<?xml version="1.0" encoding="UTF-8"?><rdf:RDF xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns="http://purl.org/rss/1.0/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#">
<channel rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/2950">
<title>2025</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2950</link>
<description/>
<items>
<rdf:Seq>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/2965"/>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/2964"/>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/2963"/>
<rdf:li rdf:resource="http://dlib.iit.ac.lk/xmlui/handle/123456789/2962"/>
</rdf:Seq>
</items>
<dc:date>2026-04-04T03:22:32Z</dc:date>
</channel>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/2965">
<title>Next-Generation Runtime Application Self-Protection (RASP): Leveraging eBPF for Automated, Real-Time Defense in Cloud and Containerized Environments</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2965</link>
<description>Next-Generation Runtime Application Self-Protection (RASP): Leveraging eBPF for Automated, Real-Time Defense in Cloud and Containerized Environments
Stanley, Robert
As Kubernetes becomes the go-to orchestration platform for cloud-native applications, its dynamic and multi-tenant nature introduces complex runtime security challenges. Conventional security solutions such as firewalls, traditional intrusion detection systems (IDS), and user-space RASP implementations struggle to provide effective protection within these environments. These legacy approaches often fail to offer real-time visibility, suffer from high resource consumption, and lack the granularity to detect sophisticated threats such as privilege escalation, container escape, and lateral movement. To address this gap, this research proposes a novel Runtime Application Self-Protection (RASP) framework designed explicitly for Kubernetes and built on the Extended Berkeley Packet Filter (eBPF) technology. The architecture comprises a lightweight pod-level agent and a centralized controller, communicating over gRPC with mutual TLS. The system performs real-time syscall monitoring (e.g., execve, connect, setuid), classifies events using a configurable rule engine, and dispatches alerts through Slack integrations. Additionally, telemetry is exported to the ELK stack for long-term forensic visibility and machine learning readiness.&#13;
&#13;
The system was rigorously evaluated in realistic Kubernetes environments, including simulated adversarial conditions. Results demonstrate that the framework achieves event classification latency under 30ms, with an average CPU overhead of less than 3% and memory usage below 150MB, validating its suitability for production-grade deployments. Alert accuracy exceeded 97.6% true positive rates with zero false positives under tuned rulesets. The architecture proved resilient, with 100% telemetry recovery during controller failover scenarios, and scalability across heterogeneous clusters was confirmed. Full CI/CD automation was implemented using GitHub Actions and ArgoCD, enabling reproducible, secure deployments. This work represents a technically robust and academically novel contribution to runtime container security, establishing a practical foundation for future enforcement logic and intelligent anomaly detection in Kubernetes-native ecosystems.
</description>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/2964">
<title>Hybrid Image Forgery Detection System</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2964</link>
<description>Hybrid Image Forgery Detection System
Ariyapala, Lakni Malinya
The rise of digital media manipulation has made image forgery detection essential in digital &#13;
forensics. Traditional approaches using only handcrafted or deep learning features often &#13;
struggle with limited scope and generalization across forgery types. This research addresses &#13;
these challenges by developing a hybrid detection system capable of identifying both splicing &#13;
and copy-move forgeries using a combination of statistical and deep features.&#13;
The system extracts handcrafted features, Discrete Cosine Transform, Zernike Moments, and &#13;
Color Histograms, and fuses them with deep semantic features from MobileNetV2. These &#13;
features are concatenated and classified using a Random Forest model. Implementation was &#13;
done using Python, OpenCV, TensorFlow Keras, and scikit-learn. Testing was performed on &#13;
CASIA v2 and CoMoFoD datasets, with a CLI interface allowing real-time user input and &#13;
result display.&#13;
The system achieved 66 percent accuracy, 67 percent precision, 60 percent recall, 63 percent &#13;
F1-score, and an AUC of 0.77. These results validate the effectiveness of hybrid feature fusion &#13;
for forgery detection. Expert feedback confirmed the project’s novelty and relevance, though &#13;
improvements such as forgery localisation and GUI-based interfaces are recommended for &#13;
future development.
</description>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/2963">
<title>"CyberGrid AI, AI-Powered Cybersecurity Policy Generator for Smart Grids  Assisted by Augmented Ontology"</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2963</link>
<description>"CyberGrid AI, AI-Powered Cybersecurity Policy Generator for Smart Grids  Assisted by Augmented Ontology"
Munasinghe, Thisaru
Modern smart grid infrastructures require highly context-specific and standards-compliant &#13;
cybersecurity policies to safeguard complex, dynamic energy networks. However, manual policy &#13;
development and generic templates struggle to keep pace with evolving smart grid threats and &#13;
regulatory requirements, often resulting in incomplete or non-compliant guidelines. This gap &#13;
highlights the need for an automated approach to generate precise, context-aware security policies &#13;
in line with industry standards. &#13;
To address this challenge, the project introduces CyberGrid AI, a multi-tiered system architecture &#13;
that combines a domain-specific augmented ontology with a GPT-powered AI engine. The smart &#13;
grid ontology encodes key assets, threat scenarios, and countermeasures, forming a knowledge &#13;
base for policy generation. User input about a given smart grid context is semantically matched &#13;
against this ontology to identify relevant threats and appropriate ISO/IEC 27001 controls. Prior to &#13;
generation, the model integrates the latest threat intelligence to account for emerging &#13;
vulnerabilities, ensuring that the resulting policies are both standards-compliant and up-to-date &#13;
with current cybersecurity risks.&#13;
A prototype of CyberGrid AI shows that the system can quickly produce high-quality security &#13;
policies. Each policy is generated in approximately 13 seconds and demonstrates over 95% &#13;
alignment with expert-defined policies in test scenarios, effectively mirroring the intended ISO &#13;
27001 controls. The ontology-based approach ensures full domain coverage and traceable policy &#13;
decisions, validating the effectiveness of combining ontological reasoning with AI-driven policy &#13;
generation.
</description>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</item>
<item rdf:about="http://dlib.iit.ac.lk/xmlui/handle/123456789/2962">
<title>Malware Detection System</title>
<link>http://dlib.iit.ac.lk/xmlui/handle/123456789/2962</link>
<description>Malware Detection System
Fernando, Kevin
This research presents a lightweight malware detection system for Microsoft Windows Portable&#13;
Executable (PE) files using static analysis and supervised machine learning. The study&#13;
addresses the limitations of signature-based antivirus and the operational overhead of dynamic&#13;
sandboxing by extracting discriminative yet inexpensive static features—average section&#13;
entropy, number of sections, total raw section size, and file size—and training a Random Forest&#13;
classifier to detect malicious executables. The methodology follows Design Science Research&#13;
and CRISP-DM, covering requirement specification, a modular architecture, implementation&#13;
in Python, dataset curation, model training, and comprehensive evaluation.
</description>
<dc:date>2025-01-01T00:00:00Z</dc:date>
</item>
</rdf:RDF>
