Publication

Publisher:
 International Journal Of Computer Applications
Publication Type:
 Journal
Publication Title:
 Elliptic Curve Cryptography For Securing Cloud Computing Applications
Publication Authors:
 Alowolodu O. D., Alese B. K., Adetunmbi A. O., Adewale O. S. And Ogundele O. S.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 Journal Of Computer Science And Applications
Publication Type:
 Journal
Publication Title:
 Modeling Attacker-Defender Interaction As A Zero-Sum Stochastic Game
Publication Authors:
 Ibidunmoye E.O., Alese, B.K. And Ogundele O.S.
Year Published:
 2013
Abstract:
Game-theoretic modeling of computer security views security attack scenarios as an optimization game comprising of multiple players notably the attackers and the defenders (system administrators). This paper first presents theoretically, a two-player zero-sum stochastic game model of the interaction between malicious users and network administrators and secondly introduces a hypothetical network of a typical scenario to show the applicability of our model within that scenario. State games are encoded using a binary scheme in order to properly capture components of the underlying network environment. Our solution involves reducing each state game into a min and max linear programming problems for both the defender and attacker respectively. Game costs, rewards and outcomes are modeled to closely match real world measurements. We propose the use of a combination of the pivotal algorithm and a custom stochastic algorithm to compute the optimal (best-response) strategies for the players at each state. We also describe how the results can be analyzed to show how the optimal strategies can be used by the network administrators to predict adversary's actions, determine vulnerable network assets and suggest optimal defense strategies. 
Publisher:
 International Journal Of Engineering And Technology.
Publication Type:
 Journal
Publication Title:
 Development Of A Fuzzy Logic Based Rainfall Prediction Model
Publication Authors:
 Agboola A.H., Gabriel A.J., Aliyu E.O., And Alese B.K
Year Published:
 2013
Abstract:
The present study investigates the ability of fuzzy rules/logic in modeling rainfall for South Western Nigeria. The developedFuzzy Logic model is made up of two functional components; the knowledge base and the fuzzy reasoning or decision-making unit. Twooperations were performed on the Fuzzy Logic model; the fuzzification operation and defuzzification operation. The model predicted outputs were compared with the actual rainfall data. Simulation results reveal that predicted results are in good agreement with measured data. Prediction Error, Root Mean Square Error (RMSE), Mean Absolute Error (MAE) and the Prediction Accuracy were calculated, and on the basis of the results obtained, it can be suggested that fuzzy methodology is efficiently capable of handling scattered data. The developed fuzzy rule-based model shows flexibility and ability in modeling an ill-defined relationship between input and output variables (15) (PDF) Development of a fuzzy logic based rainfall prediction model. Available from: https://www.researchgate.net/publication/285799840_Development_of_a_fuzzy_logic_based_rainfall_prediction_model [accessed Jun 28 2019]. 
Publisher:
 International Journal Of Computer Application
Publication Type:
 Journal
Publication Title:
 Neuro-Fuzzy System For Routing In A Computer Network
Publication Authors:
 Odekunle K.A., Alese B.K., And Abiola O.B
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 International Journal Of Engineering Research And Techno Logy
Publication Type:
 Journal
Publication Title:
 Leveraging On Honeypot Technology To Improve Network Security
Publication Authors:
 Ayeni, O.A., Alese, B.K., Dada, O.M. And Aliyu, E. O.
Year Published:
 2013
Abstract:
In this paper, a new framework is proposed for the design and implementation of decoy honeypot. In this research work, emphasis is laid on ways to improve network security by deploying honeypot technology. The design and configuration of a honeypot was implemented using a virtual machine(VM) ware workstation to detect attack or malicious traffic on a network. VM ware enables the creation, configuration, distribution, support and manages virtual machine similar to the one used on real computer system. Intrusion detection system (IDS), Entropy based detection scheme and Virtual machine (VM) ware work station were used to capture and analyse traffic over the network. The result shows that the deployment of an honeypot successfully fools an attacker to believe he is attacking a real system. Also, it shows that Honeypot can be deployed on a network to help in enhancing system security 
Publisher:
 International Journal Of Computer Applications
Publication Type:
 Journal
Publication Title:
 Design And Implementation Of A Medium Interaction Honeypot
Publication Authors:
 Ayeni, O.A., Alese, B.K., And Omotosho L. O.
Year Published:
 2013
Abstract:
Security in computing world is a serious issue and must be handle with utmost care, hence the need to always protect and secure our networks as more and more business are been conducted through the internet.The expansion of the World Wide Web has given unlimited access to attackers to prey on ignorant administrator who lacks basic knowledge of network security. Vulnerabilities in common security components such as firewalls, security patches, access control and encryption are inevitable, so hackers take advantage of these loopholes to break into computer networks.This paper presents the result of a research that was carried out using a medium interaction honeypot, a virtual machine ware workstation, snort software and entropy-based model for capturing, analyzing and detection of malicious traffic targeted at the network. A ring topology network of three system was design using virtual machine work station, a Snort software was installed on all the three machine to capture traffic on the network and entropy-based mathematical analysis was conducted on the traffic to detect attack/malicious traffic. The entropyH(x) = –Pi?Ni=1log2(Pi)where Pi= Ni/S. N is a set of positive integer that represent the total number of server on the network, nirepresent the size of the traffic in bytes and S represent the total length of the traffic that constitute the traffic. The result of the research work shows detection of malicious traffic and also limit the rate of denial of service targeted at the network. (15) (PDF) Design and Implementation of a Medium Interaction Honeypot. Available from: https://www.researchgate.net/publication/271070241_Design_and_Implementation_of_a_Medium_Interaction_Honeypot. 
Publisher:
 Journal Of Computer Engineering & Information Technology.
Publication Type:
 Journal
Publication Title:
 Web Enabled Campus Emergency Communication System
Publication Authors:
 Iwasokun G. A., Alese B. K., Thompson F. B. And Omoniyi V. I.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 International Journal Of Engineering Research And Techno Logy (IJERT)
Publication Type:
 Journal
Publication Title:
 Effect Of Linear Versus Curved Wavelet Paths In Seismic Oil Exploration Over Kukawa Axis
Publication Authors:
 Mbang, U.B., Alese, B. K., Adewale, O.S. And Enikanselu P. A.
Year Published:
 2013
Abstract:

