Global Navigation

 

 

List of Ongoing Projects



S. No.

Project Name

Implementation organisation/Institution

Objective/Scope

1

Design & Development of an Anti Malware solution for Web Applications and Mobiles

C-DAC Hyderabad

Design and develop Anti Malware Solution for Web Applications and Mobiles with the components : (a) security add-on for IE and Firefox browsers to address Drive-by-download attack, (b) static analysis for detecting malicious scripts, (c) memory analysis for code injections, (d) web application (PHP based) security by identifying the internal state and workflow deviations, (e) security add-on for web based malware attacks on mobile devices, (f) heuristic based binary analysis for malware detection, (g) root kit detection and (h) application control

2

A Secure Data Aggregation System and an instruction detection system for wireless sensor networks

Sardar Vallabhbhai National Institute of Technology, Surat

(a) Design, analyse and implement a secure data aggregation system for wireless sensor networks, using homomorphic encryption and (b) Design and implement a prototype intrusion detection system (IDS) based on code attestation

3

Advanced virtual environment based interactive information security training kit for advance level information security skill development

National Institute of Electronics and Information Technology (NIELIT), Gorakhpur

Enhance the existing virtual training environment to serve as integrated virtual training environment to provide advanced training at the Organizational level against targeted and real time attacks

4

Automated deduction of security & privacy threats in peer to peer networks

BITS Pilani Hyderabad, Campus

Investigate the negative impacts of P2P traffic on Network Security & develop privacy – preserving P2P detectors to mitigate these impacts

5

Design & Development of Mobile Device Security Solution

C-DAC Hyderabad

Indian Institute of Technology (IIT), Madras Chennai

Evolve reference architecture for mobile device security framework and implement for Android and Symbian operating systems

6

Development of local features & feature reduction scheme for Iris Biometrics

National Institute of Technology (NIT), Rourkela

a) Develop local and robust features for iris textures and b) develop clustering schemes to reduce features to predefined set so that they can be useful for indexing and retrieval

7

Development of Speech based multi-level authentication system

Indian Institute of Technology (IIT), Guwahati

National Institute of Technology (NIT), Silcher

and NEHU Shillong

Development and deployment of speech based multi-level person authentication system involving text independent, text-independent and voice password speaker verification systems and their judicious combination

8

Cyber Security Early Warning Framework Using Core Internet Protocols BGP & DNS

Amrita Vishwa Vidyapeetham, Kerala

Create an early warning framework and deploy it in a pilot production scale for detecting the Internet based Cyber Security threats. The framework will use sensor to collect the Domain name system (DNS) and Border Gateway Protocol (BGP) data, which will be analyzed for detecting and predicting the Interest based attacks.

9

Development of Integer Based Homomorphism Encryption Techniques with Application for Cloud Computing

JNTU, Hyderabad

(a) Explore Homomorphic Encryption Schemes to develop new Integer Based Homomorphic Encryption Techniques suitable for performing operations of encrypted data in an efficient manner and (b) Apply and test the developed techniques in Cloud Computing environment

10

Capacity building in WSN security & training

National Institute of Electronics and Information Technology (NIELIT), Srinagar

(i) Development of improved authentication protocols for WSN applications. (ii) Development of training curriculum, training material on WSN security. (iii) Conduct short-term training program in modular fashion on WSN security, for students of technical institution, research scholars and teachers

11

Development of Three-Dimension Face recognition Techniques based on range image

Jadavpur University, Kolkata

(a) Study and investigation different pre-processing techniques and investigation algorithms for 3D face images (b) Investigate the applicability of different existing classification techniques for human face recognition of 3D face images(c) Development of new algorithms based on range images for recognition of 3D face images and demonstration of a prototype system for human face recognition using those algorithms.

12

Design and Development of system for Detecting Digitized Document frauds

Indraprastha Institute of Information Technology (IIIT),Delhi

Design and develop the system for Detecting Digitized Document Frauds (DDF) in forensic context

13

Creating mass cyber security awareness among school children college student and public through appropriate training and campaign mechanism in North Eastern states

National Institute of Electronics and Information Technology (NIELIT), Delhi

(i)Developing and distributing materials in local languages to students to raise awareness(ii)conducting faculty training programs fro schools and colleges.(iii)Setting up cyber security web portal and implementation help line through the portal(iv)Organizing cyber security discussions/talks on T.V/Radio.(v)Developing and distribute audio and video CD on cyber security

14

Design & Implementation of a secure communication system for reduced complexity

National Institute of Technology (NIT), Calicut

Design and develop a secure communication system which can provide cryptographic services of key exchange, data integrity verification and data confidentiality with low hardware complexity and power consumption

15

Development of Network Traffic Classification Based Approach for Detection

Gauhati University, Gauhati

Develop a network traffic classification based approach to detect botent. It will involve (i)analysis of network traffic and identification of sets of nodes that are potential botnet using a graph based approach. (ii) Detection of sets of nodes that make up botent using mining based network traffic classification techniques

16

Analyzing and Measuring Trustworthiness of User-Garneted Content and Users on Multiple Online Social Media to Counter cybercrime

Indraprastha Institute of Information Technology (IIIT), Delhi

Use machine learning techniques to analyze and measure trustworthiness of contents generated and user profiles on multiple online social media(Twitter,Facebook,Google+, and Youtube) (ii)develop a framework to collect data from Twitter,Facebook,Google+, and Youtube and merge the data together from these sourceto carry out analysis and correlations for crime analytics on events of importance

17

Multi-Model Broadcast Analytics-Structured Evidence Visualization for Events of security concern

Indian Institute of Technology (IIT), Guwahati

Development of Integrated Multi-Modal Broadcast Analytics System comprising(a) Multi-modal content analysis of news websites and television news channel broadcast by text mining,video analytics and (available)speech/audio-video segments related to events of security concern(c) Design of an ontologically motivated and structured representation of event Knowledge base to index multi-modal evidences (text/audio/video) and (iv) Development of a Knowledge base interfacing system for structured evidence visualization and alerting

18

Implementation and Analysis of a quantum key distribution protocol for network security

Assam University-Silchar

a) Implementation and analysis through simulation of existing QKD protocol (BBM92 protocol) and study its feasibility to use in practical environment (b) Study of practical security concern of eavesdropper attack to the protocol.

19

Establishment of Cyber security and forensic Training facility for technical teacher training

National Institute of Technical Teachers Training & Research (NITTTR), Chandigarh

(a) Organize the training and awareness programmes for the technical (Polytechnic and Engineering) teachers, (b) Organize practical workshops for technical staffs of polytechnics and engineering colleges and (c) Establishing cyber forensic training facility for providing hands on training

20

To deliver the information security assurance framework with implementation and assessment aids for users implementing e-governance projects

Management Development Institute (MDI), Gurgaon

To deliver the information security assurance framework with implementation and assessment aids for users implanting e-Governance projects.Specically, the scope of assignment will include the following: (a) Standardize and automate criteria for categorization of assets incl. information and information systems according to the risk level and recommend security controls and assurance requirements for different category of information systems in line with the requirements of e-Gov(b) Test the framework in 2-3 pilot sites to refine and improve(c) Suggest mechanisms to ensure oversight, continuous compliance and monitoring

21

Development of face recognition system for vending large database and Development of advanced techniques for video enhancement

CDAC ,Kolkata

(a) Development of Advanced Techniques for Video Enhancement (b) Enhancement of the capability of already developed automatic face recognition system to handle large facial database with size of 100000 faces

22

Design and Development of an Online Information Security Metrics Tool

Jadavpur University, Kolkata

(a) Development and Implementation of an Online Information Security Metrics Tool for real-time analysis and measurement, and near-real-time alert generation for Operational and Compliance issues. (b) Enhancement of WISSDOM2 (“Web-service based Information System Security Design and Operational Management”) Tool Suites (WISSDOM2-Egov and WISSDOM2-Telecom) by incorporating user feedbacks and upcoming Standard, namely ISO/IEC 27001:2013 and 27002:2013. (c) Re-design of WISSDOM2-Banking as per requirement of IDRBT based on ISO 27015 standard and the Information Security framework published by IDRBT

23

Development of an Intelligent adaptive video monitoring and recording system

Indian Institute of Technology (IIT), Madras

(a) Development and enhancement of existing algorithms for detection and tracking of humans, and extraction of faces in high-resolution in semi crowed scenes (b) Development of appropriate protocols and software for transmission and storage of such extracted images and videos in appropriate compression formats

24

Design Development and Enhancement of Cyber Forensics tools

C-DAC, Thirvannanthapuram

Enhancement and refining of existing tools (Cyber Check, Mobile Check, Enterprise Forensics System, Network Session Analyzer, Cyber Investigator, WinLift, CDR Analyzer, Multilingual Search Tool, Image Forensics Tool, MobileXtractor) with features incorporating technology advancement and requirements from Law Enforcement Agencies (LEAs).

25

Development of Tool for Detection of XML Based Injection Vulnerabilities in Web Applications

National Institute of Technology (NIT), Surathkal

Develop a tool for detection of XML based injection vulnerabilities in web applications. The prototype tool will

be demonstrated with the help of a web application

 


Content owned & provided by Department Of Electronics & Information Technology, Government Of India

Page last updated on October 31, 2014
  • Site Counter: 870,577