me

I am a cyber-security enthusiast, I enjoy coding and making new things.

I like to teach others to code, invent their dreams and stay safe in today's increasingly connected world.

I specialize in data analytics and machine learning. My research is in employing these skills to protect our safety in IoT environments and the privacy of our digital data in cyberspace.

I also do cyber security consultancy, freelance software development and am a proud father of four.

Media

Teaching

Cyber-security

Hacking and Making

Research and Professional Appointments

Publications

  1. Shah, Syed Luqman, Irshad Ahmed Abbasi, Alwalid Bashier Gism Elseed, Sikandar Ali, Zahid Anwar, Qasim Rajpoot, and Maria Riaz. TAMEC: Trusted Augmented Mobile Execution on Cloud. Scientific Programming 2021.

  2. Raihan ur Rasool, Khandakar Ahmed, Zahid Anwar, Hua Wang, Usman Ashraf, Wajid Rafique, CyberPulse++: A machine learning-based security framework for detecting link flooding attacks in software defined networks. Int J Intell Syst. 36: 3852- 3879. 2021.

  3. Raihan ur Rasool, Hua Wang, Usman Ashraf, Khandakar Ahmed, Zahid Anwar and Wajid Rafique. A survey of link flooding attacks in software defined network ecosystems. Journal of Network and Computer Applications, page 102803, 2020.

  4. Umara Noor, Zahid Anwar , Jörn Altmann, and Zahid Rashid. Customer-oriented ranking of cyber threat intelligence service providers. Electronic Commerce Research and Applications, 41, 2020

  5. Zafar Iqbal and Zahid Anwar. Scerm—a novel framework for automated management of cyber threat response activities. Future Generation Computer Systems, 2020

  6. Raihan Ur Rasool, Usman Ashraf, Khandakar Ahmed, Hua Wang, Wajid Rafique, and Zahid Anwar. Cyberpulse: A machine learning based link flooding attack mitigation system for software defined networks. IEEE Access, 7:34885–34899, 2019

  7. Saqib Kazmi, Mehreen Ahmed, Rafia Mumtaz, and Zahid Anwar. Spatiotemporal clustering and analysis of road accident hotspots by exploiting gis technology and kernel density estimation. The Computer Journal, 2019

  8. Asad Waqar Malik, Imran Mahmood, Nadeem Ahmed, and Zahid Anwar. Big data in motion: A vehicle-assisted urban computing framework for smart cities. IEEE Access, 7:55951–55965, 2019.

  9. Umara Noor, Zahid Anwar, Tehmina Amjad, and Kim-Kwang Raymond Choo. “A Machine Learning-based FinTech Cyber Threat Attribution Framework using High-level Indicators of Compromise”. Future Generation Computer Systems, 96:227–242, 2019.

  10. Umara Noor, Zahid Anwar, Asad Waqar Malik, Sharifullah Khan, and Shahzad Saleem. “A Machine Learning Framework for investigating Data Breaches based on Semantic Analysis of Adversary’s Attack Patterns in Threat Intelligence Repositories”. Future Generation Computer Systems, 95:467–487, 2019.

  11. Raihan ur Rasool, Maleeha Najam, Hafiz Farooq Ahmad, Hua Wang, and Zahid Anwar. “A Novel JSON Based Regular Expression Language For Pattern Matching in the Internet of Things”. Ambient Intelligence and Humanized Computing, 10(4):1463–1481, May 2018.

  12. Imran Khan, Habib ur Rehman, Mohammad Hussein Fayiz Al-khatib, Zahid Anwar, and Masoom Alam. “A Thin Client Friendly Trusted Execution Framework for Infrastructureas-a-Service Clouds”. Future Generation Computer Systems, 89:239 – 248, 2018.

  13. Asad W Malik, Raihan ur Rasool, Zahid Anwar, and Shahid Nawaz. “A Generic Framework for Application Streaming Services”. Computers & Electrical Engineering, 66:149–161, 2018.

  14. Mujahid Mohsin, Zahid Anwar, Farhat Zaman, and Ehab Al-Shaer. “IoTChecker: A Data-driven Framework for Security Analytics of Internet of Things Configurations”. Computers & Security, 70:199–223, 2017.

