Paper_03
Paper_03
a r t i c l e i n f o a b s t r a c t
Article history: Both Internet of Things (IoT) and Software Defined Networks (SDN) have a major role in increasing effi-
Received 11 September 2021 ciency and productivity for smart cities. Despite that, they face potential security threats that need to be
Revised 16 January 2023 reduced. A new Intrusion Detection System (IDS) has become necessary to secure them. Many researchers
Accepted 18 February 2023
have recently used recent techniques such as machine learning to analyze and identify the rapid growth
Available online 03 March 2023
of attacks and abnormal behavior. Most of these techniques have low accuracy and less scalability. To
address this issue, this paper proposes a Secured Automatic Two-level Intrusion Detection System
Keywords:
(SATIDS) based on an improved Long Short-Term Memory (LSTM) network. The proposed system differ-
Intrusion Detection System (IDS)
Internet of Things (IOT)
entiates between attack and benign traffic, identifies the attack category, and defines the type of sub-
Deep Learning (DL) attack with high performance. To prove the efficiency of the proposed system, it was trained and evalu-
Long Short-Term Memory (LSTM) ated using two of the most recent realistic datasets; ToN-IoT and InSDN datasets. Its performance was
ToN-IoT dataset analyzed and compared to other IDSs. The experimental results show that the proposed system outper-
InSDN dataset forms others in detecting many types of attacks. It achieves 96.35 % accuracy, 96 % detection rate, and
98.4 % precision for ToN-IoT dataset. For InSDN dataset, the results were 99.73 % accuracy, 98.6 % detec-
tion rate, and 98.9 % precision.
Ó 2023 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Ain Shams Uni-
versity. This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/
by-nc-nd/4.0/).
1. Introduction Physical and cyber-attacks are both possible in a smart city. Phys-
ical attacks are initiated when attackers are physically closer to the
To accommodate the rising population, metropolitan areas equipment and thus have the opportunity to adapt the network’s
require infrastructure that facilities addressing environmental devices or sensors. Malicious code injection, radio frequency jam-
and transportation concerns. The fast development of low-cost ming, fake node injection, permanent denial of service, side chan-
devices such as sensors, actuators and radio-frequency identifica- nel attack, and sleep denial assault are all examples of these
tion, combined with wireless communication technologies as attacks. On the other hand, in cyber-attacks, the attacker attempts
IoT-oriented infrastructure, has created an ideal environment for to inject malicious or malware software into network components
building numerous smart city applications [1–3], as in Fig. 1. IoT in order to obtain unauthorized access to them. Man-in-the-Middle
is a powerful platform for combining users worldwide without (MITM) attacks, Denial-of-Service (DoS) attacks, Distributed
human interference, as in Fig. 2. It connects everything to the Inter- Denial-of-Service (DDoS) attacks, and Ransomware assaults are
net via data sensing devices that enable intelligent identification, all examples of these types of attacks. Such attacks are becoming
tracking, localization, administration, and supervision. It has sev- more prevalent at an alarming rate and can threaten the confiden-
eral uses include intelligent health care, intelligent transport, and tiality, security, and availability of data [7,8].
smart grids. Like other networks, this technology seeks to enhance Software-Defined Networking (SDN) is a recent technology
our personal and professional lives [4,5]. which utilizes software-based controllers or application program-
Along with the fast growth of IoT systems and devices, the ming interfaces (APIs) to communicate with underlying hardware
interconnectedness of various IoT sensors in smart networks offers infrastructure and direct traffic on a network. It helps drive the
a multitude of potential dangers to IoT devices in smart cities. expansion of IoT-enabled devices, enhances the efficiency of net-
work resource sharing and improves IoT service-level agreements.
Although combining IoT and SDN improves IoT operations and
⇑ Corresponding author. security by allowing full and remote control of network setup
E-mail address: [email protected] (R.A. Hamada).
https://doi.org/10.1016/j.asej.2023.102211
2090-4479/Ó 2023 THE AUTHORS. Published by Elsevier BV on behalf of Faculty of Engineering, Ain Shams University.
This is an open access article under the CC BY-NC-ND license (http://creativecommons.org/licenses/by-nc-nd/4.0/).
