

Dr. Suleman has published 30+ High Impact Research articles in reputed international journals and conferences. He is looking to expand his research capabilities by having collaboration with reputable research scientist in the world. He like to work in a team and always dedicated towards achieving the goals.

He is looking for research students who are self-motivated, hard workers, respectful, and integrated towards the working goals.

Academic degrees

  • Doctor of Philosophy in Information Systems, University of Malaya, Malaysia (2017)
  • Master in Computer Science, Comsats Institute of Information Technology, Abbottabad, Pakistan (2011)
  • Master in Business Administration (HRD), Institute of Management of Sciences, Hayatabad, Pakistan (2007)
  • Master in Science (Computer Science), University of Peshawar, Pakistan (2006)
  • Degree in Computer Science and Mathematics, University of Peshawar, 2004

Professional affiliations

Member of International Professional Bodies

  • IEEE Computer Society, Member

Research Interests

Information Security, Software-Defined Networks, Internet of Things, Big Data Analytics, Block Chain

Research Projects

Secure And Reliable Communication: Preventing Distributed Denial of Service Attacks on
Internet of Things

Internet of things (IoT) is defined as the interconnection of services, objects, people, and devices to the Internet, which can communicate, share data and information to make intelligent collaboration with each other.

Some examples include:

  • Buildings that will control energy, health, comfort
  • People with bionic fragments for detecting physiologic parameters
  • Smart electric meter reading, Telemedicine monitoring, and greenhouse monitoring

One of the main goals of IoT is to change the way we live today by enabling intelligent devices around us to perform daily tasks and routines with minimal human intervention.

The key problem with IoT is the idea of networking appliances with new objects where security has not always been considered in its product design. IoT products are often sold with old embedded operating systems and software. To improve security, an IoT device needs to be directly accessible over the Internet, should be segmented into its own network, and have network access restricted. The network segment should then be monitored to identify potential anomalous traffic, and action should be taken if there is a problem.

Privacy Protection and Efficient Retrieval of Data In Cloud Computing Storage

Searchable Encryption (SE) is appearing as a prominent solution in the intersection of privacy protection and efficient retrieval of data outsourced to cloud computing storage. SE preserves privacy by encrypting data, yet supports search operation with data leakage tending to zero. Due to its applicability, many research communities have proposed different SE schemes under various security definitions with numerous customary features (i.e. multi keyword search, ranked search). By reason of multi-keyword ranked search, SE reveals encrypted document list corresponding to multiple (secure) query keywords (or trapdoor). Such disclosure of statistical information helps an attacker to analyse and deduce the content of the data. To combat statistical information leakage in SE, we propose a scheme referred to as Statistical Attack Resisting Searchable enCryption (StARSCrypt) that resorts on randomness in all component of an SE. StARSCrypt adopts an inverted index centric index that is built with a hash digest of a pair of keywords. Ranking factors (i.e. relevance scores) rank the documents and then they no longer exist in the secure index (neither in order preserving encrypted form). Query keywords are garbled with randomness in order to hide actual query/result statistics. Our security analysis and experiment on Request for Comments (RFC) database ensure the security and efficiency of StARSCrypt.

Education

Units taught

FIT3152 - Data analytics

FIT5133 - Enterprise architecture and management

Local grants

  • Privacy Protection and Efficient Retrieval of Data In Cloud Computing Storage, Suleman Khan, March 2018 – December 2018,  School of IT Research Seed Grant, RM10,000
  • Secure And Reliable Communication: Preventing Distributed Denial of Service Attacks on Internet of Things, Suleman Khan, March 2018 – December 2018, ENG-IT Research Seed Grant, RM15,000

Current supervision

PhD

Usman Haruna Garba 
Secure and Reliable Communication: Preventing Distributed Denial of Service Attacks on Internet of Things
2018 - Present
Monash University Malaysia

Local Award/Recognition/Exhibition/Stewardship

  • Bright Spark Scholarship – 2013-2017

Publication:

