COMSNETS 2025

17th International Conference on COMmunication Systems & NETworkS

January 6 - 10
Chancery Pavilion Hotel, Residency Road, Bengaluru, India

Initiative by COMSNETS Association


In-Cooperation With
Technical Co-Sponsors
Conference Partners


Cyber Security and Privacy Workshop

Schedule

Friday, 10th January 2025
Venue: SIGMA 3
Time Title Speaker/Authors
Session 1
09:15 - 09:30 Welcome by Workshop Chairs
09:30 - 10:15 Keynote Talk Ashok Kumar Das (IIIT, Hyderabad, India)
10:15 - 10:30 TinyDevID: TinyML-Driven IoT Devices IDentification Using Network Flow Data Priyanka Rushikesh Chaudhary (BITS PILANI, Hyderabad Campus), Anand Agrawal (BITS Pilani, Hyderabad Campus), Rajib Ranjan Maiti (BITS PILANI, Hyderabad Campus)
10:30 - 11:00 Invited Talk Igor Kotenko (St. Petersburg Federal Research Center of Russian Academy of Sciences)
11:00 - 11:30 Tea/Coffee
Session 2
11:30 - 12:30 Panel Discussion: Readiness of Educational Institutions for Cybersecurity Research Moderator: Sourav Kanti Addya (NIT Karnataka, Surathkal, India) Panelists: Ashok Kumar Das (IIIT, Hyderabad, India), Sandeep Shukla (IIT, Kanpur, India), Supratik Mukhopadhyay (Louisiana State University, USA), Meena Singh Dilip Thakur, TCS Reseach, India
12:30 - 12:45 On-Device AI Security Solutions: A Study on Lightweight Ensemble Learning Technique HUIYAO DONG (ITMO University), Igor Kotenko (St. Petersburg Federal Research Center of the Russian Academy of Sciences)
12:45 - 13:00 Revisiting Proof of Stake with Reward and Penalty Mechanism Pankaj Gugnani (ABV-Indian Institute of Information Technology and Management Gwalior), Rahul Singh Dhakad (Amity University Gwalior), Debanjan Sadhya (ABV-Indian Institute of Information Technology and Management Gwalior), W Wilfred Godfrey (ABV-Indian Institute of Information Technology and Management Gwalior)
13:00-14:00 Lunch Break
Session 3
14:00 - 14:45 Keynote Talk Sandeep Shukla (IIT, Kanpur, India)
14:45 - 15:00 Categorically Analyzing the Network Traffic in the Snowflake Bridge of Tor Neetu Kumari ABV-Indian Institute of Information Technology and Management Gwalior), Sibashreeta Dash ABV-Indian Institute of Information Technology and Management Gwalior), Debanjan Sadhya (ABV-Indian Institute of Information Technology and Management Gwalior), Bodhi Chakraborty (Adamas University, Kolkata)
15:00 - 15:15 Phishing Email Detection Through Machine Learning and Word Error Correction Deeksha Kulal (Purdue University Northwest), Leul Shiferaw (Purdue University Northwest), Quamar Niyaz (Purdue University Northwest)
15:15 - 15:30 A Statistical Anomaly Detection Approach to Detect Induced Interest Flooding Attacks in NDN Chirag Dhiwar (IIIT Sri City), Matta Krishna Kumari (IIIT Sri City), Nikhil Tripathi (IIIT Sri City), Piyush Joshi (IIIT Sri City)
15:30 - 15:45 Osmotic Computing Based Secure Resource Orchestration Scheme for Vehicular Communication Deepanshu Garg (Chandigarh University), Mohit Angurala (Guru Nanak Dev University), Rasmeet S Bali (Chandigarh University), Neeraj Kumar (Thapar University Patiala, India)
15:45 - 16:00 A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent Threats Rajesh Kumar (Birla Institute of Technology and Science, Pilani), Swapnil Pandey (Birla Institute of Technology and Science, Pilani)
16:00 - 16:30 Tea break
Session 4
16:30 - 16:45 LeARN: Leveraging eBPF and AI for Ransomware Nose Out Arjun Sekar (IIT Gandhinagar), Sameer G. Kulkarni (IIT Gandhinagar), Joy Kuri (Indian Institute of Science)
16:45 - 17:00 Optimal Tree-Based Mechanisms for Differentially Private Approximate CDFs V. Arvind Rameshwar (India Urban Data Exchange), Anshoo Tandon (National University of Singapore), Abhay Sharma (India Urban Data Exchange)
17:00 - 17:15 Efficient privacy enabled data sharing in cloud using Homomorphic Proxy Re-Encryption Scheme Imtiyazuddin Shaik (TCS Research), Arinjita Paul (Niobium Microsystems), Rajan M A (TCS Research), Divyesh Saglani (TCS Research)
17:15 - 17:30 KmerFHE: Secure and Private k-mer Abundance Estimation in Genomics Divyesh Saglani, NAVEEN SIVADASAN (Tata Consultancy Services), Harika Narumanchi, Rajan MA (Tata Consultancy Services)
17:30-18:00 Closing & Best Paper Award Announcement

Call for Papers


Camera Ready Guidelines


Accepted Papers

  1. Optimal Tree-Based Mechanisms for Differentially Private Approximate CDFs
    V. Arvind Rameshwar (India Urban Data Exchange), Anshoo Tandon (National University of Singapore), Abhay Sharma (India Urban Data Exchange)

  2. On-Device AI Security Solutions: A Study on Lightweight Ensemble Learning Technique
    HUIYAO DONG (ITMO University), Igor Kotenko (St. Petersburg Federal Research Center of the Russian Academy of Sciences)

  3. Incident Investigation Methodology for Access Violations in Information Systems
    Maxim Gorda (St. Petersburg Federal Research Center of Russian Academy of Sciences), Andrey Chechulin (St. Petersburg Federal Research Center of Russian Academy of Sciences), Igor Kotenko (St. Petersburg Federal Research Center of Russian Academy of Sciences)

  4. Revisiting Proof of Stake with Reward and Penalty Mechanism
    Pankaj Gugnani (ABV-Indian Institute of Information Technology and Management Gwalior), Rahul Singh Dhakad (Amity University Gwalior), Debanjan Sadhya (ABV-Indian Institute of Information Technology and Management Gwalior), W Wilfred Godfrey (ABV-Indian Institute of Information Technology and Management Gwalior)

  5. Categorically Analyzing the Network Traffic in the Snowflake Bridge of Tor
    Neetu Kumari ABV-Indian Institute of Information Technology and Management Gwalior), Sibashreeta Dash ABV-Indian Institute of Information Technology and Management Gwalior), Debanjan Sadhya (ABV-Indian Institute of Information Technology and Management Gwalior), Bodhi Chakraborty (Adamas University, Kolkata)

  6. Phishing Email Detection Through Machine Learning and Word Error Correction
    Deeksha Kulal (Purdue University Northwest), Leul Shiferaw (Purdue University Northwest), Quamar Niyaz (Purdue University Northwest)

  7. A Statistical Anomaly Detection Approach to Detect Induced Interest Flooding Attacks in NDN
    Chirag Dhiwar (IIIT Sri City), Matta Krishna Kumari (IIIT Sri City), Nikhil Tripathi (IIIT Sri City), Piyush Joshi (IIIT Sri City)

  8. Osmotic Computing Based Secure Resource Orchestration Scheme for Vehicular Communication
    Deepanshu Garg (Chandigarh University), Mohit Angurala (Guru Nanak Dev University), Rasmeet S Bali (Chandigarh University), Neeraj Kumar (Thapar University Patiala, India)

  9. A Cyber-Risk Management Schema for Classifying Literature on Advanced Persistent Threats
    Rajesh Kumar (Birla Institute of Technology and Science, Pilani), Swapnil Pandey (Birla Institute of Technology and Science, Pilani)

  10. LeARN: Leveraging eBPF and AI for Ransomware Nose Out
    Arjun Sekar (IIT Gandhinagar), Sameer G. Kulkarni (IIT Gandhinagar), Joy Kuri (Indian Institute of Science)

  11. Efficient privacy enabled data sharing in cloud using Homomorphic Proxy Re-Encryption Scheme
    Imtiyazuddin Shaik (TCS Research), Arinjita Paul (Niobium Microsystems), Rajan M A (TCS Research), Divyesh Saglani (TCS Research)

  12. TinyDevID: TinyML-Driven IoT Devices IDentification Using Network Flow Data
    Priyanka Rushikesh Chaudhary (BITS PILANI, Hyderabad Campus), Anand Agrawal (BITS Pilani, Hyderabad Campus), Rajib Ranjan Maiti (BITS PILANI, Hyderabad Campus)

  13. KmerFHE: Secure and Private k-mer Abundance Estimation in Genomics
    Divyesh Saglani, NAVEEN SIVADASAN (Tata Consultancy Services), Harika Narumanchi, Rajan MA (Tata Consultancy Services)


