Publication

Publisher:
 International Conference On Cyber Situational Awareness, Data Analytics And Assesment
Publication Type:
 Journal
Publication Title:
 A Graphic-Based Cryptographic Model For Authentication
Publication Authors:
 200. Boniface K. Alese, Aderonke F. Thompson And Patricia Y. Oni
Year Published:
 2017
Abstract:
Conventional password has been used for authentication for a long time due to its advantages. However, it drawbacks such as weak or unrecalled passwords has frequently compromised security. This paper presents a graphic-based cryptographic model (GBCM) with enhanced usability and security. The GBCM model consists of registration and verification stages that users must successfully complete in order to be authenticated. A hybrid technique based on recognition, cued and pure recall was adopted. The GBCM security is enhanced by using a three-level authentication mode, secret key, operator and scrambling of grid cells, thereby mitigating shoulder surfing attack; usability is enhanced using grid cell identity (ID) and images. Consequently, the implementation shows that, out of 18 users registration done with the system, 83.33% remembered their images, 83.33% also remembered their secret keys while 88.89% remembered their operator, resulting in 77.78% successful login. The login success proves user friendliness of the GBCM system 
Publisher:
 International Journal Of Computer Network And Information Security(IJCNIS)
Publication Type:
 Journal
Publication Title:
 Pre-Processing Of University Webserver Log Files For Intrusion Detection
Publication Authors:
 Bukola A. Onyekwelu, B. K. Alese, A. O. Adetunmbi,
Year Published:
 2017
Abstract:

Nil

 
Publisher:
 Journal Of Computer Science And Systems BiologyVol. 10 No 1 Pp 6 -11.
Publication Type:
 Journal
Publication Title:
 A Proposed Lower Computational Complexity Secret Key Mirroring System On GSM.
Publication Authors:
 Oyinloye, O. E, Alese, B. K. Thompson F. And Adetunmbi, A. O.
Year Published:
 2017
Abstract:
Global system for mobile communication is a wireless radio technology used mostly on network communication. It is designed to overcome the challenges of analog communication. GSM evolved from generation 1G to 4G LTE and uses protocols to protect transmissions, which have shown to be susceptible to attacks. This fact has been proven based on several attacks ranging from narrow pipe attack, guess, and determine attacks, side channel attacks, time memory tradeoff attacks and correlation attacks which have high computational complexities. The proposed system called GSM Traffic Monitoring System (GTMS) attempts to proffer a lower computational complexity attack. It uses a key retrieval and passive attack module to handle the mirroring of the secret key authentication procedure given a chosen random challenge on a SIM card through the injection of a malware. This research aims at drawing the attention of network providers- SIM configuration; an area that requires protection from attackers 
Publisher:
 Lecture Notes In Engineering And Computer Science: Proceedings Of The World Congress On Engineering And Computer Science
Publication Type:
 Journal
Publication Title:
 Secured Cloud Application Platform Using Elliptic Curve Cryptography
Publication Authors:
 198. Alowolodu Olufunso Dayo, Alese Boniface Kayode
Year Published:
 2016
Abstract:
Computing applications and data are growing so quickly that increasingly larger servers and disks are needed to process them fast enough within the required time period, which brought about the concept of Cloud Computing. Cloud Computing was introduced as a result of unfriendly environment created by Data Centers due to carbon emissions in addition to huge maintenance costs. Although, the major aim of the Cloud is for storage of data, attention has now shifted from that to the security of data in the Cloud. One of the ways by which data in the Cloud could be secured is cryptography. Elliptic Curve Cryptography which is a public key cryptographic scheme is employed in this work because of the smaller key size. This makes it suitable in a situation where resources like processing power, storage space, bandwidth and power consumption is limited 
Publisher:
 Notes In Engineering And Computer Science: Proceedings Of The World Congress On Engineering And Computer Science
Publication Type:
 Journal
Publication Title:
 Cost-Benefit Analysis Of Cyber-Security Systems
Publication Authors:
 197. Alese Boniface Kayode, Gabriel Junior Arome, Ayodele Tolulope, And Akinsowon Omoyele Ajoke
Year Published:
 2016
Abstract:
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in different countries; also, efforts are being made to identify the contributing factors to cybercrime. This research however, adopts a factor analytic approach to formulate the indices that may contribute to the perpetration of cybercrime. A total of seventy three (73) indices were formulated and used to design a structured questionnaire which was administered on five classes of respondents, using purposive and simple random sampling techniques. The data obtained were analyzed by means of factor analysis by principal component using Statistical Package for Social Sciences (SPSS). Ten factors were extracted and subjected to orthogonal rotation using promax. The contributing factors identified in this study could assist stakeholders to combat the menace of cybercrime 
Publisher:
 Lecture Notes In Engineering And Computer Science: Proceedings Of The World Congress On Engineering And Computer Science
Publication Type:
 Journal
Publication Title:
 Priority Based Voice Calls Simulation On Global System For Mobile Communications Network
Publication Authors:
 196. Kuboye B. Moses, Alese B. Kayode, And Oyeyiola Oyedoyin
Year Published:
 2016
Abstract:

