Intrusion detection system using k-means clustering algorithm
Many researches nowadays working on increase the ability of the intrusion detection systems IDS, which depend on data mining techniques in their mechanism. Whereas cyber-attacks of all kinds have been evolving , that require more efforts to fill in the gaps in intrusion detection system, increase their accuracy or the their ability of detect any ...
E-VACCINATION MANAGEMENT SYSTEM WEB APP
Now a days everything should be easy access and available according to need but still facing issues in child vaccination system in rural areas of Sindh still no perfect system available for Parents to view how much vaccine was done on which date. E-Vaccination Record Management App of Child access from any location and time to get information eas...
Loan application & verification management system
The Block chain-Based Online Loan Management System (BOLMS) is an innovative web application that leverages block chain technology to revolutionize the process of loan management for financial institutions. By utilizing the decentralized and transparent nature of block chain, BOLMS aims to enhance security, trust, and efficiency in the loan manag...
Google COLAB - CREDIT CARD FRAUD DETECTION
Credit card fraud is currently the most common problem in the modern world. This is because internet transactions and e-commerce sites are on the rise. Credit card fraud occurs when a credit card is stolen and used for unauthorized reasons, or when a fraudster exploits the credit card information for his own interests. In today's environment, we'...
Fake product review monitoring & removal for genuine ratings
Online product review on shopping experience in social media has promoted user to provide feedback. Nowadays, many e-commerce sites allow the customer to write their review or opinion on the product which they have bought from that site. The review given by the customer can build the good name of the product or make the product famous. Due to thi...
campus placement management appliication
PROJECT READY CHECK VIDEOThe Placement Management System is an advanced platform designed for the effective tracking and evaluation of student placements in various businesses [10]. ReactJS, a web-based tool, has been utilized to develop an advanced platform known as the Placement Management System [9]. The PMS enables the placement cell to securely store student data in...
Research on Improving Cyber Resilience by Integrating the Zero Trust Security Model With the MITRE ATT&CK Matrix
With the advent of the digital information age, the dynamics of cyberspace are rapidly evolving, resulting in a significant increase in cyber threats. In this paper, we propose to integrate the Zero Trust (ZT) security model and the MITRE ATT&CK matrix to address the need for enhancing cyber resilience, which is an organization’s ability to recover...
Leveraging Blockchain to Enhance Digital Transformation in Small and Medium Enterprises: Challenges and a Proposed Framework modules
This paper presents a Blockchain-based framework for providing Blockchain services for purposes of stability in terms of consensus protocol infrastructure and governance mechanisms and accessible auxiliary services suitable for the vast majority of current business needs, including fundamental factors such as digital identity with autonomous identi...
Dynamic Searchable Symmetric Encryption With Strong Security and Robustness
Dynamic Searchable Symmetric Encryption (DSSE) is a prospective technique in the field of cloud storage for secure search over encrypted data. A DSSE client can issue update queries to an honest-but-curious server for adding or deleting his ciphertexts to or from the server and delegate keyword search over those ciphertexts to the server. Numerou...
A Comprehensive Review on Cyber-Attacks in Power Systems: Impact Analysis, Detection, and Cyber Security modules
Continuous communication and information technology advancements facilitate the modernization of the conventional energy grid into an integrated platform. Internet-of-Things (IoT) incorporates power systems, particularly smart grid features and the delivery of new services from the utility side to the end user over a two-way communication channel. ...
Data leakage detection using cyber security
The concept of sharing of personal health data over cloud storage in a healthcare-cyber physical system has become popular in recent times as it improves access quality. The privacy of health data can only be preserved by keeping it in an encrypted form, but it affects usability and flexibility in terms of effective search. Attribute-based searc...
CYBER-SECURITY OF INDUSTRIAL INTERNET OF THINGS IN ELECTRIC POWER SYSTEMS
Electric Power Systems (EPSs) are among the most critical infrastructures of any society, since they significantly impact other infrastructures. Recently, there has been a trend toward implementing modern technologies, such as Industrial Internet of Things (IIoT), in EPSs to enhance their real-time monitoring, control, situational awareness, and in...
Universal Switch Set with Data Encryption and Decryption for Legacy Applications without Cyber Safety Measures
Background: In metro system OEM install the switches and bind these switches with their MAC address mostly so it is difficult to install or upgrade the different switch in network without compromising the cyber security. Retrofitting these systems with modern security protocols can he challenging and costly, particularly for organizations with limi...
Improving open source software security using Fuzzing
Background: Fuzzing is an automated process of identifying software vulnerabilities by supplying unexpected and faulty inputs to the software. The main aim of fuzzing is to identify the crucial edge cases where a software might fail. Therefore, fuzzing provides a crucial insight into the stability and security of the software. The process of fuzzin...
Developing a tool to provide for real time feeds of cyber incident pertaining to Indian Cyber Space
Background: NCIIPC shares detail of cyber incidents to corresponding stakeholders in order to inform them about cyber activities related to their IT/OT infrastructure. This empowers them to take necessary actions to mitigate further risk. Description: In order to achieve objective of protecting Critical Information Infrastructure (CIIs) of the Na...
DESIGN AND IMPLEMENTATION OF A CREDIT CARD FRAUD DETECTION SYSTEM
Credit card fraud detection is a relevant problem that draws attention of machine learning. In the fraud detection task, there are some peculiarities present, such as the unavoidable condition of a strong class imbalance, the existence of unlabelled transaction, and the large number of records that must be processed. The present paper aims to pro...
DESIGN AND IMPLEMENTATION OF A COMPUTERIZED RECYCLING SYSTEM FOR PROTECTING THE GREEN ENVIRONMENT
Our society suffers a lot from the things that are thrown uselessly; these things may be beneficial to our society. On the other hand, communities suffer a lot of waste especially plastic waste; this has led to environmental pollution and depletion of natural resources. Therefore, this research aims to achieve sustainable development and achieve ...
Face Recognition Based Gate Pass System
A software web application based on facial recognition is used to create a gate pass system. During college hours, it coordinates the student's gate pass request and leave. This system is ready for use and is simple to operate and manage. A gate pass security system is what this system is called. Its main goal is to keep the campus safe from ou...
Credit Card Fraud Detection and Prevention By Face Recognition
Internet banking is now becoming the most commonly used form of banking transactions. Confidentiality can be compromised in the process of electronic purchases. We therefore introduced a new approach to prevent theft during online transactions in order to protect information through a two-step mechanism of authentication. The primary step o...
Evaluation of academic performance in web application
Managing the result sheets using traditional approach is a cumbersome process. The person must maintain the result records in registers and files using pen and paper. The problem with this approach is, it requires lot of paperwork which is the part of our non-renewable natural resources. We are in the age, where we must think about sustain...
e-Authentication system in cyber security
Authenticating the students’ identity and authenticity of their work is increasingly important to reduce academic malpractices and for quality assurance purposes in Education. There is a growing body of research about technological innovations to combat cheating and plagiarism. However, the literature is very limited on the impact of e-authentica...
Application of Block Chaining Technology in Finance and Accounting Field
Block chaining technology is a distributed infrastructure and computing paradigm. The latest version is represented by the super account book. The latest version is block chain 3. From the perspective of large data, this paper systematically combs the essence and core technology of block chain technology, and expounds the application status...
Data Privacy and key based security using SH256
Information security means protecting data, such as a database, from destructive forces and from the unwanted actions of unauthorized users. Information Security can be achieved by using cryptographic techniques. It is now very much demanding to develop a system to ensure better long lasting security services for message transaction over the Intern...