MSc in Cyber Security

Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/2918

Students enrolled in the MSc in Cyber Security programme are required to submit a thesis as a compulsory component of their degree requirements. This collection comprises merit-based theses submitted by postgraduate candidates specialising in Cyber Security. Abstracts are available for public viewing, while the full texts can be accessed on-site within the library.

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationOpen Access
    A Framework for Using Blockchain To Enhance The Privacy, Security, Reliability, And Efficiency Of IoT-based Telehealth Systems.
    (SLIIT, 2022-11) Weerakoon, I.S.R.
    Currently, Information Communication Technology (ICT) holds a significant part in the sphere. In IT, Cyber Security carry a massive position. Internet of Things (IoT) indicates to the vast number of tangible bodies which are affixed to the internet, by gathering and switching information with other apparatus and systems with the help of the internet. By using Machine Learning technique, the security threat detection is identified over the telecommunication network in compromised IoT devices. The Driver Anomaly Detection (DAD) Dataset is used for anomaly detection in IoT networks. Message Queue Telemetry Transport protocol (MQTT) is a messaging protocol which is based on Transmission Control Protocol (TCP) and utilized for to create communication between multiple devices. It is required to identify and distinguish the available threats presented in telecommunication network. This thesis gives an understanding about different security threats detection in telecommunication network using Machine Learning technique and explain about security constraints, issues presented. By implementing Security Threat Detection System in an institute, it helps to assists analytical output concerning the imminent threats. Similarly, it aids to guarantee the fame of an association by launching faith among the workers. The above are the benefits obtained by a specific institution by consisting a Threat Detection System. Although there are existing Threat Detection Systems presented in the trade, but they are lacked in some instances like real time. So, in order to resolve all these problems, in this research as a result, ended up with a cost effective and ease of use comprehensive Threat Detection System in a telecommunication network in compromised IoT devices by using trustworthy machine learning.
  • Thumbnail Image
    PublicationOpen Access
    Security Threat Detection In Telecommunication Network In Compromised IoT Devices By Using Trustworthy Machine Learning
    (SLIIT, 2022-10) Aperame, V.
    Currently, Information Communication Technology (ICT) holds a significant part in the sphere. In IT, Cyber Security carry a massive position. Internet of Things (IoT) indicates to the vast number of tangible bodies which are affixed to the internet, by gathering and switching information with other apparatus and systems with the help of the internet. By using Machine Learning technique, the security threat detection is identified over the telecommunication network in compromised IoT devices. The Driver Anomaly Detection (DAD) Dataset is used for anomaly detection in IoT networks. Message Queue Telemetry Transport protocol (MQTT) is a messaging protocol which is based on Transmission Control Protocol (TCP) and utilized for to create communication between multiple devices. It is required to identify and distinguish the available threats presented in telecommunication network. This thesis gives an understanding about different security threats detection in telecommunication network using Machine Learning technique and explain about security constraints, issues presented. By implementing Security Threat Detection System in an institute, it helps to assists analytical output concerning the imminent threats. Similarly, it aids to guarantee the fame of an association by launching faith among the workers. The above are the benefits obtained by a specific institution by consisting a Threat Detection System. Although there are existing Threat Detection Systems presented in the trade, but they are lacked in some instances like real time. So, in order to resolve all these problems, in this research as a result, ended up with a cost effective and ease of use comprehensive Threat Detection System in a telecommunication network in compromised IoT devices by using trustworthy machine learning