@auup.amity.edu
Professor
Amity University (HQ)
Engineering, Computer Engineering, Computer Science, Computer Science Applications
Scopus Publications
Grace Odette Boussi, Himanshu Gupta, and Syed Akhter Hossain
Institute of Advanced Engineering and Science
There are various types of cybercrime, and hackers often target specific ones for different reasons, such as financial gain, recognition, or even revenge. Cybercrimes are not restricted by geographical boundaries and can occur globally. The prevalence of specific types of cybercrime can vary from country to country, influenced by factors such as economic conditions, internet usage levels, and overall development. Phishing is a common cybercrime in the financial sector across different countries, with variations in techniques between developed and developing nations. However, the impact, often leading to financial losses, remains consistent. In our analysis, we utilized a dataset featuring 48 attributes from 5,000 phishing webpages and 5,000 legitimate webpages to predict the phishing status of websites. This approach achieved an impressive 98% accuracy.
Pulkit Sharma and Himanshu Gupta
IEEE
The widespread integration of information and communication technologies in today's digital landscape has brought about unprecedented convenience, but it has also increased the threat of cybersecurity. This study looks at the complexity of new cybersecurity threats and the parallel development of security apps meant to strengthen digital systems. Our goals include a thorough examination of the dangers that IT workers must deal with, a critical evaluation of the effectiveness of the security solutions that are currently in place in the dynamic digital environment, and an investigation of the dynamic security application landscape. The first section takes readers through the maze of newly emerging cybersecurity threats, offering information on supply chain vulnerabilities, ransomware attacks, IoT vulnerabilities, and Advanced Persistent Threats (APTs). Case studies from real life situations shed light on these threats' subtleties. The dynamic world of security applications is examined in the following section, along with the functions of blockchain technology, cloud security, endpoint security, artificial intelligence (AI), and machine learning (ML). The goal of this research is to provide insightful analysis of the changing cybersecurity landscape to IT professionals, policymakers, and researchers. It also aims to facilitate the development of well-informed strategies to protect digital ecosystems.
Rijul Khanna and Himanshu Gupta
IEEE
Data Integrity refers to the state of the data we store in our database. The data should be unchanged aside from corrections and updates for Data Integrity to remain and be present in the system. The Data Integrity Checker (DIC) I wish to design and develop should play a part in maintaining the integrity that should be present in all database systems. As for the development, mostly MySQL and PHP will be utilised. Firstly, there needs to be a database to maintain integrity in, so a database containing a multitude of made-up records will be used. Then, there should be an interface which allows for ‘Admins’ and ‘Users’ to login and then interact with the database through SQL queries and such, and then there should be another table which has records of all queries made, which user or admin it was made from and at which time it was done. Data Integrity is essential to maintain in any sort of database as the main functions of most if not all organizations that utilize data hinder on the authenticity and accuracy of the data they use, so, in a sense, maintaining Data Integrity is one of the top priorities of any data-driven system.
Vridhi Aggarwal and Himanshu Gupta
IEEE
This study examines the escalating cybersecurity challenges in the contemporary digital landscape, encompassing individuals, organizations and governments. The focus is on reviewing methods to mitigate cyber threats, with a spotlight on emerging challenges such as advanced persistent threats, ransomware, IoT vulnerabilities, and social engineering. Additionally, the study explores upcoming cybersecurity trends like blockchain, cloud security, and artificial intelligence, underscoring the importance of proactive measures. The abstract emphasizes the significance of robust cybersecurity practices, including strong passwords, encryption, and regular software updates, as imperative for effective defense in the digital era.
Shruti Sett and Himanshu Gupta
IEEE
In this modern world of technology, data protection has become a top concern for both individuals and businesses. The ever-present threat of identity theft highlights the limitations of traditional security measures such as encrypted passwords and authenticated IDs. This study addresses the growing challenges of cybersecurity by proposing a new biometric security model that specifically focuses on fingerprint recognition. Fingerprints are unique to each person and have historically served as a reliable method of personal identification. Our research leverages the proven accuracy and efficiency of fingerprint recognition and advocates its integration into traditional password-based authentication processes. The synergy of fingerprint recognition and passwords ensures that only authenticated users have access to sensitive information, protecting it from theft and misuse. The urgent need for robust information security is driving the increased adoption of biometric data. This paper addresses his twin goals of user authentication and privacy and provides an in-depth look at biometrics as a good alternative to traditional methods. Biometric authentication based on various physical and behavioural characteristics of people provides excellent protection against theft, loss, or unauthorized access. provides a comprehensive overview and provides insight into its effectiveness and limitations. This paper contributes to ongoing efforts to address vulnerabilities in current authentication systems by identifying gaps and suggesting directions for future research. The proposed biometric security model represents an important step towards enhancing data security and countering evolving cyber threats in the digital era.
