1st International Conference on Advancements in Computing [ICAC] 2019

Permanent URI for this collectionhttps://rda.sliit.lk/handle/123456789/1599

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationEmbargo
    Analyzing Payment Behaviors And Introducing An Optimal Credit Limit
    (2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Bandara, H.M.M.T.; Samarasinghe, D.P.; Manchanayake, S.M.A.M.
    Identifying an optimal credit limit plays a vital role in telecommunication industry as the credit limit given to customers is influence on the market, revenue stabilization and customer retention. Most of the time service providers offer a fixed credit limit for customers which may cause customer dissatisfaction and loss of potential revenue. Therefore, it is essential to determine an optimal credit limit that maintains customer satisfaction while stabilizing the company revenue. Clustering algorithms were used to group customers with similar payment and usage behaviors. Then the optimal credit limit derived for each cluster is applicable to all the customers within the cluster. In order to identify the most suitable clustering algorithm, cluster validation statistics namely, Silhouette and Dunn indexes were used in this research. Based on the scores generated from these statistics KMeans algorithm was chosen. Furthermore, the quality of the KMeans clustering was evaluated using Silhouette score and the Elbow method. The optimal number of clusters are identified by those validation statistics. The significance of this approach is that the optimal credit limits generated by these clustering models suit dynamic behaviors of the customer which in turn increases customer satisfaction while contributing to reducing customer churn and potential loss of revenue.
  • Thumbnail Image
    PublicationEmbargo
    An Automated Tool for Memory Forensics
    (2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Murthaja, M.; Sahayanathan, B.; Munasinghe, A.N.T.S.; Uthayakumar, D.; Rupasinghe, L.; Senarathne, A.
    In the present, memory forensics has captured the world’s attention. Currently, the volatility framework is used to extract artifacts from the memory dump, and the extracted artifacts are then used to investigate and to identify the malicious processes in the memory dump. The investigation process must be conducted manually, since the volatility framework provides only the artifacts that exist in the memory dump. In this paper, we investigate the four predominant domains of registry, DLL, API calls and network connections in memory forensics to implement the system ‘Malfore,’ which helps automate the entire process of memory forensics. We use the cuckoo sandbox to analyze malware samples and to obtain memory dumps and volatility frameworks to extract artifacts from the memory dump. The finalized dataset was evaluated using several machine learning algorithms, including RNN. The highest accuracy achieved was 98%, and it was reached using a recurrent neural network model, fitted to the data extracted from the DLL artifacts, and 92% accuracy was reached using a recurrent neural network model,fitted to data extracted from the network connection artifacts.