(KALASALINGAM ACADEMY OF RESEARCH AND EDUCATION) IN ASSOCIATION WITH NATIONAL CYBER DEFENCE RESEARCH CENTRE (A RESEARCH INSTITUTION CONTROLLED BY NATIONAL CYBER SAFETY AND SECURITY STANDARDS)(AN AUTONOMOUS BODY)(CYBER FORENSICS)
Establishment:
- Year of Establishment : March 2015
- Total Investment of the Lab : Rs 23,00,000/-
Vision:
- To become an Excellent Nodal Centre in Training and Research in the field of Cyber Security and Forensics.
Mission:
- To identify and implement efficient and effective standards and technologies for securing data against cyber threats and to provide information to the right person in order to build trust among intelligent group.
About the Centre:
- This centre focuses on building Science and Engineering foundations for Cyber Security and Forensics. Today, Research and Development explore to make systems more secure. The Cyber Defender Programme creates a pipeline of qualified candidates in Cyber Security and Forensics to address homeland security needs. This centre enables mentors and students to acquire practical experience in computer systems, network operations and information protection to encounter cyber threats.
Goals:
- To create awareness among Faculty members, Research Scholars and students in the field of Cyber Security and Forensics.
- To propose and to conduct Post Graduate Programme-M.Tech on “Cyber Security and Forensics”.
- To organize workshops, training programmes, seminars, conferences and International certifications on Cyber Security and Tools for Cyber Forensics in order to enrich stakeholders’ knowledge.
- To study and analyze typical cases in computer, mobile and network forensics and subsequently design and develop digital solutions in terms of architecture and prototype.
- To evolve as a collaborative research centre between the institute and industry.
Total No of Systems : 12 Nos.
Sl.No | System Configuration/Equipments | No.of Systems |
---|---|---|
1 | Server: IBM X3650M4 /2U RACK SERVER / 2 X Intel Xeon E5 2650 V2 (QUAD CORE) / 2.5 GHz / 10 MB L3 CACHE / 133 Mhz / 128 GB Memory / 2 x 500 GB sas@2.5” HDD plus 6 X 1 TERA BYTE SAS HARD DISK / RAID 5 CARD – M5110 E CARD / DVD WRITER / 3 YEARS ON- SITE + 24 * 7 | 1 No |
2 | Systems: Intel Core i5 (4590s) 4th Gen Processor,Intel H81 Chipset Mother Board, 8GB ddr3 @ 1600 MHz Ram, 1 TB @7200Rpm SATA Hard Disk Drive/Keyboard/Optical Mouse/DVD Writer Gigabit Ethernet Card/mini Tower Cabinet | 9 No’s |
3 | Mac mini (Apple PC) with LED monitor (18.5”) | 1 No |
4 | Apple MGX72HN/A 13-inch Laptop Model (Core i5, 8GB,Mac OS X Mavericks, Intel Iris Graphics), 128 GB Hard drive with Apple MD463ZM/A Thunderbolt to Gigabit Ethernet Adapter | 1 No |
Major Softwares:
- Encase Forensic Edition 7
- WinHex / X-Ways Forensics 18.1
- Ultimate Forensic Bundle
- DS7
- P2C4
- P2X pro
- DS Tool Kit
- Forensic Replicators
Library:
Sl.No | Book Title | Author | Price in Rs. |
---|---|---|---|
1 | Digital Forensics with Open Source Tools | Cory Altheide, Harlan Carvey | 3155.00 |
2 | Guide to Computer Forensics and Investigations | Nelson | 484.00 |
3 | The Art of Memory Forensics: Detecting Malware and Threats in Windows, Linux and Mac Memory | Michael Hale Ligh | 849.00 |
4 | Incident Response & Computer Forensics | Jason T. Luttgens | 2888.00 |
5 | Computer Forensics and Digital Investigation with EnCase Forensic v7 | Suzanne Widup | 2473.00 |
6 | The Web Application Hacker’s Handbook: Finding and Exploiting Security Flaws | Dafydd Stuttard | 8223.00 |
7 | Hacking: The Art of Exploitation 2e | Jon Erickson | 2439.00 |
8 | The Basics of Hacking and Penetration Testing: Ethical Hacking and Penetration Testing Made Easy | Patrick Engebretson | 3753.00 |
9 | Encyclopedia Of Cryptography and Security | Henk C.V Tilborng | 4798.00 |
10 | Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management | Christopher Steel | 3028.00 |
11 | ASP.NET 4.0 Projects: Covers .NET 3.5 and .NET 4.0 Codes, Black Book | Kogent Learning Solutions Inc. Dreamtech | 480.00 |