Aman Jain and Himanshu Gupta
IEEE
Data security has become a paramount concern for both individuals and organizations in today's digital age. With the proliferation of networked systems and our increasing reliance on technology, the risk of data breaches and unauthorized access has escalated. To confront these challenges, the development of robust cryptographic frameworks is imperative. This paper proposes a cryptographic model aimed at bolstering data security through advanced encryption techniques and secure data transmission protocols. The rapid evolution of digital technologies has transformed how we generate, transmit, and store data. However, this transformation has also exposed sensitive information to various security threats, underscoring the necessity for robust cryptographic frameworks to fortify data security. This research paper introduces a comprehensive cryptographic model that integrates encryption, hash functions, and digital signatures to safeguard data from unauthorized access, ensure data integrity, and establish secure communication channels.
Himanshu Gupta, Sonam Bhardwaj, and Mayank Dave
IEEE
IoT networks employ the RPL routing protocol as it is lightweight and suitable for lossy networks and establishes a Destination Oriented Directed Acyclic Graph (DODAG). The primary constraints on RPL-based networks are limited power sources, lifespan, and reliability. This article examines different types of attacks that can occur in loT network that uses RPL. The Contiki OS Cooja simulator is utilized to simulate various types of attacks. The evaluation of the attacks is conducted by analyzing their impact on various performance parameters, including Packet Delivery Ratio (PDR), Power Consumption, Control Message Overhead, and Network Graph. Upon conducting the analysis, it is determined that these attacks have a detrimental effect on loT networks making it crucial to prioritize the mitigation of vulnerabilities and security risks that are linked to loT devices.
Prateek Dang and Himanshu Gupta
Springer Nature Singapore
Razdan Sanjay, Gupta Himanshu, and Seth Ashish
Totem Publisher, Inc.
Himanshu Kumar and Himanshu Gupta
IEEE
Enterprises can adopt cloud computing without having to make a significant initial investment. Although there may be advantages to cloud computing, model One of the challenges in adopting the cloud model is the persistent concerns about security. This is made more complicated by the introduction of new elements such as model multi-tenancy, architecture, and layered dependency stack, elasticity, which further increase the complexity of security issues. hindering The security of present technology is at risk when the cloud model design is applied. Customers of cloud services should therefore be aware of the dangers involved in putting data into this unusual environment. As a result, this article examines a number of cryptographic domains that threaten cloud computing. The specific security issues of using encryption in a cloud computing system are outlined in this study.
Isha Yadav and Himanshu Gupta
IEEE
Today data is the biggest asset for the company. Due to increase in cyber attacks it is necessary to protect them from cyber threats. One of the biggest concerns for a company is to maintain data integrity. To maintain the integrity and reliability it is necessary to have an efficient data loss prevention system. Traditional approaches like firewall can’t protect our data anymore which will have a huge impact on the company. To prevent these negative impacts reliable data loss prevention is necessary.Data loss prevention (DLP) systems are critical tools for protecting sensitive data from loss or theft. Traditional DLP solutions have focused on a single approach, such as endpoint DLP or network DLP. However, in today’s complex and rapidly evolving threat landscape, organizations need a more comprehensive approach to data loss prevention. This paper proposes a methodology for combining behaviour-based DLP, machine learning-based DLP, and network-based DLP to enhance data integrity in cyberspace. This approach provides a comprehensive and integrated solution that detects and prevents data loss across the entire network. The proposed methodology includes identifying sensitive data, deploying endpoint DLP, network DLP, and machine learning DLP solutions, integrating the DLP solutions, implementing monitoring and reporting, and continuously improving the system. By combining these DLP approaches, organizations can better protect sensitive data and ensure data integrity in today’s complex and evolving threat landscape [1] [6].
