Amar Almaini, M.Sc.

Research and Lectures

  • Research project SISSeC
  • Software Defined Networking
  • Machine Learning
  • Intrusion Prevention Systems
  • Supervision of student projects (Bachelor Electrical Engineering)
  • Lecture „Grundlagen der Informationssicherheit“ (Bachelor Cyber Security)

Academic Staff

PhD Student


Zeitschriftenartikel
  • Amar Almaini
  • A. Al Dubai
  • I. Romdhani
  • Martin Schramm
  • A. Alsarhan
Lightweight edge authentication for software defined networks

In: Computing (Special Issue)

  • 2020

DOI: 10.1007/s00607-020-00835-4

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN’s logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the edge or, to be precise, the switches can offload the controllers from local state based decisions that do not require global network wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by programming protocol-independent packet processors (P4) language to present two authentication techniques to assure that only legitimate nodes are able to access the network. The first technique is the port knocking and the second technique is the One-Time Password. Our experimental results indicate that our proposed techniques improve the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches’ performance.
  • Institut ProtectIT
  • Angewandte Informatik
  • DIGITAL
Beitrag (Sammelband oder Tagungsband)
  • Amar Almaini
  • A. Al Dubai
  • I. Romdhani
  • Martin Schramm
Delegation of Authentication to the Data Plane in Software Defined Networks, pg. 58-65.
  • 2019

DOI: 10.1109/IUCC/DSCI/SmartCNS.2019.00038

OpenFlow is considered as the most known protocol for Software Defined Networking (SDN). The main drawback of OpenFlow is the lack of support of new header definitions, which is required by network operators to apply new packet encapsulations. While SDN's logically centralized control plane could enhance network security by providing global visibility of the network state, it still has many side effects. The intelligent controllers that orchestrate the dumb switches are overloaded and become prone to failure. Delegating some level of control logic to the switches can offload the controllers from local state based decisions that do not require global network-wide knowledge. Thus, this paper, to the best of our knowledge, is the first to propose the delegation of typical security functions from specialized middleboxes to the data plane. We leverage the opportunities offered by P4 language to implement the functionality of authenticating nodes using port knocking. Our experimental results indicate that our proposed technique improves the network overall availability by offloading the controller as well as reducing the traffic in the network without noticeable negative impact on switches' performance.
  • Institut ProtectIT
  • Angewandte Informatik
  • DIGITAL
Vortrag
  • Amar Almaini
Authentication and port scan mitigation in the Software Defined Network Switches. Posterpräsentation

In: 6. Tag der Forschung

  • 2019
  • Elektrotechnik und Medientechnik
  • Institut ProtectIT
  • DIGITAL
Vortrag
  • A. Hawbani
  • Y. Zhang
  • Amar Almaini
  • A. Yassin
  • L. Zhao
  • R. Cao
2020 Master's Programs in Suzhou
  • 2019

DOI: 10.13140/RG.2.2.28640.43522

How to get a free scholarship at the most prestigious Chinese universities. This program is available for students with an undergraduate degree, and it often takes one to two years to complete.
  • Institut ProtectIT
  • Angewandte Informatik
Beitrag (Sammelband oder Tagungsband)
  • Michael Heigl
  • Laurin Dörr
  • Amar Almaini
  • D. Fiala
  • Martin Schramm
Incident Reaction Based on Intrusion Detections’ Alert Analysis, pg. 1-6.
  • 2018

DOI: 10.23919/AE.2018.8501419

The protection of internetworked systems by cryptographic techniques have crystallized as a fundamental aspect in establishing secure systems. Complementary, detection mechanisms for instance based on Intrusion Detection Systems has established itself as a fundamental part in holistic security eco-systems in the previous years. However, the interpretation of and reaction on detected incidents is still a challenging task. In this paper an incident handling environment with relevant components and exemplary functionality is proposed that involves the processes from the detection of incidents over their analysis to the execution of appropriate reactions. An evaluation of a selection of implemented interacting components using technology such as OpenFlow or Snort generally proofs the concept.
  • Institut ProtectIT
  • Elektrotechnik und Medientechnik
  • DIGITAL