  15. Mujahid Mohsin, Muhammad Usama Sardar, Osman Hasan, and Zahid Anwar. “IoTRiskAnalyzer: A Probabilistic Model Checking Based Framework for Formal Risk Analytics ofthe Internet of Things”. IEEE Access, 5:5494–5505, 2017.

  16. Sara Qamar,Zahid Anwar, Mohammad Ashiqur Rahman, Ehab Al-Shaer, and Bei-Tseng Chu. “Data-driven Analytics for Cyber-threat Intelligence and Information Sharing”. Computers & Security, 67:35–58, 2017.

  17. Asad W Malik, Kashif Bilal, SU Malik, Zahid Anwar, Khurram Aziz, Dzmitry Kliazovich, Nasir Ghani, Samee U Khan, and Rajkumar Buyya. “CloudNetSim++: A GUI Based Framework for Modeling and Simulation of Data Centers in OMNeT++”. IEEE Transactions on Services Computing, 10(4):506–519, 2017.

  18. Imran Khan, Zahid Anwar, Behzad Bordbar, Eike Ritter, and Habib ur Rehman. “A Protocol for Preventing Insider Attacks in Untrusted Infrastructure-as-a-Service Clouds”. IEEE Transactions on Cloud Computing, 6:942 – 954, 2016.

  19. Usman Shaukat, Ejaz Ahmed, Zahid Anwar, and Feng Xia. “Cloudlet Deployment in Local Wireless Networks: Motivation, Architectures, Applications, and Open Challenges”. Journal of Network and Computer Applications (JNCA), 62:18–40, 2016.

  20. Hira Asghar, Zahid Anwar, and Khalid Latif. “A Deliberately Insecure RDF-based Semantic Web Application Framework for Teaching SPARQL/SPARUL Injection Attacks and Defense Mechanisms”. Computers & Security, 58:63–82, 2016.

  21. Usman Shaukat and Zahid Anwar. “A Fast and Scalable technique for Constructing Multicast Routing Trees with Optimized Quality of Service using a Firefly based Genetic Algorithm”. Multimedia Tools and Applications, 75:2275–2301, 2016.

  22. Zafar Iqbal and Zahid Anwar. “Ontology Generation of Advanced Persistent Threats and their Automated Analysis”. NUST Journal of Engineering Sciences (NJES), 9(2):68–75,2016.

  23. Mujahid Mohsin, Zahid Anwar, and Farhat Zaman. “Towards a Generic Model for Risk Analysis of the Internet of Things (IoT)”. NUST Journal of Engineering Sciences (NJES),9(2):42–49, 2016.

  24. Saman Iftikhar, M Kamran, and Zahid Anwar. “RRW-A Robust and Reversible Watermarking Technique for Relational Data”. IEEE Transactions on Knowledge and Data Engineering, 27(4):1132–1145, 2015.

  25. Naila Karim, Khalid Latif, Zahid Anwar, Sharifullah Khan, and Amir Hayat. “Storage schema and ontology-independent SPARQL to HiveQL translation”. Supercomputing, 71(7):2694–2719, 2015.

  26. Zahid Anwar and Waqas Ahmad Khan. “Guess Who Is Listening In To the Board Meeting: On the Use of Mobile Device Applications as Roving Spy Bugs”. Security and Communication Networks, 8(16):2813–2825, 2015.

  27. Saman Iftikhar, M Kamran, and Zahid Anwar. “A Survey on Reversible Watermarking Techniques for Relational Databases”. Security and Communication Networks, 8:2580–2603, 2015.

  28. Saman Iftikhar, Sharifullah Khan, Zahid Anwar, and Muhammad Kamran. “GenInfoGuardA Robust and Distortion-Free Watermarking Technique for Genetic Data”. PloS one, 10(2), 2015.

  29. Abdul Razzaq, Khalid Latif, H. Farooq Ahmad, Ali Hur, Zahid Anwar, and Peter Charles Bloodsworth. “Semantic Security against Web Application Attacks”. Information Sciences, 254:19 – 38, 2014.

  30. Abdul Razzaq, Zahid Anwar, H. Farooq Ahmad, Khalid Latif, and Faisal Munir. “Ontology for Attack Detection: An Intelligent Approach to Web Application Security”. Computers and Security, 45:124 – 146, 2014.

