no code implementations • 10 May 2022 • Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla
The metadata aspect of Domain Names (DNs) enables us to perform a behavioral study of DNs and detect if a DN is involved in in-browser cryptojacking.
no code implementations • 8 Apr 2022 • Vikas Maurya, Rachit Agarwal, Saurabh Kumar, Sandeep Kumar Shukla
Detection of an ongoing attack that escapes standard protection such as firewall, anti-virus, and host/network intrusion detection has gained importance as such attacks eventually affect the physical dynamics of the system.
no code implementations • 22 Dec 2021 • Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla
We are motivated to study the Bitcoin transaction network and use the temporal features such as burst, attractiveness, and inter-event time along with several graph-based properties such as the degree of node and clustering coefficient to validate the applicability of already existing approaches known for other cryptocurrency blockchains on the Bitcoin blockchain.
no code implementations • 25 Jun 2021 • Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla
The rise in the adoption of blockchain technology has led to increased illegal activities by cyber-criminals costing billions of dollars.
no code implementations • 25 Jun 2021 • Rachit Agarwal, Tanmay Thapliyal, Sandeep Kumar Shukla
In this work, we study the correlation between malicious activities and the vulnerabilities present in SCs and find that some malicious activities are correlated with certain types of vulnerabilities.
no code implementations • 28 Jan 2021 • Rachit Agarwal, Tanmay Thapliyal, Sandeep K. Shukla
To that end, we identify a robust supervised machine learning (ML) algorithm that is resistant to any bias induced by an over representation of certain malicious activity in the available dataset, as well as is robust against adversarial attacks.
no code implementations • 18 Dec 2020 • Rachit Agarwal, Tarek Elsaleh, Elias Tragos
IoT data that belong to users and from which their personal information can be inferred are frequently shared in the background of IoT systems with third parties for experimentation and building quality services.
Databases
no code implementations • 10 Jul 2020 • Rachit Agarwal, Shikhar Barve, Sandeep K. Shukla
The temporal nature of modeling accounts as nodes and transactions as directed edges in a directed graph -- for a blockchain, enables us to understand the behavior (malicious or benign) of the accounts.
no code implementations • 1 Jul 2017 • Garvita Bajaj, Rachit Agarwal, Pushpendra Singh, Nikolaos Georgantas, Valerie Issarny
As a solution to this, semantic approaches have been proposed in the literature to tackle problems related to interoperability of sensor data.