International Research Symposium on Pure and Applied Sciences (IRSPAS)
Permanent URI for this communityhttp://repository.kln.ac.lk/handle/123456789/15650
Browse
5 results
Search Results
Item Machine learning based model for Android malware analysis and detection.(International Research Symposium on Pure and Applied Sciences, 2017 Faculty of Science, University of Kelaniya, Sri Lanka., 2017) Kavneth, G. A. S.; Jayalal, S.Rapid advancement of technology has enabled smartphones to become extremely powerful. They are capable of attracting a considerable amount of users with new features provided by mobile device operating systems such as Android and iOS. Android extended its lead by capturing 86 percent of the total market in 2017, and became the most popular mobile operating system. The Android operating system, which is found on a wide range of devices is owned by Google and powered by the Linux kernel. It is an open source operating system that enables mobile application developers to access unlocked hardware and develop new apps as they wish. However, this huge demand and freedom has made the hackers and cybercriminals more curious to generate malicious apps towards the Android operating system. They constantly target the security vulnerabilities in the operating system to gain access within the system. Even though, Google provides a primary set of security services, there are possibilities for potentially harmful applications in the Google Play store and other third party application stores. Thus, research on effective and efficient mobile threat analysis becomes an emerging and important topic in cybersecurity research area. Many researchers proposed various security analysis and evaluation strategies such as static analysis and dynamic analysis. In this research, we propose a hybrid approach, which aggregates the static and dynamic analysis for detecting security threats and attacks by Android malware application. This approach has two phases. First phase is the static analysis for applications, which will analyze the mobile application without execution. This focuses on extracting app APK file and examining permission requests made by Android apps that have declared in AndroidManifest.xml, as a means for detecting malwares. Because, in most of cases extra permissions granted by applications will allow the attacker to exploit the device. As the next phase, we perform dynamic analysis for mobile application. This phase focuses on runtime data obtained from the applications such as CPU, scheduler information from every running application, network calls, sensor data and so forth. For both phases, we have used supervised, machine learning based algorithms to train models and recognize malwares. In the first phase, potentially harmful applications can be identified as well as in the proposed hybrid mechanism, which is a combination of both phases. Data that was collected by several cybersecurity research centers were used for the evaluation of the proposed hybrid approach and both real-life malware and benign app data demonstrated a good detection performance with high scalability. The initial findings have been more accurate in identifying Android malwares rather than separating those two static and dynamic behaviors.Item Text mining approach on on-line guest reviews: A case study from hospitality industry.(International Research Symposium on Pure and Applied Sciences, 2017 Faculty of Science, University of Kelaniya, Sri Lanka., 2017) Hewage, N. I.; Jayalal, S.Social media and consumer-generated context on the Internet have become an integral part of the modern society with millions of users. With the increase of its popularity, tourism industry has shifted towards electronic transactions. Tourists now tend to use online social media reviews and ratings posted by hotel guests to make decisions before booking a hotel, which is an impossible task for a single user due to its high volume of reviews. Hence, to make better decisions, ranking of hotels for a specific region will be beneficial for the tourists who are willing to travel in that region and for the management of the hotel as well. However, while a handful of studies have employed on hotel guest satisfaction and experience by analyzing online hotel guest reviews collected from online travel agencies, there is a significant research problem with ranking hotels by analyzing hotel guest reviews in aspect level consideration. Expedia.com, Agoda.com and Booking.com are some of the leading online travel agencies that have millions of users. Online reviews used for this study are collected from 18 hotels that belong to all these three online travel agencies, and from that dataset, 6 hotels are selected as testing dataset. The dataset contains reviews from year 2010 to 2016. In this study, we propose a ranking mechanism, that ranks hotels by using the overall rating values, sentiment scores and the reviewed year. For computing sentiment scores, each review is split into sentences and they are categorized in to six attributes as Location, Service quality, Cleanliness, Comfort of rooms, Value for money and other. Thereafter, the sentiment analysis is done by considering the weight of the positive and negative words. In this research, we present a novel ranking algorithm to rank hotels, considering the reviewed year and computing the ranking score by getting the variance of the polarity rate and variance of rate of overall rating from initial year to the last. The results were taken by considering specific time period and without considering specific time period. Therefore, when using all the reviews without considering a time period, the rankings deviate from the Booking.com and TripAdvisor.com rankings. When using the reviews within 3 years of time, the ranking results are almost equal to the TripAdvisor.com rankings. When the time period is reduced for 18 months, the accuracy is 50% with Booking.com rankings and 33.3% with TripAdvisor.com rankings. This could be due to the fact that the above mentioned online travel agencies use online reviews more than two years, and therefore it perhaps causes for the deviation of rankings. Since sample dataset is used in this study, the accuracy can be increased by using a large dataset. Since this ranking mechanism considered variance to clarify the performance of hotels, and it is not only depending on the number of positive reviews or star ratings of the hotel, this is beneficial for the hotels which are not much popular, but having good standards.Item Real-time big data video analytics for unorganized traffic environments(Faculty of Science, University of Kelaniya, Sri Lanka, 2016) Ranaweera Arachchi, I.; Jayalal, S.; Rajapakse, C.Traffic on local roads has reached such a level that it is necessary to address the issue of traffic congestion and seek complex transport solutions for the city. Increase of the number of vehicles on the road becomes one of the key reasons for increasing traffic congestion. Traffic congestion is associated with massive financial and manhour loss and therefore attempts to alleviate this has been of keen interest. The basis of almost all those approaches is traffic monitoring and analysis, leading to having an effective traffic management system. Most traffic management systems are applied in well-organized traffic environments such as highways, where driver discipline is high. But in unorganized urban environments as seen in Sri Lanka, road traffic behavior vary from the accepted standards. Driver and pedestrian indiscipline cause huge traffic congestions in urban areas. Hence in such a scenario, a system that monitors road traffic on different traffic environments is very useful. There are several existing techniques such as Magnetic Loops, Microwave RADAR, Infrared Detectors, Ultrasonic Detectors and Camera Based Systems. Traffic monitoring systems require short processing time, low processing cost and high reliability. Therefore, according to the literature, camera-based monitoring is the best-suited technique for traffic monitoring. Real-time video analytics are part of a centralized approach to modern traffic management which is defined as computer vision-based surveillance that provides algorithms for object detection, tracking, classification and trajectory analysis using real-time traffic surveillance video. It usually uses roadside cameras (CCTV) to obtain traffic information and transmit it to central servers, exhibiting real-time operability of big data. In this study, several approaches and algorithms for moving object detection, based on temporal differencing method, optical flow method, background filtering are compared and a novel real-time vehicle detection and classification algorithm based on background filtering will be proposed and re-engineered in order to be applicable to challenging unorganized traffic environments. The solution will classify vehicles individually and their trajectories in real time in unorganized traffic environments in order to analyze the behaviors of the drivers as well as pedestrians on the road. We use OpenCV which is a library of programming functions mainly aimed at real-time computer vision, for implementing and testing algorithms. Data will be collected via pre-recorded video clips from Kiribathgoda junction in the western province, for the testing purpose and real- time CCTV surveillance video is going to be used as the input for implementation. A comprehensive data analysis is required to be conducted to address the higher processing requirement of such videos. The solution will be validated for performance subsequently. The final objective of this research is to come up with an optimum algorithm for vehicle detection and classification in unorganized traffic environments which would help to analyze the behavior of road users. The solution will lead to reduced traffic congestion in the country by enhancing the efficiency and effectiveness of traffic monitoring and analyzing systems.Item Detection of cyber bullying on social media networks(Faculty of Science, University of Kelaniya, Sri Lanka, 2016) Priyangika. S.; Jayalal, S.Social Media is becoming an integral part of people’s daily lives today. It is an effective way of sharing one’s life experiences, special occasions, achievements and other events with their friends and family. Although it is a fruitful way to communicate with groups, some people find themselves being insulted or offended by others who are involved in certain post or conversations. These insulations can be based on racism, using profanity or any other vulgar or lewd language. This cyber bullying needs to be monitored and controlled by the social media site owners since it will highly effect on the number and safety of the active site membership. Currently, there is no automated process of identifying offensive comments by the social network site itself. It can be only diagnosed by humans after reading the comments, flagging or reporting them to the owner of the site or blocking the offender. Considering the massive big data set generated in social media daily, automatically detection of offensive statements is required to reduce insulation effectively. For this purpose, text classification approach can be applied where a given text will be categorized as insulting or not, through learning from a pre-learned model. In order to develop the model, data was collected from the popular data repository site named www.kaggle.com. The dataset consists of comments posted on Facebook and Twitter. Firstly the dataset was divided into training data set and test data set. Then the collected data was preprocessed by removing the unwanted strings, correcting words and eliminating duplicate data fields. In the next step, features or keywords were extracted which are qualified to distinguish a statement as ‘insulting’ using N-grams model and counting methods. Feature selection is done using Chi- Squared test and finally apply classification algorithms for separating insulting comments and non-insulting comments from a dataset given. Machine learning algorithms such as Support Vector Machines (SVM), Naïve Bayes, Logistic Regression and Random Forest are used for this. Out of the classification algorithms, SVM is to be performed better than other algorithms since this is a two-class classification problem and a comment is to be classified only into two separate classes which are ‘insulting’ and ‘neutral’. With an exact separation of a given comment into ‘insulting’ and ‘neutral’ category, cyberbullying happening through offensive comments posted on social media sites can be detected.Item Predicting box office success of movies using sentiment analysis and opinion mining(Faculty of Science, University of Kelaniya, Sri Lanka, 2016) Basnayake, H.; Jayalal, S.Movies and social media come together as a result of people sharing their opinions on social media and movie makers using the same platforms for movie promotions. From movie makers to movie goers, many parties are interested in the success or failure of a movie. Forecasting the success of a movie before its release has been a difficult task for many industry analysts. Since film industry’s unpredictable nature, many analysts have come up with different algorithms and mechanisms to predict the success of a movie. One of the mechanisms to predict the box office success is hype analysis. Hype is one of the factors that drive people to the theatres to watch a new movie. Box office opening of a new movie depends on this hype and it will boost up the total box office collection. Hype can be estimated through social media platforms like Twitter. Twitter can be used as a corpus for sentiment analysis and opinion mining. A movie’s success cannot be predicted in a high accurate level solely based on social factors. Classical factors like movie’s brand name, cast, director, etc. are also important aspects in movie’s performance at box office and should be considered as well. However, a highly accurate method for movie box office prediction integrating both social and classical factors is yet to be introduced for this research area. In this study, tweets related to the particular movie before releasing are collected using an archiver tool and are used as input data. Then the collected data is preprocessed in order to get a clean dataset. As a part of sentiment analysis and opinion mining, feature selection is performed using N-gram method in order to filter out irrelevant data records and unlike Bag of words method, this does not require an extensive dictionary of words since it uses combinations of words and letters. Afterwards the data related to classical factors are integrated with the proposed formula in order to predict the opening box office collection of the movie. The proposed formula is an extension of a formula used in a previous research and the new extension represent the inclusion of classical factors. Finally, the results are compared with actual box office data and the previous formula results in order to compare and determine the level of accuracy. Based on initial results, the proposed formula showed of an accuracy level more than 85 percent when the results were compared with actual box office data. Even though it produced a higher accuracy level, the results produced were less than the actual box office values. Thus further testing is needed to determine the actual accuracy level.