Research Publications

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4194

This main community comprises five sub-communities, each representing the academic contribution made by SLIIT-affiliated personnel.

Browse

Search Results

Now showing 1 - 2 of 2
  • Thumbnail Image
    PublicationEmbargo
    A Notion of Real-Time Anomaly Detection for IoT Devices Based on Hardware-Level Performance
    (Institute of Electrical and Electronics Engineers, 2022-11-03) Umagiliya, T; Senarathne, A; Rupasinghe, L
    Internet of Things (IoT) is becoming a considerable topic due to its benefits in the modern world. IoT devices carry out simple routine duties, but they can be valuable. IoT devices or a group of devices are connected to the internet, anomaly detection is essential, considering securing the IoT devices within the isolated environments. The most known and typical attacking modes for IoT devices are denial-of-service (DoS) and password brute-force attacks. The most dangerous attack is the Zero-day attack. The best mechanism for finding those issues as a solution is the concept of anomaly detection. Considering IoT device hardware-level anomaly detection mechanism uses the heat and the power consumption for detections. The results of those concepts can be misleading due to environmental situations. Here, it discusses the distinct approach to merely overcoming those problems using CPU and RAM utilization and driving the solution efficiently and effectively up to 99.9%.
  • Thumbnail Image
    PublicationEmbargo
    Autonomous Cyber AI for Anomaly Detection
    (2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Madhuvantha, K.A.N.; Hussain, M.H.; De Silva, H.W.D.T.; Liyanage, U.I.D.; Rupasinghe, L.; Liyanapathirana, C.
    Since available signature-based Intrusion Detection systems (IDS) are lacking in performance to identify such cyber threats and defend against novel attacks. It does not have the ability to detect zero-day or advanced malicious activities. To address the issue with signature-based IDS, a possible solution is to adopt anomaly-based detections to identify the latest cyber threats including zero days. We initially focused on network intrusions. This research paper discusses detecting network anomalies using AIbased technologies such as machine learning (ML) and natural language processing (NLP). In the proposed solution, network traffic logs and HTTP traffic data are taken as inputs using a mechanism called beats. Once relevant data has been extracted from the captured traffic, it will be passed to the AI engine to conduct further analysis. Algorithms such as Word2vec, Convolution Neural Network (CNN), Artificial Neural networks (ANN), and autoencoders are used in order to conduct the threat analysis. HTTP DATASET CSIC 2010, that NSL-KDD, CICIDS are the benchmarking datasets used in parallel with the above algorithms in order to receive high accuracy in detection. The outputted data is integrated and visualized using the Kibana dashboard and blockchain model is implemented to maintain and handle all the data.