Journal Articles

  1. Hamid Tahaei, Rosli Salleh, Suleman Khan, Ryan Izard, Kim-Kwang Raymond Choo, Nor Badrul Anuar, A multi-objective software defined network traffic measurement, Measurement, (Impact Factor 1.74)
  2. Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Ahmed Abdelaziz, Kwangman Ko, Muhammad Khurram Khan, Mohsen Guizani, Software-Defined Network Forensics: Motivation, Potential Locations, Requirements, and Challenges, IEEE Network,  (Impact Factor 2.89)
  3. Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman Khan, Kim-Kwang Raymond Choo, Chroma key background detection for digital video using statistical correlation of blurring artifact, Digital Investigation, (Impact Factor 1.21)
  4. Suleman Khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Salman Iqbal, Ahmed Abdelaziz, Abdel Muttlib, Omar Adil Mahdi, Muhammad Shiraz, Yusor Rafid Bahar Al-Mayouf, Muhammad Khurram Khan, Victor Chang, Towards an Applicability of Current Network Forensics for Cloud Networks: A SWOT Analysis, IEEE Access, (Impact Factor 1.27)
  5. Yusor Rafid Bahar Al-Mayouf, N.Fadzilah Abdullah, Mahamod Ismail, M. Salih M AlQaraawi, A. Omar Mahdi, Suleman Khan, Evaluation of efficient vehicular ad hoc networks based on a maximum distance routing algorithm, EURASIP Journal on Wireless Communications and Networking, (Impact Factor 0.62)
  6. Yusor Rafid Bahar Al-Mayouf, Mahamod Ismail, Nor Fadzilah Abdullah, Ainuddin Wahid Abdul Wahab, Omar Adil Mahdi, Suleman Khan, Kim-Kwang Raymond Choo, Efficient and Stable Routing Algorithm Based on User Mobility and Node Density in Urban Vehicular Network, PloS one, (Impact Factor 3.05)
  7. Ahmed Abdelaziz, Tan Fong Ang, Mehdi Sookhak, Suleman Khan, Athanasios Vasilakos, Chee Sun Liew, Adnan Akhunzada, Survey on Network Virtualization Using OpenFlow: Taxonomy, Opportunities, and Open Issues, KSII Transactions on Internet and Information Systems, (Impact Factor 0.36)
  8. Salman Iqbal, Miss Laiha Mat Kiah, Babak Dhaghighi, Muzammil Hussain, Suleman khan, Muhammad Khurram Khan, Kim-Kwang Raymond Choo, On Cloud Security Attacks: A Taxonomy and Intrusion Detection and Prevention as a Service, Journal of Network and Computer Applications, (Impact Factor 2.2)
  9. Salman Iqbal, Miss Laiha Mat Kiah, Nor Badrul Anuar, Babak Daghighi, Ainuddin Wahid Abdul Wahab, Suleman khan, Service Delivery Models of Cloud Computing: Security Issues and Open Challenges, Security and Communication Networks, (Impact Factor 0.806)
  10. Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Ammar M. A. Abu znaid, Suleman Khan, Yusor Rafid Bahar Al-Mayouf, Nadra Guizani, A comparison study on node clustering techniques used in target tracking WSNs for efficient data aggregation, Wireless Communications and Mobile Computing, (Impact Factor 0.922)
  11. Suleman khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mohsen Guizani, Muhammad Khurram Khan, Topology Discovery in Software Defined Networks: Threats, Taxonomy, and State-of-the-art, IEEE Communications Surveys & Tutorials, (Impact Factor 9.22)
  12. Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Ammar Abu Znaid, Yusor Rafid Bahar Al-Mayouf, Suleman Khan, WDARS: A Weighted Data Aggregation Routing Strategy with Minimum Link Cost in Event-Driven WSNs, Journal of Sensors, (Impact Factor 1.17)
  13. Bimba Andrew Thomas, Norisma Idris, Ahmed Al-Hnaiyyan, Rohana Binti Mahmud, Ahmed Abdelaziz, Suleman Khan, Victor Chang, Towards Knowledge Modeling and Manipulation Technologies: A Survey, International Journal of Information Management, (Impact Factor 2.69)
  14. Suleman khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, Iftikhar Ahmad Khan, Network Forensics: Review, Taxonomy, and Open Challenges, Journal of Network and Computer Applications, (Impact Factor 2.2)
  15. Suleman khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Muhammad Shiraz, Mustapha Aminu Bagiwa, Samee U. Khan, Raj Kumar Buyya, and Albert Y. Zomaya, Cloud Log Forensics: Foundations, State-of-the-art, and Future Directions , ACM Computing Surveys, (Impact Factor 3.3)
  16. Mustapha Aminu Bagiwa, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Suleman khan - Digital Video Inpainting Detection Using Correlation Of Hessian Matrix , Malaysian Journal of Computer Science. (Impact Factor 0.405).
  17. Muhammad Shiraz, Abdullah Gani, Azra Shamim, Suleman Khan, Raja Wasim Ahmad. Energy Efficient Computational Offloading Framework for Mobile Cloud Computing, Journal of Grid Computing, (Impact Factor 1.66).
  18. Abdullah Gani, Golam Moktader Nayeem, Muhammad Shiraz, Mehdi Sookhak, Md Whaiduzzaman, Suleman Khan, A review on interworking and mobility techniques for seamless connectivity in mobile cloud computing, Journal of Network and Computer Applications (Impact Factor 1.77).
  19. Suleman Khan, Muhammad Shiraz, Ainuddin Wahid Abdul Wahab, Abdullah Gani, Qi Han, Zulkanain Bin Abdul Rahman, A Comprehensive Review on Adaptability of Network Forensics Frameworks for Mobile Cloud Computing The Scientific World Journal, (Impact Factor 1.73)
  20. Han Qi, Muhammad Shiraz, Abdullah Gani, Md Whaiduzzaman, Suleman Khan. Sierpinski Triangle Based Data Center Architecture in Cloud Computing., Journal of Supercomputing (Impact Factor 0.917 )