Mayank Kumar and Himanshu Gupta
IEEE
The 4th Industrial Revolution, also known as or the Industry 4.0, has been characterized by the emergence of revolutionary technologies like robotics, computer vision, big data the analysis, and the Internet of Things, or IoT for short, directly into the operations of industries. As these technologies become increasingly widespread, they also introduce new cybersecurity risks that need to be addressed. This paper provides a comprehensive review of the current literature on cyber security challenges and mitigation strategies in Industry 4.0. The research approach involved a systematic literature review of academic journals, conference proceedings, and relevant reports and studies. The review’s findings emphasize the most significant cyber security concerns impacting the Industry 4.0 movement, including data privacy and security, network security, and system integrity. The paper also identifies and evaluates the strategies used to mitigate these challenges, including encryption, access control, and network segmentation. The analysis section interprets the findings, draws meaningful conclusions and offers valuable recommendations for future research and practical applications. The research paper delivers an input to the topic of cyber security within Industry 4.0 by offering an in-depth review regarding the domain’s present circumstances and presenting prospective directions for additional research and advancement.
Grace Odette Boussi, Himanshu Gupta, Syed Akhter Hossain, and Fila Rudy J. J
IEEE
Cybersecurity has been a trending topic for years now, different propositions, studies, and work have been suggested in various forms by other authors all over the world, but the impact of crime is still around us. In the present area, we cannot say that data is safe when it is hidden from an unauthorized person, but it is safe when the intruder cannot understand it, hence encryption is the suitable solution at the moment. Encryption is one of the techniques that we use to protect our data from unauthorized persons. In this technique, we do not stop the unauthorized person from accessing our information, but we made our data appear in an incomprehensive form to the intruder, only the person with the correct key can decrypt the encrypted message. Many encryption techniques are available, and the commonly used and modern ones are RSA, AES, and HAS, each of them is suitable for different scenarios and are all helpful for cyber security. In this paper, we will propose a framework that provides an additional layer of security for any sensitive information in general and those in the banking sector.
Sanjay Razdan, Himanshu Gupta and A. Seth
Totem Publisher, Inc.
Sanjay Razdan, Himanshu Gupta, and Ashish Seth
IEEE
Intrusion Detection Systems are used in cloud as well as in on-premises networks for detecting the intrusions. For an Intrusion Detection System, it can be computationally expensive and time consuming to process a high dimensional data to detect intrusions. Various filter as well as wrapper methods are used to select the most relevant features from the feature space for the classification. Thus, feature selection methods help to eliminate those features which do not have or have less predictive information. By using feature selection methods, we can make an Intrusion Detection System more efficient. In this paper we have selected and used four feature selection methods on NSL-KDD dataset. The reduced feature set is then used to classify the test data using Support Vector Machine. The significant outcome of this paper is the most efficient feature selection method among those discussed in this paper.
Sanjay Razdan, Himanshu Gupta, and Ashish Seth
IEEE
Cloud computing has enabled organizations to get rid of the infrastructural cost and increase the service availability. However, the risks associated with the openness and resource sharing of the cloud presents serious security challenges. Intrusion Detection System acts as a monitoring and alerting system against the security breaches. However, such a system needs to be efficient and generate least false alarms. This paper reviews the Intrusion Detection Systems proposed during the year 2015-2020 and evaluates their performance based on Accuracy, Detection Rate and False Positive Rate. This work also highlights the average performance of Intrusion Detection Systems during the period of study and method that resulted in best performance.
Sanjay Razdan, Himanshu Gupta, and Ashish Seth
IEEE
Any malicious activity on the network needs to be detected immediately to protect the user data. This helps to ensure Confidentiality, Availability, and Integrity. Machine learning algorithms are efficient tools that can be used in anomaly detection techniques to detect attacks against network. Decision Trees and Naive Bayes algorithms are the two important algorithms that can detect zero-day attacks with a great precision. While both are used for same purpose, these algorithms may produce different detection performance results on same set of data. This paper evaluates the Intrusion detection performance of these two algorithms on CIDDS-02 data set using various parameters of interest.
Aman Bhatt and Himanshu Gupta
IEEE
Cyber security plays a very important and huge role in the area of information technology and now the IT sector are growing rapidly cyber security become a complicated and fast-moving security challenge in period of information technology. Cyber security use to prevent cybercrime many governments and companies are more concern about their data. And securing a data become a major concern and challenge for many big organisations. And a lot of smart things have come to market like e-health, online banking which make our life a lot easier but with this type of application cyber security is also important. This paper mainly focused on new cyber security technique, trends and focus in application area in cyber security [1-6].
