• Attacks on information systems have grown exponentially in volume and in sophistication. While there are many security systems and ‘honeypots’ designed to harvest or trap the malware and study its behaviour, still it is very difficult to detect and identify the advanced malwares that are stealthy in nature and causing more serious damage. The traditional ‘honeypot’ systems that are traps set to detect attempts at unauthorised use of information systems, do not identify or do not have the capability to attract and detect advanced threats.

    advanced-threat-collection-platforms
  • This research project presents an architectural framework for developing a semantically interoperable Internet of Things. Theres two things thats of core significance here- security and scalability. The intended applications require that sensitive user information be communicated in a secure manner.

    aiotm-secure-scalable-and-interoperable-platform-for-internet-of-things
  • Amrita Big Data Framework(ABDF) is essentially an all integrated framework for effortless BigData analytics. ABDF is feature rich, providing user community with an easy to use GUI for analyzing large data heaps. Some key features :

     

    amrita-big-data-framework
  • Malware forms the basis of most cyber-criminal operations causing significant financial loss and posing a huge threat to the security of an organization. Enterprise applications form the backbone of any organization. They have scaled and matured over the years providing more and more services to users.

    backdoor-analysis-of-enterprise-applications
  • This research project is to create an Early Warning Framework for detecting internet based cyber threats so as to prevent/mitigate attacks that can cause loss of valuable information as well as for protecting systems from damage due to cyber attacks. The framework uses data from Domain Name Systems and Border Gateway Protocol exchanges to analyze and detect attack patterns.

    early-warning-framework-using-core-internet-protocols-dns-amp-bgp
  • Health care security has evolved to become one of the most prominent areas of Cybersecurity. With the growing concerns about the risks to human lives owing to exploitation of security vulnerabilities in medical devices, the need to invent secure, smart and low-cost medical devices and eco-system has also increased.

    healthcare-security
  • The project 'Security Event Processing Acceleration Using GPGPU' proposes to provide a proof of concept for building a FPGA based NIDS for highspeed network environments. The proposed FPGA based NIDS would employ a lightweight snort detection engine to filter packets based on predefined rules over packet headers and payloads.

    security-event-processing-acceleration-using-gpgpu
  • As with computing systems, trends show sharp increase in more and more electronic devices and appliances networked to the internet. From simple home appliances to more complex systems such as medical devices and industrial control (SCADA) systems, there is an integration of software and hardware that causes new security threats due to its contact to the internet.

    security-of-the-internet-of-things
  • Comprehensive study of threats, their operational architecture, and adoption of threat modeling for their classification, form the foundation for development of secure technologies for cloud. Cloud platforms today assist providers in controlling and managing the customer VMs. In addition, they also help monitor and manage cloud performance. 

    threat-modeling-trust-modeling-and-development-of-secure-platform-in-cloud-environments