<?xml version="1.0" encoding="UTF-8"?>
<feed xmlns="http://www.w3.org/2005/Atom" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <title>UCSC Digital Library Collection:</title>
  <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4689" />
  <subtitle />
  <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4689</id>
  <updated>2026-04-27T08:14:43Z</updated>
  <dc:date>2026-04-27T08:14:43Z</dc:date>
  <entry>
    <title>Web Based Industrial Training Management System (ITMS) for National Water Supply &amp; Drainage Board</title>
    <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4714" />
    <author>
      <name>Thilakarathna, K. G. D. C.</name>
    </author>
    <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4714</id>
    <updated>2023-06-22T10:38:41Z</updated>
    <published>2023-06-22T00:00:00Z</published>
    <summary type="text">Title: Web Based Industrial Training Management System (ITMS) for National Water Supply &amp; Drainage Board
Authors: Thilakarathna, K. G. D. C.
Abstract: Providing Industrial Training for several different subjects to fulfill industrial training, is one of the core activities of the Manpower Development &amp; Training Division in National Water Supply &amp; Drainage Board. Approximately 500 students from NWS &amp; DB around the country participate in many different internship &amp; on-the-job trainings per year. Previously, industrial training-related tasks such as trainee enrollment as well as issuing agreement, assignment letters and trainee records, requesting certificates, and so on were all done manually. Completing these job tasks takes a long time and requires additional staff. Another drawback of this manual procedure has been the maintenance of several types of papers in hardcopies, which makes it challenging to search information &amp; prepare MIS reports when needed.&#xD;
The main objective of this system was to provide a “Web-Based Industrial Training Management System (ITMS)” to automate the activities carried around the internship &amp; on-the-job training process by the manpower development &amp; training division of the NWSDB, in a more secured, accurate and efficient way. In addition to that, this new system provided an accurate, reliable, efficient and user-friendly system for users.&#xD;
Major activities such as registering for requesting industrial training, requesting the service of a new trainee, assigning for industrial training, keeping attendance and work records, issuing a certificate were done very easily by this web-based ITM system. All the above-mentioned manual tasks are converted to function via the system by the developed web-based system and made the whole process zero paper based. This web-based system was developed using web development tools such as the PHP framework, MySQL, &amp; Apache web server, etc. The ITMS manages every data &amp; information through a central server, &amp; only authenticated users could access that data and services via the internet.&#xD;
Finally, the major objective of this system which is to provide a “Web-Based Industrial Training Management System (ITMS)” to automate the activities carried around the internship &amp; on-the-job training process by the manpower development &amp; training division of the NWSDB, in a more secured, accurate and efficient way is achieved. And apart from that, new system provided a reliable, efficient and user-friendly system for users. It should be emphasized that the major goals were achieved by the developed web-based ITMS</summary>
    <dc:date>2023-06-22T00:00:00Z</dc:date>
  </entry>
  <entry>
    <title>WiFi Blackbox - A Tamper-proof Forensic-ready Device for Wifi Networks</title>
    <link rel="alternate" href="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4707" />
    <author>
      <name>Wickramsekara, A. S.</name>
    </author>
    <id>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/4707</id>
    <updated>2023-06-22T10:21:11Z</updated>
    <published>2023-06-22T00:00:00Z</published>
    <summary type="text">Title: WiFi Blackbox - A Tamper-proof Forensic-ready Device for Wifi Networks
Authors: Wickramsekara, A. S.
Abstract: With the current trend of computer and communication technologies, wired computer networks are&#xD;
almost entirely being replaced by wireless networks. For this purpose, the IEEE 802.11 protocol, i.e.,&#xD;
Wi-Fi, is increasingly being used. With this rapid increase in usage, Wi-Fi networks are turning into&#xD;
the most important target of network-based malicious activities.&#xD;
It has been found that most of the successful Wi-Fi-related attacks in recent history have originated&#xD;
from internal threat actors, which amounts to a 60% of all attacks.&#xD;
In order to make an impact on those kinds of internal Wi-Fi attacks, this research aims to create and&#xD;
deploy a forensic-ready device, called WiFi-Blackbox, for internal networks that acts as a passive&#xD;
control mechanism that monitors, stores, and communicates the activities in a Wi-Fi network and later&#xD;
detects anomalies and patterns from the gathered data and information.&#xD;
The WiFi-Blackbox device is mainly integrated with five main hardware components and five&#xD;
software modules. The main board is a Raspberry Pi 4 single-board computer, which is combined with&#xD;
an RTL881cu USB Wi-Fi adapter that operates in WiFi monitor mode to observe nearby Wi-Fi&#xD;
networks constantly. To make the device tamper-proof, various physical and technical controls have&#xD;
been applied, such as an reliable internal power supply to face power failures and a backup 4G&#xD;
modem to face network failures. The device is also equipped with a GPS sensor to detect the location&#xD;
of the device, which can be used to prevent theft. The enclosure open notifier is another technical&#xD;
security control that detects physical tampering attempts on the device by attempting to open the&#xD;
sealed enclosure of the device. All the hardware components are controlled by internal software&#xD;
modules, which were written with a mixture of Python, PHP, and Shell scripts. The Sniffing module&#xD;
connects with the W-FI adapter and sniffs all the data frames, stores relevant frames, and decrypts&#xD;
them where necessary. The Anomaly Detection module checks for anomalies in each data frame and&#xD;
notify the user. It uses a third-party virus database to detect viruses, Trojans, and other malware. At&#xD;
the same time, it detects anomalies such as denial-of-service attacks. The devices Backup and&#xD;
Maintenance module is responsible for keeping backups of captured frames, while the System&#xD;
Monitor module helps to maintain a healthy system. The Communication module is the key to&#xD;
securely communicate between multiple WiFi-Blackbox devices and notify about incidents to each&#xD;
other..&#xD;
The evaluation was done in a controlled environment with known infected files. Furthermore, stress&#xD;
testing was done by using 10 Wi-Fi networks in the deployed environment. The results indicate that a&#xD;
continuous data capturing and anomaly detection takes the maximum CPU power and reaches a CPU&#xD;
heat of 86C. Also, the device’s data accuracy is about 99%, and the data corruption rate is less than&#xD;
1%. This research indicates that internal Wi-Fi networks can be protected and WiFi-related activities&#xD;
can be tracked and saved for forensic purposes. At the same time, it shows the possibility of&#xD;
implementing a tamper-proof network monitoring platform and how to demotivate insider attackers&#xD;
by representing the device as a deterrent controller.</summary>
    <dc:date>2023-06-22T00:00:00Z</dc:date>
  </entry>
</feed>