12 | The Hacker’s Guide to Python | Julien Danjou | 3769.00 |
Training Programmes From 2015 to 2017
Sl.No | Date | Name of the Program | Resource Persons |
---|---|---|---|
1 | Sep 27-28, 2017 | DIG-FOR-ART ‘ 17 (Digital Forensics Artifacts) |
Mr. Ashok Kumar Mohan Research Associate, TIFAC CORE-Cyber Security, Amrita Vishwa Vidyapeetham University,Coimbatore. |
2 | June 01-30, 2017 | Summer Internship Scholars June-2017 | Dr K.Suthendran /Asso. Prof /IT In-Charge Cyber Forensics Lab |
3 | Mar 17,2017 | National Conference on Information, Communication and Cyber Security | Dr. R.Mohan, Assistant Professor, Department of Computer Science and Engineering, National Institute of technology, Trichy. |
4 | Feb 10-11,2017 | Honeypot & Deception technologies and cyber warfare | Dr. Daniel Singh, PhD., Chief Information Security Officer (CISO), TechNGeeks LLC, USA |
5 | December 30-31, 2016 | National Workshop on Cyber Security | Mr. SAI SATHISH, CEO, Indian Server.com |
6 | Oct 15, 2016 | Mission Cyber Security | Mr.Shankar kumar Lead Consultant, ITC InfoTech, Bangalore. |
7 | Sep 3, 2016 | Guest Lecture:Journey to the Cloud-A Practitioner’s Perspective |
Mr. Satish Viswanathan Vice President- Products, NxtGen Datacenter & Cloud Technologies Pvt Ltd, Bangalore. |
8 | Aug 22, 2016 | Guest Lecture: Attribute based secure document Access from a public cloud |
Dr.P.VIJAYAKUMAR, Dean, University College of Engineering, Tindivanam. |
9 | Aug 13, 2016 | Cyber Forensic Tool: Ultimate Forensics Bundle |
Mr. Ashok Kumar Mohan Research Associate, TIFAC CORE-Cyber Security, Amrita Vishwa Vidyapeetham University, Coimbatore. |
10 | July 12 to Oct 20, 2016 | Training on Cyber Forensic Tool: Ultimate Forensics Bundle (CSE/IT) |
Mr.B.Suresh, Research Scholar Department of Information Technology Kalasalingam Academy of Research and Education |
11 | June 15, 2016 | Technical Discussion on Cyber Threat Research & Analysis |
Mr.M.Satheesh Kumar, National Engineering College, Kovilpatti. |
12 | June 01 to July 03, 2016 | Summer Internship Scholars June-2016 |
Dr K.Suthendran /Asso. Prof /IT, Kalasalingam Academy of Research and Education |
13 | May 28, 2016 | Cyber Forensic Tool: Ultimate Forensics Bundle |
Mr. Ashok Kumar Mohan, Research Associate, TIFAC CORE-Cyber Security, Amrita Vishwa Vidyapeetham University, Coimbatore. |
14 | Feb 29 to Mar 01, 2016 | Cyber Forensic Tool: Win Hex 18.1 |
Mr. Ashok Kumar Mohan, Research Associate, TIFAC CORE-Cyber Security, Amrita Vishwa Vidyapeetham University, Coimbatore. |
15 | Feb 19, 2016 | Training Programme on Cyber Tools |
Mr. Vikram & Mr. Sachin Representatives-NCDRC, Chennai. |
16 | Feb 5-6, 2016 | National Conference on Information, Communication and Cyber Security |
Felicitation-Dr.S.Arumugam,Dean R&D and Director-N cardmath,KLU Profile of the chief guest(Dr. C. Chellappan), Chief guest profile(Dr. Karthiga) |
17 | Jan 8, 2016 | An Industrial Lecture on “Cyber Security “ |
Shri .S.Thiagarajan Registrar, Society for Electronic Transactions and Security (SETS) Chennai |
18 | Dec 5, 2015 | Cyber Tools demonstration |
Mr. Ashok Kumar Mohan Research Associate,TIFAC CORE-Cyber Security, Amrita Vishwa Vidyapeetham University, Coimbatore. |
19 | 4th & 5th Sep2015 | Software Forensics | Mr. Rex Aantonny.P Rex Cyber solutions, Chennai. |
20 | 27th May2015 | Ultimate Forensics Bundle | Mr. Naveen Kumar Singh, Assistant Technical Manager. Cyint Technologies, New Delhi |
21 | 15,16th April2015 | Ultimate Forensics Bundle | Mr.J.Mohanraj,Cyint Technologies, New Delhi |
22 | 11th April2015 | Encase V7 and WinHex / X-Ways Forensics 18.1 Software Training | Mr. Rex Aantonny.P & Mr. Illyas, NCDRC |
23 | 24th & 25th March 2015 | Encase V7 portable and Encase V7 Forensic Edition tool | Mr.P.Nirmal Jose ,Sr.Forensic Consultant , Lab Systems (I) Pvt Ltd, Mumbai |
- WinHex / X-Ways Forensics 18.1,
- Ultimate Forensic bundle,
- Software Forensics.
