Vahid Aghaei

Vahid Aghaei Foroushani
Graduated PhD. Student
Supervisor: Prof. Nur Zincir-Heywood
Email: my-first-name@cs.dal.ca

2nd Floor, Playground 235
Faculty of Computer Science
Dalhousie University
6050 University Avenue
PO BOX 15000
Halifax, NS B3H 1W5
Canada

Dalhousie University
Education | Work Experience | Teaching | Academic Projects | Publications | Award and Scholarships | Professional Certifications


My name is Vahid Aghaei Foroushani. I've been working in the faculty of computer science (NIMS Lab) at Dalhousie University as a PhD student since September 2011. See more.


EDUCATION
  • Ph.D. of Computer Science, September 2011- October 2016
    • Dalhousie University, Halifax, NS
    • Research Topic: The thesis is focused on finding the source of attacks on Internet, using IP Traceback, machine learning, cryptography and traffic analysis algorithms.
  • Master of Engineering in Information Technology in field of Computer Networks, September 2005 – September 2008
    • Yazd University, Yazd, Iran
    • Thesis Topic: Intrusion detection in encrypted access with SSH protocol to network public servers.
    • Advisor: Dr. F. Adibnia
    • GPA: 17.67 over 20.
  • Bachelor of Engineering in Computer Hardware Engineering, September 2001- August 2005
    • Najafabad University, Esfahan, Iran
    • GPA: 15.92/20
WORK EXPERIENCE
  • Research Assistant, Jan. 2012 – Jun. 2016
  • Dalhousie University, Halifax, NS
    • Worked with tools and techniques used by attackers to gather information and launch attacks such as Kali Linux, Nmap and Zenmap.
    • Conducted vulnerability assessments and penetration testing, using tools such as Nessuse vulnerability scanner and Metasploit penetration testing.
    • Experienced in network virtualization and sandbox implementation for malware behavior analysis and IP-Traceback Scenarios.
    • Worked with different cryptography algorithms for secure network communication and traffic encryption in watermarking projects.
    • Investigated application behavior in network traffic traces, using machine learning techniques.
    • Analyzed network and application logs, forensic and malware using event correlation and machine learning techniques.
    • Reviewing and analyzing network packet captures.
    • Performed detailed technical analyses of cyber threats.
    • Generated new attack signatures by analyzing indicators of compromise.
    • Development and implementation of novel approaches for addressing the IP address spoofing, flow control, traffic behavior analysis, encryption and authentication.
    • Conducted seminars, discussion groups and laboratory sessions on the state of the art approaches on Intrusion Detection Systems, IP-Traceback techniques and Flow control methods.
  • Network Technical Manager, May 2008- August 2011
  • Sepanta Company, Tehrann
    • Lead IT team.
    • Identified and analyzed business requirements and participate in the design, planning, development, and facilitation of cost-effective business solutions.
    • Provided leadership in the identification of any potential issues, such as network and server infrastructure, single points of failure and capacity planning.
    • Communicated to stakeholders on the security risks and events.
    • Operated master consoles to configure routers and switches and monitor the Sepanta network performance locally and remotely.
  • Network Administrator, February 2006 to April 2008
  • Arico Company, Esfahan
    • Evaluate and install computer hardware, networking software, operating system and software applications.
    • Provide problem-solving services to network users.
TEACHING
  • Teaching Assistant, Faculty of Computer Science, Dalhousie University
    • CSCI 3171, Network Computing, Winter 2012 and Winter 2015
    • CSCI 6706, Network Design and Management, Fall 2014
    • CSCI 1200, Introduction to computing for non-majors, Fall 2011
  • Computer Engineering Department, Khorasgan University, Isfahan, Iran, 2009-2011
    • Computer Networks, Andrew S Tanenbaum
    • Multimedia Systems
    • Computer System Architecture, M. Morris Mano
    • Advanced Logic Design, Morris Mano
  • Computer Engineering Department, Khomeinishahr University, Khomeinishahr, Isfahan, Iran, 2008-2009
    • Computer Networks, Andrew S Tanenbaum
    • Logic Design, M. Morris Mano
    • Logic Design Lab
    • B. Sc. final Project
  • Computer Engineering Department, Najafabad University, Tiran, Isfahan, Iran, 2009
    • Computer Networks, Andrew S Tanenbaum
    • Network Lab
  • Network Lab, Sepanta Company, Yazd, Iran, 2006-2007
    • Windows Server 2003
    • Active Directory
ACADEMIC PROJECTS
  • A NAT/Proxy Identifier based on Patterns in Traffic Flows, Winter 2013 and Winter 2014
  • Dalhousie University, Halifax, NS
    • Identified NAT/proxy traffic as seen in a traffic log file without any access to the NAT/proxy server or the clients behind it.
