20 research outputs found

    Phishing detection and traceback mechanism

    Full text link
     Isredza Rahmi A Hamid’s thesis entitled Phishing Detection and Trackback Mechanism. The thesis investigates detection of phishing attacks through email, novel method to profile the attacker and tracking the attack back to the origin

    Classification of Polymorphic Virus Based on Integrated Features

    Get PDF
    Standard virus classification relies on the use of virus function, which is a small number of bytes written in assembly language. The addressable problem with current malware intrusion detection and prevention system is having difficulties in detecting unknown and multipath polymorphic computer virus solely based on either static or dynamic features. Thus, this paper presents an effective and efficient polymorphic classification technique based on integrated features. The integrated feature is selected based on Information Gain (IG) rank value between static and dynamic features. Then, all datasets are tested on Naïve Bayes and Random Forest classifiers. We extracted 49 features from 700 polymorphic computer virus samples from Netherland Net Lab and VXHeaven, which includes benign and polymorphic virus function. We spilt the dataset based on 60:40 split ratio sizes for training and testing respectively. Our proposed integrated features manage to achieve 98.9% of accuracy value

    Multilevel authentication for social network

    Get PDF
    Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology. The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user

    Radio Frequency Identification (RFID) based car parking system

    Get PDF
    Radio Frequency Identification (RFID) technology is widely used in various applications such as attendance system, tracking system, monitoring system or parking system. Currently, the existing parking system used manual entrance through security guard to access the premise. Therefore, the company need to hire security guard to monitor the premise. In addition, the security guards need to monitor all movement of vehicle or person that enter or leave the premise. As a result, unauthorized vehicle or person can easily access the building. To address this problem, we proposed a parking system using RFID technology that can monitor vehicle’s movement that enter or leave the specific area or place by scanning the RFID tag. The potential benefit is it can improve security for both security guards and users. Besides that, this parking system can facilitate access control for users and improve traffic flow during peaks period. There are five modules in the proposed parking systems which are user registration, vehicle registration, RFID tag, staff and report generation

    E-store management using bell-lapadula access control security model

    Get PDF
    Generally, the existing store management system does not provide any access control mechanism in order to manage resources. All levels of user have the same right to access the store and borrow the equipment. Therefore, the E-Store management system using Bell- LaPadula access control model was proposed. The prototyping methodology was used to develop the system because methodology model is quickly constructed to test or illustrate design features and ideas, in order to gather user feedback. Moreover, the system is built using hypertext processor (PHP) language. The E-Store system has three types of users, which are known as top management of Welding Department, lecturers and students. The user’s access control is divided by high-level privilege to lower-level privilege. Therefore, each user will have different login interface according to their role and access right to the system. Through the system, high-level user manages in and out equipment flow, manages authorization, view history log in activity and verify complaint report. Lower-level user can view list of equipment, report complaint and damage equipment and borrow equipment. The E-Store management system is expected to manage the store effectively and reduced redundancy issues of equipment requested. The user access right has been assigned based on their access leve

    Classification of metamorphic virus using n-grams signatures

    Get PDF
    Metamorphic virus has a capability to change, translate, and rewrite its own code once infected the system to bypass detection. The computer system then can be seriously damage by this undetected metamorphic virus. Due to this, it is very vital to design a metamorphic virus classification model that can detect this virus. This paper focused on detection of metamorphic virus using Term Frequency Inverse Document Frequency (TF-IDF) technique. This research was conducted using Second Generation virus dataset. The first step is the classification model to cluster the metamorphic virus using TF-IDF technique. Then, the virus cluster is evaluated using Naïve Bayes algorithm in terms of accuracy using performance metric. The types of virus classes and features are extracted from bi-gram assembly language. The result shows that the proposed model was able to classify metamorphic virus using TF-IDF with optimal number of virus class with average accuracy of 94.2%

    Network monitoring system to detect unauthorized connection

    Get PDF
    The Network Monitoring System to Detect Unauthorized Connection is a network analytic tool that use to review local area network usage. The main purpose of the application is monitoring the internet protocol traffic between local area network and Internet. In addition, this system aimed to detect unauthorized Internet Protocol addresses that are inside the network range. It also can prevent network intruders from Local Area Network connection (LAN). It is a computerized system that complete with element of confidentiality, integrity and availability. The system was built using waterfall methodology that begins with system analysis, design, implementation, testing, installation and maintenance. The system is using Visual Studio 2013 with SQL Server as server operations. There are ten modules in this system which are user main page, register admin module, register staff module, login admin module, login staff module, admin menu module, staff menu module, scan view module, status view module and report module. There are about 30 respondents who agreed and satisfied with the system. As a result, this system was successfully built to detect and block the unauthorized access in the network

    A multilevel trust management framework for service oriented environment

    Get PDF
    In service-oriented computing applications, trust management systems are emerging as a promising technology to improve the e-commerce consumers and provider\u27s relationship. Both consumers and providers need to evaluate the trust levels of potential partners before engaging in interactions. The accuracy of trust evaluation greatly affects the success rate of the interaction. This paper addresses the threats and challenges that can compromise the reliability of the current trust management system. This paper studies and examines the importance of the trust factors of the trust management framework, specifically in dealing with malicious feedback ratings from e-commerce users. To improve the reliability of the trust management systems, an approach that addresses feedback-related vulnerabilities is paramount. A multilevel trust management system computes trust by combining different types of information. Using this combination, we introduce a multilevel framework for a new interactive trust management to improve the correctness in estimate of trust information

    Internet of Things based Heart Rate Monitoring and Alert System

    Get PDF
    Heart rate analysis provides vital information of the present condition of the human body and become one of the important indicators of health. Manual monitoring method no longer efficient since requires physical access from the medical staff. Thus, a system that provides a real-time monitoring and alert is needed. In this paper, we develop a heart rate alert system that is usable for medical officer and patients. The system measures the variation of the tissue blood flow rate by means of a photo transmitter and detector through fingertip known as photoplethysmography (PPG). The detected signal is passed through active low pass filter and then amplified by a two stages high gain amplifier. The amplified signal is feed into the microcontroller to process the heart rate. Then, the heart rate reading is transferred to a running web server for dashboard views for monitoring. For alerting medical officer, the system able to trigger and send a notification message through Telegram platform in the occurrences of abnormal heart rate reading. Mean of reading differences and response time testing were carried out for the performance testing of the system. Overall, the system is capable in providing an alternative method for the medical staff to monitor and get alert about the heart rate of the patients. This system can be deployed in hospitals or used by heart disease patients to monitor their heart rate condition from time to time
    corecore