Wednesday, 20 November 2013

Poster presentations at SIS 2013

NetClique presented three Posters at the recently concluded Symposium on Information Security.

Subhajit and Pratik's work titled "PeerShark: Detecting P2P botnets by tracking conversations" was runner-up for the Best Poster award.

Kriti and Pratik's work titled "Subduing free-riders in a P2P network", and work of Ashwini, Kamal & Sharath (our alumni) titled "Hadoop-based botnet detection" were also presented at the Symposium.

Tuesday, 19 November 2013

Symposium on Information Security- a runaway success!

NetClique organised Symposium on Information Security during 15th to 16th Nov 2013 at BITS-Pilani Hyderabad Campus with around 70 participants from Industry & Academia. The Symposium covered invited talks, poster presentations, one-minute idea pitches by participants and delegates. For a detailed report on the activities, please click here.  

Monday, 28 October 2013

Invited talk on "Security Issues and Challenges in a Connected World"

Dr. Hota delivered an invited talk on the topic "Security Issues and Challenges in a Connected World" at National E-Governance Seminar on ICT & Open Source Software: Issues and Challenges, Hidayatullah National Law University, Raipur, Chhattisgarh, India, Sept 22nd, 2013.

The talk covered various possible threat landscapes in a connected world including the work of Carna botnet. It emphasized on Internet, now being used as a medium to spread hatred, do malicious activities etc. as different nations have different controls and governance structures for managing the Internet. Various nations' stand on Net neutrality was also discussed. The talk also stressed the P2P menace and solutions for countering it.  

Gokul's talk on Co-operative Deployment in a Honeynet System

Gokul delivered a talk on the paper "Design of Co-operative Deployment in a Distributed Honeynet System". He explained about deployments of Honeypots and how to make them more difficult to detect. He also talked about a Multi-agent system (MAS) environment for deploying Honey-farms.

The slides are available here.

Jagan Presented a poster at IBM I-CARE'13

I was there for the IBM I-CARE'13 (at IBM research centre, Delhi) to present a poster, titled "Peer-to-Peer traffic Identification using Ensemble Learning".

The 5th IBM Collaborative Academic Research Exchange (I-CARE) conference was held in Deli from 17th - 19th October 2013. I got an opportunity to hear talks from two eminent speakers - "Information and Communication Technologies in India (ICT)" by Prof.   Ashok Jhunjhunwala, IIT Madras and "Architectural Perspectives of UID Aadhaar system" by Dr. Pramod Varma, Chief Architect, UIDAI at I-CARE.


Monday, 21 October 2013

Pratik's paper presentation on P2P botnets

In continuation of our regular meet-ups and paper discussions, Pratik makes a paper presentation on the paper "Entelecheia: Detecting P2P Botnets in their Waiting Stage". Pratik began the talk by introducing the audience to P2P based botnets, their architecture, life cycle and the research challenges in detecting them. He then discussed about the approach used by the authors of the paper. The presentation saw healthy discussions amongst the team on resilience of P2P botnets and approaches to detect them. 

His slides are available here

Saturday, 12 October 2013

Paper presentation by Abhishek on DTNs

As a part of NetClique's paper presentations and discussions, Abhishek makes a paper presentation on the paper "A Survey of Social Based Routing in Delay Tolerant Networks: Positive and Negative Social Effects ". He began the talk by giving a brief introduction to Delay Tolerant Networks, and then went on to describe the 'social network analysis' that goes around them. He also discussed on the approaches used for benefiting from the various social characteristics of DTNs.

The slides are available here.

Monday, 30 September 2013

Symposium on Information Security

NetClique is organizing a two-day Symposium on Information Security on the theme of 'Securing Networks, Devices and Applications'. The Symposium will feature talks from security experts and researchers from all over the country, along with panel discussions and a poster session.

The Web Flyer is available here.

Check out the website for details !!

Sunday, 8 September 2013

New members join the group

Gokul Kannan Sadasivam, MS (Computer Networks and Security) from Northwestern Polytechnic University (NPU), California, USA joined the group in July 2013.

Anirudh Kasturi, ME (Computer Sc. & Engineering) from IIT Chennai joined the group in September 2013.

Welcome to GK and AK!

Friday, 6 September 2013

2nd PRSG meeting at BITS Hyd

The 2nd Project Review & Steering Group (PRSG) meeting of the project "Automated Detection of Security & Privacy Threats" took place at BITS-Pilani, Hyderabad Campus on 6th September 2013. The meeting was attended by all PRSG members, and the project team alongwith Research Scholars-Jagan and Pratik, and the student members- Ashwini and Kriti.

The PRSG committee reviewed the progress of the project for the last ten months. The meeting lasted for Four hours with presentations from all the members followed by demonstrations on Novel classifiers using Feature selection algorithms, P2P Botnet detection, Game theoritic framework for Free-rider detection, and Hadoop set up for distributed processing for ML algorithms. The meeting gave the project team an opportunity to interact with the experts and broaden their horizon on various aspects of P2P security. The meeting ended with vote of thanks to the experts. 

Thursday, 5 September 2013

Abhishek @ ICACCI-2013 - venue SJCE Mysore

I attended the first two days of ICACCI-2013 at SJCE Mysore. Most of the keynotes were interesting. I especially enjoyed keynote on "Encrypted Multimedia Processing over Cloud" by Dr. Pradeep K. Atrey.

In the International Symposium on Green Networks and Distributed Systems (GNDS 2013) I also presented the position paper on SWiFiIC titled "Sustainable Wireless Internet Connectivity for Rural Areas", co-authored by Prof. Chittaranjan Hota.

I had hoped to stay for the full conference, but given that the semester is in full swing (plus Hyderabad marathon on 25th August), had to return after one and a half days.


Saturday, 31 August 2013

The experience at ACM Compute 2013

I and Jagan were there for the ACM Compute 2013 (22-24 Aug 2013, Vellore) to present our paper, titled Feature Selection for Detection of Peer-to-Peer Botnet Traffic. The slides of my presentation are available here on

The 6th ACM India Computing Convention (ACM Compute) was held on the theme of "Next Generation Computing Paradigms and Technologies". And they lived up to their theme well, with lots of stuff on Cloud Computing (by Dr. Raj kumar Buyya, Univ of Melbourne, Australia) and Big Data Analytics (by Prof. U. Dinesh Kumar, IIM-B) , a great tutorial on Bayesian Inference on Machine Learning (by Dr.Hari Koduvely, principal researcher at Infosys Labs, Bangalore), with a splash or two of Natural Language Processing thrown in (by Dr.Lokendra Shastri, Infosys, Bangalore), and a lot more...

We also got good opportunities to interact with Dr. P. Srinivas (Vice President, ACM India and Vice President, Infosys Labs, Bangalore) and Dr. Hari Koduvely and receive their feedback on our work. 


Monday, 19 August 2013

Invited talk on P2P Security Threats and their Countermeasures

Dr. Hota delivered a talk on "P2P Security Threats and their Countermeasures" at the Cyber Security Workshop at Bharti School, IIT Delhi (Aug 3rd 2013, New Delhi, India). 

The slides of his talk are available here on 

Invited talk on "Cyber Security Research Landscape in India"

Recently Dr. Hota was at IIIT Delhi for the RCUK/ DST Organized Workshop on Cyber Security (March 24th-March 26th, 2013, New Delhi, India).
He gave a talk on the topic "Cyber Security Research Landscape in India".

