Claim Missing Document
Check
Articles

Found 2 Documents
Search

Investigating an Anomaly-based Intrusion Detection via Tree-based Adaptive Boosting Ensemble Onoma, Paul Avweresuo; Agboi, Joy; Geteloma, Victor Ochuko; Max-Egba, Asuobite ThankGod; Eboka, Andrew Okonji; Ojugo, Arnold Adimabua; Odiakaoase, Christopher Chukwufunaya; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi; Binitie, Amaka Patience
Journal of Fuzzy Systems and Control Vol. 3 No. 1 (2025): Vol. 3, No. 1, 2025
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i1.279

Abstract

The eased accessibility, mobility, and portability of smartphones have caused the consequent rise in the proliferation of users' vulnerability to a variety of phishing attacks. Some users are more vulnerable due to factors like personality behavioral traits, media presence, and other factors. Our study seeks to reveal cues utilized by successful attacks by identifying web content as genuine and malicious data. We explore a sentiment-based extreme gradient boost learner with data collected over social platforms, scraped using the Python Google Scrapper. Our results show AdaBoost yields a prediction accuracy of 0.9989 to correctly classify 2148 cases with incorrectly classified 25 cases. The result shows the tree-based AdaBoost ensemble can effectively identify phishing cues and efficiently classify phishing lures against unsuspecting users from access to malicious content.
Voice-based Dynamic Time Warping Recognition Scheme for Enhanced Database Access Security Onoma, Paul Avweresuo; Ugbotu, Eferhire Valentine; Aghaunor, Tabitha Chukwudi; Agboi, Joy; Ojugo, Arnold Adimabua; Odiakaose, Christopher Chukwufunaya; Max-Egba, Asuobite ThankGod; Niemogha, Star Umiyemeromesu; Binitie, Amaka Patience; Abdullahi, Mustapha Barau
Journal of Fuzzy Systems and Control Vol. 3 No. 1 (2025): Vol. 3, No. 1, 2025
Publisher : Peneliti Teknologi Teknik Indonesia

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.59247/jfsc.v3i1.293

Abstract

Rapid transformation with database security has remained imperative as unauthorized access exposes sensitive data to adversaries. To curb this, we suggest using a secured dynamic time-warp scheme to improve access to the database schemas. The study integrates voice biometrics with two-factor authentication to yield a robust, user-friendly platform, which utilizes time-warping to authenticate voice patterns against the variability in utterance speed. Results showcase high accuracy and resiliency in its usage against spoofing attacks as compared to state-of-the-art voice recognition systems. The model ensures the minimal possibility of credential theft by binding the access of databases to the voice features of authorized users. The study shows the system's architecture, implementation, and performance evaluation, highlighting its potential to revolutionize database security in various applications. The findings underscore the importance of leveraging advanced biometric techniques to safeguard critical information systems.