{"title":"A CANVASS on cyber security attacks and countermeasures","authors":"Shubhi Gupta, Swati Vashisht, Divya Singh","doi":"10.1109/ICICCS.2016.7542335","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542335","url":null,"abstract":"The use of Internet is immensely growing and applications are stretching in our daily lives. Be it for household purpose or use to government organizations, no matter what the person is or what job he does, Internet is important. Security is also needed for applications such as shopping, banking transactions, education, public services etc is important too. With wider usage, internet is also known to have vulnerability issue. This vulnerability issue comprises of various Cyber attacks such as fraudulent banking transactions, known as phishing, HTML injections, SQL Injections etc. prevailing these days. Cyber security is a matter of concern by the quick and continuous growth of nature of security threat. Controlling the access, encrypting the message, detecting the intrusion etc. can counter measure these issues. To protect information, it could be stolen and then its vulnerable information can be extracted, just making sure to modify it before someone actually knows about it.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123619482","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Analysis of malicious activity in delay tolerant networks","authors":"P. Nagrath, Ashish Kumar","doi":"10.1109/ICICCS.2016.7542331","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542331","url":null,"abstract":"Delay Tolerant Network (DTN) is basically a disconnected mobile ad hoc Network. It is intermittent and sparsely connected because of limited transmission range and mobility. It is characterized by intermittent connectivity, long or variable delay, asymmetric data rate and high error rates. Many malicious nodes misbehave to hamper the network. Shielding algorithms for adhoc networks cannot be directly applied to DTNs due to dis-connectivity between DTN nodes. DTN nodes are energy constraint nodes and these malicious nodes degrade the energy and hampers message delivery in the network. So there exists the need to devise efficient defending mechanisms for preventing the Delay Tolerant Networks from such nodes. The paper has analyzed the impact of black holes on the network and proposed a defending model to isolate it from the network.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"55 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126453824","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Proposed encryption algorithm for data security using matrix properties","authors":"Deeksha Priya Jha, Rashi Kohli, Archana Gupta","doi":"10.1109/ICICCS.2016.7542316","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542316","url":null,"abstract":"Cryptography is used widely for the purpose of secure communication and password management. It comprises the techniques of encryption and decryption mechanism. Using the encryption mechanism a plaintext is converted into a cipher text and in decryption with the help of a secure key the encrypted message is decoded into a plain text. Mathematical principles can be employed for encryption determinants to encrypt and decrypt our message and to transmit them securely. In this paper we are using principles of Caesar cipher and Hill Cipher and developing an encryption and decryption algorithm to make transmission of messages secure from eavesdropping.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"103 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131904293","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Assessing optimal patch release time for vulnerable software systems","authors":"Yogita Kansal, P. K. Kapur, Deepak Kumar","doi":"10.1109/ICICCS.2016.7542358","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542358","url":null,"abstract":"Every failure in a software system demands for a repair or fixation process so as to deliver an intact system. In terms of IT industry, a patch intercepts users from getting exploited by the unknown complex defects which are termed as vulnerabilities. Many of the cyber attacks are due to the vulnerabilities and unacceptable management of the patches. One of the management issues is when one should apply a patch, since early patching results in instability aroused by bugs in the patches and behind patching may install malware in the system. The second key challenge is to maintain the quality of the software while releasing the patches. Despite of prevailing challenges, management has to deal with market potential. Thus in this paper, we have proposed a generalized framework to find a solution for mentioned problems. The framework identifies the optimal patch release time and optimal cost, and retains the reliability of the software. Further, the model elaborates the role of hacker, user and tester in different phases of a vulnerable software system.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"35 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133727098","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Improving software quality using machine learning","authors":"K. Chandra, G. Kapoor, Rashi Kohli, Archana Gupta","doi":"10.1109/ICICCS.2016.7542340","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542340","url":null,"abstract":"Software is an entity that keeps on progressing and endures continuous changes, in order to boost its functionality and maintain its effectiveness. During the development of software, even with advanced planning, well documentation and proper process control, are problems that are countered. These defects influence the quality of software in one way or the other which may result into failure. Therefore, in today's neck to neck competition, it is our requirement to control and minimize these defects in software engineering. Software prediction models are typically used to map the patterns of classes of software that are prone to change. This paper highlights the significant analysis in the area's subject to learn and stimulate the association between the metric specifying the object orientation & the concept of change proneness. This would often lead us to rigorous testing so as to find all kinds of possibilities in the data set. We have two views to be addressed: (1) Parameters quantification that affects the quality, functionality and productivity of the software. (2) Machine learning technologies are used for predicting software Here, the focus of the research paper is to equate and compare all of learning methods corresponding to performance parameter with its statistical method & methodology which would often results enhanced. Data points are the basis for prediction of models.