<?xml version="1.0" encoding="UTF-8"?>
<rdf:RDF xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns="http://purl.org/rss/1.0/" xmlns:dc="http://purl.org/dc/elements/1.1/">
  <channel rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/81">
    <title>UCSC Digital Library Collection:</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/81</link>
    <description />
    <items>
      <rdf:Seq>
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2531" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2532" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2527" />
        <rdf:li rdf:resource="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2526" />
      </rdf:Seq>
    </items>
    <dc:date>2026-04-29T15:50:43Z</dc:date>
  </channel>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2531">
    <title>Detecting the Ghost Riders in Android App's Based on Declared Permissions</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2531</link>
    <description>Title: Detecting the Ghost Riders in Android App's Based on Declared Permissions
Authors: Wickramasekara, L.A.D.L.
Abstract: Android is one of the vast developing mobile platforms. It's a Google incorporated mobile project. The concept is all about openness and it is built on the Linux kernel. Android provides a secured architecture against malicious use of the device resources, which is a sand-box environment where the developer need to request permission from the user to access those resources on the time of Application installation.
Android permission model holds the key to full Android security architecture. Android permission model depends on user awareness. Nevertheless, resources provided by Android to build user awareness is hard to find. Ineffective permission warning system, no proper documentation and false sense of security on Google play store applications, users are misled and tend to install any application without reviewing or understanding the permissions requested.
The proposed model "Ghost" is built to identify application vulnerability based on permissions declared and the benefit of the application. This is a leaning model. More the applications it learns, it gives accurate identifications of malicious applications. "Ghost" also is a user awareness building model. Even though user blindly accept and install an application to the device, "Ghost" will detect and identify security concerns that the application may pose before the first run of the application. With use of the "Ghost" model, a test application "Ghost Alert" was developed and analyzed test results.</description>
    <dc:date>2014-05-26T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2532">
    <title>Enhancing Tiger Auditing Tool for Linux Systems and Services</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2532</link>
    <description>Title: Enhancing Tiger Auditing Tool for Linux Systems and Services
Authors: Jayamanna, N.K.I.S.
Abstract: Information security is one of the main concerns in modern day computing. Therefore, security auditing tools are largely used in modern day computer systems. There are open source auditing tools as well as commercial auditing tools. Commercial vulnerability scanning tools are very expensive these days. Therefore, organizations are interested to use open source auditing tools. Available open source auditing tools are capable of performing various kinds of vulnerability scans and identifying security issues of the system. Develop an auditing tool from the begin takes a considerable amount of time and it has a high probability of overlapping features with existing solutions. This implementation is to enhance the features of existing  Tiger  auditing tool.
 Tiger  is a modular based application and users are allowed to develop their own modules into the application. But in order to do it, self-written modules have to comply with  Tiger  coding standers.  Tiger  uses its own way of executing modules. It also uses  message  function to deal with report generation.
In order to enhance the functionality of the default Tiger application following new modules has been developed.
The  identify security patches  module used to identify available operating system security patches if available. If a new release of the operating system is available, it identifies by the  identify operating system releases  module. Security configuration files of manually installed packages are scanned by  auditing manually installed packages  module. The default  Tiger  release does not support live modifications. Users have to wait until the audit finishes. Then they should check the report and identify vulnerabilities. But using the enhanced  Tiger  application, users are facilitated to modify particular files if any issue identifies during the audit process. The  suggest security tools  module informs users about available security tools which improves the security level of certain services. A graphical user interface is provided to the users to ease their work.
According to the user feedbacks, majority of users have identified with the enhanced  Tiger  application is very useful. The graphical user interface and the  perform live changes  module made the enhanced version more user friendly to users.</description>
    <dc:date>2014-05-26T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2527">
    <title>Router Level Security
Solution For SOHO</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2527</link>
    <description>Title: Router Level Security
Solution For SOHO
Authors: Kodippili, N.H.
Abstract: In this report I m going to evaluate security drawbacks on Small office home office (SOHO)
environment and proposing the solution for the above problem. Communication of confidential
data over the internet or public networks becoming more frequent and important in these days.
Individuals and organizations send their confidential data electronically through public
communication channels. It is also common that hackers and intruders target these networks.
Protecting confidential data, software and hardware from attacks is now more than a need, not
just a concern. How security is implemented to ensure a SOHO network in router level? In this
project I will try to address the above questions and implement a solution to ensure security in
the SOHO networks.
Denials of Service (DoS) attacks have become a large problem for users of computer systems
connected to the Internet and internal attacks. As new countermeasures are developed to prevent
or mitigate DoS attacks, attackers are constantly developing new methods to circumvent these
new countermeasures. In this report, we describe DoS attack models and propose
countermeasures to illustrate the scope of DoS attacks. In the methodology section we address
the patterns in different DoS attacks and tools, to develop more generalized solutions to
encounter them. The proposed solution is based on the combination of snort, IPtables and the
program we implemented. Further, it includes the performed comparison of the DoS attacks
which were analyzed, without any security perimeter protection and with perimeter protection.</description>
    <dc:date>2014-05-26T00:00:00Z</dc:date>
  </item>
  <item rdf:about="https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2526">
    <title>Key Exchange Protocol for Cuubez|Rest Framework</title>
    <link>https://dl.ucsc.cmb.ac.lk/jspui/handle/123456789/2526</link>
    <description>Title: Key Exchange Protocol for Cuubez|Rest Framework
Authors: Hewage, R.U.
Abstract: RESTful frameworks don t support document level security. As a solution Cuubez-Rest framework was developed. It was developed to get document level security implemented in to restful services.
Rest services are becoming more and more popular among application developers due to its simplicity hence asking for more secure frameworks for Restful services. Developed Cuubez-Rest framework lacks key exchange protocol in its initial implementation. Without a proper key exchanging protocol, framework is unable to communicate with unknown parties hence its document level security is limited between known parties.
Research carried out analysing similar key exchange mechanisms in other protocols for similar solutions. Different key exchange algorithms were examined and implemented in a module which was integrated in to Cuubez Framework.
Performance analysis based on response times were carried out among different key exchange algorithms to determine most suitable algorithm to recommend for users to be used with Cuubez Key exchange module. It was found that ECMQV algorithm takes longer response time compares to ECDH algorithm in a complete round trip of Rest call. But when considering resilience to MIME attacks, ECMQV becomes preferred choice for key exchange algorithm.
Introducing key-exchange module brings scalability in to Cuubez framework enabling secure communication between unknown parties. Capabilities on framework can be further enhanced by adding key management server as a separate module.</description>
    <dc:date>2014-05-26T00:00:00Z</dc:date>
  </item>
</rdf:RDF>

