Sumanth Dodda's repositories
Intrusion-Detection-System-based-on-anomaly
Digital assaults assurance or discovery is by and by among the most testing research subjects of data security, while dramatically expanding in number of close to nothing, remote based associated gadgets ready to send individual data to the Web it is sitting idle yet causing the fight between the included individuals. Thus, this assurance gets significant with ordinary Internet of Things arrangement, as it oftentimes incorporates numerous IOT based information assets speaking with actual world inside the different application spaces, similar to horticulture, medical care, home computerization, and so on Lamentably, contemporary IoT based gadgets frequently offer an extremely restricted security determinations, exposing themselves to always new and more confounded assaults and furthermore hindering anticipated worldwide selection of the IoT innovations, also the great many the IoT gadgets previously delivered with no equipment security uphold. In this unique circumstance, it is fundamental to improve devices which can identify such digital assaults Interruption location is the way toward observing the functions happening in a PC framework or network and investigating them for indications of interruption. It expects to ensure the privacy, honesty, and accessibility of basic arranged data frameworks. Interruption location framework (IDS) is a framework that assembles and investigates data from different regions inside a PC or an organization to distinguish assaults made against these parts. The IDS utilizes various conventional strategies for checking the misuses of weaknesses. Present day, airplanes are made sure about by solid and wellbeing properties, prepared administrators, measure based safety efforts. Be that as it may, considering late development in the inflight administration towards the expanded network, the asset sharing and progressed amusement functionalities, along with increment of dangers focusing on installed frameworks, the possible malignant alteration of an airplane framework must be truly considered for future frameworks. In this specific circumstance, numerous arrangements can be produced for airplane security. Specifically, Host based Intrusion Detection Systems are appropriate to manage the focused on dangers like an insider-assault Intrusion detection systems are almost absolutely necessary in all types of networks to provide protection from intruders. Intrusion detection systems (IDS) have to process a lot of packets to detect any intrusion which causes a delay in detection and mitigation. A host-based IDS with rule structure generation and pattern matching algorithm sets the rule structure for the unknown attack by using association rule mining in the map reduce framework. It occurs in two different stages. An intellectual method is used to generate an efficacious rule in the first stage and a pattern matching algorithm is brute forced in the second stage of this proposed framework. Log reviewing and auditing is required to find any malicious activity. Windows is the most popular operating system in the world for personal computing needs. So, there are a large number of attacks happening every day on these systems and the built-in signaturebased detection methods are not suitable for detection of zero-day and stealth attacks. Intrusion based system based on anomaly Unfortunately, a comprehensive dataset that can identify surface operations and attacks are not available. To solve this, we are going to use Australian Defense Force Academy Windows Data Set with a Stealth Attacks Addendum (ADFA-WD: SAA). To make use of this dataset a highly intelligent host based intrusion detection system is required
Binding-payload-within-images
The aim of this project is to explore the hypothesis of a computer virus threat, and how destructive it can be if executed on a targeted machine. What are the possible counter measures to protect computers from these threats? Information security risks associated with computer viruses can infect computers and other storage devices by copying themselves into a file and other executable programs. These files get infection and allow attackers to connect to target systems by using backdoors. The results of this project show that, the proper security implementations and the use of up to date operating systems patches and anti-virus programs helps users to prevent the loss of data and any viral attack on the system. Nevertheless, this observation could be used for further research in the network security and related fields; this study will also help computer users to use the possible steps and techniques to protect their systems and information from any possible attacks on their network systems.
Deauth-Attack
Its a basic de-authentication WiFi attack automation Script
Prep-Notes
This is my personal notes for every shit i learn, feel free to use it :)
Data-Cleansing-Tool
Metadata consist of information that characterizes data. Metadata are actually used to provide the documentation for the data products. In the essence the metadata can answer: who, what, when, where, why, and also how about every facet of data that are being documented in a machine. Metadata within a file type(can be anything) can actually tell a lot about you. Cameras can record the data about when a picture was taken and also what camera was used at the time. Office documents which are: PDF or Office automatically adds the author and the company info to the documents and also the spreadsheets. Maybe you don't want to disclose those information. That is when this data cleansing tool comes into picture . you can have all the metadata of the documents you share either randomized, anonymized or even both. This tool essentially focuses on the location, source of the data anonymization. There are many notable drawbacks to Exif metadata. The most challenging drawback is ease in which data can be manipulated and lack of audit methodology for tracking the changes to metadata. Much of media source material found on Internet will contain a very little metadata. Practically all of social networking sites now routinely strip the metadata from images that are uploaded to their websites. original reason for removing the metadata is that the Internet trolls and the stalkers were harvesting the GPS data from the images of the celebrities and the officials to determine their travel habits and then also intercepting them at the expected locations.
Fingerprint-Encryption-using-AES-algorithm
Mini project for Cryptography
Trust-Models-Dos-Attacks-on-E-Government-Services
With the growth of internet and availability of internet, government services have also taken up an online path to serve the people better. E-government services provide greater efficiency than a normal office method, this way people can look up their info or process their query without waiting for much time at the office for the people over there to fetch their records. With the growth of these services their security is also a major problem to be dealt with. Any server accessible to the public will be attacked at some point or the other by an attacker. there will be some people that misuse them or exploit these services that are present in cloud servers or standalone servers for their own benefits or just for fun. One of the most common attacks on services like these is Denial of service attack. In denial of service attack the attacker sends unwanted traffic towards the server or some command to make the system crash. Attacker abuses the systems so that other people can’t access the resources present on these systems. To provide security to these systems we have thought about using a trust model that categorizes the users into trustable or not trustable. A lot of Trust models have been published in the past years for various other use cases, we chose some features from them to fit our use case in the best way possible.
Two-factor-authentication-using-face-and-speech-recognition-for-Online-Database
The main purpose of this project is to develop an application interface or software application for managing real estate database helpful for real estate agencies and companies. Even though some technology is developed and available, most real estate companies are still using the traditional way to manage and store data like using documents or storing it in either files or excel sheets. Maintaining these documents and accessing it is difficult and most of the time, the documents are lost or damaged. So, it would be better if the humungous data is stored using software rather as it is easy to access and we can also use the data efficiently between clients and agents A database administrator needs to access the management system to keep monitoring it. Usage of passwords is not a totally secure way of keeping the unwanted people out of the system. A lot of people re use the passwords that they have used on other systems or accounts. In such cases even if a password is strong enough it can’t be trusted to keep the system safe from any intruder, potentially compromising the database security due a weak external software and the failure of the administrator to maintain separate passwords for different purposes. In such scenarios biometric authentication systems have been proven to be very useful. With the increase in the average computation power of computers, running a pre trained basic AI program is a very simple and trivial task. With the computation power being available, running an AI program that can act as an authentication program is a very feasible alternative. In our proposed model we are going to use a hybrid model that uses both the speech of a person and face data of a person to identify them and give access to them. Our model will use AI to identify users even in case of minor changes in their face or speech. We can implement this authentication on any database but we are going to implement it on Blood Donation Management System. The principle point of building up this framework is to give blood to the general population who need blood. The quantity of people who need blood are expanding in huge number step by step. Utilizing this framework client can seek blood gather accessible in the city and he can likewise get contact number of the benefactor who has a similar blood assemble he needs. Keeping in mind the end goal to help individuals who need blood, this Online Blood Bank administration framework can be utilized viably to get the points of interest of accessible blood gatherings and client can likewise get contact number of the blood benefactors having a similar blood gathering and inside a similar city. So, if the blood amass isn't accessible in the blood donation center client can ask for the contributor to give the blood to him and spare somebody life. Utilizing this bank administration framework individuals can enrol himself or herself who need to give blood. To enlist in the framework, they need to enter their contact data like location versatile number and so forth.
Adding-Syscalls-in-XV6
It is an operating system based on linux kernel developed by MIT which is written in C and Assembly language and mainly it is an open source project which is free for everyone to modify and it is monolithic layered(entire operating system works in the kernel space) and it also has been deployed into many secure phones in China Here,We are going to add a system call in to our XV6 operating system which is based on linux kernal and XV6 is an operating system and we are going to explain the process of adding a systemcall in our kernal in detail and commands requires for adding a system call in our kernel
fibonacci-docker
This is a complex multi-tiered docker application in the process of learning docker technologies
fibonacci-kubernetes
Docker to kubernetes
handwriter
text-to-handwriting with OCR!
react-docker
A short docker experiment on native create-react app and showing different variations between npm build and npm test
register
Grab your own sweet-looking '.is-a.dev' subdomain
Sub-Set-Problem
In this presentation, Subset Sum problem (Non Polynomial Complete problem) and analysis of its two solutions is discussed. These solutions are the Dynamic Solution algorithm and the Back Tracking algorithm. Dynamic Solution is a sound and complete algorithm that can be used to determine satisfiability and unsatisfiability with certainty. Backtracking also finds the satisfiability but will have a time complexity of exponential degree. In addition, analogy between these two algorithms and two other algorithms namely PL-Resolution and Walk-Sat algorithms for 3-CNF SAT problem, which is also NPC problem is discussed.
website
Personal Website for the future amigos
wtflinux
wtf!_linux: where's the food?