Pusat IPv6 Termaju Negara - Tesis
Browse
Browsing Pusat IPv6 Termaju Negara - Tesis by Issue Date
Now showing 1 - 13 of 13
Results Per Page
Sort Options
- PublicationProviding Ubiquitous Positioning Using Context Aware Handover Algorithm(2012-10)Mohammod Sazid Zaman KhanThis research aims to solve the problem of ubiquitous positioning by designing a context aware handover algorithm for positioning systems. The algorithm performs handover among positioning systems based on important contextual factors related to position determination with efficient use of battery. In addition, the design ensures that no positioning system is allowed to operate for an indefinite period of time without getting a position. The proposed solutions are implemented in an Android application named Locate@nav6.
- PublicationBehavioural Feature Extraction For Context-Aware Traffic Classification Of Mobile Applications(2018-06)Aun, YichietTraffic classification is becoming more complex due to proliferations of mobile applications coupled with growing diversity of traffic classes. This motivates the needs for improved traffic classification method that preserve classification accuracy while supporting more traffic classes. This thesis identified domain-specific features that are effective for accurate, large-scale and scalable mobile applications classification using machine learning techniques. This thesis designed a context-aware traffic classification framework that includes a set of sequential algorithms from cleaning datasets, to identifying new features and detecting optimal classifier(s) based on problem contexts to improve classification accuracy in multi-variate traffic classification.
- PublicationAn Improved Secure Router Discovery Mechanism To Prevent Fake Ra Attack In Link Local Ipv6 Network(2021-12)C. Arjuman, NavaneethanIn the Internet Protocol Version 6 (IPv6) network, Neighbour Discovery Protocol (NDP) plays a vital role in configuring the IPv6 address for any type of host. The IPv6 host will obtains the IPv6 address using Stateless Address Autoconfiguration (SLAAC). SLAAC was implemented using two types of key ICMPv6 NDP message protocol i.e Neighbour Discovery (ND) and Router Discovery (RD) in the IPv6 network. The RD messages consist of Router Solicitation (RS) and Router Advertisement (RA) messages. The standard RD by design do not have trust mechanism to authenticate the legitimate host and router. This design flaw within RD protocol has led to Fake RA attacks. Studies shows that the standard RD protocol is vulnerable to Fake RA attack where the host will be denied legitimate gateway. In order to address this issue, several prevention techniques have been proposed in the past to secure RD process.
- PublicationAbnormal Transactions Detection In The Ethereum Network Using Semi-Supervised Generative Adversarial Networks(2022-04)Mahmoud Al-Emari, Salam RadiEthereum network is a blockchain platform that allows users to use cryptocurrency transactions, create, and deploy decentralized applications using smart contracts. Several abnormal transactions came to light due to the existing attacks that targeted Ethereum, for instance, the Ethereum DAO attack, and malicious users might exploit and compromise the vulnerabilities in smart contracts, to steal amount of cryptocurrency or working for their own objectives through abnormal transactions. Therefore, detecting abnormal transactions initiated from these malicious users, implicated in fraudulent activities as well as attribution is excessively complex. However, malicious activities using cryptocurrency transactions, through pseudo-anonymous accounts for sending and receiving ransom payment, consolidation of funds heaped up under diverse identities; thus, controlling and detecting these abnormal transactions is a fundamental pre-requisite to ensure the high level of security in Ethereum network.
