Refine your search
Collections
Co-Authors
Journals
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Girdhar, Anup
- WannaCry Malware Analysis
Abstract Views :547 |
PDF Views:7
Authors
Affiliations
1 Tilak Maharashtra Vidyapeeth, Pune, IN
2 Founder Sedulity Solutions and Technologies, IN
1 Tilak Maharashtra Vidyapeeth, Pune, IN
2 Founder Sedulity Solutions and Technologies, IN
Source
MERI-Journal of Management & IT, Vol 10, No 2 (2017), Pagination:Abstract
In business scenarios today, the most precious asset is computer systems and the data which is stored in them. Attackers are well aware of this fact and that is the reason why they can easily make money by holding this data at ransom. This is the reason why ransomware form of malware is on constant rise and is threatening businesses. WannaCry is one such ransomware which recently caused great havoc in many countries, affecting public amenities like health, in addition to causing huge monetary losses and losses to data. In this paper we will analyze wannacry in detail to understand its architecture, working, damages it caused and how the kill-switch worked to stop the damages for some time. We will also understand the various precautions to be taken to be protected from such ransomware in the future.Keywords
Ransomware, WannaCry, SMB Vulnerability, Doublepulsar, Bitcoins, TOR.References
- Certin, M. (2017, May 13) . Wannacry/WannaCrypt Ransomware. Retrieved from Cyber Swachhta Kendra Website: http://www.cyberswachhtakendra.gov.in/alerts/wannacry_ransomware.html
- Cert,E. (2017). WannaCry Ransomware Campaign Exploiting SMB Vulnerability. Retrieved from Cert Europa Website: https://cert.europa.eu/static/SecurityAdvisories/2017/CERT-EU-SA2017012.pdf
- Mercaldo, F., Nardone, V., Santone, A., & Visaggio, C. A. (2016, June). Ransomware steals your phone. Formal methods rescue it. In International Conference on Formal Techniques for Distributed Objects, Components, and Systems (pp. 212-221). Springer International Publishing.
- Klosowski ,T. (2014, Feb 2). What is Tor and Should I Use it. Retrieved from http://lifehacker.com/
- McNeil,A.(2017, May 19). How did the WannaCry Ransomware Spread? Retrieved from https://blog.malwarebytes.com/
- Scaife, N., Carter, H., Traynor, P., & Butler, K. R. (2016, June). Cryptolock (and drop it): stopping ransomware attacks on user data. In Distributed Computing Systems (ICDCS), 2016 IEEE 36th International Conference on (pp. 303-312).IEEE.
- Gazet, A. (2010). Comparative analysis of various ransomware virii. Journal in computer virology, 6(1), 77-90.
- Kharraz, A., Robertson, W., Balzarotti, D., Bilge, L., & Kirda, E. (2015, July). Cutting the gordian knot: A look under the hood of ransomware attacks. In International Conference on Detection of Intrusions and Malware, and Vulnerability Assessment (pp. 3-24). Springer International Publishing.
- Andronio, N., Zanero, S., & Maggi, F. (2015, November). HelDroid: Dissecting and detecting mobile ransomware. In International Workshop on Recent Advances in Intrusion Detection (pp. 382-404). Springer International Publishing.
- Sterling, B.(2017,April 4). Double Pulsar NSA Leaked Hacks in the Wild. Retrieved from https://www.wired.com/beyond-the-beyond/2017/04/double-pulsar-nsa-leaked-hacks-wild/
- On Road Obstacle Detection:A Review
Abstract Views :498 |
PDF Views:6
Authors
Padma Mishra
1,
Anup Girdhar
1
Affiliations
1 Department of Computer Science, TMV University, Pune, IN
1 Department of Computer Science, TMV University, Pune, IN
Source
MERI-Journal of Management & IT, Vol 10, No 2 (2017), Pagination:Abstract
On Road Obstacles detection from moving camera is also come under object detection. Road obstacles are a source of serious accidents that have a simple influence on driver safety, traffic flow efficiency and damage of the vehicle. The obstacle detection technologies are increasingly popular choices for driver assistant system. Obstacles detection is essential to avoid such kind of the accidents. Determining obstacles is very difficult and also it becomes complicated because of various problems like existence of shadow, environmental variations or an unexpected act of any moving things (e.g., car overtaking, animal coming) and many others with stationary camera. A new process is presented for detecting obstacles from moving camera and moving objects which overcomes numerous limitations above stationary cameras and moving/stationary objects. Further, paper analyses latest research developments to spot obstacles for moving cameras and moving objects with discussion of key points and limitations of each approach. Given the importance of obstacle detection, the main measure of interest was to decrease the road accidents and driver's safety. Detection of obstacles with moving camera and moving objects is more robust and reliable than stationary cameras.Keywords
Obstacle Detection, Intelligent Transportation System, Driver Safety.References
- Zhihu Wang; Kai Liao; Jiulong Xiong ; Qi Zhang,(2014) "Moving Object Detection Based on Temporal Information," Signal Processing Letters, EEE, vol.21, no.11, pp.1403,1407.
