Registrations are now closed.
There is no registration fee. However, attendance is by selection, and preference will be given to participants who submit a poster. All attendees will be provided boarding and lodging at IIT Kanpur free of cost. Some travel support is available to students and faculty members from academia.
- Students: PhD, Masters or Senior Undergraduate (3rd/4th year)
- Faculty/Researchers working in the area of security and privacy
We have three Workshops at the Symposium, from 19th lunch to 20th lunch (more details will be added later). Please apply for the Workshops when you register. The Workshop titles are:
Security Threat Analytics for Large Scale Peer-to-Peer Networks (by Prof. Chittaranjan Hota): With the proliferation of mobile devices and newer collaborative applications, it is critical to consider the impact of P2P systems on the security of an Internet environment. Currently, most of the organizations control the menace of P2P by throttling the last-mile or backbone bandwidth. In this workshop, we will discuss various security risks in P2P networks and analyze the threat landscape arising out of these types of applications. Participants can expect to gain understanding of machine learning approaches to identify and categorize different kinds of P2P traffic.
Denial of Service Attacks (by Prof. Alwyn Pais): A DDoS attack is one in which a multitude of compromised systems attack a single target, thereby causing denial of service for users of the targeted system. Recently many prominent web sites face so called Distributed Denial of Service (DDoS) Attacks. The flood of incoming messages to the target system essentially forces it to shut down, thereby denying services of the target system to legitimate users. Many techniques have been proposed till now to stop this attack. The impact of the attack on the web server can be reduced by throttling the clients' CPU. Our scheme is based on the concept of source throttling where the client pays a resource stamp fee which is negligible when the client makes a limited number of requests but becomes a limiting restriction when a large number of requests are sent. This prevents an attacker from consuming a large portion of the server resources. Participants can expect to learn some techniques for generation of large Http requests for stress analysis of the web server and throttling DDoS attacks on a web server.
Cybersecurity on networks and programs (by CERC @ IIITD): Complex and critical networks have been a focus of computer science researchers since the past decade. With the evolvement of online social networks (OSNs), and the increasing involvement of users in online interactions on OSNs, it is now important to understand the structure and dynamics of online networks, thereby project the inferences and implications to a real-world and help users to make end-decisions. Further, due to huge user involvement, privacy and security risks associated with online social networks are important to be analyzed, such as malicious URLs campaigns, spam distribution, identity thefts, etc. In this workshop, participants will learn core concepts of networks, and the major security and privacy research problems on OSNs.