2. Conference Papers

Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/1/7

Browse

Search Results

Now showing 1 - 10 of 43
  • Thumbnail Image
    Item
    Model based hybrid approach to prevent SQL injection attacks in PHP
    (2011) Sadalkar, K.; Mohandas, R.; Pais, A.R.
    SQL Injection vulnerability is ranked 1st in the OWASP top 10 vulnerability list and has resulted in massive attacks on a number of websites in the past few years. Inspite of preventive measures like educating developers about safe coding practices, statistics shows that these vulnerabilities are still dominating the top. Various static and dynamic approaches have been proposed to mitigate this vulnerability. In this paper, we present a hybrid approach to prevent SQL injection attacks in PHP, a popular server side scripting language. This technique is more effective to prevent SQL injection attack in a dynamic web content environment without use of complex string analyzer logic. Initially, we construct a Query model for each hotspot by running the application in safe mode. In the production environment, dynamically generated queries are validated with it. The results and analysis shows the proposed approach is simple and effective to prevent common SQL injection vulnerabilities. � 2011 Springer-Verlag.
  • Item
    Mitigation of flooding based denial of service attack against session initiation protocol based VoIP system
    (2015) Bansal, A.; Pais, A.R.
    The Session Initiation Protocol (SIP) is the most popular signaling protocol used in Voice over Internet Protocol (VoIP). The flooding based DoS attack can be performed by sending only hundreds of SIP messages per second to a SIP server. In this paper, we have proposed a new mitigation scheme for SIP based VoIP system which can protect it from flooding based DoS attack. This scheme is based on the INVITE and BYE messages of the SIP protocol. A prototype system for the flooding based DoS attack on SIP server and a mitigation mechanism has been designed and implemented. The performance of the proposed system has been evaluated and found to be better than other existing mechanisms. � 2015 IEEE.
  • Thumbnail Image
    Item
    Protection against denial of service and input manipulation vulnerabilities in service oriented architecture
    (2011) Pais, A.R.; Deepak, D.J.; Chandavarkar, B.R.
    Organizations are increasingly adopting Service Oriented Architecture (SOA) to build their distributed applications. SOA is a computing paradigm, emphasizing dynamic service discovery composition and interoperability. Web services are a technology that can be used to implement SOA and are increasingly becoming the SOA implementation of choice. Because a Web service relies on some of the same underlying HTTP and Web-based architecture as common Web applications, it is susceptible to similar threats and vulnerabilities. There are many vulnerabilities in web services such as SQL injection, Denial of Service, etc. that cannot be detected by web service standards and conventional firewalls. In this paper, we present a detailed design of XML firewall that can be used to prevent different vulnerabilities by validating the input xml documents before being processed by the web services. Also the XML firewall does the function of authentication, authorization and session management. We designed a modular architecture for XML firewall where each module checks for a particular vulnerability. We have also developed methods to detect and prevent SQL injection and Denial of Service vulnerabilities. � 2011 Springer-Verlag.
  • Item
    Multi-sink En-Route Filtering Mechanism for Wireless Sensor Networks
    (2017) Kumar, A.; Pais, A.R.
    Wireless Sensor Networks (WSNs) are deployed in unattended environments and thus are prone to security compromises. Providing security and tamper resistant hardware to each node is also unrealistic. The compromised nodes can populate network with forged false reports which can cause false alarms and wrong decision making in networks. En-Route filtering is a popular method for filtering false reports in WSNs. Many such filtering techniques have been proposed for filtering false reports based on single sink. In this paper we propose a multi-sink en-route filtering mechanism, which reduces the overall energy consumption of the network. This is achieved by dividing the network into smaller networks and assigning a separate sink to each smaller network. This helps in reducing the hop count of genuine reports, saving lot of energy consumption. The proposed technique also decreases the key-exchange overhead maintaining the same filtering efficiency. The proposed technique also reduces the effect of selective forwarding attack in the network. The simulated results also support our claims and we are able to save up to 40% of energy consumption. � 2017, Springer Nature Singapore Pte Ltd.
  • Thumbnail Image
    Item
    Location estimation of mobile in GSM and CDMA networks
    (2012) Tataram, A.; Pais, A.R.
    In this Paper, we present the design and implementation of location estimation tool that provides the location of mobile for a known mobile number. During emergency, persons who are in deep trouble should be located concisely and accurately due to the critical importance. With any tracing mechanism of least delay, culprits could be caught by authorities. In such kind of scenarios, our location estimation tool detects the location of the person carrying the mobile. This tool works at either Base Station Controller (BSC) or Mobile Switching Centre (MSC) at mobile network side. Location estimation tool works based on neighbor BTS and serving cells signal strength information. At MSC, Signal strength values are to be collected from signal dump file of mobile number. Tool gives the location of a mobile as latitude, longitude values on Google maps in different cases. � 2012 Springer-Verlag.
  • Item
    Light-Weight Hash Algorithms Using GRP instruction
    (2017) Soni, M.P.; Pais, A.R.
    A cryptographic hash fuction is used to protect the authenticity of information. Commonly used hash functions require huge computational overhead which is not available in most of the IOT devices Hence light weight cryptographic hash functions such as ARMADILLO, DM-PRESENT, GLUON, PHOTON, QUARK, SIPHASH, SPNHASH, SPONGENTA [1�3, 5, 6, 8�10], have been proposed in the literature for IOT device applications. Permutation operations in these algorithms are time consuming operations. In this paper, we are modifying the permutation operation of DM-PRESENT and SPONGENT algorithms using GRP instruction to achieve faster execution of algorithms. Using our technique we are able to save 465 cycles for DM-PRESENT(for 128- bits) and 670 cycles for SPONGENT(for 80-bits) algorithm over table look up implementation. In comparison to SHIFT-AND-OR technique of implementation we are able to save 7,688 cycles for DM-PRESENT(for 128- bits) and 11,160 for SPONGENT(for 80-bits) algorithms. � 2017 Copyright held by the owner/author(s).
  • Item
    Kernel Modification APT Attack Detection in Android
    (2017) Anto, A.; Rao, R.S.; Pais, A.R.
    Android is one of the most secure and widely used operating systems for the mobile platform. Most of the Android devices have the functionality for rooting and installing new custom ROMs and kernels in the device. This feature of the Android devices makes it vulnerable to the kernel-modification advanced persistent threat attack (APT). This type of APT attacks cannot be detected by using existing tools and methods. This paper presents the implementation details of a kernel-modification APT attack performed on an android device and proposes a new method for detecting the same. The proposed system uses control flow analysis of the kernel binary code for detecting APT. In control flow analysis the control flow graph of the genuine kernel is compared with the control flow graph of the device-kernel and detects the APT based on signatures. � 2017, Springer Nature Singapore Pte Ltd.
  • Thumbnail Image
    Item
    IFrandbox - Client side protection from malicious injected iframes
    (2011) Nadkarni, T.S.; Mohandas, R.; Pais, A.R.
    Drive-by downloads are currently one of the most popular methods of malware distribution. Widely visited legitimate websites are infused with invisible or barely visible Iframes pointing to malicious URLs, causing silent download malware on users system. In this paper, we present a client side solution for protection from such malevolent hidden Iframes. We have implemented our solution as an extension to Mozilla Firefox browser. The extension will check every Iframe loaded in the browser for properties emblematic of malicious Iframes such as hidden visibility styles and 0-pixel dimensions. These Iframes are then blocked by using browser content policy mechanism, hence alleviating the possibility of the malicious download taking place. � 2011 Springer-Verlag.
  • Thumbnail Image
    Item
    Generation of super-resolution video from low resolution video sequences: A novel approach
    (2008) Madhusudhan, T.; Pais, A.R.
    The term "super-resolution" refers to the process of obtaining higher-resolution images from several lower-resolution ones, i.e. resolution enhancement. The quality improvement is caused by sub-pixel shifted from each other between images. Each low resolution image contains new information about the scene and super-resolution aims at combining these to give a higher resolution image. Super-resolution allows us in overcoming the limitations of the imaging system (resolving limit of the sensors) without the need for additional hardware. This paper deals with high resolution video reconstruction from low resolution video. An algorithm for enhancing the resolution of video through histogram based segmentation and frequency domain registration is proposed. Segmentation of the video is done using Histogram method and frequency domain approach is used for registration of images. Bi-cubic interpolation is applied to this video to generate the super-resolution (SR) video. Based on the requirements additional brightness and temporal resolution can be added to the SR video. It is tested on indoor/outdoor real video data, demonstrating the feasibility of the approach, and then results are presented. Qualitative analysis is presented to analyze the quality of reconstructed Super resolution video comparing to input Low Resolution video. The results of this work can be used for object tracking and identification. � 2007 IEEE.
  • Item
    Fuzzy string matching algorithm for spam detection in twitter
    (2019) Kumar, A.; Singh, M.; Pais, A.R.
    In recent times one of the most popular Internet activity around the world is visiting online social websites. The number of users and time spent by users on these social networks is increasing exponentially. Moreover, users tend to rely on the trustworthiness of data present on these networks. But in wrong hands this trustworthiness can easily be exploited and used to spread spams. Users can easily be harassed by spam messages which waste time and can fool users to click on malicious links. Spam effects many different type of electronic communications including instant messaging, email and social networks. But due to open nature, huge user base and reliance on users for data, social networks are worst hit because of spams. To detect spams from the social networks it is desirable to find new unsupervised techniques which can save the training cost which is required in supervised techniques. In this article we present an unsupervised, distributed and decentralized technique to detect and remove spams from social networks. We present a new technique which uses fuzzy based method to detect spams, which can detect spams even from a single message stream. To handle huge data in networks, we implement our technique to work on MapReduce platform. � Springer Nature Singapore Pte Ltd. 2019.