KALASALINGAM UNIVERSITY(KALASALINGAM ACADEMY OF RESEARCH AND EDUCATION) IN ASSOCIATION WITH NATIONAL CYBER DEFENCE RESEARCH CENTRE (A RESEARCH INSTITUTION CONTROLLED BY NATIONAL CYBER SAFETY AND SECURITY STANDARDS)(AN AUTONOMOUS BODY)(CYBER FORENSICS)

Establishment:

  • Year of Establishment : March  2015
  • Total Investment of the Lab   : Rs 23,00,000/-

Vision:

  • To become an Excellent Nodal Centre in Training and Research in the field of Cyber Security and Forensics.

Mission:

  • To identify and implement efficient and effective standards and technologies for securing data against cyber threats and to provide information to the right person in order to build trust among intelligent group.

About the Centre:

  • This centre focuses on building Science and Engineering foundations for Cyber Security and Forensics. Today, Research and Development explore to make systems more secure. The Cyber Defender Programme creates a pipeline of qualified candidates in Cyber Security and Forensics to address homeland security needs. This centre enables mentors and students to acquire practical experience in computer systems, network operations and information protection to encounter cyber threats.

Goals:

  • To create awareness among Faculty members, Research Scholars and students in the field of Cyber Security and Forensics.
  • To propose and to conduct Post Graduate Programme-M.Tech on “Cyber Security and Forensics”.
  • To organize workshops, training programmes, seminars, conferences and International certifications on Cyber Security and Tools for Cyber Forensics in order to enrich stakeholders’ knowledge.
  • To study and analyze typical cases in computer, mobile and network forensics and subsequently design and develop digital solutions in terms of architecture and prototype.
  • To evolve as a collaborative research centre between the institute and industry.

Total No of Systems   : 12 Nos.


Sl.No System Configuration/Equipments No.of Systems
1 Server: IBM X3650M4 /2U RACK SERVER / 2 X Intel  Xeon E5 2650 V2 (QUAD CORE) / 2.5 GHz / 10 MB L3 CACHE / 133 Mhz / 128 GB Memory / 2 x 500 GB sas@2.5” HDD plus 6 X 1 TERA BYTE SAS HARD DISK / RAID 5 CARD – M5110 E CARD / DVD WRITER / 3 YEARS ON- SITE + 24 * 7 1 No
2 Systems: Intel Core i5 (4590s) 4th Gen Processor,Intel H81 Chipset Mother Board, 8GB  ddr3 @ 1600 MHz Ram, 1 TB @7200Rpm SATA Hard Disk Drive/Keyboard/Optical Mouse/DVD Writer Gigabit Ethernet Card/mini Tower Cabinet 9 No’s
3 Mac mini (Apple PC) with LED monitor (18.5”) 1 No
4 Apple MGX72HN/A 13-inch Laptop Model (Core i5, 8GB,Mac OS X Mavericks, Intel Iris Graphics), 128 GB Hard drive with Apple MD463ZM/A Thunderbolt to Gigabit Ethernet Adapter 1 No

Major Softwares:

  • Encase Forensic Edition 7
  • WinHex / X-Ways Forensics 18.1
  • Ultimate Forensic Bundle
    • DS7
    • P2C4
    • P2X pro
    • DS Tool Kit
    • Forensic Replicators

Library:


Sl.No Book Title Author Price in Rs.
1 Digital Forensics with Open Source Tools Cory Altheide, Harlan Carvey 3155.00
2 Guide to Computer Forensics and Investigations Nelson 484.00
3 The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory Michael Hale Ligh 849.00
4 Incident Response & Computer Forensics Jason T. Luttgens 2888.00
5 Computer Forensics and Digital Investigation with EnCase Forensic v7 Suzanne Widup 2473.00
6 The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws Dafydd Stuttard 8223.00
7 Hacking: The Art of Exploitation 2e Jon Erickson 2439.00
8 The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy Patrick Engebretson 3753.00
9 Encyclopedia Of Cryptography and Security Henk C.V Tilborng 4798.00
10 Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management Christopher Steel 3028.00
11 ASP.NET 4.0 Projects: Covers .NET 3.5 and .NET 4.0 Codes, Black Book Kogent Learning Solutions Inc. Dreamtech 480.00
12 The Hacker’s Guide to Python Julien Danjou 3769.00


Sl.No Date   Name of the Program Resource Persons
1 24th & 25th  March 2015 Encase V7 portable and Encase V7 Forensic  Edition tool Mr.P.Nirmal Jose ,Sr.Forensic Consultant ,
Lab Systems (I) Pvt Ltd, Mumbai
2 11th April2015 Encase V7 and  WinHex  / X-Ways Forensics 18.1 Software Training Mr. Rex Aantonny.P &
Mr. Illyas,
NCDRC
3 15,16th April2015 Ultimate Forensics Bundle Mr.J.Mohanraj,Cyint Technologies,
New Delhi
4 27th May2015 Ultimate Forensics Bundle Mr. Naveen Kumar Singh, Assistant Technical Manager.
Cyint Technologies,
New Delhi
5 4th &  5th Sep2015 Software Forensics Mr. Rex Aantonny.P
Rex Cyber solutions,
Chennai.

  • WinHex / X-Ways Forensics 18.1,
  • Ultimate Forensic bundle,
  • Software Forensics.

Training for Placement in Security domain:

Name of the Trainer  : Mr. Ashok Kumar Mohan,
Research Associate,
TIFAC CORE in Cyber Security,
Amrita Vishwa Vidyapeetham,Coimbatore.

Sessions handled : Cyber Forensics, Ethical Hacking, Network Security,OWASP secure coding.

 Students got placed in  Paladion Networks Pvt Ltd,49,2nd  Floor, Shilpa Vidya, I st Main, JP Nagar 3 rd Phase,Bangalore-560078.


Sl.No Name of the student Year/Department
1 AKILA.C IV – CSE
2 DHANYA.M IV – CSE
3 MOHAMEDAASIK S IV – CSE
4 MUTHU BALA GURU K IV – CSE
5 RAMA PRIYA R IV – CSE
6 KARTHIGA.P IV – ECE
7 LAKSMI PILLAI.C IV – ECE
8 MANJU SHREE.V IV – ECE
9 PREETHA XAVIER II – M.Tech(IAS)

Theme of the year 2015-2016: Online Scams

 

Titles:

1) Phishing

2) Banking Scams

3) Lottery Scams

4) IPR and Piracy Scams

5) Social Media Scams.

Details of Ph.D Scholars:

In Progress:


Sl.No Name of the Student Research Topic Year of Registration Supervisor
1 Ms. B. MUTHULAKSHMI
(Reg. No: 201406117)
Cyber Security in Cloud computing August 2015 Dr M.Venkatesulu
2 Mr. M. RAVI(Reg. No: 201406118) Cyber Security in Cloud computing August 2014 Dr M.Venkatesulu
3 Ms. A.DIANA(Reg. No: 201507142) Resiliency In Cyber Security Against APT August 2015 Dr K.Kartheeban