Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Chris Imafidon is active.

Publication


Featured researches published by Chris Imafidon.


International Journal of Advanced Computer Science and Applications | 2011

A New Approach of Digital Forensic Model for Digital Forensic Investigation

Inikpi O Ademu; Chris Imafidon; David Preston

The research introduces a structured and consistent approach for digital forensic investigation. Digital forensic science provides tools, techniques and scientifically proven methods that can be used to acquire and analyze digital evidence. The digital forensic investigation must be retrieved to obtain the evidence that will be accepted in the court. This research focuses on a structured and consistent approach to digital forensic investigation. This research aims at identifying activities that facilitate and improves digital forensic investigation process. Existing digital forensic framework will be reviewed and then the analysis will be compiled. The result from the evaluation will produce a new model to improve the whole investigation process.


international conference on global security, safety, and sustainability | 2009

Geofencing in a Security Strategy Model

Anthony C. Ijeh; Allan J. Brimicombe; David Preston; Chris Imafidon

The aim of this research paper is to investigate and create a security strategy model using geofencing; which can then be used to secure wireless local area networks (WLANs). In order to do so, the investigation will use the systematic arrangement and design used by geofencing technology for locating pre-configured wireless laptop. The objective is for the wireless laptop to function within a defined geographical area and be served by a specified wireless intercommunication unit. This is so that the defined geographical area can be used as a geo-fenced test bed to monitor the acts of the wireless laptop when communicating with the electromagnetic waves which is the medium through which it transmits data and communicates with the wireless intercommunication unit. By performing this experiment the security strategy model will be used to observe, detect and record the operations of the electromagnetic waves as they convey information within the geo-fenced test bed to the wireless laptop. Finally, by recording the operations the investigation will look to identify if predetermined acts took place within the geo-fenced test bed and in so doing develop a trusted security strategy model.


international conference on digital information management | 2008

Addressing the vulnerability of the 4-way handshake of 802.11i

Songhe Zhao; Charles A. Shoniregun; Chris Imafidon

This paper will introduce IEEE 802.11i, the new generation of security standard for wireless local area network (WLAN), analyze 802.1x authentication and key management mechanisms, elaborate on the 4-way handshake protocol, point out the vulnerability of the protocol and the possible attack it may incur taking into consideration the actual conditions, describe a solution proposed by IEEE 802.11i, its limitations and still existing attacks and finally propose a solution to authentication of the initial message.


International Journal of Advanced Research in Artificial Intelligence | 2012

Security Assessment of Software Design using Neural Network

Adetunji B. Adebiyi; Johnnes Arreymbi; Chris Imafidon

Security flaws in software applications today has been attributed mostly to design flaws. With limited budget and time to release software into the market, many developers often consider security as an afterthought. Previous research shows that integrating security into software applications at a later stage of software development lifecycle (SDLC) has been found to be more costly than when it is integrated during the early stages. To assist in the integration of security early in the SDLC stages, a new approach for assessing security during the design phase by neural network is investigated in this paper. Our findings show that by training a back propagation neural network to identify attack patterns, possible attacks can be identified from design scenarios presented to it. The result of performance of the neural network is presented in this paper.


international conference on computer modelling and simulation | 2012

Applicability of Neural Networks to Software Security

Adetunji B. Adebiyi; Johnnes Arreymbi; Chris Imafidon

Software design flaws account for 50% software security vulnerability today. As attacks on vulnerable software continue to increase, the demand for secure software is also increasing thereby putting software developers under more pressure. This is especially true for those developers whose primary aim is to produce their software quickly under tight deadlines in order to release it into the market early. While there are many tools focusing on implementation problems during software development lifecycle (SDLC), this does not provide a complete solution in resolving software security problems. Therefore designing software with security in mind will go a long way in developing secure software. In this paper some of the current approaches used in integrating security at the design level of SDLC are discussed briefly and a new method of evaluating software design using neural network is presented. With the aid of the proposed neural network tool, this research found out that software design scenarios can be matched to attack patterns that identify the security flaws in the design scenarios. The result of performance of the neural network is presented in this paper.