Important Dates

Paper Submission deadline:           27th October 2024 (AoE) 10th November 2024 (AOE)    18th November 2024 (AoE) (EXTENDED and FIRM)
Notification of Acceptance:            3rd December 2024
Camera-ready Submission:            10th December 2024
Workshop Date:                                10th January 2025

The Cybersecurity and Privacy (CSP) Workshop will be held in conjunction with the annual COMSNETS conference on January 10, 2025. This workshop is intended to be a forum where researchers can meet and discuss the latest in cyber security and privacy topics as they apply to communications systems. Security and Privacy researchers and professionals from government, industry and academia are invited to propose and present original work in the following topics (or related areas):

  • Authentication, authorization, and accounting
  • Information Security protocols and architectures
  • Security in wired, mobile and wireless communications
  • Security in grid/cloud/pervasive computing
  • Network Intrusion Detection and Prevention, firewalls, packet filters
  • Public Key Infrastructures, key management, credential management
  • Network and internet forensics techniques
  • Secure routing and security management
  • Malware, botnets, etc.
  • Embedded system security
  • Zero Trust Architecture
  • Access control security
  • Security in parallel and distributed systems
  • Blockchain and distributed ledger technologies
  • Security and privacy policies
  • Anonymous communication and censorship resistance
  • Security and privacy for e-commerce/m-commerce
  • Security and privacy in social networks
  • AI and ML security and privacy
  • Internet of Things (IoT) security and privacy
  • Mobile devices security and privacy
  • Web security and privacy

Researchers are invited to submit papers based on original work written in English in these and other topics related to cyber security and privacy.


Submission Guidelines

  • The Cyber Security and Privacy Workshop invites submission of original work, not previously published, or under review at another conference or journal.
  • Submissions (including title, author list, abstract, all figures, tables, references and appendix) should not exceed 6 pages in length. A minimum number of 4 pages are required.
  • Reviews will be Double-Blind: authors name and affiliation should NOT be included in the submission.
  • Submissions must follow the formatting guidelines as given on IEEE Website; and those that do not meet the size and formatting requirements will not be reviewed.
  • All papers must be in Adobe Portable Document Format (PDF) and submitted through the CSP Workshop submission site on HotCRP.
  • One of the authors must register for the workshop with the designated registration rate and present the paper in person.
  • All workshop papers (both regular and invited) will appear in conference proceedings and submitted to IEEE Xplore as well as other Abstracting and Indexing (A&I) databases.

Papers can be submitted through HOTCRP : https://comsnets25csp.hotcrp.com

For any queries please contact us at CSP Chairs:comsnets.csp@gmail.com  comsnets.workshop@gmail.com

Keynote Speakers

Ashok Kumar Das

IIIT, Hyderabad, India

Visit Homepage

10th January 2025, 09:30 AM - 10:15 AM, SIGMA Hall 3

Ashok Kumar Das is currently working as a full Professor in the Center for Security, Theory and Algorithmic Research (Department of Computer Science and Engineering) of the International Institute of Information Technology (IIIT), Hyderabad, India. He also worked as a visiting faculty in 2022, with the Virginia Modeling, Analysis and Simulation Center, Old Dominion University, Suffolk, USA. Prior to these, he held academic position as Associate Professor and Assistant Professor in the Center for Security, Theory and Algorithmic Research of IIIT Hyderabad, India, and Assistant Professor in the Department of Computer Science and Engineering, IIIT Bhubaneswar, India. He received his Ph.D. degree in Computer Science and Engineering from the Indian Institute of Technology, Kharagpur, India in 2004. He received the M.Tech. degree in Computer Science and Data Processing from the Indian Institute of Technology, Kharagpur, India, in 2000. He also received the M.Sc. degree in Mathematics (Minor Computer Science) from the Indian Institute of Technology, Kharagpur, India, in 1998. He is a Senior Member of the IEEE.


Sandeep Shukla

IIT, Kanpur, India

Visit Homepage

10th January 2025, 02:00 PM - 02:45 PM, SIGMA Hall 3

Sandeep Kumar Shukla is a Professor in the Computer Science and Engineering department and Rajiv & Ritu Batra Chair in Cyber Security at Indian Institutes of Technology, Kanpur, India (IITK). He headed the department between 2017 and 2020 and was the Poonam & Prabhu Goel Chair Professor between 2016-2019, along with being a joint director of the National Interdisciplinary Centre for Cyber Security & Cyber Defense of Critical Infrastructures (C3i Center) at IIT Kanpur. He is also a joint director of the National Blockchain Project funded by the PMO. He is a program director of the C3i Hub, a Technology Innovation Hub on Cyber Security created by the DST, Government of India. He has worked at GTE Labs as a principal member of Technical Staff, as Senior Staff Design Engineer at the Intel Corporation, as research faculty at the University of California, Irvine and as a professor of Computer Engineering at Virginia Tech, Blacksburg USA. His major research areas are cyber security, cyber-resilient system design, risk assessment, and critical infrastructure security and blockchain Technology.


Invited Speaker

Igor Kotenko

St. Petersburg Federal Research Center of the Russian Academy of Sciences, ITMO University, St. Petersburg, Russia

Visit Homepage

10th January 2025, 10:30 AM - 11:00 AM, SIGMA Hall 3

Igor Kotenko is a Chief Scientist and Head of Research Laboratory of Computer Security Problems of the St. Petersburg Federal Research Center of the Russian Academy of Sciences. He is also Professor of ITMO University, St. Petersburg, Russia. He is the Honored Scientist of the Russian Federation, Corresponding Member of the Academy of Natural History, IEEE Senior member, member of many Editorial Boards of Russian and International Journals, and the author of more than 800 refereed publications, including 25 books and monographs. Main research results are in artificial intelligence, telecommunication, cyber security, including network intrusion detection, modeling and simulation of network attacks, vulnerability assessment, security information and event management, verification and validation of security policy. Igor Kotenko was a project leader in the research projects from the European Office of Aerospace Research and Development, EU FP7 and FP6 Projects, HP, Intel, F- Secure, Huawei, etc. The research results of Igor Kotenko were tested and implemented in multitude of Russian research and development projects, including grants of Russian Science Foundation, Russian Foundation of Basic Research and multitude of State contracts. He has been a keynote and invited speaker on multitude of international conferences and workshops, as well as chaired many international conferences.


Panel Discussion: Readiness of Educational Institutions for Cybersecurity Research


Panelists

Date: 10th January 2025, 11:30 AM - 12:30 PM, SIGMA Hall 3


Ashok Kumar Das
Ashok Kumar Das
IIIT, Hyderabad, India

Visit Homepage

Sandeep Shukla
Sandeep Shukla
IIT, Kanpur, India

Visit Homepage

Supratik Mukhopadhyay
Supratik Mukhopadhyay
Louisiana State University, USA

Visit Homepage

Moderator

Sourav Kanti Addya
Sourav Kanti Addya
National Institute of Technology Karnataka, Surathkal, India

Visit Homepage

Technical Program Committee

  • Arani Bhattacharya, Indraprastha Institute of Information Technology Delhi, India
  • Suchetana Chakraborty, Indian Institute of Technology, Jodhpur, India
  • Sitaram Chamarty, TCS Research, India
  • Aizaz Chaudhry, Carleton University, Canada
  • Debasree Das, University of Bamberg, Germany
  • Subhasish Dhal, Indian Institute of Information Technology Guwahati, India
  • Pragma Kar, Indraprastha Institute of Information Technology Delhi, India
  • Rohit Kumar, Delhi Technological University, India
  • Basabdatta Palit, National Institute of Technology, Rourkela, India
  • Vishwas Patil, Indian Institute of Technology, Bombay, India
  • Somitra Sanadhya, Indian Institute of Technology, Jodhpur, India
  • Paresh Saxena, BITS Pilani, India
  • Mridula Singh, CISPA, Germany
  • Prem Singh, International Institute of Information Technology, Bangalore, India
  • Hitesh Tewari, Trinity College Dublin, Ireland
  • Eirini Eleni Tsiropoulou, Arizona State University, USA
  • Rohit Verma, Intel Labs India
  • Roopa Vishwanathan, New Mexico State University, USA
  • Dulanga Weerakoon, Singapore-MIT Alliance for Research and Technology, Singapore
  • Poonam Yadav, University of York, United Kingdom

Workshop Co-Chairs

Shantanu Pal

Shantanu Pal

Deakin University
Australia

Robin Ram Mohan Doss

Robin Ram Mohan Doss

Deakin University
Australia

Anjali Kaushik

Anjali Kaushik

Management Development Institute, Gurgaon
India

Travel Grants Sponsors


Platinum Sponsor

Gold Sponsors


Silver Sponsors

Bronze Sponsors







Conference Partners