- L.-W. Tsai, J.-W. Hsieh and K.-C. Fan, (2007) “Vehicle detection using normalized color and edge map,” IEEE Trans. Image Process., vol. 16, no. 3,pp. 850–864.
- W. Zhang, Q. M. J.Wu, and X. Yang,(2008)“Multilevel framework to detect and handle vehicle occlusion,” IEEE Trans. Intell. Transp. Syst., vol. 9, no. 1, pp. 161–174.
- Bhaskar, P.K. ; Suet-Peng Yong,(2014) "Image processing based vehicle detection and tracking method," Computer and Information Sciences(ICCOINS), 2014 International Conference on , vol., no., pp.1,5.
- Dong, Xia, Kedian Wang, and GuohuaJia. (2009) "Moving object and shadow detection based on RGB color space and edge ratio." In Image and Signal Processing, 2009.CISP'09.2nd International Congress on, pp. 1- 5.
- Gang, Liu, NingShangkun, You Yugan, Wen Guanglei, and ZhengSiguo,(2013) "An improved moving objects detection algorithm." In Wavelet Analysis and Pattern Recognition (ICWAPR), 2013 International Conference on, pp. 96-102.
- Hassannejad, Hamid, Paolo Medici, Elena Cardarelli, and PietroCerri,(2015) "Detection of moving objects in roundabouts based on a monocular system." Expert Systems with applications 42.
- Choi, JinMin, Hyung Jin Chang, Yung Jun Yoo, and Jin Young Choi,(2012) "Robust moving object detection against fast illumination change. Computer Vision and Image Understanding 116.
- Patel, Chirag, Atul Patel, and Dipti Shah,(2015) "A Novel Approach for Detecting Number Plate Based on Overlapping Window and Region Clustering for Indian Conditions."
- Olaverri-Monreal, Cristina, Pedro Gomes, Ricardo Fernandes, Fausto Vieira, and Michel Ferreira, (2010) "The See-Through System: A VANET enabled assistant for overtaking maneuvers." In Intelligent Vehicles Symposium (IV), 2010 IEEE, pp. 123-128.
- Zhang, Huijuan, and Hanmei Zhang.(2013) "A moving target detection algorithm based on dynamic scenes." In Computer Science & Education (ICCSE), 2013 8th International Conference on, pp. 995-998.
- Xiang, Jinhai, Heng Fan, Honghong Liao, Jun Xu, Weiping Sun, and Shengsheng Yu,(2014) “Moving Object Detection and Shadow Removing under Changing Illumination Condition. “Mathematical Problems in Engineering.
- Kanungo, Anurag, Ashok Sharma, and ChetanSingla,(2014)"Smart traffic lights switching and traffic density calculation using video processing. “In Engineering and Computational Sciences (RAECS).
- Gomes, Pedro, Cristina Olaverri - Môn real, and Michel Ferreira, (2012) "Making vehicles transparent through V2V video streaming. “Intelligent transportation Systems, IEEE transactions on 13.
- Toth, Stefan, Jan Janech, and Emil r k. query Based Image Processing in the VANET,(2013)" In Computational Intelligence, Communication Systems and Networks (CICSyN), 2013 Fifth International Conference on, pp. 256-260.
