ICIRE 2023 International Conference on Internet Research and Engineering is a technical gathering of Internet and Cyber-Security professionals to exchange the latest developments that are gaining momentum in the ever-growing global infrastructure of Internet.
ICIRE 2023 International Conference on Internet Research and
Engineering is a technical gathering of Internet and
Cyber-Security professionals to exchange the latest developments
that are gaining momentum in the ever-growing global
infrastructure of Internet. The conference aims to serve as a
technical forum to share and learn about the various works that
may lead to the next Generation of Internet Infrastructure and its
security.
The conference is a single day program
with tutorials, followed by invited talks and the selected paper
presentations.
We invite original research submissions and
findings based on large scale practical implementation on the
following topics, but not limited to:
The selected and presented papers will be invited for submissions to a special edition titled "Advanced Internet Engineering and Research" in Scopus Indexed Springer Nature Computer Science Journal. Please check instructions for the authors for submission details. The previous edition of the conference was held as ICIRE 2019.
Joining Link: https://isea-meity.webex.com/isea-meity/j.php?MTID=m1dff35a29cffc59c7d74dcae6d6a6924
Webinar number: 2515 750 3003
Webinar password: ICIRE2023@IHC
Submissions must not substantially duplicate work that any of the authors has published elsewhere or has submitted in parallel to any journal or any other conference or workshop with formally published proceedings. Authors may also not submit the work to any other journal or conference/workshop with published proceedings until the date of notification. Accepted submissions may not appear in any other conference or workshop that has proceedings. Information about submissions may be shared with program chairs of other conferences for the purpose of detecting duplication. Submissions must be processed in Microsoft Word/LATEX format and must use the standard Springer Nature Journal format available at:
Each submission must begin with a title, a short abstract, and a list of key words, followed by a main body, appendices (if any), and references. The main body should begin with an introduction that summarizes the contributions of the paper at a level appropriate for a non-specialist reader. If the authors include appendices, they should be placed after the main body and before the references. Submissions not meeting these requirements risk rejection without consideration of their merits. Optionally, additional supporting material can be appended to the submission. The additional supporting material should be placed after the references, it should be well-marked, and it has no prescribed form or page limit. Alternatively, the supporting material can be submitted as a separate file. Authors are encouraged to use this space to include proofs, source code, and other information allowing verification of results; unverifiable papers risk rejection. However, committee members will read the additional supporting material at their discretion, so the submission should be intelligible and self-contained without it.
All contributions to ICIRE 2023 must be submitted online as per the prescribed format by email to icire@iiref.in.
Time allotted | Session | Details |
---|---|---|
09:30 AM-10:00 AM | Registration | |
10:00 AM-11:00 AM | Inaugural and Panel Discussion |
Welcome address by: Dr. S D Sudarsan, Executive Director, CDAC Bangalore
|
Chief Guest: Prof. Lalit kumar Awasthi,
Director, National Institute of Technology (NIT), Uttarakhand ![]() |
||
Title: India at the Epicentre of Global Internet Economy
Panel Members:
![]() ![]() ![]() ![]() |
||
11:00 AM-11:15 AM | Tea Break | |
11:15 AM-12:30 AM | Paper Presentation-Session I | Title: Evaluating Machine Learning Algorithm For Detecting DDOS Attacks - A Survey
Presenter: Smitha K |
Title: RGF-Bot: A Novel Feature Selection Method to Identify
Malicious Bot Accounts on Social Networking Sites using Machine Learning Presenter: Mr. S. Chanti |
||
Title: Digital Forensics Analysis of Vehicle Tracking System Presenter: Ms. Amala |
||
Title: An edge computing architecture for Internet Measurement Network to measure and analyze protocol data Presenter: Mr. AnandRaje |
||
Title: Zero Day Malware Classification and Detection Using
Machine Learning Presenter: Mr. Jitendra Kumar |
||
Title: Efficient Neuroimaging Data Security and Encryption using
Pixel-based Homomorphic Residue Number System Presenter: Mr. Opeyemi Lateef Usman |
||
12:30 PM-01:00 PM | Keynote Talk |
Title: Evolution of Smart Sensing Ecosystem with IoT Devices
Speaker: Prof Sundaraja Sitharama Iyengar
×
Dr. S.S. Iyengar is currently the Distinguished University Professor, Founding Director of the Discovery Lab and Director of the US Army funded Center of Excellence in Digital Forensics at Florida International University, Miami. He is also the Distinguished Chaired Professor (Hon.) at National Forensics Sciences University, Gandhinagar, India. He has been involved with research and education in high-performance intelligent systems, Data Science and Machine Learning Algorithms, Sensor Fusion, Data Mining, and Intelligent Systems. Since receiving his Ph.D. degree in 1974 from MSU, USA, he has directed over 65 Ph.D. students, 100 Master’s students, and many undergraduate students who are now faculty at Major Universities worldwide or Scientists or Engineers at National Labs/Industries around the world. He has published more than 900 research papers, has authored/co-authored and edited 32 books. His books are published by MIT Press, John Wiley and Sons, CRC Press, Prentice Hall, Springer Verlag, IEEE Computer Society Press, etc. During the last thirty years More recently in Spring 2021, Dr. Iyengar was awarded a $2.25 M funding for setting up a Digital Forensics Center of Excellence over a period of 5 years (2021-2026). His path breaking discovery known as Brooks-Iyengar algorithm discovered in 1996 is a milestone in his career. This discovery has led to breakthrough in use of sensors in various applications across the globe. By adopting this algorithm, it was possible to use network of sensors which would give out precise outputs, though few of the sensors receive wrong inputs or faulty sensors. This algorithm is relevant even today and has received prestigious “Test of Time” award for its contribution over the decade by IEEE Congress in the year 2019. Dr. Iyengar has received IEEE Fellow award, ACM Fellow, AAAS Fellow, Fellow of Artificial Intelligence AAIA, Fellow, National Academy of Inventors (NAI), Fellow of Institution of Engineers (India) among many awards he has received in his career. He has also received IEEE Technical Achievement Award in 1998. Dr. Iyengar is awarded the Lifetime achievement award at by International Society of Agile Manufacturing at IIT (BHU) in 2012. He has received Lifetime Achievement award from IEEE High Performance Computing in 2019. Dr Iyengar was also a Fulbright Distinguished Scholar and has received several honorary PhDs from around the world. He has been awarded the Lifetime Achievement Award for his contribution to the field of Digital Forensics on November 8, 2022, during the 7th INTERPOL DIGITAL FORENSICS EXPERT GROUP (DFEG) MEETING at National Forensics Sciences University, Gandhinagar, Gujarat, India.
×
In recent years, there has been a significant increase in the production and utilization of Internet of Things (IoT) devices. These devices rely on inputs from a variety of non-homogenous sensors to construct an accurate representation of their environment and function adequately. For instance, autonomous vehicles depend on GPS sensors, Lidar, and Radar to perceive their surroundings and generate a representation of their environment. Moreover, when multiple autonomous vehicles operate simultaneously, it is important to ensure a consensus between their estimates to prevent collisions. In this case, accuracy is a local objective that must be met individually by each device (in the sense that their estimates should be accurate in comparison with a ground truth), and consensus is a global objective that must be met among devices (meaning that their estimates should be in agreement). In this talk we characterize the tradeoff between these two objectives: accuracy and consensus and offer a computable optimization problem that addresses these objectives. ![]() |
01:00 PM-02:00 PM | Lunch | |
02:00 PM- 02:30 PM | Invited Talk - I |
Title: Secure Communication over Open Networks
Speaker: Aleksi Peltonen, Aalto University
×
Aleksi Peltonen is a researcher in the secure systems group at Aalto University, Finland. His research interests include formal verification and standardization of security protocols, IoT bootstrapping, and 5G security. In his work, Aleksi models and analyzes both well-known, widely deployed protocols and ongoing work under standardization.
×
Secure communication over open networks is crucial for many modern information systems. Previously centralized architectures are now often dependent on distributed computing and inter-system communication over the Internet. This decentralization of computational systems has increased the need for reliable, fast, and secure communication protocols. A core challenge in designing these protocols is ensuring their correctness and security before broad deployment. Standardized protocols, in particular, need to be thoroughly analyzed in the design phase to avoid unnecessary revisions, which are often slow to deploy comprehensively. Formal verification methods solve this problem by providing a way of analyzing the security of a protocol design even before its implementation. In this talk, I will discuss the importance of security modeling in protocol standardization and give examples of vulnerabilities discovered through formal verification. ![]() |
02:30 PM-02:45 PM | Invited Talk -II |
Title: DNS Health Index
Speaker: Dr. Balaji Rajendran, CoE DNS, CDAC Bangalore ![]() |
02:45 PM-03:30 PM | Paper Presentation- Session II | Title: Improved Ransomware Detection & Classification Using Machine Learning & Deep Learning Techniques Presenter: Dr T R Reshmi |
Title: Neuro-Adaptive Incentivization in Healthcare using Blockchain and IoT Presenter: Mr. Rajiv Ranjan Singh |
||
Title: Leveraging Open Source IDS in Cloud Environments: A Case Study on Enhancing Security and Threat Detection. Presenter: Dr. Sanjay Adiwal |
||
Title: What ails Cyber Insurance ? An Analysis of barriers and drivers
using Fuzzy Topsis Method Presenter: Mr. Bala Ganapathy |
||
03:30 PM-04:00 PM | Invited Talk -III |
Title: CyberSecurity Compliance: A Shared Responsibility
Speaker: Dr. Shalini Kesar, Ph.D, Southern Utah University
×
Dr. Shalini Kesar is a professor in cybersecurity and Director of MS-CyberSecurity & Information Assurance (CSIA) at Southern Utah University (SUU). She holds a bachelor's degree from the University of Delhi, a MPHIL in information systems from De Montfort University, a MSC in analysis, design and management information systems from the London School of Economics and Political Science, and a Doctorate in information systems from the University of Salford from the UK. Her research expertise is in cybercrime. Dr. Kesar's areas of research and expertise are in GRC of cybersecurity. Dr. Shalini has been in front of the classroom for over 25 years. She has taught at various universities across the world. Her area of expertise includes risk management, governance, risks and compliance in cybersecurity, computer ethics, and women in technology. Her work, research and teaching has led to being recently recognized as "2023 Utah Women in Higher Education Mentorship" award, and "2023 SUU Distinguished Faculty for Global Engagement.
×
Keeping in mind the scale and speed of transformation in the security ecosystem and the future of the new evolved cloud security, this presentation discusses the need for us (practitioners, academia, and governmental services) to work together while revisiting the very concept of cybersecurity compliance. It is a shared responsibility where the first step starts toward building a culture of cybersecurity. With the increase of remote working, it is even more critical that we rethink even the definition of compliance, educating employees on cybersecurity best practices, Security awareness and education. This will empower employees and instill a culture of cybersecurity and accountability that is much needed. Various frameworks like National Institute for Standards and Technology’s (NIST) Cybersecurity Framework are a great way to create a global directive for cybersecurity. These standards offer guidance on managing information security risks and help organizations improve compliance standards. ![]() |
04:00 PM-04:15 PM | Tea Break | |
04:15 PM-05:15 PM | Panel Discussion |
Title: Futuristic Internet
Panel Members:
![]() ![]() ![]() ![]() |
Valedictory Session |
International Conference on Internet Research and Engineering
(ICIRE)
Indian Internet Research and Engineering Forum.
Centre for Development of Advanced Computing
68,
Electronics City Bengaluru,
Karnataka (India)- 560100