Computer Science
Permanent URI for this communityhttps://hdl.handle.net/10413/6769
Browse
Browsing Computer Science by Author "Blackledge, Jonathan Michael."
Now showing 1 - 3 of 3
- Results Per Page
- Sort Options
Item Application of artificial intelligence for detecting derived viruses.(2017) Asiru, Omotayo Fausat.; Blackledge, Jonathan Michael.; Dlamini, Moses Thandokuhle.A lot of new viruses are being created each and every day. However, some of these viruses are not completely new per se. Most of the supposedly ‘new’ viruses are not necessarily created from scratch with completely new (something novel that has never been seen before) mechanisms. For example, some of these viruses just change their forms and come up with new signatures to avoid detection. Hence, such viruses cannot be argued to be new. This research refers to such as derived viruses. Just like new viruses, we argue that derived viruses are hard to detect with current scanning-detection methods. Many virus detection methods exist in the literature, but very few address the detection of derived viruses. Hence, the ultimate research question that this study aims to answer is; how might we improve the detection rate of derived computer viruses? The proposed system integrates a mutation engine together with a neural network to detect derived viruses. Derived viruses come from existing viruses that change their forms. They do so by adding some irrelevant instructions that will not alter the intended purpose of the virus. A mutation engine is used to group existing virus signatures based on their similarities. The engine then creates derivatives of groups of signatures. This is done up until the third generation (of mutations). The existing virus signatures and the created derivatives are both used to train the neural network. The derived signatures that are not used for the training are used to determine the effectiveness of the neural network. Ten experiments were conducted on each of the three derived virus generations. The first generation showed the highest derived virus detection rate compared to the other two generations. The second generation also showed a slightly higher detection rate than the third generation which has the least detection rate. Experimental results show that the proposed model can detect derived viruses with an average accuracy detection rate of 80% (This includes a 91% success rate on first generation, 83% success rate on second generation and 65% success rate on third generation). The results further show that the correlation between the original virus signature and its derivatives decreases with the generations. This means that after many generations of a virus changing form, its variants will no longer look like the original. Instead the variants look like a completely new virus even though the variants and the original virus will always have the same behaviour and operational characteristics with similar effects.Item Client-side encryption and key management: enforcing data confidentiality in the cloud.(2016) Mosola, Napo Nathnael.; Blackledge, Jonathan Michael.; Dlamini, Moses Thandokuhle.Cloud computing brings flexible, scalable and cost effective services. This is a computing paradigm whose services are driven by the concept of virtualization and multi-tenancy. These concepts bring various attractive benefits to the cloud. Among the benefits is reduction in capital costs, pay-per-use model, enormous storage capacity etc. However, there are overwhelming concerns over data confidentiality on the cloud. These concerns arise from various attacks that are directed towards compromising data confidentiality in virtual machines (VMs). The attacks may include inter-VM and VM sprawls. Moreover, weaknesses or lack of data encryption make such attacks to thrive. Hence, this dissertation presents a novel client-side cryptosystem derived from evolutionary computing concepts. The proposed solution makes use of chaotic random noise to generate a fitness function. The fitness function is used to generate strong symmetric keys. The strength of the encryption key is derived from the chaotic and randomness properties of the input noise. Such properties increase the strength of the key without necessarily increasing its length. However, having the strongest key does not guarantee confidentiality if the key management system is flawed. For example, encryption has little value if key management processes are not vigorously enforced. Hence, one of the challenges of cloud-based encryption is key management. Therefore, this dissertation also makes an attempt to address the prevalent key management problem. It uses a counter propagation neural network (CPNN) to perform key provision and revocation. Neural networks are used to design ciphers. Using both supervised and unsupervised machine learning processes, the solution incorporates a CPNN to learn a crypto key. Using this technique there is no need for users to store or retain a key which could be compromised. Furthermore, in a multi-tenant and distributed environment such as the cloud, data can be shared among multiple cloud users or even systems. Based on Shamir's secret sharing algorithm, this research proposes a secret sharing scheme to ensure a seamless and convenient sharing environment. The proposed solution is implemented on a live openNebula cloud infrastructure to demonstrate and illustrate is practicability.Item Post-quantum cloud security and data exchange using artificial intelligence.(2023) Mosola, Napo Nathnael.; Blackledge, Jonathan Michael.; Dombeu, Jean Vincent Fonou.This thesis investigates the application of plausible modern-day cryptographic solutions for securing the cloud and exchanging confidential data. The context followed is such that the strength of an encryption algorithm is based on the difficulty to cryptanalyse it. This means the more difficult the crypto-system is to cryptanalyse, the stronger and more trusted it is. The success of cryptanalysis on a cryptographic algorithm has been a function of the computational power available at the time of performing the cryptanalysis, without consideration of future innovations, specifically, without careful consideration of Moore’s law. A significant number of public-key crypto-systems can and will be compromised by a quantum computer coupled with the implementation of Shor’s algorithm. This has brought a lot of focus regarding research on cryptographic solutions post quantum computing (PQC) due to the following: ˆ cryptographic algorithms are based on the intractability of prime number factorisation using a conventional computing power; ˆ a quantum computer can factorize prime numbers with relative ease. In the past, the quantum computing paradigm was a hypothetical concept. Thus, cryptanalysis using quantum resources was a theoretical idea. This is no longer the case with the loom of quantum computers eminent. Consequently, prime number based encryption is becoming increasingly irrelevant. Low Qubit quantum computers now exist. Research and development in this area is growing. Hence the existence of the post-quantum cryptography paradigm. This paradigm is based on encryption algorithms developed and considered secure enough to withstand quantum attacks. Thus, the National Institute of Standards and Technology made a call for projects clustered under the Open Quantum Safe project (OQSP), which began in 2016. The ultimate goal of this project is development of future quantum resistant cryptographic algorithms for secure communication and data exchange. The OQSP aims to gather open source libraries which can be standalone or integrated into the public key encryption schemes to improve their security against ii quantum attacks in the quest to achieve quantum resistance. The major focus is placed on quantum key exchange (QKE). It is against this background that the material presented in this thesis reports on a spectrum of algorithms that are thought to be quantum resistant based on a coherence of ideas, methods, models and software implementation, trying to meet the NIST requirements and contributing to new knowledge in the field of cryptography. The aim is to provide confidentiality guarantees on cloud-hosted data as well as secure data exchange between communicating entities, while also tackling the cumbersome key exchange and management problem. The results show that the algorithms presented in this thesis introduce new ideas in cryptography and can be tested to withstand cryptanalytic quantum attacks, while a plausible encryption key distribution and management solution is proposed. In this context, the material presented in this thesis report on a spectrum of algorithms that are proposed to be quantum resistant based on a coherence of ideas, methods and software implementation, aimed at providing security of cloud-hosted data as well as data exchange between communicating entities. The cloud has a flexible, scalable and low cost properties. This is due to two concepts which are fundamental to cloud computing: ˆ virtualization; ˆ multi-occupancy. These above concepts have brought infinitely many benefits which make the cloud an attractive paradigm. Among the benefits are reduced capital and maintenance costs, high processing power, enormous storage facilities etc. However, security concerns affecting confidentiality of cloud-hosted data still plague bring concerns when it comes to cloud adoption. Data confidentiality can be achieved through encryption, which is in turn implemented by cryptographic algorithms. Hence, this thesis proposes and puts into practice cryptographic algorithms to solve issues of confidentiality, specifically in the cloud.