Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Galyna A. Akmayeva is active.

Publication


Featured researches published by Galyna A. Akmayeva.


international conference on digital information management | 2008

A NetFlow based internet-worm detecting system in large network

Yi-Tung F. Chan; Charles A. Shoniregun; Galyna A. Akmayeva

The Internet worm infects the computer system, network packet, communication performance, and the traditional method of managing network using SNMP to monitor abnormal network traffic. To monitor suspicious Internet activity and to recognise the Internet worm categories, we proposed FloWorM system that can reduce the misjudgment and detection rate based on NetFlow which analyse the source data from the router. Our experiment and data testing are based on two companies.


international conference on digital information management | 2008

The softphone security

Dannan Lin; Charles A. Shoniregun; Galyna A. Akmayeva

The purpose of this study is to identify the key security issues within the context of software based VoIP (Voice over Internet Protocol) which are engaged in the process of data exchange on the converged networks. There is no one single solution for VoIP security; it is all depended on the type of customers, existing IT environment and carriers. In order to narrow down the focus we will concentrate on the SMEs (Small and Medium size Enterprises). This paper focuses on the key similarities and differences between softphone and hardphone, analyses VoIP security protocol and proposed a model for softphone security is presented.


conference on soft computing as transdisciplinary science and technology | 2008

A novel approach in securing DDoS attack

Yi-Tung F. Chan; Charles A. Shoniregun; Galyna A. Akmayeva

The DDoS attack is one of the existing security problems of online service. The current defense mechanism is very weak, because of the inherent TCP/IP protocol problems. This paper focuses on the overload protection mechanism for Router. We use the physical topology to do the simulation and propose the Bypass Guardian System (BGS) that can prevent the Distributed Denial of Service (DDoS) attack. This system can detect attack traffic and then redirect the traffic to the system itself. At the same time, the BGS can also monitor the traffic, filtering redirection, and proxy server.


world congress on internet security | 2015

Panel discussion: Secured environment for end-users and contents

Galyna A. Akmayeva; George Ghinea

The roll over from traditional/classroom to E-Learning has been seen as a new dimension promoting information technology skills. Now relatively all institutions or organisations provide some form of Internet access as almost all have websites. E-Learning has established improved teaching and learning resources, which tend to be the centre of attraction for most educational institutions and organisations that train their staff. As E-Learning becomes open, distributed and interconnected, security becomes an important challenge. E-Learning has provided an alternative compared to the traditional/classroom method for information and instructions to be shared across the World Wide Web (WWW) between the learner and the tutor. Therefore, as E-Learning increases in popularity, educational institutions and corporations run online courses and thus need to understand security issues related to E-Learning. The use of computer systems and networks results in a wide range of security issues that must be dealt with in order to create a safe learning environment.


Security and Communication Networks | 2014

Confidential initial identification and other improvements for UMTS security

Daniel Caragata; Safwan El Assad; Charles A. Shoniregun; Galyna A. Akmayeva

One of the most important Universal Mobile Telecommunications System security breaches that were identified was the identity catching vulnerability. Whenever the user turns his mobile device on or if the service network fails, the International Mobile Subscriber Identity will be sent in clear over the radio link. This allows the International Mobile Subscriber Identity to be intercepted by an attacker who can use it for different purposes. In this paper, we present a Confidential Initial Identification Protocol that protects user identity and also offers the support for further Universal Mobile Telecommunications System security improvement, especially in the authentication and key agreement protocol and the security algorithms negotiation protocol. We show that these new protocols solve the identity catching vulnerability, limit the secret key exposure to cryptographic attacks, and increase the level of confidence of the user and the home network put in the service network. Copyright


international conference for internet technology and secured transactions | 2011

UMTS security: Enhancement of identification, authentication and key agreement protocols

Daniel Caragata; Safwan El Assad; Charles A. Shoniregun; Galyna A. Akmayeva


international conference on information society | 2011

Towards e-learning security: A machine learning approach

Taiwo Ayodele; Charles A. Shoniregun; Galyna A. Akmayeva


international conference for internet technology and secured transactions | 2012

Forensic memory evidence of windows application

Funminiyi Olajide; Nick Savage; Galyna A. Akmayeva; Richard Trafford


world congress on internet security | 2011

Security of mobile Internet access with UMTS/HSDPA/LTE

Daniel Caragata; Safwan El Assad; Ion Tutanescu; Charles A. Shoniregun; Galyna A. Akmayeva


international conference on information society | 2010

Ontology of e-Learning security

Galyna A. Akmayeva; Charles A. Shoniregun

Collaboration


Dive into the Galyna A. Akmayeva's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Nick Savage

University of Portsmouth

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Taiwo Ayodele

University of Portsmouth

View shared research outputs
Top Co-Authors

Avatar

Dannan Lin

University of East London

View shared research outputs
Top Co-Authors

Avatar

George Ghinea

Brunel University London

View shared research outputs
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge