MSc in Cyber Security

Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/2918

Students enrolled in the MSc in Cyber Security programme are required to submit a thesis as a compulsory component of their degree requirements. This collection comprises merit-based theses submitted by postgraduate candidates specialising in Cyber Security. Abstracts are available for public viewing, while the full texts can be accessed on-site within the library.

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationOpen Access
    Security Threat Detection In Telecommunication Network In Compromised IoT Devices By Using Trustworthy Machine Learning
    (SLIIT, 2022-10) Aperame, V.
    Currently, Information Communication Technology (ICT) holds a significant part in the sphere. In IT, Cyber Security carry a massive position. Internet of Things (IoT) indicates to the vast number of tangible bodies which are affixed to the internet, by gathering and switching information with other apparatus and systems with the help of the internet. By using Machine Learning technique, the security threat detection is identified over the telecommunication network in compromised IoT devices. The Driver Anomaly Detection (DAD) Dataset is used for anomaly detection in IoT networks. Message Queue Telemetry Transport protocol (MQTT) is a messaging protocol which is based on Transmission Control Protocol (TCP) and utilized for to create communication between multiple devices. It is required to identify and distinguish the available threats presented in telecommunication network. This thesis gives an understanding about different security threats detection in telecommunication network using Machine Learning technique and explain about security constraints, issues presented. By implementing Security Threat Detection System in an institute, it helps to assists analytical output concerning the imminent threats. Similarly, it aids to guarantee the fame of an association by launching faith among the workers. The above are the benefits obtained by a specific institution by consisting a Threat Detection System. Although there are existing Threat Detection Systems presented in the trade, but they are lacked in some instances like real time. So, in order to resolve all these problems, in this research as a result, ended up with a cost effective and ease of use comprehensive Threat Detection System in a telecommunication network in compromised IoT devices by using trustworthy machine learning
  • Thumbnail Image
    PublicationEmbargo
    Mitre attack framework adoption as a siem rule base using machine learning approach
    (2021) Weeraman, P.W.R.S.
    Digital transformation is the standard business strategy approach in most Organizations. Every person is looking for digital solutions to aid their routine works. Every Organization looking possibility move to physical office concept for virtual office concept. Even homemakers and bargain hunters also expect to move online shopping with doorstep delivery solutions with this COVID-19 pandemic. Every business needs to adopt IT functions for their business process to ensure business stability or increase their revenue. Most large-scale enterprises have a dedicated IT strategy approach to align with their business strategy. They follow best IT security practices such as SIEM, security operation centers (SOC), annual IT compliance review, IT audit and best security devices in the market. However, most of the business do IT system adoption without a preplanned process. They do not follow any best it practices in term of IT security. Further, they do not have a proper IT strategy that aligns with business objectives. Most small and medium scale business with minimum IT infrastructures and IT operations. The absence of a proper IT security approach in the business may introduce new IT risk to their information and business. This Research makes experimental approach to adopt cyber threat intelligence to SIEM detection base using adversary tactic, technique, procedure (TTP) and machine learning (ML) instead of signature-based detection methods. TTP change is relatively more challenging than IP address or file hash change. This research concern uses TTP-based Security information and event management systems (SIEM) solution using open-source software and MITRE ATT&CK community framework. Further, this Research aims to reduce operating expenses and capital expenses using a community-based framework and opensource software.