• Aditi Awasthi
    B.M.S. College Of Engineering, Bengaluru

    I am an undergraduate Computer Science student from B.M.S. College Of Engineering. My areas of interest include Cyber Security, Network Analysis and Data Science. I also enjoy competitive programming.

    PROJECT: Log Analysis System

    The main idea behind my project is to provide the administrator overseeing a server a smooth interface to view and analyze the traffic that the server is receiving and to present a concise overview of different details i.e. how many different clients access it, from which locations around the world and other statistics. The tool is capable of identifying a fairly good percentage of malicious attacks like SQL injection and cross-site scripting attempted by the clients and
    reports them to the admin in a meaningful fashion.

  • R. Akashraj
    MIT, Manipal

    Bio: I am a third year student from MIT Manipal. My primary interests lie in Cyber Security, within which I mostly associate myself with Network Analysis and Web Penetration Testing. But I am working towards expanding my purview to other sectors like Honeypots, Firewalls etc.

    Currently, I am working on a Threat Intelligence System which will help us monitor attackers along with the ability to analyse their modus operandi.

    The project has two primary objectives 
    · Near real time centralized monitoring of both insider and external cyber-attacks on cyber assets of critical infrastructure.
    · Design and Development of a centralized security information and event management application

    I am responsible for the conversion of the collected data into a meaningful manner and present it to the layman such that he/she might recognize and be aware of threats oriented in cyber space.

  • Devanshu Mishra
    R.V. College Of Engineering

    I am a sophomore at R.V. College Of Engineering. My primary interest lies in Artificial Intelligence, and I am currently associated with Machine Learning and Data Science. But I am also working towards expanding my purview to other sectors of AI like Deep learning,  Artificial Neural Networks and its mathematical part comprising Linear Algebra, Probability and Statistics. Currently, I am working on Security of Cyber-Physical Systems(CPSs) from both Cyber and Physical attacks by identifying attacks vs non-attacks using Machine Learning Algorithms.

    The project has the following objectives:

    • Design and evaluate novel defense mechanism for CPSs
    • Test mathematical models
    • Evaluate the performance of formal models of CPSs
  • Mohammed Israil
    Gandhi Engineering College, Odisha

    Bio: I am an undergraduate Computer Science Engineering student from Gandhi Engineering College, Odisha. By day am a full-time student and at night am an Ethical Hacker and a Cyber Security Researcher. Till yet worked and acknowledged by more than 100+ companies, most of counted from Silicon Valley.

    Area of Interest: VAPT (Vulnerability Assessment and Penetration Testing ). Basically, at C3I center am testing the security vulnerabilities of the SCADA systems.

  • Rishav Chatterjee
    KIIT University

    Bio: I am an undergraduate student (B.tech in Computer Science Engineering) of KIIT University, who loves to peek into various domains of Computer Science. My research interests include Cryptography, Blockchains, Image Processing and Machine Learning.

    Abstract: In this Internship we aim to look at the double spending problem in the Indian land registration. Looking closely we find that Indian land records are not properly maintained, and are not publicly available. All verification has to be done at the registrar office. Also, if the officer at the Registrar office is corrupt, he may validate an otherwise invalidated registry. We aim to use Blockchain for this purpose. 

    We have used Permissioned Blockchains (HyperledgerBlockchain) as a framework to implement this entire thing. Blockchain technology will eradicate the insecurity and injustice that are part of these land registries. Ownership Management will be taken care of, since the ledger is immutable. The shared ledger technology would bring trust among its members in the network. Hyperledger would ensure utmost security of the transactions between the parties. It has layers of authentication and verification checks and it make sure that none among them turns out to be malicious. The first part of the project consists of the developing the merkle tree with n number of leaf nodes and each district of a state would have a tree in order to maintain a copy of the operations, which are being done. Each level of the tree would undergo checks to verify the hashes and they are computed against the "record" or the "document". We are keyless singature scheme of KSI Blockchain in order to strengthen our approach.

  • Shyam Sunder Tiwari
    Institute of Engineering and Technology, Lucknow

    Bio I am currently pursuing B.Tech in Computer Science and Engineering at Institute of Engineering and Technology ,Lucknow.  I am from Jhansi , Uttar Pradesh. My area of interest include Networking and Cyber Security.

     Abstract : My Project deals with Network Forensics which include monitoring and analysis of computer network /  traffic . Network forensics is commonly used to reveal links between digital devices or reconstruction of  how a crime was committed .The objective is to identify malicious activities from the traffic logs, discover their details, and to assess the damage .Network forensics is usually performed notitia criminis (after notification of crime).

    I will be dealing with the detection of various attacks like DNS Poisoning/Spoofing , ARP Spoofing , DoS Attacks ,Ping of death attack etc.The information obtained from the evidence traces is used to identify who, what, where, when, how and why of the incident. These  cyber attack may lead to deliberate exploitation of computer systems, technology-dependent enterprises , networks and may lead user in wrong direction.A network forensics system is a valuable investigation tool to discover the source of network attacks and to attribute them to the attacker.

  • Shankhadip Mallick
    University of Engineering & Management, Jaipur

    Bio: I am Shankhadip Mallick, an intern in the department of computer science and engineering of IIT Kanpur. Growing up in the town of Belda in Medinipurdistrict(West Bengal), the outer advanced technical world always drew by attention. Hence after completing my 10+2 from BeldaGangadhar Academy, I am pursuing B.Tech. in Computer Science Engineering from University of Engineering & Management, Jaipur. In college I also lead the ACM Student Chapter as its Chairman. As the college days roll my interests grew intense in networks and their security but even more in how technologies can be integrated at its level best to provide the simplest solutions to the world's most complex problems.

    Interests when grow excessively intense turn into our passion and hence I opted for C3i internship at CSE Dept. of IIT Kanpur as a baby step to fulfill my passion of using technology to solve the hazards of technology.

    Project: "Automation Tool for gathering information in Critical Infrastructure"
    I am building a tool which intends to gather all the important information to perform penetration testing in critical infrastructure.

  • Akhil P
    Cochin University of Science and Technology, Kerala

    Bio: Myself Akhil P from Kerala. I had completed B.Tech&M.Tech in Electronics & communication from Cochin University of Science and Technology, Kerala.  I am very much interested to do research in the field of cyber security for embedded systems, so I just joined for P.hD  at Department of Electronics, CUSAT under the guidance of Dr.Bijoy A. Jose. At present I am a summer intern in the department of Computer Science and Engineering, IIT Kanpur. Research is my passion & playing chess, badminton are my hobbies.

    Abstract-Cyber security and cyber defense of "Smart Traffic Management".The concept of "Smart Cities" includes smart transportation, smart grid, smart home etc. These critical infrastructures rely on Information and Communication Technology (ICT) systems to retrieve, process, and exchange data in order to improve their services and the quality of life of citizens. Smart traffic management contribute to the life of the city, to the economy and ensure the resilience of the Smart City. The integration of "Smart Traffic Management" becomes a natural target for emerging cyber threats that will have an impact not only on the operations of the smart transportation but also on the whole economy and potentially on the health and safety of citizens.

  • Saubhagya Srivastava
    University of Petroleum & Energy Studies

    Bio: I am an undergraduate pursing my B.Tech in Computer Science with Specialization in Cyber Security & Digital Forensics. Area of Interest include Reverse Engineering, Malware Analysis, User Behavior Analytics,Exploit Development.

    Abstract: I am working on enhancement for existing security for IDS/Honeypots which consists of an AI base engine which will be used to convert a Honeypot to Honeyfarm and according to the data collected via the farm can be used to train dataset to train the AI based AI to prevent those attacks in the first place and even generate Context out of the dataset.Secondly I am working on an application based on SCADA which can directly analyze the network capture files and can be used to extract data from those and train a proper dataset to enhance the AI based security for critical infrastructure.

  • Gowtham Chitipolu
    IIT Gandhinagar

    BIO: I am an undergraduate student in Mechanical Engineering at Indian Institute of Technology Gandhinagar. I am highly interested in Robotics, Artificial Intelligence, and Cyber Security. My goal is to make this world a better, safer and a secure place to live in, by contributing to the fields of Artificial Intelligence and robotics as much as possible. As I feel that AI and robotics are going to change the world, I decided to be a part of that change and bring a positive effect in people lives.

    Name of the project: Malware Detection using Deep Learning

    Abstract: Most of the antivirus in the market use Signature-based malware detection, so they fail in preventing newly developed malware. The purpose of this project is to design a Neural Network that could determine the probability of an Android Application having a malware inside it. Since the neural network is trained on thousands of existing Android applications, it can successfully predict the possibility of any new application having a malware even if the malware is newly developed.

  • Ashwin Sekhari
    National Institute of Technology, Rourkela

    Bio: I am studying Computer Science and Engineering at National Institute of Technology, Rourkela. I hail from Faridabad, Haryana. I am still exploring the cybersecurity field and currently excited by block chains and cryptocurrencies. I also enjoy competitive programming for leisure. 

    Abstract: Project Title: Land Registry using Blockchain.

    In this Internship, we aim to look at the double spending problem in the Indian land registration. Looking closely we find that Indian land records are not properly maintained, and are not publicly available. All verification has to be done at the registrar office. Also, if the officer at the Registrar office is corrupt, he may validate an otherwise invalidated registry. We aim to use Blockchain for this purpose. Our Idea is to make verification process online so that anybody can verify. Registration would be done at the Registrar office only. 

    In this project, I am majorly responsible for creating the Hyperledger. Hyperledger is a permissioned blockchain with layers of authentication and security checks. Currently, we plan on storing the root hash of Merkle tree in hyperledger along with various query functions for several added features.

  • Shivanshu Singh
    IIT Kanpur

    BIO: I am a fourth-year undergraduate student majoring in Mechanical Engineering and Computer Science Engineering at Indian Institute of Technology Kanpur. My interest broadly lies in Computer Systems, Cyber Security, and Networking.

    ABSTRACT: Our Project deals with Network Forensics which includes monitoring and analysis of computer network/traffic. Network forensics is commonly used to reveal links between digital devices or reconstruction of how a crime was committed. Our objective is to identify malicious activities from the traffic capture file, discover their details, and to assess the damage. To accomplish this, we would be writing various python scripts. In our project, we will be dealing with the detection and origin of attacks like DNS Spoofing, ARP Spoofing, DoS, Ping of death attack, etc. The information obtained from the evidence traces is used to identify who, what, where, when, how and why of the incident.

  • Chamandeep Singh
    NIT Tiruchirappalli

     I like to run, read, and listen to songs in my leisure time. When at work i devote myself completely. 

  • Satish Sripadam
    NATIONAL INSTITUTE OF TECHNOLOGY, TIRUCHIRAPPALLI

    I am from Andhra Pradesh. I am currently pursuing B.tech 4th year in ECE.I am more interested in hardware implentation of various computational techniques.My hobbies are playing cricket,volleyball,reading books.

  • Raghul M
    Amrita University

     Bio:I am Raghul M. I currently pursuing B.tech Computer Science 4th year in Amrita University, Coimbatore. I love security as much as I love Python.

    Name of the project: Web Test Tool

    I am building a tool which find any vulnerability in the website and generate reports. The tool will automate the procedure like Information gathering and vulnerability analysis. The tool fingerprints current OS, platform, CMS of the remote host and maps with the exploit if any. Aim of the tool is to be user-friendly. The core programming language of the tool will be python-3.