Research Papers - Dept of Computer Systems Engineering
Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253
Browse
36 results
Search Results
Publication Open Access Androsafe: Online malware analysis with static and dynamic methods(Annual Technical Conference 2016 - IET- Sri Lanka Network, 2016) Kesavan, K; Liyanapathirana, C; Sampath, S. A. W. S; Sureni, Y. M; Koshila, C. P; Wanigarathna, S; Nawarathna, C. P; Rupasinghe, LWith an estimated market share of 70% to 80%, Android as becoming the most popular operating system for smartphone and tablet. Cyber criminals naturally expanded their various activities towards Google’s mobile platform.An additional incentive for mobile malware authors to target Android instead of another mobile platform is Android open design that allows users to install the application from a variety of sources. "Androsafe" is an online malware analysis tool which can analyze malware in an isolated environment without any damaging to the mobile device by using both existing and new anomaly based and behavioral analysis. Through this combination, we can analyze a large number of malware families because some malware families may only perform signature base or behavioral. Then the sandboxes based on signature will not have analysis malware families that only perform a behavior and the sandboxes based on behavior will not analysis signaturebased malware families.“Androsafe” sandbox will be hosted in the Honeynet Project’s cloud. Dynamic Analysis will be queued and run in the background, and an email which contains malware analyzing report will be sent to the user when the analysis is over. This method is very efficient more than offline kernel and app base sandbox.Publication Embargo Enhancing the security of OLSR protocol using reinforcement learning(IEEE, 2017-09-14) Priyadarshani, H; Jayasekara, N; Chathuranga, L; Kesavan, K; Nawarathna, C; Sampath, K. K; Liyanapathirana, C; Rupasinghe, LMobile ad-hoc networks are used in various institutions such as the military, hospitals, and various businesses. Due to their dynamic mobile structure-free and self-adaptive nature, they are ideal to be used in emergency situations where the resources available are limited. The wireless range of the devices in the MANET is narrow. In order to communicate with the desired device often times it is necessary to use intermediate devices between the source and the destination. Therefore, it is important to secure sensitive information sent through intermediate devices. OLSR is a widely used MANET routing protocol. Although OLSR protocol has excelled in performance and reliability, it is rather poor in security. In this context, we attempt to improve the security of OLSR protocol with the aid of Q-Learning by selecting trustworthy nodes to forward messages. Behavior of the nodes is used to determine the trust of the nodes.Publication Embargo FIMAA: Four-way Integrated Mobile Authentication API(IEEE, 2019-12-05) Kariyawasam, L; Moonamaldeniya, M; Samarawickrama, V; Premalal, S. H; Rupasinghe, L; Abeywardena, K. YIn this era of the digital world, mobile device users have been increased to a significant number. This proposed system presents a hybrid authentication approach which can be considered as a combination of silent authentication and input based authentication to enhance mobile security in android mobile applications. A four-way integrated mobile API introduces the gait patterns and location traces as well as the image context and face ID-based emotions of the user. This application silently authenticates the exposed location trace and gait patterns of the user while other ear and emotion inputs will be prompted to end-user accordingly with input authentication.Publication Open Access A Light Weight Provenance Aware Trust Negotiation Algorithm for Smart Objects in IoT(Annual Technical Conference 2016, 2016) Jayakody, A; Rupasinghe, L; Mapa, N. T; Disanayaka, T. S; Kandawala, D. S. A; Dinusha, K. DInternet of Things can be considered as the next big tide which advances towards the ICT realm. Many research communities have shown enthusiastic interest towards the variety of research topics which has been emerged into a discussion related to this novel concept. The research taxonomy of IoT is built upon several key pillars by considering its Complexity, Heterogeneity, and Versatility nature. Among these, security related research challenges can be considered as a key impacting domain. This particular research has been conducted with the special consideration towards Trust Negotiation among smart objects in order to satisfy provenance related criteria. Therefore this paper has suggested a light –weight, lesscomplex, comprehensive encryption algorithm by applying shuffling techniques in order to satisfy the origin identification.Publication Embargo IGOE IoT framework for waste collection optimization(IEEE, 2017-01-27) Lokuliyana, S; Jayakody, A; Rupasinghe, L; Kandawala, SWaste management has become a major issue in all the part of the world and tends to grow day by day. Mismanagement in waste has become one of the key environmental and health issue. With the increase of population, especially in the urban areas waste collection, categorization, and disposal has become a major hazard for the government authorities. An IoT based waste collection framework is proposed to automate the solid waste identification, localization and collection process. The authors are involved in the identifying key impact factors in the waste collection process and provide systematic and automated solution to optimize the process to achieve higher efficiency. A layered architecture is introduced to handle the waste collection process and an optimization algorithm is derived for the existing business process based on the proposed evaluation criteria. The final outcome is a complete framework which compromises the Inputs, Outputs, Guide and Enables. The main objective is to implement an optimized automated waste collection system with the use of a vast sensor network capable of gathering waste data and by implementing an optimization algorithm in waste collection.Publication Embargo Global trust identification in infrastructure and ad hoc networks(IEEE, 2015-08-24) Karunaratne, K. H. M. C. D; Karunaratne, K. H. M. C. T; Peiris, M. H. D; Peiris, P. A. S; Rupasinghe, L; Senarathna, A. NTrust is an indispensable component in mobile ad-hoc networks since the devices involved in the network can be complete strangers to each other. In a situation where there is a need of a suddenly build network and exchange of data, a trust establishment mechanism plays a vital role. In developing a trust implementing system, the traditional methods such as cryptography and centralized certificate based solutions are ill-suited due to the lack of processing power and energy in mobile devices. In this paper, we propose a trust mechanism based on the predictive theories of probability, Markov Chains and Hidden Markov Models.Publication Embargo Comprehensive Forensic Data Extraction and Representation System for Windows Registry(IEEE, 2019-12-05) W. De Alwis, C; Rupasinghe, LComputer forensics is the process of methodically examining computer media (hard disks, diskettes, tapes, etc.) for evidence. When considering computer forensics, registry forensics plays a vital role because it helps identifying system configurations, application details, user configurations and helps in finding registry malware. Therefore, it is significant to extract this registry information to simplify the investigations for forensic professionals. At present, tools are limited to few commonly used registry information and there is a much border area to cover. Investigators have to manually search for the registries for required artifacts. But the nature and complexity of the registry file structure limits most of the investigators using these registries. Limiting this registry analysis only to the physical registry files and not considering the ability of extraction of registry information from Volatile Memory is another significant issue in registry forensics. Because these tools are only rely on the physical registry files and cannot extract registry artifacts from Volatile Memory. In order to cater to this problem, this research provide a comprehensive solution to registry analysis. This system is capable of extracting registry information from both physical registry files and Volatile Memory.Publication Embargo Intelligent Flood Management System(IEEE, 2019-12-05) Fernando, M. J. D; Pathirana, D. A. K. K; Jayasooriya, W. J. K. T. D; Rathnaweera, S. A. H; Rupasinghe, LFlooding is one of the major disasters in Sri Lanka. In Sri Lanka, there are no effective pre preparedness procedures follow in a flooding situation. The setting of pre and post-disaster activities like mitigation, preparedness, response, and recovery have very important roles in reducing future hazard risk in disaster-prone areas. Lack of communication and coordination during a disaster situation has led inefficiencies in mitigating adverse, in that situation, messages requesting for any assistance are sent to a central cloud system where the system generates response automatically and communicate and coordinate with the relevant parties. The genetic programming methods have used to plan relief supply distribution and safety location allocation for the flood-affected people in Sri Lanka. The research provides a guide for the administration of flood management for decision making on flood disaster management, preparedness and mitigation damages and deaths, recovery, and development in post-disaster situations in Sri Lanka.Publication Embargo Online Music Platform to Create Interaction between Music Artists and Fans(IEEE, 2019-12-05) Rupasinghe, L; Fernando, W. J. C; Perera, A. G. M. M; Weerasooriya, D. G. T. V; Perera, K. A. D. W. H. DIn music industry, purchasing of digital music has been popular lately. This online music platforms make music artists to upload their piece of work and their fans will purchase the songs. When purchasing songs, some people may face problems like not secured way or non-transparency of currency and data transaction. The transparency of currency and data files are not there in most of the platforms, it will make doubt the users about the transactions. Also, People frequently change their music listening behaviors. Which scales by the genres, artist, or specific tracks. When someone wants to find a song which was heard for the first time, he/she would not be able to remember the song at once. If the song is in other language it is difficult to find that because less knowledge of that language. If that language of the song can be translated to English language. But what if they remember nothing of the song or singer but know how to sing or hum a part of that song. And also when a person is singing or humming there are some situations lead to errors such as not in the right pitch, background noise.Publication Embargo Code Vulnerability Identification and Code Improvement using Advanced Machine Learning(IEEE, 2019-12-05) Ruggahakotuwa, L; Rupasinghe, L; Abeygunawardhana, P. K. WCyber-attacks are fairly mundane. The misconfigurations of the source code can result in security vulnerabilities that potentially encourage the attackers to exploit them and compromise the system. This paper aims to discover various mechanisms of automating the detection and correction of vulnerabilities in source code. Usage of static and dynamic analysis, various machine learning, deep learning, and neural network techniques will enhance the automation of detecting and correcting processes. This paper systematically presents the various methods and research efforts of detecting vulnerabilities in the source code, starting with what is a software vulnerability and what kind of exploitation, existing vulnerability detection methods, correction methods and efforts of best researches in the world relevant to the research area. A plugin will be developed which is capable of intelligently and efficiently detecting the vulnerable source code segment and correcting the source code accurately in the development stage.