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
with two levels of privacy, and an intrusion detection module. They Table 1
used 19 features only from 43 features. The authors of [2] proposed Previous Ids Approaches.
a cyberattack detection system for IoMT networks based on Ref. Technique Dataset Perfomance Analysis
ensemble learning and fog-cloud architecture. The ensemble [1] Trustworthy Privacy- ToN-IoT Accuracy of 98.84%
design integrates the Decision Tree, Naive Bayes, and Random For- Preserving Secured BoT-IoT Accuracy of 99.99%
est models created by the individual learners. Framework for smart cities
A new method based on LSTM autoencoder and one-class sup- is presented using three
modules: a trustworthiness
port vector machine (OC-SVM) is shown in [9] to find anomaly- module, a two-level privacy
based attacks in an unbalanced dataset. The models are trained module, and an intrusion
with only examples of normal classes. In [10], a model was made detection module
that takes the given features and pulls out the important ones. It [2] Ensemble learning and fog- ToN-IoT Accuracy of 96.35%
cloud architecture-driven
then uses deep learning to classify incursions. Notably, the under-
cyberattack detection
lying data points can’t be thought of as samples from a single dis- framework for IoMT
tribution. Instead, they come from two different distributions, one networks
that applies to all network intrusions and the other that is specific [9] Hyper approach based on InSDN Accuracy of 90.5%
to one domain. Table 1 contains previous approaches in that field. LSTM autoencoder and
One-class Support Vector
Machine to detect
3. Subjects and methods anomalies based attacks in
an unbalanced dataset
[10] CNN technique with L2 InSDN Accuracy of 93.01%
3.1. Database description regularization and the
dropout methods to
The IDSs performance is based on the quality of the training address the overfitting
problem
dataset. The lack of up-to-date real-world dataset is one of the
[11] DL platform combination of CICIDS2017 Accuracy of 99.002%
key obstacles in deploying detection methods. The main reason binary bat algorithm,
why public data sets are not available for the intrusion detection binary genetic algorithm,
area is privacy and legal considerations. The proposed algorithm and binary gravitational
is trained and evaluated using two of the most recent realistic search algorithm.
[12] A clustering method based KDD Accuracy of 93.07%
datasets namely ToN-IoT and InSDN dataset.
on unsupervised CICIDS2017 Accuracy of 88%
component selection and Wormhole Accuracy of 94.06%
3.1.1. ToN-IoT dataset initialization of the cluster
centre
The ToN-IoT dataset is obtained from a practical and large-scale
[13] ML models (DNN and CICIDS2017 99.8% True Positive Rate
network developed by UNSW Canberra Cyber IoT Lab, School of LSTM) for binary prediction for DNN
Engineering and Information Technology (SEIT), UNSW Canberra of unknown DoS/DDoS 99.9% True Positive Rate
at The Australian Defense Force Academy (ADFA) [19,20]. The data- attacks for LSTM
[14] A novel technology for UNSW- Detection Rate of 99.74%
set is compiled in parallel processing to collect a range of routine
enhancing the high- NB15 for binary classification
and cyber-attack events from IoT networks. A new testbed was efficiency identification CICIDS2017 and 96.54% for multiclass
built at the IoT lab to connect a range of virtual computers, physical rate of minority groups classification Detection
tools, hacking systems, cloud and fog systems, and IoT sensors to rate of 99.85 %
simulate the functionality and scalability of the automotive IoT [15] A new method to reduce CICIDS2017 Accuracy = 99.6191%
the feature subset for the
and Enterprise 4.0 networks. This dataset contains different recent
web- attack classification.