Saturday, 27 July 2013

Two accepted papers

Our Poster Paper titled "Bayesian Regularized Neural Network for Peer-to-Peer Botnet Detection in Quasi Real-Time" has been accepted at the 13th annual IEEE conference on P2P computing (University of Trento, Italy). Congrats to the authors!
Authors: Pratik Narang, Sharath Chandra G, Chittaranjan Hota

Another work of ours, titled "Feature Selection for Detection of Peer-to-Peer Botnet Traffic" has been accepted at the ACM Compute conference (Vellore, India). Kudos to the authors!
Authors: Pratik Narang, Jagan Mohan Reddy, Chittaranjan Hota

Tuesday, 9 July 2013

Campus Wi-Fi with CoovaChilli, FreeRADIUS and Active Directory

Setting up an authenticated Wi-fi with CoovaChilli & FreeRADIUS over Windows Active Directory
Please note:
  • This is NOT a technical guide or a tutorial for CoovaChilli/FreeRADIUS/Active directory. It is a documentation of our own experience with these technologies, shared on the web for our own future reference and in the hope that someone in a similar situation may find it useful. Accept all advice with a grain of salt! Your mileage may vary.
  • The content of this post has been liberally borrowed from the online sources listed in the references. The reader is advised to refer to them for more details. 

The task at hand
We need to set-up our Wi-fi network which will be authenticated over the Active Directory provided by our Institute. This Wi-fi network will serve as a data collection network for our network-related experiments.
The equipments used-
  • A 64bit machine with Ubuntu 12.04 having two NIC cards
  • A Belkin Basic N150 router
  • CoovaChilli
  • FreeRADIUS

Getting started
Configure the Belkin router to not to act as a router or a firewall and only provide the Access point functionality. It is a fairly simple procedure and not elaborated here. For the Belkin Basic N150 being used by us, we just had to choose the 'enable as Access point' (or something similar) option from the router's configurations, and assign it a static IP address. Just be careful to NOT to plug in the WAN wire into the router's WAN interface. It must go in ANY of the LAN interfaces.

Open the /etc/network/interfaces file and make sure that you have one NIC with a static IP. This is the IP coovachilli will run-off as a server. Another thing you need to do is enable packet forwarding and NAT between the interfaces.
After doing this, our /etc/network/interfaces file looked like this-

    auto lo
    iface lo inet loopback

    auto eth0
    iface eth0 inet dhcp

    auto eth1
    iface eth1 inet static
        post-up iptables -t nat -A POSTROUTING -o eth0 -j MASQUERADE
        post-up echo 1 > /proc/sys/net/ipv4/ip_forward

To make sure packet forwarding is enabled, enable it from /etc/sysctrl.conf as well. To do that, you just need to run this command-
    sed --in-place=.old 's/^#\(net.ipv4.ip_forward=1\)/\1/' /etc/sysctl.conf

Install FreeRADIUS and related stuff used by CoovaChilli-
    sudo apt-get install freeradius freeradius-utils libtool libssl-dev libcurl4-openssl-dev
Install Samba if you don't have it.
    sudo apt-get install samba
Install winbind
    sudo apt-get install winbind

We will configure them later.

The following is based on reference [1].

The first thing to do is join the Ubuntu server to the domain controller (DC).
Linux must be configured to join a Windows domain. This is done by using the Samba file server which offers several interesting tools. The goal is not to create a Samba file server but only to use some tools which come with this server.
Let Samba know what domain it belongs to. Open /etc/samba/smb.conf and set the following-
    workgroup = MYDOMAIN ##whatever it is...
    realm =
    #In authentication section-  
    security= ads 
    #In 'Share definitions' section, uncomment-  
    comment = Home Directories 
    browseable = no  
    writable= yes

Edit the file /etc/nsswitch.conf and add winbind at the end of each line shown below
    passwd:     files winbind 
    shadow:     files winbind 
    group:      files winbind 
    protocols:  files winbind 
    services:   files winbind 
    netgroup:   files winbind 
    automount:  files winbind 

Restart the machine.
Verify if the Samba service is running by typing
    ps –ef | grep nmbd 
    ps –ef | grep smbd 

Do- net join -U <authenticated_AD_user> 
And it will join your machine (not the user) to the 'realm'. 
Our output was-
    net join -U compnet2012
    Enter compnet2012's password:
    Using short domain name -- BITS-XYZ
    Joined 'WLC-OPTIPLEX' to realm 'bits...'
    No DNS domain configured for wlc-optiplex. Unable to perform DNS Update.
    DNS update failed!
Even though DNS update failed, there was no hindrance in any of the future tasks. The failure was obvious since we are not admin for AD!