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"12 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133910055","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Mitigation technique and measurement of subsynchronous resonance","authors":"Ankita Singh, Neeraj Verma, Atul Kumar","doi":"10.1109/ICICCS.2016.7542355","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542355","url":null,"abstract":"Due to development in the field of power system, more and more series capacitance compensations have been used in transmission system extensively and because of series capacitance compensation it leads to SSR problems. SSR occurs when a natural frequency of a series compensated transmission system coincides with the complement of one of the torsional modes of the turbine-generator shaft system. Under such circumstances, the turbine-generator shaft system oscillates at a frequency corresponding to the torsional mode frequency and unless corrective action is taken, the torsional oscillations can grow and may result in shaft damage in a few seconds. For mitigating the SSR in transmission system, a mitigation measure based on SVC is introduced[1].","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133481710","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"A biometric approach to secure big data","authors":"Vikash Yadav, Monika Verma, Vandana Dixit Kaushik","doi":"10.1109/ICICCS.2016.7542296","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542296","url":null,"abstract":"Biometrics is the science of establishing the identity of an individual based on the physical, chemical or behavioral attributes of the person. The relevance of biometrics in modern society has been reinforced by the need for large-scale identity management systems whose functionality relies on the accurate determination of an individual's identity in the context of several different applications. Recently a very popular technology and concept is followed by many Social networking Web sites this is “Big Data”. A data which is not only large in volume but also in unstructured way is termed as Big Data. Security in Big Data is the main issue now a day. In this paper we throw some light on how different bio-metric technologies play an important role to maintain and provide security in Big Data.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"13 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125331740","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Reviewing the impact of wormhole attack in MANET","authors":"Dhruvi Sharma, Rakesh Kumar","doi":"10.1109/ICICCS.2016.7542314","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542314","url":null,"abstract":"Security of different networks has always been a primary concern as its necessary to protect the resources being shared and communication being done among the legitimate users. If we let down our safeguards, an attacker can transform the routing protocol and interrupt the network operations through mechanisms such as packet drops, flooding, data fabrication etc. MANET is a type of network whose dynamic topology, decentralizing governance and other such features are always in favour of many security attacks. This paper presents detail study of wormhole attack, algorithms to detect them that has been proposed so far and also directs the reader toward the areas that can be explored and work upon in future.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129131895","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"IoT based intelligent billboard using data mining","authors":"Saral Nigam, Shikhar Asthana, Punit Gupta","doi":"10.1109/ICICCS.2016.7542329","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542329","url":null,"abstract":"The paper presents the design and implementation of an intelligent advertising system using Raspberry Pi B+ v1.2 development board, RFID and display panels integrated over a network. This system can be used in multi retail stores, malls and shopping complexes. The proposed system works on performing data mining and trend analysis over sales, inventory data which is collected in real time by using POS system implemented using RFID tags attached to products. The display panels(billboards) will be placed at strategic locations. The proposed outcome of the project aims to provide better offers and deals to customers without targeting them individually, rather using a segmented approach.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125572194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Gain and bandwidth enhancement of rectangular microstrip antenna by loading slot","authors":"R. K. Prasad, D. K. Srivastava, J. Saini","doi":"10.1109/ICICCS.2016.7542356","DOIUrl":"https://doi.org/10.1109/ICICCS.2016.7542356","url":null,"abstract":"By loading the slot the gain & bandwidth enhancement of rectangular microstrip patch antenna has been proposed in this paper. This antenna has been designed operating at 2.5 GHz frequency. By using loaded slot along microstrip line feed a good performance of bandwidth & gain enhancement can be obtained. Using IE3D software, the fractional bandwidth of antenna has been enhanced from 39.45% between frequency band 2.061 GHz to 3.074 GHz to 45.50% between frequency band 1.886 GHz to 2.997 GHz & gain enhanced from 4.24 dBi to 6.12 dBi.","PeriodicalId":389065,"journal":{"name":"2016 International Conference on Innovation and Challenges in Cyber Security (ICICCS-INBUSH)","volume":"124 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131494513","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}