7
GUJARAT TECHNOLOGICAL UNIVERSITY NETWORKs of RESEARCHERs at GTU Report of Cyber Security Group Meeting on 17 th Oct-2015 Brainstorming Workshop on Research in Cyber Security Date: 17 th October, 2015 Venue: Gujarat Technological University, Chandkheda, Ahmedabad- 382424

Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

GUJARAT TECHNOLOGICAL UNIVERSITY

NETWORKs of RESEARCHERs at GTU

Report of Cyber Security Group Meeting on 17th Oct-2015

Brainstorming Workshop on Research in Cyber

Security

Date: 17th October, 2015 Venue: Gujarat Technological University,

Chandkheda, Ahmedabad- 382424

Page 2: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

Introduction:

With the visionary guidance of our honorable Vice Chancellor Dr. Akshai Aggarwal and Dr. P. K.

Srivastava, the Advisor (Research) and PG Research Center of Cyber Security, a Brainstorming

Workshop on Research in Cyber Security was organized on Saturday, 17th October-2015 at

Gujarat Technological University, Ahmedabad.The organizer was the Research Group in Cyber

Security, in association with the Open Source Technologies Club (OSTC) and GTU PG SCHOOL.

Research Groups are associated with every Research Center. Every Group is designed to involve

researchers and Faculty Members in all the Colleges in research in a hub-and-spoke model, with

the Post-graduate Research Centre working as the coordinating hub. GTU provides all the

necessary infrastructural support in addition to organizing Seminars, Workshops and Expert

Lectures, in the areas of interest to the Research Groups.

In this Brainstorming Workshop, we invited two experts Mr. Abhiilash Sonware, Senior Vice

President for Products & Technology ay Cyberoam and Mr. Hardik Upadhyay, Sr. Asst. Prof at

Gujarat Power Engineering and Research Institute for sharing their expertise in the area of

cyber security.

The presentations, given at the meeting, and the topics covered in each were as follows:

1. Intrusion Detection System on a Cloud by Mr. Mosab Shaheen student of GTU PG SCHOOL:

Difference between Intrusion Detection System and Intrusion Prevention System.

Technics for IDS Analyses

Effectiveness of IDS In Cloud

Intrusion Detection System in Cloud Computing Challenges and Opportunities

Scalable Intrusion Detection Systems Log Analysis using Cloud Computing Infrastructure

Proxy Network Intrusion Detection System for Cloud Computing

2. Deep Web by Ms. Divya Sharma student of GTU

PG SCHOOL:

Introduction to surface web and deep web

Different work engines

How search engines works

Accessing the deep web

The Onion Router (TOR)

3. CLOUDFLARE SECURITY & CDN by Mr. Ruchil Shah

on student of GTU PG SCHOOL:

What is Cloudflare

Page 3: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

How CloudFlare works at the network level

Major Attacks against CloudFlare Customers

The Evolving Landscape of DDoS Attacks

4. Security in Internet of Things (IoT) by Mr. Jay Patel, Sushil Bhojwani, Mihir Jagad students

of K. J. Institute Of Engineering & Technology, Savli.

What is IoT?

Why should we care about IoT?

Applications of IoT

Security concerns & vulnerabilities

Some examples of security threats that can be happen in IoT

Devices connected to IoT are not very secure!

Threat intelligence and business model awareness to control security for IoT

Integrating security measures into the application itself will also help control security

Managing devices and vendors will also help control security vulnerabilities in IoT

Page 4: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

5. Secure Internet of Things by Mr. Maulik Bhensdadia student of GTU PG SCHOOL:

The Secure IoT Architecture – IT plus OT! : - IT/OT integration is the end state sought by

organizations (most commonly, asset-intensive organizations) where instead of a

separation of IT and OT as technology areas with different areas of authority and

responsibility, there is integrated process and information flow.IT means information

technology and OT means Operational Technology Operational technology (OT) is

hardware and software that detects or causes a change through the direct monitoring

and/or control of physical devices, processes and events in the enterprise.

Page 5: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

6. Cloud Data Storage Security: A survey on securing Personal Health Record on cloud using

Attribute Based Encryption by Mayur Oza, Nikita Gorasia, Nishant Doshi students of

Marwadi Education Foundation’s Group of Institutions:

Introduction to Cipher Text-Attribute Based Encryption (CP-ABE):

After completion of all the presentations, Mr.Abilash Sonware del;ivered a talk on the

research activities of Cyberoam and Sophos.

The Workshop ended with certificate distribution to the participants and Mementos to the best

presentation teams of Mayur Oza, Nikita Gorasia and Nishant Doshi, students of Marwadi

Education Foundation’s Group of Institutions.

Workshop Photo Gallery

Page 6: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai
Page 7: Brainstorming Workshop on Research in Cyber Securityfiles.gtu.ac.in/circulars/15Oct/23102015_06.pdfIntroduction: With the visionary guidance of our honorable Vice Chancellor Dr. Akshai

Reports of the GTU Research Group on Cyber Security on GTU’s web-site:

1. REPORT: Google Hangout meeting on 23rd Jan 2015 available at

http://www.gtu.ac.in/circulars/15Mar/16032015.pdf

2. REPORT: Workshop on Cryptography by Mr. Deval Mehta, Head, Satellite Communication Technology Division, SAC, ISRO and Ms. Bhanu Panjwani on 6th February, 2015 at GTU PG School, BISAG at http://www.gtu.ac.in/circulars/15feb/12022015_01.pdf

3. REPORT: Workshop on 1. WEB APPLICATION VULNERABILITIES by: Dr. DEEPAK SINGH TOMAR Department of Computer Science & Engineering M.A. National Institute of Technology, Bhopal 2. SECURITY ISSUES IN WIRELESS NETWORKS by: Dr. Vrinda Tokekar Professor & Head, Department of Information Technology Institute of Engineering & Technology Devi Ahilya Vishwavidyalaya, Indore on 27th March 2015 at http://gtu.ac.in/circulars/15Apr/06042015.pdf

4. REPORT: of Brain-storming meeting of the Research group on 17th April 2015 http://www.gtu.ac.in/circulars/15Apr/28042015.pdf

5. REPORT: Workshop on Cyber Security & Cyber Crime Awareness organized by GTU’s Center for Cyber Security by Mr. Varun kapoor on 31st August, 2015 at Gujarat Technological University, Chandkheda Campus and on 1st September, 2015 at GTU PG SCHOOL, BISAG, Gandhinagar

http://files.gtu.ac.in/circulars/15SEP/04092015.pdf

6. REPORT: Google Hangout meeting on 22nd Sept- 2015 available at http://files.gtu.ac.in/circulars/15Oct/01102015_01.pdf

7. CIRCULAR: of the Brainstorming Workshop on Research in Cyber Security of Saturday, 17th October-2015 at http://files.gtu.ac.in/circulars/15Oct/05102015_03.pdf

Researchers, who want to join this Research Group may contact:

Mr. Darshan Patel (Asst. Prof) ([email protected]) Mr. Bhadreshsinh Gohil (Asst. Prof) ([email protected])