- Badura, Stefan, and Anton Lieskovsky.(2010) "Intelligent traffic system: Cooperation of MANET and image processing." In Integrated Intelligent Computing (ICIIC), 2010 First International Conference on, pp. 119-123.
- Hao, JiuYue, Chao Li, Zuwhan Kim, and Zhang Xiong(2013). "Spatio temporal traffic scene modelling for object motion detection. “Intelligent Transportation Systems, IEEE Transactions on 14.
- Shahare, Dipali, and RanjanaShende ,(2014) "Moving Object Detection with Fixed Camera and Moving Camera for Automated Video Analysis." International Journal of Computer Applications Technology and Research, pp.277-283.
- Labayrade, Raphael, Didier Aubert, and Jean-Philippe Tarel.(2002)"Real time obstacle detection in stereovision on non-flat road geometry through" disparity" representation. “In Intelligent Vehicle Symposium, 2002. IEEE, vol. 2, pp. 646-651.
- Byun, Jaemin, Ki-in Na, Beom-suSeo, and MyungchanRoh, (2015) "Drivable Road Detection with 3D Point Clouds Based on the MRF for Intelligent Vehicle." In Field and Service Robotics, pp. 49-60.
- Kaur, Amandeep, and Tanupreet Singh. (2015)."A Comparative Analysis of Lane Detection Techniques. “International Journal of Computer Applications.
- Bello-Salau, H., A. M. Aibinu, E. N. Onwuka, J. J. Dukiya, and A. J. Onumanyi.(2014) "Image processing techniques for automated road defect detection: A survey." In Electronics, Computer and Computation (ICECCO), 2014 11th International Conference on, pp. 1-4.
- Ding, Feng, Yibing Zhao, Lie Guo, Mingheng Zhang, and LinhuiLi. (2015)"Obstacle Detection in Hybrid Cross-Country Environment Based on Markov Random Field for Unmanned Ground Vehicle." Discrete Dynamics in Nature and Society.
- Aly, Mohamed.(2009)"Real time detection of lane markers in urban streets." In Intelligent Vehicles Symposium, 2008 IEEE, pp. 7-12.
- Boroujeni, Nasim Sepehri, S. Ali Etemad, and Anthony Whitehead.(2012)"Fast obstacle detection using targeted optical flow." In Image Processing (ICIP), 2012 19th IEEE International Conference on, and pp. 65-68.
- MATLAB and Statistics Toolbox Release (2012), The Math Works, Inc., Natick, Massachusetts, United States.
- H. Yang, Y. Tan, J. Tian, J. Liu, Accurate dynamic scene model for moving object detection, in: Proceedings of the IEEE International Conference on Image Processing, vol. 6, September 2007, pp. 157–160.
- A. P. Shukla and Mona Saini, (2015), Moving Object Tracking of Vehicle Detectionǁ International Journal of Signal Processing, Image Processing and Pattern Recognition Vol.8, No.3.
- PMASCE-Polymorphic and Metamorphic Shellcode Creation Engine
Abstract Views :403 |
PDF Views:5
Authors
Affiliations
1 Tilak Maharashtra Vidyapeeth, Pune, IN
2 Sedulity Solutions and Technologies Delhi, IN
1 Tilak Maharashtra Vidyapeeth, Pune, IN
2 Sedulity Solutions and Technologies Delhi, IN
Source
MERI-Journal of Management & IT, Vol 11, No 1 (2017), Pagination: 39-55Abstract
Signature detection is ultimately going to be of no use in the future of AVs and IDS systems. The obfuscation of several parts of the exploit code is becoming so detailed that it could become almost impossible to uncover the various layers of obfuscation and reveal the actual malicious payload. In addition to obfuscation, there are sandbox evasion techniques being followed by attackers to hide from IDS if they try to study their behaviour in a simulated environment. Also, a worm may not attack in one go but in multiple stages, probably sending a small, innocent looking code first, which prepares the system for advance attacks. The worm may become polymorphic or metamorphic depending upon the attack complexity required. Polymorphic blending enables a worm to merge with normal traffic so well that anomaly-based IDS’ are unable to discern it from normal packets. To top it all, attackers are now able to create a M:N worm which means that a worm can have many signatures, many behaviours. This is done by changing the runtime behaviour of the shellcode. In this paper we propose an engine called PMASCE-Polymorphic and Metamorphic Shellcode Creation Engine. This engine enumerates all the steps which are required to be followed to create a strong polymorphic or metamorphic shellcode. This type of shellcode is created taking into account all the defence mechanisms carried out by the detection systems currently. Once all these steps are analysed, we aim to advance the research in IDS so that the existing IDS’ can be hardened to detect all malwarespolymorphic or metamorphic, employing all kinds of techniques of the present and the future.Keywords
Malware, IDPs, Sandbox, Polymorphic Shellcodes, Obfuscation, Blending, Metamorphism.References
- Prahbu, P. V., Song, Y., & Stolfo, S. J.,(2009). “Smashing the Stack with Hydra: The Many Heads of Advanced Polymorphic Shellcode”, Defcon, 17, 1-20.
