Research Papers - Dept of Computer Systems Engineering

Permanent URI for this collection https://rda.sliit.lk/handle/123456789/1253

Browse

Search Results

Now showing 1 - 4 of 4
  • Thumbnail Image
    PublicationOpen Access
    Enhancing Organizational Threat Profiling by Employing Deep Learning with Physical Security Systems and Human Behavior Analysis
    (Science and Information Organization, 2025) Senevirathna D.H; Gunasekara W.M.M; Gunawardhana K.P.A.T; Ashra M.F.F; Fernando, H; Abeywardena, K. Y
    Organizations need a comprehensive threat profiling system that uses cybersecurity methods together with physical security methods because advanced cyber-threats have become more complex. The objective of this study is to implement deep learning models to boost organizational threat identification via human behavior assessment and continuous surveillance activities. Our method for human behavior analysis detects insider threats through assessments of user activities that include logon patterns along with device interactions and measurement of psychometric traits. CNN, together with Random Forest classifiers, has been utilized to identify behavioral patterns that indicate security threats from inside the organization. Our model uses labeled datasets of abnormal user behavior to properly differentiate between normal and dangerous user activities with high accuracy. The physical security component improves surveillance abilities through the use of MobileNetV2 for real-time anomaly detection in CCTV video data. The system receives training to detect security breaches and violent and unauthorized entry attempts, and specific security-related incidents. The combination of transfer learning and fine-tuning methodologies enables MobileNetV2 to deliver outstanding security anomaly detection alongside low power requirements, thus it fits into Security Operations Centers operations. Experiments using our framework operate on existing benchmark collection sets that assess cybersecurity, together with physical security threats. Experimental testing establishes high precision levels for detecting insider threats along with physical security violations by surpassing conventional rule-based methods. Security Operation Centers gain an effective modern threat profiling solution through the application of deep learning models. The investigation generates better organization defenses against cyber-physical threats using behavioral analytics together with intelligent surveillance systems.
  • Thumbnail Image
    PublicationEmbargo
    Deep Learning for Code-Mixed Text Mining in Social Media: A Brief Review
    (Springer, Cham, 2022-09-19) Panchendraraja, R; Saxena, A
    The advent of social media in day-to-day life has made communications between people more often and easier than ever before. Analyzing the content in social media has opened up a massive amount of research and commercial opportunities. However, the content in social media is noisy and multi-lingual, which postures computational challenges ahead. Especially, the non-native English speakers and writers tend to mix their native language with English while generating social media content. Thus it requires a comprehensive prepossessing of text, including the identification of language for many language processing applications. In the area of language processing, deep learning has shown to be very successful, and the latest research works have witnessed the adoption of deep learning solutions to cater to the challenges in analyzing code-mixed text. Here, we highlight a comprehensive study of deep learning techniques used for analyzing the code-mix text of social media to understand the state-of-the-art and existing research challenges. We will discuss several applications of code-mixed text analysis and future directions.
  • Thumbnail Image
    PublicationEmbargo
    Code Vulnerability Identification and Code Improvement using Advanced Machine Learning
    (2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Ruggahakotuwa, L.; Rupasinghe, L.; Abeygunawardhana, P.
    Cyber-attacks are fairly mundane. The misconfigurations of the source code can result in security vulnerabilities that potentially encourage the attackers to exploit them and compromise the system. This paper aims to discover various mechanisms of automating the detection and correction of vulnerabilities in source code. Usage of static and dynamic analysis, various machine learning, deep learning, and neural network techniques will enhance the automation of detecting and correcting processes. This paper systematically presents the various methods and research efforts of detecting vulnerabilities in the source code, starting with what is a software vulnerability and what kind of exploitation, existing vulnerability detection methods, correction methods and efforts of best researches in the world relevant to the research area. A plugin will be developed which is capable of intelligently and efficiently detecting the vulnerable source code segment and correcting the source code accurately in the development stage.
  • Thumbnail Image
    PublicationEmbargo
    Autonomous Cyber AI for Anomaly Detection
    (2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Madhuvantha, K.A.N.; Hussain, M.H.; De Silva, H.W.D.T.; Liyanage, U.I.D.; Rupasinghe, L.; Liyanapathirana, C.
    Since available signature-based Intrusion Detection systems (IDS) are lacking in performance to identify such cyber threats and defend against novel attacks. It does not have the ability to detect zero-day or advanced malicious activities. To address the issue with signature-based IDS, a possible solution is to adopt anomaly-based detections to identify the latest cyber threats including zero days. We initially focused on network intrusions. This research paper discusses detecting network anomalies using AIbased technologies such as machine learning (ML) and natural language processing (NLP). In the proposed solution, network traffic logs and HTTP traffic data are taken as inputs using a mechanism called beats. Once relevant data has been extracted from the captured traffic, it will be passed to the AI engine to conduct further analysis. Algorithms such as Word2vec, Convolution Neural Network (CNN), Artificial Neural networks (ANN), and autoencoders are used in order to conduct the threat analysis. HTTP DATASET CSIC 2010, that NSL-KDD, CICIDS are the benchmarking datasets used in parallel with the above algorithms in order to receive high accuracy in detection. The outputted data is integrated and visualized using the Kibana dashboard and blockchain model is implemented to maintain and handle all the data.