Draft:Arash Habibi Lashkari

  • Comment: There are way too many claims in this article which are unsubstantiated, and perhaps will never be verified. Picking one, his h-factor at 32 is not high. Too much fluff. Ldm1954 (talk) 10:13, 1 March 2024 (UTC)
  • Comment: The following sections are unsourced and need to be referenced or removed: first two paragraphs in "Academic services", first paragraph in "Cybersecurity Open-source Analyzers", "Certifications" section. Thanks Lewcm Talk to me! 11:13, 21 December 2023 (UTC)

Arash Habibi Lashkari
Born (1974-11-03) November 3, 1974 (age 49)
Iran, Rasht
NationalityCanadian-Iranian
EducationUniversity of Malaya (MS in Computer Science), University of Technology Malaysia (Ph.D. in Computer Science)
Alma materYork University (YU), ON, Canada, University New Brunswick (UNB), NB, Canada
Occupation(s)Associate professor, educator, author
Known forCanada Research Chair in Cybersecurity
Websitehttps://www.ahlashkari.com/

Arash Habibi Lashkari (born November 3, 1974) is an associate professor, educator, and author, professionally known for serving as a Canada Research Chair (CRC) in cybersecurity. He is currently an associate professor at York University and a senior member of the Institute of Electrical and Electronics Engineers (IEEE). He also serves as an adjunct professor in the Department of Computer Science at the University of New Brunswick.[1]

He has been a lecturer for over two decades at several different institutions worldwide. He is also well-known as a pioneer in designing and producing Cybersecurity Datasets and open-source analyzers.[2]

Education edit

Lashkari earned a Bachelor of Science in computer software engineering from Islamic Azad University 1995. Then, in 2008, he enrolled in the University of Malaya, where he completed his Master of Science in computer science. Later, in 2014, he earned his Ph.D. in computer science from the University of Technology Malaysia. He also earned a postdoctoral fellowship on cybersecurity from the University of New Brunswick and a postdoctoral research internship from Mitacs in 2016.[3][4]

Career edit

Academic services edit

Upon his departure to Canada in 2015, he joined the University of New Brunswick as a research associate in the Computer Science department, where he was later promoted to serve as an assistant professor and then associate professor. He is an adjunct professor at the Faculty of Computer Science, University of New Brunswick (UNB).[5]

He is a senior member of IEEE and an associate professor at York University. Before this, he was also a research coordinator at the Canadian Institute for Cybersecurity (CIC).[6] His research is centered on the modeling and detection of cyber threats, the study of malware, the security of big data, the analysis of internet traffic, and the production of cybersecurity datasets.[1]

Lashkari is a Canada Research Chair (CRC) in cybersecurity. His current work involves developing vulnerability detection technology to protect network systems against cyberattacks, as he has more than two decades of concurrent industrial and development experience in network, software, and computer security. He oversees many research and development teams at once, all of which are engaged in various projects, including the analysis of network traffic, malware, Honeynets, and threat hunting. He was responsible for designing the first cybersecurity Capture the Flag (CTF) competition for post-secondary students in Canada. He is also well-known as a pioneer in designing and producing Cybersecurity Datasets and open-source analyzers.[7]

Research edit

Lashkari is among the most cited researchers in cybersecurity.[2] He is well-recognized for his research in Malware Analysis[8] and in several fields of cyber security, including Intrusion Detection Systems (IDS), Network Traffic,[9] and dark web analysis.[10][11]

Cybersecurity Datasets edit

These days, Machine Learning (ML) and Deep Learning (DL) techniques play a critical role in detecting serious cyber threats. A good dataset, on one side, helps train and create robust ML and DL systems and on the other side, supports research scholar in testing and evaluating their novel ideas to address various security problems. Lashkari was among the first and most famous researchers who generated and released more than 16 cybersecurity datasets[12] since 2015 and designed and developed different detection and characterization solutions using ML and DL in different cybersecurity areas.

For Encrypted traffic analysis and characterization, he generated three datasets, namely VPN-NonVPN-2015,[13] Tor-NonTor-2016,[14] and Darknet-2020, and proposed DIDarknet: a Contemporary Approach to Detect and Characterize the Darknet Traffic using Deep Image Learning.[15] In 2021, he proposed and developed a robust staking ensemble model for darknet traffic classification and characterization.[16]

In 2016, he explored a lightweight approach to the detection and categorization of malicious URLs according to their attack type, including Spam, Phishing, Malware, and Defacement, and generated the ISCX-URL-2016 dataset;[citation needed] later in 2020, he designed the first DoH tunnel analyzer using Time-series classification and produced CIRA-CIC-DoHBrow-2020 dataset funded by the Canadian Internet Registration Authority.[citation needed] In 2021, he proposed a lightweight hybrid data exfiltration and malicious DNS traffic analysis collaboratively with Bell Canada.[17][18]

From 2017 to 2020, he designed and developed three different Android malware analysis systems using ML and DL algorithms and proposed a systematic approach to generate the Android Malware datasets.[19] He generated four datasets on the Android Malware analysis domain, including AAGM-2017,[15] CIC-AndMal-2017,[20] CIC-InvesAndMal-2019,[21] and CCCS-CIC-AndMal-2020 along with proposing two new Deep Learning-based Android malware characterization solutions namely DIDroid and Entroplyzer collaboratively with the Canadian Centre for Cyber Security (CCCS).[22][23] Also, he proposed a fast and robust ML-based intrusion detection and characterization system and generated CIC-IDS-2017[24] and, after that, extended the project supported by AWS and produced the first and only IDS datasets for Amazon, namely CSE-CIC-IDS-2018.[25] He is the producer of the only available Distributed Denial of Service (DDoS) dataset, namely CIC-DDoS-2019, which covers 12 common DDoS attacks, including NTP, DNS, LDAP, MSSQL, NetBIOS, SNMP, SSDP, UDP, UDP-Lag, WebDDoS, SYN and TFTP.[13]

Cybersecurity Open-source Analyzers edit

In 2015, he designed and developed ISCXFlowMeter as one of the first network traffic flow generators and analyzers, extracting 32 features from the network traffic on the fly.[13][14] Later, in 2017, he expanded the analyzer and designed CICFlowMeter, which extracts more than 80 features in the fly.[24][25][13]

From 2019 to 2020, he proposed and produced three versions of Android Application Analyzers for detecting and characterizing malicious behaviors on smartphones; the first version covers the data collection and static feature extraction, the second version focuses on developing a classification model using AI for static features, and the third version has the dynamic analysis module and related features to improve the AI-based classifier.[22][23] In 2020, he designed and developed the first DoH analyzer, DoHLyzer, for encrypted DNS message analysis.[citation needed] In 2021, he introduced the first Memory Analyzer for ML and DL algorithms, VolMemLyzer.[14]

Publications edit

He has authored more than 110 academic articles on various cybersecurity-related topics.[26] He has also authored and contributed to books regarding cybersecurity, including;

  • Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends[27]
  • Understanding Cybersecurity Law in Data Sovereignty and Digital Governance: An Overview from a Legal Perspective[26]
  • Understanding Cybersecurity Law and Digital Privacy[26]
  • Understanding Cybersecurity Management in FinTech[26]
  • Mobile Operating systems and Programming[26]
  • Graphical User Authentication (GUA)[26]

Selected Articles: edit

  • "Robust Stacking Ensemble Model For Darknet Traffic Classification Under Adversarial Settings," Hardhik Mohanty, Arousha Haghighian Roudsari, and Arash Lashkari, Computers & Security, Vol 120, 2022
  • "QKeyShield: A practical receiver-device-independent entanglement-swapping-based quantum key distribution, “Mohammaed Aldarwbi, Ali Ghorbani, and Arash Habibi Lashkari, IEEE Access, 2022
  • "Memory Forensics Tools: A Comparative Analysis," Mahdi Daghmehchi Firoozjaeia, Arash Habibi Lashkari, and Ali A. Ghorbanic, Journal of Cyber Security Technology, Volume 6, 2022, DOI: 10.1080/23742917.2022.2100036
  • "A memory-based game-theoretic defensive approach for digital forensic investigators," Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A. Ghorbani, Forensic Science International: Digital Investigation, Volume 38, 2021
  • "KeyShield: A scalable and quantum-safe key management scheme," A Mohammed Y., AA Ghorbani, A Habibi Lashkari, IEEE Open Journal of the Communications Society, December 2020"A game-theoretic defensive approach for forensic investigators against rootkits," Saeed Shafiee Hasanabadi, Arash Habibi Lashkari, Ali A.Ghorbani, Forensic Science International: Digital Investigation, Volume 32, March 2020

Awards and honors edit

  • Bronze medal in the 13th Industrial and Technology Exhibition (INATEX) (Malaysia, 2012)
  • Bronze medal in the 14th Industrial and Technology Exhibition (INATEX) (Malaysia, 2013
  • Best of Security award in National APICTA (Malaysia, 2012)[28]
  • Best of security in East Asia and gold medal winner in International APICTA (Brunei, 2012)[28]
  • Two silver and two bronze medals in the 12th International Invention and Innovation Expo (MTE) (Malaysia, 2013)
  • Three silver and one bronze medals in the 24th International Invention, Innovation & Technology Exhibition (ITEX) (Malaysia, 2012)
  • The next 150 celebrating researchers who will shape Canada's future (Canada, 2017)[3][4]
  • The Fredrik and Catherine Eaton Visitorship Awards from the University of New Brunswick (UNB), NB, Canada (Canada, 2019)[29]
  • The Harrison McCain Foundation Young Scholar Award from the University of New Brunswick (UNB), NB, Canada (Canada, 2019)[29] The Research and Academic Leadership Award, ICSIC, Toronto, ON, Canada (Canada, 2019) Teaching Innovation Award of the 2019-2020 academic year, University of New Brunswick (UNB), Fredericton, NB, Canada (Canada, 2020)[30]
  • Gold medal in the Canadian Online Publishing Awards (COPA), on the Best Blog Column, Business Division for our "Understanding Canadian Cybersecurity Law" article series (Canada, 2021)
  • Became a senior member of the Institute of Electrical and Electronics Engineers (IEEE) (Canada, 2021)

Memberships edit

Senior Member of the Institute of Electrical and Electronics Engineers (IEEE) in Computer Science (R7)[31]

Recognition edit

  • Lashkari has earned 15 awards at international computer security competitions, including three gold awards, and was named one of Canada’s Top 150 Researchers for 2017.[3][4]
  • Lashkari was awarded the University of New Brunswick’s prestigious Teaching Innovation Award in 2020 for his personally-created teaching methodology, the Think-Que-Cushion method.[30]

References edit

  1. ^ a b "Arash Habibi Lashkari". Arash Habibi Lashkari. Retrieved 2023-12-20.
  2. ^ a b Montazerishatoori, Mohammadreza; Davidson, Logan; Kaur, Gurdip; Habibi Lashkari, Arash (2020). "Detection of DoH Tunnels using Time-series Classification of Encrypted Traffic". 2020 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). pp. 63–70. doi:10.1109/DASC-PICom-CBDCom-CyberSciTech49142.2020.00026. ISBN 978-1-7281-6609-4. S2CID 226852987. Retrieved 2023-12-20.
  3. ^ a b c "Mitacs".
  4. ^ a b c "UNB Researchers Named Among Top Researchers For Canada 150".
  5. ^ Mohanty, Hardhik; Roudsari, Arousha Haghighian; Lashkari, Arash Habibi (2022-09-01). "Robust stacking ensemble model for darknet traffic classification under adversarial settings". Computers & Security. 120: 102830. doi:10.1016/j.cose.2022.102830. ISSN 0167-4048.
  6. ^ "Researchers | About the CIC | Canadian Institute for Cybersecurity | UNB". www.unb.ca. Retrieved 2023-12-20.
  7. ^ "Arash Habib Laskhari | Canada Research Chair in Behaviour-Centric Cybersecurity". 29 November 2012.
  8. ^ Mahdavifar, Samaneh; Maleki, Nasim; Lashkari, Arash Habibi; Broda, Matt; Razavi, Amir H. (2021). "Classifying Malicious Domains using DNS Traffic Analysis". 2021 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech). pp. 60–67. doi:10.1109/DASC-PICom-CBDCom-CyberSciTech52372.2021.00024. ISBN 978-1-6654-2174-4. S2CID 247476978. Retrieved 2023-12-20.
  9. ^ Lashkari, Arash Habibi; Kadir, Andi Fitriah A.; Taheri, Laya; Ghorbani, Ali A. (2018). "Toward Developing a Systematic Approach to Generate Benchmark Android Malware Datasets and Classification". 2018 International Carnahan Conference on Security Technology (ICCST). pp. 1–7. doi:10.1109/CCST.2018.8585560. ISBN 978-1-5386-7931-9. S2CID 56718203. Retrieved 2023-12-20.
  10. ^ Lashkari, Arash Habibi; a.Kadir, Andi Fitriah; Gonzalez, Hugo; Mbah, Kenneth Fon; a. Ghorbani, Ali (2017). "Towards a Network-Based Framework for Android Malware Detection and Characterization". 2017 15th Annual Conference on Privacy, Security and Trust (PST). pp. 233–23309. doi:10.1109/PST.2017.00035. ISBN 978-1-5386-2487-6. S2CID 52918015. Retrieved 2023-12-20.
  11. ^ Taheri, Laya; Kadir, Andi Fitriah Abdul; Lashkari, Arash Habibi (2019). "Extensible Android Malware Detection and Family Classification Using Network-Flows and API-Calls". 2019 International Carnahan Conference on Security Technology (ICCST). pp. 1–8. doi:10.1109/CCST.2019.8888430. ISBN 978-1-7281-1576-4. S2CID 207831025. Retrieved 2023-12-20.
  12. ^ Keyes, David Sean; Li, Beiqi; Kaur, Gurdip; Lashkari, Arash Habibi; Gagnon, Francois; Massicotte, Frederic (2021). "EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics". 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). pp. 1–12. doi:10.1109/RDAAPS48126.2021.9452002. ISBN 978-1-7281-6937-8. S2CID 235455807. Retrieved 2023-12-20.
  13. ^ a b c d Sharafaldin, Iman; Lashkari, Arash Habibi; Hakak, Saqib; Ghorbani, Ali A. (2019). "Developing Realistic Distributed Denial of Service (DDoS) Attack Dataset and Taxonomy". 2019 International Carnahan Conference on Security Technology (ICCST). pp. 1–8. doi:10.1109/CCST.2019.8888419. ISBN 978-1-7281-1576-4. S2CID 207831821. Retrieved 2023-12-20.
  14. ^ a b c Lashkari, Arash Habibi; Li, Beiqi; Carrier, Tristan Lucas; Kaur, Gurdip (2021). "VolMemLyzer: Volatile Memory Analyzer for Malware Classification using Feature Engineering". 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). pp. 1–8. doi:10.1109/RDAAPS48126.2021.9452028. ISBN 978-1-7281-6937-8. S2CID 235454590. Retrieved 2023-12-20.
  15. ^ a b "Arash Habibi Lashkari - IEEE Xplore". ieeexplore.ieee.org. Retrieved 2023-12-20.
  16. ^ "Streamlining Cybersecurity Knowledge Retrieval - The Power Of Information Extraction Tools And Prof. Arash Habibi Lashkari's Groundbreaking".
  17. ^ SeventhQueen (2023-11-02). "Prof. Arash Habibi Lashkari's Pioneering Contribution to Unlocking Cybersecurity Insights: The Essential Role of Cybersecurity Datasets". WriteUpCafe.com. Retrieved 2023-12-20.
  18. ^ "Arash Habibi Lashkari's Pioneering Contribution to Unlocking Cybersecurity Insights: The Essential Role of Cybersecurity Dataset". 2023-11-13. Retrieved 2023-12-20.
  19. ^ "Apple, Google Not Doing Enough To Fight App-Store Malware, Say Security Experts".
  20. ^ "Fake COVID Notification Apps And Websites Aim To Steal Money And Personal Data".
  21. ^ Understanding Cybersecurity on Smartphones.
  22. ^ a b Rahali, Abir; Lashkari, Arash Habibi; Kaur, Gurdip; Taheri, Laya; GAGNON, FRANCOIS; Massicotte, Frédéric (2021-03-13). "DIDroid: Android Malware Classification and Characterization Using Deep Image Learning". 2020 the 10th International Conference on Communication and Network Security. ICCNS '20. New York, NY, USA: Association for Computing Machinery. pp. 70–82. doi:10.1145/3442520.3442522. ISBN 978-1-4503-8903-7. S2CID 232220016.
  23. ^ a b Keyes, David Sean; Li, Beiqi; Kaur, Gurdip; Lashkari, Arash Habibi; Gagnon, Francois; Massicotte, Frederic (2021). "EntropLyzer: Android Malware Classification and Characterization Using Entropy Analysis of Dynamic Characteristics". 2021 Reconciling Data Analytics, Automation, Privacy, and Security: A Big Data Challenge (RDAAPS). pp. 1–12. doi:10.1109/RDAAPS48126.2021.9452002. ISBN 978-1-7281-6937-8. S2CID 235455807. Retrieved 2023-12-20.
  24. ^ a b Sharafaldin, Iman; Lashkari, Arash Habibi; Ghorbani, Ali A. (2023-12-20). "Toward Generating a New Intrusion Detection Dataset and Intrusion Traffic Characterization". Proceedings of the 4th International Conference on Information Systems Security and Privacy ICISSP - Volume 1. Scite Press. pp. 108–116. doi:10.5220/0006639801080116. ISBN 978-989-758-282-0.
  25. ^ a b "A Realistic Cyber Defense Dataset (CSE-CIC-IDS2018) - Registry of Open Data on AWS". registry.opendata.aws. Retrieved 2023-12-20.
  26. ^ a b c d e f "Arash Habibi Lashkari". scholar.google.ca. Retrieved 2023-12-20.
  27. ^ Kaur, Gurdip; Lashkari, Arash Habibi; Sharafaldin, Iman; Lashkari, Ziba Habibi (2023-01-10). Understanding Cybersecurity Management in Decentralized Finance: Challenges, Strategies, and Trends (1st (2023) ed.). Springer Nature. ISBN 978-3-031-23339-5.
  28. ^ a b "Research Matters - UNB" (PDF).
  29. ^ a b "UNB Professors Receive Teaching Innovation Award".
  30. ^ a b "Researchers | About the CIC | Canadian Institute for Cybersecurity | UNB". www.unb.ca. Retrieved 2023-12-20.
  31. ^ "Arash Habibi Lashkari - Author". ieeexplore.ieee.org. Retrieved 2023-12-20.