Information Security
Faculty:
-
Prof. K. Chandrasekaran
-
Dr. P. Santhi Thilagam
-
Dr. Alwyn R. Pais
-
Mr. Mahendra P. Singh
Research Scholars:
-
Mrs. G. Deepa
-
Mr. D Venkata Naga Siva Kumar
-
Mr. Amit Praseed
-
Ms. Apurva Shreekant Kittur
-
Mr. Alok Kumar
-
Mr. Routhu Srinivasa Rao
-
Mr. Nikhil Chandrakant Mhala
Ongoing Research:
-
Automated Detection of Vulnerabilities in Web Applications
- Secure Multi-Keyword Search Over Encrypted Data
-
Detection of Application Layer DDoS Attacks on Web Applications
- Batch Verification of Digital Signatures in IoT
- False Data Detection in Wireless Sensor Networks
- Identification of Phishing websites
- Visual Cryptography
Publications:
+ Journals
-
G. Deepa, P. Santhi Thilagam, Furqan Ahmed Khan, Amit Praseed, Alwyn R. Pais, and Nushafreen Palsetia (2016). “Black-Box Detection of XQuery Injection and Parameter Tampering Vulnerabilities in Web Applications”, International Journal of Information Security, Springer. (URL: http://dx.doi.org/10.1007/s10207-016-0359-4)
-
Nushafreen Palsetia, G. Deepa, Furqan Ahmed Khan, P. Santhi Thilagam, and Alwyn Roshan Pais (2016). “Securing Native XML Database-Driven Web Applications from XQuery Injection Vulnerabilities”, Journal of Systems and Software, Vol. 122, pp. 93 – 109, Elsevier.
-
G. Deepa, and P. Santhi Thilagam (2016). “Securing Web Applications from Injection and Logic Vulnerabilities: Approaches and Challenges”, Information and Software Technology, Vol. 74, pp. 160 – 180, Elsevier.
-
G. R. Karri and P. S. Thilagam, “Reputation-based cross-layer intrusion detection system for wormhole attacks in wireless mesh networks,” Security and Communication Networks, vol. 7, no. 12, pp. 2442–2462, 2014.
+ Conferences
-
Singh, Inderjeet, and Alwyn R. Pais. "A Random Key Generation Scheme Using Primitive Polynomials over GF (2)." In International Symposium on Security in Computing and Communication, pp. 42-51. Springer Singapore, 2016.
-
Sumanta Chatterjee, Alwyn R. Pais, Sumit Saurabh: Distributed Data Aggregation in Wireless Sensor Network - with Peer Verification. SECRYPT 2016: 440-445.
-
Saurabh, Sumit, Alwyn R. Pais, and Sumanta Chatterjee. "Efficient Key Management in IoT Using Mobile Aggregator." In International Symposium on Security in Computing and Communication, pp. 161-172. Springer Singapore, 2016.
-
K. G. Reddy and P. S. Thilagam, “MAC layer security issues in wireless mesh networks,” AIP Conference Proceedings, vol. 1715, no. 1, 2016.
-
A. N. Gupta and P. S. Thilagam, “Detection of XML Signature Wrapping Attack Using Node Counting,” in Proceedings of 3rd International Symposium on Big Data and Cloud Computing Challenges, ISBCC-16. Springer International Publishing, 2016, pp. 57–63.
-
Bansal, Abhishek, and Alwyn R. Pais. "Mitigation of Flooding Based Denial of Service Attack against Session Initiation Protocol Based VoIP System." In Computational Intelligence & Communication Technology (CICT), 2015 IEEE International Conference on, pp. 391-396. IEEE, 2015.
-
Pranave Kumar Bhaskar, Alwyn R. Pais: A Chinese Remainder Theorem Based Key Management Algorithm for Hierarchical Wireless Sensor Network. International Conference on Distributed Computing and Internet Technology, ICDCIT 2015: 311-317
-
Amit Praseed, Remya K. Sudheesh and K. Chandrasekaran, "Efficient privacy preserving ranked search over encrypted data," 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS), Trivandrum, 2015.
-
Bansal, Abhishek, Prashant Kulkarni, and Alwyn R. Pais. "Effectiveness of SIP messages on SIP server." In Information & Communication Technologies (ICT), 2013 IEEE Conference on, pp. 616-621. IEEE, 2013.
-
Anil Gopalakrishna, Alwyn Roshan Pais: Emulating a High Interaction Honeypot to Monitor Intrusion Activity. In International Symposium on Security in Computing and Communication 2013: 70-76.
-
Adapa Tataram, Alwyn Roshan Pais: Location Estimation of Mobile in GSM and CDMA Networks. SNDS 2012: 456-465
-
Loya, Priyanka, and Alwyn Roshan Pais. "SIRIS: secure IRIS authentication system." In Proceedings of the Fifth International Conference on Security of Information and Networks, pp. 148-152. ACM, 2012.
-
Ameya, D. Bapat, and Alwyn Pais. "Restraining add-on's behavior in private browsing." In Proceedings of the First International Conference on Security of Internet of Things, pp. 194-199. ACM, 2012.
-
K. G. Reddy, P. S. Thilagam, and B. N. Rao, “Cross-layer IDS for Rushing Attack in Wireless Mesh Networks,” in Proceedings of Second International Conference on Computational Science, Engineering and Information Technology, ACM, 2012, pp. 396–400.
-
K. G. Reddy and P. S. Thilagam, “Taxonomy of Network Layer Attacks in Wireless Mesh Network,” in Proceedings of Second International Conference on Computer Science, Engineering & Applications, ICCSEA 2012, May 25-27, vol. 2, Springer Berlin Heidelberg, 2012, pp. 927–935.
-
R. Chandrashekhar, M. Mardithaya, P. S. Thilagam, and D. Saha, “SQL Injection Attack Mechanisms and Prevention Techniques,” in Proceedings of International Conference on Advanced Computing, Networking and Security, ADCONS 2011, December 16-18, 2011, Springer Berlin Heidelberg, 2012, pp. 524–533.
-
K. G. Reddy and P. S. Thilagam, “Intrusion Detection Technique for Wormhole and Following Jellyfish and Byzantine Attacks in Wireless Mesh Network,” in Proceedings of International Conference on Advanced Computing, Networking and Security, ADCONS 2011, December 16-18, 2011, Springer Berlin Heidelberg, 2012, pp. 631–637.
-
A. Kumar, P. S. Thilagam, A. R. Pais, V. Sharma, and K. M. Sadalkar, “Towards Evaluating Resilience of SIP Server under Low Rate DoS Attack,” in Proceedings of International Conference on Information Technology and Mobile Communication, AIM 2011, April 21-22, 2011, Springer Berlin Heidelberg, 2011, pp. 336–339.
-
P. S. Karur and P. S. Thilagam, “Adaptive Sectioned Tree Indexing for Spatial Queries in Wireless Sensor Networks,” in Proceedings of International Conference on Intelligent Information Networks, 2011.
-
K. B. Santhosh and P. S. Thilagam, “Hierarchical DHT to Efficiently Load Balancing in Dynamic Peer-to-Peer Environment,” Springer Communications in Computer and Information Science (CCIS), vol. 157, pp. 470–475, 2011.