Submission declined on 1 March 2024 by
Ldm1954 (
talk). This draft's references do not show that the subject
qualifies for a Wikipedia article. In summary, the draft needs to
This submission does not appear to be written in
the formal tone expected of an encyclopedia article. Entries should be written from a
neutral point of view, and should refer to a range of
independent, reliable, published sources. Please rewrite your submission in a more encyclopedic format. Please make sure to avoid
peacock terms that promote the subject.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
Submission declined on 21 December 2023 by
Lewcm (
talk). This submission is not adequately supported by
reliable sources. Reliable sources are required so that information can be
verified. If you need help with referencing, please see
Referencing for beginners and
Citing sources. |
Arash Habibi Lashkari | |
---|---|
Born | Iran, Rasht | November 3, 1974
Nationality | Canadian-Iranian |
Education | University of Malaya (MS in Computer Science), University of Technology Malaysia (Ph.D. in Computer Science) |
Alma mater | York University (YU), ON, Canada, University New Brunswick (UNB), NB, Canada |
Occupation(s) | Associate professor, educator, author |
Known for | Canada Research Chair in Cybersecurity |
Website | https://www.ahlashkari.com/ |
Arash Habibi Lashkari (born November 3, 1974) is an associate professor, educator, and author, professionally known for serving as a Canada Research Chair (CRC) in cybersecurity. He is currently an associate professor at York University and a senior member of the Institute of Electrical and Electronics Engineers (IEEE). He also serves as an adjunct professor in the Department of Computer Science at the University of New Brunswick. [1]
He has been a lecturer for over two decades at several different institutions worldwide. He is also well-known as a pioneer in designing and producing Cybersecurity Datasets and open-source analyzers. [2]
Lashkari earned a Bachelor of Science in computer software engineering from Islamic Azad University 1995. Then, in 2008, he enrolled in the University of Malaya, where he completed his Master of Science in computer science. Later, in 2014, he earned his Ph.D. in computer science from the University of Technology Malaysia. He also earned a postdoctoral fellowship on cybersecurity from the University of New Brunswick and a postdoctoral research internship from Mitacs in 2016. [3] [4]
Upon his departure to Canada in 2015, he joined the University of New Brunswick as a research associate in the Computer Science department, where he was later promoted to serve as an assistant professor and then associate professor. He is an adjunct professor at the Faculty of Computer Science, University of New Brunswick (UNB). [5]
He is a senior member of IEEE and an associate professor at York University. Before this, he was also a research coordinator at the Canadian Institute for Cybersecurity (CIC). [6] His research is centered on the modeling and detection of cyber threats, the study of malware, the security of big data, the analysis of internet traffic, and the production of cybersecurity datasets. [1]
Lashkari is a Canada Research Chair (CRC) in cybersecurity. His current work involves developing vulnerability detection technology to protect network systems against cyberattacks, as he has more than two decades of concurrent industrial and development experience in network, software, and computer security. He oversees many research and development teams at once, all of which are engaged in various projects, including the analysis of network traffic, malware, Honeynets, and threat hunting. He was responsible for designing the first cybersecurity Capture the Flag (CTF) competition for post-secondary students in Canada. He is also well-known as a pioneer in designing and producing Cybersecurity Datasets and open-source analyzers. [7]
Lashkari is among the most cited researchers in cybersecurity. [2] He is well-recognized for his research in Malware Analysis [8] and in several fields of cyber security, including Intrusion Detection Systems (IDS), Network Traffic, [9] and dark web analysis. [10] [11]
These days, Machine Learning (ML) and Deep Learning (DL) techniques play a critical role in detecting serious cyber threats. A good dataset, on one side, helps train and create robust ML and DL systems and on the other side, supports research scholar in testing and evaluating their novel ideas to address various security problems. Lashkari was among the first and most famous researchers who generated and released more than 16 cybersecurity datasets [12] since 2015 and designed and developed different detection and characterization solutions using ML and DL in different cybersecurity areas.
For Encrypted traffic analysis and characterization, he generated three datasets, namely VPN-NonVPN-2015, [13] Tor-NonTor-2016, [14] and Darknet-2020, and proposed DIDarknet: a Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning. [15] In 2021, he proposed and developed a robust staking ensemble model for darknet traffic classification and characterization. [16]
In 2016, he explored a lightweight approach to the detection and categorization of malicious URLs according to their attack type, including Spam, Phishing, Malware, and Defacement, and generated the ISCX-URL-2016 dataset;[ citation needed] later in 2020, he designed the first DoH tunnel analyzer using Time-series classification and produced CIRA-CIC-DoHBrow-2020 dataset funded by the Canadian Internet Registration Authority.[ citation needed] In 2021, he proposed a lightweight hybrid data exfiltration and malicious DNS traffic analysis collaboratively with Bell Canada. [17] [18]
From 2017 to 2020, he designed and developed three different Android malware analysis systems using ML and DL algorithms and proposed a systematic approach to generate the Android Malware datasets. [19] He generated four datasets on the Android Malware analysis domain, including AAGM-2017, [15] CIC-AndMal-2017, [20] CIC-InvesAndMal-2019, [21] and CCCS-CIC-AndMal-2020 along with proposing two new Deep Learning-based Android malware characterization solutions namely DIDroid and Entroplyzer collaboratively with the Canadian Centre for Cyber Security (CCCS). [22] [23] Also, he proposed a fast and robust ML-based intrusion detection and characterization system and generated CIC-IDS-2017 [24] and, after that, extended the project supported by AWS and produced the first and only IDS datasets for Amazon, namely CSE-CIC-IDS-2018. [25] He is the producer of the only available Distributed Denial of Service (DDoS) dataset, namely CIC-DDoS-2019, which covers 12 common DDoS attacks, including NTP, DNS, LDAP, MSSQL, NetBIOS, SNMP, SSDP, UDP, UDP-Lag, WebDDoS, SYN and TFTP. [13]
In 2015, he designed and developed ISCXFlowMeter as one of the first network traffic flow generators and analyzers, extracting 32 features from the network traffic on the fly. [13] [14] Later, in 2017, he expanded the analyzer and designed CICFlowMeter, which extracts more than 80 features in the fly. [24] [25] [13]
From 2019 to 2020, he proposed and produced three versions of Android Application Analyzers for detecting and characterizing malicious behaviors on smartphones; the first version covers the data collection and static feature extraction, the second version focuses on developing a classification model using AI for static features, and the third version has the dynamic analysis module and related features to improve the AI-based classifier. [22] [23] In 2020, he designed and developed the first DoH analyzer, DoHLyzer, for encrypted DNS message analysis.[ citation needed] In 2021, he introduced the first Memory Analyzer for ML and DL algorithms, VolMemLyzer. [14]
He has authored more than 110 academic articles on various cybersecurity-related topics. [26] He has also authored and contributed to books regarding cybersecurity, including;
Senior Member of the Institute of Electrical and Electronics Engineers (IEEE) in Computer Science (R7) [31]
Submission declined on 1 March 2024 by
Ldm1954 (
talk). This draft's references do not show that the subject
qualifies for a Wikipedia article. In summary, the draft needs to
This submission does not appear to be written in
the formal tone expected of an encyclopedia article. Entries should be written from a
neutral point of view, and should refer to a range of
independent, reliable, published sources. Please rewrite your submission in a more encyclopedic format. Please make sure to avoid
peacock terms that promote the subject.
Where to get help
How to improve a draft
You can also browse Wikipedia:Featured articles and Wikipedia:Good articles to find examples of Wikipedia's best writing on topics similar to your proposed article. Improving your odds of a speedy review To improve your odds of a faster review, tag your draft with relevant WikiProject tags using the button below. This will let reviewers know a new draft has been submitted in their area of interest. For instance, if you wrote about a female astronomer, you would want to add the Biography, Astronomy, and Women scientists tags. Editor resources
|
Submission declined on 21 December 2023 by
Lewcm (
talk). This submission is not adequately supported by
reliable sources. Reliable sources are required so that information can be
verified. If you need help with referencing, please see
Referencing for beginners and
Citing sources. |
Arash Habibi Lashkari | |
---|---|
Born | Iran, Rasht | November 3, 1974
Nationality | Canadian-Iranian |
Education | University of Malaya (MS in Computer Science), University of Technology Malaysia (Ph.D. in Computer Science) |
Alma mater | York University (YU), ON, Canada, University New Brunswick (UNB), NB, Canada |
Occupation(s) | Associate professor, educator, author |
Known for | Canada Research Chair in Cybersecurity |
Website | https://www.ahlashkari.com/ |
Arash Habibi Lashkari (born November 3, 1974) is an associate professor, educator, and author, professionally known for serving as a Canada Research Chair (CRC) in cybersecurity. He is currently an associate professor at York University and a senior member of the Institute of Electrical and Electronics Engineers (IEEE). He also serves as an adjunct professor in the Department of Computer Science at the University of New Brunswick. [1]
He has been a lecturer for over two decades at several different institutions worldwide. He is also well-known as a pioneer in designing and producing Cybersecurity Datasets and open-source analyzers. [2]
Lashkari earned a Bachelor of Science in computer software engineering from Islamic Azad University 1995. Then, in 2008, he enrolled in the University of Malaya, where he completed his Master of Science in computer science. Later, in 2014, he earned his Ph.D. in computer science from the University of Technology Malaysia. He also earned a postdoctoral fellowship on cybersecurity from the University of New Brunswick and a postdoctoral research internship from Mitacs in 2016. [3] [4]
Upon his departure to Canada in 2015, he joined the University of New Brunswick as a research associate in the Computer Science department, where he was later promoted to serve as an assistant professor and then associate professor. He is an adjunct professor at the Faculty of Computer Science, University of New Brunswick (UNB). [5]
He is a senior member of IEEE and an associate professor at York University. Before this, he was also a research coordinator at the Canadian Institute for Cybersecurity (CIC). [6] His research is centered on the modeling and detection of cyber threats, the study of malware, the security of big data, the analysis of internet traffic, and the production of cybersecurity datasets. [1]
Lashkari is a Canada Research Chair (CRC) in cybersecurity. His current work involves developing vulnerability detection technology to protect network systems against cyberattacks, as he has more than two decades of concurrent industrial and development experience in network, software, and computer security. He oversees many research and development teams at once, all of which are engaged in various projects, including the analysis of network traffic, malware, Honeynets, and threat hunting. He was responsible for designing the first cybersecurity Capture the Flag (CTF) competition for post-secondary students in Canada. He is also well-known as a pioneer in designing and producing Cybersecurity Datasets and open-source analyzers. [7]
Lashkari is among the most cited researchers in cybersecurity. [2] He is well-recognized for his research in Malware Analysis [8] and in several fields of cyber security, including Intrusion Detection Systems (IDS), Network Traffic, [9] and dark web analysis. [10] [11]
These days, Machine Learning (ML) and Deep Learning (DL) techniques play a critical role in detecting serious cyber threats. A good dataset, on one side, helps train and create robust ML and DL systems and on the other side, supports research scholar in testing and evaluating their novel ideas to address various security problems. Lashkari was among the first and most famous researchers who generated and released more than 16 cybersecurity datasets [12] since 2015 and designed and developed different detection and characterization solutions using ML and DL in different cybersecurity areas.
For Encrypted traffic analysis and characterization, he generated three datasets, namely VPN-NonVPN-2015, [13] Tor-NonTor-2016, [14] and Darknet-2020, and proposed DIDarknet: a Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning. [15] In 2021, he proposed and developed a robust staking ensemble model for darknet traffic classification and characterization. [16]
In 2016, he explored a lightweight approach to the detection and categorization of malicious URLs according to their attack type, including Spam, Phishing, Malware, and Defacement, and generated the ISCX-URL-2016 dataset;[ citation needed] later in 2020, he designed the first DoH tunnel analyzer using Time-series classification and produced CIRA-CIC-DoHBrow-2020 dataset funded by the Canadian Internet Registration Authority.[ citation needed] In 2021, he proposed a lightweight hybrid data exfiltration and malicious DNS traffic analysis collaboratively with Bell Canada. [17] [18]
From 2017 to 2020, he designed and developed three different Android malware analysis systems using ML and DL algorithms and proposed a systematic approach to generate the Android Malware datasets. [19] He generated four datasets on the Android Malware analysis domain, including AAGM-2017, [15] CIC-AndMal-2017, [20] CIC-InvesAndMal-2019, [21] and CCCS-CIC-AndMal-2020 along with proposing two new Deep Learning-based Android malware characterization solutions namely DIDroid and Entroplyzer collaboratively with the Canadian Centre for Cyber Security (CCCS). [22] [23] Also, he proposed a fast and robust ML-based intrusion detection and characterization system and generated CIC-IDS-2017 [24] and, after that, extended the project supported by AWS and produced the first and only IDS datasets for Amazon, namely CSE-CIC-IDS-2018. [25] He is the producer of the only available Distributed Denial of Service (DDoS) dataset, namely CIC-DDoS-2019, which covers 12 common DDoS attacks, including NTP, DNS, LDAP, MSSQL, NetBIOS, SNMP, SSDP, UDP, UDP-Lag, WebDDoS, SYN and TFTP. [13]
In 2015, he designed and developed ISCXFlowMeter as one of the first network traffic flow generators and analyzers, extracting 32 features from the network traffic on the fly. [13] [14] Later, in 2017, he expanded the analyzer and designed CICFlowMeter, which extracts more than 80 features in the fly. [24] [25] [13]
From 2019 to 2020, he proposed and produced three versions of Android Application Analyzers for detecting and characterizing malicious behaviors on smartphones; the first version covers the data collection and static feature extraction, the second version focuses on developing a classification model using AI for static features, and the third version has the dynamic analysis module and related features to improve the AI-based classifier. [22] [23] In 2020, he designed and developed the first DoH analyzer, DoHLyzer, for encrypted DNS message analysis.[ citation needed] In 2021, he introduced the first Memory Analyzer for ML and DL algorithms, VolMemLyzer. [14]
He has authored more than 110 academic articles on various cybersecurity-related topics. [26] He has also authored and contributed to books regarding cybersecurity, including;
Senior Member of the Institute of Electrical and Electronics Engineers (IEEE) in Computer Science (R7) [31]