Browsing by Author "Kamath, A.A."
Now showing 1 - 8 of 8
- Results Per Page
- Sort Options
Item A mobile application for Women's Safety: WoSApp(Institute of Electrical and Electronics Engineers Inc., 2016) Chand, D.; Nayak, S.S.; Bhat, K.S.; Parikh, S.; Singh, Y.; Kamath, A.A.The safety of women is a concern of increasing urgency in India and other countries. The primary issue in the handling of these cases by the police lies in constraints preventing them from responding quickly to calls of distress. These constraints include not knowing the location of the crime, and not knowing the crime is occurring at all: at the victim's end, reaching the police assuredly and discreetly is a challenge. To aid in the removal of these constraints, this paper introduces a mobile application called WoSApp (Women's Safety App) that provides women with a reliable way to place an emergency call to the police. The user can easily and discreetly trigger the calling function by shaking her phone, or by explicitly interacting with the user interface of the application via a simple press of a PANIC button on the screen. A message containing the geographical location of the user, as well as contact details of a pre-selected list of emergency contacts, is immediately sent to the police. This paper describes the application, its development, and its technical implementation. © 2015 IEEE.Item ARTINALI: Dynamic invariant detection for Cyber-Physical System security(2017) Aliabadi, M.R.; Kamath, A.A.; Gascon-Samson, J.; Pattabiraman, K.Cyber-Physical Systems (CPSes) are being widely deployed in security- critical scenarios such as smart homes and medical devices. Unfortunately, the connectedness of these systems and their relative lack of security measures makes them ripe targets for attacks. Specification-based Intrusion Detection Systems (IDS) have been shown to be effective for securing CPSs. Unfortunately, deriving invariants for capturing the specifications of CPS systems is a tedious and error-prone process. Therefore, it is important to dynamically monitor the CPS system to learn its common behaviors and formulate invariants for detecting security attacks. Existing techniques for invariant mining only incorporate data and events, but not time. However, time is central to most CPS systems, and hence incorporating time in addition to data and events, is essential for achieving low false positives and false negatives. This paper proposes ARTINALI, which mines dynamic system properties by incorporating time as a first-class property of the system. We build ARTINALI-based Intrusion Detection Systems (IDSes) for two CPSes, namely smart meters and smart medical devices, and measure their efficacy. We find that the ARTINALIbased IDSes significantly reduce the ratio of false positives and false negatives by 16 to 48% (average 30.75%) and 89 to 95% (average 93.4%) respectively over other dynamic invariant detection tools. � 2017 Association for Computing Machinery.Item ARTINALI: Dynamic invariant detection for Cyber-Physical System security(Association for Computing Machinery acmhelp@acm.org, 2017) Aliabadi, M.R.; Kamath, A.A.; Gascon-Samson, J.; Pattabiraman, K.Cyber-Physical Systems (CPSes) are being widely deployed in security- critical scenarios such as smart homes and medical devices. Unfortunately, the connectedness of these systems and their relative lack of security measures makes them ripe targets for attacks. Specification-based Intrusion Detection Systems (IDS) have been shown to be effective for securing CPSs. Unfortunately, deriving invariants for capturing the specifications of CPS systems is a tedious and error-prone process. Therefore, it is important to dynamically monitor the CPS system to learn its common behaviors and formulate invariants for detecting security attacks. Existing techniques for invariant mining only incorporate data and events, but not time. However, time is central to most CPS systems, and hence incorporating time in addition to data and events, is essential for achieving low false positives and false negatives. This paper proposes ARTINALI, which mines dynamic system properties by incorporating time as a first-class property of the system. We build ARTINALI-based Intrusion Detection Systems (IDSes) for two CPSes, namely smart meters and smart medical devices, and measure their efficacy. We find that the ARTINALIbased IDSes significantly reduce the ratio of false positives and false negatives by 16 to 48% (average 30.75%) and 89 to 95% (average 93.4%) respectively over other dynamic invariant detection tools. © 2017 Association for Computing Machinery.Item GCPiN: Group caching for privacy in named data networking(2018) Kamath, A.A.; Jamadagni, C.; Anilkumar, A.; Mathew, K.; Tahiliani, M.P.Router architecture in Named Data Networks (NDN) is intricate, and entails in-network caching of Data packets. Protecting the privacy of this cached content, while maintaining the performance benefits obtained due to caching, is a major concern. Although this problem has been addressed, most existing solutions dramatically compromise the performance gain that NDN provides in order to ensure data privacy. In this paper, we formulate a new approach to enhance the privacy of cached content at each NDN router, while ensuring minimal performance loss. This is achieved by segregating NDN routers into groups, and maintaining a Distributed Content Store across each group. The proposed approach has been named Group Caching for Privacy in NDN (GCPiN). We provide a preliminary mathematical analysis which shows that GCPiN is a promising approach with scope for further evaluation. � 2017 IEEE.Item GCPiN: Group caching for privacy in named data networking(Institute of Electrical and Electronics Engineers Inc., 2018) Kamath, A.A.; Jamadagni, C.; Anilkumar, A.; Mathew, K.; Tahiliani, M.P.Router architecture in Named Data Networks (NDN) is intricate, and entails in-network caching of Data packets. Protecting the privacy of this cached content, while maintaining the performance benefits obtained due to caching, is a major concern. Although this problem has been addressed, most existing solutions dramatically compromise the performance gain that NDN provides in order to ensure data privacy. In this paper, we formulate a new approach to enhance the privacy of cached content at each NDN router, while ensuring minimal performance loss. This is achieved by segregating NDN routers into groups, and maintaining a Distributed Content Store across each group. The proposed approach has been named Group Caching for Privacy in NDN (GCPiN). We provide a preliminary mathematical analysis which shows that GCPiN is a promising approach with scope for further evaluation. © 2017 IEEE.Item A mobile application for Women's Safety: WoSApp(2016) Chand, D.; Nayak, S.; Bhat, K.S.; Parikh, S.; Singh, Y.; Kamath, A.A.The safety of women is a concern of increasing urgency in India and other countries. The primary issue in the handling of these cases by the police lies in constraints preventing them from responding quickly to calls of distress. These constraints include not knowing the location of the crime, and not knowing the crime is occurring at all: at the victim's end, reaching the police assuredly and discreetly is a challenge. To aid in the removal of these constraints, this paper introduces a mobile application called WoSApp (Women's Safety App) that provides women with a reliable way to place an emergency call to the police. The user can easily and discreetly trigger the calling function by shaking her phone, or by explicitly interacting with the user interface of the application via a simple press of a PANIC button on the screen. A message containing the geographical location of the user, as well as contact details of a pre-selected list of emergency contacts, is immediately sent to the police. This paper describes the application, its development, and its technical implementation. � 2015 IEEE.Item VirtTorrent: BitTorrent for Inter-VM File distribution(2016) Kamath, A.A.; Jamadagni, C.; Chandrasekaran, K.A major problem in virtualized cloud datacenters today is the inefficiency of communication between virtual machines, i.e. inter-VM communication. Efforts have gone into optimizing communication between VMs present on the same physical server in the cloud, i.e. co-resident or co-located VMs; however, optimizing communication between VMs present on different physical servers is a separate issue. As these communicate via the TCP/IP network stack, improvements in performance or efficiency are normally proposed by customizations to the communication protocols requisite to the datacenter. We propose a mechanism to increase the average speed of inter-VM file distribution in the cloud for VMs on separate physical servers by implementing a BitTorrent-like peer-to-peer (P2P) system. The proposal, named VirtTorrent, uses direct communication between VMs in the cloud to implement a protocol similar to BitTorrent, allowing files to be distributed swiftly and with minimal network congestion. As inter-VM communication and network congestion are both important issues in the datacenter, we believe that VirtTorrent can make a marked improvement in the scenarios laid out in this paper. � 2016 ACM.Item VirtTorrent: BitTorrent for Inter-VM File distribution(Association for Computing Machinery acmhelp@acm.org, 2016) Kamath, A.A.; Jamadagni, C.; Chandrasekaran, K.A major problem in virtualized cloud datacenters today is the inefficiency of communication between virtual machines, i.e. inter-VM communication. Efforts have gone into optimizing communication between VMs present on the same physical server in the cloud, i.e. co-resident or co-located VMs; however, optimizing communication between VMs present on different physical servers is a separate issue. As these communicate via the TCP/IP network stack, improvements in performance or efficiency are normally proposed by customizations to the communication protocols requisite to the datacenter. We propose a mechanism to increase the average speed of inter-VM file distribution in the cloud for VMs on separate physical servers by implementing a BitTorrent-like peer-to-peer (P2P) system. The proposal, named VirtTorrent, uses direct communication between VMs in the cloud to implement a protocol similar to BitTorrent, allowing files to be distributed swiftly and with minimal network congestion. As inter-VM communication and network congestion are both important issues in the datacenter, we believe that VirtTorrent can make a marked improvement in the scenarios laid out in this paper. © 2016 ACM.
