About the Centre
Cyber Security has become a major challenge due to the increased usage of the Internet and Mobile Devices for personal applications and professional activities. Application of Internet of Things in Smart City and Smart Industrial applications have challenged the entire digital system through sophisticated cyber-attacks on the entire IT infrastructures. Many Cyber Frauds and Scams are also on the rise affecting the common man when they start using the digital facilities without proper training and awareness. The cyber threat landscape is also increasing because of the disruptive technologies like AI. To use the electronic devices and the Internet safely and securely to the benefit of the individuals, IT infrastructures must become resilient against the threats and vulnerabilities that are intelligent. Hence, there is a need for application of Artificial Intelligence in developing solutions and handling the threats in an effective manner. Orientation, training, capacity building, and interactions with the leading experts in the domain. Organizing training, workshops, and capacity building programmes to handle and manage the risks are the need of the hour for the younger generation and for Nation Building activities.
Vision
To foster a culture of digital trust and intelligence by equipping the next generation with the knowledge, tools and mindset to combat cyber threats and protect critical assets worldwide.
Mission
- Empower learners with hands-on skills, ethical practices and global readiness in cyber security and intelligence.
- Drive innovation and research by developing solutions for real-world cyber threats through academic industry collaboration.
- Promote awareness and resilience by fostering a culture of digital trust, safety and responsibility in society.
Moto
Where Intelligence Meets Security
Objectives
- Provide hands-on training in cyber security tools, ethical hacking and intelligence techniques for students and professionals.
- Develop a research driven environment focusing on areas such as threat intelligence, digital forensics, AI in cyber security and cyber defense strategies.
- Simulate real-world cyber-attacks through labs and exercises, enabling practical experience in detection, prevention and response.
- Promote cyber security awareness among students, educators and the public through workshops, seminars and outreach programs.
- Build industry and government collaborations that bridge academic knowledge with real-world applications.
- Encourage innovation by supporting student projects, hackathons and competitions in the field of cyber security and intelligence.
- Prepare students for global careers by aligning training with internationally recognized standards and certifications.
- Uphold ethical responsibility by instilling values of integrity, privacy and trust in all cyber security practices.
- Support continuous learning by integrating the latest trends, tools and technologies in the laboratory curriculum and research.
- Contribute to national and organizational security by producing skilled professionals capable of addressing modern cyber threats.
Principal Investigator
Dr.V.Bharathi Harishankar
Vice Chancellor
Mail: vc@avinuty.ac.in
Staff In-charge
Dr. M. Krishnaveni
Coordinator Centre for Cyber Intelligence
Assistant Professor (SG)
Department of Computer Science
Mail : krishnaveni_cs@avinuty.ac.in
Facilities Provided by CCI
This Centre for Cyber Intelligence aims to create awareness about Cyber Security with Artificial Intelligence (AI) techniques with its practical applications. To ensure security in various sectors that address real-world problems through an AI approach. Cyber intelligence-based research and projects were given to scholars and various students from M.Sc Computer Science, Master of Computer Applications (MCA), and M.Sc Information Technology. Cyber Security certification courses were introduced for Information Technology and through hybrid mode various hands-on training programs, Workshops, Faculty Development Programs, and Internship programs are provided to the participants and students from inside and from all over India. This Centre is standalone for providing security solutions to facilitate the students and researchers to build the cyber ecosystem.
-
CCI Research Lab
-
Accessibility of Open Source Tools for Cyber Security
-
Kali Linux Tool
-
Wireshark for Network Traffic Monitoring
-
Python for Cyber Intelligence
-
2.4TB Dell PowerEdge R740 - Rack Server
Thrust Areas of CCI
- Mobile Malware Detection
- Insider Threat Detection in Cloud
- Phishing Detection
- Spam Detection
- IoT attack Detection
- Network Intrusion Detection
- User Authentication Biometrics
- Vulnerability Assessment
- Security Auditing
- Template attack Detection
- Anomaly Detection
- Face Spoofing/Deep Fake Detection
-
Services
-
Research
-
Software tools provided for Cyber Security and Cyber Intelligence
- Kali Linux for Cyber Security
- Wireshark for Network Traffic Monitoring
- Python for Cyber Intelligence
-
Consultancy Services
-
| S.No. |
Consultancy Service |
Total Hours |
Charges |
| 1. |
Machine Learning Model Development for Cyber attack detection and mitigation |
Depends on the Model |
Rs. 500 / model |
| 2. |
Biometric authentication for fraud detection |
Depends on the Model |
Rs. 500 / model |
-
Training Services
-
| S.No. |
Title |
Total Hours |
Charges |
| 1. |
Mobile Malware Classification using Supervised Machine Learning Methods in Python |
16 Hrs |
Rs. 500 |
| 2. |
Vulnerability Assessment with Nessus |
8 hrs |
Rs. 200 |
| 3. |
Mobile Malware Analysis with Unsupervised Machine Learning Methods using Python
|
9 hrs
|
Rs. 200
|
| 4. |
Ensemble Methods of Feature Selection for Detecting Phishing Websites using Python
|
7 hrs
|
Rs. 200
|
| 5. |
Sampling Techniques for Detection of Malicious Insiders in Cloud using Python
|
7 hrs
|
Rs.200
|
| 6. |
Security Auditing using NMAP
|
8 hrs
|
Rs. 200
|
| 7. |
Cyber Threat Intelligence
|
30 hrs
|
Rs. 2000
|
| 8. |
Web Application Security Testing with Burp Suite
|
8 hrs
|
Rs. 200
|
| 9. |
Mobile Malware Data Analysis using Regression Models with Python
|
9 hrs
|
Rs. 200
|
| 10. |
Network Simulator 2 Scratch with Techies
|
12 hrs
|
Rs. 300
|
| 11. |
Data Protection and Privacy
|
30 hrs
|
Rs. 2000
|
| 12. |
Open Source Tools for Cyber Security
|
8 hrs
|
Rs. 200
|
| 13. |
Ethical Hacking using Open Source Tools
|
8 hrs
|
Rs. 200
|
| 14. |
Vulnerability Assessment and Penetration Testing
|
36 hrs
|
Rs. 2500
|
| 15. |
Quantum Secure Computing
|
8 hrs
|
Rs. 200
|
| 16. |
Demystifying IoT Security
|
8 hrs
|
Rs. 200
|
| 17. |
Vulnerability Assessment and Management
|
40 hrs
|
Rs. 3000
|
| 18. |
Malware Detection using Machine Learning with Python
|
30 hrs
|
Rs. 2000
|
-
Certificate Courses
-
| S.No. |
Course Name |
Total Hours |
Charges |
| 1. |
Malware Detection using Machine Learning with Python |
40 hrs |
Rs. 3000 |
| 2. |
Vulnerability Assessment and Management |
40 hrs |
Rs. 3000 |
| 3. |
Web Application Security with Burp Suite |
40 hrs |
Rs. 3000
|
| 4. |
Digital Forensics |
40 hrs |
Rs. 3000
|
Team Members
Dr. M. Krishnaveni
Coordinator
Centre for Cyber Intelligence
Assistant Professor (SG)
Department of Computer Science
Mail id : krishnaveni_cs@avinuty.ac.in
Ms. Savitha Sri .R
Teaching Assistant
Department of Information Technology
Ms. Priyadharshini I
Technical Assistant
-
Publications
- Copyrights - 3
-
-
Ganapathi, P. ., Shanmugapriya, D. ., & Roshni, A. . (2022). Dynamic Analysis Based Mobile Malware Classification Using Supervised Machine Learning Methods, 1–168. https://doi.org/10.9734/bpi/mono/978-93-5547-441-4, B P International. ISBN 978-93-5547-441-4 (Print), ISBN 978-93-5547-442-1 (eBook)
-
Padmavathi Ganapathi, S. Karthika (2022), Vulnerability Assessment with Nessus, 1-107, Notion Press, ISBN: 9798886848632 https://notionpress.com/read/vulnerability-assessment-with-nessus
-
Padmavathi Ganapathi, D. Nethra Pingala Suthishni (2023). Security Auditing with NMAP. pp. 1 - 114. ISBN: 9798889350699, Publisher: Notion Press. https://notionpress.com/read/security-auditing-with-nmap
Journals - 7
1. Asha S, Shanmugapriya D, Padmavathi G, “Malicious insider threat detection using variation of sampling methods for anomaly detection in cloud environment” Computers and Electrical Engineering, Volume 105, 2023,108519, ISSN 0045-7906, DOI: https://doi.org/10.1016/j.compeleceng.2022.108519.
