Search For:

Displaying 1-4 out of 4 total
DNS for Massive-Scale Command and Control
Found in: IEEE Transactions on Dependable and Secure Computing
By Kui Xu,Patrick Butler,Sudip Saha,Danfeng Yao
Issue Date:May 2013
pp. 143-153
Attackers, in particular botnet controllers, use stealthy messaging systems to set up large-scale command and control. To systematically understand the potential capability of attackers, we investigate the feasibility of using domain name service (DNS) as ...
Password Security through Negative Filtering
Found in: Emerging Security Technologies, International Conference on
By Dipankar Dasgupta, Sudip Saha
Issue Date:September 2010
pp. 83-89
The purpose of an authentication system is to identify and verify incoming authentication requests comparing with some form of (stored) user identity. This stored user profile is at risk of being hacked and exploited by the attackers. The Negative Filterin...
Synthetic Gene Design with a Large Number of Hidden Stop Codons
Found in: Bioinformatics and Biomedicine, IEEE International Conference on
By Vinhthuy Phan, Sudip Saha, Ashutosh Pandey, Wong Tit-Yee
Issue Date:November 2008
pp. 141-146
Hidden stop codons are nucleotide triples TAA, TAG, and TGA that appear in the second and third reading frames of a protein coding gene. Recent studies reported biological evidence suggesting that hidden stop codons are important in preventing misread of m...
A biologically inspired password authentication system
Found in: Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies (CSIIRW '09)
By Dipankar Dasgupta, Sudip Saha
Issue Date:April 2009
pp. 1-7
Password authentication is very critical for secure access to computing systems/servers as it verifies the identity of users and processes. Most authentication systems use some form of Positive Authentication (PA) to identify legitimate users. Specifically...