Network Security

Network Security

Network security is a broad term that covers a multitude of technologies, devices and processes. In its simplest term, it is a set of rules and configurations designed to protect the integrity, confidentiality and accessibility of computer networks and data using both software and hardware technologies. Every organization, regardless of size, industry or infrastructure, requires a degree of network security solutions in place to protect it from the ever-growing landscape of cyber threats in the wild today. [Source]

Faculty Members:

Patents:

Publications:

[1] Laiphrakpam Dolendro Singh, Waikhom Leepeng Singh, Digambar Brahma, Pratikshit Baruah, Sarthak Biswas, “Image compression-encryption scheme using SPIHT and chaotic systems”, Journal of Information Security and Applications, Volume 63, December 2021, 103010 , https://doi.org/10.1016/j.jisa.2021.103010

[2] Khoirom Motilal Singh, Laiphrakpam Dolendro Singh and Themrichon Tuithung, “Audio encryption using ameliorated ElGamal Public Key Encryption over finite field”, Wireless Personal Communications, 2020,  https://doi.org/10.1007/s11277-020-07897-9

[3] Aasawari Sahasrabuddhe and Laiphrakpam Dolendro Singh, “Multiple images encryption based on 3D scrambling and hyper-chaotic system”, Information Sciences, Vol. 550, pp. 252-267, March 2021,  https://doi.org/10.1016/j.ins.2020.10.031,

[4]   Khoirom Motilal Singh, Laiphrakpam Dolendro Singh and Themrichon Tuithung, “Text encryption based on Huffman coding and ElGamal cryptosystem”, Recent Patents on Engineering, doi: 10.2174/1872212114999200917144000

[5]   Arpita Banik, Zeba Shamsi and Laiphrakpam Dolendro Singh, ”An encryption scheme for securing multiple medical images” Journal of Information Security and Applications, Vol. 49, pp. 1-8, 2019, DOI:https://doi.org/10.1016/j.jisa.2019.102398

[6]  Khoirom Motilal Singh, Laiphrakpam Dolendro Singh, Themrichon Tuithung, “Cryptanalysis of multimedia encryption using elliptic curve cryptography“, Optik, Vol. 168, pp. 370-375, 2018, DOI: https://doi.org/10.1016/j.ijleo.2018.04.068.

[7]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Medical image encryption based on improved ElGamal encryption technique”, Optik, Vol. 147, pp. 88-102, 2018, DOI: http://dx.doi.org/10.1016/j.ijleo.2017.08.028

[8]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Visually Meaningful Multi-image Encryption Scheme”, Arabian Journal for Science and Engineering, 2018, DOI: https://doi.org/10.1007/s13369-018-3104-7

[9] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “A robust image encryption scheme based on chaotic system and elliptic curve over finite field”, Multimedia  Tools Application, Vol. 77, pp. 8629–8652, 2018, DOI: https://doi.org/10.1007/s11042-017-4755-1

[10]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Cryptanalysis of symmetric key image encryption using chaotic Rossler system”, Optik, Vol. 135, pp. 200-209, 2017, DOI: http://dx.doi.org/10.1016/j.ijleo.2017.01.062

[11] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Cryptanalysis of Rawatet al. Fragile Watermarking Scheme with Successful Creation of Counterfeit Watermarked Image”, International Journal of Innovations & Advancement in Computer Science, Vol. 6, Issue 3, 2017.

[12] Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Cryptanalysis of Image Encryption Scheme Based on Chaotic Tent Map”,  Int. Journal of Precious Engineering Research and Application, Vol. 1, Issue 2, 2016, pp.18-22.

[13]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Implementation of Text Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, Vol.  54, pp. 73 – 82,  2015.

[14]  Laiphrakpam Dolendro Singh and Khumanthem Manglem Singh, “Image Encryption using Elliptic Curve Cryptography”, Procedia Computer Science, Vol.  54, pp. 472 – 481,  2015.

[15] Ripon Patgiri, Malaya Dutta Borah and Laiphrakpam Dolendro Singh, “SecretStore: A Secrecy as a Service model to enable the Cloud Storage to store user’s secret data” Asia Pacific Conference on Communications 2021.

[16] L Dolendro Singh, Tribid Debbarma, “A New Approach to Elliptic Curve Cryptography”,  IEEE International Conference on Advanced Communication Control and Computing Technologies (ICACCCT), 2014.

[17] Ripon Patgiri, Sabuzima Nayak and Samir Kumar Borgohain, “PassDB: A Password Database with Strict Privacy Protocol using 3D Bloom Filter“, Information Sciences, Vol. 539, Issue: October 2020, pages: 157 – 176,  DOI: 10.1016/j.ins.2020.05.135

[18] Ripon Patgiri, “Rando: A General-Purpose True Random Number Generator for Conventional Computers”, The 20th IEEE International Conference on Trust, Security, and Privacy in Computing and Communications (TrustCom 2021), 20-22 October 2021, Shenyang, China

[19] Ripon Patgiri, “Whisper: A Curious Case of Valid and Employed Mallory in Cloud Computing”, 8th IEEE International Conference on Cyber Security and Cloud Computing (IEEE CSCloud 2021), June 26-28, 2021, Washington DC, USA, DOI: 10.1109/CSCloud-EdgeCom52276.2021.00033.

[20] Sabuzima Nayak, Ripon Patgiri and Naresh Babu Muppalaneni, “Is Bloom Filter a Bad Choice for Security and Privacy?”, IEEE 35th International Conference on Information Networking (ICOIN 2021), January 13-16, 2021, Korea

[21] Naresh Babu Muppalaneni and Ripon Patgiri, “Malware Detection using Machine Learning Approach”, International Conference on Big Data, Machine Learning and Applications (BigDML 2019), December 16-19, 2019.

[22] Ripon Patgiri, Sabuzima Nayak, and Samir Kumar Borgohain, “PassDB: A Password Database using 3D Bloom Filter“, The 21st IEEE International Conferences on High Performance Computing and Communications (HPCC’19), to be held on Sat, 10 Aug, 2019 – Mon, 12 Aug, 2019, Zhangjiajie, China,  doi: 10.1109/HPCC/SmartCity/DSS.2019.00162.

[23] Ripon Patgiri, Sabuzima Nayak, and Samir Kumar Borgohain, “Preventing DDoS using Bloom Filter: A Survey“, EAI Endorsed Transaction on Scalable Information Systems, Vol. 5, No. 19, DOI: 10.4108/eai.19-6-2018.155865.

[24] Ripon Patgiri, Hemanth Katari, Ronit Kumar and Dheeraj Sharma, “Empirical study on Malicious URL Detection Using Machine Learning“, 15th International Conference on Distributed Computing and Internet Technology (ICDCIT 2019), KIIT University, Bhubaneswar, Odisha, India, LNCS, Springer, DOI: 10.1007/978-3-030-05366-6_31.

[25]  Ripon Patgiri, Udit Varsheney, Tanya Akutota and Rakesh Kunde, “An Investigation on Intrusion Detection System Using Machine Learning“, IEEE Symposium Series on Computational Intelligence (IEEE SSCI 2018), 18-21 November, Bengaluru, India, DOI: 10.1109/SSCI.2018.8628676