Akalanka Bandara Mailewa
Akalanka Bandara Mailewa
Ph.D. (Doctor of Philosophy) - Texas Tech University
About
44
Publications
48,165
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
435
Citations
Introduction
Dr. Akalanka Bandara Mailewa (D. M.) received his Ph.D. in Computer Science from Texas Tech University, USA & his PhD dissertation research focuses on implementation of Secure Big Data Analytic Framework with MongoDB and Linux Containers in high-performance clusters (HPC). He received his M.Sc. in Computer Science from St. Cloud State University, USA and his B.Sc. Engineering (Hons.) in Computer Engineering from University of Peradeniya, Sri Lanka.
WEB: https://sites.google.com/site/dmakalanka
Publications
Publications (44)
This paper examines the transformative potential of Internet of Things (IoT) technology in modern energy management and optimization. By integrating smart devices such as sensors, meters, and automated systems, IoT enables real-time data collection and analysis, paving the way for more efficient energy usage across residential, commercial, and indu...
This paper evaluates the impact of chaos engineering on the resilience of microservices architectures. By simulating controlled failures, this research highlights specific findings, including reduced system downtime, improved fault detection, and faster incident resolution. A comparative analysis of tools like Chaos Monkey, Litmus, and Azure Chaos...
The rapid expansion of the Internet of Things (IoT) has brought transformative changes to both daily life and the digital economy, but it also introduces significant cybersecurity risks. This study investigates the potential threats posed by IoT to the digital economy, exploring its technological foundations, applications, and inherent vulnerabilit...
Storage and file synchronization have become increasingly important services in our everyday lives. With cloud storage providers giving users access to file space in the cloud, one might wonder how efficient these cloud storage providers are with their encryption methods. There are many different cloud storage providers and programs to set up a clo...
Cybersecurity is not solely a technological challenge but also a human one, as human behavior plays a critical role in both perpetrating and mitigating cyber threats. This paper delves into the interdisciplinary field of cybersecurity psychology, focusing on understanding the psychological factors that influence individuals' cybersecurity behavior,...
Cyber warfare has rapidly evolved into a dominant form of conflict in the modern era, transcending geographical boundaries and traditional warfare paradigms. "Cyber Warfare Unveiled: Threats, Tactics, and Defenses" is a comprehensive examination of this dynamic domain, offering insights into the multifaceted landscape of cyber threats, this paper d...
As Internet of Things devices continue to be utilized today, with several to be utilized in the future, the development of IoT systems has resulted in the generation of significant data that also comprises the users' crucial information. Hence, this resulted in considerable network, storage, and communication expenses simultaneously, prompting dive...
span>Recent improvements in the internet of things (IoT), cloud services, and network data variety have increased the demand for complex anomaly detection algorithms in network intrusion detection systems (IDSs) capable of dealing with sophisticated network threats. Academics are interested in deep and machine learning (ML) breakthroughs because th...
The Internet of Things' (IoT) quick development and user-friendly features have drawn interest from every industry to help them with their everyday operations. The world is being shaped by the expansion of IoT in ways that will improve efficiency, productivity, development, and opportunity while also raising quality of life. But the speed at which...
Modern IDS use inflexible knowledge bases, rulesets and rely on human interaction for successful threat mitigation. While this approach to network and hardware security has been effective in the past, the explosion of large data breaches in the past few years reveals a lack of effective detection for unknown or undocumented threats. We infer that a...
Contemporary small and medium-sized enterprises (SMEs) rely on computer networks to facilitate communication between internal employees and external customers. Thus, effective management of network infrastructure is paramount for their success. To ensure smooth operations and preempt any critical situations, it is imperative to monitor network infr...
Technology advances keep pushing the digitalization of processes in the workplace, leading to an increased use of internet and social media platforms. Little has been done to define and implement the risks and implement policies to protect against these risks. This review looks at the risks associated with the use of social media in the workplace....
The internet of things is performing a very crucial role holding capability to connect devices with the storage. This system is based on a multilayered architecture of IoT which has four components perception, network, middleware, and application layers that help in building a secure system. IoT has helped in the development of new technology that...
This research paper explores the growth and impact of ransomware attacks on organizations. The paper defines ransomware as malicious software that encrypts or corrupts data or files with the intention of extorting money from the targeted victim. The paper first provides an overview of common types of ransomware attacks, their scale, and the increas...
Quantum Computing continues to expand and rapidly approach large scale commercial usage. The advancement of quantum computing poses a threat to current cryptographic techniques and solutions are being researched rapidly to determine the correct course of action, culminating in a field known as Post-Quantum Cryptography, or PQC. This research gather...
Utilization of public Cloud Service Providers (CSPs) has increased drastically since its inception, with many businesses using a Software-as-a-Service (SaaS) business model, meaning their entire business is run on the cloud. Due to this business model's increase in popularity in recent years, CSPs need to make security of data in the cloud their to...
In today's world, web browsers are used by most everyone daily. Many of us take this incredible functionality for granted, and don't recognize the potential risks that are involved with simple internet use. These risks exist in both the browsers and their extensions. Google Chrome has cemented itself as one of the go-to browsers for both commercial...
As modern manufacturing shifts towards industry 4.0, mass adoption of Internet-of-Things (IoT), Operational Technology (OT), and IT-OT convergence have precipitated the rise of sophisticated malware. Thus, there is a need for a security mechanism that is both low-resource and highly accurate to address attacks like zero-day and Mirai botnets. The s...
In recent years, we have witnessed a massive growth of intrusion attacks targeted at Internet of things (IoT) devices. Due to inherent security vulnerabilities, it has become an easy target for hackers to target these devices. Recent studies have focused on deploying intrusion detection systems at the network's edge within IoT devices to localize t...