  31. Zahid Anwar and Asad Waqar Malik. “Can a DDoS Attack Meltdown My Data Center? A Simulation Study and Defense Strategies”. IEEE Communications Letters, 18(7):1175–1178, 2014.

  32. Saba Maqbool, Sana Maqbool, Zahid Anwar, and Asad. W . Malik. “In depth Analysis of Volunteer Computing Frameworks: A Case Study”. International Journal of Business and Social Sciences, 2(3):42–56, 2014.

  33. Zahid Anwar, Mirko Montanari, Alejandro Gutierrez, and Roy H Campbell. “Budget Constrained Optimal Security Hardening of Control Networks for Critical CyberInfrastructures”. International Journal of Critical Infrastructure Protection, 2(1):13–25, 2009.

  34. Zahid Anwar and Roy Campbell. “Automated Assessment of Critical Infrastructures for Compliance to CIP Best Practices”, volume 290 of IFIP Advances in Information and Communication Technology, chapter 11, pages 173–187. Springer, 2008.

  35. Yumna Ghazi, Zahid Anwar, Rafia Mumtaz, Shahzad Saleem, and Ali Tahir. “A Supervised Machine Learning Based Approach for Automatically Extracting High-Level Threat Intelligence from Unstructured Sources”. In Frontiers of Information Technology, 2018.

  36. Zafar Iqbal, Zahid Anwar, and Rafia Mumtaz. “STIXGEN - A novel framework for Automatic Generation of Structured Cyber Threat Information”. In Frontiers of Information Technology, 2018.

  37. Umara Noor, Zahid Anwar, and Zahid Rashid. “An Association Rule Mining Based Framework for Profiling Regularities in Tactics, Techniques and Procedures of Cyber Threat Actors”. In IEEE International Conference on Smart Computing and Electronic Enterprise, 2018.

  38. Amna Shahzadi and Zahid Anwar. “Cyber Security Legislature: Challenges and Remedies”. In International Symposium on Advances in Computer Information Sciences (ISACIS), pages 1–8., 2017.

  39. Mujahid Mohsin and Zahid Anwar. “Where to Kill the Cyber Kill-Chain: An OntologyDriven Framework for IoT Security Analytics”. In IEEE International Conference on Frontiers of Information Technology (FIT), 2016.

  40. Rana Khattak and Zahid Anwar. “D3TAC: Utilizing Distributed Computing for DDoS Attack Traffic Analysis on the Cloud”. In IEEE International Multi-Topic Conference (INMIC), 2016.

  41. Mujahid Mohsin, Zahid Anwar, Ghaith Husari, Mohammad Rahman, and Ehab Al-Shaer. “IoTSAT: A Formal Framework for Security Analysis of the Internet of Things”. In IEEE Conference on Communications and Network Security (CNS), Philadelphia, Pennsylvania, 2016.

  42. David Samuel Bhatti, Nazar Abbas Saqib, and Zahid Anwar. “SCEAMS: Secure Corporate Environment Adhered to Mobile Smartphones”. In Sixth International Conference on Innovative Computing Technology (INTECH), pages 561–566, Aug 2016.

  43. Saman Iftikhar, Zahid Anwar, and Muhammad Kamran. “A Novel and Robust Fingerprinting Technique for Digital Data based on Genetic Algorithm”. In IEEE Conference on High-capacity Optical Networks and Emerging Technologies (HONET), 2014.

  44. Ubaid Ur Rehman, Amir Ali, and Zahid Anwar. “secCloudSim: Secure Cloud Simulator”.In IEEE International Conference on Frontiers of Information Technology (FIT), 2014.

  45. Mahmood Ahmad, Zahid Anwar, and Sungyoung Lee. “Privacy Preserving e-Health Data Sharing in the Cloud-Extended Utilization of Anonymization with Random Effect”. Korea Information Science Society 40th Annual General Meeting and Fall Conference, 2013.

  46. Mudassir Masood, Zahid Anwar, S Ali Raza, and Ali Hur. “EDoS Armor: A Cost Effective Economic Denial of Sustainability Attack Mitigation Framework for E-Commerce Applications in Cloud Environments”. In IEEE International Multi Topic Conference (INMIC),2013.

  47. Zahid Anwar, Marya Sharf, Essam Khan, and Muhammad Mustafa. “VG-MIPS: A Dynamic Binary Instrumentation Framework for Multi-Core MIPS Processors”. In IEEE International Multi Topic Conference (INMIC), 2013.

  48. Umara Noor, Zahid Anwar, Yasir Mehmood, and Waseem Aslam. “TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks”. In IEEE International Conference on Frontiers of Information Technology (FIT), 2013.

  49. Mohsin Ikram, Qurrat-Ul-Ain Babar, Zahid Anwar, and Asad Waqar Malik. “GSAN:Green Cloud-Simulation for Storage Area Networks”. In IEEE International Conference on Frontiers of Information Technology (FIT), 2013.

  50. Sidra Shahbaz, Asiah Mahmood, and Zahid Anwar. “SOAD: Securing Oncology EMR by Anonymizing DICOM Images”. In IEEE International Conference on Frontiers of Information Technology (FIT), 2013.

  51. Hirra Anwar, Sarah Masood, and Zahid Anwar. “PISA: Improving the Pseudo-Randomness of Pen-and-Paper ciphers based on the Solitaire algorithm”. In IEEE International Multitopic Conference (INMIC), 2012.

  52. Ali Ahmad, Zahid Anwar, Ali Hur, and Hafiz Farooq Ahmad. “Formal reasoning of Web Application Firewall Rules through Ontological Modeling”. In International Multitopic Conference (INMIC), 2012.

  53. Usman Shaukat Qurashi and Zahid Anwar. “AJAX based attacks: Exploiting Web 2.0”. In IEEE International Conference on Emerging Technologies (ICET), 2012.

  54. Saif Ur Rehman, Raihan Ur Rasool, M Sohaib Ayub, Saeed Ullah, Aatif Kamal, Qasim M Rajpoot, and Zahid Anwar. “Reliable Identification of Counterfeit Medicine using Camera Equipped Mobile Phones”. In IEEE High Capacity Optical Networks and Enabling Technologies (HONET), pages 273–279, 2011.

  55. Imran Khan, Habib-ur Rehman, and Zahid Anwar. “Design and Deployment of a TrustedE ucalyptus Cloud”. In IEEE International Conference on Cloud Computing (CLOUD), pages 380–387, 2011.

  56. Zafarullah, Faiza Anwar, and Zahid Anwar. “Digital Forensics for Eucalyptus”. In IEEE Conference on Frontiers of Information Technology (FIT), pages 110–116, 2011.

  57. Rana Khattak, Shehar Bano, Shujaat Hussain, and Zahid Anwar. “DOFUR: DDoS Forensics Using MapReduce”. In IEEE Conference on Frontiers of Information Technology (FIT), pages 117–120, 2011.

  58. Rahat Masood, Ume Ghaiza, and Zahid Anwar. “SWAM: Stuxnet Worm Analysis in Metasploit”. In IEEE Conference on Frontiers of Information Technology (FIT), pages 142–147, 2011.

  59. Mohammad Ali, Humayun Ali, and Zahid Anwar. “Enhancing Stealthiness & Efficiency of Android Trojans and Defense Possibilities (EnSEAD)-Android’s Malware Attack, Stealthiness and Defense: An Improvement”. In IEEE Conference on Frontiers of Information Technology (FIT), pages 148–153, 2011.

  60. Muhammad Afzal, Maqbool Hussain, Mahmood Ahmad, and Zahid Anwar. “Trusted framework for Health Information Exchange”. In IEEE Conference on Frontiers of Information Technology (FIT), pages 308–313, 2011.

  61. Khalid Hafeez, Muddassar Masood, Owais Malik, and Zahid Anwar. “LASSP: A Logic Analyzer for Tweaking Snort Security and Performance”. In IEEE International Conferenc on Emerging Technologies (ICET), pages 240–245, 2010.

  62. Shujaat Hussain, Mohsin Abbass, Owais Malik, and Zahid Anwar. “SLOGS: Security through predicate LOGic in SSH”. In IEEE International Conference on Emerging Technologies (ICET), pages 256–260, 2010.

