Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Pritheega Magalingam is active.

Publication


Featured researches published by Pritheega Magalingam.


information assurance and security | 2009

A Novel Approach for Audio Watermarking

Mazdak Zamani; Azizah Abdul Manaf; Rabiah Ahmad; Akram M. Zeki; Pritheega Magalingam

This paper presents a novel, principled approach to resolve the remained problems of substitution technique of audio watermarking. Using the proposed genetic algorithm, message bits are embedded into multiple, vague and higher LSB layers, resulting in increased robustness. The robustness specially would be increased against those intentional attacks which try to reveal the hidden message and also some unintentional attacks like noise addition as well.


Archive | 2019

Malware Forensic Analytics Framework Using Big Data Platform

Suriayati Chuprat; Aswami Fadillah Mohd Ariffin; Shamsul Sahibuddin; Mohd Naz’ri Mahrin; Firham M. Senan; Noor Azurati Ahmad; Ganthan Narayana; Pritheega Magalingam; Syahid Anuar; Mohd Zabri Talib

The dramatically increased threats such as malware attacks to our cyber world have given us the vital sign to strengthen the security in a more proactive way. Thus, in recent research we proposed an integrated malware forensic analytics framework that will expose the future threats of malware attacks. This framework incorporates malware collections, malware analytics and visualization of discovered malware attacks. In this paper, we present the design and implementation of the framework which focuses on analytics and visualization, and utilized the emerging technology of big data platform. The implementation of the framework shows promising results in presenting descriptive analytics and predicting the future attacks using machine learning algorithms. We also demonstrate the feasibility of Hortonworks Cybersecurity Package (HCP) in supporting the proposed framework. Finally, we discussed the future work that can be further investigated in improving the implementation of the framework.


Archive | 2018

Novel Risk Assessment Method to Identify Information Security Threats in Cloud Computing Environment

Ganthan Narayana Samy; Sameer Hasan Albakri; Nurazean Maarop; Pritheega Magalingam; Doris Hooi-Ten Wong; Bharanidharan Shanmugam; Sundresan Perumal

Cloud computing model brought many technical and economic benefits, however, there are many security issues. Most of the common traditional information security risk assessment methods such as ISO27005, NIST SP800-30 and AS/NZS 4360 are not fit for the cloud computing environment. Therefore, this study applies medical research approach to assess the information security threats in the cloud computing environment. This study has been conducted as a retrospective cohort study and the collected data has been analyzed by using the survival analysis method. The study has been conducted on the software as a service (SaaS) environment that has more than one thousand and seven hundred cloud customers. The survival analysis method is used to measure the significance of the risk factor level. The information security threats have been categorized into twenty-two categories. This study has proven that the medical research approach can be used to assess the security risk assessment in cloud computing environment to overcome the weaknesses that accompany the usage of the traditional information security risk assessment methods in cloud computing environment.


International Conference of Reliable Information and Communication Technology | 2017

Digital Forensic Challenges in the Cloud Computing Environment

Ganthan Narayana Samy; Bharanidharan Shanmugam; Nurazean Maarop; Pritheega Magalingam; Sundresan Perumal; Sameer Hasan Albakri

The cloud computing model has been developed with promises to overcome the difficulties of other computing models. The low cost of computing resources, availability, location independence, and more focus on business objectives that this model promises are the most attractive features for companies. However, security issues are still the main obstacle that prevent widespread cloud computing adaptation. Digital forensics, a necessary process after any security incident, is faced with many challenges in the cloud computing environment. In this paper, we discuss the challenges digital forensics face in a cloud computing environment.


Bulletin of The Australian Mathematical Society | 2016

Complex network tools to enable identification of a criminal community

Pritheega Magalingam

Retrieving criminal ties and mining evidence from an organised crime incident, for example money laundering, has been a difficult task for crime investigators due to the involvement of different groups of people and their complex relationships. Extracting


international conference on digital forensics | 2009

Digital Evidence Retrieval and Forensic Analysis on Gambling Machine

Pritheega Magalingam; Azizah Abdul Manaf; Rabiah Ahmad; Zuraimi Yahya

Hardware forensic analysis involves the process of analyzing digital evidence derived from digital sources. The analysis is done to facilitate and prove either the device is used to commit crime, whether it contains evidence of a crime or is the target of a crime. Gambling machines serve as the main source by which illegal games are conducted. This paper presents a method for retrieving information from a seized gaming machine, along with an analysis of the interpreted information to prove that the gaming machine was used illegally. The proposed procedures for the gambling machine forensic process will be important for forensic investigators (e.g., the police or private investigators), as they will assist these individuals in the digital forensic evidence analysis necessary to produce evidence relevant to illegal gambling.


Digital Investigation | 2015

Using shortest path to discover criminal community

Pritheega Magalingam; Stephen Davis; Asha Rao


Proceedings of the 7th International Conference on Software and Information Engineering | 2018

Analysing Log Files For Web Intrusion Investigation Using Hadoop

Marlina Abdul Latib; Saiful Adli Ismail; Othman Mohd Yusop; Pritheega Magalingam; Azri Azmi


Open International Journal of Informatics | 2018

Effect of Social Media on Human Interpersonal Communication: A Review

Doris Hooi-Ten Wong; Chen-Siang Phang; Nurazean Maarop; Ganthan Narayana Samy; Roslina Ibrahim; Rasimah Che Mohd Yusoff; Pritheega Magalingam; Nurulhuda Firdaus Mohd Azmi


Journal of Telecommunication, Electronic and Computer Engineering | 2018

Analysis of Feature Categories for Malware Visualization

Ganthan Narayana Samy; Pritheega Magalingam; Aswami Fadillah Mohd Ariffin; Wafa Mohd Khairudin; Mohamad Firham Efendy Md Senan; Zahri Yunos

Collaboration


Dive into the Pritheega Magalingam's collaboration.

Top Co-Authors

Avatar

Ganthan Narayana Samy

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Nurazean Maarop

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Rabiah Ahmad

Universiti Teknikal Malaysia Melaka

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Azizah Abdul Manaf

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Sameer Hasan Albakri

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Sundresan Perumal

Universiti Sains Islam Malaysia

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Doris Hooi-Ten Wong

Universiti Teknologi Malaysia

View shared research outputs
Top Co-Authors

Avatar

Noor Hafizah Hassan

Universiti Teknologi Malaysia

View shared research outputs
Researchain Logo
Decentralizing Knowledge