Author:Mgabile, T; Msiza, IS; Dube, EDate:Oct 2012This manuscript presents a supervised machine learning approach in the identification of network attacks on a fingerprint biometric system. To reduce the problem of malicious acts on a biometric system, this manuscript proposes an intrusion ...Read more
Author:Botes, FH; Leenen, Louise; De La Harpe, RDate:Jun 2017In the ashes of Moore’s Law, companies have to acclimatise to the vast increase of data flowing through their networks. Reports on information breaches and hackers claiming ransom for company data are rampant. We live in a world where data ...Read more
Author:Masango, Mfundo G; Mouton, Francois; Antony, Palesa; Mangoale, Bokang CDate:Mar 2018Websites have become a form of information distribution; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders ...Read more
Author:Umba, SMW; Abu-Mahfouz, Adnan MI; Ramotsoela, DDate:Apr 2022Wireless Sensor Networks (WSNs) are increasingly deployed in Internet of Things (IoT) systems for applications such as smart transportation, telemedicine, smart health monitoring and fall detection systems for the elderly people. Given that ...Read more
Author:Mkuzangwe, Nenekazi NP; Nelwamondo, Fulufhelo VDate:Nov 2017This paper provides a performance bound of a network intrusion detection system (NIDS) that uses an ensemble of classifiers. Currently researchers rely on implementing the ensemble of classifiers based NIDS before they can determine the ...Read more
Author:Mkuzangwe, Nenekazi NP; Nelwamondo, Fulufhelo VDate:Apr 2017Fuzzy logic is one of the powerful tools for reasoning under uncertainty and since uncertainty is an intrinsic characteristic of intrusion analysis, Fuzzy logic is therefore an appropriate tool to use to analyze intrusions in a Network. This ...Read more
Author:Isong, B; Ratanang, T; Gasela, N; Abu-Mahfouz, Adnan MIDate:Nov 2023This paper addresses the issues of fault tolerance (FT) and intrusion detection (ID) in the Software-defined networking (SDN) environment. We design an integrated model that combines the FT-Manager as an FT mechanism and an ID-Manager, as an ...Read more
Author:Mboweni, IV; Abu-Mahfouz, Adnan MI; Ramotsoela, DTDate:Oct 2021The confidentiality, integrity and availability of critical infrastructure is crucial for any economy to operate efficiently. Water distribution critical infrastructure is a target of many attackers who aim to penetrate the system for malicious ...Read more
Author:Lorgat, MW; Baghai-Wadji, A; McDonald, Andre MDate:Oct 2017The performance loss due to incomplete information in denial of service (DoS) detection is quantified in this paper. Volumetric DoS detection is formulated as a signal detection problem. Two detectors are defined: the first operates without ...Read more
Author:Masengo Wa Umba, S; Abu-Mahfouz, Adnan MI; Ramotsoela, TD; Hancke, GPDate:Jun 2019Wireless communications and Wireless Sensor Networks (WSNs) are intensively used in manufacturing industries, in medical devices, for the determination of the position and for the guidance of military drones and bombs. Given the scope of ...Read more
Author:Masengo, Wa Umba, S; Abu-Mahfouz, Adnan MI; Ramotsoela, TD; Hancke, GPDate:Jun 2019Wireless communications and Wireless Sensor Networks (WSNs) are intensively used in manufacturing industries, in medical devices, for the determination of the position and for the guidance of military drones and bombs. Given the scope of ...Read more
Author:Alimi, OA; Ouahada, K; Abu-Mahfouz, Adnan MI; Rimer, S; Alimi, KOADate:Aug 2021Supervisory Control and Data Acquisition (SCADA) systems play a significant role in providing remote access, monitoring and control of critical infrastructures (CIs) which includes electrical power systems, water distribution systems, nuclear ...Read more
Author:Machaka, Pheeha; McDonald, Andre M; Nelwamondo, Fulufhelo V; Bagula, ADate:Nov 2015The paper presents the threats that are present in Internet of Things (IoT) systems and how they can be used to perpetuate a large scale DDoS attack. The paper investigates how the Cumulative Sum (CUSUM) algorithm can be used to detect a DDoS ...Read more
Author:Masango, Mfundo G; Mouton, Francois; Antony, Palesa; Mangoale, Bokang CDate:Sep 2017Websites have become a form of information distributors; usage of websites has seen a significant rise in the amount of information circulated on the Internet. Some businesses have created websites that display services the business renders ...Read more