Browsing by Author "Hussain, Sabahat"
Now showing 1 - 3 of 3
Results Per Page
Sort Options
Item Open Access Mitigating Storage Security Threats in Mobile Phones(Department of Computer Science, Nasarawa State University Keffi, 2018-04-04) Hussain, Sabahat; Olanrewaju, Rashidah F.; Ismail, Ahmad Fadzil BinObjectives: This paper discusses the proposed system which provides the user the ability to run the application on Android phones for encrypting all types of files before they are stored. Methods/Statistical Analysis: In the proposed system, Advanced Encryption Standard (AES) is employed for encryption as well as decryption of the files stored by users in mobile phones. All types of files including docx, text, pdf, image, ppt, audio and video files can be encrypted and later regenerated as well. Findings: The use of AES in encrypting and decrypting data in this system provides good security as well as higher speed. An added advantage is that it is implementable on several platforms particularly in small gadgets like smartphones. As compared to the traditional computers, smartphones can be carried more easily and provide similar functionalities as that of a computer like data storage and processing, communication and other services including video call, wireless network, web browser, GPS, audio or video player. Application/Improvements: Data is transmitted, shared and stored for various purposes including production, banking, development, and research. Therefore, security is a must for information which can be provided by encryption using AES as proposed in this system.Item Open Access Secure Annihilation of Out-of-Band Authorization for Online Transactions(Department of Computer Science, Nasarawa State University Keffi, 2018-02-02) Hussain, Sabahat; Islam Khan, Burhan UI; Anwar, Farhat; Olanrewaju, Rashidah F.Objectives: In this paper, an approach to online banking authorization using one-time passwords has been illustrated. Methods/Statistical Analysis: The algorithm presented in this paper provides an infinite as well as forward One-Time- Password (OTP) generation mechanism employing two Secure Hash Algorithms viz. SHA3 and SHA2, followed by dynamic truncation to produce human-readable OTP. An inimitable authentication scheme has been presented in which a unique initial seed is used for generating a series of OTPs on the user’s handheld gadget (i.e. a mobile phone). Findings: The proposed scheme demonstrated better results than the previous schemes of authorization after a security analysis was conducted on it. This is attributed to the eradication of cellular network within the authorization process. A high level of performance and efficiency in authentication and authorization was evident from the results that are vital for transacting online. Applications/Improvements: In the proposed system, the inherent features of the user’s device (mobile phone) are utilized to form the initial seed. The application of hash functions to that seed eliminates the necessity to send one time passwords to the users via Short Message Service and decreases the limitations posed by out-of-band systems, thus making it suitable to be employed in online banking and other financial organizationsItem Open Access Snort-Based Smart and Swift Intrusion Detection System(Department of Computer Science, Nasarawa State University Keffi, 2017-01-01) Olanrewaju, Rashidah F.; Islam Khan, Burhan UI; Najeeb, Rahman Athaur; Zahir, Ku Afiza Ku Nor; Hussain, SabahatObjectives: In this paper, a smart Intrusion Detection System (IDS) has been proposed that detects network attacks in less time after monitoring incoming traffic thus maintaining better performance. Methods/Statistical Analysis: The features are extracted using back-propagation algorithm. Then, only these relevant features are trained with the help of multi-layer perceptron supervised neural network. The simulation is performed using MATLAB. Findings: The proposed system has been verified to have high accuracy rate, high sensitivity as well as a reduction in false positive rate. Besides, the intrusions have been classified into four categories as Denial-of-Service (DoS), User-to-root (U2R), Remote-to-Local (R2L) and Probe attacks; and the alerts are stored and shared via a central log. Thus, the unknown attacks detected by other Intrusion Detection Systems can be sensed by any IDS in the network thereby reducing computational cost as well as enhancing the overall detection rate. Applications/Improvements: The proposed system does not waste time by considering and analysing all the features but takes into consideration only relevant ones for the specific attack and supervised learning neural network is used for intrusion detection. By the application of Snort before backpropagation algorithm, the latter has only one function to perform – detection of unknown attacks. In this way, the time for attack detection is reduced.