Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Exponential growth experienced in Internet usage have pave way to exploit users of the Internet, phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false... more
Exponential growth experienced in Internet usage have pave way to exploit users of the Internet, phishing attack is one of the means that can be used to obtained victim confidential details unwittingly across the Internet. A high false positive rate and low accuracy has been a setback in phishing detection. In this research RandomForest, SysFor, SPAARC, RepTree, RandomTree, LMT, ForestPA, JRip, PART, NNge, OneR, AdaBoostM1, RotationForest, LogitBoost, RseslibKnn, LibSVM, and BayesNet were employed to achieve the comparative analysis of machine classifier. The performance of the classifier algorithms were rated using Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operation Characteristics Area, Root Relative Squared Error False Positive Rate and True Positive Rate using WEKA data mining tool. The research revealed that quit a number of classifiers also exist which if properly explored will yield more accurate results for phishing detection. RondomForest was...
Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique-of humpback whales-for solving the complex optimization problems. It has been... more
Whale optimization algorithm (WOA) is a recently developed swarm-based meta-heuristic algorithm that is based on the bubble-net hunting maneuver technique-of humpback whales-for solving the complex optimization problems. It has been widely accepted swarm intelligence technique in various engineering fields due to its simple structure, less required operator, fast convergence speed and better balancing capability between exploration and exploitation phases. Owing to its optimal performance and efficiency, the applications of the algorithm have extensively been utilized in multidisciplinary fields in the recent past. This paper investigates further into WOA of its applications, modifications, and hybridizations across various fields of engineering. The description of the strengths, weaknesses and opportunities to support future research are also explored. The Systematic Literature Review is opted as a method to disseminate the findings and gap from the existing literature. The authors...
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity,... more
Fog computing is a new paradigm of computing that extends cloud-computing operations to the edges of the network. The fog-computing services provide location sensitivity, reduced latency, geographical accessibility, wireless connectivity, and enhanced improved data streaming. However, this computing paradigm is not an alternative for cloud computing and it comes with numerous security and privacy challenges. This paper provides a systematic literature review on the security challenges in fog-computing system. It reviews several architectures that are vital to support the security of fog environment and then created a taxonomy based on the different security techniques used. These include machine learning, cryptographic techniques, computational intelligence, and other techniques that differentiate this paper from the previous reviews in this area of research. Nonetheless, most of the proposed techniques used to solve security issues in fog computing could not completely addressed the security challenges due to the limitation of the various techniques. This review is intended to guide experts and novice researchers to identify certain areas of security challenges in fog computing for future improvements.
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure, application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level... more
Cloud computing is defined as the delivery of on-demand computing resources ranging from infrastructure, application to datacenter over the internet on a pay-per-use basis. Most cloud computing applications does not guarantee high level of security such as privacy, confidentiality and integrity of data because of third-party transition. This brings the development of Blowfish cloud encryption system that enables them to encrypt their data before storage in the cloud. Blowfish encryption scheme is a symmetric block cipher used to encrypt and decrypt data. Microsoft Azure cloud server was used to test the proposed encryption system. Users are able to encrypt their data and obtain a unique identification to help them retrieve encrypted data from the cloud storage facility as when needed.
Dynamic topology change and decentralized makes routing a challenging task in mobile ad hoc network. Energy efficient routing is the most challenging task in MANET due to limited energy of mobile nodes. Limited power of batteries... more
Dynamic topology change and decentralized makes routing a challenging task in mobile ad hoc network. Energy efficient routing is the most challenging task in MANET due to limited energy of mobile nodes. Limited power of batteries typically use in MANET, and this is not easy to change or replace while running communication. Network disorder can occur for many factors but in middle of these factors deficiency of energy is the most significant one for causing broken links and early partition of the network. Evenly distribution of power between nodes could enhance the lifetime of the network, which leads to improving overall network transmission and minimizes the connection request. To discourse this issue, we propose an Energy Aware Routing Protocol (EARP) which considers node energy in route searching process and chooses nodes with higher energy levels. The EARP aim is to establish the shortest route from source to destination that contains energy efficient nodes. The performance of E...
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to... more
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to investigate the prevalence of spam SMS, with focus on Nigeria. To quantify the prevalence, primary data was collected using questionnaire. Out of 270 surveyed, the responses of 191 mobile users were valid and analyzed. The study revealed that all mobile subscribers receive spam SMS, receiving an average of 2.45 spam SMS daily. This implies an average of 334,857,685 spam SMS received daily in Nigeria. However, most are for commercial purposes. Few mobile users report cases of fraudulent spam SMS, including those with SMShing intent, to network providers or security agencies. Most believe customers of mobile networks should reserve the right to determine the type of unsolicited SMS to be received, and unsolicited advertorial/promotional SMS should be regulated. Current guidelines and regulations need to be reviewed, to effectively manage spamming activities in Nigeria.
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows... more
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows stronger. In this paper, we looked at the structure and components of the member profile and the challenges of privacy issues faced by individuals and governments that participate in social networking. We also looked at how it can be used to distort national security, how it became the new weapons of mass mobilization and also how social networks have became the rallying forces for revolutions and social justice.
Research Interests:
Deep learning is presently attracting extra ordinary attention from both the industry and the academia. The optimization of deep learning models through nature inspired algorithms is a subject of debate in computer science. In this paper... more
Deep learning is presently attracting extra ordinary attention from both the industry and the academia. The optimization of deep learning models through nature inspired algorithms is a subject of debate in computer science. In this paper , we present recent progress on the application of nature inspired algorithms in deep learning. The survey pointed out recent development issues, strengths, weaknesses and prospects for future research. A new taxonomy is created based on natured inspired algorithms for deep learning. The trend of the publications in this domain is depicted; it shows the research area is growing but slowly. The deep learning architectures not exploit by the nature inspired algorithms for optimization are unveiled. We believed that the survey can facilitate synergy between the nature inspired algorithms and deep learning research communities. As such, massive attention can be expected in a near future.
The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning methods of recent are being used to successfully detect and filter... more
The upsurge in the volume of unwanted emails called spam has created an intense need for the development of more dependable and robust antispam filters. Machine learning methods of recent are being used to successfully detect and filter spam emails. We present a systematic review of some of the popular machine learning based email spam filtering approaches. Our review covers survey of the important concepts, attempts, efficiency, and the research trend in spam filtering. The preliminary discussion in the study background examines the applications of machine learning techniques to the email spam filtering process of the leading internet service providers (ISPs) like Gmail, Yahoo and Outlook emails spam filters. Discussion on general email spam filtering process, and the various efforts by different researchers in combating spam through the use machine learning techniques was done. Our review compares the strengths and drawbacks of existing machine learning approaches and the open research problems in spam filtering. We recommended deep leaning and deep adversarial learning as the future techniques that can effectively handle the menace of spam emails.
Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science discipline. Symbiotic organisms search (SOS) algorithm is a recent metaheuristic... more
Nature-inspired algorithms take inspiration from living things and imitate their behaviours to accomplish robust systems in engineering and computer science discipline. Symbiotic organisms search (SOS) algorithm is a recent metaheuristic algorithm inspired by symbiotic interaction between organisms in an ecosystem. Organisms develop symbiotic relationships such as mutualism, commensalism, and parasitism for their survival in ecosystem. SOS was introduced to solve continuous benchmark and engineering problems. The SOS has been shown to be robust and has faster convergence speed when compared with genetic algorithm, particle swarm optimization, differential evolution, and artificial bee colony which are the traditional metaheuristic algorithms. The interests of researchers in using SOS for handling optimization problems are increasing day by day, due to its successful application in solving optimization problems in science and engineering fields. Therefore, this paper presents a comprehensive survey of SOS advances and its applications, and this will be of benefit to the researchers engaged in the study of SOS algorithm.
