Research Papers - Dept of Computer Systems Engineering

Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253

Browse

Search Results

Now showing 1 - 5 of 5
  • Thumbnail Image
    PublicationOpen Access
    A cost effective machine learning based network intrusion detection system using Raspberry Pi for real time analysis
    (PLOS ONE, 2025-12-29) Wijethilaka R.W.K.S; Yapa, K; Siriwardena, D
    In an increasingly interconnected world, the security of sensitive data and critical operations is paramount. This study presents the development of a Network Intrusion Detection System (NIDS) that analyzes both inbound and outbound network traffic to detect and classify various cyber attacks. The research begins with an extensive review of existing intrusion detection techniques, highlighting the limitations of traditional methods when addressing the unique security challenges posed by distributed networks. To overcome these limitations, advanced machine learning algorithms, including Random Forest, Long Short Term Memory (LSTM) networks, Artificial Neural Networks (ANN), XGBoost, and Naive Bayes, are employed to create a robust and adaptive intrusion detection system. The practical implementation utilizes a Raspberry Pi as the central processing unit for real time traffic analysis, supported by hardware components such as Ethernet cables, LEDs, and buzzers for continuous monitoring and immediate threat response. A comprehensive alert system is developed, sending email notifications to administrators and activating physical indicators to signify detected threats. Our proposed NIDS achieves 96.5 detection accuracy on the NF-UQ-NIDS dataset, with a significantly reduced false positive rate after applying SMOTE. The system processes real time network traffic with an average response time of 50 milliseconds, outperforming traditional IDS solutions in accuracy and efficiency. Evaluation using the NF-UQ-NIDS dataset demonstrates a significant improvement in detection accuracy and response time, establishing the system as an effective tool for safeguarding networks against emerging cyber threats.
  • Thumbnail Image
    PublicationEmbargo
    Human Behavior Analysis for Psychological Healthcare Sector (Project SERENITY)
    (IEEE, 2022-12-09) Dassanayake, D.M.H.; Wanigathunga, C.V.; Meeriyagalla, P.Y.; Yapa, K; Wickramarathne, K.A.P.P.; Rukgahakotuwa, L
    Mental health is a key area of the healthcare sector. While taking care of the physical health of the human body, it is important to pay attention to mental health as well. This project is done to help people maintain their mental health. ‘ SERENITY’ is a web application designed not only for patients but also for doctors. This app works as a virtual assistant for a doctor, and this app helps doctors constantly monitor their patients’ behaviour, as well as SERENITY, which will be able to analyze the emotions of patients individually.
  • Thumbnail Image
    PublicationEmbargo
    SentinelPlus: A Cost-Effective Cyber Security Solution for Healthcare Organizations
    (IEEE, 2021-12-09) Janith, K; Iddagoda, R; Gunawardena, C; Sankalpa, K; Abeywardena, K. Y; Yapa, K
    Electronic Protected Health Information (ePHI) has proven to be quite lucrative by cybercriminals due to their long shelf life and multiple possible avenues of monetization. These highly sensitive data has become an easy target for cyber attackers due to the poor cyber resiliency strategies exercised by Healthcare Organizations. The reasoning behind the poor cyber security management in the healthcare sector sums to the collective impact of budgetary restriction, lack of cyber security competency and talent in the domain, prioritizing convenience over security, and various work culture malpractices. Further-more, a substantial number of data breaches in the healthcare sector are known to be caused by human errors, security misconfigurations, and information mismanagement. Secondly, the increasing prevalence of ransomware and botnet attacks has hampered the efficiency and availability of healthcare services. As a result, in order to provide a holistic security mechanism, this paper presents "SentinelPlus," a machine learning-based security management suite.
  • Thumbnail Image
    PublicationEmbargo
    Human and Organizational Threat Profiling Using Machine Learning
    (IEEE, 2021-12-09) Kumara, P. M. I. N; Dananjaya, K. G. S; Amarasena, N. P. N. H; Pinto, H. M. S; Yapa, K; Rupasinghe, L
    The usage of online social networking sites is increasing rapidly. But the downside is that the growth of various kinds of ongoing social media threats such as fake profiles, cyberbullying, and fake news. Many important observations can be made to increase the existing knowledge about social media threats by studying various information exchanged through public and organizations. One direction is to conduct studies on human behavior and personality traits using public user profile data and the organizational threat classifying. This research aims to build a system to predict human personality behaviors on social media profiles based on the OCEAN Model and company-based threat profiling. All the data collected relating to everyone in the consumer’s friend list is analyzed to obtain the threatening behaviors and classified according to the OCEAN to generate a threat report. Organizational network gathered log data for filtered log protection against malware. Logs received from these endpoints will be collected by collectors. Those logs will be forwarded to our filter, made of a Machine Learning Algorithm (MLA). This will be a custom MLA specially designed for this purpose. MLA will classify and categorize threats according to their severity, filtered log protection system against malware and other threats.
  • Thumbnail Image
    PublicationEmbargo
    An Automated Solution For Securing Confidential Documents in a BYOD Environment
    (IEEE, 2021-12-09) Abisheka, P. A. C; Azra, M. A. F; Poobalan, A. V; Wijekoon, J; Yapa, K; Murthaja, M
    BYOD or Bring Your Own Device is a set of policies that allow employees of an organization to use their own devices for official work purposes. BYOD is an immensely popular concept in the present day due to the many advantages it provides. However, the implementation of BYOD policies entail diverse problems and as a result, the confidentiality of documents can be breached. Furthermore, employees without security awareness and training are highly vulnerable to endpoint attacks, network attacks, and zero-day attacks that lead to a breach of confidentiality, integrity, and availability (CIA). In this context, this paper proposes a comprehensive solution; ‘BYODENCE’, for the detection and prevention of unauthorized access to organizational documents. BYODENCE is an efficient BYOD solution which can produce competitive results in terms of accuracy and speed.