ravi shanker - Academia.edu (original) (raw)

Papers by ravi shanker

Research paper thumbnail of Analysis of Ransomware Attack and Their Countermeasures: A Review

Ransomware is a type of malicious software. Computers infected with ransomware have restricted ac... more Ransomware is a type of malicious software. Computers infected with ransomware have restricted access to the system. It is a malicious program, and money must be provided to the creator of the malicious code to release it. With the substantial increase in the number of ransomware attacks, on May-12-2017, network security issues began to heat up. This article describes the types of countermeasures against ransomware and cyber terrorism. In recent years, ransomware has been under constant attack and has high infectious power: S pora, CryptoLocker, Locky, CryptoWall, Petya, Cerber, S anam, Aris Locker, Jigsaw, WannaCry, and Reveton. Ransomware protection is not any longer 100% free. However, you can secure ransomware through programmed refreshes, antibody establishment, and span backups. Need framework and organization. Figure out how to prevent ransomware from your organization and individual clients. Most ransomware is transmitted via phishing emails. The fastest way is to measure the steps taken by various agencies to stop this malware and decrypt it. The criminals behind the ransomware caused not only largescale damage to sensitive infrastructure but also billions of dollars in benefits from patients around the world. The world is still collecting money from innocent people. Nine types of ransomware, small software, and several examples of malware are studied. The outcomes show that reflected programming and innocuous applications can be recognized. This is a way to stop companies and individuals from ransomware

Research paper thumbnail of Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition Towards IoT

In today's world, it is highly difficult to manage smart things and fulfill the communication nee... more In today's world, it is highly difficult to manage smart things and fulfill the communication needs without the Internet as it provides ultimate means for a human to human (H2H) communication. The 'things' could be entities or devices that contribute for the communication. But to enhance and improve such smart communication among the things that involve non-human intervention, there is a need to add a few more smart capabilities to the Internet. As the world of Internet is on its way of transformation into a new smart world called 'Internet of Things' (IoT) where the things should possess the ability of sensing, communication and control to let the things exchange information without complete intervention of humans to provide advanced and qualitative services, which is possible with the help of protocols. This paper discusses how the transition could be started and being progressed in wired and wireless systems, and how it changes the traditional means of communication among different devices and humans into a smart way. The transition here refers to how isolated things are being intermingled with each other to generate a smart protocol communication. The aim of such transition is to improve the efficiency, flexibility, adaptability and interoperability. This paper also explores various factors that contribute to IoT.

Research paper thumbnail of Grouping Approach using Strength of Device Synergy (GASDS) in WSN

Cluster formation is the major task in any field. And also identifying the connectivity failures ... more Cluster formation is the major task in any field. And also identifying the connectivity failures in the network and restoring the same has been a significant issue in the field of wireless sensor networks. For this to happen, a better solution is to be considered. Till now there has been many researches going on for enhancing the performance of the wireless networks especially WSNs. Different heuristic approaches have been proposed for resolving such issues. Such techniques work effectively under a condition that the sensor nodes should have a specific mobility pattern. But this is not the case at all the places, for example, remote monitoring at unreachable locations, military battle fields, nuclear pollution environment monitoring and so on. To handle such situations, a new approach called Grouping Approach using Strength of Device Synergy (GASDS) based on Firefly Algorithm is proposed. Throughput and packet loss ratio are the two major parameters considered in the simulation.

Research paper thumbnail of Omnipresence of Cluster Analysis for Optimal Solutions

Clustering can be observed as an omnipresent technique that spread its scope in different areas s... more Clustering can be observed as an omnipresent technique that spread its scope in different areas such as pattern recognition, machine learning, energy optimization, cognitive radio networks, etc. With the enormous increase in the data being produced by huge number of applications daily which needs to be analyzed for efficient results, it should be organized and computed using different data mining techniques. Clustering technique plays a significant role in contributing its usage to obtain a global solution. Handling of data in dynamic environment is to be done properly so as to ensure effective communication. Data correlation is a common issue in a sensor network which needs to be resolved. This paper explores significant clustering techniques that were applied in various domains.