Email has continued to be an integral part of our lives and as a means for successful communication on the internet. The problem of spam mails occupying a huge amount of space and bandwidth, and the weaknesses of spam filtering techniques... more
Email has continued to be an integral part of our lives and as a means for successful communication on the internet. The problem of spam mails occupying a huge amount of space and bandwidth, and the weaknesses of spam filtering techniques which includes misclassification of genuine emails as spam (false positives) are a growing challenge to the internet world. This research work proposed the use of a metaheuristic optimization algorithm, the whale optimization algorithm (WOA), for the selection of salient features in the email corpus and rotation forest algorithm for classifying emails as spam and non-spam. The entire datasets were used, and the evaluation of the rotation forest algorithm was done before and after feature selection with WOA. The results obtained showed that the rotation forest algorithm after feature selection with WOA was able to classify the emails into spam and non-spam with a performance accuracy of 99.9% and a low FP rate of 0.0019. This shows that the proposed method had produced a remarkable improvement as compared with some previous methods.
In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is... more
In this paper research was carried out in order to evaluate the security risk analysis and management in banking company through the use of a questionnaire to determine the level of risk that customer of the financial institution is likely to encounter. It was discovered that though the majority of financial institution users are familiar with the possible risk associated with some banking transaction, some aspect still exists that financial institution users are not familiar with which serves as a vulnerable point that could be exploited. The study makes a recommendation for proper enlightenment of financial institution users so as to stay abreast with possible security challenge associated with some banking transaction processes to be able to mitigate possible exploit.
In Cloud Computing model, users are charged according to the usage of resources and desired Quality of Service (QoS). Multi-objective task scheduling problem based on desired QoS is an NP-Complete problem. Due to the NP-Complete nature of... more
In Cloud Computing model, users are charged according to the usage of resources and desired Quality of Service (QoS). Multi-objective task scheduling problem based on desired QoS is an NP-Complete problem. Due to the NP-Complete nature of task scheduling problems and huge search space presented by large scale problem instances, many of the existing solution algorithms cannot effectively obtain global optimum solutions. In this paper, a chaotic symbiotic organisms search (CMSOS) algorithm is proposed to solve multi-objective large scale task scheduling optimization problem on IaaS cloud computing environment. Chaotic optimization strategy is employed to generate initial ecosystem (population), and random sequence based components of the phases of SOS are replaced with chaotic sequence to ensure diversity among organisms for global convergence. In addition, chaotic local search strategy is applied to Pareto Fronts generated by SOS algorithms to avoid entrapment in local optima. The performance of the proposed CMSOS algorithm is evaluated on CloudSim simulator toolkit, using both standard workload traces and synthesized workloads for larger problem instances of up to 5000. Moreover, the performance of the proposed CMSOS algorithm was found to be competitive with the existing with the existing multi-objective task scheduling optimization algorithms. The CMSOS algorithm obtained significant improved optimal trade-offs between execution time (makespan) and financial cost (cost) with no computational overhead. Therefore, the proposed algorithms have potentials to improve the performance of QoS delivery.
—Mobile wallet is a payment platform that stores money as a value in a digital account on mobile device which can then be used for payments with or without the need for the use credit/debit cards. The cases of cyber-attacks are on the... more
—Mobile wallet is a payment platform that stores money as a value in a digital account on mobile device which can then be used for payments with or without the need for the use credit/debit cards. The cases of cyber-attacks are on the rise, posing threats to the confidentiality, integrity and availability of information systems including the mobile wallet transactions. Due to the adverse impacts of cyber-attacks on the mobile payment service providers and the users, as well as the risks associated with the use of information systems, performing risk management becomes imperative for business organizations. This research work focuses on the assessment of the vulnerabilities associated with mobile wallet transactions and performs an empirical risk management in order to derive the security priority level needed to ensure the security and privacy of the users of mobile wallet platforms. Based on the extensive literature review, a structured questionnaire was designed and administered to the mobile wallet users who are Paga student customers via the internet. A total number of 52 respondents participated in the research and their responses were analyzed using descriptive statistics. The results of the analysis show that mobile wallet Login details are the most important part of customer information that need to be highly protected as their compromise is likely to affect others. Also, customers' information such as Mobile Wallet Account Number, Registered Phone Number, Linked ATM Card details, and Linked ATM Card PIN among others are also plausible to attacks. Hence, different security priority levels were derived to safeguard each of the components and possible security tools and mechanisms are recommended. The study also revealed that there are vulnerabilities from the mobile wallet users end that also pose threat to the security of the payment system and customers' transaction which need to be properly addressed. This research work will enable the mobile payment service providers focus on their services and prioritize the security solutions for each user's information types or components base on the risks associated with their system and help in taking an inform security related decisions.
Research Interests:
—Virtual machine scheduling in the cloud is considered one of the major issue to solve optimal resource allocation problem on the heterogeneous datacenters. Concerning that, the key concern is to map the virtual machines (VMs) with... more
—Virtual machine scheduling in the cloud is considered one of the major issue to solve optimal resource allocation problem on the heterogeneous datacenters. Concerning that, the key concern is to map the virtual machines (VMs) with physical machines (PMs) in a way that maximum resource utilization can be achieved with minimum cost. Since scheduling is an NP-hard problem, a metaheuristic approach is proven to achieve a better optimal solution to solve this problem. In a rapid changing heterogeneous environment, where millions of resources can be allocated and deallocate in a fraction of the time, modern metaheuristic algorithms perform well due to its immense power to solve the multidimensional problem with fast convergence speed. This paper presents a conceptual framework for solving multi-objective VM scheduling problem using a novel metaheuristic Whale optimization algorithm (WOA). Furthermore, we present the problem formulation for the framework to achieve multi-objective functions.
Research Interests:
Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of " big data ". ANN are known for their effectiveness and efficiency for small datasets, and this era of big data has... more
Approximately 2.5 quintillion bytes of data are emitted on a daily basis, and this has brought the world into the era of " big data ". ANN are known for their effectiveness and efficiency for small datasets, and this era of big data has posed a challenge to the big data analytics using ANN. Recently, much research effort has been devoted to the application of ANN in big data analytics and is still ongoing, although it is in it is early stages. The purpose of this paper is to summarise recent progress, challenges and opportunities for future research. This paper presents a concise view of the state-of-the-art, challenges and future research opportunities regarding the applications of ANN in big data analytics, and reveals that progress has been made in this area. Our review points out the limitations of the previous approaches, the challenges in the ANN approaches in terms of their applications in big data analytics, several ANN architecture that have not yet been explored in big data analytics and opportunities for future research. We believe that this paper can serve as a yardstick for future progress on the applications of ANN in big data analytics as well as a starting point for new researchers with an interest in the exploration of ANN in big data analytics.
Scheduling problems in cloud computing environment are mostly influenced by multi-objective optimization but frequently deal with using single-objective algorithms. The algorithms need to resolve multi-objective problems which are... more
Scheduling problems in cloud computing environment are mostly influenced by multi-objective optimization but frequently deal with using single-objective algorithms. The algorithms need to resolve multi-objective problems which are significantly different from the procedure or techniques used for single-objective optimizations. For this purpose, meta-heuristic algorithms always show their strength to deal with multi-objective optimization problems. In this research article, we present an innovative Multi-objective Cuckoo Search Optimization (MOCSO) algorithm for dealing with the resource scheduling problem in cloud computing. The main objective of resource scheduling problem is to reduce the cloud user cost and enhance the performance by minimizing makespan time, which helps to increase the revenue or profit for cloud providers with maximum resource utilization. Therefore, the proposed MOCSO algorithm is a new method for solving multi-objective resource scheduling problems in IaaS cloud computing environment. Moreover, the effects of the proposed algorithm are analyzed and evaluated by comparison with state-of-the-art multi-objective resource scheduling algorithms using simulation framework. Results obtained from simulation show that the proposed MOSCO algorithm performs better than MOACO, MOGA, MOMM and MOPSO, and balance multiple objectives in terms of expected time to completion and expected cost to completion matrices for resource scheduling in IaaS cloud computing environment.
Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing. Optimal resource scheduling is a great challenge and considered to be an NP-hard... more
Resource scheduling is a procedure for the distribution of resources over time to perform a required task and a decision making process in cloud computing. Optimal resource scheduling is a great challenge and considered to be an NP-hard problem due to the fluctuating demand of cloud users and dynamic nature of resources. In this paper, we formulate a new hybrid gradient descent cuckoo search (HGDCS) algorithm based on gradient descent (GD) approach and cuckoo search (CS) algorithm for optimizing and resolving the problems related to resource scheduling in Infrastructure as a Service (IaaS) cloud computing. This work compares the makespan, throughput, load balancing and performance improvement rate of existing meta-heuristic algorithms with proposed HGDCS algorithm applicable for cloud computing. In comparison with existing meta-heuristic algorithms, proposed HGDCS algorithm performs well for almost in both cases (Case-I and Case-II) with all selected datasets and workload archives. HGDCS algorithm is comparatively and statistically more effective than ACO, ABC, GA, LCA, PSO, SA and original CS algorithms in term of problem solving ability in accordance with results obtained from simulation and statistical analysis.
—As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing... more
—As the world has greatly experienced a serious advancement in the area of technological advancement over the years, the availability of lots of sophisticated and powerful image editing tools has been on the rise. These image editing tools have become easily available on the internet, which has made people who are a novice in the field of image editing, to be capable of tampering with an image easily without leaving any visible clue or trace behind, which has led to increase in digital images losing authenticity. This has led to developing various techniques for tackling authenticity and integrity of forged images. In this paper, a robust and enhanced algorithm is been developed in detecting copy-move forgery, which is done by hybridizing block-based DCT (Discrete Cosine Transform) technique and a keypoint-based SURF (Speeded-Up Robust Feature)technique using the MATLAB platform. The performance of the above technique has been compared with DCT and SURF techniques as well as other hybridized techniques in terms of precision, recall, FPR and accuracy metrics using MICC-F220 dataset. This technique works by applying DCT to the forged image, with the main goal of enhancing the detection rate of such image and then SURF is applied to the resulting image with the main goal of detecting those areas that are been tampered with on the image. It has been observed that this paper's technique named HDS has an effective detection rate on the MICC-F220 dataset with multiple cloning attacks and other various attacks such as rotation, scaling, a combination of scaling plus rotation, blur, compression, and noise. Index Terms—Copy-move image forgery, block-based method, keypoint-based method, DCT, SURF
Research Interests:
The increase in the use of email in every day transactions for a lot of businesses or general communication due to its cost effectiveness and efficiency has made emails vulnerable to attacks including spamming. Spam emails also called... more
The increase in the use of email in every day transactions for a lot of businesses or general communication due to its cost effectiveness and efficiency has made emails vulnerable to attacks including spamming. Spam emails also called junk emails are unsolicited messages that are almost identical and sent to multiple recipients randomly. In this study, a performance analysis is done on some classification algorithms including: Bayesian Logistic Regression, Hidden Naï ve Bayes, Radial Basis Function (RBF) Network, Voted Perceptron, Lazy Bayesian Rule, Logit Boost, Rotation Forest, NNge, Logistic Model Tree, REP Tree, Naï ve Bayes, Multilayer Perceptron, Random Tree and J48. The performance of the algorithms were measured in terms of Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operator Characteristics Area and Root Relative Squared Error using WEKA data mining tool. To have a balanced view on the classification algorithms' performance, no feature selection or performance boosting method was employed. The research showed that a number of classification algorithms exist that if properly explored through feature selection means will yield more accurate results for email classification. Rotation Forest is found to be the classifier that gives the best accuracy of 94.2%. Though none of the algorithms did not achieve 100% accuracy in sorting spam emails, Rotation Forest has shown a near degree to achieving most accurate result.
One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet. It resultant consequences are that it slow down... more
One of the dangers faced by various organizations and institutions operating in the cyberspace is Distributed Denial of Service (DDoS) attacks; it is carried out through the internet. It resultant consequences are that it slow down internet services, makes it unavailable, and sometime destroy the systems. Most of the services it affects are online applications and procedures, system and network performance, emails and other system resources. The aim of this work is to detect and classify DDoS attack traffics and normal traffics using multi layered feed forward (FFANN) technique as a tool to develop model. The input parameters used for training the model are: service count, duration, protocol bit, destination byte, and source byte, while the output parameters are DDoS attack traffic or normal traffic. KDD99 dataset was used for the experiment. After the experiment the following results were gotten, 100% precision, 100% specificity rate, 100% classified rate, 99.97% sensitivity. The detection rate is 99.98%, error rate is 0.0179%, and inconclusive rate is 0%. The results above showed that the accuracy rate of the model in detecting DDoS attack is high when compared with that of the related works which recorded detection accuracy as 98%, sensitivity 96%, specificity 100% and precision 100%.
Ministries, Department and Agencies (MDA " s) websites are useful constituents for information dissemination and citizen centric services. Various vulnerabilities exist in this websites. In this paper, vulnerabilities found in MDA " s... more
Ministries, Department and Agencies (MDA " s) websites are useful constituents for information dissemination and citizen centric services. Various vulnerabilities exist in this websites. In this paper, vulnerabilities found in MDA " s website are categorized and analyzed based on Open Web Application Security Project (OWASP) Top 10 to understand impact of these vulnerabilities on web security of MDA " s websites. In this study we have analyzed security pertaining to 10 MDA " s websites. We found vulnerabilities in all websites with different degree of security risk. To achieve the results we have cross tabulated vulnerabilities found in these websites with their security risk level. As a result the research work found that vulnerability A4-insecure direct object reference with 49% is the main contributor of web security risk in MDA " s websites. Apart from this it is clearly evident that majority of the vulnerabilities found in MDA " s websites belongs to informational risk group with 45.82% but still few high impacting vulnerabilities exists and needs to be handle without delay. Thus, the paper contributed towards the understanding of web security risk in MDA " s websites.
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals... more
In recent past, there are a lot of research advancements in mobile forensics tools. This is so due to increase usage of mobile phones in storage of information, law enforcement, mobile online transactions, and also negatively by criminals due to increased computational capabilities. Mobile forensics devices continue to remain a very challenging task due to poor user data retrieval techniques for evidence retrieval. Recently, third party applications assume a veritable feet because it is supported by majority of mobile devices platforms, thereby making it easy to extract information of its users' for future criminal audit. This paper proposes an evidence data retrieval method from InstagramApp using two networks based platforms (that is, pure peer-to-peer (PPP) and special cluster peer (SCP) based), whose concept is to manage mobile device communication and generate multiple copies of users data/information to be dumped across three servers. The forensic test results were obtained from PPP and SCP developed to securely extract data from mobile devices. This shows that, SCP outperformed PPP in terms of the time taken to fulfil forensic auditor's request, throughput and broadband utilisation which are 42.82% to 57.18%, 56.81% to 43.19% and 35.41% to 64.53% respectively.
The impact of forensic evidence found on smartphones cannot be overemphasized when compared to that found on their digital counterparts such as personal computers (PCs). Recently, third-party instant messaging applications have gradually... more
The impact of forensic evidence found on smartphones cannot be overemphasized when compared to that found on their digital counterparts such as personal computers (PCs). Recently, third-party instant messaging applications have gradually replaced the traditional messaging applications and as such they contain a large amount of information which are far from forensic solutions. This seminar paper focuses on the forensic analysis of Kik messenger: a multi-platform instant messaging or chat application on android devices. Forensic images of three android devices with android versions 4.4 (KitKat), and 5.0 (Lollipop) and different android manufacturers are captured and data related to Kik are identified and examined. Artefacts of forensic values are then identified and analyzed. The result of this research will help digital forensic investigators and academia alike in locating and acquiring digital evidence from Kik messenger on android platforms.
The rapid rate of technology advancement cannot be left unnoticed especially when it comes to the ICT sector. Ironically, this has also brought about an increase in cybercrime worldwide, thus forensic agencies and analysts are constantly... more
The rapid rate of technology advancement cannot be left unnoticed especially when it comes to the ICT sector. Ironically, this has also brought about an increase in cybercrime worldwide, thus forensic agencies and analysts are constantly on the move to investigate and acquire evidences at various crime scenes. Amongst all digital devices relating to forensic analysis, mobile phones are one of the most troublesome. Acquiring, decoding and presenting information resident in mobile device is a complex and challenging process. Several tools and methods both commercial and open source have been and are being developed to ensure authenticity and integrity in mobile forensic investigation and evidence acquisition. However, the level of result accuracy of these tools based on the mobile platform must be understood before even employing them in an investigation process. This paper examines the Android and Windows phone platform comparing the accuracy level of information extracted.
Mobile phone devices have become popular among every age and social grouping in every society and are utilised by lots of people for different purposes. As the design of Mobile phones are continually evolving due to advancement in present... more
Mobile phone devices have become popular among every age and social grouping in every society and are utilised by lots of people for different purposes. As the design of Mobile phones are continually evolving due to advancement in present technologies, applications that run on them are also being updated to fully utilise features on new devices. Due to the flexibility and portability coupled with applications that make communication easy and accessible, these devices are now mostly used to perform e-transactions, social networking and even criminal activities. One of such applications is WhatsApp which over various versions have tried to maintain the confidentiality and integrity of messages sent and received using WhatsApp. Securing of data from Criminals or unauthorized users called for constant updating of the encryption scheme of the SQLite database which is usually saved on the memory of the device on which it is installed. Over many updates of WhatsApp, the encryption has been changed from db.crypt, db.crypt5, db.crypt7, db.crypt8 to db.crypt12. There is need for forensic expert to constantly update their knowledge so as to get the needed information from the database. This study presents a forensic process of extracting WhatsApp data from db.crypt12, which is the latest SQLite Database encryption used by WhatsApp to secure stored communication data. The steps involve using some open source tools that can be downloaded for free on the internet.
A particularly detrimental attack ravaging campus and ad hoc networks is the Sybil attack, where a node illegally claims more than one identity, targeting honest and genuine nodes, thereby weaken or disrupting the system. This research... more
A particularly detrimental attack ravaging campus and ad hoc networks is the Sybil attack, where a node illegally claims more than one identity, targeting honest and genuine nodes, thereby weaken or disrupting the system. This research work aimed at designing a mitigation mechanism to combat the attack on a Campus network (CANET). Setting threshold and checking for IP address spoofing by comparing nodes physical addresses is the focus of this work. The success of the algorithm is validated by simulation, and quality of service is guaranteed with regards to the detection rate and packet delivery ratio.
In its simplest structure, cloud computing technology is a massive collection of connected servers residing in a datacenter and continuously changing to provide services to users on-demand through a front-end interface. The failure of... more
In its simplest structure, cloud computing technology is a massive collection of connected servers residing in a datacenter and continuously changing to provide services to users on-demand through a front-end interface. The failure of task during execution is no more an accident but a frequent attribute of scheduling systems in a large-scale distributed environment. Recently, some computational intelligence techniques have been mostly utilized to decipher the problems of scheduling in the cloud environment, but only a few emphasis on the issue of fault tolerance. This research paper puts forward a Checkpointed League Championship Algorithm (CPLCA) scheduling scheme to be used in the cloud computing system. It is a fault-tolerance aware task scheduling mechanisms using the checkpointing strategy in addition to tasks migration against unexpected independent task execution failure. The simulation results show that, the proposed CPLCA scheme produces an improvement of 41%, 33% and 23% as compared with the Ant Colony Optimization (ACO), Genetic Algorithm (GA) and the basic league championship algorithm (LCA) respectively as parametrically measured using the total average makespan of the schemes. Considering the total average response time of the schemes, the CPLCA scheme produces an improvement of 54%, 57% and 30% as compared with ACO, GA and LCA respectively. It also turns out significant failure decrease in jobs execution as measured in terms of failure metrics and performance improvement rate. From the results obtained, CPLCA provides an improvement in both tasks scheduling performance and provides failure awareness that is more appropriate for scheduling in the cloud computing model.
Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be an NP-complete problem, hence the need for the application of... more
Cloud computing infrastructure is suitable for meeting computational needs of large task sizes. Optimal scheduling of tasks in cloud computing environment has been proved to be an NP-complete problem, hence the need for the application of heuristic methods. Several heuristic algorithms have been developed and used in addressing this problem, but choosing the appropriate algorithm for solving task assignment problem of a particular nature is difficult since the methods are developed under different assumptions. Therefore, six rule based heuristic algorithms are implemented and used to schedule autonomous tasks in homogeneous and heterogeneous environments with the aim of comparing their performance in terms of cost, degree of imbalance, makespan and throughput. First Come First Serve (FCFS), Minimum Completion Time (MCT), Minimum Execution Time (MET), Max-min, Min-min and Sufferage are the heuristic algorithms considered for the performance comparison and analysis of task scheduling in cloud computing.
Aim/Purpose Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of... more
Aim/Purpose Electronic examinations have some inherent problems. Students have expressed negative opinions about electronic examinations (e-examinations) due to a fear of, or unfamiliarity with, the technology of assessment, and a lack of knowledge about the methods of e-examinations. Background Electronic examinations are now a viable alternative method of assessing student learning. They provide freedom of choice, in terms of the location of the examination, and can provide immediate feedback; students and institutions can be assured of the integrity of knowledge testing. This in turn motivates students to strive for deeper learning and better results, in a higher quality and more rigorous educational process. Methodology This paper compares an e-examination system at FUT Minna Nigeria with one in Australia, at the University of Tasmania, using case study analysis. The functions supported, or inhibited, by each of the two e-examination systems, with different approaches to question types, cohort size, technology used, and security features, are compared. Contribution The researchers' aim is to assist stakeholders (including lecturers, invigilators, candidates, computer instructors, and server operators) to identify ways of improving the process. The relative convenience for students, administrators, and lecturer/assessors and the reliability and security of the two systems are considered. Challenges in conducting e-examinations in both countries are revealed by juxtaposing the systems. The authors propose ways of developing more effective e-examination systems.