smart city-based attacks such as DoS, DDoS, and ransomware. [16] Scale-hybrid-IDS-AlertNet KDDCup99 Accuracy = 93%
These attacks have been deployed against web applications, IoT NSL-KDD Accuracy = 80.1%
gateways, and computer systems across the IoT network. This UNSW- Accuracy = 84.5%
dataset contains 43 features with 4,61,043 total observations NB15 Accuracy = 99.2%
WSN-DS Accuracy = 96.3%
divided into 3,00000 normal and 1,61,043 attack observations. CICIDS2017 Accuracy = 88.5%
The dataset was divided into 70 % and 30 % of train and test set Kyoto
respectively. Table 2 shows the statistic of normal traffic and dif- [17] Secured Privacy-Preserving ToN-IoT Accuracy = 99.77%
ferent attack vectors which was presented in the dataset [1,2]. Framework (SP2F) for smart IoT Botnet Accuracy = 99.98%
agricultural UAV
[18] An enhanced-proof-of- Power Accuracy = 95.2%
3.1.2. InSDN dataset work-technique-based System Accuracy = 98.1%
The InSDN dataset covers many scenarios and attack classes, blockchain UNSW-
NB15
including Probe, DoS application, web attacks, Brute Force attack,
[19] Fuzzy Gaussian Mixture- NGIDS-DS Accuracy = 95.48%
password guessing, U2R, and DDos attacks. In addition, InSDN reg- based Correntropy, based KDD-98 Accuracy = 99.55%
ular traffic also encompasses several common features. The dataset on the fuzzy rough set ToN_IoT Accuracy = 97.54%
source of attacks originates from both an internal and an external attribute reduction method
network to imitate the actual attack scenarios. It covers about 80
statistical aspects in CSV format such as Protocol, Duration, Byte
number, Packet number, etc. The overall number of dataset
instances for normal and attack traffic is 343,939; a total of plane gives the attacker a new option compared to the traditional
68,424 for normal traffic and 275,515 for attack traffic as shown network of numerous attacks. These intrusions are not easy to be
in Table 3. detected since the intruder is permitted to access to the victims’
The attack traffic emulates the same normal behavior since nor- server.
mal and malicious traffics are transmitted to the SDN controller for As a result, such a data collection might be a good indicator for
decision-making. Furthermore, the centralized perspective of the the model assessment that reflects the real-world scenario.
SDN network and the separation of the data plane from the control Furthermore, the InSDN dataset contains no redundant records to
3
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
Table 2 between memory units. The input gate decides whether the input
Ton-Iot Database. signal will alter the memory cell’s status or not. On the other hand,
Attacks No. of Instances % the output gate determines which memory cell status can be chan-
Normal 300,000 65.07 ged. The forgotten gate can decide to forget its status (or remember
Backdoor 20,000 4.34 it). The activity of the LSTM hidden layer is calculated at each step,
Scanning 20,000 4.34 depending on the configuration of the LSTM, as shown in Fig. 4. The
Injection 20,000 4.34 internal four memory gates are responsible for regulating the
Password 20,000 4.34
XSS 20,000 4.34
interlinkage. he interlinkage between memory units. The input
Ransomware 20,000 4.34 gate decides whether the input signal will alter the memory cell’s
DDOS 20,000 4.34 status or not. On the other hand, the output gate determines which
DOS 20,000 4.34 memory status can be changed depending on the previous input.
MITM 1043 0.23
The forgotten gate can decide to forget its status (or remember
it), under the following equations, at time t:
DNN is a type of neural network with a hierarchical structure 4. The proposed system
and many hidden layers. The network becomes denser when the
hidden layers increase. It becomes trendy among cybersecurity In multi-attack IDS system, the main target is to improve detec-
researchers in the last few years. LSTM network is RNN that uses tion efficiency to be more accurate in defining attack type. That
the input information to predict the next sequence according to helps to face various forms of attack. To accurately detect the
the detected pattern. The recurrence of the network delay, which attack type, a SATIDS system based on LSTM network is proposed.
represents the complex system output, is the RNN’s most essential This system achieves better performance than others IDSs. Fig. 5
characteristic. Furthermore, RNNs maintain an activation vector presents the inner structure of the proposed SATIDS system. Recti-
that makes the RNN an intense neural network. However, due to fied Linear Unit (Relu layer) activation function performs a thresh-
explosion and gradient difficulties, it’s also difficult to teach RNNs old operation to an input element concerning zero as some input
to rely on data from time series for a long time [17]. data contain negative values. Relu layer passes the positive input
LSTM architecture makes it a good choice for solving the RNN and gives zero value to the negative values. Then number of LSTM
extinction gradient problem. It uses a memory cell, which in layers are used; each of them is followed by a 0.2 probability drop-
sequential data may represent long-term dependencies. Fig. 4 out layer. The dropout layer probability value was chosen 0.2
shows the internal structure of the LSTM memory cell. The according to the try and error method to give the highest overall
performance parameters as in Fig. 6. The dropout layer sets the
input to avoid overfitting that decreases the network performance
parameters. The initial learning rate was set to 0.0001, and LSTM
batch size is 2000 to provide the highest performance parameters.
A fully connected layer flattens the output of the previous layers
and converts it to a single vector. Finally, the Softmax layer will
Fig. 4. LSTM internal architecture structure [18]. Fig. 5. Modified DL-based LSTM network.
4
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
6 Input testing records to the trained system Accuracy: The ratio of correctly calculated observations by the
6 Identify traffic type (normal or malicious) network to the total number of samples in the dataset.
7 If the traffic classified as anomaly, detect the type of
attack TP þ TN
Accuracy ¼ ð6Þ
8 Calculate network performance TP þ TN þ FP þ FN
5
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
TN
Selectivity ¼ ð9Þ
FP þ TP
Precision Recall
F1 score ¼ 2 ð10Þ
Precision þ Recall
Table 4
Performance Analysis of the proposed SATIDS system (using ToN-IoT Dataset).
6
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
setting was selected as 3 LSTM layers and 500 hidden layers in case
of binary classification since it has the best performance.
Fig. 12. Detecting Injection Attack.
– Multi-attack classification
performance of the proposed SATIDS system is shown in Figs. 14– Table 5 and Figs. 9–13 show the performance of the proposed
16 respectively. As shown, the network also has its highest perfor- SATIDS system in case of multiclassification using ToN-IoT dataset.
mance when using 3 LSTM layers and 500 hidden layers. For each attack, the accuracy and detection rate were recorded at
Detection Rate in case of using 3 LSTM layers and 500 hidden different number of LSTM layers and hidden layers.
layers is the highest (DR = 97.4 %), unlike that of using 2 LSTM lay- Fig. 17 represents the performance of the proposed SATIDS sys-
ers and 500 hidden layers (DR = 96 %). For all that, the system tem when facing XSS attack. As shown, the network has its highest
7
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
5.1.2. INSDN dataset Table 7 presents the output of our proposed SATIDS system
when using InSDN database in case of identifying the type of
– Binary Classification (normal/anomaly) attack. In this table, the number of LSTM layer and the number
Table 6 presents the system intrusion detection performance at of hidden layers in LSTM layer are changed and the precision and
different numbers of hidden layers (H) and LSTM layers. As shown detection rate for each attack at each time are recorded. Fig. 19
in Fig. 18, in case of 500 hidden layers and 4 LSTM layers the net- shows the performance of proposed SATIDS system when facing
work has its highest accuracy of 99.51 %, the highest RoC of BFA attack. The network has its highest performance when using
99.73 %, the lowest FAR of 0.3, and the highest precision and
Table 5
Performance Analysis of the proposed system using ToN-IoT Database.
8
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
Table 6
Performance analysis of the proposed system using InSDN Dataset.
# LSTM # Hidden layer ACC. ROC FAR Precision F1-Score Detection Rate
1 100 97.97 99 1 95.9 94.84 93.8
1 200 98.32 99.2 0.8 96.7 95.74 94.8
1 300 98.59 99.24 0.8 96.9 96.45 96
1 400 98.41 99.05 1 96.2 96 95.8
1 500 98.46 99.12 0.9 96.4 96.1 95.8
2 100 98.8 99.40 0.6 97.5 96.89 96.3
2 200 99.06 99.33 0.7 97.3 97.65 98
2 300 99.25 99.55 0.4 98.2 98.15 98.1
2 400 99.26 99.49 0.5 97.9 98.15 98.4
2 500 99.20 99.42 0.6 97.7 98 98.3
3 100 98.65 99.14 0.9 96.5 96.6 96.7
3 200 99.23 99.62 0.4 98.4 98.05 97.7
3 300 99.26 99.48 0.5 97.9 98.15 98.4
3 400 99.34 99.69 0.3 98.7 98.35 98
3 500 99.39 99.64 0.4 98.5 98.45 98.4
4 100 98.81 99.45 0.6 97.7 96.94 96.2
4 200 99.31 99.00 0.5 98.2 98.3 98.4
4 300 99.31 99.42 0.6 97.7 98.3 98.9
4 400 99.39 99.56 0.4 98.2 98.45 98.7
4 500 99.51 99.73 0.3 98.9 98.75 98.6
formance when using 1 LSTM layers and 300 hidden layers with
77.8 % precision and 24.6 % detection rate.
