Oluwafemi Osho

Work place: Department of Cybersecurity Science Federal University of Technology, Minna, 920001, Nigeria

E-mail: femi.osho3@futminna.edu.ng

Website:

Research Interests: Computer systems and computational processes, Hardware Security, Information Security, Network Security, Information-Theoretic Security

Biography

Oluwafemi Osho is currently a lecturer in the Department of Cyber Security Science, Federal University of Technology, Minna, Nigeria. He holds a B.Tech. degree in Mathematics/Computer Science and an M.Tech. degree in Mathematics. Before joining the institution, he served as Head of the IT Department of one of the leading mortgage banks in Nigeria. His current research interests include cybersecurity, mobile security, and security analysis. He is a Certified Ethical Hacker (CEH).

Author Articles
Application of Geo-Location-Based Access Control in an Enterprise Environment

By Victor L. Yisa Baba Meshach Oluwafemi Osho Anthony Sule

DOI: https://doi.org/10.5815/ijcnis.2018.01.05, Pub. Date: 8 Jan. 2018

Unauthorized Access has been difficult to stop or prevent in the last few decades using username and password authentication only. For an individual, data breach might just be a simple case of espionage or the loss of private credentials, for an enterprise, this could mean the loss of billions of dollars. Preventing Unauthorized Access to Enterprise Systems Using a Location-based Logical Access Control proposes a framework that uses time and location in preventing and defending against data breaches. The framework was developed using Java with an Eclipse IDE. The database was designed using MySQL and locations were collected using Google Maps API. Users registered at different locations in a university campus were unable to access another’s account in the database because they were both outside the known location and tried to do this at off-work hours. Users were registered with username and password at specified locations. The users are then made to login from same and different locations with correct username and passwords. it was discovered that access to the database was only given when the username and password was correct and location was same as at registered or as allowed by an administrator. The system was found to protect against unauthorized access arising from stolen login credentials and unauthorized remote logins from malicious users.

[...] Read more.
Comparative Analysis of Classification Algorithms for Email Spam Detection

By Shafii Muhammad Abdulhamid Maryam Shuaib Oluwafemi Osho Idris Ismaila John K. Alhassan

DOI: https://doi.org/10.5815/ijcnis.2018.01.07, Pub. Date: 8 Jan. 2018

The increase in the use of email in every day transactions for a lot of businesses or general communication due to its cost effectiveness and efficiency has made emails vulnerable to attacks including spamming. Spam emails also called junk emails are unsolicited messages that are almost identical and sent to multiple recipients randomly. In this study, a performance analysis is done on some classification algorithms including: Bayesian Logistic Regression, Hidden Na?ve Bayes, Radial Basis Function (RBF) Network, Voted Perceptron, Lazy Bayesian Rule, Logit Boost, Rotation Forest, NNge, Logistic Model Tree, REP Tree, Na?ve Bayes, Multilayer Perceptron, Random Tree and J48. The performance of the algorithms were measured in terms of Accuracy, Precision, Recall, F-Measure, Root Mean Squared Error, Receiver Operator Characteristics Area and Root Relative Squared Error using WEKA data mining tool. To have a balanced view on the classification algorithms’ performance, no feature selection or performance boosting method was employed. The research showed that a number of classification algorithms exist that if properly explored through feature selection means will yield more accurate results for email classification. Rotation Forest is found to be the classifier that gives the best accuracy of 94.2%. Though none of the algorithms did not achieve 100% accuracy in sorting spam emails, Rotation Forest has shown a near degree to achieving most accurate result.

[...] Read more.
FileSyncer: Design, Implementation, and Performance Evaluation

By Oluwafemi Osho Anthony Ugbede Faruna

DOI: https://doi.org/10.5815/ijcnis.2016.11.04, Pub. Date: 8 Nov. 2016

With the pervasiveness of information technology, one of the growing trends today is a phenomenon which can be termed one-user-to-many-computing-devices. In many cases, the need to manage information across multiple electronic devices and storage media arises. The challenge therefore is finding a file synchronization system that can effectively replicate files across these different devices. This paper presents the design, implementation, and evaluation of FileSyncer, a rapid and efficient file synchronization tool that, in addition to the traditional synchronization capabilities, supports manual update selection and mechanism to revert a synchronization process back to the last previous state. The system employs last modified time, file size and CRC checksum for update detection and to ensure integrity of synchronized files. The synchronization times of the system for files of different sizes were compared with those of four existing file synchronization systems. Results showed increased efficiency in terms of time taken by FileSyncer to complete a synchronization operation with increase in file size compared to the other systems. In the future, we plan to release FileSyncer to the open source community for further development.

[...] Read more.
Framework for an E-Voting System Applicable in Developing Economies

By Lauretta O. Osho Muhammad Bashir Abdullahi Oluwafemi Osho

DOI: https://doi.org/10.5815/ijieeb.2016.06.02, Pub. Date: 8 Nov. 2016

Information technology has pervaded virtually every facet of human life. Even in the delivery of governance, information technology has gradually found a place. One of its applications is the use of electronic voting, also known as e-voting, as opposed to the traditional manual method of voting. This form of voting, however, is not immune to challenges generally associated with voting. Two of these include guaranteeing voting access to all eligible voters, and providing necessary voting security. The challenge of accessibility is especially peculiar to developing countries where IT adoption is still relatively low. This paper proposes a framework for an e-voting system that would most benefit developing economies. It ensures availability of the system to only eligible voters and integrity of the voting process through its capacity to identify and prevent ineligible voters and multiple voting. To guarantee accessibility to all eligible voters, it supports both online and offline voting capabilities. Adopting electronic form of voting would provide a more robust, easier to use, and reliable system of voting, which, consequently, would contribute towards enhancing the delivery of democratic dividends.

[...] Read more.
Comparative Evaluation of Mobile Forensic Tools

By Oluwafemi Osho Sefiyat Oyiza Ohida

DOI: https://doi.org/10.5815/ijitcs.2016.01.09, Pub. Date: 8 Jan. 2016

Mobile technology, over the years, has improved tremendously in sophistication and functionality. Today, there are mobile phones, known as smartphones, that can perform virtually most functions associated with personal computers. This has translated to increase in the adoption of mobile technology. Consequently, there has been an increase in the number of attacks against and with the aid of this technology. Mobile phones will often contain data that are needed as evidence in a court of law. And, therefore, the need to be able to acquire and present this data in an admissible form cannot be overemphasized. This requires the right forensic tools. This is the focus of this study. We evaluated the ability of four forensic tools to extract data, with emphasis on deleted data, from Android phones. Our results show that AccessData FTK Imager and EnCase performed better than MOBILedit Forensic and Oxygen Forensic Suite at acquiring deleted data. The conclusion is that, finding a forensic tool or toolkit that is virtually applicable across all mobile device platforms and operating systems is currently infeasible.

[...] Read more.
Effective Networking Model for Efficient Implementation of E-Governance: A Case Study of Nigeria

By Lauretta O. Osho Muhammad Bashir Abdullahi Oluwafemi Osho John K. Alhassan

DOI: https://doi.org/10.5815/ijieeb.2015.01.03, Pub. Date: 8 Jan. 2015

Nigeria is a nation full of potentials ranging from its human resources advantage to its mineral resources – the list is endless. Ambitious too, it has come to terms with the fact that ICT must be utilized even for the delivery of democracy dividends to actualize its vision of being among the top 20 economies by year 2020. In this paper, we explore the nation’s drive towards adopting e-governance by generally itemizing the requirements for e-governance, appraising how far Nigeria has gone in implementing it and then proposing a workable way to achieve it. Our study reveals that while the visions for e-government implementation are well articulated in terms of required components and intended deliverables, there are no clear statements on the processes of implementation. To this end, we propose some networking models adoptable towards realizing the different dimensions of e-government.

[...] Read more.
Other Articles