Open Access. Powered by Scholars. Published by Universities.®

Computer Sciences Commons

Open Access. Powered by Scholars. Published by Universities.®

Articles 1 - 8 of 8

Full-Text Articles in Computer Sciences

Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko Jan 2023

Unlocking User Identity: A Study On Mouse Dynamics In Dual Gaming Environments For Continuous Authentication, Marcho Setiawan Handoko

All Graduate Theses, Dissertations, and Other Capstone Projects

With the surge in information management technology reliance and the looming presence of cyber threats, user authentication has become paramount in computer security. Traditional static or one-time authentication has its limitations, prompting the emergence of continuous authentication as a frontline approach for enhanced security. Continuous authentication taps into behavior-based metrics for ongoing user identity validation, predominantly utilizing machine learning techniques to continually model user behaviors. This study elucidates the potential of mouse movement dynamics as a key metric for continuous authentication. By examining mouse movement patterns across two contrasting gaming scenarios - the high-intensity "Team Fortress" and the low-intensity strategic …


Determining Knowledge From Student Performance Prediction Using Machine Learning, Wala El Rashied Mohamed Jun 2022

Determining Knowledge From Student Performance Prediction Using Machine Learning, Wala El Rashied Mohamed

Theses

Recent years have seen a rapid development in the field of educational data mining (EDM), enhancing the ability to trace student knowledge. Data from intelligent tutoring systems (ITS) have been analyzed and interpreted by multiple researchers seeking to measure students’ knowledge as it evolves. Human nature, as well as other factors, makes it difficult to determine whether or not students are knowledgeable. This thesis sets out to examine the level of students’ knowledge by predicting their current and future academic performance based on records of their historical interactions. By restructuring data and considering a student perspective, we can gain insight …


Malware Image Classification Using Machine Learning With Local Binary Pattern, Jhu-Sin Luo, Dan Lo May 2018

Malware Image Classification Using Machine Learning With Local Binary Pattern, Jhu-Sin Luo, Dan Lo

Master of Science in Computer Science Theses

Malware classification is a critical part in the cybersecurity.

Traditional methodologies for the malware classification

typically use static analysis and dynamic analysis to identify malware.

In this paper, a malware classification methodology based

on its binary image and extracting local binary pattern (LBP)

features are proposed. First, malware images are reorganized into

3 by 3 grids which is mainly used to extract LBP feature. Second,

the LBP is implemented on the malware images to extract features

in that it is useful in pattern or texture classification. Finally,

Tensorflow, a library for machine learning, is applied to classify

malware images with …


Denial-Of-Service Attack Modelling And Detection For Http/2 Services, Erwin Adi Jan 2017

Denial-Of-Service Attack Modelling And Detection For Http/2 Services, Erwin Adi

Theses: Doctorates and Masters

Businesses and society alike have been heavily dependent on Internet-based services, albeit with experiences of constant and annoying disruptions caused by the adversary class. A malicious attack that can prevent establishment of Internet connections to web servers, initiated from legitimate client machines, is termed as a Denial of Service (DoS) attack; volume and intensity of which is rapidly growing thanks to the readily available attack tools and the ever-increasing network bandwidths. A majority of contemporary web servers are built on the HTTP/1.1 communication protocol. As a consequence, all literature found on DoS attack modelling and appertaining detection techniques, addresses only …


Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran Apr 2015

Immunology Inspired Detection Of Data Theft From Autonomous Network Activity, Theodore O. Cochran

CCE Theses and Dissertations

The threat of data theft posed by self-propagating, remotely controlled bot malware is increasing. Cyber criminals are motivated to steal sensitive data, such as user names, passwords, account numbers, and credit card numbers, because these items can be parlayed into cash. For anonymity and economy of scale, bot networks have become the cyber criminal’s weapon of choice. In 2010 a single botnet included over one million compromised host computers, and one of the largest botnets in 2011 was specifically designed to harvest financial data from its victims. Unfortunately, current intrusion detection methods are unable to effectively detect data extraction techniques …


Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari Jan 2015

Intelligent Network Intrusion Detection Using An Evolutionary Computation Approach, Samaneh Rastegari

Theses: Doctorates and Masters

With the enormous growth of users' reliance on the Internet, the need for secure and reliable computer networks also increases. Availability of effective automatic tools for carrying out different types of network attacks raises the need for effective intrusion detection systems.

Generally, a comprehensive defence mechanism consists of three phases, namely, preparation, detection and reaction. In the preparation phase, network administrators aim to find and fix security vulnerabilities (e.g., insecure protocol and vulnerable computer systems or firewalls), that can be exploited to launch attacks. Although the preparation phase increases the level of security in a network, this will never completely …


Recognizing Patterns In Transmitted Signals For Identification Purposes, Baha' A. Alsaify May 2012

Recognizing Patterns In Transmitted Signals For Identification Purposes, Baha' A. Alsaify

Graduate Theses and Dissertations

The ability to identify and authenticate entities in cyberspace such as users, computers, cell phones, smart cards, and radio frequency identification (RFID) tags is usually accomplished by having the entity demonstrate knowledge of a secret key. When the entity is portable and physically accessible, like an RFID tag, it can be difficult to secure given the memory, processing, and economic constraints. This work proposes to use unique patterns in the transmitted signals caused by manufacturing differences to identify and authenticate a wireless device such as an RFID tag. Both manufacturer identification and tag identification are performed on a population of …


Development Of A Classification System For Computer Viruses In The Ibm Pc Environment Using The Dos Operating System, Hugh R. Browne Jan 1993

Development Of A Classification System For Computer Viruses In The Ibm Pc Environment Using The Dos Operating System, Hugh R. Browne

Theses : Honours

The threat to computers worldwide from computer viruses is increasing as new viruses and variants proliferate. Availability of virus construction tools to facilitate 'customised' virus production and wider use of more sophisticated means of evading detection, such as encryption, polymorphic transformation and memory resident 'stealth' techniques increase this problem. Some viruses employ methods to guard against their own eradication from an infected computer, whilst other viruses adopt measures to prevent disassembly of the virus for examination and analysis. Growth in computer numbers and connectivity provide a growing pool of candidate hosts for infection. Standardised and flexible systems for classification and …