Network Security Algorithm for Forensic Management in Uganda Government Agencies


Authors : Ssonko Denison; Francis Lowu; Adam Alli. A

Volume/Issue : Volume 8 - 2023, Issue 5 - May

Google Scholar : https://bit.ly/3TmGbDi

Scribd : https://tinyurl.com/yc43b97r

DOI : https://doi.org/10.5281/zenodo.8150039

Abstract : This research focuses on proposing a network security algorithm for forensic management in Uganda government agencies. With the increasing dependence on technology, the risk of cyber-attacks and data breaches has become a major concern for government agencies, making it essential to develop effective security measures. The network security algorithm is based on machine learning, a method of data analysis that automates analytical model building to detect and prevent cyber- attacks, as well as to provide efficient forensic analysis of any security incidents that may occur. The algorithm was validated for accuracy, true positivity rate of traffic, and knowledge to capture network intruders. This was achieved using Python’s pycharm IDE environment and Google Collaborator to show how the normal and attacked traffic flow. A mixed-methods approach was used, including a survey of government agencies and interviews with cyber security experts in some agencies to gather information on the current security measures and identify areas that need improvement. The algorithm integrates various security technologies such as intrusion detection systems, and data encryption to provide a multi- layered defense system.

Keywords : Network Security, Algorithm, Forensics, PyCharm, DDOS, Government Agency

This research focuses on proposing a network security algorithm for forensic management in Uganda government agencies. With the increasing dependence on technology, the risk of cyber-attacks and data breaches has become a major concern for government agencies, making it essential to develop effective security measures. The network security algorithm is based on machine learning, a method of data analysis that automates analytical model building to detect and prevent cyber- attacks, as well as to provide efficient forensic analysis of any security incidents that may occur. The algorithm was validated for accuracy, true positivity rate of traffic, and knowledge to capture network intruders. This was achieved using Python’s pycharm IDE environment and Google Collaborator to show how the normal and attacked traffic flow. A mixed-methods approach was used, including a survey of government agencies and interviews with cyber security experts in some agencies to gather information on the current security measures and identify areas that need improvement. The algorithm integrates various security technologies such as intrusion detection systems, and data encryption to provide a multi- layered defense system.

Keywords : Network Security, Algorithm, Forensics, PyCharm, DDOS, Government Agency

CALL FOR PAPERS


Paper Submission Last Date
31 - May - 2024

Paper Review Notification
In 1-2 Days

Paper Publishing
In 2-3 Days

Video Explanation for Published paper

Never miss an update from Papermashup

Get notified about the latest tutorials and downloads.

Subscribe by Email

Get alerts directly into your inbox after each post and stay updated.
Subscribe
OR

Subscribe by RSS

Add our RSS to your feedreader to get regular updates from us.
Subscribe