Faculty of Computing
Permanent URI for this communityhttps://rda.sliit.lk/handle/123456789/4202
Browse
7 results
Filters
Advanced Search
Filter by
Settings
Search Results
Publication Open Access Enhancing Organizational Threat Profiling by Employing Deep Learning with Physical Security Systems and Human Behavior Analysis(Science and Information Organization, 2025) Senevirathna D.H; Gunasekara W.M.M; Gunawardhana K.P.A.T; Ashra M.F.F; Fernando, H; Abeywardena, K. YOrganizations need a comprehensive threat profiling system that uses cybersecurity methods together with physical security methods because advanced cyber-threats have become more complex. The objective of this study is to implement deep learning models to boost organizational threat identification via human behavior assessment and continuous surveillance activities. Our method for human behavior analysis detects insider threats through assessments of user activities that include logon patterns along with device interactions and measurement of psychometric traits. CNN, together with Random Forest classifiers, has been utilized to identify behavioral patterns that indicate security threats from inside the organization. Our model uses labeled datasets of abnormal user behavior to properly differentiate between normal and dangerous user activities with high accuracy. The physical security component improves surveillance abilities through the use of MobileNetV2 for real-time anomaly detection in CCTV video data. The system receives training to detect security breaches and violent and unauthorized entry attempts, and specific security-related incidents. The combination of transfer learning and fine-tuning methodologies enables MobileNetV2 to deliver outstanding security anomaly detection alongside low power requirements, thus it fits into Security Operations Centers operations. Experiments using our framework operate on existing benchmark collection sets that assess cybersecurity, together with physical security threats. Experimental testing establishes high precision levels for detecting insider threats along with physical security violations by surpassing conventional rule-based methods. Security Operation Centers gain an effective modern threat profiling solution through the application of deep learning models. The investigation generates better organization defenses against cyber-physical threats using behavioral analytics together with intelligent surveillance systems.Publication Embargo Image Processing-Based Solution to Repel Crop-Damaging Wild Animals(Springer, 2023-02-03) Fernando, W. P. S.; Madhubhashana, I. K.; Gunasekara, D. N. B. A.; Gogerly, Y. D.; Karunasena, A; Supunya, RTwo-thirds of Sri Lanka’s population is directly dependent on agriculture, which generates one-third of the nation’s GDP. However, crop efficiency in Sri Lanka has declined over the years due to several issues including sub-farm maintenance, destruction caused by wild animals, and unethical farming practices. Among them, the destruction caused by wild animals has led to conflicts between animals and humans causing loss of both animals and human lives in the past. There are a number of technical solutions proposed to solve the above problem, especially in the form of animal repellants. However, such solutions have several limitations, such as the small number of animal groups to be identified and the short distances they can be detected, and the lack of understanding of harmful animal populations. This research proposes an animal-repellent methodology considering several features of animals such as colors, coats, shape, and noise made by animals both in daytime and nighttime. The number of animals approaching crops is also detected and the behavior of animals is monitored to avoid false alarms. The research uses a wide range of techniques such as image processing and deep learning for the above purpose on audio, visual, and image data sets collected from the mentioned animal groups. The solution demonstrated a 90% accuracy for animal identification during the day, and 84% accuracy for animal 2 W. P. S. Fernando et al. identification at night, whereas the accuracy of studying animal behavior patterns is 90% and animal sounds were identified with 87% accuracyPublication Embargo Development of an Elephant Detection and Repellent System based on Efficient Det-Lite Models(IEEE, 2023-04-03) Pemasinghe, S; Abeygunawardhana, P.K.WHuman-elephant conflict (HEC) has become a major concern in Sri Lanka that results in many unfortunate human and elephant deaths. Methods that are currently in place to mitigate HEC, such as electrical fences have undesirable consequences resulting in both human and elephant casualties. In this paper, we have proposed a method based on computer vision and deep learning that has a promising potential for detecting and repelling elephants without endangering the lives of elephants or humans. We have used EfficientDet-Lite models that provide a good compromise between accuracy and performance in order to be usable with a resource-constrained device like a Raspberry Pi.Publication Embargo AI Solution to Assist Online Education Productivity via Personalizing Learning Strategies and Analyzing the Student Performance(Institute of Electrical and Electronics Engineers, 2022-10-29) Liyanage, M.L.A.P.; Hirimuthugoda, U.J; Liyanage, N.L.T.N.; Thammita, D.H.M.M.P; Koliya Harshanath Webadu Wedanage, D; Kugathasan, A; Thelijjagoda, SHigher productivity in online education can be attained by consistent