2. Asha S., Shanmugapriya D., "Understanding insiders in cloud adopted organizations: A survey on taxonomies, incident analysis, defensive solutions, challenges", Future Generation Computer Systems, Volume 158, 2024, Pages 427-446, ISSN 0167-739X, DOI: https://doi.org/10.1016/j.future.2024.04.033.
3. Padmavathi Ganapathi, Roshni Arumugam, Shanmugapriya Dhathari., "An intelligent obfuscated mobile malware detection using deep supervised learning algorithms", Bulletin of Electrical Engineering and Informatics, Volume 13, Issue 4, Pages 2604-2612, ISSN: 2089-3191, e-ISSN: 2302-9285, DOI: https://doi.org/10.11591/eei.v13i4.6974
4. Shanmugapriya, D.; Pingala Suthishni, D. Nethra; Sasirekha, V.; Padmavathi, G.; Keerthika, M., "A Survey on Spoofing and Selective Forwarding Attacks on Zigbee Based WSN.", Mapana Journal of Sciences, 2023, Vol 22, p397,ISSN 0975-3303, DOI: 10.12723/mjs.sp2.23
5. Bhuvaneswari, K.; Roshni, A.; Padmavathi, G.,"Evaluation of Selected Supervised Machine Learning Models for Phishing Website Detection.", Grenze International Journal of Engineering & Technology (GIJET), 2024, Vol 10, p2011, ISSN 2395-5287
6. Kiruthika, S.; Roshni, A.; Padmavathi, G., "Detection of Obfuscated Malware using Ensemble Learning Techniques.", Grenze International Journal of Engineering & Technology (GIJET), 2024, Vol 10, p1978, ISSN 2395-5287
7. Sneha, S.; Roshni, A.; Padmavathi, G., "A Stacked Ensemble Model to Detect Network Intrusions.", Grenze International Journal of Engineering & Technology (GIJET), 2024, Vol 10, p2045, ISSN 2395-5287
Conferences - 11
-
Padmavathi,G.,Shanmugapriya,D.,Asha,S.(2022). "A Framework for Improving the Accuracy with Different Sampling Techniques for Detection of Malicious Insider Threat in Cloud" In:Uddin,M.S.,Jamwal,P.K.,Bansal,J.C.(eds) Proceedings of International Joint Conference on Advances in Computational Intelligence.Algorithms for Intelligent Systems. Springer,Singapore.https://doi.org/10.1007/978-981-19-0332-8_36 (Springer)
-
G.Padmavathi, D.Shanmugapriya and A.Roshni, "Performance Analysis of Unsupervised Machine Learning Methods for Mobile Malware Detection," 2022 9th International Conference on Computing for Sustainable Global Development (INDIACom),2022,pp.201-206, doi:10.23919/INDIACom54597.2022.9763180. (Scopus Indexed)
-
G.Padmavathi , D.Shanmugapriya and S.Asha, "A Framework to Detect the Malicious Insider Threat in Cloud Environment using Supervised Learning Method," 2022 9th International Conference on Computing for Sustainable Global Developement (INDIACom), 20222,pp.354,doi:10.23919/INDIACom54597.2022.9763205. (Scopus Indexed)
-
Dr.D.Nethra Pingala Suthishni , Dr.D.Shanmugapriya, Dr.V.Sasirekha, and Dr.G.Padmavathi, "Performance Evaluation on Selective Forwarding Attack Detection using Machine Learning Techniques implemented in ZIGBEE Network", Springer Proceedings of 2nd International Conference on Next Generation Computer System. (ICNGCS - 2023)
-
D.Shanmugapriya,G.Padmavathi and A.Aysha, "Detection of Iris Template Attacks using Machine Learning and Deep Learning Methods", 2023 10th International Conference on Computing for Sustainable Global Development (INDIACom),2023. (Scopus Indexed).
-
S. Sneha, A. Roshni, and G. Padmavathi, "A Stacked Ensemble Model to Detect Network Intrusions", Fourteenth International Conference on Advances in Communication, Network, and Computing - CNC 2023. (Scopus Indexed)
-
K. Bhuvaneswari, A. Roshni, and G. Padmavathi, "Evaluation of Selected Supervised Machine Learning Models for Phishing Website Detection", Fourteenth International Conference on Advances in Communication, Network, and Computing - CNC 2023. (Scopus Indexed)
-
S. Kiruthika, A. Roshni, and G. Padmavathi, "Detection of Obfuscated Malware using Ensemble Learning Techniques", Fourteenth International Conference on Advances in Communication, Network, and Computing - CNC 2023. (Scopus Indexed)
-
S. Karthika, G. Padmavathi, A. Roshni and S. Varshini, "Detecting Cross-Site Scripting Attack using Machine Learning Algorithms," 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2024, pp. 991-995, doi: 10.23919/INDIACom61295.2024.10499119. (Scopus Indexed)
-
D. N. P. Suthisini, J. J. Merlien, D. Shanmugapriya, G. Padmavathi and A. Roshni, "Performance Analysis of Cyberbullying Threats in Social Media using Machine Learning Techniques," 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2024, pp. 751-757, doi: 10.23919/INDIACom61295.2024.10499020. (Scopus Indexed)
-
D. Shanmugapriya, C. J. Dhanya, S. Asha, G. Padmavathi and D. N. P. Suthisini, "Cloud Insider Threat Detection using Deep Learning Models," 2024 11th International Conference on Computing for Sustainable Global Development (INDIACom), New Delhi, India, 2024, pp. 434-438, doi: 10.23919/INDIACom61295.2024.10498767. (Scopus Indexed)
Book Chapters - 5
-
G Padmavathi , D Shanmugapriya, S Asha (2022), "Detection of Malicious Insider in Cloud Environment based on Behavior Analysis", Progressions made in Cyber-Security World , pg : 1-9,ISBN:978-1-003-30238-4(ebk) DOI:10.201/9781003302384, CRC Press. (Taylor and Francis)
-
G Padmavathi , D Shanmugapriya , A Roshni (2022), "Evaluation of Supervised Machine Learning Classifiers to Detect Mobile Malware", Progessions made in Cyber-Security World , pg:1-9 , ISBN:978-1-003-30238-4(ebk) DOI :10.201/9781003302384, CRC Press . (Taylor and Francis)
-
Ganapathi , P. ., Shanmugapriya , D . .,Roshni, A. .(2022). "Evaluation of Principal Component Analysis Variants to Assess Their Suitability for Mobile Malware Detection". In (Ed.), Advances in Principal Component Analysis.IntechOpen. https://doi.org/10.5772/intechopen.105418
-
Gaayathri M., Padmavathi Ganapathi, Roshni A., Shanmugapriya D (2023), “Wrapper-Based Feature Selection for Detecting the Lexical Phishing Websites Using Ensemble Learning Algorithms”, Malware Analysis and Intrusion Detection in Cyber-Physical Systems, IGI Global, DOI: 10.4018/978-1-6684-8666-5, ISBN13: 9781668486665 | ISBN10: 1668486660 | EISBN13: 9781668486689
-
Sri Danalaksmi P., Geethalakshmi S. N., Roshni A., Padmavathi Ganapathi (2023), “Classification of Firewall Log Files Using Supervised Machine Learning Techniques”, Malware Analysis and Intrusion Detection in Cyber-Physical Systems, IGI Global, DOI: 10.4018/978-1-6684-8666-5, ISBN13: 9781668486665 | ISBN10: 1668486660 | EISBN13: 9781668486689
Activities
2025 - 2026
- Hands-on Training Sessions
- Cyber Range Simulations
- Capture the Flag (CTF) Competitions
- Research & Innovation Projects
- Guest Lectures & Expert Talks
- Cyber Awareness Campaigns
- Hackathons & Ideathons
- Certification Programs
- Collaboration with Industry & Government
- Publication & Knowledge Sharing
Till April 2025
- Organizing hands-on training and workshops on security tools and techniques
- Guiding and motivating UG and PG students to take up projects
- Creating awareness among women, girl children and public on Cyber Frauds, Scams and Threats
- Promotion of best practices for Social Media Security
- Orienting the Information Technology Act, its amendments, and Cyber laws
- Development of video lessons for training
- Promotion of Security Audit practice within the institution
- Establishment of tie-ups and interactions with organizations
- Conduct research in Cyber Intelligence domain and encourage publications, copyrights and patents
Projects
- Students Project 2025 -2026 Details
- Internship Projects 2025 - 2026 Details