- PublicationAn Efficient Framework Of Identity-based Conditional Privacy-preserving Authentication For Vehicular Ad Hoc Networks(2022-04)Vehicular ad hoc networks (VANETs) have become increasingly common in recent years due to their critical role in the field of intelligent transportation by supporting Vehicle-to-Vehicle and Vehicle-to-Infrastructure communications. The security and privacy of VANET are of the utmost importance due to the use of an open wireless communication medium where messages are exchanged in the plain text allowing attackers to intercept, tamper, replay, and delete them. To address these issues, several researcher have been proposed schemes in VANET. The taxonomy of existing schemes is as follows. Public key infrastructure-based conditional privacy-preserving authentication (PKI-CPPA), group signatures-based conditional privacy-preserving authentication (GS-CPPA), and identity-based conditional privacy-preserving authentication (ID-CPPA) schemes. This thesis aims to propose an efficient framework identity-based conditional privacy-preserving authentication (EID-CPPA) based on elliptic curve cryptography to secure communication in VANETs. The proposed EID-CPPA framework comprises four main phases namely System Initialization, Joining, Broadcasting Massages and Updated Parameter. The first phase is System Initialization, where the Trusted Authority (TA) is responsible to generate and preload the public and private keys into each Road-Side Unit (RSU) located on single domain to reduce the size of Certificate Revocation List (CRL)
- PublicationEnhanced Late-Straggler Algorithm With On-Demand Etl For Big Data Retrieval(2022-11)Zakaria Katrawi, Anwar HusseinThe growth of digital information is phenomenal. Digital documents dominate nearly every aspect of doing business to the point that it is hard to imagine doing without them. With an unprecedented potential lurking in its depths, the ongoing digital information revolution also presents risks and challenges, mainly when dealing with the extraction and analysis of digital data. The conventional method ETL of Big Data processing consists of Extraction, Transformation, and Loading integrated into a warehouse. Using this method without any optimization often leads to a delay in data retrieval, known as the straggler problem, which is a situation that arises when tasks are delayed due to low processing on some nodes. The straggler problem is considered by many as a major problem, especially when the data resources are important and if these resources are inefficiently used. Hence, detecting and, therefore, eliminating the straggler problem early is crucial to enhancing the ETL performance.
- PublicationStatistical-Based Mechanism For Detecting Hyper Text Transfer Protocol Ddos Attacks(2023-01)Ayman Ibrahim Ali GhabenThis thesis proposes an approach to detect HTTP flooding DDoS attacks on web servers. The proposed approach consists of five phases to achieve the goal of the research, as follows: (1) Data pre-processing, (ii) Aggregated packets attributes aim to aggregate the packets every (t) time based on three attributes which are (a) packet size, (b) regularity (inter arrival time), and (c) number of packets (iii) Anomaly-based detection using four indicators which are : (a) summation rows-columns, (b) Bayes- entropy, (c) skew of the packets distribution, and (d) Reynolds number) (iv) voting- based mechanism, and (v) statistical based mechanism. The proposed mechanism has been evaluated using two benchmark datasets (CIC DDoS and ISCX) and the results reveal that the detection accuracy rates are 96.03% and 94.28% when evaluated over CIC DDoS and ISCX datasets, respectively. Furthermore, the false positive rates are 14.28%, 10.00% when evaluated over those datasets.
- PublicationAdopting Theories-Based Model Of Information Security Compliance Behaviour For Healthcare Employees In Kingdom Of Saudi Arabia(2023-01)Alanazi Sultan Tuwayrish SInformation security research shows that employees are a source of certain security difficulties in the organization. This frequently happens as a result of disregarding information security policies (ISPs). Therefore, the issue is how to enhance employee information security behaviour so that it complies with the ISPs. This study seeks to advance knowledge about information security compliance behaviour (ISCB) in the Saudi healthcare industry, with a focus on how it may be enhanced from an employee standpoint.
- PublicationOptimizing The Production Of Short-Peptide Tagged Ss3A Recombinant Protein As A Potential Serological Biomarker For Strongyloidiasis(2023-02)Hassan, Nur Hassanah MohdStrongyloides stercoralis is a human-pathogenic nematode with a unique ability to autoinfect causing a parasitic disease called strongyloidiasis. Although listed as one of the neglected tropical diseases by World Health Organisation (WHO), the infection has a worldwide distribution with approximately 613.9 million cases mostly in tropical countries. Human infection occurs when the infective filariform S. stercoralis larvae in contaminated soil penetrate the intact skin through direct contact, travel to the mouth through bloodstream before it gets swallowed and resides in the gut. In the gut, female adult larvae produce eggs parthenogenetically, continuing their life cycle without having to leave the host’s body through a process called autoinfection. In general, the post-infection symptoms vary in two different ways. In immunocompetent individuals, hosts usually exhibit minimal to no symptoms (asymptomatic) and causes a life-long infection whereas in immunosuppressed individuals, unchecked infection is highly inclinative towards developing hyperinfection syndrome, an event where the larvae over-proliferate and disseminate to organs including the lung, liver, and brain.