Next, try with wbinfo command-
    root@wlc-OptiPlex:/etc/samba# wbinfo -a compnet2012%<password>
    plaintext password authentication failed
    Could not authenticate user compnet2012%mnb0567 with plaintext password
    challenge/response password authentication failed
    error code was NT_STATUS_WRONG_PASSWORD (0xc000006a)
    error message was: Wrong Password
    Could not authenticate user compnet2012 with challenge/response

If it fails, try again without supplying password in plain text-
    root@wlc-OptiPlex:/etc/samba# wbinfo -a compnet2012
    Enter compnet2012's password:
    plaintext password authentication succeeded
    Enter compnet2012's password:
    challenge/response password authentication succeeded

Let’s try to authenticate with NTLM, which is necessary for using FREERADIUS with Active Directory.
Type the following line
    ntlm_auth –-request-nt-key –-domain=MYDOMAIN –-username=<your username>
You will be prompted for your password.
The command line returns 'NT_STATUS_OK : Success (0x0)' if the username and password are the same as those stored in Active Directory.

Note that this mechanism is based on a challenge/response of the nt-key, a character string that has been encrypted with information taken from the username and password.
During this operation, no exchange of user information takes place. Everything is based upon a comparison of encrypted strings.

The following were taken from [3], [5]

Configuring FreeRADIUS to use ntlm_auth
    sudo -i #become root user
    cd /etc/freeradius
    vim  clients.conf
At the end of this file, you need to add your Access Point as a client for RADIUS-
    client {
        secret = <enter this>
        shortname = <choose anything>
        nastype = other
Save and exit from the file.

Now, create a file (if it doesn't exist) ntlm_auth in the /modules folder of freeradius, and the put the following text in it-

     exec ntlm_auth {
           wait = yes
           program = "/path/to/ntlm_auth --request-nt-key --domain=MYDOMAIN --username=%{mschap:User-Name} --password=%{User-Password}"

This configuration tells the server to run the ntlm_auth program with the user name and password obtained from the Access-Request. You will also have to list ntlm_auth in the authenticate sections of each the /sites-enabled/default file, and of the /sites-enabled/inner-tunnel file:
     authenticate {

and add the following text for testing purposes only to the top of the users file.
    DEFAULT     Auth-Type = ntlm_auth
This configuration says "for all users, if the authenticate method has not been set, set it to use the ntlm_auth program".

Let us add a test user to freeradius. Add the following to the /etc/freeradius/users file-

    testuser Cleartext-Password := "userpass1"    
    Simultaneous-Use = 999999,    
    Idle-Timeout = 86400

Start the server using freeradius -X, and wait for the debugging text to stop scrolling by. If all goes well, you should see the following text:
      Ready to process requests
In another terminal window on the same machine, type the following command:
   radtest testuser userpass1 localhost 0 testing123
If all goes well, you should see the server returning an Access-Accept message, and the window with radtest should print text similar to the following:
   rad_recv: Access-Accept packet from host port 1812, length=20
This text means that authentication succeeded. A few lines above this text, the debug output will also show the exact command line used to run ntlm_auth.

Configuring FreeRADIUS to use ntlm_auth for MS-CHAP
First, delete the testing entry used above from the users file, as leaving it in will break other authentication types. 
Then, find the mschap module in /modules/mschap file, and look for the line containing ntlm_auth = . It is commented out by default, and should be uncommented, and edited to be as follows. Update the fields in bold to match your local configuration.
    ntlm_auth = "/path/to/ntlm_auth --request-nt-key --username=%{mschap:User-Name:-None} --domain=%{%{mschap:NT-Domain}:-MYDOMAIN} --challenge=%{mschap:Challenge:-00} --nt-response=%{mschap:NT-Response:-00}" 
Look for the line containing the following text and uncomment it-
    with_ntdomain_hack = yes

The following section is based on [5], [6] 

