Thursday, March 29, 2018

Detecting Malicious Facebook Application using Digital India Scheme


With 20 million installs a day third-party apps are a major reason for the popularity and addictiveness of Facebook. Unfortunately, hackers have realized the potential of using apps for spreading malware and spam. The problem is already significant, as we find that at least 13% of apps in our data set are malicious. So far, the research community has focused on detecting malicious posts and campaigns. In this paper, we ask the question: given a Facebook application, can we determine if it is malicious? Our key contribution is in developing Proguard Facebook's Rigorous Application Evaluator arguably the first tool focused on detecting malicious apps on Facebook. 


To develop ProGuard, we use information gathered by observing the posting behavior of 111K Facebook apps seen across 2.2 million users on Facebook. First, we identify a set of features that help us distinguish malicious apps from benign ones.For example, we find that malicious apps often share names with other apps, and they typically request fewer permissions than benign apps. Second, leveraging these distinguishing features, we show that ProGuard can detect malicious apps with 100% accuracy, with no false positives and a low false negative rate (4.1%). Finally, we explore the ecosystem of malicious Facebook apps and identify mechanisms that these apps use to propagate. 

Interestingly, we find that many apps collude and support each other; in our dataset, we find 1,584 apps enabling the viral propagation of 3,723 other apps through their posts. Long-term, we see ProGuard as a step towards creating an independent watchdog for app assessment and ranking, so as to warn Facebook users before installing apps And improved online infrastructure and by increasing Internet connectivity so that we can avoid fraud and cheating. 

By M. Divya | M. Monika | N. Kanimozhi"Detecting Malicious Facebook Application using Digital India Scheme"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10964.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10964/detecting-malicious-facebook-application-using-digital-india-scheme/m-divya

peer reviewed journals, manuscript submission, call for paper engineering

Geometric Modeling, Design and Analysis of Custom-Engineered Milling Cutters


The geometric modeling of the cutting tools is an important aspect for the design and manufacturing engineers from the viewpoint of shape realization. The geometry of cutting tools? surfaces based on two-dimensional (2D) projected geometry approach has certain limitations. This definition is also inadequate due to inaccuracy and non-applicability of the model for further manipulation. To address these issues, an accurate three-dimensional (3D) surface-based generic definition for a few families of custom-engineered milling cutters has been developed. 


The proposed geometric definition of the customized cutter is developed in terms of biparametric surface patches using proposed 3D rotational angles rather than the conventional 2D angles. The non-uniform rational B-spline (NURBS) curve(s) and generation of sweep surfaces based on it are utilized for the shape generation of cutting elements of the generic cutters. 

This representation scheme enables tooth shapes to be controlled by manipulating control polygons and sweep trajectories and in the process varied tool geometries can be generated. Further, an interface is developed that converts the proposed 3D parametric definition of the cutter into an intermediate neutral CAD format. This helps in rendering the cutter model in any CAD modeling environment. 

R. R. Karthi | B. Tamilarasu | S. Mukesh | K. M. Naveen Kumar"Geometric Modeling, Design and Analysis of Custom-Engineered Milling Cutters"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10986.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/10986/geometric-modeling-design-and-analysis-of-custom-engineered-milling-cutters/r-r-karthi

peer reviewed journals, manuscript submission, call for paper engineering

Meaconing and Spoofing Attacks Evaluation with Enhancement in Security for Satellite Communication


Spoofing is the most dangerous threat of the GNSS infrastructure. Main goal of meaconing is to mis-¬lead the receivers tracking and sending wrong informa-¬tion about the signal position. The normal receiver is not conscious about this attack, and it acquires the counterfeit or mislead signal and discards the authentic signals. 


The rapid diffusion of GNSS location based applications which involve in large set of human activities makes the navigation system infrastructure very vulnerable against malicious attacks, which aim to disrupt the functionalities for illegal purposes. Considering into this scenario, ef-ficient and computationally efficient detection and mitiga-¬tion techniques are present in this paper in order to counteract spoof-¬ing and meaconing signals. 

The aim of this paper is to present possible and simple ap-proaches in the spoofing detection field. Signal affected by spoofing signals are considered and detection methods are described pointing out the principal steps and possible applications, and drawbacks are also considered. 

By Tarun Varma | Dr. Akhilesh R. Upadhyay"Meaconing and Spoofing Attacks Evaluation with Enhancement in Security for Satellite Communication"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10981.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/10981/meaconing-and-spoofing-attacks-evaluation-with-enhancement-in-security-for-satellite-communication/tarun-varma

international peer reviewed journal, paper publication for engineering, conference issue publication

Maintaining Secure Cloud by Continuous Auditing


Increases in cloud computing capacity, as well as decreases in the cost of processing, are moving at a fast pace. These patterns make it incumbent upon organizations to keep pace with changes in technology that significantly influence security. Cloud security auditing depends upon the environment, and the rapid growth of cloud computing is an important new context in world economics. The small price of entry, bandwidth, and processing power capability means that individuals and organizations of all sizes have more capacity and agility to exercise shifts in computation and to disrupt industry in cyberspace than more traditional domains of business economics worldwide. 


An analysis of prevalent cloud security issues and the utilization of cloud audit methods can mitigate security concerns. This verification methodology indicates how to use frameworks to review cloud service providers (CSPs). The key barrier to widespread uptake of cloud computing is the lack of trust in clouds by potential customers. While preventive controls for security and privacy are actively researched, there is still little focus on detective controls related to cloud accountability and auditability. The complexity resulting from large-scale virtualization and data distribution carried out in current clouds has revealed an urgent research agenda for cloud accountability, as has the shift in focus of customer concerns from servers to data. 