- PublicationAn Enhanced Mechanism To Detect Drdos Attacks On Dns Using Adaptive Thresholding Technique(2023-03)Al Ogaili, Riyadh Rahef NuiaaDemand for cyberspace-enabled services has expanded dramatically in recent years, in lockstep with the global Internet user population expansion. This rising demand for these services has increased the number of cyber threats launched by attackers, as well as the diversity and sophistication of the attack strategies used to target those services. By exploiting DNS flaws, cyber attackers conduct a Distributed Reflection Denial of Service (DRDoS) attack. As a result, these types of attacks exploit the method, functionality, and operation of open DNS resolvers to compromise the DNS. Additionally, to intensify the attack by boosting the attack bandwidth to overwhelm the victim with a vast number of DNS answers. As a result, traditional mechanisms are incapable of detecting these types of cyberattacks. As a result, existing detection mechanisms are unable to detect these forms of cyber intrusions. Thus, this thesis presents a mechanism for detecting DRDoS attacks on DNS that is strengthened by the use of modified metaheuristic algorithms and adaptive thresholding techniques based on machine learning algorithms (EMDDMAT).
- PublicationSecure Hybrid Scheme For Securing Mqtt Protocol Based On Enhanced Symmetric Algorithm(2023-03)Hintaw, Ahmed JameelInternet of Things (IoT) enables device and machine communication using TCP/IP protocol. Message Queuing Telemetry Transport (MQTT) is the most preferred protocol and is expected to be the de facto messaging IoT standard. Therefore, MQTT must achieve efficient security. Nevertheless, the most significant drawback of the MQTT is its lack of protection mechanisms which verifies only simple security objects such as non-encrypted authentication and authorization policies, and even there is no encryption mechanism. Data could be altered by intruders while in transit. Researchers have proposed various security techniques to address these issues. Meanwhile, the existing schemes for protecting the MQTT network have added processing overhead to the devices but remain vulnerable for various attacks. Therefore, this research work presented an integrated scheme known as “Secure Hybrid Scheme”, to protect the MQTT protocol against any exploitations that might result in sophisticated cyberattacks. The proposed cryptosystem utilized two algorithms: a dynamic variant of the Advanced Encryption Standard (D-AES) and Key policy attribute base encryption (KP-ABE). A secure hybrid scheme introduces a new design architecture of the symmetric AES algorithm to encrypt the MQTT payload called “D-AES”. The key expansion unit has been strengthened in the D-AES.
- PublicationCryptographic Authentication-Based Mechanism For Securing Secs/Gem Communications For Industry 4.0 Manufacturing(2023-04)Shams Ul Arfeen LaghariThis thesis proposes SECS/GEM Security Mechanism (SGSM) that offers authentication, integrity, and protection against cyber-attacks. The proposed mechanism is compared with the standard SECS/GEM, Secured SECS/GEM, and SECS/GEMsec mechanisms in terms of processing time, control overhead, and resilience against cyber-attacks. The SGSM exhibited promising results, indicating that it effectively enabled SECS/GEM devices to only communicate with authorized industrial equipment, maintained message integrity, discarded forged messages, and prevented attacks such as Denial-of-Service (DoS) attacks, Replay attacks, and False-Data-Injection-Attack (FDIA) attacks launched on SECS/GEM communications.
- PublicationEnhanced Trust-nd Protocol To Prevent Temporal Denial-of-service Vulnerabilities On Ipv6 Link-local Network(2023-09)Hasbullah, Iznan HusainyTrust-ND is a trust-based distributed security mechanism to secure IPv6 link-local networks as an alternative to the highly complex Secure Neighbor Discovery (SEND) protocol. However, theoretical analysis and experimental research revealed that the Trust-ND protocol is susceptible to temporal Denial-of-Service vulnerabilities due to timestamp reference, field size and format, and verification rule. This research aims to prevent temporal DoS vulnerabilities on IPv6 link-local networks by enhancing Trust-ND without jeopardizing its original structure to retain its advantages over SEND. The proposed enhanced version of Trust-ND, called eTrustND, addresses the vulnerabilities in three stages, (i) Timestamp Formulation, (ii) Enhanced Trust-ND, and (iii) Rule-based verification mechanism. The first stage changes the reference time from system time to UTC, the 24-hour time format in hexadecimal to epoch second in integer. It also increases the precision from one hundredth to one ten-thousandth second. The second stage utilizes the Trust-ND’s Reserved field for the sub-second value and changes the timestamp field data type from byte to IntField. The third stage proposes a rule-based verification mechanism to handle out-of-sync computer clocks, preventing temporal DoS vulnerabilities. The experiment results on a testbed demonstrate that eTrustND prevents temporal-based DoS vulnerabilities without jeopardizing the original Trust-ND packet structure and adding overheads (computation and bandwidth).