student engagement and appropriate use of learning resources and methodologies in the form of audio, video, and text. Lower literacy rates, decreased popularity, and unsatisfactory end-user goals can result from unbalanced or inappropriate use of the aforementioned. Prior studies mainly focused on identifying and separating the elements affecting the quality of online education and pinpointing the students' preferred learning styles outside of in-person and online instruction. This has not been able to clearly show how to enhance and customize the online learning environment in order to benefit the aforementioned criteria. This case study will primarily concentrate on elements that can be personalized and optimized to improve the quality of online education. With the aid of various algorithms like logistic regression,Support Vector Machines (SVM), time series forecasting (ARIMA), deep neural networks, and Recurrent Neural Networks (RNN), which make use of machine learning and deep learning techniques, the ultimate result has been attained. To increase application and accuracy, the newly presented technique will then be presented as a web-based software application. Contrary to what is commonly believed, this applied research proposes a new all-in-one Learning Management System (LMS) for students and tutors that acts as a central hub of all the learning resources.Publication Embargo Deep Learning for Code-Mixed Text Mining in Social Media: A Brief Review(Springer, Cham, 2022-09-19) Panchendraraja, R; Saxena, AThe advent of social media in day-to-day life has made communications between people more often and easier than ever before. Analyzing the content in social media has opened up a massive amount of research and commercial opportunities. However, the content in social media is noisy and multi-lingual, which postures computational challenges ahead. Especially, the non-native English speakers and writers tend to mix their native language with English while generating social media content. Thus it requires a comprehensive prepossessing of text, including the identification of language for many language processing applications. In the area of language processing, deep learning has shown to be very successful, and the latest research works have witnessed the adoption of deep learning solutions to cater to the challenges in analyzing code-mixed text. Here, we highlight a comprehensive study of deep learning techniques used for analyzing the code-mix text of social media to understand the state-of-the-art and existing research challenges. We will discuss several applications of code-mixed text analysis and future directions.Publication Embargo Code Vulnerability Identification and Code Improvement using Advanced Machine Learning(2019 1st International Conference on Advancements in Computing (ICAC), SLIIT, 2019-12-05) Ruggahakotuwa, L.; Rupasinghe, L.; Abeygunawardhana, P.Cyber-attacks are fairly mundane. The misconfigurations of the source code can result in security vulnerabilities that potentially encourage the attackers to exploit them and compromise the system. This paper aims to discover various mechanisms of automating the detection and correction of vulnerabilities in source code. Usage of static and dynamic analysis, various machine learning, deep learning, and neural network techniques will enhance the automation of detecting and correcting processes. This paper systematically presents the various methods and research efforts of detecting vulnerabilities in the source code, starting with what is a software vulnerability and what kind of exploitation, existing vulnerability detection methods, correction methods and efforts of best researches in the world relevant to the research area. A plugin will be developed which is capable of intelligently and efficiently detecting the vulnerable source code segment and correcting the source code accurately in the development stage.Publication Embargo Autonomous Cyber AI for Anomaly Detection(2021 3rd International Conference on Advancements in Computing (ICAC), SLIIT, 2021-12-09) Madhuvantha, K.A.N.; Hussain, M.H.; De Silva, H.W.D.T.; Liyanage, U.I.D.; Rupasinghe, L.; Liyanapathirana, C.Since available signature-based Intrusion Detection systems (IDS) are lacking in performance to identify such cyber threats and defend against novel attacks. It does not have the ability to detect zero-day or advanced malicious activities. To address the issue with signature-based IDS, a possible solution is to adopt anomaly-based detections to identify the latest cyber threats including zero days. We initially focused on network intrusions. This research paper discusses detecting network anomalies using AIbased technologies such as machine learning (ML) and natural language processing (NLP). In the proposed solution, network traffic logs and HTTP traffic data are taken as inputs using a mechanism called beats. Once relevant data has been extracted from the captured traffic, it will be passed to the AI engine to conduct further analysis. Algorithms such as Word2vec, Convolution Neural Network (CNN), Artificial Neural networks (ANN), and autoencoders are used in order to conduct the threat analysis. HTTP DATASET CSIC 2010, that NSL-KDD, CICIDS are the benchmarking datasets used in parallel with the above algorithms in order to receive high accuracy in detection. The outputted data is integrated and visualized using the Kibana dashboard and blockchain model is implemented to maintain and handle all the data.
