P R SANTOSH NAIDU CSE, JNTUK UCEV (original) (raw)

Uploads

Papers by P R SANTOSH NAIDU CSE, JNTUK UCEV

Research paper thumbnail of Automated vulnerability detection and prevention reporting of php-based web applications using PVRS and comparison between PVRS & RIPS

Most of the web servers support some sort of scripting environment today to deploy dynamic web ap... more Most of the web servers support some sort of scripting environment today to deploy dynamic web applications. PHP is a general-purpose server-side scripting language for creating dynamic webpages. Most people learn PHP syntax quite quickly and within short period of time they were able to write a script that works using mainly through online tutorials, references and books. The major problem is that most of the people forget the security aspect of PHP that one must consider while writing PHP based applications. Also mentioned are the common programming mistakes done by developers when building PHP web applications and necessary means to protect against such vulnerabilities. Presented are the most common PHP web application vulnerabilities and the necessary mechanisms required to compose secure code by leveraging PHP's unique features. So the paper here finally discusses about the tool PVRS which was specially developed for vulnerability detection of php-based web applications and also discusses in brief about the vulnerabilities that are mentioned in the tool and finally compares PVRS tool analysis results with the existing tool RIPS.

Research paper thumbnail of Study of importance of digital forensics & interpretation of forensic tools in linux-platform

Digital Forensics is a field of study comprising of numerous techniques to gather data, investiga... more Digital Forensics is a field of study comprising of numerous techniques to gather data, investigate up on and finally catch up a decision. The primary concerns in this specialized question are the disk forensics, memory forensics and network forensics. The way an operating system deals with the hardware is that, what it distinguishes while dealing forensics on various platforms. Hence disk forensics and memory forensics differ on windows and Linux platforms. Post-mortem disk forensics is the primary focus of this paper. Post-mortem disk forensics is available in PyFlag and Encase as well. So, we use these two tools to perform post-mortem disk forensics. Since forensics on Linux platform is least explored when compared to windows, this papers does its forensic analysis on Linux.

Research paper thumbnail of Peer to Peer Mechanism in ICMAN " s using Spray and Wait Routing Algorithm (Spray and Wait:An Effiecient and Epidemic Routing Mechanism

Mobile ad-hoc networks (MANETs) and peer-to-peer (P2P) systems are ubiquitously emerging technolo... more Mobile ad-hoc networks (MANETs) and peer-to-peer (P2P) systems are ubiquitously emerging technologies which share a common underlying decentralized networking paradigm. Deploying Peer to Peer architecture over Mobile ad hoc networks results in an efficient content distribution network. However most of the time MANETs are intermittently connected (No complete path exists from source to destination) due to scattered node densities, limited radio transmission range and power limitations. Various researches have proposed different routing/content delivery schemes under intermittent connectivity. In P2P content distribution systems searching play a major role in identifying the interested content. Because only after identifying interested content downloading or sharing begins. Existing content searching methods over intermittently connected MANETs (ICMANs) like epidemic P2P content search suffers from message delivery delays and resource wastage. This thesis focuses on developing an efficient content search scheme; as a result Spray and Wait routing is implemented for content searching in intermittently connected MANETs. Publications 2 transmission range, while communication beyond this range is established by employing intermediate nodes to set up a path in a hop-by-hop manner.

Research paper thumbnail of Study on Security Breaches in Php Applications

Php-based applications are one of the most dominant platforms for delivering information and serv... more Php-based applications are one of the most dominant platforms for delivering information and services over Internet today. As they are mostly used for critical services, php-based applications become a common and direct target for security attacks. Although there are larger number of techniques have been developed to strengthen php-based applications and mitigate the attacks toward php-based applications, there is very slight effort committed to drawing connections among these techniques and building a big picture of php-based application security research. This paper surveys the area of php-based application security, with the aim of systemizing the already implemented techniques into a picture that promotes future research. I present the unique aspects in the php-based application development which bring underlying challenges for building secured php-based applications. Finally, summarizes the lessons instructed and discuss future research opportunities in the area of php security.

Research paper thumbnail of Performance Evaluation and Testing of EAACK- Secure IDS for MANETs: Brief Study

Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst ... more Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and classifiable applications. On the adverse to ancient spec, Manet doesn't need a set network infrastructure; each single node works as each a sender and a receiver and they trust their neighbours to relay messages. Unfortunately, the open medium and remote distribution of Manet create it at risk of numerous kinds of attacks. So, it is essential to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we define solid privacy requirements regarding malicious attackers in MANET. Then we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behaviour-detection rates in certain circumstances while does not greatly affect the network performances.