Research Interests:
Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries... more
Under short messaging service (SMS) spam is understood the unsolicited or undesired messages received on mobile phones. These SMS spams constitute a veritable nuisance to the mobile subscribers. This marketing practice also worries service providers in view of the fact that it upsets their clients or even causes them lose subscribers. By way of mitigating this practice, researchers have proposed several solutions for the detection and filtering of SMS spams. In this paper, we present a review of the currently available methods, challenges and future research directions on spam detection techniques, filtering and mitigation of mobile SMS spams. The existing research literature is critically reviewed and analysed. The most popular techniques for SMS spam detection, filtering and mitigation are compared, including the used datasets, their findings and limitations, and the future research directions are discussed. This review is designed to assist expert researchers to identify open areas that need further improvement.
Effective resource scheduling is essential for the overall performance of cloud computing system. Resource scheduling problem in IaaS cloud computing is investigated in this paper. It is established to be an NP-hard problem. A recently... more
Effective resource scheduling is essential for the overall performance of cloud computing system. Resource scheduling problem in IaaS cloud computing is investigated in this paper. It is established to be an NP-hard problem. A recently developed Cuckoo Search (CS) meta-heuristic algorithm is proposed in this paper, to minimize the response time, makespan and throughput for the resource scheduling in IaaS cloud computing. Simulation results show that CS algorithm outperforms that of Ant Colony Optimization (ACO) algorithm based on the considered parameters.
Research Interests:
There are two actors in cloud computing environment cloud providers and cloud users. On one hand cloud providers hold enormous computing resources in the cloud large data centers that rent the resources out to the cloud users on a... more
There are two actors in cloud computing environment cloud providers and cloud users. On one hand cloud providers hold enormous computing resources in the cloud large data centers that rent the resources out to the cloud users on a pay-per-use basis to maximize the profit by achieving high resource utilization. On the other hand cloud users who have applications with loads variation and lease the resources from the providers they run their applications within minimum expenses. One of the most critical issues of cloud computing is resource management in infrastructure as a service (IaaS). Resource management related problems include resource allocation, resource adaptation, resource brokering, resource discovery, resource mapping, resource modeling, resource provisioning and resource scheduling. In this review we investigated resource allocation schemes and algorithms used by different researchers and categorized these approaches according to the problems addressed schemes and the parameters used in evaluating different approaches. Based on different studies considered, it is observed that different schemes did not consider some important parameters and enhancement is required to improve the performance of the existing schemes. This review contributes to the existing body of research and will help the researchers to gain more insight into resource allocation techniques for IaaS in cloud computing in the future.
Research Interests:
In cloud computing, for the effective performance of any system, there is a need of effective resource scheduling. A resource scheduling problem in IaaS cloud computing is considered in this paper. Resource scheduling problem is proved to... more
In cloud computing, for the effective performance of any system, there is a need of
effective resource scheduling. A resource scheduling problem in IaaS cloud computing is
considered in this paper. Resource scheduling problem is proved to be NP-hard. A recently
developed cuckoo search (CS) meta-heuristic algorithm is presented in this paper, to
minimize the execution time, makespan and throughput for the resource scheduling in IaaS
cloud computing. Simulation results show that CS algorithm outperforms many other metaheuristic
algorithms.
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment... more
Cloud computing system is a huge cluster of interconnected servers residing in a datacenter and dynamically provisioned to clients on-demand via a front-end interface. Scientific applications scheduling in the cloud computing environment is identified as NP-hard problem due to the dynamic nature of heterogeneous resources. Recently, a number of metaheuristics optimization schemes have been applied to address the challenges of applications scheduling in the cloud system, without much emphasis on the issue of secure global scheduling. In this paper, scientific applications scheduling techniques using the Global League Championship Algorithm (GBLCA) optimization technique is first presented for global task scheduling in the cloud environment. The experiment is carried out using CloudSim simulator. The experimental results show that, the proposed GBLCA technique produced remarkable performance improvement rate on the makespan that ranges between 14.44% to 46.41%. It also shows significant reduction in the time taken to securely schedule applications as parametrically measured in terms of the response time. In view of the experimental results, the proposed technique provides better-quality scheduling solution that is suitable for scientific applications task execution in the Cloud Computing environment than the MinMin, MaxMin, Genetic Algorithm (GA) and Ant Colony Optimization (ACO) scheduling techniques.
Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well organized scheduling is needed for both cloud providers and cloud users. This... more
Resource scheduling assigns the precise and accurate task to CPU, network, and storage. The aim behind this is the extreme usage of resources. However, well organized scheduling is needed for both cloud providers and cloud users. This paper is a chronological study of recent issues of resource scheduling in IaaS cloud computing environment. In our study, we investigate resource scheduling schemes and algorithms used by different researchers and categorize these approaches on the basis of problems addressed, schemes and the parameters used in evaluating different approaches. Based on various studies considered in this survey, we perceive that different schemes and algorithms did not consider some essential parameters and enhancement is requisite to improve the performance of the existing schemes. Furthermore, this study will trigger new and innovative methods of handling the problems of resource scheduling in the cloud and will help researchers in understanding the existing methodologies for the future adaptation and enhancements.
Research Interests:
Background/Objectives: This appraisal investigates the meta-heuristics resource allocation techniques for maximizing financial gains and minimizing the financial expenses of cloud users for IaaS in cloud computing environment.... more
Background/Objectives: This appraisal investigates the meta-heuristics resource allocation techniques for maximizing financial gains and minimizing the financial expenses of cloud users for IaaS in cloud computing environment. Methods/Statistical Analysis: Overall, a total of ninety-one studies from 1954 to 2015 have been reviewed in this paper. However, twenty-three studies are selected that focused on the meta-heuristic algorithms for their research. The selected papers are categorized into eight groups according to the optimization algorithms used. Findings: From the analytical study, we pointed out the various issues addressed (optimal and dynamically resource allocation, energy and QoS aware resource allocation, VM allocation and placement) through resource allocation meta-heuristics algorithms.Whereas, the improvement shows better performance concerns minimizing the execution and response time, energy consumption and cost while enhancing the efficiency and QoS in this environment. The comparison parameters (makespan 35%,execution time 13%, response time 26%, cost 22%, utilization21% and other 13% including energy, throughput etc) and also the experimental tools (CloudSim 43%, GridSim 5%, Simjava 9%, Matlab 9% and others 13%) used for evaluation of the various techniques for resource allocation in IaaS cloud computing. Applications/Improvements: The comprehensive review and systematic comparison of meta-heuristic resource allocation algorithms described in this appraisal will help researchers to analyze different techniques for future research directions.
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to... more
Spamming has attained a global dimension and continued to maintain an upward trend, both in sophistication and frequency. So far, it has defied every effort, including technical and non-technical proposals, to curb it. This study seeks to investigate the prevalence of spam SMS, with focus on Nigeria. To quantify the prevalence, primary data was collected using questionnaire. Out of 270 surveyed, the responses of 191 mobile users were valid and analyzed. The study revealed that all mobile subscribers receive spam SMS, receiving an average of 2.45 spam SMS daily. This implies an average of 334,857,685 spam SMS received daily in Nigeria. However, most are for commercial purposes. Few mobile users report cases of fraudulent spam SMS, including those with SMShing intent, to network providers or security agencies. Most believe customers of mobile networks should reserve the right to determine the type of unsolicited SMS to be received, and unsolicited advertorial/promotional SMS should be regulated. Current guidelines and regulations need to be reviewed, to effectively manage spamming activities in Nigeria.