- Sarraute, C., Miranda, F., & Orlicki, J. I.,(2010) “Simulation of computer network attacks”, arXiv preprint arXiv:1006.2407.
- Konstantinou, E., & Wolthusen, S., (2008) “Metamorphic virus: Analysis and detection”, Technical Report, Royal Holloway University of London, 15 .
- x86 Instruction Sequence, Article, Accessed: 24 July 2017, Available via: http://x86.renejeschke.de/html/file_module_x86_id_217.html
- Akritidis, P., Markatos, E. P., Polychronakis, M., & Anagnostakis, K., “Stride: Polymorphic sled detection through instruction sequence analysis”, IFIP International Information Security Conference, pp. 375-391, Springer, Boston, MA(2005, May).
- Haugsness K., ”IDFAQ: What is polymorphic shell code and what can it do?”, Article, SANS, Accessed: 10 July 2017, Available via: https://www2.sans.org/security-resources/idfaq/what-is-polymorphic-shell-code-and-what-can-it-do/2/19
- Johansson K., ”Re:pen testing & obfuscated shellcode(more neat stuff)”, Article, Accessed: 9 July 2017, Available via: http://seclists.org/pen-test/2004/Feb/69
- CourseHero, “Trampolining despite the fact that nop sledding makes”, Article, Accessed: 26 June 2017, Available via: https://www.coursehero.com/file/p2o51ar/Trampolining-Despite-the-fact-that-NOP-sledding-makes-stack-based-buffer
- Polychronakis, M., Anagnostakis, K. G., & Markatos, E. P., “Emulation-based detection of non-self-contained polymorphic shellcode”, International Workshop on Recent Advances in Intrusion Detection, pp. 87-106. Springer, Berlin, Heidelberg, September, 2007.
- CERT UK
- Sharif, M. I., Lanzi, A., Giffin, J. T., & Lee, W. , “Impeding Malware Analysis Using Conditional Code Obfuscation”, NDSS, February, 2008.
- Christodorescu, M., & Jha, S. , “Static analysis of executables to detect malicious patterns”,. Wisconsin Univ-Madison Dept of Computer Sciences, 2006.
- Song, Y., Locasto, M. E., Stavrou, A., Keromytis, A. D., & Stolfo, S. J., “On the infeasibility of modeling polymorphic shellcode”, Proceedings of the 14th ACM conference on Computer and communications security, pp. 541-551, ACM, 2007, October.
- Li, X., Loh, P. K., & Tan, F,(2008) “Mechanisms of polymorphic and metamorphic viruses”, Intelligence and Security Informatics Conference (EISIC), 2011 European, pp. 149-154, IEEE, 2011, September.
- Borello, J. M., & Mé, L., “Code obfuscation techniques for metamorphic viruses”. Journal in Computer Virology, 4(3), pp. 211-220 .
- Crandall, J. R., Su, Z., Wu, S. F., & Chong, F. T. ,(2005) “On deriving unknown vulnerabilities from zero-day polymorphic and metamorphic worm exploits”, Proceedings of the 12th ACM conference on Computer and communications security, pp. 235-248, ACM, November.
- Rad, B. B., Masrom, M., & Ibrahim, S.,(2012) “Camouflage in malware: from encryption to metamorphism”, International Journal of Computer Science and Network Security, 12(8), 74-83.