Lateral movement is a pervasive threat because modern networked systems that provide access to multiple users are far more efficient than their non-networked counterparts. It is a well-known attack methodology with extensive research conducted investigating the prevention of lateral movement in enterprise systems. However, attackers use increasingl...
The frequency and scale of unauthorized access cases and misuses of data access privileges are a growing concern of many organizations. The protection of confidential data, such as social security numbers, financial information, etc., of the customers and/or employees is among the key responsibilities of any organization, and damage to such sensiti...
The use of software to support the information infrastructure that governments, critical infrastructure providers and businesses worldwide rely on for their daily operations and business processes is gradually becoming unavoidable. Commercial off-the shelf software is widely and increasingly used by these organizations to automate processes with in...
In today's world, businesses and services are shifted to a digital transformation. As a result, network traffic has tremendously increased over the years. With that, network threats and attacks are growing and with that, the importance of intrusion detection systems has increased. The traditional signature-based approach to intrusion detection is n...
Modern IDS use inflexible knowledge bases, rule sets and rely on human interaction for successful threat mitigation. While this approach to network and hardware security has been effective in the past, the explosion of large data breaches in the past few years reveals a lack of effective detection for unknown or undocumented threats.We infer that a...
Now more than ever has it become important to keep the information confidential in an age that is losing its value of individual privacy. In this cloud computing era, regardless of the power of the cloud computing concept, many people do not know that their information can be used and sent to third parties from their cloud storage provider. Today t...
In recent years cloud computing has moved from an idea phase to a necessity in the business and personal use world, it has gone from being a theory to being an easily accessible need for organizations and individuals. A few years ago, having a storage infrastructure was an expensive idea that had to come with the buying, storage, securing, and main...
Intrusions in the computing networking world have been a highly common unwanted malicious activity from the beginning of computing networks. For the past decade variety of security measures have been implemented, but as technology has advanced, so have the security threats. With the entire world relying on computers, whether directly or indirectly,...
Cloud storage services such as GoogleCloud and NextCloud have become increasingly popular among Internet users and businesses. Despite the many encrypted file cloud systems being implemented worldwide today for different purposes, we are still faced with the problem of their usage, security, and performance. Although some cloud storage solutions ar...
Cloud computing is growing tremendously in recent years. Many organizations are switching their traditional computing model to a cloud based because of its low cost and pay-as-you-go manner. Although Cloud Service Provider (CSP) ensures that the data stored in their remote cloud server will be intact and secure. But there are many data integrity is...
Software Defined Networking (SDN) is a rapidly growing technology that is enabling innovation on how network systems are designed and managed. Like
any other technology, SDN is susceptible to numerous security threats. The separation of planes and centralized control topology of SDN makes it vulnerable
to myriad of attacks. There has been rapid imp...
A smart classroom is regarded as one of the essential modes of teaching that can transform an old-fashioned educational system into a more cutting-edge method. Past articles and social opinion has identified that there is a doubt among the Sri Lankan general populace whether Smart classrooms are really useful for school students in this country. Th...
It is essential to ensure the data security of data analytical frameworks as any security vulnerability existing in the system can lead to a data loss or data breach. This vulnerability may occur due to attacks from live attackers as well as automated bots. However inside attacks are also becoming more frequent because of incorrectly implemented se...
The emergence of new devices that make use of the Internet as their primary utility has made network security one of the most important domains in the world today. Intrusions in computing environment are very prevalent and causing a lot of problems for people, business or government that deem to keep their information private. As a result, data sec...
The economy of a country is driven in part by the variety of businesses that thrive in it. Competition among these businesses is encouraged as long as they follow specific rules set forth by the governments in which they operate. However, it becomes an entirely different story when the competitors play in a completely different environment and make...
A Vulnerability Management system is a disciplined, programmatic approach to discover and mitigate vulnerabilities in a system. While securing systems from data exploitation and theft, Vulnerability Management works as a cyclical practice of identifying, assessing, prioritizing, remediating, and mitigating security weaknesses. In this approach, roo...
The "Dark Web" is a term that alludes explicitly to an accumulation of sites that exist on an encrypted system and can't be found by utilizing customary web crawlers or visited by utilizing conventional programs. Practically all sites on the purported dark web shroud their identity utilizing the Tor encryption tool. The emergence of the dark web ha...
Today botnets have become one of the biggest risks in the network and security world and have been an infrastructure to carry out nearly every type of cyber-attacks as they provide a distributed platform for different illegal activities like launching the distributed denial of service attacks (DDoS). Recently botnet detection has been a very intere...
It is essential to ensure the data security of data analytical frameworks as any security vulnerability existing in the system can lead to a data loss or data breach. This vulnerability may occur due to attacks from live attackers as well as automated bots. However inside attacks are also becoming more frequent because of incorrectly implemented se...
Nowadays Linux Containers which have operating system level virtualization, are very popular over virtual machines (VMs) which have hypervisor or kernel level virtualization in high performance computing (HPC) due to reasons, such as high portability, high performance, efficiency and high security[1]. Hence, LXCs can make an efficient and secure bi...
The transdisciplinary big data medical research of the Exposome project discussed in this paper can be best described by the old adage 'Finding a needle in a haystack', in this case, of Excel .csv or other types of disparate files from various service providers, such as the US Census Bureau and the Center for Disease Control and Prevention of the U...
The development of large software systems is a complex and error prone process. Errors may occur at any stage of software development. These errors, sometimes referred to as bugs, can cause great losses in terms of both time and money if not identified and removed as early as possible. Software testing plays a major role in software development lif...
There is both local and global need for high-quality trained system programmers with the ability to learn in a short period of time and stay current with the recent advances and tools available in the cyber infrastructure. Computing programs can help to meet this demand by redesigning their operating systems courses and allowing more students to su...