  63. Zahid Rashid, Abdul Basit, and Zahid Anwar. “TRDBAC: Temporal Reflective Database Access Control”. In IEEE International Conference on Emerging Technologies (ICET), 2010.

  64. Zahid Anwar, Zhiguo Wang, Chun Wang, Dan Ni, Yaofeng Xu, and Yuhong Yan. “An Integer Programming Model and Heuristic Algorithm for Automatic Scheduling in Synchrotron Facilities”. In IEEE International Conference on Systems, Man and Cybernetics (SMC),pages 4048–4053, 2009.

  65. Zahid Anwar, Ravinder Shankesi, and Roy H Campbell. “Automatic Security Assessment of Critical Cyber-infrastructures”. In IEEE International Conference on Dependable Systems and Networks (DSN), pages 366–375, 2008.

  66. Zahid Anwar and Roy H Campbell. “Secure Reincarnation of Compromised Servers Using Xen Based Time-Forking Virtual Machines”. In IEEE International Conference on Pervasive Computing and Communications Workshops, pages 477–482, 2007.

  67. Zhenyu Yang, Yi Cui, Zahid Anwar, Robert Bocchino, Nadir Kiyanclar, Klara Nahrstedt, Roy H Campbell, and William Yurcik. “Real-Time 3D Video Compression for TeleImmersive Environments”. In Electronic Imaging 2006. International Society for Optics and Photonics, 2006.

  68. Zahid Anwar, Jun Wang, William Yurcik, and Roy H Campbell. “SPEEDS - Small-world Privacy-Enhanced Engine for Distributed Search: Toward Enhancing Privacy Protection in P2P Social Network Communities”. In International Conference on Telecommunication Systems -Modeling & Analysis (ICTSM), pages 332–335. Penn State Berks Campus, 2006.

  69. William Yurcik, Charis Ermopoulos, Yifan Li, Chao Liu, Xin Meng, and Zahid Anwar.“Masquerade Detection for HPC Cluster Security: Explanatory Analysis”. In Cluster-Sec, 6th IEEE Inter Symposium on Cluster Computing & the Grid, pages 332–335, 2006.

  70. Zahid Anwar, William Yurcik, Ralph E Johnson, Munawar Hafiz, and Roy H Campbell.“Multiple Design Patterns for Voice over IP (VoIP) Security”. In 25th IEEE International Performance, Computing, and Communications Conference,, 2006. IPCCC 2006., 2006.

  71. Zahid Anwar, Jalal Al-Muhtadi, William Yurcik, and Roy H Campbell. “Plethora: A Framework for Converting Generic Applications to run in a Ubiquitous Environment”. In IEEE Conference on Mobile and Ubiquitous Systems: Networking and Services (MobiQuitous), 2005.

  72. Zahid Anwar, William Yurcik, Salman Baset, Henning Schulzrinne, and Roy H Campbell.“A First Step towards Call Survivability in Cellular Networks”. In The IEEE Conference on Local Computer Networks (LCN), 2005.

  73. Zahid Anwar, William Yurcik, and Roy H Campbell. “A Survey and Comparison of Peer-toPeer Group Communication Systems Suitable for Network-Centric Warfare”. In Defense and Security Symposium, pages 33–44. International Society for Optics and Photonics, 2005.

  74. Ragib Hasan, Zahid Anwar, William Yurcik, Larry Brumbaugh, and Roy Campbell. “A Survey of Peer-to-Peer Storage Techniques for Distributed File Systems”. In IEEE International Conference on Information Technology: Coding and Computing, 2005. (ITCC), volume 2, pages 205–213, 2005.

  75. Zahid Anwar. “Linking PSTN to IP Networks-The Softswitch Signaling Gateway”. In IEEE International Multi Topic Conference (INMIC), pages 57–57, 2002.

CV

Education

  • 2008 PhD Computer Science. University of Illinois at Urbana-Champaign.
  • 2005 MS Computer Science. University of Illinois at Urbana-Champaign.
  • 2001 BS Computer Systems Eng. GIK Institute of Eng. Sci & Tech. Pakistan.


Certifications

  • AWS Certified Solutions Architect Associate
  • CompTIA Network Vulnerability Assessment Professional
  • CompTIA PenTest+.
  • CompTIA Security+.