Work place: Department of CSE & IT, The NorthCap University, Gurugram, India
E-mail: shilpa@ncuindia.edu
Website:
Research Interests: Computer Networks, Network Architecture
Biography
Shilpa Mahajan is currently working as a Senior Assistant Professor in the Department of CSE & IT in NorthCap University, Gurgaon, India. She has more than nine years of teaching experience at post graduate and under graduate level. She is a committed researcher in the field of Sensor Network, and has done her PhD in the area of Wireless Sensor Network at Guru Nanak Dev University, Amritsar. She specializes in computer Networks, Data Structures, Operating System and Mobile Computing. She has guided 9 M.Tech Thesis and 12 B.Tech Projects. She has published 27 research papers, 13 in peer reviewed reputed International Journals and 14 in IEEE and Springer indexed Conferences .She is a CCNA certified Instructor and has also done certifications in Data Scientist Tool, Exploratory data analysis and Getting and Cleaning Data from Johns Hopkins University. She is the Lifetime member of ISTE.
By Sonali Sharma Shilpa Mahajan
DOI: https://doi.org/10.5815/ijcnis.2017.10.03, Pub. Date: 8 Oct. 2017
With evolution of internet, security becomes a major concern. Number of malicious programs called malware, travels through network into systems. They have many advanced properties like self-hiding, self-healing and stealth mode execution, which are hard to detect. Therefore, the major challenge for researchers today is to detect and mitigate such programs. Since there is a new virus implemented every minute no detection mechanism can be designed which gives 100% protection but by keeping the anti-virus database up to date we can escape many attacks. In this paper, an effort has been made to explain the design of a system program which can scan the vulnerable files on the system, generate logs and this can later be used to design antivirus software and stop virus execution. This program aims to scan system files and target the files which are vulnerable present on the system based on their file extensions. It generates logs after the system scan is complete which can be studied and used for anti-virus creation.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals