Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Deepak Singh Tomar is active.

Publication


Featured researches published by Deepak Singh Tomar.


International Journal of Computer Applications | 2010

An Approach to Understand the End User Behavior through Log Analysis

Nikhil Kumar Singh; Deepak Singh Tomar; Bhola Nath Roy

the end user in the web environment is a mind- numbing task. Huge amount of operational data is generated when end user interacts in web environment. This generated operational data is stored in various logs and may be useful source of capturing the end user activates. Pointing out the suspicious user in a web environment is a challenging task. To conduct efficient investigation in cyber space the available logs should be correlated. In this paper a prototype system is developed and implemented which is based on relational algebra to build the chain of evidence. The prototype system is used to preprocess the real generated data from logs and classify the suspicious user based on decision tree. At last various challenges in the logs managements are presented. Keywordsforensic; log file; correlation; decision tree,chain of evidence ,cyber crime;.


international conference on communication systems and network technologies | 2012

Dynamic Image Based CAPTCHA

Rizwan ur Rahman; Deepak Singh Tomar; Sujoy Das

Web security has become a critical and challenging issue due to the growth of Internet. BOT is one of the most malicious threats to the web services. It runs automated tasks over the internet and creates problem. One solution for securing web from BOT is to develop CAPTCHA. CAPTCHA is acronym for Completely Automated Public Turing test to tell Computers and Humans Apart. CAPTCHA may be textual or image based CAPTCHA. In this paper dynamic image based three tier CAPTCHA system is proposed. The layers are 1) Image access layer2) Image processing layer and 3) Presentation layer. The proposed system makes cracking a difficult task for BOT, but at the same time it is easier for human to perceive it. In this paper strengths and weaknesses of available image based CAPTCHAs and working steps of proposed algorithm have been discussed. It is observed that the probability of a BOT hacking the proposed prototype system is considerably low.


international conference on communication systems and network technologies | 2011

Extraction and Verification of Mobile Message Integrity

Rakesh Kumar Verma; Deepak Singh Tomar; Shashi Kant Rathore

Crime investigation in mobile phone is an important source of data acquisition. Offenders tamper Mobile phone technology is increasing rapidly. Now companies are expanding their horizon through mobile message services, making it essential. On other hand tight physical and border security may encourage criminals to use mobile SMS to communicate suspicious data. Message contents to effect message integrity. In this work common mobile phone attacks, SMS encoding and decoding techniques are presented. A prototype system is also implemented to verify the message integrity.


International Journal of Computer Applications | 2012

Mobility Prediction based Routing in Mobile Adhoc Network using Hidden Markov Model

Rashmi Nagwani; Deepak Singh Tomar

Dynamic network topology of Mobile Ad hoc networks (MANETs) which is a consequence of node mobility, make routing a denoting challenge and routes are subject to recurrent disconnections. In such a context, it is important to limit interruptions caused by the node mobility. This paper presents exploiting the concept of routing through predicting the mobility of nodes and therefore reducing the overhead by eliminating transmissions of control packets which are required otherwise for route reconstruction. Also, former awareness of patterns of mobile nodes can be used to suitably allocate resources and upgrade the quality of service (QOS) experienced by mobile devices. This paper proposes Hidden Markov Model (HMM) approach for predicting the mobility of nodes to reduce the overhead head of routing for route discovery.


International Journal of Computer Applications | 2014

A Survey on Techniques for Personalization of Web Search

Himani Arya; Jaytrilok Choudhary; Deepak Singh Tomar

World Wide Web (WWW) is growing exponentially per year thereby search engine provides the low quality of search results. Thus, the users get difficulty in getting the relevant information from the obtained search results. The quality of web search results depends on the information needs of the user and the searching techniques employed in the web search systems. So, the personalization is a general need in web search now-a-days. This paper includes the review of various approaches towards personalization. The approaches include hybrid profiling, personalized click model, ontology based user profiles and fuzzy theory for personalization.