From Table 7 and Figs. 19–24, it is obvious that using 4 LSTM
layers (L) with 400 hidden layers (H) achieved the highest accu-
racy, precision and detection rate in multi classification
experiment.
– TON-IOT DATASET
Table 8 and Fig. 25 show a performance comparison among the
proposed SATIDS system and other approaches when using ToN-
IoT dataset. The proposed system outperforms others with preci-
sion of 97.3 %, and F1-score of 97.35 %. As for the Detection rate,
techniques presented in [2] as E-ADS, SAE-IDS and Ensemble learn-
ing recorded higher DR than the proposed SATIDS.
Table 9 and Fig. 26 illustrate the comparison of performance
Fig. 18. Performance ANALYSIS OF the proposed system using InSDN DataSET. while utilizing the feature selection technique. Minimum Redun-
dancy Maximum Relevance (MRMR) approach was utilized with
the proposed SATIDS to select 20 features out of the 43 features
in ToN-IoT dataset. SP2F [17] extracted the 20 most essential fea-
4 LSTM layers and 300 hidden layers with 85.6 % precision and tures using a mutual information-based methodology. The TP2SF
59.1 % detection rate. Figs. 20 and 21 show the performance of pro- architecture proposed in [1] adopts the most fundamental statisti-
posed SATIDS system when facing BOTNET attack and DDOS attack cal method based on the Pearson correlation coefficient (PCC). In
respectively. As shown, the network has its highest performance terms of Accuracy, F1-score, precision, and detection rate, the pro-
when using 1 LSTM layer and 500 hidden layers for BOTNET attack posed MRMR-SATIDS outperforms TP2SF [1]. In terms of f1-score
and 3 LSTM layers and 500 hidden layers for DDOS attack. and detection rate, the proposed system outperformed SP2F [17]
For DOS attack, the performance of proposed SATIDS system is as well. However, SP2F [17] is 0.76 % more accurate than MRMR-
shown in Fig. 22, the network has its highest performance when SATIDS.
using 4 LSTM layers and 400 hidden layers with 98.5 % precision
and 99.1 % detection rate. Fig. 23 presents the performance of pro- – INSDN DATASET
posed SATIDS system when detecting Probe attack. As shown, the
system has its highest performance when using 4 LSTM layers Table 10 and Fig. 27 compare the performance of the proposed
and 300 hidden layers with 98.8 % precision and 98.8 % detection SATIDS system to other IDSs in case of using InSDN database. It is
rate. As for detecting Web-attack, the performance of proposed clear that the proposed system outperforms others with 98.4 %
SATIDS system is shown in Fig. 24, the system has its highest per- detection rate, 99.39 % accuracy, 99.64 % area under curve of
9
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
Table 7
Performance Analysis of the proposed system using InSDN Database.
Fig. 20. Detecting BOTNET Attack. Fig. 22. Detecting DOS Attack.
10
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
Table 9
Performance comparison USING 20 features of ToN-IoT Database.
Table 8
Performance comparison using ToN-IoT Database.
11
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
Table 10
Performance comparison USING InSDN Database.
[8] Singh S, Sharma PK, Moon SY, Moon D, Park JH. A comprehensive study on APT
attacks and countermeasures for future networks and communications:
challenges and solutions. J Supercomput 2019;75(8):4543–74.
[9] Said Elsayed M, Le-Khac NA, Dev S, Jurcut AD. Network anomaly detection
using LSTM based autoencoder. In: Proceedings of the 16th ACM symposium
on QoS and security for wireless and mobile networks. p. 37–45.
[10] Elsayed M, Jahromi H, Nazir M, Jurcut A. The role of CNN for intrusion
detection systems: an improved CNN learning approach for SDNs. In: 2020
16th IEEE international colloquium on signal processing & its applications
(CSPA). IEEE; 2020. p. 29–34.
[11] Atefi K, Hashim H, Khodadadi T. A hybrid anomaly classification with deep
learning (DL) and binary algorithms (BA) as optimizer in the intrusion detection
system (IDS). In: Proceedings of the 16th IEEE international colloquium on
signal processing & its applications (CSPA). IEEE; 2020. p. 29–34.
