Faculty of Computing

Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202

Browse

Search Results

Now showing 1 - 4 of 4
  • Thumbnail Image
    PublicationOpen Access
    IoT Focus on Security Using Blockchain
    (researchgate.net, 2021-05) Wijayarathne, S. N
    In the area of information technology, cyber security plays a significant role. One of the biggest challenges in the present day is the privacy and security of the information we have. ‘Cybercrimes’ is the first thing that comes to mind whenever we think about cybersecurity. In order to prevent these cybercrimes, various governments and companies are taking many measures. One of the solutions that have come up for these cybercrimes is the usage of Blockchain. The introduction and implementation of the Industrial Internet of Things (IIoT) have started a worldwide insurgency. The volume and assortment of information that is gathered and prepared in businesses are consistently expanding because of the boundless acknowledgment of current advances such as the Internet of Things (IoT). With the exponential increment of IIoTassociated devices has also incremented the number of threats of security and privacy breaches. Disadvantages such as low processing power, limited capacity abilities, and poor productivity standards are often found on IoT devices. In this specific situation, blockchain innovation can assist with taking out the security weaknesses looked at by the IIoT frameworks and gives broad assurance from information robberies, cyberattacks, and information debasement. Blockchain, with its disseminated design, offers shared systems administration and empowers auditable and straightforward exchanges. This report explores the concept of the Internet of Things (IoT), focusing on security by the usage of Blockchain. We further explore the evolution of the IoT security and the evolution of Blockchain, the future development of the IoT devices with the security of Blockchain, under the topic of IoT focus on security using Blockchain.
  • Thumbnail Image
    PublicationOpen Access
    Development of Cyber Threat Intelligence System in a SOC Environment for Real Time Environment
    (Department of Computing and Information Systems, Faculty of Applied Sciences, Sabaragamuwa University of Sri Lanka, 2021-02-24) Varatharaj, A; Rupasinghe, P. L; Liyanapathirana, C
    Now a days, Information Communication Technology (ICT) plays an important role in the world. In IT, Cyber Security holds a vast place. Cyber Threat Intelligence (CTI) leads the significant place within Cyber Security, as many Cyber Threats need to be faced every day by a particular organization. Security Operation Center (SOC) helps to monitor and analyze an organization’s security position in Real Time. This paper proposes about the Cyber Threat Intelligence framework in a SOC Environment in Real Time. The proposed framework contains of three layers, which are built above Security Onion. The Layer 1 comprises of input data from online and offline sources. In Layer 2, implemented two components namely Filter data and Cut down data, which receive the data from Layer 1. Finally, in Layer 3 delivers a detailed report. As the input for the Layer 1, Financial Datasets is used. These Financial Datasets, which helps in order to detect the Financial Frauds. Machine Learning is used to train the model. By implementing CTI System in an organization, it helps to gain predictive output regarding the upcoming threats. Also, it helps to ensure the reputation of an organization by establishing trust between the users. Helps to increase the number of customers to an organization. The above are the advantages gained by a particular organization by having a CTI System.
  • Thumbnail Image
    PublicationEmbargo
    SentinelPlus: A Cost-Effective Cyber Security Solution for Healthcare Organizations
    (IEEE, 2021-12-09) Janith, K; Iddagoda, R; Gunawardena, C; Sankalpa, K; Abeywardena, K. Y; Yapa, K
    Electronic Protected Health Information (ePHI) has proven to be quite lucrative by cybercriminals due to their long shelf life and multiple possible avenues of monetization. These highly sensitive data has become an easy target for cyber attackers due to the poor cyber resiliency strategies exercised by Healthcare Organizations. The reasoning behind the poor cyber security management in the healthcare sector sums to the collective impact of budgetary restriction, lack of cyber security competency and talent in the domain, prioritizing convenience over security, and various work culture malpractices. Further-more, a substantial number of data breaches in the healthcare sector are known to be caused by human errors, security misconfigurations, and information mismanagement. Secondly, the increasing prevalence of ransomware and botnet attacks has hampered the efficiency and availability of healthcare services. As a result, in order to provide a holistic security mechanism, this paper presents "SentinelPlus," a machine learning-based security management suite.
  • Thumbnail Image
    PublicationEmbargo
    A new elliptic curve cryptographic system over the finite fields
    (Faculty of Graduate Studies and Research, 2017-01-26) Murray, I.; Rupasinghe, P.L.; Priyatharsan, U.
    Security of the information is the main problem in network communications nowadays. There is no algorithm which ensures the one hundred percent reliability of the transmissions. The current society uses the Internet, to exchange information such as from private images to financial data. The cryptographic systems are the mechanisms developed to protect and hide the information from intruders. However, advancing technology is also used by intruders to breach the security of the systems. Hence, every time cryptosystems developed based on complex Mathematics. Elliptic curve cryptography(ECC) is one of the technique in such kind of cryptosystems. Security of the elliptic curves lies in hardness of solving the discrete logarithms problems. In this research, a new cryptographic system is built by using the elliptic curve cryptography based on square matrices to achieve a secure communication between two parties. First, an invertible matrix is chosen arbitrarily in the the field used in the system. Then, by using the Cayley Hamilton theorem, private key matrices are generated for both parties. Next, public key vectors of the both parties are generated by using the private keys of them and arbitrary points of the given elliptic curve. Diffie Hellman protocol is used to authenticate the key exchange. ElGamal plus Menezes Qu Vanstone encryption protocols are used to encrypt the messages. MATLAB R2015a is used to implement and test the proper functioning of the built cryptosystem.