Philosophiae Doctor - PhD (Computer Science)

Permanent URI for this collection

Browse

collection.page.browse.recent.head

Now showing 1 - 2 of 2
  • Item
    The importance of time: modelling network intrusions with long short-term memory recurrent neural networks
    (University of the Western Cape, 2024) Staudemeyer, Ralf Colmar; Omlin, Christian W
    We claim that modelling network traffic as a time series with a supervised learning approach, using known genuine and malicious behaviour, improves intrusion detection. To substantiate this, we trained long short-term memory (LSTM) recurrent neural networks with the training data provided by the DARPA KDD Cup 99 challenge. After preprocessing all frature, to improve information gain. we applied a number of intuitive steps to extract salient features,which resulted in the creation of a number of minimal fcature sets that could be used for detecting attack classes. The preprocessed KDD Cup 99 data was then used to test the performance of five very common and well-known classifiers. Decision trees. naive Bayes, Bayesian networks, feed forward neural network and support vector machines. Our results show a performance comparable to the winning entries of the KDD Cup 99 challengc. Finally, we applied the LSTM recurrent neural network classifier to the preprocessed data using the minimal feature sets. Our results show that the LSTM classifier provides superior performance in comparison to other strong static classifiers t rained. This is due to the fact that, LSTM learns to look back in time and correlate constructive collection records. For the' first time ever, we have demonstrated the usefulness of LSTM networks to intrusion detection.
  • Item
    Towards co-production of technology artefacts with a disabled community: A case study with deaf people and protection of personal information with video relay services
    (University of the Western Cape, 2024) Henney, André John; Tucker, William D.
    This thesis offers evidence of the realisation and use of this new methodological approach to move towards the genuine co-production of technology artefacts when working with marginalised Deaf people, particularly concerning their privacy needs surrounding a video relay service. Deaf people throughout the world, including those in South Africa, experience difficulty in essential communication in an environment that mainly comprises hearing individuals. This communication divide exists because Deaf, as opposed to deaf, people communicate in sign language; which most of the population does not comprehend. South Africa currently provides limited video relay services; the Protection of Personal Information Act was recently introduced, and South African Sign Language became the 12th official language. Thus, we ask: What are the major considerations for moving from co-design to co-production of technological artefacts with a case study of Deaf people's protection of personal information for video relay services? The move toward a co-produced workshop on the protection of personal information in South African Sign Language began with Video Relay Service (VRS) as the initial use case and the positive deviants in the Deaf community driving the process forward. By adopting a pragmatist theory to guide an Agile UX (software development) approach to co-design, combined with a Participatory Action Research approach, space was made for a collaborative process to emerge.