Usman Tariq

Research Interest
Modeling and simulation of complex network phenomena, performance evaluation of network architectures and protocols, detection and spread prevention of self-propagating malicious codes, DDoS attacks, cross layer protocol/application design for wireless networks.

Research Domains Ubiquitous Computing/Pervasive Computing/Sentient Computing/Distributed Computing, Computer Security, Mobile Computing

Journal Papers
Usman Tariq, ManPyo Hong, “Secure peer-to-peer alert based proactive defense scheme against DDoS” to be published in proceedings of IAJIT Journal [ISSN : 1683-3198], Jordan

Usman Tariq, ManPyo Hong, “Light weight majority voting based data accuracy assurance scheme for wireless sensor networks using quad tree topology” to be published in proceedings of Autosoft Journal [ISSN : 1079-8587], USA

Yonhee Park, Usman Tariq, ManPyo Hong, “Distributed Worm Detection and Prevention Model with Light-Weight Agent”, in proceedings of Journal of Korean Institute of Information Scientists and Engineers [KIISE] [ISSN # 1229-7712]

Usman Tariq, ManPyo Hong, Kyung-suk Lhee, “A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques”, in proceedings of Lecture Notes in Computer Science, [ISSN # 0302-9743]

Conference Papers
Usman Tariq, Kyung-suk Lhee, ManPyo Hong, "A Quadtree Based Data Accuracy Scheme for Wireless Sensor Networks", In proceedings of IEEE and International Conference on Convergence Information Technology, South Korea, 2007

Irfan Ahmed, Usman Tariq, Shoaib Mukhtar, Kyung-suk Lhee, S.W. Yoo, Piao Yanji, ManPyo Hong, "Binding Update Authentication Scheme for Mobile IPv6", in Proceedings of IEEE Computer Society and The Third International Symposium on Information Assurance and Security, 2007, United Kingdom

Usman Tariq, ManPyo Hong, Kyung-suk Lhee “PMS an expeditious marking scheme to combat with the DDoS attack”, 9th IEEE International Multi topic Conference (INMIC’05), December 2005, Pakistan

Usman Tariq, Yasir Naveed, ManPyo Hong, “NACS: Non-Overlapping AP’s caching scheme to reduce handoff in 802.11 wireless LAN”, IEEE MICC-ICON 2005 Conference, 2005, Malaysia.

Usman Tariq, ManPyo Hong, Wonil Kim “Quick Fix, an expeditious approach to diminish SPAM”, 9th IEEE International Multi topic Conference (INMIC’05), December 2005, Pakistan.

Usman Tariq, ManPyo Hong, Kyung-suk Lhee “X-PMS Detector, a trust worthy marking scheme to diminish DDoS attacks”, Next Generation PC 2005 International Conference, 2005, South Korea.

Books
New Technologies, Mobility and Security

Technical Skills
Routing, Switching and Security. Proficient in RIP, RIPng, OSPF, OSPFv3, EIGRP, IS-IS, BGP, IPv6, L2 and L3 Switching Technologies, HSRP, VRRP, VLANs, Policy Based Routing, Multicast, QoS and Various Security Technologies including L2 and L3 VPNs, Tunneling, different sorts of ACLs, NAT, IDS, IPS etc

Devices Worked on
Cisco Routers: 1700, 1800, 2800, 3800, 7200

Cisco Switches: EX-500, 2900, 3500, 4500, 6500

Cisco Firewalls: Pix 515E

Juniper Routers: J4300

Juniper Firewalls: SSG140, SSG320, SSG520

IBM ISS: Proventia MX 5010 (MFS)

Technical Skills
Routing, Switching and Security. Proficient in RIP, RIPng, OSPF, OSPFv3, EIGRP, IS-IS, BGP, IPv6, L2 and L3 Switching Technologies, HSRP, VRRP, VLANs, Policy Based Routing, Multicast, QoS and Various Security Technologies including L2 and L3 VPNs, Tunneling, different sorts of ACLs, NAT, IDS, IPS