By M. Kanimozhi | A. Aishwarya | S. Triumal"Maintaining Secure Cloud by Continuous Auditing"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10829.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10829/maintaining-secure-cloud-by-continuous-auditing/m-kanimozhi

high impact factor, ugc approved journals for engineering, special issue publication

Vehicle Density Based Traffic Control System


In this paper, we proposed a system i.e. vehicle density based traffic management system. Present day traffic signal system is fixed time based which may render inefficient if one lane is operational than the others. To optimize this problem we have made a framework for an intelligent traffic control system. 


Sometimes higher traffic density at one side of the junction demands longer green time as compared to standard allotted time. Basically, it is divided into two modules. In first module, the timing of signal will change automatically on sensing the traffic density at any junction. We, therefore propose here a mechanism in which the time period of green light and red light is assigned on the basis of the density of the traffic present at that time. 

And in second module, to reduce the crime we develop a technique of automatic number plate recognition using image processing. In this paper, the first section is introduction, second section is literature survey, third section is block diagram and components, fourth section is prototype implementation, fifth section is conclusion, sixth section is references. whatever the result is shown in this paper is partially executed. 

By Anand Gaikwad | Shreya | Shivani Patil"Vehicle Density Based Traffic Control System"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10938.pdf 

Direct URL: http://www.ijtsrd.com/engineering/electronics-and-communication-engineering/10938/vehicle-density-based-traffic-control-system/anand-gaikwad

high impact factor, ugc approved journals for engineering, special issue publication

Critical Time '“Motion and Economic Analysis of Linear and Rotary Gravity Conveyor for application One man multi-machine setup as low cost automation in material handling


The rapid growth of technology in the last two decades has been characterized by full automation. As only the affluent and developed countries can afford to adopt full automation, a large productivity gap has been created. This gap can be bridged through low cost automation. The concept and principles of low cost automation are basically the same as those of full automation except that the former builds improvement around existing equipment and machine system rather than replacing whole system with automated processes. 


Material handling is the primary activity of every manufacturing organization. It has been estimated that at least 15 to 25% of the cost of the product is attributable to material handling activities. Unlike many other operations, material handling adds to the cost of the product and not to its value. It is therefore important first to eliminate or at least minimize the need for material handling and second to minimize the cost of handling. Karakuri mechanisms use a single force or motion to simultaneously perform multiple operations, and also lead directly to energy conservation and resource (facilities) savings. Conventionally gravity conveyors are used to perform material handling task but they are more often of fixed layout type with a singular application. 

The proposed linear gravity conveyor for flexible manufacture system uses the principle of Converting the force from a dropped weight into gear rotation to activate a conveyor thereby saving the cost of motor and electricity. Conveyors are ordinarily activated by using drive from a motor. In this example, when the conveyor is lifted with a cylinder, a weight drops from the top portion of the conveyor. The force of dropped weight rotates gears that provide movement needed for slide delivery of work (semi-finished products). 

This mechanism eliminates the need for a motor and enabled a reduction in standby electricity and electricity for operation. Slide delivery requires only the necessary amount of driving energy at the time when needed and is therefore consistent with the concept of 'Ĺ“just-in-time' electricity. Objective of project is carry out critical analysis as to time-motion and economics of the developed conveyor system with linear and rotary conveyor to determine the i)Transfer time ii)Maximum load carrying capacity .Comparative analysis of the performance of the developed system with conventional conveyor to derive: Change in job transfer time. 

By Mr. Deokate A. Y. | Prof. Mundhe V. L. | Dr. N. G. Narve"Critical Time '“Motion and Economic Analysis of Linear and Rotary Gravity Conveyor for application One man multi-machine setup as low cost automation in material handling"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10961.pdf 

Direct URL: http://www.ijtsrd.com/engineering/mechanical-engineering/10961/critical-time-'“motion-and-economic-analysis-of-linear-and-rotary-gravity-conveyor-for-application-one-man-multi-machine-setup-as-low-cost-automation-in-material-handling/mr-deokate-a-y

manuscript publication, submit paper online, indexed journal

Anomaly Threat Detection System using User and Role-Based Profile Assessment


In network security the organizations are ever-growing to identify insider threats. Those who have authorized access to sensitive organizational data are placed in a position of power that could well be abused and could cause significant damage to an organization. Traditional intrusion detection systems are neither designed nor capable of identifying those who act maliciously within an organization. We describe an automated system that is capable of detecting insider threats within an organization. 


We define a tree-structure profiling approach that incorporates the details of activities conducted by each user and each job role and then use this to obtain a consistent representation of features that provide a rich description of the user's behavior. Deviation can be assessed based on the amount of variance that each user exhibits across multiple attributes, compared against their peers. 

We have performed experimentation using that the system can identify anomalous behavior that may be indicative of a potential threat. We also show how our detection system can be combined with visual analytics tools to support further investigation by an analyst. 

U. Indumathy | M. Nivedha | Mrs. K. Alice"Anomaly Threat Detection System using User and Role-Based Profile Assessment"

Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018,

URL: http://www.ijtsrd.com/papers/ijtsrd10956.pdf 

Direct URL: http://www.ijtsrd.com/engineering/computer-engineering/10956/anomaly-threat-detection-system-using-user-and-role-based-profile-assessment/u-indumathy

review papers, ugc approved journals for engineering, special issue publication