3D map for mobile devices provide more realistic view of an environment and serves as better navigation aid. Previous research studies shows differences in 3D maps effect on acquiring of spatial knowledge. This is attributed to the... more
3D map for mobile devices provide more realistic view of an environment and serves as better navigation aid. Previous research studies shows differences in 3D maps effect on acquiring of spatial knowledge. This is attributed to the differences in mobile device computational capabilities. Crucial to this is the time it takes for 3D map dataset to be rendered for a required complete navigation task. Different findings suggest different approaches on solving the problem of time required for both in-core (inside mobile) and out-core (remote) rendering of 3D dataset. Unfortunately, studies on analytical techniques required to show the impact of computational resources required for the use of 3D map on mobile devices were neglected by the research communities. This paper uses Support Vector Machine (SVM) to analytically classified mobile device computational capabilities required for 3D map that will be suitable for use as navigation aid. Fifty different Smart phones were categorized on the bases of their Graphical Processing Unit (GPU), display resolution, memory and size. The result of the proposed classification shows high accuracy.
Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing. In cloud computing, a number of tasks may need to be scheduled on different virtual machines in order to minimize makespan... more
Efficient task scheduling is one of the major steps for effectively harnessing the potential of cloud computing.
In cloud computing, a number of tasks may need to be scheduled on different virtual machines in
order to minimize makespan and increase system utilization. Task scheduling problem is NP-complete,
hence finding an exact solution is intractable especially for large task sizes. This paper presents a Discrete
Symbiotic Organism Search (DSOS) algorithm for optimal scheduling of tasks on cloud resources.
Symbiotic Organism Search (SOS) is a newly developed metaheuristic optimization technique for solving
numerical optimization problems. SOS mimics the symbiotic relationships (mutualism, commensalism,
and parasitism) exhibited by organisms in an ecosystem. Simulation results revealed that DSOS
outperforms Particle Swarm Optimization (PSO) which is one of the most popular heuristic optimization
techniques used for task scheduling problems. DSOS converges faster when the search gets larger which
makes it suitable for large-scale scheduling problems. Analysis of the proposed method conducted using
t-test showed that DSOS performance is significantly better than that of PSO particularly for large search
space.
League Championship Algorithm (LCA) is a sports-inspired population based algorithmic framework for global optimization over a continuous search space first proposed by Ali Husseinzadeh Kashan in the year 2009. A general characteristic... more
League Championship Algorithm (LCA) is a sports-inspired population based algorithmic framework for global optimization over a continuous search space first proposed by Ali Husseinzadeh Kashan in the year 2009. A general characteristic between all population based optimization algorithms similar to the LCA is that, it tries to progress a population of achievable solutions to potential areas of the search space when seeking the optimization. In this paper, we proposed a job scheduling algorithm based on an enhanced LCA optimization technique for the infrastructure as a service (IaaS) cloud. Three other established algorithms i.e. First Come First Served (FCFS), Last Job First (LJF) and Best Effort First (BEF) were used to evaluate the performance of the proposed algorithm. All four algorithms assumed to be non-preemptive. The parameters used for this experiment are the average response time, average completion time and the makespan time. The results obtained shows that, LCA scheduling algorithm perform moderately better than the other algorithms as the number of virtual machines increases.
The League Championship Algorithm (LCA) is sport-inspired optimization algorithm that was introduced by Ali Husseinzadeh Kashan in the year 2009. It has since drawn enormous interest among the researchers because of its potential... more
The League Championship Algorithm (LCA) is sport-inspired optimization algorithm that was introduced by Ali Husseinzadeh Kashan in the year 2009. It has since drawn enormous interest among the researchers because of its potential efficiency in solving many optimization problems and real-world applications. The LCA has also shown great potentials in solving non-deterministic polynomial time (NP-complete) problems. This survey presents a brief synopsis of the LCA literatures in peer-reviewed journals, conferences and book chapters. These research articles are then categorized according to indexing in the major academic databases (Web of Science, Scopus, IEEE Xplore and the Google Scholar). The analysis was also done to explore the prospects and the challenges of the algorithm and its acceptability among researchers. This systematic categorization can be used as a basis for future studies.
Makespan minimization in tasks scheduling of infrastructure as a service (IaaS) cloud is an NP-hard problem. A number of techniques had been used in the past to optimize the makespan time of scheduled tasks in IaaS cloud, which is... more
Makespan minimization in tasks scheduling of infrastructure as a service (IaaS) cloud is an NP-hard problem. A number of techniques had been used in the past to optimize the makespan time of scheduled tasks in IaaS cloud, which is propotional to the execution cost billed to customers. In this paper, we proposed a League Championship Algorithm (LCA) based makespan time minimization scheduling technique in IaaS cloud. The LCA is a sports-inspired population based algorithmic framework for global optimization over a continuous search space. Three other existing algorithms that is, First Come First Served (FCFS), Last Job First (LJF) and Best Effort First (BEF) were used to evaluate the performance of the proposed algorithm. All algorithms under consideration assumed to be non-preemptive. The results obtained shows that, the LCA scheduling technique perform moderately better than the other algorithms in minimizing the makespan time of scheduled tasks in IaaS cloud.
Cloud computing technology keeps evolving especially in the area of service delivery for provisioning of computing and storage resources. Infrastructure as a service (IaaS) cloud is used to provide virtual machines on-demand to cloud... more
Cloud computing technology keeps evolving especially in the area of service delivery for provisioning of computing and storage resources. Infrastructure as a service (IaaS) cloud is used to provide virtual machines on-demand to cloud users. This Cloud computing power can be enhanced by setting up a traditional Grid network within the virtual machines to be used by clients as on-demand Grid or Grid as a Service (GaaS) Cloud. The purpose of this study is to survey the various concepts and architectures used for the on-demand GaaS using IaaS Cloud. The GaaS combines the advantage of providing clients with model that is familiar to the traditional Grid, the computational ability and the pay as you use paradigm of the cloud, with the capability of flexible management of comp utational resources. This research presented in this paper will contribute as a guide in the design of future architectures and in the selection of models or methods for further researches.
League Championship Algorithm (LCA) is a population based algorithmic framework for global optimization over a continuous search space first proposed by Kashan (2009). It is a Swam optimization algorithm. A general characteristic between... more
League Championship Algorithm (LCA) is a population based algorithmic framework for global optimization over a continuous search space first proposed by Kashan (2009). It is a Swam optimization algorithm. A general characteristic between all population based optimization algorithms similar to the LCA is that they both try to progress a population of achievable solutions to potential areas of the search space when seeking the optimization. LCA is a newly proposed stochastic population based algorithm for continuous global optimization which tries to imitate a championship situation where synthetic football clubs participate in an artificial league for a number of weeks. This algorithm has been tested in many areas and performed creditably well as compared to other known optimization schemes or heuristics algorithms.
Negative selection algorithms (NSAs) are inspired by artificial immune system. It creates techniques that aim at developing the immune based model. This is done by distinguishing self from non-self spam in the generation of detectors. In... more
Negative selection algorithms (NSAs) are inspired by artificial immune system. It creates techniques that aim at developing the immune based model. This is done by distinguishing self from non-self spam in the generation of detectors. In general, NSAs has an exponential run time. This research study the significance of time and accuracy for two commonly used matching rules. The hamming and r-chunk matching rules, based on different threshold values (r) for generating set of fixed number of detectors. The results show the differences between the mean values of time and accuracy for hamming and r-chunk matching rules. Statistical t test shows that the difference between hamming and r-chunk matching rule are insignificant for accuracy while it is significant for time.
The Infrastructure as a service (IaaS) Cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the Cloud computing paradigm of pay-per-use. When the IaaS is now utilized... more
The Infrastructure as a service (IaaS) Cloud is a customer oriented cloud environment that offers user with computing infrastructures on-demand to be used based on the Cloud computing paradigm of pay-per-use. When the IaaS is now utilized to build a traditional Grid network within the cloud environment, it is now called an on-demand Grid as a service (GaaS) Cloud. In the on-demand GaaS Cloud, a user may use hundred of thousand of Grid nodes to implement a job, therefore manual scheduling is not a feasible scheduling solution. The main objective of this review is to study the various concepts and scheduling algorithms used for the on-demand GaaS Cloud in relation to the scheduling parameters used by existing researches. We also survey the Cloud infrastructures, Grid middlewares and the issues addressed by different researchers in the past within this domain of research. Our contribution will thus be of assistance in understanding the key scheduling algorithms and parameters for potential future enhancements in this evolving area of research.
"The numerical size of academic publications that are being published in recent years had grown rapidly. Accessing and searching massive academic publications that are distributed over several locations need large amount of computing... more
"The numerical size of academic publications that are
being published in recent years had grown rapidly. Accessing
and searching massive academic publications that are distributed
over several locations need large amount of computing resources
to increase the system performance. Therefore, many grid-based
search techniques were proposed to provide flexible methods for
searching the distributed extensive data. This paper proposes
search technique that is capable of searching the extensive
publications by utilizing grid computing technology. The search
technique is implemented as interconnected grid services to offer
a mechanism to access different data locations. The experimental
result shows that the grid-based search technique has enhanced
the performance of the search."
Recent researches have shown that grid resources can be accessed by client on-demand, with the help of virtualization technology in the Cloud. The virtual machines hosted by the hypervisors are being utilized to build the grid network... more
Recent researches have shown that grid resources can be accessed by client on-demand, with the help of virtualization technology in the Cloud. The virtual machines hosted by the hypervisors are being utilized to build the grid network within the cloud environment. The aim of this study is to survey some concepts used for the on-demand grid provisioning using Infrastructure as a Service Cloud and the taxonomy of its related components. This paper, discusses the different approaches for on-demand grid using infrastructural Cloud, the issues it tries to address and the implementation tools. The paper also, proposed an extended classification for the virtualization technology used and a new classification for the Grid-Cloud integration which was based on the architecture, communication flow and the user demand for the Grid resources. This survey, tools and taxonomies presented here will contribute as a guide in the design of future architectures for further researches.
Recently, terrorism has become one of the biggest threats to the survival of mankind on the planet. Nigeria has had her own share of the effects of this menace. It is evidently a challenge to national security, a sure enemy to national... more
Recently, terrorism has become one of the biggest threats to the survival of mankind on the planet. Nigeria has had her own share of the effects of this menace. It is evidently a challenge to national security, a sure enemy to national development. No doubt, Information and Communication Technology (ICT) has pervaded every facet of human endeavour, and terrorist groups too are taking advantage of its potentials to recruit, propagate their propaganda, train its members, communicate and conspire, and even to raise money. In this paper, we sought to highlight cyber tools and techniques used by terrorists in Nigeria in their activities, assess the government’s response so far and capacity in tackling terrorism, and proffer recommendations that can help mitigate the menace. It was found out that the cyberspace could fast become the biggest promoter of terrorism in Nigeria, and unfortunately, the government does not possess the necessary cyber-capabilities to tackle this in the country. To forestall this, we highlight the need to view the security of the country’s cyberspace as the trigger point in developing effective anti- and counter-terrorism strategies, and consequently, put necessary cybersecurity measures in place to this effect.
The recent employment and eventual widespread acceptance of electronic test in examining students and various classes in Nigeria has created a significant impact in the trends of educational history in the country. In this paper, we... more
The recent employment and eventual widespread acceptance of electronic test in examining students and various classes in Nigeria has created a significant impact in the trends of educational history in the country. In this paper, we examined the impacts, associated challenges and security lapses of the existing electronic-examination system with the aim of ameliorating and developing a new acceptable e-Exam system that takes care of the existing system’s challenges and security lapses. Six Universities that are already conducting e-Examination were selected across the country for this research work. Twenty (20) students that participated in the e-exams and five (5) members of staff  were selected for interview and questionnaire. Based on the analysis of the interviews and study of the existing electronic examination system, some anomalies were discovered and a new e-exams system was developed to eradicate these anomalies. The new system uses data encryption in order to protect the questions sent to the e-Examination center through the internet or intranet and a biometric fingerprint authentication to screen the stakeholders.
There are several other techniques that could be used to control paths in the integration of Wide Area Networks (WANs) with diverse routing protocols such as frame relay, enhanced interior gateway routing protocol (EIGRP), etc. In this... more
There are several other techniques that could be used to control paths in the integration of Wide Area Networks (WANs) with diverse routing protocols such as frame relay, enhanced interior gateway routing protocol (EIGRP), etc. In this paper, the concept of route redistribution was considered to integrate Wide Area Networks with different routing protocols. A simulation of networks with different routing protocols integrated as a single network to aid communication between them was developed with the help of a simulation package known as Cisco Packet Tracer. This simulation approach enables various users of the said network to distribute files, communicate and navigate across the entire network thereby managing and controlling paths. In conclusion, the use of route redistribution in the integration of WANs with different routing protocols had helped reduced some of the problems that aroused as a result of the integration of network with different routing protocols.
In this paper, we are present the digital forensic open source tools: Fiwalk, Bulk_Extractor, Foremost, Sleuth Kit, and Autopsy which are all Linux based forensic tools to extract evidences that could be presented in the court of law.... more
In this paper, we are present the digital forensic open source tools: Fiwalk, Bulk_Extractor, Foremost,
Sleuth Kit, and Autopsy which are all Linux based forensic tools to extract evidences that could be presented in the
court of law. Fiwalk reads a disk image and outputs a block of XML containing all the disk image of resident and
deleted files. Foremost recovers files by using their headers, footers and data structures. The Sleuth Kit and Autopsy
perform various aspects of file system analysis. The Autopsy Forensic Browser is a graphical web interface that
presents the results generated by Sleuth Kit. This research project demonstrates the usefulness of the abovementioned
forensic tools for analysis and recovery of obliterated data from hard drives. This paper found that Sleuth
Kit, Autopsy Forensic Browser, Fiwalk, Bulk_Extractor, and Foremost all provide effective file system analysis and
recovery tool sets. The increasing complexity of storage devices requires that the investigator employs different
forensic tool set to complement his arsenal of tools. No single digital forensic tool would be sufficient for an entire
digital forensic investigation case. With this consideration, this paper employs various forensic tools. The
demonstration of the effectiveness of these digital forensic tools utilized in this paper could serve as an alternative
for investigators looking to expand their digital forensic tool set functionality in the court of law. Details of the
experiments are fully given at the expense of bulkiness since this works is aim at enhancing the utilities of open
source forensics tools applications.
Today, Nigerian Universities feel pressured to get a portal up and running – dynamic, individualized web systems have become essential for institutions of higher learning. As a result, most of the Nigerian University portals nowadays do... more
Today, Nigerian Universities feel pressured to get a portal up and running – dynamic, individualized web systems have become essential for institutions of higher learning. As a result, most of the Nigerian University portals nowadays do not meet up to standard. In this paper, ten (10) Nigerian University portals were selected and their design evaluated in accordance with the international best practices. The result was revealing!
