<?xml version="1.0" encoding="UTF-8"?><rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<channel rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/1125">
<title>2021</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/1125</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/1554"/>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/1553"/>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/1552"/>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/1551"/>
</rdf:Seq>
</items>
<dc:date>2026-04-08T18:30:57Z</dc:date>
</channel>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/1554">
<title>Puzzle Solution Encryption Algorithm Enhancement</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/1554</link>
<description>Puzzle Solution Encryption Algorithm Enhancement
G. I. S. B, Nishshanka,
The transmission of the time or location-sensitive data is currently done through getting &#13;
restricted access. This method is not the best approach for this. The primary purpose of this &#13;
research is to implement a new way to secure the time and location sensitive data through time &#13;
lock, geo lock and password lock mechanisms. This system will be focusing on implementing &#13;
the features to the Advanced Encryption Standard (AES). The best approach for this is, using &#13;
the time data, password data and location data in the process of key generation. With this newly &#13;
introduced mechanism, the receiver will not decrypt the ciphertext outside the given time, given &#13;
password and location. &#13;
Adding three layers of unique parameters will provide extra security features to encryption &#13;
data. For example, Examination, special bank documents and the special of applications could &#13;
use this extra layer to secure the confidential data. Generated key of the algorithm will only be&#13;
valid for the given time and given location with the password special API which developed by &#13;
this project will use own integrated mechanics to get the accurate location and accurate time &#13;
by connecting to time servers and location satellites and API will internally collect accurate &#13;
data internally by connecting authorized servers. "
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/1553">
<title>Detection and Prevention of Crypto-Ransomware</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/1553</link>
<description>Detection and Prevention of Crypto-Ransomware
W. T. M. C. P, Thenakoon,
Ransomware attacks has become one of the major cyber scams over the past few years to &#13;
hit businesses. Specially, attackers getting more advantages from this ongoing pandemic &#13;
situation for industries such as healthcare, insurance, education, business, finance and &#13;
government. Ransomware is a form of malicious software which allows hackers to restrict &#13;
access to a personal’s or organizational’ s sensitive information within attacks and then &#13;
demand some form of ransom to lift the information restriction. There are various methods &#13;
have been suggested to fight against ransomware but it is really hard because of the &#13;
dynamic behavior of ransomware developers, they always find a method to bypass these &#13;
fighting methods. There are number of commercial tools available in the market to detect &#13;
and prevent ransomwares but the accuracy of these tools is bit questionable.&#13;
This research is mainly focusing on crypto-ransomware detection. The study was &#13;
conducted to propose a detection and prevention framework for crypto ransomware. Within &#13;
this research, two surveys conducted using set of questions with participants using IT &#13;
professionals and people who are working with digital devices related to different &#13;
industries. And an experiment was done to review and analyze the behavior of few crypto &#13;
ransomware attacks and the effectiveness of some of the industry leading tools that have &#13;
the ability of detection ransomware attacks. The experiment was done using lab &#13;
environment with the instructions of IT professionals. &#13;
After analyzing survey results and results from the experiment, the framework to detect &#13;
and prevent crypto ransomware was generated. This includes mainly seven steps that helps &#13;
to maintain the accuracy of the framework. The main aim of the framework is to detect and &#13;
prevent crypto ransomwares using technologies such as Artificial Intelligence (AI) and &#13;
Machine Learning (ML) to achieve the highest accuracy. "
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/1552">
<title>“NCSF” National cyber security skills framework in Sri Lanka</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/1552</link>
<description>“NCSF” National cyber security skills framework in Sri Lanka
P. C., Wickremasinghe,
A competent cybersecurity workforce is vital in securing a country’s information &#13;
systems, critical infrastructure, digital infrastructure and citizen data. Cybersecurity &#13;
education has been a major priority in many countries as it paves the way to &#13;
cybersecurity professionals in future so the country’s cybersecurity concerns are &#13;
fulfilled. It has been evident that numbers of cyber-attacks per year have gone &#13;
exponentially high throughout the last decade. To counter these intrusions, a country &#13;
must have a cybersecurity savvy work force who understands cyber related threats that &#13;
they would encounter while at work which could adversely result in their &#13;
organizations.&#13;
The National Cybersecurity Skills Framework (NCSF) has been developed to cater &#13;
this long-lasting deficit in Sri Lanka. The NCSF framework discusses the Knowledge, &#13;
Skill, Ability (KSA) cybersecurity elements government officers should possess in 6 &#13;
different modules. Though this type of frameworks available in other countries, a &#13;
framework that suits to Sri Lankan requirements has not been developed yet. The &#13;
reason why the NCSF framework has been developed for 6 modules is, there are&#13;
approximately 1.5 million government officers in Sri Lanka with a distributed level of &#13;
educational qualifications and experience levels. Hence, defining a one module would &#13;
not be enough for the whole government cadre. The National Cybersecurity Strategy &#13;
Bill of Sri Lanka got the Cabinet approval and it is now pending the Parliament &#13;
approval. Once the Parliament approval is given, the bill will be fully enacted. Creating &#13;
a competent cybersecurity workforce is a main concern raised in the bill and NCSF &#13;
framework will be a key component in the National Cybersecurity Strategy.&#13;
The NCSF framework provides a baseline for minimum KSAs expected from &#13;
government officers. The educational institutes can refer to those expected KSAs and &#13;
design cybersecurity related courses for each module mentioned in the framework. &#13;
Then the interested parties can follow those introductory courses, diploma level &#13;
courses, degree programs, international certifications to become competent &#13;
cybersecurity professionals."
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/1551">
<title>Polymorphic Malware Detection Using Machine Learning</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/1551</link>
<description>Polymorphic Malware Detection Using Machine Learning
V. L. S., Chandradeva,
In recent years, a great number of malware has spread indiscriminately, resulting in a variety of &#13;
serious cyberspace security crises across the world. As a result, malware detection has emerged as &#13;
a critical study area in cyberspace security. However, at present, practical training for malware &#13;
detection relies mostly on theory and skills, with little emphasis on actual combat training. Most &#13;
malware detection techniques rely on malware signatures. While detecting known dangerous &#13;
programmes in a system is straightforward, the difficulty emerges when dealing with unknown &#13;
malware. Since unknown malware cannot be identified using established malware signatures, &#13;
approaches relying on signatures are incapable of identifying unknown or zero-day attacks.&#13;
Therefore, having analysed the methodologies used in existing malware detection solutions, it was&#13;
determined that there is a requirement for malware detection solutions to detect polymorphic &#13;
malware. Polymorphic malware is a subtype of malware that is continually changing its identifying &#13;
traits to evade detection. Numerous common varieties of malware, such as viruses, worms, bots, &#13;
trojans, and keyloggers, are polymorphic in nature. Polymorphic approaches require continuously &#13;
modifying recognizable attributes such as file names and types or encryption keys to render &#13;
malware undetectable by various detection techniques. Polymorphism is used to circumvent &#13;
pattern-matching detection, a technique employed by security systems such as the current endpoint &#13;
threat detection solutions. While many characteristics of polymorphic malware alter, its functional &#13;
objective remains constant.&#13;
The proposed malware detection framework has addressed the inability of existing solutions to &#13;
detect malware that changes its distinguishing characteristics in order to avoid detection. This &#13;
research was performed using a novel behavioural malware detection method based on Deep &#13;
Graph Convolutional Neural Networks (DGCNNs) to learn directly from API call sequences and &#13;
their related behavioural graphs"
</description>
<dc:date>2021-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