- Song, Y., Locasto, M. E., Stavrou, A., Keromytis, A. D., & Stolfo, S. J.. “On the infeasibility of modeling polymorphic shellcode”, Proceedings of the 14th ACM conference on Computer and communications security (pp. 541-551). ACM, October, 2007.
- Cheng, T. H., Lin, Y. D., Lai, Y. C., & Lin, P. C. , “Evasion techniques: Sneaking through your intrusion detection/prevention systems”. IEEE Communications Surveys & Tutorials, 14(4), 1011-1020, 2012.
- Fogla, P., Sharif, M. I., Perdisci, R., Kolesnikov, O. M., & Lee, W. , “Polymorphic Blending Attacks”. In USENIX Security Symposium (pp. 241-256), 2006, July.
- Balakrishnan, A., & Schulze, C. . “Code obfuscation literature survey”. CS701 Construction of compilers, 19, 2005.
- Vision Based Vehicle Detection Using Hybrid Algorithm
Abstract Views :375 |
PDF Views:5
Authors
Padma Mishra
1,
Anup Girdhar
1
Affiliations
1 Department of Computer Science, TMV University, Pune, IN
1 Department of Computer Science, TMV University, Pune, IN
Source
MERI-Journal of Management & IT, Vol 11, No 1 (2017), Pagination: 107-117Abstract
Moving vehicle detection remain very critical and thus intended for Video-based solution, comparing to other techniques and by considering the traffic video sequence recorded from a video camera, this paper presents a video-based solution applied with adaptive subtracted background technology in combination with virtual detector and blob tracking technologies. This paper provides Experimental results moving vehicle detection which is implemented in Visual C++ code with OpenCV, thus the proposed method used for detection.Keywords
Computer Vision, GMM, ITS, Open CV, Vehicle Detection.References
- S. Sivaraman and M. Trivedi,(2013)“Looking at vehicles on the road: A survey of vision-based vehicle detection, tracking, and behaviour analysis”, IEEE Transactions on Intelligent Transportation Systems, vol. 14, no. 4, pp. 1773-1795.
- Y. Liu, B. Tian, S. Chen, F. Zhu, and K. Wang, (2013) “A survey of vision-based vehicle detection and tracking techniques in ITS”, IEEE International Conference on Vehicular Electronics and Safety (ICVES), pp. 72-77.
- M. Lei, D. Lefloch, P. Gouton, and K. Madani, (2008) “A Video-Based Real-Time Vehicle Counting System Using Adaptive Background Method”, IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 523-528.
- G.D. Sullivan, K.D. Baker, A.D.Worrall, C.I. Attwood, and P.M. Remagnino, (1997)“Model-based vehicle detection and classification using orthographic approximations”, Image and Vision Computing, vol. 15, no. 8, pp. 649-654,
- S. Gupte, O. Masoud, R.F.K. Martin, and N.P. Papanikolopoulos,(2002)“Detection and classification of vehicles”, IEEE Transactions on Intelligent Transportation Systems, vol. 3, no. 1, pp. 37-47.
- S.C. Lee and R. Nevatia, “c”(2008), in Multimodal Technologies for Perception of Humans, Lecture Notes in Computer Science, vol. 4625, pp: 197-202.
- N. Otsu,(1979) “A threshold selection method from gray-level histograms”, IEEE Transactions on Systems, Man, and Cybernetics, vol. 9, no. 1, pp. 62-66.
- P.S. Liao, T.S. Chen, and P.C. Chung,(2001) “A Fast Algorithm for Multilevel Thresholding”, Journal of Information Science and Engineering, vol. 17, no. 5, pp. 713-727.
- B. Sun, S. Li,(2010) “Moving Cast Shadow Detection of Vehicle Using Combined Color Models”, Chinese Conference on Pattern Recognition (CCPR), pp. 1-5.
- A. Sanin, C. Sanderson, and B.C. Lovell,(2012) “Shadow detection: A survey and comparative evaluation of recent methods”, Pattern Recognition, vol. 45, no. 4, pp. 1684-1695.
- Bin-Feng Lin; Yi-Ming Chan; Li-Chen Fu; Pei-Yung Hsiao; Li-An Chuang; Shin-Shinh Huang; Min-Fang Lo;(2012)”Integrating Appearance and Edge Features for Sedan Vehicle Detection in the Blind-Spot Area,” Intelligent Transportation Systems, IEEETransactions on , vol.13, no.2, pp.737,747.