[12] Prasad M, Tripathi S, Dahal K. Unsupervised feature selection and cluster
center initialization based arbitrary shaped clusters for intrusion detection.
Comput Secur 2020;99:102062.
[13] Sabeel U, Heydari SS, Mohanka H, Bendhaou Y, Elgazzar K, El-Khatib K.
Evaluation of deep learning in detecting unknown network attacks. In:
Proceedings of international conference on smart applications,
communications and networking (SmartNets). IEEE; 2019. p. 1–6.
[14] Zhang H, Huang L, Wu CQ, Li Z. An effective convolutional neural network
based on SMOTE and Gaussian mixture model for intrusion detection in
imbalanced dataset. Comput Netw 2020;177:107315.
[15] Kshirsagar D, Kumar S. An ensemble feature reduction method for web-attack
detection. J Discret Math Sci Cryptogr 2020;23(1):283–91.
[16] Vinayakumar R, Alazab M, Soman K, Poornachandran P, Al-Nemrat A,
Fig. 27. Performance comparison using InSDN Dataset. Venkatraman S. Deep learning approach for intelligent intrusion detection
system. IEEE Access 2019;7:41525–50.
[17] Kumar R, Kumar P, Tripathi R, Gupta GP, Gadekallu TR, Srivastava G. SP2F: a
efficiency of the suggested system, its performance has been studied privacy-preserving framework for smart agricultural Unmanned Aerial
Vehicles. Comput Netw 2021:107819.
and compared with other IDSs. Results reveal that the suggested IDS [18] Keshk M, Turnbull B, Moustafa N, Vatsalan D, Choo K-K-R. A privacy-
system outperforms other IDSs with 96.35 % accuracy, 96 % detec- preserving-framework-based blockchain and deep learning for protecting
tion rate, and 98.4 % precision for ToN-IoT dataset and 99.73 % accu- smart power networks. IEEE Trans Ind Inf 2019;16(8):5110–8.
[19] Haider W, Moustafa N, Keshk M, Fernandez A, Choo K-K-R, Wahab A.
racy, 98.6 % detection rate, and 98.9 % precision for InSDN dataset. FGMCHADS: Fuzzy Gaussian mixture-based correntropy models for
Our future research will focus on refining the model of the proposed detecting zero-day attacks from linux systems. Comput Secur 2020:101906.
system by exploiting feature selection, detect zero-day attacks on [20] Moustafa N. ToN_IoT datasets. IEEE Dataport; 2019. Online; Accessed 10-Feb-
2020. doi: 10.21227/fesz-dm97.
IoT systems, and apply the proposed system to real-world Internet [21] Elsayed MS, Le-Khac NA, Jurcut AD. InSDN: a novel SDN intrusion dataset. IEEE
of Things networks composed of mobile devices. Access 2020;8:165263–84.
12
R.A. Elsayed, R.A. Hamada, M.I. Abdalla et al. Ain Shams Engineering Journal 14 (2023) 102211
M. I. Abdalla is a full professor in the Electronics and Dr. Shaimaa Elsaid is an Associate Professor at Elec-
Communication Department, Faculty of Engineering, tronics and Communications Dep., Faculty of Engineer-
Zagazig University. He received his BSc degree from ing, Zagazig University, Egypt. She has received the MSc
University of Mansoura, Egypt in 1979, and also the (2006) in Networks Security and PhD (2011) in Multi-
Master of Science degree from the same university in media Security from the Faculty of Engineering, Zagazig
1984. He received his PhD degree from Zagazig University (Egypt). Her current research interests
University, Egypt in 1989. He worked as a lecturer in include Cyber security, Internet of things (IoT), Digital
Saudi Arabia from 1990 to 1993. He worked in a Post- Image Processing, Medical Imaging, and Soft Comput-
doctoral research in University of Connecticut, USA in ing. She is author of 2 books and many research papers
1996. His research interests are Wireless communica- published at international journals, and conference
tion, Signal processing, Image processing and Pattern proceedings. Also, she has supervised many graduation
Recognition. He has supervised different master and projects, Master, and PhD theses.
PhD theses. He has published many research papers in international conferences
and journals.
13