Research paper thumbnail of International Journal of Engineering & Technology

Background/Objectives: With the proliferation of online platforms, information is generated every... more Background/Objectives: With the proliferation of online platforms, information is generated every second, and there is an urgent need to firstly store the huge amount of data and secondly to secure that data. The level of sophistication is increasing day by day, so alongside the demand for excessive computational power and resources also hikes up. With the advancements in technology and with the concepts like globalization coming into picture, people find the need of sharing information important. Methods/Statistical Analysis: Information security aspects are analyzed based on confidentiality, integrity, availability, authentication, authorization and non-Repudiation. Findings: Different web application needs different security parameter and out of these authentication and access control are among the top security issues which can be resolved by using two factor and three factor authentication and are more effective with respect to mobility. Application/Improvement: Most handheld devices have built-in sensors which can be used for self authentication and authorization. Device ID, fingerprint, iris, SMS based OTPs add extra security to information security.

Research paper thumbnail of Your Privacy is not so Private: Unveiling Android Apps Privacy Framework from the Dark

As the adoption of smartphones continues to surge all over the world, mobile apps have become a t... more As the adoption of smartphones continues to surge all over the world, mobile apps have become a tool of greater significance, offering free access to everything ranging from social networking sites and emails to online banking transactions and ticket reservations. In any case, even free applications can include potential tradeoffs with regard to allowing access to private information of their users. This pattern has brought about expanding worries over the malicious nature of these apps and the security threats that these apps force upon its users. In this paper, we analyze the mobile apps privacy framework, its loopholes and survey the proposed tools and frameworks which primarily focuses on the effect of sensitive data leakage and privacy risks involved with it.

Research paper thumbnail of Context Aware Dynamic Permission Model: A Retrospect of Privacy and Security in Android System

Android security has been a topic of concern lately in both academic and industrial research beca... more Android security has been a topic of concern lately in both academic and industrial research because of various occurrence of privacy leaks and security breach on these devices. The security model of Android operating system is based on a permission based mechanism which limits the access of any third-party application to critical resources of the mobile device. This mechanism has been broadly condemned for its coarse-grained control over system resources and inappropriate authorization of permissions by application developers, advertisers and end users. This paper inspects the emerging issues in permission based security mechanisms and proposes the concept of context aware dynamic permissions model (CAPM) for Android systems. The proposed model deals with the dynamic enforcement of permissions to a particular application according to the defined context without user's intervention. Our model assign profiles to different applications based on their functional groups and these profiles contain a set of permissions with some associated context. The context can be based upon system or sensor sources. This way, if the data is private or confidential, the permissions set ought to be stricter than usual. Our concept is unique as it associates context with permissions as opposed to the existing model of assigning permissions according to applications functionality. This concept can be proved helpful in protecting user's private data from being leaked simply by modifying the existing resource access mechanism.

Research paper thumbnail of Understanding the Behaviour of Privacy in Mobile Apps and Detecting Privacy Leaks

With the advent of smartphones, mobile application industry is becoming one of the fastest growin... more With the advent of smartphones, mobile application industry is becoming one of the fastest growing industry today. Every now and then, we hear about a new app being launched. However, besides providing you with information like news, fun and amusement servicesthey can also seize your privacy. One of the most common example of this trend is asking permission from users when they are seeking to download those apps. Many types of researches have suggested that users don't care much while giving permissions to these apps. The main purpose of our research is to know the main reason for asking these permission requests by analyzing your app's traffic and how they collect sensitive information such as your phone's IMEI number or location for advertisement, tracking, or analytical purposes. To address this issue, we have developed Network Privacy Monitor (NPM), a tool for active network monitoring and context aware network filtering capabilities. With this tool, a user can block any app that utilizes personal or confidential data for a specified context. Our work is a small contribution towards strengthening the existing Android security framework.

Research paper thumbnail of Optimization of Snort for Extrusion and Intrusion Detection and Prevention

Intrusion is an attempt or threat resulting to unauthorized attempt to access information, manipu... more Intrusion is an attempt or threat resulting to unauthorized attempt to access information, manipulate information or render a system unreliable or unusable. Firewall can prevent unauthorized access but it cannot monitor the network attacks. In order to monitor network activities we need an Intrusion detection system which is the first line of defense against network activity. Over the last decades, malicious software or malware in the form of viruses, worms, Trojan horses, Botnets have risen to become a primary source of most of the threats used for scanning, distributed denial of service activities and direct attacks taking place across the internet. Most of the work has been done to monitor the inbound traffic i.e. Intrusion traffic but goal here is to monitor outbound traffic i.e. extrusion traffic as well. For the purpose of detection of Intrusion and Extrusion traffic Snort is optimized which is primarily made for Intrusion detection and prevention. It is famous Intrusion detection system in the field of open source software. Further the optimization of the Snort database is done to make it more network specific on the two designed parameters. The experimental results shows that working according to the designed system architecture a more secure network can be obtained through which specific network attacks can be easily targeted.