Nil

 
Publisher:
 International Journal Of Computer And Information Technology
Publication Type:
 Journal
Publication Title:
 Network Worm Containment Using Markov Chain Approach
Publication Authors:
 Akinwumi D., Alese B. K., And Oluwadare S. A.
Year Published:
 2013
Abstract:
In recent years, computer worms have emerged as one of the most potent threat to the security of many networked computing communities. The need for more reliable and efficient systems for worm containment has continued to be on the rise. Different systems for worm containment have been developed by different authors with attending strengths and weaknesses. Vigilante is a host based Intrusion Detection System (IDS) that detect worms by instrumenting vulnerable programs to analyse infection attempts. In this work, an improved Vigilante system that generates Self-Certifying Alerts (SCAs) using Markov Chain algorithm was developed. The algorithm is formulated such that upon detection, host generates Self-Certifying Alerts, which can be verified by any vulnerable host. Hosts receiving an SCA protect themselves by generating filters that block worm attack. The developed mechanism is implemented in Windows Vista environment using Visual Basic.Net programming language. Experimental results on different worms in the selected network demonstrate the system’s ability to successfully detect and contain worms that are invoked into the network. A comparison of the results obtained with results of some other algorithms shows an overall good performance. 
Publisher:
 International Journal Of Computer And Information Technology
Publication Type:
 Journal
Publication Title:
 Intelligent System For Learning And Understanding Of Yoruba Language
Publication Authors:
 Oyekanmi E. O., Oluwadare S. A. And Alese B. K.
Year Published:
 2013
Abstract:

Nil