Galyna A. Akmayeva
Cardiff University
Network
Latest external collaboration on country level. Dive into details by clicking on the dots.
Publication
Featured researches published by Galyna A. Akmayeva.
international conference on digital information management | 2008
Yi-Tung F. Chan; Charles A. Shoniregun; Galyna A. Akmayeva
The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on NetFlow which analyse the source data from the router. Our experiment and data testing are based on two companies.
international conference on digital information management | 2008
Dannan Lin; Charles A. Shoniregun; Galyna A. Akmayeva
The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.
conference on soft computing as transdisciplinary science and technology | 2008
Yi-Tung F. Chan; Charles A. Shoniregun; Galyna A. Akmayeva
The DDoS attack is one of the existing security problems of online service. The current defense mechanism is very weak, because of the inherent TCP/IP protocol problems. This paper focuses on the overload protection mechanism for Router. We use the physical topology to do the simulation and propose the Bypass Guardian System (BGS) that can prevent the Distributed Denial of Service (DDoS) attack. This system can detect attack traffic and then redirect the traffic to the system itself. At the same time, the BGS can also monitor the traffic, filtering redirection, and proxy server.
world congress on internet security | 2015
Galyna A. Akmayeva; George Ghinea
The roll over from traditional/classroom to E-Learning has been seen as a new dimension promoting information technology skills. Now relatively all institutions or organisations provide some form of Internet access as almost all have websites. E-Learning has established improved teaching and learning resources, which tend to be the centre of attraction for most educational institutions and organisations that train their staff. As E-Learning becomes open, distributed and interconnected, security becomes an important challenge. E-Learning has provided an alternative compared to the traditional/classroom method for information and instructions to be shared across the World Wide Web (WWW) between the learner and the tutor. Therefore, as E-Learning increases in popularity, educational institutions and corporations run online courses and thus need to understand security issues related to E-Learning. The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment.
Security and Communication Networks | 2014
Daniel Caragata; Safwan El Assad; Charles A. Shoniregun; Galyna A. Akmayeva
One of the most important Universal Mobile Telecommunications System security breaches that were identified was the identity catching vulnerability. Whenever the user turns his mobile device on or if the service network fails, the International Mobile Subscriber Identity will be sent in clear over the radio link. This allows the International Mobile Subscriber Identity to be intercepted by an attacker who can use it for different purposes. In this paper, we present a Confidential Initial Identification Protocol that protects user identity and also offers the support for further Universal Mobile Telecommunications System security improvement, especially in the authentication and key agreement protocol and the security algorithms negotiation protocol. We show that these new protocols solve the identity catching vulnerability, limit the secret key exposure to cryptographic attacks, and increase the level of confidence of the user and the home network put in the service network. Copyright
international conference for internet technology and secured transactions | 2011
Daniel Caragata; Safwan El Assad; Charles A. Shoniregun; Galyna A. Akmayeva
international conference on information society | 2011
Taiwo Ayodele; Charles A. Shoniregun; Galyna A. Akmayeva
international conference for internet technology and secured transactions | 2012
Funminiyi Olajide; Nick Savage; Galyna A. Akmayeva; Richard Trafford
world congress on internet security | 2011
Daniel Caragata; Safwan El Assad; Ion Tutanescu; Charles A. Shoniregun; Galyna A. Akmayeva
international conference on information society | 2010
Galyna A. Akmayeva; Charles A. Shoniregun