Research paper thumbnail of Grouping approach using Strength of Device Synergy (GASDS) in WSN

Cluster formation is the major task in any field. And also identifying the connectivity failures ... more Cluster formation is the major task in any field. And also identifying the connectivity failures in the network and restoring the same has been a significant issue in the field of wireless sensor networks. For this to happen, a better solution is to be considered. Till now there has been many researches going on for enhancing the performance of the wireless networks especially WSNs. Different heuristic approaches have been proposed for resolving such issues. Such techniques work effectively under a condition that the sensor nodes should have a specific mobility pattern. But this is not the case at all the places, for example, remote monitoring at unreachable locations, military battle fields, nuclear pollution environment monitoring and so on. To handle such situations, a new approach called Grouping Approach using Strength of Device Synergy (GASDS) based on Firefly Algorithm is proposed. Throughput and packet loss ratio are the two major parameters considered in the simulation.

Research paper thumbnail of Analysis of concepts of actor network in Forest Fires using Wireless Sensor and Actor Networks

The Wireless sensor network is the type of network which is used to sense the environment conditi... more The Wireless sensor network is the type of network which is used to sense the environment conditions like temperature, pressure, fire etc. The sensor nodes are deployed in the area and sensor nodes collect the environmental data, sensor nodes then pass the collected data to the sink. When sink receive the data after certain time it broadcast the information on the internet. Sensor networks are deployed in the forests for the fire detection. The main issue in the forest fire detection network is that the fire must be detected and extinguished as soon as possible. Many of the approaches were proposed for the fire detection .In this paper we review the quadrant based clustering and deterministic deployment of nodes for detecting and extinguishing forest fires using Wireless Sensor and Actor Networks (WSANs).The sensor network is used for the fire detection and actor network is for extinguishing the forest fire.

Research paper thumbnail of An improved network independent two-step authentication scheme using TLS

In this paper, an enhanced two factor authentication scheme has been proposed that will use a sec... more In this paper, an enhanced two factor authentication scheme has been proposed that will use a secured TLS connection for exchanging the seed between server and client application. The proposed system uses a mobile application that will generate time based one-time passwords (TOTP) for two factor authentication. The system will be capable of working offline expect from the registration phase. The system uses an encrypted keystore which will generate OTPs by using a securely exchanged secret seed. App is password protected to avoiding unauthorized access. Our system eliminates dependency on network which was major disadvantages of SMS based OTP authentication schemes. SMS based OTP can be used as a backup scheme if app fails to load or crashes.

Research paper thumbnail of IMAGE ENCRYPTION ALGORITHM BASED ON MODIFIED AES

In today's world images that are being transmitted over internet are not safe. Therefore, it is r... more In today's world images that are being transmitted over internet are not safe. Therefore, it is required to transmit an image using some secure methods. Many algorithms can be applied but AES is more secure than others. Here AES algorithm is used to encrypt images with certain modifications. Modifications are done to the shift row stage and mix column stage. These changes have been done to reduce the computation time of AES. The key is generated using IDEA (International Data Encryption Algorithm) and mix column step is added to the key part to make the key stronger because the attackers focus on the key to get the plain text. Hence two phases are involved in this process. One is the encryption phase while the other is the decryption phase. First the image will be passed to the modified AES for the encryption process and then the ciphered image will be send to the receiver for decryption process. The modified AES can use both HD and normal images.

Research paper thumbnail of MOBILE BASED SECURE AUTHENTICATION USING TLS AND OFFLINE OTP

Data sharing and storing over the cloud network using internet becoming a movement. Need for secu... more Data sharing and storing over the cloud network using internet becoming a movement. Need for securing the data over the internet is increasing. Use of smart phone has increased. People like to exchange data over the internet using smart phones. Smartphone based web applications are developed to provide ease to the users. Hacking the web application servers is also complicated as compared to getting access to the user system in parliamentary procedure to steal data. Hence, attacks normally happen at the user terminal. The major goal of net security is to prevent unauthorized access to data and resources. Various cryptographic techniques are applied by clients and servers to keep the confidentiality of data [1]. Authentication is the heart of every security model. It is the process to confirm the user's identity (or a machine), attempting to gain access to a system or resource. Password based authentication is the most often utilized and trusted authentication mechanism. User needs to insert the required login credentials (username and password), to acquire access to a resource or computer, the supplied credentials are then matched against a database which contains the list of all authorized users and their passwords. Many advances have been suggested for proper strategies of securing and using passwords [1][2]. The user is suggested to maintain strong passwords, however number of problems persists in password based authentication mechanism.