Shubham Gupta, Isha, Anando Bhattacharya, and Himanshu Gupta
IEEE
The primary objective of this research is to analyze the various types of social engineering attacks on cryptographic algorithm, the modus operandi of attackers, the damage that can be done, preventing measures, how to recover in the aftermath of such attacks and perhaps a new model of prevention against such attacks. The methodology for the analysis used in this research will be a case study method of research, done by thorough scrutiny of secondary data and the methodology used in the development of a new security model will be combination of various security algorithms to bring forth a new hybrid security model. The purpose of this study is to give an understanding regarding the matter of Social Engineering and to clarify how it may be utilized to damage a networks framework or/and trade off information and suggest a suitable model.
Suraj Vaishy and Himanshu Gupta
IEEE
The increasing growth associate degreed diversification within the methods and practices of lawbreaking has become a troublesome obstacle so as each to grasp the extent of embedded risks and to outline economic policies of bar for corporations, establishments and agencies. This study represents the foremost comprehensive review of the origin, typologies and developments of law-breaking development over the past decade therefore far. By means that of this e- laborate study, this paper tackles the difficulty initial describing and discussing former totally different criteria of classification in the field and secondly, providing a broad list of definitions and an analysis of the cybercrime practices. An abstract taxonomy of law-breaking is introduced and described. The proposal of a classification criterion is employed in con- junction with a cybercrime hierarchy derived from the degrees and scale of vulnerability and targets
Neeraj Kaushik, Mohammad Yawer Qadri, and Himanshu Gupta
IEEE
Security of the data is the utmost important in today's world scenario. To achieve completeprivacy of the data stored on various electronic devices like laptops, computers, external hard disk, USB drives etc. data storage encryption is needed to make the data more secure for any organization or any small offices. Encrypting the data provides a way out for the organization to keep a firm hold on their sensitive data or information. Intelligent devices like laptops and PC's are prone to security attacks resulting in the compromising the data. This problem can be solved by employing data encryption. Thought many encryption techniques are being used to make the data secure but a hybrid encryption algorithm should be used to make the data encryption more secure.
Khyati Kumar and Himanshu Gupta
IEEE
With the popularity of e-commerce websites, online transaction options have too gained prominence among customers. Ensuring security is still a major issue that professionals focus on. Though digital transactions enhance customer-merchant experience, there are various risks and challenges involved. Existing techniques such as Address Verification System (AVS), Card Verification Value (CVV), etc. help in verifying customer authenticity. From a customer's perspective, there are no authentication frameworks that will inform them about dishonest merchants. This paper suggests a system model that will use interactive modules to generate a Trust Factor (TF) which will help in detecting fraudulent merchant accounts at financial institutions. This financial technology will generate reports that can be used for analysis to understand the behavior of fraud activities in real time using sophisticated machine learning algorithms, thereby, mitigating merchant and transactional frauds.
Pranjal Srivastav and Himanshu Gupta
IEEE
Digital era has made work easy for all industries including marketing. With the introduction of digital marketing in the year 1990 the means of selling products and promoting businesses has completely changed, and it has seen a massive growth in recent years. In the current coronavirus pandemic situation, where interacting physically with people is not safe and people are becoming more active online on different social media platforms, digital marketing shows a ray of hope for businesses to flourish by increasing sales with lower expenses and safer means of transactions. This paper is focused on the role and applications of digital marketing to show its suitability for current situations. It starts with an introduction to digital marketing, its importance, processes involved, then it lists the steps of process involved and finally enumerates the security risks attached to it.
Anchit Agarwal, Himdweep Walia, and Himanshu Gupta
IEEE
Data privacy and encryption will still be top security priorities. Threat controls are countermeasures or safeguards used to reduce the chances that a threat will exploit a vulnerability as there is also a lack of understanding and a systematic model on which to base threat hunting operations and quantifying their effectiveness from the start of a threat hunt engagement to the end, as well as analytic rigour and completeness analysis. Threat hunting is a systematic method that aims to discover the location of attacker tactics, techniques, and procedures (TTP) in an area that has not yet been detected by current detection technologies. Using six stages: purpose, scope, equip, plan review, execute, and feedback, this research outlines a survey on this research.
Francis K. Mupila and Himanshu Gupta
Springer Singapore