Skip to main content |  Skip to navigation
Home | C-DAC Centers | Sitemap
English | Hindi | Choose_Language
  • assamese
  • bangala
  • bodo
  • dogri
  • gujrati
  • kannada
  • konkani
  • konkani_n
  • kashmiri
  • kashmiri_keshur
  • maithili
  • malyalam
  • manipuri
  • manipuri_n
  • marathi
  • nepali
  • oriya
  • punjabi
  • santali
  • santali_n
  • sanskrit
  • sindhi
  • sindhi_n
  • tamil
  • telugu
  • urdu
About C-DAC  |  Products & Services  |  Research & Development  |  Press Kit  |  Downloads  |  Careers  |   Tenders    |  Contact Us
High Performance Computing,
Grid & Cloud Computing
Multilingual Computing & Heritage Computing
Professional Electronics,
VLSI & Embedded Systems
Software Technologies including FOSS
Cyber Security & Cyber Forensics
Health Informatics
Education & Training
Cyber Security & Cyber Forensics  

India ranks fifth among countries reporting maximum number of cyber crimes, according to the latest report released by Internet Crime Complaint Centre of the United States. All major active botnets like Grum, Lethic, and Mega-D are all reported by having their infected hosts in India which is contributing to major spam generation.

Cyber crime is now big business. Attackers are accessing and using credit card and other financial information. Smartphone attacks are expected to increase multiple folds. With the growth of 3G services and business transactions using mobile phones we expect substantial increase in the mobile malware. The risk of data theft has become a major concern in the last few years. Phishing attempts are no longer easily detected based on misspelled words or claims of large sums of money. All these show the growing importance of cyber security in the IT landscape. The global Internet and the World Wide Web (WWW) have added new dimensions to the way computers are being used. The prolific use of Internet for applications such as e-Governance, e-Commerce, e-Banking, e-Learning, etc. has made e-Security an important aspect of computers and networks.

Sensing the gravity of growing security concerns and the need for significant indigenous effort due to the sensitivity of the area, C-DAC has been actively pursuing R&D in a number of aspects of cyber security. Different centres of C-DAC are focusing on different sub-areas from biometrics to cyber forensics. Major R&D efforts and a sample of the solutions currently available are listed below


Current Focus Areas:

E-Security algorithmic and computational challenges:
Computational analysis of e-Security challenges involves study of techniques to defeat security algorithms and approaches. Such complex problems need vast computing resources. Param systems, Grid infrastructure, use of GPUs, and reconfigurable hardware are useful candidates for such work
Intrusion Detection & Prevention:
Intrusion Detection & Prevention is concerned with identifying intrusion into a target network or system as early as possible, and prevent such situation as much as possible. C-DAC is focusing on adaptive Intrusion Detection using advanced concepts in artificial intelligence and data mining. This will enable the Intrusion Detection Systems to learn new attack patterns by continuously analyzing the network traffic and deducing the behavior. Presently, research is also being carried out to extend this approach to build Intrusion Prevention System (IPS) so that it becomes more proactive, intelligent and preventive.
SCADA Security:
As SCADA Systems get larger, they necessarily become connected to various networks for both economic and technical reasons, which are finally integrated into the Internet. This advancement in technology brought new kinds of threats to the critical infrastructures operated by SCADA systems. It is very important to define, classify and study the various threats and vulnerabilities and build counter measures against them.
Smart Grid Security:
The evolution of Smart Grid Technology has led to the need for ensuring high level security and reliability to the smart Grid infrastructure. Smart Grid Security measures are designed to protect the electrical grid from attacks, as well as strengthening its resilience against natural disasters and inadvertent threats such as equipment failures and user errors.
Mobile Security:
With the penetration of mobiles, it is becoming very important to secure mobile devices. C-DAC is developing mobile device security solutions to provide features like secure storage, application monitoring & control, local & remote secure device backup & restore Remote Erase / Lock and Call & SMS Black listing/White listing, etc. Such solutions need to support offline application analyzer and kernel level enforcer.
Web Security:
The main objective is to scan the vulnerabilities of a given target web application / website and assess the risk associated with each vulnerability. Thus with this objective the development of the framework is initiated under which various open source tools are utilized and customization of the output to remove false positives, false negatives etc are planned and implemented.
Cloud Security:
C-DAC is working to minimize the security risk associated in using cloud computing and storage services for achieving privacy, integrity and availability with elastic load balancing. C-DAC is working on strong isolation and access control mechanisms, data encryption, and DDOS attack detection mechanisms.
Biometric Identification refers to the identification of individuals using biological traits such as fingerprint and Iris pattern. C-DAC has a solution suite using Level-III features (pores, ridge contours, and edgeoscopic features) for high security applications. C-DAC is also collaborating with UIDAI for biometric solutions deployment.
Malware Analysis and Prevention:
Various tools and solutions for malware analysis and prevention are being developed. These use behavior heuristics as well as applications behavior whitelisting. As web based malware infections are emerging as another major threat, efforts are also being made to address attacks through browsers on desktops and mobiles.
Cyber Forensics:
Cyber Forensics is the scientific processes of identification, seizure, acquisition, authentication, analysis, documentation and preservation of digital evidence involved in cyber crimes committed using computer systems, computer network, mobile devices and other peripheral devices and reporting the evidence to a court of law.
Honeynet Technologies:
A Distributed Honeynet System is a collection of Honeynets that are distributed throughout the Internet or other large network and sends data to a central analysis point. A system that detects large-scale coordinated attacks and distinguishes between manual / targeted attacks & automated attacks will play a critical intelligence-gathering role for network defenders.
End Point Security:

Services Offered

  • Penetration Testing and Security Audits
  • Malware Analysis
  • Cyber Forensic Analysis
  • Web application Security Testing
  • Wireless Security Assessment

Training Program Offered

Full Time Post-Graduate Diploma in Information Security 6 Months
CNSS - Certificate Course on Networking and System Security 22 Weeks
Advanced Diploma in Networking & System Security 26 Weeks
Post Graduate Diploma Programme in Information security 12 Months
Certificate course in Information Security 6 Months

And Short courses (1day - 1month) on topics such as Database Security, Ethical Hacking, Perimeter Security, Security Engineering, Web Application Security, Wireless Security, Security Administration Linux, Cyber Forensics, etc.