Research paper thumbnail of To Enhance the Security in Wireless Nodes using

Objectives: Wireless technologies enable devices to communicate without any guided medium. It use... more Objectives: Wireless technologies enable devices to communicate without any guided medium. It uses radio frequency for transmitting data, where the wired technologies use cables. It is mostly used to refer a telecommunications network that is interconnected between nodes and implemented without any kind of wires like as a computer network. Due to unguided media it's very tedious to detect any intrusion during communication. The aim of this work is to develop an approach which will detect and prevent black hole attacks so the any unauthorized or unwanted nodes if participates in the communication process will be detected in the real time. Methods/Statistical Analysis: In our work we are going to propose IDS which will helps to provide security to detect attacks and to prevent the attacks. Centralize and synchronized IDS node will work on the basis of anomaly detection technique. It will create pattern for malicious activates and do event detection on the basis of anomaly detection. Findings: The proposed method will enhance the detection of anomaly detection techniques with synchronized IDS within the cluster as well as between the clusters with the help of DRI table. Application/Improvement: This technique will helps to enhance security in Wireless network and helps to make more reliable network for user.

Research paper thumbnail of Community Overlapping Detection in Complex

Background/Objectives: The community overlapping is the process by which number of nodes within t... more Background/Objectives: The community overlapping is the process by which number of nodes within the mesh network share common resources. The shared resources could lead to the conflict such as inconsistent analysis problem. Study of these problems is the objective of the paper. Methods/Statistical Analysis: In order to analyze the problem Modified K-Clique with sink node elimination technique is suggested. K-Clique method used detects the nodes in the mesh network having more than one connection. The modification to K-Clique enhance speed since sink node is eliminated prior to calculation of cliques. The adjacency matrix is used in order to detect the sink nodes. The Simulation is conducted in MATLAB. The MATLAB provides tools of network programming in terms of plots and graphs. The existing K-Clique is compared against the modified K-Clique and result obtained is better for Modified k-Clique. Findings: The speed is enhanced almost by 5% and number of cliques of distinct sizes discovered is also increased by 5%. The speed can further be enhanced by following hop count mechanism to reach destination quickly in addition to sink node elimination. Application/Improvement: Enhancement of performance using community overlapping detection in wireless mesh network through which it is possible to transfer the data towards multiple destinations with the help of community overlapping detection. Multiple destination towards which is to be transferred can be detected. Time will be less consumed in this case. The distance vector routing can be merged in the supposed system to further enhance the scope of the system.

Research paper thumbnail of PERSONAL DATA ACCESS CONTROL BASED ON TRUST AND REPUTATION IN CLOUD COMPUTING

The technical limitation of a personal computers system e.g. hard disk failure forces enabled the... more The technical limitation of a personal computers system e.g. hard disk failure forces enabled the user to stores their application data on cloud, along with images, videos or highly sensitive data. In the last decade cloud computing has been widely developed in context to provide security along with data access to user. The major security issue in cloud computing is that the semi-trusted cloud service providers also possess the data access control. Due to semi-trust, the user stores their personal data in encrypted form, but in critical condition such as personal healthcare records of a patient needs to be accessed by doctors immediately but it need the data owner to be online in order to give access to the data. In this paper data protection scheme is proposed which enable the confidentiality, integrity of data and authentication. The proposed scheme verifies the integrity of data and computes the trust level of the data requester. Later the trust value is computed using multi-factor authentication for data owner and the users also using the mobile social networking and social networking.

Research paper thumbnail of Comparative Analysis of Kohonen-SOM and K-Means data mining algorithms based on Academic Activities

With the increasing demand of IT and subsequent growth in this sector, the high-dimensional data ... more With the increasing demand of IT and subsequent growth in this sector, the high-dimensional data came into existence. Data Mining plays an important role in analyzing and extracting the useful information. The key information which is extracted from a huge pool of data is useful for decision makers. Clustering, one of the techniques of data mining is the mostly used methods of analyzing the data. In this paper, the approach of Kohonen SOM and K-Means and HAC are discussed. After that these three methods are used for analyzing the academic data set of the faculty members of particular university. Finally a comparative analysis of these algorithms are done against some parameters like number of clusters, error rate and accessing rate, etc. This work will present new and improved results from large-scale datasets.

Research paper thumbnail of Analysis of Ransomware Attack and Their Countermeasures: A Review

Ransomware is a type of malicious software. Computers infected with ransomware have restricted ac... more Ransomware is a type of malicious software. Computers infected with ransomware have restricted access to the system. It is a malicious program, and money must be provided to the creator of the malicious code to release it. With the substantial increase in the number of ransomware attacks, on May-12-2017, network security issues began to heat up. This article describes the types of countermeasures against ransomware and cyber terrorism. In recent years, ransomware has been under constant attack and has high infectious power: S pora, CryptoLocker, Locky, CryptoWall, Petya, Cerber, S anam, Aris Locker, Jigsaw, WannaCry, and Reveton. Ransomware protection is not any longer 100% free. However, you can secure ransomware through programmed refreshes, antibody establishment, and span backups. Need framework and organization. Figure out how to prevent ransomware from your organization and individual clients. Most ransomware is transmitted via phishing emails. The fastest way is to measure the steps taken by various agencies to stop this malware and decrypt it. The criminals behind the ransomware caused not only largescale damage to sensitive infrastructure but also billions of dollars in benefits from patients around the world. The world is still collecting money from innocent people. Nine types of ransomware, small software, and several examples of malware are studied. The outcomes show that reflected programming and innocuous applications can be recognized. This is a way to stop companies and individuals from ransomware

Research paper thumbnail of Speed of Things (SoT): Evolution of Isolation-to-Intermingle (I2I) Technology Transition Towards IoT

In today's world, it is highly difficult to manage smart things and fulfill the communication nee... more In today's world, it is highly difficult to manage smart things and fulfill the communication needs without the Internet as it provides ultimate means for a human to human (H2H) communication. The 'things' could be entities or devices that contribute for the communication. But to enhance and improve such smart communication among the things that involve non-human intervention, there is a need to add a few more smart capabilities to the Internet. As the world of Internet is on its way of transformation into a new smart world called 'Internet of Things' (IoT) where the things should possess the ability of sensing, communication and control to let the things exchange information without complete intervention of humans to provide advanced and qualitative services, which is possible with the help of protocols. This paper discusses how the transition could be started and being progressed in wired and wireless systems, and how it changes the traditional means of communication among different devices and humans into a smart way. The transition here refers to how isolated things are being intermingled with each other to generate a smart protocol communication. The aim of such transition is to improve the efficiency, flexibility, adaptability and interoperability. This paper also explores various factors that contribute to IoT.

Research paper thumbnail of Grouping Approach using Strength of Device Synergy (GASDS) in WSN

Cluster formation is the major task in any field. And also identifying the connectivity failures ... more Cluster formation is the major task in any field. And also identifying the connectivity failures in the network and restoring the same has been a significant issue in the field of wireless sensor networks. For this to happen, a better solution is to be considered. Till now there has been many researches going on for enhancing the performance of the wireless networks especially WSNs. Different heuristic approaches have been proposed for resolving such issues. Such techniques work effectively under a condition that the sensor nodes should have a specific mobility pattern. But this is not the case at all the places, for example, remote monitoring at unreachable locations, military battle fields, nuclear pollution environment monitoring and so on. To handle such situations, a new approach called Grouping Approach using Strength of Device Synergy (GASDS) based on Firefly Algorithm is proposed. Throughput and packet loss ratio are the two major parameters considered in the simulation.

Research paper thumbnail of Omnipresence of Cluster Analysis for Optimal Solutions

Clustering can be observed as an omnipresent technique that spread its scope in different areas s... more Clustering can be observed as an omnipresent technique that spread its scope in different areas such as pattern recognition, machine learning, energy optimization, cognitive radio networks, etc. With the enormous increase in the data being produced by huge number of applications daily which needs to be analyzed for efficient results, it should be organized and computed using different data mining techniques. Clustering technique plays a significant role in contributing its usage to obtain a global solution. Handling of data in dynamic environment is to be done properly so as to ensure effective communication. Data correlation is a common issue in a sensor network which needs to be resolved. This paper explores significant clustering techniques that were applied in various domains.

Research paper thumbnail of International Journal of Engineering & Technology

Background/Objectives: With the proliferation of online platforms, information is generated every... more Background/Objectives: With the proliferation of online platforms, information is generated every second, and there is an urgent need to firstly store the huge amount of data and secondly to secure that data. The level of sophistication is increasing day by day, so alongside the demand for excessive computational power and resources also hikes up. With the advancements in technology and with the concepts like globalization coming into picture, people find the need of sharing information important. Methods/Statistical Analysis: Information security aspects are analyzed based on confidentiality, integrity, availability, authentication, authorization and non-Repudiation. Findings: Different web application needs different security parameter and out of these authentication and access control are among the top security issues which can be resolved by using two factor and three factor authentication and are more effective with respect to mobility. Application/Improvement: Most handheld devices have built-in sensors which can be used for self authentication and authorization. Device ID, fingerprint, iris, SMS based OTPs add extra security to information security.

Research paper thumbnail of Your Privacy is not so Private: Unveiling Android Apps Privacy Framework from the Dark

As the adoption of smartphones continues to surge all over the world, mobile apps have become a t... more As the adoption of smartphones continues to surge all over the world, mobile apps have become a tool of greater significance, offering free access to everything ranging from social networking sites and emails to online banking transactions and ticket reservations. In any case, even free applications can include potential tradeoffs with regard to allowing access to private information of their users. This pattern has brought about expanding worries over the malicious nature of these apps and the security threats that these apps force upon its users. In this paper, we analyze the mobile apps privacy framework, its loopholes and survey the proposed tools and frameworks which primarily focuses on the effect of sensitive data leakage and privacy risks involved with it.

Research paper thumbnail of Context Aware Dynamic Permission Model: A Retrospect of Privacy and Security in Android System

Android security has been a topic of concern lately in both academic and industrial research beca... more Android security has been a topic of concern lately in both academic and industrial research because of various occurrence of privacy leaks and security breach on these devices. The security model of Android operating system is based on a permission based mechanism which limits the access of any third-party application to critical resources of the mobile device. This mechanism has been broadly condemned for its coarse-grained control over system resources and inappropriate authorization of permissions by application developers, advertisers and end users. This paper inspects the emerging issues in permission based security mechanisms and proposes the concept of context aware dynamic permissions model (CAPM) for Android systems. The proposed model deals with the dynamic enforcement of permissions to a particular application according to the defined context without user's intervention. Our model assign profiles to different applications based on their functional groups and these profiles contain a set of permissions with some associated context. The context can be based upon system or sensor sources. This way, if the data is private or confidential, the permissions set ought to be stricter than usual. Our concept is unique as it associates context with permissions as opposed to the existing model of assigning permissions according to applications functionality. This concept can be proved helpful in protecting user's private data from being leaked simply by modifying the existing resource access mechanism.

Research paper thumbnail of Understanding the Behaviour of Privacy in Mobile Apps and Detecting Privacy Leaks

With the advent of smartphones, mobile application industry is becoming one of the fastest growin... more With the advent of smartphones, mobile application industry is becoming one of the fastest growing industry today. Every now and then, we hear about a new app being launched. However, besides providing you with information like news, fun and amusement servicesthey can also seize your privacy. One of the most common example of this trend is asking permission from users when they are seeking to download those apps. Many types of researches have suggested that users don't care much while giving permissions to these apps. The main purpose of our research is to know the main reason for asking these permission requests by analyzing your app's traffic and how they collect sensitive information such as your phone's IMEI number or location for advertisement, tracking, or analytical purposes. To address this issue, we have developed Network Privacy Monitor (NPM), a tool for active network monitoring and context aware network filtering capabilities. With this tool, a user can block any app that utilizes personal or confidential data for a specified context. Our work is a small contribution towards strengthening the existing Android security framework.

Research paper thumbnail of Optimization of Snort for Extrusion and Intrusion Detection and Prevention

Intrusion is an attempt or threat resulting to unauthorized attempt to access information, manipu... more Intrusion is an attempt or threat resulting to unauthorized attempt to access information, manipulate information or render a system unreliable or unusable. Firewall can prevent unauthorized access but it cannot monitor the network attacks. In order to monitor network activities we need an Intrusion detection system which is the first line of defense against network activity. Over the last decades, malicious software or malware in the form of viruses, worms, Trojan horses, Botnets have risen to become a primary source of most of the threats used for scanning, distributed denial of service activities and direct attacks taking place across the internet. Most of the work has been done to monitor the inbound traffic i.e. Intrusion traffic but goal here is to monitor outbound traffic i.e. extrusion traffic as well. For the purpose of detection of Intrusion and Extrusion traffic Snort is optimized which is primarily made for Intrusion detection and prevention. It is famous Intrusion detection system in the field of open source software. Further the optimization of the Snort database is done to make it more network specific on the two designed parameters. The experimental results shows that working according to the designed system architecture a more secure network can be obtained through which specific network attacks can be easily targeted.

Research paper thumbnail of Grouping approach using Strength of Device Synergy (GASDS) in WSN

Cluster formation is the major task in any field. And also identifying the connectivity failures ... more Cluster formation is the major task in any field. And also identifying the connectivity failures in the network and restoring the same has been a significant issue in the field of wireless sensor networks. For this to happen, a better solution is to be considered. Till now there has been many researches going on for enhancing the performance of the wireless networks especially WSNs. Different heuristic approaches have been proposed for resolving such issues. Such techniques work effectively under a condition that the sensor nodes should have a specific mobility pattern. But this is not the case at all the places, for example, remote monitoring at unreachable locations, military battle fields, nuclear pollution environment monitoring and so on. To handle such situations, a new approach called Grouping Approach using Strength of Device Synergy (GASDS) based on Firefly Algorithm is proposed. Throughput and packet loss ratio are the two major parameters considered in the simulation.

Research paper thumbnail of Analysis of concepts of actor network in Forest Fires using Wireless Sensor and Actor Networks

The Wireless sensor network is the type of network which is used to sense the environment conditi... more The Wireless sensor network is the type of network which is used to sense the environment conditions like temperature, pressure, fire etc. The sensor nodes are deployed in the area and sensor nodes collect the environmental data, sensor nodes then pass the collected data to the sink. When sink receive the data after certain time it broadcast the information on the internet. Sensor networks are deployed in the forests for the fire detection. The main issue in the forest fire detection network is that the fire must be detected and extinguished as soon as possible. Many of the approaches were proposed for the fire detection .In this paper we review the quadrant based clustering and deterministic deployment of nodes for detecting and extinguishing forest fires using Wireless Sensor and Actor Networks (WSANs).The sensor network is used for the fire detection and actor network is for extinguishing the forest fire.

Research paper thumbnail of An improved network independent two-step authentication scheme using TLS

In this paper, an enhanced two factor authentication scheme has been proposed that will use a sec... more In this paper, an enhanced two factor authentication scheme has been proposed that will use a secured TLS connection for exchanging the seed between server and client application. The proposed system uses a mobile application that will generate time based one-time passwords (TOTP) for two factor authentication. The system will be capable of working offline expect from the registration phase. The system uses an encrypted keystore which will generate OTPs by using a securely exchanged secret seed. App is password protected to avoiding unauthorized access. Our system eliminates dependency on network which was major disadvantages of SMS based OTP authentication schemes. SMS based OTP can be used as a backup scheme if app fails to load or crashes.

Research paper thumbnail of IMAGE ENCRYPTION ALGORITHM BASED ON MODIFIED AES

In today's world images that are being transmitted over internet are not safe. Therefore, it is r... more In today's world images that are being transmitted over internet are not safe. Therefore, it is required to transmit an image using some secure methods. Many algorithms can be applied but AES is more secure than others. Here AES algorithm is used to encrypt images with certain modifications. Modifications are done to the shift row stage and mix column stage. These changes have been done to reduce the computation time of AES. The key is generated using IDEA (International Data Encryption Algorithm) and mix column step is added to the key part to make the key stronger because the attackers focus on the key to get the plain text. Hence two phases are involved in this process. One is the encryption phase while the other is the decryption phase. First the image will be passed to the modified AES for the encryption process and then the ciphered image will be send to the receiver for decryption process. The modified AES can use both HD and normal images.

Research paper thumbnail of MOBILE BASED SECURE AUTHENTICATION USING TLS AND OFFLINE OTP

Data sharing and storing over the cloud network using internet becoming a movement. Need for secu... more Data sharing and storing over the cloud network using internet becoming a movement. Need for securing the data over the internet is increasing. Use of smart phone has increased. People like to exchange data over the internet using smart phones. Smartphone based web applications are developed to provide ease to the users. Hacking the web application servers is also complicated as compared to getting access to the user system in parliamentary procedure to steal data. Hence, attacks normally happen at the user terminal. The major goal of net security is to prevent unauthorized access to data and resources. Various cryptographic techniques are applied by clients and servers to keep the confidentiality of data [1]. Authentication is the heart of every security model. It is the process to confirm the user's identity (or a machine), attempting to gain access to a system or resource. Password based authentication is the most often utilized and trusted authentication mechanism. User needs to insert the required login credentials (username and password), to acquire access to a resource or computer, the supplied credentials are then matched against a database which contains the list of all authorized users and their passwords. Many advances have been suggested for proper strategies of securing and using passwords [1][2]. The user is suggested to maintain strong passwords, however number of problems persists in password based authentication mechanism.

Research paper thumbnail of To Enhance the Security in Wireless Nodes using

Objectives: Wireless technologies enable devices to communicate without any guided medium. It use... more Objectives: Wireless technologies enable devices to communicate without any guided medium. It uses radio frequency for transmitting data, where the wired technologies use cables. It is mostly used to refer a telecommunications network that is interconnected between nodes and implemented without any kind of wires like as a computer network. Due to unguided media it's very tedious to detect any intrusion during communication. The aim of this work is to develop an approach which will detect and prevent black hole attacks so the any unauthorized or unwanted nodes if participates in the communication process will be detected in the real time. Methods/Statistical Analysis: In our work we are going to propose IDS which will helps to provide security to detect attacks and to prevent the attacks. Centralize and synchronized IDS node will work on the basis of anomaly detection technique. It will create pattern for malicious activates and do event detection on the basis of anomaly detection. Findings: The proposed method will enhance the detection of anomaly detection techniques with synchronized IDS within the cluster as well as between the clusters with the help of DRI table. Application/Improvement: This technique will helps to enhance security in Wireless network and helps to make more reliable network for user.

Research paper thumbnail of Community Overlapping Detection in Complex

Background/Objectives: The community overlapping is the process by which number of nodes within t... more Background/Objectives: The community overlapping is the process by which number of nodes within the mesh network share common resources. The shared resources could lead to the conflict such as inconsistent analysis problem. Study of these problems is the objective of the paper. Methods/Statistical Analysis: In order to analyze the problem Modified K-Clique with sink node elimination technique is suggested. K-Clique method used detects the nodes in the mesh network having more than one connection. The modification to K-Clique enhance speed since sink node is eliminated prior to calculation of cliques. The adjacency matrix is used in order to detect the sink nodes. The Simulation is conducted in MATLAB. The MATLAB provides tools of network programming in terms of plots and graphs. The existing K-Clique is compared against the modified K-Clique and result obtained is better for Modified k-Clique. Findings: The speed is enhanced almost by 5% and number of cliques of distinct sizes discovered is also increased by 5%. The speed can further be enhanced by following hop count mechanism to reach destination quickly in addition to sink node elimination. Application/Improvement: Enhancement of performance using community overlapping detection in wireless mesh network through which it is possible to transfer the data towards multiple destinations with the help of community overlapping detection. Multiple destination towards which is to be transferred can be detected. Time will be less consumed in this case. The distance vector routing can be merged in the supposed system to further enhance the scope of the system.

Research paper thumbnail of PERSONAL DATA ACCESS CONTROL BASED ON TRUST AND REPUTATION IN CLOUD COMPUTING

The technical limitation of a personal computers system e.g. hard disk failure forces enabled the... more The technical limitation of a personal computers system e.g. hard disk failure forces enabled the user to stores their application data on cloud, along with images, videos or highly sensitive data. In the last decade cloud computing has been widely developed in context to provide security along with data access to user. The major security issue in cloud computing is that the semi-trusted cloud service providers also possess the data access control. Due to semi-trust, the user stores their personal data in encrypted form, but in critical condition such as personal healthcare records of a patient needs to be accessed by doctors immediately but it need the data owner to be online in order to give access to the data. In this paper data protection scheme is proposed which enable the confidentiality, integrity of data and authentication. The proposed scheme verifies the integrity of data and computes the trust level of the data requester. Later the trust value is computed using multi-factor authentication for data owner and the users also using the mobile social networking and social networking.

Research paper thumbnail of Comparative Analysis of Kohonen-SOM and K-Means data mining algorithms based on Academic Activities

With the increasing demand of IT and subsequent growth in this sector, the high-dimensional data ... more With the increasing demand of IT and subsequent growth in this sector, the high-dimensional data came into existence. Data Mining plays an important role in analyzing and extracting the useful information. The key information which is extracted from a huge pool of data is useful for decision makers. Clustering, one of the techniques of data mining is the mostly used methods of analyzing the data. In this paper, the approach of Kohonen SOM and K-Means and HAC are discussed. After that these three methods are used for analyzing the academic data set of the faculty members of particular university. Finally a comparative analysis of these algorithms are done against some parameters like number of clusters, error rate and accessing rate, etc. This work will present new and improved results from large-scale datasets.