International Journal of Computer Applications | 2014

An Assessment of Mobile Ad-Hoc Network Security Threads: A Wormhole Attack

Neha Sahu; Deepak Singh Tomar; Neelam Pathak

Mobile Ad hoc networks typically work in an open un-trusted environment with little physical security, and are vulnerable for different type of security attacks. one attack in ad hoc networks is the wormhole attack that has received a great deal of recent attention. In wormhole attack, an attacker captures the packets from one point in the network and tunnels them to a distant location where they are replayed, typically without modification. Thus the detection of wormhole is a very important in the network. For wormhole attack to have a best impact on the network, it must attract a large amount of network traffic which is done by giving a shortest route to destination in the network. Therefore, the routes going through the wormhole must be shorter than alternate routes through valid network nodes. .This paper uses demonstrate different existing worm hole deduction mechanism and discus problem in existing mechanism


International Journal of Computer Applications | 2014

A Survey on Semantic Web based E-learning

Pradeep KumarTiwari; Jaytrilok Chaudhary; Deepak Singh Tomar

E-learning is method of distance learning using electronic media, in which learner and instructor interacts via learning content present on web. Semantic web is extension of current web. Semantic web attains importance now a day. For implementing the effective e-learning system, Semantic Web appears as a promising technology. Now, it becomes a need to use semantic nature of web in e-learning. Semantic web based e-learning is next generation of e-learning. This paper presents the different kind of e-learning models.


International Journal of Computer Applications | 2010

A Practical Approach for Evidence Gathering in Windows Environment

Kaveesh Dashora; Deepak Singh Tomar; J.L. Rana

theincrease in internet technology cyber-attacks have also increased, most of the sufferers from these cyber-attacks are novice windows end users. Windows is more popular due to the ease in use, and effective GUI; due to the unavailability of windows component source code the crime investigations in windows environment is a tedious and hectic job for law enforcement agencies. The unsystematic organization of the available sources of evidence in a windows environment makes the integration of these evidences a difficult task. In this paper a prototype model is developed and implemented to extract the various sources of evidence in windows environment. Investigation issues in Windows and Linux environment are also presented.


Archive | 2018

Security Attacks on Wireless Networks and Their Detection Techniques

Rizwan ur Rahman; Deepak Singh Tomar

The security issues of wireless networks have been a continuous research area in the recent years. With the advancement of wireless networking systems, building secured and reliable communication is particularly important. Security of wireless systems is to prevent unauthorized access or harm to computers from the attackers. Since wireless networks are open in nature, it is possible for attacker to launch numerous types of attacks on wireless network. Hence, the security of wireless network remains a serious and challenging issue. In this chapter, security issues in context to wireless network are presented. In the first section, vulnerabilities such as unknown network boundary and no physical access required are explored. The next section is dedicated to attacks in wireless networks, attacks classification such as active attack versus passive attack, and the other types of attack in wireless networks. Special section is dedicated to emerging attacks in bitcoin peer-to-peer network. The last section gives the security mechanism of wireless network and attack detection techniques including active attack detection and passive attack detection techniques.


2017 ISEA Asia Security and Privacy (ISEASP) | 2017

End user privacy preservation in social networks against neighborhood attack

Alpendra Kumar Diwakar; Nikhil Kumar Singh; Deepak Singh Tomar

Neighborhood attack over social networking sites breach the privacy of end users having an identical scenario. Recently numbers of anonymization techniques are developed to preserve privacy against neighborhood attack by adding dummy vertices and edges. Anonymization through dummy data increases the noise level in social networks data that lead to alter the originality and increase the information loss. This paper proposed one-neighborhood adjacency matrix (ONAM) base anonymization process in which optimum numbers of dummy edges are added into the unique sub-graph. The unique subgraph is suggested by 1-neighborhood adjacency matrix of their neighbors subgraph. In proposed anonymization process, the number of vertices remains same as that before anonymization. The addition of dummy edges increases isomorphic sub-networks and reduces the information loss. An analytic experiment is being conducted on Zacharys karate club, modified karate club, Les Miserables, and PolBooks four different datasets. After adding the dummy edges suggested by ONAM on these datasets, the noise level has measured as 6% to 8% with 0.0189 attack probability.

Collaboration


Dive into the Deepak Singh Tomar's collaboration.

Top Co-Authors

Avatar

Divya Rishi Sahu

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Nikhil Kumar Singh

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Rizwan ur Rahman

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Alpendra Kumar Diwakar

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Devshri Roy

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Dhirendra Pratap Singh

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Jaytrilok Choudhary

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Parveen Kumar

Maulana Azad National Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sujoy Das

Maulana Azad National Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge