2. Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7

Browse

Search Results

Now showing 1 - 10 of 26
  • Item
    Mitigation of flooding based denial of service attack against session initiation protocol based VoIP system
    (2015) Bansal, A.; Pais, A.R.
    The Session Initiation Protocol (SIP) is the most popular signaling protocol used in Voice over Internet Protocol (VoIP). The flooding based DoS attack can be performed by sending only hundreds of SIP messages per second to a SIP server. In this paper, we have proposed a new mitigation scheme for SIP based VoIP system which can protect it from flooding based DoS attack. This scheme is based on the INVITE and BYE messages of the SIP protocol. A prototype system for the flooding based DoS attack on SIP server and a mitigation mechanism has been designed and implemented. The performance of the proposed system has been evaluated and found to be better than other existing mechanisms. � 2015 IEEE.
  • Item
    Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks
    (2017) Kumar, A.; Pais, A.R.
    Wireless Sensor Networks (WSNs) are deployed in unattended environments and thus are prone to security compromises. Providing security and tamper resistant hardware to each node is also unrealistic. The compromised nodes can populate network with forged false reports which can cause false alarms and wrong decision making in networks. En-Route filtering is a popular method for filtering false reports in WSNs. Many such filtering techniques have been proposed for filtering false reports based on single sink. In this paper we propose a multi-sink en-route filtering mechanism, which reduces the overall energy consumption of the network. This is achieved by dividing the network into smaller networks and assigning a separate sink to each smaller network. This helps in reducing the hop count of genuine reports, saving lot of energy consumption. The proposed technique also decreases the key-exchange overhead maintaining the same filtering efficiency. The proposed technique also reduces the effect of selective forwarding attack in the network. The simulated results also support our claims and we are able to save up to 40% of energy consumption. � 2017, Springer Nature Singapore Pte Ltd.
  • Item
    Light-Weight Hash Algorithms Using GRP instruction
    (2017) Soni, M.P.; Pais, A.R.
    A cryptographic hash fuction is used to protect the authenticity of information. Commonly used hash functions require huge computational overhead which is not available in most of the IOT devices Hence light weight cryptographic hash functions such as ARMADILLO, DM-PRESENT, GLUON, PHOTON, QUARK, SIPHASH, SPNHASH, SPONGENTA [1�3, 5, 6, 8�10], have been proposed in the literature for IOT device applications. Permutation operations in these algorithms are time consuming operations. In this paper, we are modifying the permutation operation of DM-PRESENT and SPONGENT algorithms using GRP instruction to achieve faster execution of algorithms. Using our technique we are able to save 465 cycles for DM-PRESENT(for 128- bits) and 670 cycles for SPONGENT(for 80-bits) algorithm over table look up implementation. In comparison to SHIFT-AND-OR technique of implementation we are able to save 7,688 cycles for DM-PRESENT(for 128- bits) and 11,160 for SPONGENT(for 80-bits) algorithms. � 2017 Copyright held by the owner/author(s).
  • Item
    Kernel Modification APT Attack Detection in Android
    (2017) Anto, A.; Rao, R.S.; Pais, A.R.
    Android is one of the most secure and widely used operating systems for the mobile platform. Most of the Android devices have the functionality for rooting and installing new custom ROMs and kernels in the device. This feature of the Android devices makes it vulnerable to the kernel-modification advanced persistent threat attack (APT). This type of APT attacks cannot be detected by using existing tools and methods. This paper presents the implementation details of a kernel-modification APT attack performed on an android device and proposes a new method for detecting the same. The proposed system uses control flow analysis of the kernel binary code for detecting APT. In control flow analysis the control flow graph of the genuine kernel is compared with the control flow graph of the device-kernel and detects the APT based on signatures. � 2017, Springer Nature Singapore Pte Ltd.
  • Item
    Fuzzy string matching algorithm for spam detection in twitter
    (2019) Kumar, A.; Singh, M.; Pais, A.R.
    In recent times one of the most popular Internet activity around the world is visiting online social websites. The number of users and time spent by users on these social networks is increasing exponentially. Moreover, users tend to rely on the trustworthiness of data present on these networks. But in wrong hands this trustworthiness can easily be exploited and used to spread spams. Users can easily be harassed by spam messages which waste time and can fool users to click on malicious links. Spam effects many different type of electronic communications including instant messaging, email and social networks. But due to open nature, huge user base and reliance on users for data, social networks are worst hit because of spams. To detect spams from the social networks it is desirable to find new unsupervised techniques which can save the training cost which is required in supervised techniques. In this article we present an unsupervised, distributed and decentralized technique to detect and remove spams from social networks. We present a new technique which uses fuzzy based method to detect spams, which can detect spams even from a single message stream. To handle huge data in networks, we implement our technique to work on MapReduce platform. � Springer Nature Singapore Pte Ltd. 2019.
  • Item
    Fast Verification of Digital Signatures in IoT
    (2017) Kittur, A.S.; Jain, A.; Pais, A.R.
    Internet of Things (IoT) is the recent advancement in Wireless technology where multiple embedded devices are connected through internet for exchange of information. Since the information exchanged is private and at times confidential, state of the art focusses at providing proper security to the system. To avoid illegal users from getting access to information system, authentication through Digital Signatures becomes integral part of IoT. Verifying individual signatures is a time consuming process, hence it is not advisable in IoT systems. Using Batch verification of Digital signatures, reduction in verification time is achievable. Hence in this paper, we have studied different RSA based batch verification techniques and their analysis is provided. Batch verification of digital signatures in IoT devices is a promising area for further research. � 2017, Springer Nature Singapore Pte Ltd.
  • Item
    Emulating a High Interaction Honeypot to Monitor Intrusion Activity
    (2013) Gopalakrishna, A.; Pais, A.R.
    Intrusion activity monitoring is a complex task to achieve. An intruder should not be alerted about being monitored. A stealthy approach is needed, that does not alert the intruder about the presence of monitoring. Virtual Machine based High Interaction Honeypots help achieve stealthy monitoring. Most of the related research work use the concept of Virtual Machine Introspection that relies on System Call Interception. However most of these methods hook the sysenter instruction for interception of system calls. This can be defeated by an intruder since this is not the only way of making a system call. We have designed and implemented a High-Interaction Virtual Machine based honeypot using the open source tool Qebek. Qebek is more effective as it hooks the actual system call implementation itself. We have tested its capturability by running different types of malware. The Results obtained show that the system is able to capture information about processes running on the honeypot, console data and network activities, which reveal the maliciousness of the activities. � Springer-Verlag Berlin Heidelberg 2013.
  • Item
    Efficient key management in IoT using mobile aggregator
    (2016) Saurabh, S.; Pais, A.R.; Chatterjee, S.
    Managing keys in Internet of Things (IoT) is challenging. With this proposed work we are trying to address an efficient key management protocol for specific application based scenario which enforces secure connectivity of devices and minimizes node capture attacks. There are a number of protocols that have been enforced and implemented for wireless sensor networks (WSN) and internet-enabled devices. We propose a protocol with mobility interface using combinatorial designs for key management in IoT devices. Mobile devices follow a dedicated path to collect data securely from installed devices in the network. We also compare our work with existing protocols and few mobility models. � Springer Nature Singapore Pte Ltd. 2016.
  • Item
    Distributed data aggregation in wireless sensor network: With peer verification
    (2016) Chatterjee, S.; Pais, A.R.; Saurabh, S.
    Data aggregation in wireless sensor network is implemented to reduce the communication overhead and to reduce bandwidth utilization. Data confidentiality requires the sensor node to transmit the data in a secure manner so that the adversary is unable to read the data or transmit false data even if it compromises some of the sensor nodes or aggregation node. In this paper a distributed aggregation protocol using homomorphic trapdoor permutation is proposed. This protocol distributes the responsibility of key generation, aggregation and verification to different nodes to reduce the overall power consumption of the sensor network. The peer verification scheme is also proposed as a part of the protocol. Peer verification ensures the authentication of the data and sender node in the network, by at least k peer nodes. Security of the proposed protocol is analyzed against passive and active adversary model. Copyright � 2016 by SCITEPRESS - Science and Technology Publications, Lda. All rights reserved.
  • Item
    Detecting & defeating split personality malware
    (2011) Vishnani, K.; Pais, A.R.; Mohandas, R.
    Security analysts extensively use virtual machines to analyse sample programs and study them to determine if they contain any malware. In the process, if the malware destabilizes the guest OS, they simply discard it and load in a fresh image. This approach increases their productivity. Since naive users do not run virtual machines, malware authors have observed that it is a pretty good probability that their malware is being analysed if it is being run in a Virtual Machine (VM). When these analysis aware malware detect the presence of VMs, they behave in a benign manner thus escaping detection. A determined analyst will have to end up running the sample on a native machine that adds to his chase time. In this paper, we briefly discuss the techniques deployed to detect VM by the Analysis Aware Malware also known as the Split Personality Malware. We then introduce our tool that not only detects this category of malware but also fools it into believing that it is running on a native machine even when it is running on a virtualized one, forcing it to exhibit its malicious form. Most security analysts should find this tool really useful.