Browsing by Author "Yapa, K."
Now showing 1 - 5 of 5
- Results Per Page
- Sort Options
Publication Embargo AI Based Monitoring System for Social Engineering(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Yapa, K.; Udara, S.W.I.; Wijayawardane, U.P.B.; Kularatne, K.N.P.; Navaratne, N.M.P.P.; Dharmaphriya, W.G.V.USocial media is one of the most predominantly used online platforms by individuals across the world. However, very few of these social media users are educated about the adverse effects of obliviously using social media. Therefore, this research project, is to develop an advisory system for the benefit of the general public who are victimized by the adverse impacts of their ignorant and oblivious behavior on social media. The system was implemented using a decision tree model with the use of customized datasets; and for the proceeding operational implementations, Python programming language, Pandas, Natural Language Processing and TensorFlow were used. This advisory system can monitor user behaviors and generate customized awareness reports for the users based on category and level of their behaviors on social media. Furthermore, the system is also capable of generating graph reports of the use behavior fluctuations for the reference of the user. With the help of these customized awareness reports and the graph reports, the users can identify their potential vulnerabilities and improve their social media habits.Publication Embargo An Automated Solution For Securing Confidential Documents in a BYOD Environment(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Abisheka, P.A.C.; Azra, M.A.F.; Poobalan, A.V.; Wijekoon, J.; Yapa, K.; Murthaja, M.BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed.Publication Embargo Event-Driven Malicious URL Extractor(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Jonathan, S.W.S.; Arunaasalam, R.H.; Senarathne, A. N.; Wishvajith, V.; Ramanayaka, A.M.; Yapa, K.Cyber-attacks are attacks that are commonly carried out in order to obtain sensitive information or disrupt internet-based services. Recent occurrences, both internationally and locally, have shown an influx of these attacks expanding rapidly through the use of malicious URLs (Uniform Resource Locators). Traditional measures, including such blacklisting malicious URLs, make it extremely difficult to respond to such attacks in a timely and efficient manner. Most existing solutions remain restricted in terms of scalability and proactive user safeguarding in situations when freshly formed URLs are correlated with a recent event, such as Covid-19 related frauds. The proposed solution is presented with the primary aim of addressing traditional system limitations and offering an interface for users to protect themselves by detecting phishing/malicious URLs in real time. In this research, we will examine extracting user-input eventrelated keywords and leveraging NLP (Natural Language Processing) algorithms to match them with the accompanying URL (Uniform Resource Locator) token data to determine whether the URLs are malicious or benign.Publication Embargo Human and Organizational Threat Profiling Using Machine Learning(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Kumara, P.M.I.N.; Dananjaya, K.G.S.; Amarasena, N.P.N.H.; Pinto, H.M.S.; Yapa, K.; Rupasinghe, L.The usage of online social networking sites is increasing rapidly. But the downside is that the growth of various kinds of ongoing social media threats such as fake profiles, cyberbullying, and fake news. Many important observations can be made to increase the existing knowledge about social media threats by studying various information exchanged through public and organizations. One direction is to conduct studies on human behavior and personality traits using public user profile data and the organizational threat classifying. This research aims to build a system to predict human personality behaviors on social media profiles based on the OCEAN Model and company-based threat profiling. All the data collected relating to everyone in the consumer’s friend list is analyzed to obtain the threatening behaviors and classified according to the OCEAN to generate a threat report. Organizational network gathered log data for filtered log protection against malware. Logs received from these endpoints will be collected by collectors. Those logs will be forwarded to our filter, made of a Machine Learning Algorithm (MLA). This will be a custom MLA specially designed for this purpose. MLA will classify and categorize threats according to their severity, filtered log protection system against malware and other threats.Publication Embargo SentinelPlus: A Cost-Effective Cyber Security Solution for Healthcare Organizations(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Janith, K.; Iddagoda, R.; Gunawardena, C.; Sankalpa, K.; Abeywardena, K.Y.; Yapa, K.Electronic Protected Health Information (ePHI) has proven to be quite lucrative by cybercriminals due to their long shelf life and multiple possible avenues of monetization. These highly sensitive data has become an easy target for cyber attackers due to the poor cyber resiliency strategies exercised by Healthcare Organizations. The reasoning behind the poor cyber security management in the healthcare sector sums to the collective impact of budgetary restriction, lack of cyber security competency and talent in the domain, prioritizing convenience over security, and various work culture malpractices. Further-more, a substantial number of data breaches in the healthcare sector are known to be caused by human errors, security misconfigurations, and information mismanagement. Secondly, the increasing prevalence of ransomware and botnet attacks has hampered the efficiency and availability of healthcare services. As a result, in order to provide a holistic security mechanism, this paper presents "SentinelPlus," a machine learning-based security management suite.