Install & Configure CoovaChilli  
Download CoovaChilli's source code from their website- Note that [4] says that CoovaChilli doesn't work with 64bit OS and RADIUS authentication is flawed in those setups. But we were able to successfully do our installation and set-up on a 64bit Ubuntu 12.04 :)

    tar -zxvf coova-chilli-1.3.0.tar.gz
    cd coova-chilli-1.3.0/
    ./configure --enable-dhcpopt --enable-debug2 --enable-chilliproxy --enable-chilliradsec --enable-miniportal --enable-miniconfig --enable-libjson --with-openssl --with-curl
    sudo make install

Our initial run of CoovaChilli was simply with './confgure'. But we were facing some errors with it and moreover we needed some of those '--enable' options. Hence we decided to go ahead with the above said '--enable' and '--with' build options.

Install haserl. Get the tar from Untar and build in the same manner as CoovaChilli (no configure options, of course).

By default, Chilli is installed in /usr/local/etc/ folder. Let's check-
    cd /usr/local/etc/
    ls -lt
    total 12
    drwxr-xr-x 2 root root 4096 Jul  9 11:56 init.d
    drwxr-xr-x 3 root root 4096 Jul  9 11:56 chilli
    -rw-r--r-- 1 root root  861 Jul  9 11:56 chilli.conf

Now that its installed, we need to configure it before we enable it. To do this, copy the defaults to the config file
cd /usr/local/etc/chilli cp ./defaults ./config
From here, edit /etc/chilli/config. Only a few changes are required-

    HS_WANIF=eth0            # WAN Interface toward the Internet
    HS_LANIF=eth1              # Subscriber Interface for client devices
    HS_NETWORK=      # HotSpot Network (must include HS_UAMLISTEN)
    HS_NETMASK=   # HotSpot Network Netmask
    HS_UAMLISTEN=    # HotSpot IP Address (on subscriber network)
    HS_UAMPORT=3990            # HotSpot UAM Port (on subscriber network)
    HS_UAMUIPORT=4990          # HotSpot UAM "UI" Port (on subscriber network, for embedded portal)

    # OpenDNS Servers           ##set your own here, like-  ##Ours didn't work for us, so we resorted to defaults here
    #uncomment this line-

    ##For better security, it is better to change these from default values-
    HS_RADSECRET=testing123    # Set to be your RADIUS shared secret
    HS_UAMSECRET=change-me     # Set to be your UAM secret
    ##change the name to what you want-
    HS_LOC_NAME="My HotSpot"           # WISPr Location Name and used in portal

Specify 'dhcpstart <number>' in chilli.conf (in /usr/local/etc/) if you want the DHCP IP addresses to begin from a certain number, say .20, and not immediately from .2 on your network. We used 20 here, to reserve the IPs from .2 to .20 for, say, our APs, WLCs, etc. 

Reboot the machine.

Testing the set-up
Start RADIUS-  
    freeradius -X
Start Chilli
    /usr/local/etc/init.d/chilli ##will create some files such as  main.conf
    sudo chilli
Starting Chilli gives an error saying that user chilli is not found. We never created user chilli but all things went fine.
Use any Wi-fi client to connect to your AP. As you try to connect to the Internet, CoovaChilli's Captive portal will capture the page and redirect to a login page. Any user who is authenticated with the Active Directory should be able to authenticate. 

You can customize CoovaChilli's captive portal by editing the files in /usr/local/etc/chilli/www/ folder.

Saturday, 6 July 2013

Riding the elephant, virtually!

The NetClique team of Prof. Abhishek and Pratik, along with our latest member Ashwini Patil (student, M.E. CS) worked together to create a Hadoop cluster for our experiments. The cluster was deployed using Virtual Machines on a 24 core machine . We decided to document the steps here, just in case someone dealing with similar experiments finds it helpful. Thanks to Ashwini for her documentation efforts. 

Let us get started!

Basics steps of the Hadoop setup covered here are:

  • install virtual machine manager for GUI interface (optional)
  • install the required number of Ubuntu virtual machines using ubuntu-vm-builder
  • choose one of the VMs as manager and install cloudera manager on it

Detailed installation procedure goes like this-

Step 1: Installing virtual machine manager
Use the following command to install KVM and supporting packages. 
Virt-Manager is a graphical application for managing your virtual machines. You can use the kvm command directly, but libvirt and Virt-Manager simplify the process.
sudo apt-get install qemu-kvm libvirt-bin bridge-utils virt-manager

Only the root user and users in the libvirtd group have permission to use KVM virtual machines. 
Run the following command to add your user account to the libvirtd group:
sudo adduser <name> libvirtd

After running this command, log out and log back in. 

Run the following command after logging back in and you should see an empty list of virtual machines. 
This indicates that everything is working correctly.
virsh -c qemu:///system list

->Follow this link for help on installing VMs using it. 

Step2: Installing VMs using ubuntu-vm-builder
2.1-> We wrote a Shell script to install 30 Virtual Machines at a stretch. 
For instance,the following bash script will install 30 VMs (IP range is from .41 to .70)

     for i in $(seq 41 1 70)
     echo <password>| `sudo -S ubuntu-vm-builder kvm precise
     --arch 'amd64'  --mem '1024'  --rootsize '15000'
     --kernel-flavour 'generic' --hostname "vm1$i"  
     --domain ''
     --mirror ''
     --components 'main,universe,restricted'
     --addpkg openssh-server --addpkg vim  --addpkg expect 
     --name "vm_1$i"  --user "vm1$i"  --pass '<password>'
     --ip "$i"  --mask ''
     --net ''  --bcast ''
     --gw ''  --dns '' 
     --bridge 'br0'  --libvirt 'qemu:///system'
     --dest /media/.../vm14Si
     --firstboot /home/bits/`


   ->Follow this link here which gives you a 'parameter generator' for ubuntu-vm-builder.

2.2->To list the VMs created, use virsh 'list --all'

2.3->We need to do certain boot time settings to make things work. [These are there in the file, which is supplied as a 'firstboot' argument with ubuntu-vm-builder]
->edit /etc/apt/apt.conf file, to configure our Internet proxy.
->we would need passwordless sudo permissions for the user for Cloudera installation on that system.This can done by adding following line to /etc/sudoers file 
  <username> ALL=NOPASSWD: ALL
->edit /etc/hosts file to add the hosts IP and name.
Our firstboot script,, looks like this:

    touch /etc/apt/apt.conf 

    #adding proxy configurations to the file
    cat>> /etc/apt/apt.conf <<END
    Acquire::http::proxy "http://172.xx.y.zz:3128/";
    Acquire::ftp::proxy "ftp://172.xx.y.zz:3128/";
    Acquire::https::proxy "https://172.xx.zz.23:3128/";

    #adding password less sudo user called testuser
    cat>> /etc/sudoers <<EOF
    testuser ALL=NOPASSWD: ALL

    `apt-get update`
    `apt-get upgrade`
    #Adding the hosts IP and hostname to its /etc/hosts file 
    #and  deleting the entry which maps the hostname to loopback address
    sed -i '/' /etc/hosts
    ip=`ifconfig eth0|grep 'inet addr'|awk -F : '{print $2}'|awk '{print $1}'`
    hostname=`ifconfig eth0|grep 'inet addr'|awk -F : '{print $2}'|awk '{print $1}'|awk -F .     '{print $4}'`
    echo "$ip vm$ vm $hostname" >>  /etc/hosts

#add the Cloudera Manager's entry in /etc/hosts. The IP is hard-coded here. 
echo "172.xx.y.171 cloudera-manager1">>/etc/hosts

# In the /etc/hosts file for the Cloudera Manager, a similar entry for the name node must be added.

It is recommended that the name node be a powerful machine (RAM ~8GB, Hard disk ~30GB). You will need to create it separately, although all parameters remain same as above. 
The node being used as the Cloudera-manager will also have similar configurations as above, but it will need to have the name node's entry in its /etc/hosts file.

