Dr Nour Moustafa

Postgraduate Discipline Coordinator (Cyber)
School of Engineering and Information Technology
UNSW Canberra Cyber

LOCATION

Building 15, room 108

  • ABOUT
  • PUBLICATIONS

Dr Nour Moustafa is a Lecturer in Cybersecurity at the School of Engineering and Information Technology (SEIT), University of New South Wales (UNSW) Canberra, Australia. He received his PhD degree in the field of Cybersecurity from UNSW in 2017. He obtained his Bachelor and Master degrees of Information Systems in 2009 and 2014, respectively, from Helwan University, Egypt. His areas of interests include Cybersecurity, in particular, Network Security, Intrusion Detection, Threat Intelligence, Privacy-Preserving and Digital Foresnics for Indystry 4.0, Interent of Things (IoT), Cloud, and Fog Computing. His methdologies include  Statistical Learning, Machine/Deep Learning, Big Data Analytics, and Artificial Intelligence (AI) Planning.

His data sets for evalauting Cyber applications-based machine learning:  

1. The UNSW-NB15 data set, 2015.

2. The Bot-IoT data set, 2019.

Book Chapters

Moustafa NM; hu J, 2018, 'Security and Privacy in 4G/LTE Network', in Encyclopedia of Wireless Networks, Springer, Cham, http://dx.doi.org/10.1007/978-3-319-32903-1_119-1

Moustafa N; Slay J, 2018, 'A network forensic scheme using correntropy-variation for attack detection', in IFIP Advances in Information and Communication Technology, pp. 225 - 239, http://dx.doi.org/10.1007/978-3-319-99277-8_13

Moustafa N; Creech G; Slay J, 2017, 'Big Data Analytics for Intrusion Detection System: Statistical Decision-Making Using Finite Dirichlet Mixture Models', in Carrascosa IP; Kalutarage HK; Huang Y (ed.), DATA ANALYTICS AND DECISION SUPPORT FOR CYBERSECURITY: TRENDS, METHODOLOGIES AND APPLICATIONS, edn. Data Analytics-Series, SPRINGER INTERNATIONAL PUBLISHING AG, pp. 127 - 156, http://dx.doi.org/10.1007/978-3-319-59439-2_5

Journal articles

Moustafa N; Turnbull B; Choo KKR, 2019, 'An ensemble intrusion detection technique based on proposed statistical flow features for protecting network traffic of internet of things', IEEE Internet of Things Journal, vol. 6, pp. 4815 - 4830, http://dx.doi.org/10.1109/JIOT.2018.2871719

Moustafa N; Hu J; Slay J, 2019, 'A holistic review of Network Anomaly Detection Systems: A comprehensive survey', Journal of Network and Computer Applications, vol. 128, pp. 33 - 55, http://dx.doi.org/10.1016/j.jnca.2018.12.006

Keshk M; Sitnikova E; Moustafa N; Hu J; Khalil I, 2019, 'An Integrated Framework for Privacy-Preserving based Anomaly Detection for Cyber-Physical Systems', IEEE Transactions on Sustainable Computing, pp. 1 - 1, http://dx.doi.org/10.1109/tsusc.2019.2906657

Moustafa N; Choo KKR; Radwan I; Camtepe S, 2019, 'Outlier Dirichlet Mixture Mechanism: Adversarial Statistical Learning for Anomaly Detection in the Fog', IEEE Transactions on Information Forensics and Security, vol. 14, pp. 1975 - 1987, http://dx.doi.org/10.1109/TIFS.2018.2890808

Koroniotis N; Moustafa N; Sitnikova E; Turnbull B, 2019, 'Towards the development of realistic botnet dataset in the Internet of Things for network forensic analytics: Bot-IoT dataset', Future Generation Computer Systems, vol. 100, pp. 779 - 796, http://dx.doi.org/10.1016/j.future.2019.05.041

Koroniotis N; Moustafa N; Sitnikova E, 2019, 'Forensics and Deep Learning Mechanisms for Botnets in Internet of Things: A Survey of Challenges and Solutions', IEEE Access, vol. 7, pp. 61764 - 61785, http://dx.doi.org/10.1109/ACCESS.2019.2916717

