MSc in Cyber Security

Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/2918

Students enrolled in the MSc in Cyber Security programme are required to submit a thesis as a compulsory component of their degree requirements. This collection comprises merit-based theses submitted by postgraduate candidates specialising in Cyber Security. Abstracts are available for public viewing, while the full texts can be accessed on-site within the library.

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationOpen Access
    Optimizing Multi-Factor Authentication Protocols to Bolster Corporate User Security
    (SLIIT, 2024-12) Indika, B.G.P.
    In today’s cybersecurity landscape, where corporate entities face sophisticated threats, robust authentication measures are essential. This research focuses on designing a contextual and risk-based Multi-Factor Authentication (MFA) model to enhance corporate security. Unlike traditional static MFA, the proposed model incorporates dynamic, context-sensitive factors such as user behavior, location data, and risk levels, strengthening defenses in environments handling sensitive information. This study highlights the need for adaptable authentication solutions capable of responding in real-time to evolving threats. By integrating biometric and adaptive authentication technologies, the research aims to enhance both security and user experience. The proposed scalable MFA model offers a multi-layered defense mechanism tailored to the demands of corporate environments, contributing to improved data protection and organizational trust. While this approach advances secure authentication practices, it also presents challenges, such as privacy concerns stemming from extensive data collection, high implementation complexity, and the need for accurate, real-time data. Scalability may lead to system delays, and frequent verification prompts risk frustrating users. Balancing security, usability, and privacy is critical for long-term success. In conclusion, this research demonstrates the potential of contextual and risk-based MFA models to effectively mitigate cybersecurity threats. By providing a more adaptive and responsive framework, the study contributes to the development of improved corporate cybersecurity practices, addressing the growing need for solutions that safeguard data assets and maintain trust with stakeholders.
  • Thumbnail Image
    PublicationEmbargo
    Study of Avoiding Length Extension attack on MD Based Secret Prefix Message Authentication Code
    (2021) Premadasa, B.H.A.J.
    The integrity of the message can be violated intentionally or unintentionally caused by means of natural phenomena or interceptions of malicious actors. Changes in message integrity caused by natural reasons can be corrected using various error correction mechanisms. Message Authentication Code is being widely used in order to check the integrity of a message. Using Message Authentication Code, the receiver can check whether the message is modified or changed during the transmission process. Message Authentication Code comes handy when detecting integrity violations by malicious actors. The integrity check is done by calculating special values which can be only obtained by using the original message. The calculated hash value by the sender is appended at the end of the message and transmitted to the receiver. The receiver gets the message and calculates the hash value using the same techniques used by the sender. By comparing accumulated hash value with the hash value sent by the sender, any integrity violation can be identified. But the hashing algorithms based on Merkle–Damgård construction are vulnerable to length extension attacks. To address this vulnerability, Secure Hash Algorithms are introduced. The purpose of this study is to develop a novel algorithm to avoid length extension attacks on MD based message authentication algorithm.