- Feris, R.S.; Siddiquie, B.; Petterson, J.; Yun Zhai; Datta, A.; Brown, L.M.; Pankanti, S.,(2012) “Large-Scale Vehicle Detection,Indexing, and Search in Urban SurveillanceVideos,” Multimedia, IEEE Transactions on , vol.14, no.1,pp.28,42.
- SooTeoh and Thomas Bräunl,(2012)”A reliability point and Kalmanfilter-based vehicle tracking technique”, Proceedings of the International Conference on Intelligent Systems (ICIS’2012), Penang, Malaysia, pp. 134-138.
- Mithun, N.C.; Rashid, N.U.;Rahman, S.M.M.,(2012) “Detection and Classification of Vehicles from Video Using Multiple Time- Spatial Images,” Intelligent Transportation Systems, IEEE Transactions on, vol.13, no.3, pp.1215, 1225.
- Chieh-Ling Huang;Heng-Ning Ma,(2012)”A Moving Object Detection Algorithm for Vehicle Localization,” Genetic andEvolutionary Computing (ICGEC), 2012 Sixth International Conference on , vol., no., pp.376,379, 25-28.
- Morris, B.T.; Cuong Tran; Scora, G.; Trivedi, M.M.; Barth,M.J.,(2012) “Real-Time Video-Based Traffic Measurement and Visualization System for Energy/Emissions,” Intelligent Transportation Systems, IEEE Transactions on , vol.13, no.4,pp.1667,1678.
- Proposed Framework for Partial Vehicle Image Detection Using SVM and Fuzzy
Abstract Views :339 |
PDF Views:5
Authors
Padma Mishra
1,
Anup Girdhar
1
Affiliations
1 Department of Computer Science, TMV University, Pune, IN
1 Department of Computer Science, TMV University, Pune, IN
Source
MERI-Journal of Management & IT, Vol 11, No 2 (2018), Pagination: 86-95Abstract
Image of particular object as vehicle as image detection is mainly the important role in driver assistant system as well as in intelligent autonomous vehicles. Thus in real - time it run time performance in term of accuracy performance. Thus the proposed system is discussed with consideration of overlapping of one image with another and partial view of images etc.thus the partial vehicle detection module is basically on driver assistant system and intelligent auto-nous vehicles by considering what type of image as vehicle appears in which area should extracted and classification based color Histogram of Orientated Gradients. Thus it perform the conversion of the input image as vehicle into gray image then Supreme stable outer region thus extract input as stable object in the previous output with the use of more one or more frames. In upcoming research the support vector machine retrieve the image as data from maximum stable external region result and then matches with database of image. Thus the concurrently the fuzzy pattern cluster techniques retrieve the object of interest from SSOR result and then apply the colors after that it will matches it with existing database images of vehicles.Keywords
Histogram of Orientated Gradients, Support Vector Machine, Fuzzy.References
- L. I. Rudin, S. Osher, and E. Fatemi, Nonlinear total variation based noise removal algorithms, PhysicaD: Nonlinear Phenomena, vol. 60, no. 1 - 4, pp. 259–268, 1992.
- P. Favaro and S. Soatto, A geometric approach to shape from defocus, IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 27, no. 3, pp. 406–417, 2005.
- R. Liu, Z. Li, and J. Jia, Image partial blur detection and classification,in Proceedings of the 26th IEEE Conference on Computer Vision and Pattern Recognition (CVPR ’08), pp. 1–8, IEEE, Anchorage, Alaska, USA, June 2008.
- J. Shi, L. Xu, and J. Jia, Discriminative blur detection features,in Proceedings of the 27th IEEE Conference on Computer Vision and Pattern Recognition (CVPR ’14), pp. 2965–2972, IEEE,Columbus, Ohio, USA, June 2014.
- A.Mittal, A. K.Moorthy, and A. C. Bovik, No-reference image quality assessment in the spatial domain,IEEE Transactions on Image Processing, vol. 21, no. 12, pp. 4695–4708, 2012.
- https://www.dtreg.com/solution/view/20