Step 3: Install Cloudera manager on a Manager machine (it can be any of VMs or physical machines).


Monday, 24 June 2013


NetClique bids farewell to the two of our B.E. members, Sharath and Vijay.
Sharath will be joining CISCO Bangalore, while Vijay will be pursuing his Ph.D at the Ohio State university.

We wish them all the very best for their future!

Wednesday, 1 May 2013

Vijay successfully defends his Thesis

Vijay Sridhar successfully defended his undergraduate Thesis work on Classification of P2P traffic.
His work used extraction of 'flows' from network traffic, extracting of relevant features from the traffic flows and then using Machine learning algorithms to classify the traffic as 'P2P' or 'Non-P2P'. 

Thursday, 25 April 2013

Sharath successfully defended his Thesis today

Sharath Chandra G defended his undergraduate thesis work today. His Thesis work was on Scalable and live detection of P2P botnets. The present output of his work is in the form of an executable file which can go as a plug-in to an IDS/IPS.

Several P2P based botnets, such as Storm, Zeus, Kelihos-Hlux were deployed at our test-bed at BITS Hyderabad campus, and networks capture files were thus obtained. Network captures of several other botnets, such as of Conficker, were also obtained form other sources like CAIDA.

A scalable detection framework was built using Machine Learning algortihms with Hadoop and Mahout, which can take in live network traffic and predict botnet activity on the network. 

Thursday, 7 March 2013

Dr. Hota talks about 'P2P Network Security' at IIT Kanpur

Dr. Hota travelled to IIT Kanpur for the Security and Privacy Symposium 2013. He discussed about NetClique's work on security in Peer-to-Peer networks.

Read more about the Symposium and his talk here.

Tuesday, 26 February 2013

Three accepted posters at the Security and Privacy Symposium, IIT Kanpur.

Our three poster papers accepted at the Security and Privacy Symposium, IIT Kanpur.
  1. P2P Traffic classification for Intrusion Detection Systems.
    Authors: Jagan, Pratik & Prof. Hota
  2. Privacy Preserving Packet Anonymization in P2P Realm.
    Authors: Sharath, Vikram, Prof. Abhishek & Prof. Hota
  3. A Crowdsourcing and Data Mining-based System for Content Tagging.
    Authors: Vijay & Prof. Hota
Congratulations to the entire team !!

Jagan at the Poster session at IIT Kanpur

Wednesday, 13 February 2013

Prof. Jukka K. Nurminen visits us

Prof. Jukka K. Nurminen, a Professor of computer science at the Aalto University, Finland, visited us on 9th of February 2013.
Prof. Jukka has a strong industry background with almost 25 years experience of software research at Nokia Research Center. Mobile peer-to-peer (P2P) is an area where he has worked extensivelySome of the outcomes of this work are the open sourced implementations of Gnutella (Symella), BitTorrent, (SymTorrent (C++), MobTorrent (J2ME)), and Kademlia DHT for the Nokia mobile phones.
NetClique had a two-hour long session with him where each of us presented our work to him.  He was quite excited to learn about our work on P2P security and appreciated the fact that we were dealing with real-world network traces of P2P traffic and not just traffic simulations.

Seen on the right is Prof. Jukka engaged with NetClique in an interesting conversation on P2P security.

In the picture below, Prof. Jukka is seen with NetClique on a tour of some of the famous places of Hyderabad.

Friday, 11 January 2013

Prof. Venkat Venkatakrishnan's visit

Prof. Venkat Venkatakrishnan, a BITS Pilani alumni and presently Associate Professor and Director, IGERT program on Electronic Security and Privacy, with the University of Illinios at Chicago, visited BITS Pilani Hyderabad Campus on 11 January, 2013. He delivered a talk on Web Security and discussed about some of his recent research work in the same area. The lecture covered basics of web security and common threats like SQL injection etc. He also discussed about the counter measures that he worked on these common threats.

NetClique also got an opportunity to interact with him and discuss about some of our work and ideas.

Prof. Venkat's talk in progress