Publication

Publisher:
 Proceedings Of The World Congress On Engineering
Publication Type:
 Journal
Publication Title:
 Design Of Software User Identity Module (SUIM) For Preventing Software Piracy
Publication Authors:
 180. Adu Michael K, Alese Boniface K, Adetunmbi Adebayo O.
Year Published:
 2014
Abstract:

Nil

 
Publisher:
 Proceedings Of The World Congress On Engineering
Publication Type:
 Journal
Publication Title:
 Modelling Of Risk Management Procedures For Cybercrime Control Systems
Publication Authors:
 179. Alese B. Kayode, Gabriel J. Arome, Olukayode Oluwatoyin And Daramola O.A.
Year Published:
 2014
Abstract:
This paper proposes formal models for Risk Management Procedures in cybercrime control systems. Mathematical techniques used stem from probability theory, set theory, statistics, and stochastic process theory. 
Publisher:
 Proceedings Of The World Congress On Engineering
Publication Type:
 Journal
Publication Title:
 Analysing Issues Of Cyber Threats In Nigeria
Publication Authors:
 178. Boniface K. Alese, Aderonke F. Thompson, Korede V. Owa, Otasowie Iyare., Olufemi T. Adebayo
Year Published:
 2014
Abstract:
This paper examines the pattern of cyber threats and information security in line with the Nigerian approach to meeting these challenges in the 21st century. Investigation was carried out on the level of awareness and compliance with the existing cyber security policies among the cyberspace users. The level of enforcement of these policies or measures by cybercafé administrators and government security agencies is also considered. The research employed primarily qualitative methods in the design and analysis. A questionnaire was designed and used in the study. Data obtained from the survey through the questionnaires administered were subjected to analysis using the Statistical Package for Social Sciences (SPSS). The results of the analysis suggest the major group of the populace that are mostly active in committing cybercrime. 
Publisher:
 Proceedings Of The World Congress On Engineering
Publication Type:
 Journal
Publication Title:
 Game-based Analysis Of The Network Attack-Defense Interaction
Publication Authors:
 177. Boniface K. Alese, Emmanuel O. Ibidunmoye, D.I. Haruna, Aderonke F. Thompson, Iyare Otasowie
Year Published:
 2014
Abstract:
The interactive behavior between the attacker and the defender in a network environment is similar to information warfare where both attacker and defender may have several available strategies to achieve maximum gratification. The process of positioning security within a network environment is synonymous to a decision-making process. Security decision-making involves the allocation of scarce network security resources to counter or mitigate security attacks. To ensure effective security, security decision-makers must ensure that the resources are allocated and deployed in the most optimum manner. Game theory provides a quantitative framework for the analysis and modeling of such network security cases. Game-theoretic models view network security scenarios as an optimization game comprising of multiple players notably the attackers (malicious users) and the defenders (system administrators) and has become a major source of attraction in security research. These types of games are referred to as security games. Security games and their solutions are potential tools for security decision making and algorithm development as well as for predicting attacker behavior. In this paper, we first explore the fundamentals of game-theory with respect to security, and then presents a two-player zero-sum game model of the interaction between malicious users and network administrators. A description of the major components of such game is presented and a solution technique for solving such game scenario is proposed. We then describe how expected results can be analyzed to show the optimality of resulting strategies and how they may be employed by system administrators to better protect the network. 
Publisher:
 Proceedings Of The World Congress On Engineering
Publication Type:
 Journal
Publication Title:
 Fingerprint Matching Using Spatial Characteristics
Publication Authors:
 176. Akinyokun Oluwole C., Alese Boniface K., And Iwasokun Gabriel B.
Year Published:
 2014
Abstract:
Biometric identification has featured prominently for individuals with fingerprint emerging as the dominant one. The dominance of fingerprint is been established by the continuous emergence of different forms of Automated Fingerprint Identification Systems (AFIS). In the course of performing its assigned roles, an AFIS conducts a lot of activities including fingerprint enrolment, creation of its profile database and minutiae enhancement which involves image segmentation, normalization, Gabor filter, binarization and thining. The activities also involve extraction of minutiae, pattern recognition and matching, error detection and correction and decision making. In this paper, a minutiae-based algorithm for fingerprint pattern recognition and matching is proposed. The algorithm uses the distance between the minutiae and core points to determine the pattern matching scores for fingerprint images. Experiments were conducted using FVC2002 fingerprint database comprising four datasets of images of different sources and qualities. False Match Rate (FMR), False Non-Match Rate (FNMR) and the Average Matching Time (AMT) were the statistics generated for testing and measuring the performance of the proposed algorithm. Findings from the experimental study showed the effectiveness of the algorithm in distinguishing fingerprints obtained from different sources with average FMR of 0%. It is also revealed that the ability of the algorithm to match images obtained from same source is heavenly dependent on the qualities of such images. 
Publisher:
 The 9th International Conference For Internet Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 A Robust Multicast Authentication Scheme Based On Asymmetric Key Signature
Publication Authors:
 174. Opayinka Christianah A., Alese Boniface K., Thompson Aderonke F., Alowolodu Olufunso D., Osuolale Festus A.
Year Published:
 2014
Abstract:
Multicast packets authentication major challenges are high computation overhead incurred while signing multicast streams and authentication difficulty when there is one or more packet losses. In this paper, Information Dispersal Algorithm was used to construct the hash of each packet with the hash values of individual packets concatenated over multiple packets. Authentication scheme for Multicast message packets design was based on signature amortization technique. This reduces the computation overhead and ensures verification when there is packet loss. The design was simulated with a number of messages sent to a chosen number of receivers. Probabilities of loss were calculated for each transmission. The performance was compared with three other existing schemes to ascertain its efficiency. It was observed that our technique is efficient in packets authentication in a lossy environment especially with reduced space overhead 
Publisher:
 The 9th International Conference For Internet Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 Evaluation Of Information Security Risks Using Hybrid Assessment Model
Publication Authors:
 173. Alese B. K., Oyebade O., Osuolale A. Festus, Iyare O., Thompson A. F
Year Published:
 2014
Abstract:
A risk is the possibility that an undesirable event could happen. Several risk management software tools have been developed in the past to address pressing industrial concerns such as risk identification and estimation, risk exposure, mitigation and keep track of risk positions and respective management plans. Several methods have been developed and used in risk assessments. Two specific methods of interest in this work are: "Risk Matrices" and "Risk Registers". A generic Risk Register application module and an updatable Risk Matrix module was designed. This work studies risk management techniques and employs a custom model for the automated assessment of IS risks. This model was implemented in phases corresponding to its aspects. The "Assessment methods" of interest to this work are Risk Registers, Risk Matrices and the Scenario Geek". What-if analysis is a data-intensive simulation whose goal is to inspect the behavior of a complex system under some given hypotheses called scenarios. What-ifs are used to generate qualitative descriptions of potential problems in the form of questions and responses lists of recommendations for preventing problems. The Risk Assessor was developed using Microsoft's Visual Basic .Net with Active Server Pages (ASP.Net) Technologies on .Net Framework 4.0. This work, if adopted will help keep track of the basic sources which can hamper the operations of the information technology organizations 
Publisher:
 The 9th International Conference For Internet Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 An Attribute-Based Signature Using Rivest Shamir Adleman Scheme
Publication Authors:
 172. L. A. Nwosu, A. F. Thompson, B.K Alese, Obe O.
Year Published:
 2014
Abstract:
Traditional attribute architectures and cryptosystems are ill-equipped to provide security in the face of diverse access requirements and environments. The glitches of confidentiality, authenticity and anonymity induced by the exponential upsurge in digital technology have generated some security concerns, compelling security parameters review for enhanced security. Consequently, in this paper, an ABS was constructed based on groups with bilinear pairings with a powerful feature that it can be readily used in a multi-authority setting. The developed system overcomes the shortcomings of other schemes in the standard model. Implementations of RSA Encryption schemes were done with C#; the scheme was compared with earlier constructed schemes to verify its performance. I was observed that these processes: signing, encryption, decryption and verification proved more efficient when compared to existing schemes using standard parameters 
Publisher:
 The 9th International Conference For Internet Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 Barefoot Morphology: A Person Unique Feature For Forensic Identification
Publication Authors:
 Osisanwo F.Y., Adetunmbi A.O., Alese B.K
Year Published:
 2014
Abstract:
Divers features of human body are being explored on daily basis for person identification based on their uniqueness to individuals. The use of fingerprint in crime investigation has come to stay, but criminals are getting smarter by protecting their fingerprints from being evidence at a crime scene. Concealing of footprint or shoe print is yet to become popular, some criminals still go bare footed to crime scene. Footprint can be secured and analysed using image processing techniques such as de-noising, image partitioning, pattern matching This research looks at the uniqueness of barefoot morphology, should in any circumstance barefoot prints are found at a scene and are required to suggest a suspect or criminal. Image processing algorithms are employed to analyse barefoot prints in other to establish the unique features on the prints. 
Publisher:
 The 9th International Conference For Internet Technology And Secured Transactions
Publication Type:
 Journal
Publication Title:
 A Replication Model For Students' Results Processing
Publication Authors:
 Iyare Otasowie, Thompson Aderonke F., Alese Boniface K.
Year Published:
 2014
Abstract:

Nil