SAKTI©: Secured Chatting Tool through Forward Secrecy

Authors

  • Azni Haslizan Ab Halim Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
  • Farida Ridzuan Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
  • Nur Hafiza Zakaria Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
  • Abdul Alif Zakaria Cybersecurity Malaysia, Menara Cyber Axis, 63000 Cyberjaya, Selangor, Malaysia
  • Najwa Hayaati Mohd Alwi Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
  • Sakinah Ali Pitchay Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
  • Ismail Az-Zuhar Cyber Security and Systems (CSS) Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia
  • Ahmed A AlSabhany Computer Science Department, Almaarif University College, Ramadi, Anbar, Iraq

DOI:

https://doi.org/10.37934/araset.49.1.5462

Keywords:

Secured chatting, Forward secrecy, Elliptic curve Diffie Hellman ephemeral

Abstract

The critical issue of academic misconduct is of utmost importance in the field of education and understanding whistleblowing behaviour can be a potential measure to effectively address this issue. This paper highlights the benefits of using the Tree-based Pipeline Optimization (TPOT) framework as a user-friendly tool for implementing machine learning techniques in studying whistleblowing behaviour among students in universities in Indonesia and Malaysia. The paper demonstrates the ease of implementing TPOT, making it accessible to inexpert computing scientists, and showcases highly promising results from the whistleblowing classification models trained with TPOT. Performance metrics such as Area Under Curve (AUC) are used to measure the reliability of the TPOT framework, with some models achieving AUC values above 90%, and the best AUC was 99% by TPOT with a Genetic Programming population size of 40. The paper’s main contribution lies in the empirical demonstration and findings that resulted in achieving the optimal outcomes from the whistleblowing case study. This paper sheds light on the potential of TPOT as an easy and rapid implementation tool for AI in the field of education, addressing the challenges of academic misconduct and showcasing promising results in the context of whistleblowing classification.

Downloads

Download data is not yet available.

Author Biographies

Azni Haslizan Ab Halim, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia

ahazni@usim.edu.my

Farida Ridzuan, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia

farida@usim.edu.my

Nur Hafiza Zakaria, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia

mzhafiza@usim.edu.my

Abdul Alif Zakaria, Cybersecurity Malaysia, Menara Cyber Axis, 63000 Cyberjaya, Selangor, Malaysia

alif@cybersecurity.my

Najwa Hayaati Mohd Alwi, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia

najwa@usim.edu.my

Sakinah Ali Pitchay, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia

sakinah.ali@usim.edu.my

Ismail Az-Zuhar, Cyber Security and Systems (CSS) Research Unit, Faculty of Science and Technology, Universiti Sains Islam Malaysia, Bandar Baru Nilai, 71800 Nilai, Negeri Sembilan, Malaysia

ismail_zuhair15@raudah.usim.edu.my

Ahmed A AlSabhany, Computer Science Department, Almaarif University College, Ramadi, Anbar, Iraq

alsabhany@uoa.edu.iq

Published

2024-07-28

How to Cite

Ab Halim, A. H., Ridzuan, F., Zakaria, N. H., Zakaria, A. A., Mohd Alwi, N. H., Ali Pitchay, S., Az-Zuhar, I., & AlSabhany, A. A. . (2024). SAKTI©: Secured Chatting Tool through Forward Secrecy. Journal of Advanced Research in Applied Sciences and Engineering Technology, 49(1), 54–62. https://doi.org/10.37934/araset.49.1.5462

Issue

Section

Articles