Training for Placement in Security domain:
Name of the Trainer : Mr. Ashok Kumar Mohan,
Research Associate,
TIFAC CORE in Cyber Security,
Amrita Vishwa Vidyapeetham,Coimbatore.
Sessions handled : Cyber Forensics, Ethical Hacking, Network Security,OWASP secure coding.
Students got placed in Paladion Networks Pvt Ltd,49,2nd Floor, Shilpa Vidya, I st Main, JP Nagar 3 rd Phase,Bangalore-560078.
Sl.No | Name of the student | Year/Department |
---|---|---|
1 | AKILA.C | IV – CSE |
2 | DHANYA.M | IV – CSE |
3 | MOHAMEDAASIK S | IV – CSE |
4 | MUTHU BALA GURU K | IV – CSE |
5 | RAMA PRIYA R | IV – CSE |
6 | KARTHIGA.P | IV – ECE |
7 | LAKSMI PILLAI.C | IV – ECE |
8 | MANJU SHREE.V | IV – ECE |
9 | PREETHA XAVIER | II – M.Tech(IAS) |
Summer Internship Scholars July-2017
Duration: From 1stJune 2017 To 30 thJuly 2017
Sl.No. | Name of the Participant | Year/Dept. | Institution | Project Title |
---|---|---|---|---|
1 | VAJITHA MEERA.T | III/ BE (ECE) | National Engineering college, Kovilpatti |
Effective NIDS using classification algorithms |
2 | ARANI.T | III/ BE (CSE) | Erode Sengunthar Engineering college, Erode |
Effective NIDS using classification algorithms |
3 | SIVASANGARI. V | I/ M.Tech.(Cyber Security) |
Amrita Vishwa Vidyapeetham (Amrita University) Coimbatore |
Social Media Forensics: Sensing Malicious User Behaviour. |
Summer Internship Scholars June-2016
Duration: From 1stJune 2016 To 3 thJuly 2016
Sl.No. | Name of the Participant | Year/Dept. | Institution | Project Title |
---|---|---|---|---|
1 | ALDA AGNES GOMARY | II/ MSC [CS &IS] | Indian Institute of Information Technology Management- Trivandrum- Kerala | EFFICIENT IDS AGAINST DDOS ATTACK USING CLASSIFICATION ALGORITHM |
2 | GAYATHIRI.K.S | IV/BE [ECE] | M.Kumarasamy College of Engineering(Autonomous | EFFICIENT IDS AGAINST DDOS ATTACK USING CLASSIFICATION ALGORITHM |
3 | OSHIN JUDINA MARY.R | IV/BE [ECE] | National Engineering College, Kovilpatti, TamilNadu | EFFICIENT IDS AGAINST DDOS ATTACK USING CLASSIFICATION ALGORITHM |
Theme of the year 2015-2016: Online Scams
Titles:
1) Phishing
2) Banking Scams
3) Lottery Scams
4) IPR and Piracy Scams
5) Social Media Scams.
Details of Ph.D Scholars:
In Progress:
Sl.No | Name of the Student | Research Topic | Year of Registration | Supervisor |
---|---|---|---|---|
1 | Ms. B. MUTHULAKSHMI (Reg. No: 201406117) |
Cyber Security in Cloud computing | August 2015 | Dr M.Venkatesulu |
2 | Mr. M. RAVI(Reg. No: 201406118) | Cyber Security in Cloud computing | August 2014 | Dr M.Venkatesulu |
3 | Ms. A.DIANA(Reg. No: 201507142) | Resiliency In Cyber Security Against APT | August 2015 | Dr K.Kartheeban |