Conference Proceedings

  1. Omar Adil Mahdi, Ainuddin Wahid Abdul Wahab, Mohd Yamani Idna Idris, Ammar Abu Znaid, Suleman Khan, Yusor Rafid Bahar Al-Mayouf, ESAM: Endocrine inspired Sensor Activation Mechanism for multi-target tracking in WSNs, Fourth International Conference on Wireless and Optical Communications, China (2016).
  2. Suleman khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Ahmed AbdelAziz, Mustapha Aminu Bagiwa, FML: A novel Forensics Management Layer for Software Defined Networks, IEEE 6th International Conference on Cloud system and Big Data Engineering Confluence-2016, Noida, Uttar Pardesh, India, (2016)
  3. Suleman khan, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, SIDNFF: Source Identification Network Forensics Framework for Cloud Computing, IEEE International Conference on Consumer Electronics-ICCE-TW, Taiwan, (2015).
  4. Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Mohd Yamani Idna Idris, Suleman Khan, Zaidi Razak, Muhammad Rezal Kamel Ariffin,"Passive video forgery detection techniques: A survey," 10th International Conference on Information Assurance and Security (IAS), Okinawa, Japan (2014).
  5. Suleman khan, Ejaz Ahmed, Muhammad Shiraz, Abdullah Gani, Ainuddin Wahid Abdul Wahab, Mustapha Aminu Bagiwa, Forensic Challenges in Mobile Cloud Computing, 1st International Conference on Computer, Communication, And Control Technology, (I4CT'14), Kedah, Langkawi, Malaysia (2014)
  6. Ejaz Ahmed, Suleman Khan, Ibrar Yaqoob, Abdullah Gani, Farrukh Saleem, MultiObjective Optimization Model for Seamless Application Execution in Mobile Cloud Computing, 5th International Conference on Information and Communication Technologies, (ICICT'13), Karachi, Pakistan, (2013)
  7. Suleman Khan, Khizar Hayat, Sajjad A Madanil, Samee U Khan, The Median Resource Failure Checkpointing, 26th EUROPEAN Conference on Modelling and Simulation, ECMS-Koblenz, Germany, (2012)
  8. Suleman Khan, Qazi Mudassar Ilyas, Waqas Anwar Contextual advertising using keyword extraction through collocation, Proceedings of the 7th International Conference on Frontiers of Information Technology, FIT-09, Abbottabad, Pakistan (2009)