Browsing by Author "Aremu, D. R."
Now showing 1 - 2 of 2
Results Per Page
Sort Options
Item Fingerprint Biometric-Based Cryptographic System as a Security Approach in Grid Environment(Journal of Computations & Modelling (JCoMod), 2014) Abdulraheem, M.; Aremu, D. R.; Adewole, K. S.; Muhammed, K. J.Interconnection of computer systems for the purpose of sharing resources in grid is increasing on the daily bases. Resource shared in grid is not limited to files alone but also includes computer resources such as memory, processors, etc. The security challenges resulting from this sharing is enormous including authentication, authorization, integrity, availability. These call for research attentions as evidenced from the reviewed literatures. Several researches have proposed cryptographic approaches as a promising solution to the various security challenges. However, issues surrounding the knowledge-based authentication approach motivate the researchers to be more innovative by proposing biometric-based cryptographic model to secure grid resources. This paper examines and analyses existing efforts to tackle these challenges. It also examines Grid Architecture where various components of a grid play major role in resource sharing and securing of grid. Biometric-based model was proposed that provides security for grid users using fingerprint for authentication and authorization in grid due to its ease of collectability.Item Malicious Uniform Resource Locator Detection Using Wolf Optimization Algorithm and Random Forest Classifier(Machine Learning and Data Mining for Emerging Trend in Cyber Dynamics: Theories and Applications, 2021) Adewole, K. S.; Raheem, M. O.; Abikoye, O. C.; Ajiboye, A. R.; Oladele, Tinuke Omolewa; Jimoh, M. K.; Aremu, D. R.Within the multitude of security challenges facing the online community, malicious websites play a critical role in today’s cybersecurity threats. Malicious URLs can be delivered to users via emails, textmessages, pop-ups or advertisements. To recognize these malicious websites, blacklisting services have been created by the web security community. This method has been proven to be inefficient. This chapter proposed meta-heuristic optimization method for malicious URLs detection based on genetic algorithm (GA) and wolf optimization algorithm (WOA). Support vector machine (SVM) as well as random forest (RF) were used for classification of phishingweb pages. Experimental results showthatWOAreduced model complexity with comparable classification results without feature subset selection. RF classifier outperforms SVM based on the evaluation conducted. RF model without feature selection produced accuracy and ROC of 0.972 and 0.993, respectively, while RF model that is based onWOA optimization algorithm produced accuracy of 0.944 and ROC of 0.987. Hence, in view of the experiments conducted using two well-known phishing datasets, this research shows that WOA can produce promising results for phishing URLs detection task.