Amrita TIFAC-CORE: M.Tech Projects

TIFAC-CORE in Cyber Security - M.Tech Projects

Amrita TIFAC-CYBER

M.Tech 2021 - 2023

S.No Roll No. Name Project Title
1 CB.EN.P2CYS21001  Akshay Mohan  Machine Learning based Detection of Hidden Data in Network Packets 
2 CB.EN.P2CYS21002  Aparna Tripathi  Enhancing Digital Forensic Readiness: Automated detection of missing and null log values 
3 CB.EN.P2CYS21003  Aravinth Raj S  Hybrid Intrusion Detection System for Industrial Control System
4 CB.EN.P2CYS21004  Arvind Sriram  Extended Audio Secret Sharing Scheme with Polarity Detection 
5 CB.EN.P2CYS21005  Ashutosh Kumar  Detecting Cross Site Request Forgery using machine 
6 CB.EN.P2CYS21006  Ashwin Prashanth Parthiban  RIPDroid: Android Malware Detection based on Permissions and IP Reputation Model 
7 CB.EN.P2CYS21008  Chougule Mandar Pravin  Classifying DNS over HTTPS (DoH) Malicious/Benign Traffic using Deep Learning Models 
8 CB.EN.P2CYS21011  Gowriprasad Kuruba Bedala  Securing Web Browsing: Detection of Browser In The Browser Attack 
9 CB.EN.P2CYS21012  Gurram Vishal Raj  Exploiting Neural Network Model for Hiding and Triggering Malware
10 CB.EN.P2CYS21013  H.Nikhitha  Deep learning based attack for classifying the key of 
11 CB.EN.P2CYS21014  Indrakanti Lakshmi Aishwarya  Improving the security of LCB against Deep Learning-based attacks 
12 CB.EN.P2CYS21015  Khandagale Swapneel Raosaheb  MeRiT: Media Rights Tracking using Hyperledger Fabric and AWS Rekognition 
13 CB.EN.P2CYS21017  Mohamed Feroz Khan D  Blockchain Forensics using OSINT and Graph 
14 CB.EN.P2CYS21018  Pothuri Lakshmi Harika  Bridging the Gaps in Solidity Smart Contract 
15 CB.EN.P2CYS21019  Prithvish N A  Robust image watermarking technique to resist geometric transformation attacks 
16 CB.EN.P2CYS21020  Pruthviraj Nitin Deshmukh  Anomaly Based Detection of Log4j Vulnerability in SDN 
17 CB.EN.P2CYS21021  Riya V Raj  GAN based Anomaly Intrusion Detection for Industrial Controller System 
18 CB.EN.P2CYS21022  Shanthosh  K P  Security Inspection of Site-to-Site VPN by exploiting Internet Key Exchange(IKE) using OSPF 
19 CB.EN.P2CYS21023  Siddharth Bose  Security Analysis of CMS based Websites through CMSPY 
20 CB.EN.P2CYS21024  Swarag Sharma  Security Analysis of OAuth 2.0 Protocol 
21 CB.EN.P2CYS21025  T K Vrinda  Cryptanalysis of Selected Chaotic Image Encryption Schemes 
22 CB.EN.P2CYS21026  Vignesh Rajakumar  Deep Learning Based Cryptanalysis on SLIM Cipher 
23 CB.EN.P2CYS21027  Vinay B Sudheer   
24 CB.EN.P2CYS21028  T. Vishnu Vardhan  Protecting cloud computing against DDOS attack