Nil

 
Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE)
Publication Type:
 Journal
Publication Title:
 Design Of Circuit System Based Cryptography
Publication Authors:
 195. Akinwonmi, F. C, Alese, B. K., Dahunsi, F. M., Osuolale, F. A & Odo, A. E.
Year Published:
 2015
Abstract:
Design of circuit systembased cryptography 
Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE)
Publication Type:
 Journal
Publication Title:
 On Information Integrity Measurement With Secure Hash Algorithm (SHA)
Publication Authors:
 194. Ojo, S. A, Thompson, A. F., Iyare, O., & Alese, B. K.
Year Published:
 2015
Abstract:
The “information age” as often referred to the modern society, has become heavily dependent on information systems. As this dependency increases, the threat to information security has also gained ground. Societies need to cater for the security of information, and this has led to the development of different information security techniques most notable of which is cryptography. Cryptographic Hash functions are used to achieve a number of security goals like authenticity, digital signatures, pseudo-random number generation, digital steganography, digital time stamping. The strength of a cryptographic hash function can be summarized into its vulnerability to attack and computational time. This work therefore, reviews existing standard cryptographic hash functions, their construction and their application areas. The secured hash function (SHA) was selected and implemented based on its comparative worth over others. The implemented cryptographic hash function is evaluated for performance using a cryptographic evaluation standard. 
Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE)
Publication Type:
 Journal
Publication Title:
 Development Of A Secured Shared Processing System.
Publication Authors:
 194. Ojo, S. A, Thompson, A. F., Iyare, O., & Alese, B. K.
Year Published:
 2015
Abstract:
The most common way of ensuring confidentiality of data or documents by individuals, governments, and institutions such as banks, hospitals, and other commercial enterprises is by consigning their secrets to a computer system. But this has not solved the problems of upholding security, instead they are more compounded due to the fact that secrets sharing is generally desired but only in a tightly controlled manner. This could be resolved by the introduction of a secured shared processing system. Secured shared processing system is a system that comprises of several computers whereby one stands as a secured, trusted system while the other systems are connected to it. The system do not divide up a memory or a clock; the computers only communicate with each other by exchanging messages over a communication channel; and each computer has its own memory and operates on its own operating system. This is achieved with the aid of Cryptographic mechanisms in which EI Gamal model was adopted as a Public-key cryptography scheme which will be applied on a workstation distributed System 
Publisher:
 Proceedings Of Informing Science & IT Education Conference (InSITE)
Publication Type:
 Journal
Publication Title:
 Contributory Indices To Cybercrime Activities In Nigeria.
Publication Authors:
 192. Akinyokun, O. K., Alese, B. K., Oluwadare, S. A., Iyare, O., & Iwasokun, G. B.
Year Published:
 2015
Abstract:
The arrival of Internet has turned the world into a global village where geographical location or distance has to some extent ceased to be a major obstacle to communication and movement of goods and services. This development has also brought with it cybercrime and its level of sophistication. A lot of measures and institutions are being put in place to minimize the incidence of cybercrime in different countries; also, efforts are being made to identify the contributing factors to cybercrime. This research however, adopts a factor analytic approach to formulate the indices that may contribute to the perpetration of cybercrime. A total of seventy three (73) indices were formulated and used to design a structured questionnaire which was administered on five classes of respondents, using purposive and simple random sampling techniques. The data obtained were analyzed by means of factor analysis by principal component using Statistical Package for Social Sciences (SPSS). Ten factors were extracted and subjected to orthogonal rotation using promax. The contributing factors identified in this study could assist stakeholders to combat the menace of cybercrime.