Research paper thumbnail of Vulnerability Detection of php applications using Php-Code Analyzer before deploying web application

A Vulnerability Scanner is software application that assesses security vulnerabilities web sites ... more A Vulnerability Scanner is software application that assesses security vulnerabilities web sites and web applications and produces appropriate results after the scan. However, because both admins/developers and attackers can use the same tool for fixing or exploiting a system, admins/developers need to run a scan and fix problems before an attacker can do the same scan and exploit any vulnerability found. Php Code Analyzer can help you find and validate SQL Injection, Cross-Site Scripting (XSS), unintentionally disclosed sensitive information, and other vulnerabilities of the web applications that have located in local server before the final deployment in main server or in the web. It is written in php; application based, and can be deployed in Linux and Windows.

Research paper thumbnail of An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques

Usage of (math-based/computer-based) useful things/valuable supplies is always an interesting res... more Usage of (math-based/computer-based) useful things/valuable supplies is always an interesting research issue in the field of Grid figuring out/calculating. Job shop scheduling is a combinatorial optimization problem it finds possible number of solution for best solution. In this paper we are proposing a blended approach of (related to tiny chemical assembly instructions inside of living things) set of computer instructions and GELS set of computer instructions for identifying missed job or best solution from set of samples or (genetic information storage areas) which contains jobs, operation and time span.

Research paper thumbnail of Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization

Low-power wireless networks are an exciting research direction in sensing and widespread figuring... more Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific rules of conduct, but rather depend on the properties of many popular classes of routing rules of conduct. We find that all examined rules of conduct are easily able to be harmed or influenced by Vampire attacks, which are terrible and destructive, very hard to detect, and are easy to carry out using as few as one evil and cruel insider sending only rules of conduct cooperative messages.

Research paper thumbnail of IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures

Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major i... more Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of network administrators, nor are any guarantees that implemented IPv6 protocol stacks and security techniques without any bugs. This paper addresses some security concerns like extensive use of multicast packets and extension headers and its countermeasures.

Research paper thumbnail of Impact of HeartBleed Bug in Android and Counter Measures

Research paper thumbnail of A Novel Password Protected Key Exchange Protocol

— Exchanging messages are more common thing lately. More number of people connects with each othe... more — Exchanging messages are more common thing lately. More number of people connects with each other in the network and (verifies someone's identity) each other while sharing their data. So users following so many rules of conduct for providing security to their data and the servers which they are storing their data. Due to all data storing in the single server, there is a chance to hack server data to be told (to people). This paper presents a solution to this problem such as (verifying someone's identity) process has to share by two servers. Client has to (verify someone's identity) in two servers like two step checking (for truth). It also includes (related to secret computer codes) ways of doing things to provide security for the data stored in the servers.

Research paper thumbnail of Classification of Images Based On Saliency Driven Non-Linear Diffusion Filtering

– The saliency driven multiscale nonlinear diffusion filtering resulting scale space in general p... more – The saliency driven multiscale nonlinear diffusion filtering resulting scale space in general preserves or even enhances semantically important structures such as edges, lines, or flow-like structures in the foreground, inhabits and clear clutter in the background. The image is classified using multiscale information fusion based on the original image, the image at the final scale at which the diffusion process converges, and the image at a midscale. Our algorithm maintains the foreground features, which are important for image classification. The background image regions, whether considered as noise to the foreground, can be globally handled by fusing information from different scales.

Research paper thumbnail of A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

– Optimizing the internet traffic is always an important research issue in the field of network t... more – Optimizing the internet traffic is always an important research issue in the field of network traffic classification, although various approaches available for minimizing the traffic over heads during the network traffic, they are not optimal. In this paper we are proposing an optimized classification approach for internet traffic by analyzing the behavior of the nodes for allowing or dis connection of the incoming node by computing the posterior probabilities of the factors with respect to the node.

Research paper thumbnail of Automated vulnerability detection and prevention reporting of php-based web applications using PVRS and comparison between PVRS & RIPS

Most of the web servers support some sort of scripting environment today to deploy dynamic web ap... more Most of the web servers support some sort of scripting environment today to deploy dynamic web applications. PHP is a general-purpose server-side scripting language for creating dynamic webpages. Most people learn PHP syntax quite quickly and within short period of time they were able to write a script that works using mainly through online tutorials, references and books. The major problem is that most of the people forget the security aspect of PHP that one must consider while writing PHP based applications. Also mentioned are the common programming mistakes done by developers when building PHP web applications and necessary means to protect against such vulnerabilities. Presented are the most common PHP web application vulnerabilities and the necessary mechanisms required to compose secure code by leveraging PHP's unique features. So the paper here finally discusses about the tool PVRS which was specially developed for vulnerability detection of php-based web applications and also discusses in brief about the vulnerabilities that are mentioned in the tool and finally compares PVRS tool analysis results with the existing tool RIPS.

Research paper thumbnail of Study of importance of digital forensics & interpretation of forensic tools in linux-platform

Digital Forensics is a field of study comprising of numerous techniques to gather data, investiga... more Digital Forensics is a field of study comprising of numerous techniques to gather data, investigate up on and finally catch up a decision. The primary concerns in this specialized question are the disk forensics, memory forensics and network forensics. The way an operating system deals with the hardware is that, what it distinguishes while dealing forensics on various platforms. Hence disk forensics and memory forensics differ on windows and Linux platforms. Post-mortem disk forensics is the primary focus of this paper. Post-mortem disk forensics is available in PyFlag and Encase as well. So, we use these two tools to perform post-mortem disk forensics. Since forensics on Linux platform is least explored when compared to windows, this papers does its forensic analysis on Linux.

Research paper thumbnail of Peer to Peer Mechanism in ICMAN " s using Spray and Wait Routing Algorithm (Spray and Wait:An Effiecient and Epidemic Routing Mechanism

Mobile ad-hoc networks (MANETs) and peer-to-peer (P2P) systems are ubiquitously emerging technolo... more Mobile ad-hoc networks (MANETs) and peer-to-peer (P2P) systems are ubiquitously emerging technologies which share a common underlying decentralized networking paradigm. Deploying Peer to Peer architecture over Mobile ad hoc networks results in an efficient content distribution network. However most of the time MANETs are intermittently connected (No complete path exists from source to destination) due to scattered node densities, limited radio transmission range and power limitations. Various researches have proposed different routing/content delivery schemes under intermittent connectivity. In P2P content distribution systems searching play a major role in identifying the interested content. Because only after identifying interested content downloading or sharing begins. Existing content searching methods over intermittently connected MANETs (ICMANs) like epidemic P2P content search suffers from message delivery delays and resource wastage. This thesis focuses on developing an efficient content search scheme; as a result Spray and Wait routing is implemented for content searching in intermittently connected MANETs. Publications 2 transmission range, while communication beyond this range is established by employing intermediate nodes to set up a path in a hop-by-hop manner.

Research paper thumbnail of Study on Security Breaches in Php Applications

Php-based applications are one of the most dominant platforms for delivering information and serv... more Php-based applications are one of the most dominant platforms for delivering information and services over Internet today. As they are mostly used for critical services, php-based applications become a common and direct target for security attacks. Although there are larger number of techniques have been developed to strengthen php-based applications and mitigate the attacks toward php-based applications, there is very slight effort committed to drawing connections among these techniques and building a big picture of php-based application security research. This paper surveys the area of php-based application security, with the aim of systemizing the already implemented techniques into a picture that promotes future research. I present the unique aspects in the php-based application development which bring underlying challenges for building secured php-based applications. Finally, summarizes the lessons instructed and discuss future research opportunities in the area of php security.

Research paper thumbnail of Performance Evaluation and Testing of EAACK- Secure IDS for MANETs: Brief Study

Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst ... more Among all the up to date wireless networks, Mobile circumstantial Network (MANET) is one amongst the foremost necessary and classifiable applications. On the adverse to ancient spec, Manet doesn't need a set network infrastructure; each single node works as each a sender and a receiver and they trust their neighbours to relay messages. Unfortunately, the open medium and remote distribution of Manet create it at risk of numerous kinds of attacks. So, it is essential to develop efficient intrusion-detection mechanisms to protect MANET from attacks. In this paper, we define solid privacy requirements regarding malicious attackers in MANET. Then we propose and implement a new intrusion-detection system named Enhanced Adaptive Acknowledgment (EAACK) specially designed for MANETs. Compared to contemporary approaches, EAACK demonstrates higher malicious-behaviour-detection rates in certain circumstances while does not greatly affect the network performances.

Research paper thumbnail of Vulnerability Detection of php applications using Php-Code Analyzer before deploying web application

A Vulnerability Scanner is software application that assesses security vulnerabilities web sites ... more A Vulnerability Scanner is software application that assesses security vulnerabilities web sites and web applications and produces appropriate results after the scan. However, because both admins/developers and attackers can use the same tool for fixing or exploiting a system, admins/developers need to run a scan and fix problems before an attacker can do the same scan and exploit any vulnerability found. Php Code Analyzer can help you find and validate SQL Injection, Cross-Site Scripting (XSS), unintentionally disclosed sensitive information, and other vulnerabilities of the web applications that have located in local server before the final deployment in main server or in the web. It is written in php; application based, and can be deployed in Linux and Windows.

Research paper thumbnail of An Empirical Model of Job Shop Scheduling With Related To Tiny Chemical Assembly Instructions Inside of Living Things and Gels Techniques

Usage of (math-based/computer-based) useful things/valuable supplies is always an interesting res... more Usage of (math-based/computer-based) useful things/valuable supplies is always an interesting research issue in the field of Grid figuring out/calculating. Job shop scheduling is a combinatorial optimization problem it finds possible number of solution for best solution. In this paper we are proposing a blended approach of (related to tiny chemical assembly instructions inside of living things) set of computer instructions and GELS set of computer instructions for identifying missed job or best solution from set of samples or (genetic information storage areas) which contains jobs, operation and time span.

Research paper thumbnail of Mitigation of Energy Depletion in Wireless Ad-hoc Sensor Networks through Path Optimization

Low-power wireless networks are an exciting research direction in sensing and widespread figuring... more Low-power wireless networks are an exciting research direction in sensing and widespread figuring out/calculating. Prior security work in this area has focused mostly on denial of communication at the routing or medium access control levels. This paper explores useful thing/valuable supply using everything up (completely) attacks at the routing rules of conduct layer, which permanently disable networks by quickly draining nodes' battery power. These "Vampire" attacks are not specific to any specific rules of conduct, but rather depend on the properties of many popular classes of routing rules of conduct. We find that all examined rules of conduct are easily able to be harmed or influenced by Vampire attacks, which are terrible and destructive, very hard to detect, and are easy to carry out using as few as one evil and cruel insider sending only rules of conduct cooperative messages.

Research paper thumbnail of IPv6: Threats Posed By Multicast Packets, Extension Headers and Their Counter Measures

Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major i... more Security issues concerning the spreading Internet Protocol version 6 (IPv6) is one of the major issues in the world of networking today. Since it is not the default network protocol deployed nowadays (but systems are migrating slowly from ipv4 to ipv6) there are no best practices from the point of network administrators, nor are any guarantees that implemented IPv6 protocol stacks and security techniques without any bugs. This paper addresses some security concerns like extensive use of multicast packets and extension headers and its countermeasures.

Research paper thumbnail of Impact of HeartBleed Bug in Android and Counter Measures

Research paper thumbnail of A Novel Password Protected Key Exchange Protocol

— Exchanging messages are more common thing lately. More number of people connects with each othe... more — Exchanging messages are more common thing lately. More number of people connects with each other in the network and (verifies someone's identity) each other while sharing their data. So users following so many rules of conduct for providing security to their data and the servers which they are storing their data. Due to all data storing in the single server, there is a chance to hack server data to be told (to people). This paper presents a solution to this problem such as (verifying someone's identity) process has to share by two servers. Client has to (verify someone's identity) in two servers like two step checking (for truth). It also includes (related to secret computer codes) ways of doing things to provide security for the data stored in the servers.

Research paper thumbnail of Classification of Images Based On Saliency Driven Non-Linear Diffusion Filtering

– The saliency driven multiscale nonlinear diffusion filtering resulting scale space in general p... more – The saliency driven multiscale nonlinear diffusion filtering resulting scale space in general preserves or even enhances semantically important structures such as edges, lines, or flow-like structures in the foreground, inhabits and clear clutter in the background. The image is classified using multiscale information fusion based on the original image, the image at the final scale at which the diffusion process converges, and the image at a midscale. Our algorithm maintains the foreground features, which are important for image classification. The background image regions, whether considered as noise to the foreground, can be globally handled by fusing information from different scales.

Research paper thumbnail of A Dynamic Approach of Malicious Node Detection for Internet Traffic Analysis

– Optimizing the internet traffic is always an important research issue in the field of network t... more – Optimizing the internet traffic is always an important research issue in the field of network traffic classification, although various approaches available for minimizing the traffic over heads during the network traffic, they are not optimal. In this paper we are proposing an optimized classification approach for internet traffic by analyzing the behavior of the nodes for allowing or dis connection of the incoming node by computing the posterior probabilities of the factors with respect to the node.