  • Investigating Application Behaviour in Network Traffic Traces, Winter 2012
  • Dalhousie University, Halifax, NS
    • Identified high level application behaviour in a given traffic trace without looking into the content or without checking a static attribute such as the port number, IP address and protocol to determine the application type. The effectiveness of this approach on five encrypted applications namely SSH, Skype, Gtalk, SSL (No Web) and HTTPS has been tested.
  • Using Text Message to Improve Network Management, Fall 2006 - Winter 2007
  • Yazd University, Yazd, Iran
    • Created a program to control and administrate networks remotely by mobile phones and text messages.
PUBLICATIONS
  • Vahid Aghaei-Foroushani and A. Nur Zincir-Heywood, “Autonomous System based Flow Marking Scheme for IP-Traceback”, IEEE/IFIP Network Operations and Management Symposium (NOMS 2016), Istanbul, Turkey, April 2016.
  • Vahid Aghaei-Foroushani and A. Nur Zincir-Heywood, “Deterministic Flow Marking for IPv6 Traceback (DFM6)”, 11th International Conference on Network and Service Management (CNSM), Barcelona, Spain, November 2015.
  • Vahid Aghaei-Foroushani and A. Nur Zincir-Heywood, “Probabilistic Flow Marking for IP-Traceback (PFM)”, 7th International Workshop on Reliable Networks Design and Modeling (RNDM), Munich, Germany, October 2015.
  • Vahid Aghaei-Foroushani and A. Nur Zincir-Heywood, “Investigating Unique Flow Marking for Tracing Back DDoS Attacks”, the IFIP/IEEE Integrated Network Management Symposium (IM 2015), Ottawa, Canada, May 2015.
  • Vahid Aghaei-Foroushani and A. Nur Zincir-Heywood, “A Proxy Identifier based on Patterns in Traffic Flows”, 16th IEEE International Symposium on High Assurance Systems Engineering (Hase 2015), Daytona Beach, Florida, January 2015.
  • Yasemin Gokcen, Vahid Aghaei Foroushani and A.N. Zincir-Heywood, “Can we identify NAT behavior by analyzing Traffic Flows?”, IEEE Security and Privacy Workshops on Cyber Crime (IWCC 2014), San Jose, May 18, 2014.
  • V Aghaei-Foroushani and N Zincir-Heywood, “TDFA: Traceback-based Defense against DDoS Flooding Attacks ”, 28th IEEE International Conference on Advanced Information Networking and Applications (AINA2014), Victoria, Canada, May 2014
  • V. Aghaei-Foroushani and A.N. Zincir-Heywood, “IP traceback through (authenticated) deterministic flow marking: an empirical evaluation”, EURASIP Journal on Information Security, 2013.
  • V Aghaei-Foroushani and N Zincir-Heywood, “On evaluating IP traceback schemes: a practical perspective”, IEEE International Workshop on Cyber Crime (IWCC 2013), pp. 127-134, San Francisco, 13-24 May 2013.
  • V. Aghaei-Foroushani and N. Zincir-Heywood, "Investigating Application Behavior in Network Traffic Traces", 2013 IEEE Symposium Series on Computational Intelligence (SSCI 2013), Singapore, April 2013.
  • V. Aghaei-Foroushani and N. Zincir-Heywood, "Deterministic and Authenticated Flow Marking for IP Traceback", The 27th IEEE International Conference on Advanced Information Networking and Applications (AINA-2013), Barcelona, Spain, March 2013.
  • V. Aghaei, F. Adibnia and E. Hojati, "Intrusion detection in encrypted access with SSH protocol to network public servers", IEEE International Conference on Computer and Communication Engineering (ICCCE 08), Kuala Lumpur, Malaysia, ISBN: 978-1-4244- 1691-2, May 2008.
  • M. Sarram, M. Ghasemzadeh and V. Aghaei, "Remote Control and Overall Administration of Computer Networks, Using Short Message Service", 3rd IEEE International Conference on Information & Communication Technologies (ICTTA 08), Damascus, Syria, ISBN: 978-1-4244-1751-3, April 2008.
  • V. Aghaei, F. Haddadi, M. Ghasemzadeh and M.A. Sarram, "Using Matrix Operations and Statistical Analysis in Intrusion Detection in Encrypted Access with SSH Protocol", Third International Conference on Mathematical Sciences (ICM 2008), Al Ain, UAE, March 2008.
  • Vahid Aghaei, M. Ghasemzadeh and Hamid Legha, "Statistical Analysis and Using SMS to upgrade network management", Third International Conference on Mathematical Sciences (ICM 2008), Al Ain, UAE, March 2008.
  • V. Aghaei, F. Adibni and E. Hojati, "Intrusion detection in encrypted access with SSH protocol to network public servers" (in Persian), The Third Conference on Information and Knowledge Technology (IKT 2007), Mashad - Iran, Dec 2007, (Pub. on CD).
  • M. Ghasemzadeh, K. Mizanian, V. Aghaei and H. Legha, "Remote Control and Administration of Computer and Telecommunication Networks Using SMS" (in Persian), 2nd Broadcast Engineering Conference (BCE 2007), Nov. 2007, IRIB University, Tehran, IRAN, (Pub. on CD).
  • V. Aghaei-Froushani and M.H. Shirali-Shahreza, "The Impact of Network Processors in Response Time and Link Utilization in Opnet" 10th Iranian Student Conference on Electrical Engineering (ISCEE 2007), Isfahan, Iran, September 2007, (Pub. on CD).
AWARDS and SCHOLARSHIPS
PROFESSIONAL CERTIFICATIONS