Research Papers - Dept of Computer Systems Engineering
Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253
Browse
3 results
Search Results
Publication Open Access A cost effective machine learning based network intrusion detection system using Raspberry Pi for real time analysis(PLOS ONE, 2025-12-29) Wijethilaka R.W.K.S; Yapa, K; Siriwardena, DIn an increasingly interconnected world, the security of sensitive data and critical operations is paramount. This study presents the development of a Network Intrusion Detection System (NIDS) that analyzes both inbound and outbound network traffic to detect and classify various cyber attacks. The research begins with an extensive review of existing intrusion detection techniques, highlighting the limitations of traditional methods when addressing the unique security challenges posed by distributed networks. To overcome these limitations, advanced machine learning algorithms, including Random Forest, Long Short Term Memory (LSTM) networks, Artificial Neural Networks (ANN), XGBoost, and Naive Bayes, are employed to create a robust and adaptive intrusion detection system. The practical implementation utilizes a Raspberry Pi as the central processing unit for real time traffic analysis, supported by hardware components such as Ethernet cables, LEDs, and buzzers for continuous monitoring and immediate threat response. A comprehensive alert system is developed, sending email notifications to administrators and activating physical indicators to signify detected threats. Our proposed NIDS achieves 96.5 detection accuracy on the NF-UQ-NIDS dataset, with a significantly reduced false positive rate after applying SMOTE. The system processes real time network traffic with an average response time of 50 milliseconds, outperforming traditional IDS solutions in accuracy and efficiency. Evaluation using the NF-UQ-NIDS dataset demonstrates a significant improvement in detection accuracy and response time, establishing the system as an effective tool for safeguarding networks against emerging cyber threats.Publication Embargo A Geophone Based Surveillance System Using Neural Networks and IoT(IEEE, 2020-12-10) Hettigoda, S; Jayaminda, C; Amarathunga, U; Thaha, S; Wijesundara, M; Wijekoon, JSecuring our assets and properties from intruders and thieves has become increasingly challenging as intruders become technology aware. The most common approach to monitor physical assets is CCTV. However, this approach has a number of technical limitations in addition to the cost. The CCTV camera location is visible to the intruder and intruder can also identify possible blind spots in the CCTV coverage area. In this paper, we introduce a novel method to secure physical assets using Geophones, Neural Networks, and IoT Platforms. This can either be used stand alone or to complement existing CCTV systems. In this approach, the system monitors vibrations on ground to detect intruders. We have achieved up to 93.90% overall accuracy for person identification. The system is invisible to intruders and covers a large area with a smaller number of nodes, thereby reducing the cost of ownership.Publication Embargo A Geophone Based Surveillance System Using Neural Networks and IoT(IEEE, 2020-12-10) Hettigoda, S; Jayaminda, C; Amarathunga, U; Thaha, S; Wijesundara, M; Wijekoon, JSecuring our assets and properties from intruders and thieves has become increasingly challenging as intruders become technology aware. The most common approach to monitor physical assets is CCTV. However, this approach has a number of technical limitations in addition to the cost. The CCTV camera location is visible to the intruder and intruder can also identify possible blind spots in the CCTV coverage area. In this paper, we introduce a novel method to secure physical assets using Geophones, Neural Networks, and IoT Platforms. This can either be used stand alone or to complement existing CCTV systems. In this approach, the system monitors vibrations on ground to detect intruders. We have achieved up to 93.90% overall accuracy for person identification. The system is invisible to intruders and covers a large area with a smaller number of nodes, thereby reducing the cost of ownership.
