Open Access. Powered by Scholars. Published by Universities.®
Physical Sciences and Mathematics Commons™
Open Access. Powered by Scholars. Published by Universities.®
- Keyword
-
- Machine Learning (4)
- Android malware (2)
- Blockchain (2)
- SpartanGold (2)
- Adversarial Attacks (1)
-
- Algorand (1)
- Anomaly detection (1)
- BERT (1)
- Behavioral Biometrics (1)
- Biometrics (1)
- Blockchain consensus (1)
- Botnets (1)
- Byzantine Agreement (1)
- CNNs (1)
- Chord (1)
- Cloud resources (1)
- Cryptography (1)
- DDoS (1)
- DDoS attack. (1)
- DHT (1)
- Differential privacy (1)
- Distributed Filesystem (1)
- ERC-20 (1)
- Enigma (1)
- Etherium (1)
- Fake Malware Generation. (1)
- Keystroke dynamics (1)
- Logistic regression (1)
- ML (Machine Learning) (1)
- MLP (1)
Articles 1 - 17 of 17
Full-Text Articles in Physical Sciences and Mathematics
Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri
Ml-Based User Authentication Through Mouse Dynamics, Sai Kiran Davuluri
Master's Projects
Increasing reliance on digital services and the limitations of traditional authentication methods have necessitated the development of more advanced and secure user authentication methods. For user authentication and intrusion detection, mouse dynamics, a form of behavioral biometrics, offers a promising and non-invasive method. This paper presents a comprehensive study on ML-Based User Authentication Through Mouse Dynamics.
This project proposes a novel framework integrating sophisticated techniques such as embeddings extraction using Transformer models with cutting-edge machine learning algorithms such as Recurrent Neural Networks (RNN). The project aims to accurately identify users based on their distinct mouse behavior and detect unauthorized access …
Insecure Deserialization Detection In Python, Aneesh Verma
Insecure Deserialization Detection In Python, Aneesh Verma
Master's Projects
The importance of Cyber Security is increasing every single day. From the emergence of new ransomware to major data breaches, the online world is getting dangerous. A multinational non- profit group devoted to online application security is called OWASP, or the Open Web Application Security Project. The OWASP Top 10 is a frequently updated report that highlights the ten most important vulnerabilities to web application security. Among these 10 vulnerabilities, there exists a vulnerability called Software and Data Integrity Failures. A subset of this vulnerability is Insecure Deserialization. An object is transformed into a stream of bytes through the serialization …
Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy
Application Of Adversarial Attacks On Malware Detection Models, Vaishnavi Nagireddy
Master's Projects
Malware detection is vital as it ensures that a computer is safe from any kind of malicious software that puts users at risk. Too many variants of these malicious software are being introduced everyday at increased speed. Thus, to guarantee security of computer systems, huge advancements in the field of malware detection are made and one such approach is to use machine learning for malware detection. Even though machine learning is very powerful, it is prone to adversarial attacks. In this project, we will try to apply adversarial attacks on malware detection models. To perform these attacks, fake samples that …
Nft Artifact Prediction Using Machine Learning, Rishabh Pandey
Nft Artifact Prediction Using Machine Learning, Rishabh Pandey
Master's Projects
NFT Prediction Systems are web applications that provide their users with valuable insights about the artifact. These insights are useful for investors and collectors to make better decisions about their purchases. This project builds upon the same concept of prediction by developing a web application to dynamically provide recommendations based on user input and training an ML model to predict their cost. Preliminary work for the prediction system involved data collection, pre-processing, analysis, and filtering of large datasets from diverse sources. The project focused on the development of a user- friendly UI to enable seamless categorization of search results generated …
Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade
Spartanscript: New Language Design For Smart Contracts, Ajinkya Lakade
Master's Projects
Smart contracts have become a crucial element for developing decentralized applications on blockchain, resulting in numerous innovative projects on blockchain networks. Ethereum has played a significant role in this space by providing a high-performance Ethereum virtual machine, enabling the creation of several high- level programming languages that can run on the Ethereum blockchain. Despite its usefulness, the Ethereum Virtual Machine has been prone to security vulnerabilities that can result in developers succumbing to common pitfalls which are otherwise safeguarded by modern virtual machines used in programming languages. The project aims to introduce a new interpreted scripting programming language that closely …
Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani
Proof-Of-Stake For Spartangold, Nimesh Ashok Doolani
Master's Projects
Consensus protocols are critical for any blockchain technology, and Proof-of- Stake (PoS) protocols have gained popularity due to their advantages over Proof-of- Work (PoW) protocols in terms of scalability and efficiency. However, existing PoS mechanisms, such as delegated and bonded PoS, suffer from security and usability issues. Pure PoS (PPoS) protocols provide a stronger decentralization and offer a potential solution to these problems. Algorand, a well-known cryptocurrency, employs a PPoS protocol that utilizes a new Byzantine Agreement (BA) mechanism for consensus and Verifiable Random Functions (VRFs) to securely scale the protocol to accommodate many participants, making it possible to handle …
Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli
Machine Learning-Based Anomaly Detection In Cloud Virtual Machine Resource Usage, Tarun Mourya Satveli
Master's Projects
Anomaly detection is an important activity in cloud computing systems because it aids in the identification of odd behaviours or actions that may result in software glitch, security breaches, and performance difficulties. Detecting aberrant resource utilization trends in virtual machines is a typical application of anomaly detection in cloud computing (VMs). Currently, the most serious cyber threat is distributed denial-of-service attacks. The afflicted server's resources and internet traffic resources, such as bandwidth and buffer size, are slowed down by restricting the server's capacity to give resources to legitimate customers.
To recognize attacks and common occurrences, machine learning techniques such as …
Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik
Enhancing The Security Of Yioop Discussion Board, Prajna Gururaj Puranik
Master's Projects
Yioop is an open-source web portal that serves as a search engine and a discussion board, enabling users to create, join, and share content within groups. Data security is a critical concern for Yioop, as it involves storing and accessing user-generated data and generating statistical data. Yioop has an existing security mechanism in place, but continuous enhancements are needed to protect against potential vulnerabilities and cyber threats.
This project aims to strengthen the security of Yioop by implementing additional security measures that build upon the existing security mechanism. To prevent statistical attacks, this project extends differential privacy to mask the …
Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang
Steganographic Capacity Of Selected Machine Learning And Deep Learning Models, Lei Zhang
Master's Projects
As machine learning and deep learning models become ubiquitous, it is inevitable that there will be attempts to exploit such models in various attack scenarios. For example, in a steganographic based attack, information would be hidden in a learning model, which might then be used to gain unauthorized access to a computer, or for other malicious purposes. In this research, we determine the steganographic capacity of various classic machine learning and deep learning models. Specifically, we determine the number of low-order bits of the trained parameters of a given model that can be altered without significantly affecting the performance of …
Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton
Classifying World War Ii Era Ciphers With Machine Learning, Brooke Dalton
Master's Projects
We examine whether machine learning and deep learning techniques can classify World War II era ciphers when only ciphertext is provided. Among the ciphers considered are Enigma, M-209, Sigaba, Purple, and Typex. For our machine learning models, we test a variety of features including the raw ciphertext letter sequence, histograms, and n-grams. The classification is approached in two scenarios. The first scenario considers fixed plaintext encrypted with fixed keys and the second scenario considers random plaintext encrypted with fixed keys. The results show that histograms are the best feature and classic machine learning methods are more appropriate for this kind …
Concept Drift Detection In Android Malware, Inderpreet Singh
Concept Drift Detection In Android Malware, Inderpreet Singh
Master's Projects
Machine learning and deep learning algorithms have been successfully applied to the problems of malware detection, classification, and analysis. However, most of such studies have been limited to applying learning algorithms to a static snapshot of malware, which fails to account for concept drift, that is, the non-stationary nature of the data. In practice, models need to be updated whenever a sufficient level of concept drift has occurred. In this research, we consider concept drift detection in the context of Android malware. We train a series of Support Vector Machines (SVM) over sliding windows of time and compare the resulting …
Keystroke Dynamics And User Identification, Atharva Sharma
Keystroke Dynamics And User Identification, Atharva Sharma
Master's Projects
We consider the potential of keystroke dynamics for user identification and authentication. We work with a fixed-text dataset, and focus on clustering users based on the difficulty of distinguishing their typing characteristics. After obtaining a confusion matrix, we cluster users into different levels of classification difficulty based on their typing patterns. Our goal is to create meaningful clusters that enable us to apply appropriate authentication methods to specific user clusters, resulting in an optimized balance between security and efficiency. We use a novel feature engineering method that generates image-like features from keystrokes and employ multiclass Convolutional Neural Networks (CNNs) to …
Spam Comments Detection In Youtube Videos, Priyusha Kotta
Spam Comments Detection In Youtube Videos, Priyusha Kotta
Master's Projects
This paper suggests an innovative way for finding spam or ham comments on the video- sharing website YouTube. Comments that are contextually irrelevant for a particular video or have a commercial motive constitute as spam. In the past few years, with the advent of advertisements spreading to new arenas such as the social media has created a lucrative platform for many. Today, it is being widely used by everyone. But this innovation comes with its own impediments. We can see how malicious users have taken over these platforms with the aid of automated bots that can deploy a well-coordinated spam …
Spartan Price Oracle: A Schelling-Point Based Decentralized Pirce Oracle, Sihan He
Spartan Price Oracle: A Schelling-Point Based Decentralized Pirce Oracle, Sihan He
Master's Projects
Nakamoto’s Bitcoin is the first decentralized digital cash system that utilizes a blockchain to manage transactions in its peer-to-peer network. The newer generation of blockchain systems, including Ethereum, extend their capabilities to support deployment of smart contracts within their peer-to-peer networks. However, smart contracts cannot acquire data from sources outside the blockchain since the blockchain network is isolated from the outside world. To obtain data from external sources, smart contracts must rely on Oracles, which are agents that bring data from the outside world to a blockchain network. However, guaranteeing that the oracle’s off-chain nodes are trustworthy remains a challenge. …
Explainable Ai For Android Malware Detection, Maithili Kulkarni
Explainable Ai For Android Malware Detection, Maithili Kulkarni
Master's Projects
Android malware detection based on machine learning (ML) is widely used by the mobile device security community. Machine learning models offer benefits in terms of detection accuracy and efficiency, but it is often difficult to understand how such models make decisions. As a result, popular malware detection strategies remain black box models, which may result in a lack of accountability and trust in the decisions made. The field of explainable artificial intelligence (XAI) attempts to shed light on such black box models. In this research, we apply XAI techniques to ML-based Android malware detection systems. We train classic ML models …
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
High Performance Distributed File System Based On Blockchain, Ajinkya Rajguru
Master's Projects
Distributed filesystem architectures use commodity hardware to store data on a large scale with maximum consistency and availability. Blockchain makes it possible to store information that can never be tampered with and incentivizes a traditional decentralized storage system. This project aimed to implement a decentralized filesystem that leverages the blockchain to keep a record of all the transactions on it. A conventional filesystem viz. GFS [1] or HDFS [2] uses designated servers owned by their organization to store the data and are governed by a master service. This project aimed at removing a single point of failure and makes use …
Detecting Botnets Using Hidden Markov Model, Profile Hidden Markov Model And Network Flow Analysis, Rucha Mannikar
Detecting Botnets Using Hidden Markov Model, Profile Hidden Markov Model And Network Flow Analysis, Rucha Mannikar
Master's Projects
Botnet is a network of infected computer systems called bots managed remotely by an attacker using bot controllers. Using distributed systems, botnets can be used for large-scale cyber attacks to execute unauthorized actions on the targeted system like phishing, distributed denial of service (DDoS), data theft, and crashing of servers. Common internet protocols used by normal systems for regular communication like hypertext transfer (HTTP) and internet relay chat (IRC) are also used by botnets. Thus, distinguishing botnet activity from normal activity can be challenging. To address this issue, this project proposes an approach to detect botnets using peculiar traits in …