Conference Papers
Permanent URI for this collectionhttps://idr.nitk.ac.in/handle/123456789/28506
Browse
4 results
Search Results
Item Intrusion Detection Techniques for Detection of Cyber Attacks(Springer Science and Business Media Deutschland GmbH, 2021) Ahmed, S.S.; Kankar, M.; Rudra, B.Intrusion detection system (IDS) is a software-related application where we can detect the system or network activities and notice if any suspicious task happens. Excellent broadening and the use of the Internet lift examine the communication and save the digital information securely. Nowadays, attackers use variety of attacks for fetching private data. Most of the IDS techniques, algorithms, and methods assist to find those various attacks. The central aim of the project is to come up with an overall study about the intrusion detection mechanism, various types of attacks, various tools and techniques, and challenges. We used various machine learning algorithms and found performance metrics like accuracy, recall, and F-measure and compared with the existing work. After this research, we got good results that can help to detect the cyber attacks being performed in the network. © 2021, The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd.Item Designing Scalable Intrusion Detection Systems with Stacking Based Ensemble Learning(Springer Science and Business Media Deutschland GmbH, 2022) Sujan Reddy, A.S.; Akashdeep, S.; Kamath S․, S.; Rudra, B.Network Intrusion Detection Systems monitor the network traffic and reports any malicious activity. In this paper, a combination of feature engineering techniques and Ensemble Learning is proposed to build an effective Intrusion Detection System. The zero importance feature selection method is used to extract 23 features. Random forests, Feed Forward Neural Networks and Auto encoders are used as the base models and the predictions from these base models are combined using Extreme Gradient Boosting (XGB). To ensure that the proposed ensemble model is scalable as well, parallel programming is used for parallel computation of class probabilities from each model of the ensemble. The NSL-KDD dataset is used to train our models. To test our models, we use KDD+test dataset. Experimental results show that the proposed ensemble model outperforms several state-of-the-art works. The proposed parallel programming approach decreases the average prediction time of the model ensuring that the model is scalable. © 2022, The Author(s), under exclusive license to Springer Nature Switzerland AG.Item Phishing Detection Using 1D-CNN and FF-CNN Models Based on URL of the Website(Springer Science and Business Media Deutschland GmbH, 2024) Mete, C.K.; Jaidhar, C.D.Web browsing has become an integral part of our daily lives, with most modern computer devices supporting easy access to online services and information. However, this convenience comes with a significant risk to user security. Web users are exposed to various types of cyberattacks, such as Phishing, malware, profiling, etc. These hazards have the potential to compromise individuals or organizations and deny lists. The traditional Phishing defense is no longer effective in shielding users from the constantly evolving nature of Phishing Uniform Resource Locators (URLs). To address this issue, this work proposes a One-Dimensional Convolutional Neural Networks (1D-CNN) and Feed-Forward Convolutional Neural Network (FF-CNN)-based Phishing URL detection approach. The proposed approach is trained with three different datasets: a URL-based feature dataset, an embedded feature-based dataset, and a combination of both feature datasets. Experiments show that the proposed 1D-CNN-based approach achieved detection accuracy of 98.83%, 98.09%, and 98.91% on the URL-based features dataset, embedded features dataset, and combined features dataset, respectively. Furthermore, the proposed FF-CNN-based approach achieved an accuracy of 98.87%, 97.18%, and 98.78% on the same datasets. This research provides an effective approach to combating the growing threat of web-based attacks and safeguarding the security of web users. © The Author(s), under exclusive license to Springer Nature Switzerland AG 2024.Item Hardware Security in Evolving FinTech Landscape(Springer Science and Business Media Deutschland GmbH, 2025) Bhowmik, B.; Dongala, J.R.; Sudhama, K.K.; Antony, R.T.; Girish, K.K.The assimilation of technology into the financial sector, often referred to as FinTech, has brought about a significant transformation. This shift has not only widened the scope of financial inclusivity but has also fundamentally reshaped the contours of financial solutions delivered. As FinTech solutions continue to empower individuals with greater control over their finances through mobile banking, digital wallets, and advanced data analytics, the security of these innovations becomes paramount. While software security has traditionally received more attention, this paper underscores the significance of hardware security, which serves as the foundational infrastructure for software security measures. It delves into the factors used to evaluate hardware security and outlines various categories of hardware attacks. A case study, focusing on point-of-sale (PoS) systems, exemplifies the importance of hardware security in FinTech. Ultimately, this research contributes to a comprehensive understanding of the evolving FinTech landscape and its implications for both financial inclusion and cybersecurity. © The Author(s), under exclusive license to Springer Nature Singapore Pte Ltd. 2025.