The use of information and communication technology in our day to day activities is now unavoidable. In tourism developments, destination information and management systems are used to guide visitors and provide information to both... more
The use of information and communication technology in our day to day activities is now unavoidable. In tourism developments, destination information and management systems are used to guide visitors and provide information to both visitors and management of the tour sites. In this paper, information and navigation system was designed for tourists, taking some Niger state of Nigeria tourism destinations into account. The information management system was designed using Java Applet (NetBeans IDE 6.1), Hypertext MarkUp Language (HTML), Personal Home Page (PHP), Java script and MySQL as the back-end integration database. Two different MySQL servers were used, the MySQL query browser and the WAMP5 server to compare the effectiveness of the system developed.
"This paper presents the mechanism of multi-user navigation interaction in real-time as a high-priority objective in improving mobility services efficiency and effectiveness, and investigate the support of threedimensional... more
"This paper presents the mechanism of multi-user navigation interaction in real-time as a high-priority
objective in improving mobility services efficiency and effectiveness, and investigate the support of threedimensional
representation in mobile device in aiding interactive navigation in an unknown environment.
The paper is based on the fact that the use of 3D representation in mobile device is more intuitive than the
conventional 2D representation. Unfortunately, Mobile devices are small devices, and that is why there are
mobile, as a result, 3D dataset in mobile device might overload its performance. Even though, certain
techniques were seen in many research on tackling this problems, yet, when it comes to the navigation aid
the predominant 3D mobile navigation system are not interactive in real-time, that is a user will not be
aware of other users while on-the-go and both using mobile navigation aid in the same environment. We
provide an interactive navigation techniques for finding the shortest path to a desire destination and also
been able to interact with an (agent if it’s another user) or (object in terms of point or destination) in realtime
with the help bi-A* pathfinding algorithm and voronoi diagram. The use of bi-A* Algorithm is to
establish a forward and backward search for a destination or a position of users, while the use of voronoi
diagram is to establish points and region within the navigation environment. The result of our finding
indicate that information in three-dimension for navigation aid in mobile device is more intuitive and
experimental result shows that multi-user interaction with support of 3D representation in mobile devices
helps in aiding number of user going around within an environment an been able to be aware of their
movement in real-time. This approach is unique because it provides visualization of 3D representation
(map) in mobile devices’ which assists users to navigate interactively."
"Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling,... more
"Microsoft has made substantial enhancements to the kernel of the Microsoft Windows Vista operating system. Kernel improvements are significant because the kernel provides low-level operating system functions, including thread scheduling, interrupt and exception dispatching, multiprocessor synchronization, and a set of routines and basic objects.
This paper describes some of the kernel security enhancements for 64-bit edition of Windows Vista. We also point out some weakness areas (flaws) that can be attacked by malicious leading to compromising the kernel."
Elections are believed to be the key pillars of democracy and voting is one of the electoral processes that ensure the sustenance of democracy in any civil society. In this paper, we developed an electronic voting system, which will... more
Elections are believed to be the key pillars of democracy and voting is one of the electoral processes that ensure the sustenance of democracy in any civil society. In this paper, we developed an electronic voting system, which will eliminate rigging and manipulation of results to its barest minimum, this problem is mostly associated with the manual system of voting. The implementation of electronic voting system in Nigeria will boost the integrity of INEC and the result they produce. The programs used to develop this system are PHP, MySQL, Java Query, CSS and HTML. These packages make the Graphic Interface User friendly enough for even those with little or no computer knowledge.
Recent decades have seen a remarkable development in the use of computer systems and computer networks. With their advances our reliance on hardware and software has amplified, and so has our susceptibility to their malfunction. For... more
Recent decades have seen a remarkable development in the use of computer systems
and computer networks. With their advances our reliance on hardware and
software has amplified, and so has our susceptibility to their malfunction. For
fear of any major network failure, it is at all times good to recognize similar
networks so that switching can be done to reduce damages. Theoretical computer
science aims to model and understand the intricacy of computer systems, and
thereby creates the basis for their formal verification: to mathematically prove
that a system satisfies its requirement. In this paper, the decidability theory is
theoretically applied to identify/decide if two different computer networks are
similar (in terms of efficiency, high performance computing and scalability) or
not. A finite automata is designed for each network and two different scenarios
are considered for demonstration. The results show that the theory can be effectively
used to make such comparisons between different computer networks.
Research Interests:
This paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The... more
This paper reviews the concept of Cryptography and Steganography and their differences are classified as a way of passing. The essence of steganography as an art of hiding information was examined using the wavelet approach. The algorithms developed and exhibited in block diagrams were experimentally examined with encrypted message and disseminated abstractedly over the Internet with the belief that the stego-image carrying the message would not be discovered by unauthenticated person.
Research Interests:
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows... more
Online social networks are becoming a major growth point of the internet, as individuals, companies and governments constantly desire to interact with one another, the ability of the internet to deliver this networking capabilities grows stronger. In this paper, we looked at the structure and components of the member profile and the challenges of privacy issues faced by individuals and governments that participate in social networking. We also looked at how it can be used to distort national security, how it became the new weapons of mass mobilization and also how social networks have became the rallying forces for revolutions and social justice.
Research Interests:
A Social Networking Site (SNS) is an online service that attracts a society of subscribers and provides such users with a multiplicity of tools for distribution of personal data and creating subscribers-generated content directed to a... more
A Social Networking Site (SNS) is an online service that attracts a society of subscribers and
provides such users with a multiplicity of tools for distribution of personal data and creating
subscribers-generated content directed to a given user’s interest and personal life. Operators of
Online Social Networks (OSN) are gradually giving out potentially sensitive information
about users and their relationships with advertisers, application developers, and data-mining
researchers. Some criminals too uses information gathered through membership profile in
social networks to break peoples PINs and passwords. In this paper, we looked at the field
structure of membership profiles in 10 popular SNS. We also analyzed how private information
can easily be made public in such sites. At the end, recommendations and countermeasures
were made on how to safeguard subscribers’ personal data.
Research Interests:
An improved e-mail classification method based on Artificial Immune System is proposed in this paper to develop an immune based system by using the immune learning, immune memory in solving complex problems in spam detection. An... more
An improved e-mail
classification method based on Artificial
Immune System is proposed in this paper
to develop an immune based system by
using the immune learning, immune
memory in solving complex problems in
spam detection. An optimized technique
for e-mail classification is accomplished by
distinguishing the characteristics of spam
and non-spam that is been acquired from
trained data set. These extracted features
of spam and non-spam are then combined
to make a single detector, therefore
reducing the false rate. (Non-spam that
were wrongly classified as spam).
Effectiveness of our technique in
decreasing the false rate shall be
demonstrated by the result that will be
acquired.
Research Interests:
This research work investigates the contribution of academic community cyber caf´es in perpetrating cyber crime. Four hundred (400) questionnaires were distributed among academic staffs, non teaching staffs and students in four (4) higher... more
This research work investigates the contribution of academic community cyber caf´es in perpetrating cyber crime. Four hundred (400) questionnaires were distributed among academic staffs, non teaching staffs and students in four (4) higher institutions of learning in Gombe state, located in north – eastern part of Nigeria. Three hundred and seventy eighty (378) were retrieved successfully, three hundred and forty (340) were properly responded. The data collected was presented on graph and table. It was analyzed using one way ANOVA and two way ANOVA. The results obtained shows there is significance difference in perception of academic staff, non – teaching staff and students in perpetrating cyber crimes in academic community cyber caf´es. The perception of the three variables on perpetrating phishing, credit card fraud, cyber piracy, virus dissemination, hacking and
cyber plagiarism are equal. It was concluded in the paper that academic community cyber caf´es are hub for cyber crimes perpetration.
Research Interests: