[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/3090354.3090452acmotherconferencesArticle/Chapter ViewAbstractPublication PagesbdcaConference Proceedingsconference-collections
research-article

El-Security: E-learning Systems Security Checker Plug-in

Published: 29 March 2017 Publication History

Abstract

Integrating Information and Communication Technologies in learning process became paramount. Using e-learning systems, learning content can be delivered and shared in Internet. However, security of this type of systems is a challenge for developers and should be considered when developing e-learning systems. Different attacks could affect them since personal information of learners are used like authentication data. Other vulnerabilities of e-learning systems are relative to confidentiality, availability and integrity. In order to prevent, control and verify authentication attacks of e-learning systems, we propose in this paper a new methodology based on a security layer and implemented as a plug-in that controls, verifies and checks probable vulnerabilities of e-learning systems.

References

[1]
Rosenberg, Marc Jeffrey. 2001. E-learning: Strategies for delivering knowledge in the digital age. McGraw-Hill, New York, Vol. 9.
[2]
Leger, Muriel. 2013. Claroline Connect, une nouvelle plateforme de cours en ligne.
[3]
Rice, William. 2011. Moodle 2.0 E-Learning Course Development. Packt Publishing Ltd.
[4]
Pishva, D., Nishantha, G. G. D., Dang, H. A. 2010. A survey on how blackboard is assisting educational institutions around the world and the future trends. Advanced Communication Technology (ICACT), 2010 The 12th International Conference on. IEEE, p. 1539--1543.
[5]
Aissaoui, Karima and Azizi, Mostafa. 2016. Taxonomy and Unified Access of E-Learning Platforms. Proceedings of the Mediterranean Conference on Information & Communication Technologies 2015. Springer International Publishing, p. 625--629.
[6]
Grochtmann, M., Grimm, K., 1993, Classification Trees for Partition Testing. Software Testing, Verification & Reliability, Volume 3, Number 2, Wiley, pp. 63--82.
[7]
Chung, S. K., Yee, O. C., Singh, M. M., & Hassan, R. 2014. SQL injections attack and session hijacking on e-learning systems. Computer, Communications, and Control Technology (I4CT), International Conference on. IEEE, p. 338--342.
[8]
Stapić, Zlatko, Orehovački, Tihomir, et Đanić, Mario. 2008. Determination of optimal security settings for LMS Moodle. MIPRO 2008-31st International Convention on Information and Communication Technology, Electronics and Microelectronics.
[9]
Gu, Qijun Liu, Peng. 2007. Denial of service attacks. Handbook of Computer Networks: Distributed Networks, Network Planning, Control, Management, and New Trends and Applications, vol. 3, p. 454--468.
[10]
Kumar, Sheo Dutta, Kamlesh. 2011. Investigation on security in LMS moodle. International Journal of Information Technology and Knowledge Management, vol. 4, no 1, p. 233--238.
[11]
Nikiforakis, Nick, et al. 2011. SessionShield: Lightweight protection against session hijacking. Engineering Secure Software and Systems. Springer Berlin Heidelberg. 87--100.
[12]
Bokhari, D. M., Kuraishy, D. S., & Ahmad, S. 2015. Security Concerns and Counter Measures in E-Learning Systems. In International Conference on Computing and Systems-2010 (ICCS-2010).
[13]
Mahajan, P., & Sachdeva, A. 2013. A study of Encryption algorithms AES, DES and RSA for security. Global Journal of Computer Science and Technology, 13(15).
[14]
ALabaichi, A., Ahmad, F., & Mahmod, R. 2013. Security analysis of blowfish algorithm. In Informatics and Applications (ICIA), 2013 Second International Conference on (pp. 12--18). IEEE.
[15]
Derawi, Mohammad. 2014. Securing e-learning platforms. Web and Open Access to Learning (ICWOAL), 2014 International Conference on. IEEE, p. 1--4.
[16]
Vahe A. Arakelyan. 2013. Vulnerable Security Problems in Learning Management. Mathematical Problems of Computer Science 39, 129---134.
[17]
Multiples vulnérabilités dans Moodle, http://www.cert.ssi.gouv.fr/site/CERTFR-2015-AVI-403/CERTFR-2015-AVI-403.html, last access in 21/08/2016.

Cited By

View all
  • (2024)New Functionality for Moodle E-Learning Platform: Files Communication by Chat WindowApplied Sciences10.3390/app1418856914:18(8569)Online publication date: 23-Sep-2024
  • (2023)CIA-based Analysis for E-Leaming Systems Threats and Countermeasures in Malaysian Higher Education: Review Paper2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM56909.2023.10035569(1-8)Online publication date: 3-Jan-2023
  • (2022)Exploring Critical Challenges and Factors Influencing E-Learning Systems Security During COVID-19 Pandemic2022 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)10.1109/ITSS-IoE56359.2022.9990935(1-5)Online publication date: 3-Dec-2022
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Other conferences
BDCA'17: Proceedings of the 2nd international Conference on Big Data, Cloud and Applications
March 2017
685 pages
ISBN:9781450348522
DOI:10.1145/3090354
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

In-Cooperation

  • Ministère de I'enseignement supérieur: Ministère de I'enseignement supérieur

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 29 March 2017

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Attacks
  2. Plug-in
  3. Security
  4. Vulnerabilities

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

BDCA'17

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)3
Reflects downloads up to 19 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)New Functionality for Moodle E-Learning Platform: Files Communication by Chat WindowApplied Sciences10.3390/app1418856914:18(8569)Online publication date: 23-Sep-2024
  • (2023)CIA-based Analysis for E-Leaming Systems Threats and Countermeasures in Malaysian Higher Education: Review Paper2023 17th International Conference on Ubiquitous Information Management and Communication (IMCOM)10.1109/IMCOM56909.2023.10035569(1-8)Online publication date: 3-Jan-2023
  • (2022)Exploring Critical Challenges and Factors Influencing E-Learning Systems Security During COVID-19 Pandemic2022 International Conference on Intelligent Technology, System and Service for Internet of Everything (ITSS-IoE)10.1109/ITSS-IoE56359.2022.9990935(1-5)Online publication date: 3-Dec-2022
  • (2022)Edge-Computing based Secure E-learning Platforms2022 International Conference on Artificial Intelligence in Information and Communication (ICAIIC)10.1109/ICAIIC54071.2022.9722680(324-328)Online publication date: 21-Feb-2022
  • (2022)Authentication Methods with a High Degree of Security in Accessing Moodle E-Learning PlatformNew Realities, Mobile Systems and Applications10.1007/978-3-030-96296-8_86(951-961)Online publication date: 9-Apr-2022
  • (2021)Trusted Data Management for E-learning System Based on Blockchain2021 IEEE 13th International Conference on Computer Research and Development (ICCRD)10.1109/ICCRD51685.2021.9386354(91-94)Online publication date: 5-Jan-2021
  • (2021)A New Framework to Secure Cloud Based e-Learning SystemsWITS 202010.1007/978-981-33-6893-4_7(65-75)Online publication date: 22-Jul-2021
  • (2020)Fog-Assisted Secure Data Exchange for Examination and Testing in E-learning SystemMobile Networks and Applications10.1007/s11036-019-01429-x28:2(673-689)Online publication date: 18-Jan-2020

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media