Work place: Computer Science and Engineering Department, Thapar University, Patiala, 147004, India
E-mail: ratinder.kaur@thapar.edu
Website:
Research Interests: Computational Science and Engineering, Software Construction, Software Engineering
Biography
Ratinder Kaur is a PhD scholar at Thapar University carrying out her research in the field of Network Security. She holds strong academic record. She received her Bachelor's Degree from Punjab Technical University and holds a Master's Degree, with honors in Software Engineering from Thapar University. She showcases strong inclination towards Computer Security field which is evident from her master thesis on Operating System fingerprinting, for which she won TCS (Tata Consultancy Services) Best Student Project Award, and now exploring Zero-day attack frontiers. Email: ratinder.kaur@thapar.edu.
By Ratinder Kaur Maninder Singh
DOI: https://doi.org/10.5815/ijitcs.2016.04.08, Pub. Date: 8 Apr. 2016
To understand completely the malicious intents of a zero-day malware there is really no automated way. There is no single best approach for malware analysis so it demands to combine existing static, dynamic and manual malware analysis techniques in a single unit. In this paper a hybrid real-time analysis and reporting system is presented. The proposed system integrates various malware analysis tools and utilities in a component-based architecture. The system automatically provides detail result about zero-day malware's behavior. The ultimate goal of this analysis and reporting is to gain a quick and brief understanding of the malicious activity performed by a zero-day malware while minimizing the time frame between the detection of zero-day attack and generation of a security solution. The results are paramount valuable for a malware analyst to perform zero-day malware detection and containment.
[...] Read more.By Inderpreet Chopra Ratinder Kaur
DOI: https://doi.org/10.5815/ijitcs.2016.03.09, Pub. Date: 8 Mar. 2016
The application of human immunology in solving security problems in Grid Computing seems to be a thought-provoking research area. Grid involves large number of dynamic heterogeneous resources. Manually managing the security for such dynamic system is always fault prone. This paper presents the simple immune based model for self-protection (SIMS) of grid environment from various attacks like DoS, DDoS, Probing, etc. Like human body helps to identify and respond to harmful pathogens that it doesn't recognize as "self", in the same manner SIMS incorporates the immunological concepts and principles for safeguarding the grid from various security breaches.
[...] Read more.By Ratinder Kaur Maninder Singh
DOI: https://doi.org/10.5815/ijcnis.2015.09.03, Pub. Date: 8 Aug. 2015
A zero-day attack poses a serious threat to the Internet security as it exploits zero-day vulnerabilities in the computer systems. Attackers take advantage of the unknown nature of zero-day exploits and use them in conjunction with highly sophisticated and targeted attacks to achieve stealthiness with respect to standard intrusion detection techniques. Thus, it's difficult to defend against such attacks. Present research exhibits various issues and is not able to provide complete solution for the detection and analysis of zero-day attacks. This paper presents a novel hybrid system that integrates anomaly, behavior and signature based techniques for detecting and analyzing zero-day attacks in real-time. It has layered and modular design which helps to achieve high performance, flexibility and scalability. The system is implemented and evaluated against various standard metrics like True Positive Rate (TPR), False Positive Rate (FPR), F-Measure, Total Accuracy (ACC) and Receiver Operating Characteristic (ROC) curve. The result shows high detection rate with nearly zero false positives. Additionally, the proposed system is compared with Honeynet system.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals