Posts

Image
Augmenting the android app permission system using dynamic analysis                                               Android’s app ecosystem relies heavily on third-party libraries as they facilitate code development and provide a steady stream of revenue for developers. However, while Android has moved towards a more fine-grained runtime permission system, users currently lack the required resources for deciding whether a specific permission request is actually intended for the app itself or is requested by possibly dangerous third-party libraries. In this paper we present Reaper, a novel dynamic analysis system that traces the permissions requested by apps in real time and distinguishes those requested by the app’s core functionality from those requested by third-party libraries linked with the app. Our study on over 5K popular apps demonstrates the large ...
Image
                                              ML in cyber security Machine learning techniques have been applied in many areas of science due to their unique properties like adaptability, scalability, and potential to rapidly adjust to new and unknown challenges. Cyber security is a fast growing field demanding a great deal of attention because of remarkable progresses in social networks, cloud and web technologies, online banking, mobile environment, smart grid, etc. Diverse machine learning methods have been successfully deployed to address such wide-ranging problems in computer security. This paper discusses and highlights different applications of machine learning in cyber security. This study covers phishing detection, network intrusion detection, testing security properties of protocols, authentication with keystroke dynamics, cryptography, human i...
Image
                                                                Cloud Computing--            Cloud computing provides the capability to use  storage resources on a metered basis and reduce the investments in an organizations computing infrastructure. Service models of cloud computing can be categorized as Software as a service (SaaS) The software as a service mock up allows providing software application as a service to the users. The software is deployed on the host service and it is accessed through internet. The few examples of SaaS applications are billing and invoicing systems help desk applications, human resources applications and customer relationship management. The end users are not required to manage the software upgrades and patches which is done auto...

Over the top (OTT) -The Dawn of new Era

Image
                        Over the top (OTT) -The Dawn of new Era We all are facing the worlds pandemic covid-19 and along with all sectors it is also done impact on film industry too.so the filmmakers cannot afford the delay of release date of movies.A bunch of filmmakers have decided to take their movies to video streaming platforms instead of queuing up for theatrical release when theatres reopen.So they have choose the ott platform..so lets know about Over the time platforms. Over the top provide the film and television content on  high internet speed.An  over-the-top  ( OTT )  media service  is a  streaming media  service offered directly to viewers via the  Internet . OTT bypasses  cable ,  broadcast , and  satellite television  platforms, the companies that traditionally act as a controller or distributor of such content.It has also been used to des...
Image
Google Lens Now its easy to 1)recognize the object and find like its similar pattern 2)find things that can match with your outfit. 3)which excellent place near by you. 4)identify image property by just placing its picture 5) Lets recognise restaurants, clubs, cafes, and bars, too And gets info about its reviews, address details and opening times. 6)copy your handwritten notes. Yesss it is can be done with google lens–> A image recognition technology that can that has been design to gather info from internet related to object and that can be done using visual analysis based on a neural network . It offers following features Able to translate the the text by pointing your phone camera on it using this application And you can smartly copy that text on phone …its magic By highlighting the text that is what about you want to search for home decor for hotel decor and for other decorations you can you can find its perfect match how it works-> First of a...
Image
Tizen Operating System Tizen Operating System            1.Tizen is a Linux-based operating system for multiple device, including smartphones, tablets,netbooks, smart TVs, and more.            2. Tizen is developed by a community of developers,under open source governance, and is open to all            3.members who wish to participate.            4. Tizen is a project within the Linux Foundation and is governed by a Technical Steering Group (TSG)and The Tizen Association Core Architecture- III. FEATURES Flexibility Tizen is an open source operating system based on the Linux kernel and WebKit runtime [6]. This means that users can get the source code that Tizen is based on, allowing smartphone owners to tinker with and alter a device’s software. Its main feature...
Image
Deep Learning for Cyber Security Here we have represented the deep learning (DL) methods for cyber security applications. Here we have describe each DL method , including deep auto-encoders ,  restricted Boltzmann machines, recurrent neural networks, generative adversarial  networks, and several others. Along with this  we present a survey of deep learning approaches for cyber security intrusion detection, the datasets used Then we discuss how each of the DL methods is used for security applications. We cover a broad array of attack types including malware, spam, insider threats, network intrusions, false data injection ,etc. The dataset plays an important role in intrusion detection, therefore I have presented the cyber datasets and provide a classification of these datasets into seven categories; namely, network traffic-based dataset, electrical network-based dataset, internet traffic-based dataset, virtual private network-based dataset, android apps-based dataset,...