doctoral conference on computing, electrical and industrial systems | 2013

A Neural Network Based Security Tool for Analyzing Software

Adetunji B. Adebiyi; Johnnes Arreymbi; Chris Imafidon

The need to secure software application in today’s hostile computer environment cannot be overlooked. The increase in attacks aimed at software directly in the last decade and the demand for more secure software applications has drawn the attention of the software industry into looking for better ways in which software can be developed more securely. To achieve this, it has been suggested that security needs to be integrated into every phase of software development lifecycle (SDLC). In line with this view, security tools are now used during SDLC to integrate security into software applications. Here, we propose a neural network based security tool for analyzing software design for security flaws. Our findings show that the trained neural network was able to match possible attack patterns to design scenarios presented to it. With the information on the attack pattern identified, developers can make informed decision in mitigating risks in their designs.


international conference on global security, safety, and sustainability | 2009

The Significance of Security in Transmitting Clinical Data

Anthony C. Ijeh; David Preston; Chris Imafidon

The current information security risks facing the NHS, with particular reference to those caused by wireless networks has been presented these include but are not limited too, War driving, War walking, War chalking, War spying and War flying. This is because the biggest emerging threat to any modern day organisation is the use of wireless networks and technologies as there are so many standards from which to choose that may not always end up with ideal results of securing personal data in the process of standardisation. A standard is basically a bureaucratic process that becomes redundant in fast moving technological environments. The increased use of wireless networks in contemporary times is because they provide a quick way of connecting devices without cables. In this paper by identifying the applications within the National Programme for Information Technology (NPfIT), the study shall attempt to identify the applications potential E-crime risks.


arXiv: Cryptography and Security | 2014

Using Neural Network to Propose Solutions to Threats in Attack Patterns

Adetunji B. Adebiyi; Chris Imafidon

In the last decade, a lot of effort has been put into securing software application during development in the software industry. Software security is a research field in this area which looks at how security can be weaved into software at each phase of software development lifecycle (SDLC). The use of attack patterns is one of the approaches that have been proposed for integrating security during the design phase of SDLC. While this approach help developers in identify security flaws in their software designs, the need to apply the proper security capability that will mitigate the threat identified is very important. To assist in this area, the uses of security patterns have been proposed to help developers to identify solutions to recurring security problems. However due to different types of security patterns and their taxonomy, software developers are faced with the challenge of finding and selecting appropriate security patterns that addresses the security risks in their design. In this paper, we propose a tool based on Neural Network for proposing solutions in form of security patterns to threats in attack patterns matching attacking patterns. From the result of performance of the neural network, we found out that the neural network was able to match attack patterns to security patterns that can mitigate the threat in the attack pattern. With this information developers are better informed in making decision on the solution for securing their application.


International Journal of Advanced Research in Artificial Intelligence | 2012

The Need for a New Data Processing Interface for Digital Forensic Examination

Inikpi O Ademu; Chris Imafidon

Digital forensic science provides tools, techniques and scientifically proven methods that can be used to acquire and analyze digital evidence. There is a need for law enforcement agencies, government and private organisations to invest in the advancement and development of digital forensic technologies. Such an investment could potentially allow new forensic techniques to be developed more frequently. This research identifies techniques that can facilitates the process of digital forensic investigation, therefore allowing digital investigators to utilize less time and fewer resources. In this paper, we identify the Visual Basic Integrated Development Environment as an environment that provides set of rich features which are likely to be required for developing tools that can assist digital investigators during digital forensic investigation. Establishing a user friendly interface and identifying structures and consistent processes for digital forensic investigation has been a major component of this research.


international conference for internet technology and secured transactions | 2009

The society and electronic government usage

Cyril Ehijie Azenabor; Mohammad Dastbaz; Charles A. Shoniregun; Chris Imafidon

The electronic information despite its odds due to security implications and privacy issue cannot be ignored. The entire world has come to embrace the medium as a tool to run its daily activities both in business and information communications. Boundaries in different geographical locations and between sectors of businesses, such as products, services, channels and companies are increasingly wearing off due to emergence of Information Technology (IT). Governments are not left out in this wide spread. Threfore, in this paper we are proposing a model that will ensure maximum security awareness to check the inflow of people into the country.

Collaboration


Dive into the Chris Imafidon's collaboration.

Top Co-Authors

Avatar

David Preston

University of East London

View shared research outputs
Top Co-Authors

Avatar

Anthony C. Ijeh

University of East London

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Songhe Zhao

University of East London

View shared research outputs
Researchain Logo
Decentralizing Knowledge