Research
Master of Science Dissertation (in Cyber Security)
August, 2023Digital evidence integrity and distribution through the chain of custody utilising blockchain technology
Journal
February, 2022Md. Badiuzzaman Pranto, Md. Hasibul Alam Ratul, Md. Mahidur Rahman, Ishrat Jahan Diya, Zunayeed-Bin-Zahir, "Performance of Machine Learning Techniques in Anomaly Detection with Basic Feature Selection Strategy - A Network Intrusion Detection System" in Journal of Advances in Information Technology, Vol. 13, No. 1, pp. 36-44, February 2022. page: 36-44
Conference
December, 2019Sifat Rezwan, Taoseef Ishtiak, Rummana Rahman, Hafiz Abdur Rahman, Manjurul Akter, Hasibul Alam Ratul, M. Shazzad Hosain, M. Jakariya, "A Minimalist Model of IoT based Sensor System for Sewage Treatment Plant Monitoring" in IEEE 10th Annual Information Technology, Electronics and Mobile Communication Conference (IEMCON), Vancouver, BC, Canada, 2019. pp. 0939-0945.
DOI : 10.1109/IEMCON.2019.8936182Bachelor of Science Thesis (in Computer Science and Engineering)
September, 2019Intrusion Detection System in a Cloud Network Using K Nearest Neighbour Algorithm
An IDS is capable of monitoring all or parts of the dynamic behavior and the state of a computer system, based on how it is configured. Besides such activities as dynamically inspect network packets targeted at this specific host, an IDS might detect which program accesses what resources and discover that, for example, a word-processor has suddenly and inexplicably started modifying the system password database. Similarly a HIDS might look at the state of a system, its stored information, whether in RAM, in the file system, log files or elsewhere; and check that the contents of these appear as expected, e.g. have not been changed by intruders.