NW Chanaka Lasantha

Work place: IIC University of Technology, Faculty of Graduate Studies, Phnom Penh 121206, Cambodia

E-mail: chanaka.lasantha@gmail.com

Website:

Research Interests:

Biography

NW Chanaka Lasantha, a seasoned Cyber & Information Security Architect, holds a Bachelor of Information Technology from the University of Colombo and a Master of Science from Kingston University, UK. Currently pursuing a Ph.D. at IIC Technological University, Cambodia, he has over 20 years of experience in the field. His expertise covers a wide spectrum including Data Protection, Risk Mitigation, Compliance, and Cloud & Linux Security. Presently a Security Architect at Kerner Norland, Chanaka is also skilled in SecDevOps and is a Defense Python Developer. He has developed numerous security solutions for cloud computing and Linux systems. Committed to promoting security awareness, he is an active speaker and contributor to security blogs and forums, sharing his extensive knowledge in cybersecurity.

Author Articles
A Novel Framework for Real-Time IP Reputation Validation Using Artificial Intelligence

By NW Chanaka Lasantha Ruvan Abeysekara M.W.P Maduranga

DOI: https://doi.org/10.5815/ijwmt.2024.02.01, Pub. Date: 8 Apr. 2024

This research paper introduces and discusses deeply an approach to the real-time IP reputation (IPR) concept and its validation process for an Amazon Web Services Web Application Firewall (AWS WAF) backend application safeguarding using intelligence (AI) technologies. Also, the study examines existing IP reputation solutions over AWS WAF which Evaluates methodologies highlighting the difficulties faced and real-world challenges in validating IPR while utilizing OpenAI’s generative AI language models the framework aims to automate the extraction and interpretation of IP-related information from AWS S3 real-time log storage sources such as logs, and natural language reports based on JSON structure. These dedicated algorithms developed, and AI model concepts are powered by processing language enabling them to identify incidents and detect patterns of IP behavior that should indicate security risks. Also, models do not directly access databases, as they can analyze data from APIs featured and with local maintenance database such that AbuseIPDB to evaluate the reputation of IP addresses Integrating AI into the process of validating IPs can greatly improve cybersecurity operations by summarizing findings and providing insights ultimately saving time and resources.

[...] Read more.
Other Articles