Radwan I; Moustafa N; Keating B; Choo K-KR; Goecke R, 2019, 'Hierarchical Adversarial Network for Human Pose Estimation', IEEE Access, vol. 7, pp. 103619 - 103628, http://dx.doi.org/10.1109/access.2019.2931050

AlKadi O; Moustafa N; Turnbull B; Choo K-KR, 2019, 'Mixture Localization-Based Outliers Models for securing Data Migration in Cloud Centers', IEEE Access, vol. 7, pp. 114607 - 114618, http://dx.doi.org/10.1109/access.2019.2935142

Alkadi OS; Moustafa N; Turnbull B; Choo KKR, 2019, 'An Ontological Graph Identification Method for improving Localisation of IP Prefix Hijacking in Network Systems', IEEE Transactions on Information Forensics and Security, http://dx.doi.org/10.1109/TIFS.2019.2936975

Moustafa NM; Misra G; Slay J, 2018, 'Generalized Outlier Gaussian Mixture technique based on Automated Association Features for Simulating and Detecting Web Application Attacks', IEEE Transactions on Sustainable Computing, http://dx.doi.org/10.1109/TSUSC.2018.2808430

Wang M; Abdelfattah S; Moustafa N; Hu J, 2018, 'Deep Gaussian Mixture-Hidden Markov Model for Classification of EEG Signals', IEEE Transactions on Emerging Topics in Computational Intelligence, http://dx.doi.org/10.1109/TETCI.2018.2829981

AL-Hawawreh M; Moustafa N; Sitnikova E, 2018, 'Identification of malicious activities in industrial internet of things based on deep learning models', Journal of Information Security and Applications, vol. 41, pp. 1 - 11, http://dx.doi.org/10.1016/j.jisa.2018.05.002

Moustafa N; Adi E; Turnbull B; Hu J, 2018, 'A New Threat Intelligence Scheme for Safeguarding Industry 4.0 Systems', IEEE Access, vol. 6, pp. 32910 - 32924, http://dx.doi.org/10.1109/ACCESS.2018.2844794

Keshk M; Moustafa N; Sitnikova E; Turnbull B, 2018, 'Privacy-preserving big data analytics for cyber-physical systems', Wireless Networks, http://dx.doi.org/10.1007/s11276-018-01912-5

Moustafa N; Slay J; Creech G, 2017, 'Novel Geometric Area Analysis Technique for Anomaly Detection using Trapezoidal Area Estimation on Large-Scale Networks', IEEE Transactions on Big Data, http://dx.doi.org/10.1109/TBDATA.2017.2715166

Moustafa N; Slay J, 2016, 'The evaluation of Network Anomaly Detection Systems: Statistical analysis of the UNSW-NB15 data set and the comparison with the KDD99 data set', Information Security Journal, vol. 25, pp. 18 - 31, http://dx.doi.org/10.1080/19393555.2015.1125974

Moustafa N; Slay J, 'RCNF: Real-time Collaborative Network Forensic Scheme for Evidence Analysis',

Moustafa N, 'A Systemic IoT-Fog-Cloud Architecture for Big-Data Analytics and Cyber Security Systems: A Review of Fog Computing',

Conference Papers

Turnbull B; Ormrod D; Moustafa N; Micallef N, 2019, 'Agile technology development to improve scenario-based learning exercises', in European Conference on Information Warfare and Security, ECCWS, pp. 518 - 526, presented at

Moustafa N; Creech G; Slay J, 2018, 'Anomaly detection system using beta mixture models and outlier detection', in Advances in Intelligent Systems and Computing, pp. 125 - 135, presented at , http://dx.doi.org/10.1007/978-981-10-7871-2_13

Moustafa N; Creech G; Slay J, 2018, 'Flow aggregator module for analysing network traffic', in Advances in Intelligent Systems and Computing, pp. 19 - 29, presented at , http://dx.doi.org/10.1007/978-981-10-7871-2_3

Koroniotis N; Moustafa N; Sitnikova E; Slay J, 2018, 'Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques', in , Springer International Publishing, Melbourne, Australia, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 - 15 December 2017, http://dx.doi.org/https://www.springerprofessional.de/en/towards-developing-network-forensic-mechanism-for-botnet-activit/15746852

Marsden T; Moustafa N; Sitnikova E; Creech G, 2018, 'Probability Risk Identification Based Intrusion Detection System for SCADA Systems', in Mobile Networks and Management, Springer International Publishing, Melbourne, Australia, presented at 9th International Conference, MONAMI 2017, Melbourne, Australia, 13 - 15 December 2017, http://dx.doi.org/10.1007/978-3-319-90775-8_28

Haider W; Hu J; Moustafa N, 2018, 'Designing anomaly detection system for cloud servers by frequency domain features of system call identifiers and machine learning', in Lecture Notes of the Institute for Computer Sciences, Social-Informatics and Telecommunications Engineering, LNICST, pp. 137 - 149, presented at , http://dx.doi.org/10.1007/978-3-319-90775-8_12

Monks K; Sitnikova E; Moustafa N, 2018, 'Cyber intrusion detection in operations of bulk handling ports', in European Conference on Information Warfare and Security, ECCWS, pp. 307 - 316, presented at

Wilson S; Moustafa N; Sitnikova E, 2018, 'A digital identity stack to improve privacy in the IoT', in IEEE World Forum on Internet of Things, WF-IoT 2018 - Proceedings, pp. 25 - 29, presented at , http://dx.doi.org/10.1109/WF-IoT.2018.8355199

Moustafa N; Turnbull B; Choo KKR, 2018, 'Towards Automation of Vulnerability and Exploitation Identification in IIoT Networks', in Proceedings - 2018 IEEE International Conference on Industrial Internet, ICII 2018, pp. 139 - 145, presented at , http://dx.doi.org/10.1109/ICII.2018.00023

Moustafa N; Slay J, 2017, 'The significant features of the UNSW-NB15 and the KDD99 data sets for Network Intrusion Detection Systems', in Proceedings - 2015 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, BADGERS 2015, pp. 25 - 31, presented at , http://dx.doi.org/10.1109/BADGERS.2015.14

Moustafa N; Creech G; Sitnikova E; Keshk M, 2017, 'Collaborative anomaly detection framework for handling big data of cloud computing', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, pp. 1 - 6, presented at , http://dx.doi.org/10.1109/MilCIS.2017.8190421

Keshk M; Moustafa N; Sitnikova E; Creech G, 2017, 'Privacy preservation intrusion detection technique for SCADA systems', in 2017 Military Communications and Information Systems Conference, MilCIS 2017 - Proceedings, pp. 1 - 6, presented at , http://dx.doi.org/10.1109/MilCIS.2017.8190422

Moustafa N; Slay J, 2016, 'A hybrid feature selection for network intrusion detection systems: Central points', in Security Research Institute, Edith Cowan University, the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., presented at the 16th Australian Information Warfare Conference, Edith Cowan University, Joondalup Campus, Perth, Western Australia., 30 November - 02 December 2015, http://dx.doi.org/10.4225/75/57a84d4fbefbb

Moustafa NM; Slay J, 2016, 'The significant features of the UNSW-NB15 andthe KDD99 Data sets for Network IntrusionDetection Systems', in , IEEE, Kyoto, Japan, presented at The 4th International Workshop on Building Analysis Datasets and Gathering Experience Returns for Security (BADGERS 2015), collocated with RAID2015, Kyoto, Japan, 05 - 05 November 2015, http://dx.doi.org/10.13140/RG.2.1.2264.4883

Moustafa N; Slay J, 2015, 'Creating novel features to anomaly network Detection using DARPA-2009 data set', in European Conference on Information Warfare and Security, ECCWS, pp. 204 - 212, presented at

Moustafa N; Slay J, 2015, 'UNSW-NB15: A comprehensive data set for network intrusion detection systems (UNSW-NB15 network data set)', in 2015 Military Communications and Information Systems Conference, MilCIS 2015 - Proceedings, presented at , http://dx.doi.org/10.1109/MilCIS.2015.7348942

Theses / Dissertations

Moustafa NM, 2017, Designing an online and reliable statistical anomaly detection framework for dealing with large high-speed network traffic, thesis, http://handle.unsw.edu.au/1959.4/58748