Vous êtes sur la page 1sur 28

Institute for Development and Research in

Banking Technology
Explore, Enable, Excel (Established by Reserve Bank of India)

Volume 20, No. 1


Newsletter, January 2017
Explore, Enable, Excel

From the Director's Desktop...


Happy New Year 2017!!!
W E organized the Banking Technology Excellence
Awards function at IDRBT on July 18, 2016.
Dr. Raghuram Rajan, Governor, Reserve Bank of India
graced the occasion and gave away the awards to the
winning banks. Our publication Banking Technology in
India: Present Status and Future Trends was released by
the Governor.
We have been striving to make the publication very
informative, by including invited articles from the top
technology ocials of banks, IBA and IIBF in addition to
the report prepared by our knowledge partner using the
data obtained as part of the awards process. The other
important publication released during the awards important topics relevant to banking technology and are
function was the Cyber Security Checklist by expected to ll the gap in the skill set in banking industry
Shri R. Gandhi, Deputy Governor, Reserve Bank of India from this year onwards.
and Chairman, IDRBT. We have been receiving feedback
Blockchain Technology (BCT) is being looked closely by
from bankers that the checklist has been quite useful.
academicians, governments and industry in view of its
Taking a cue from the usefulness of the two forums, ability to provide a distributed ledger platform, using
IDRBT has been coordinating CISOs Forum and CIOs which several applications can be designed, developed
Forum, the Institute has mooted the idea of forming a and deployed. The Institute has been in the forefront in
Forum for Analysts in Banks. Accordingly, a preliminary not only studying the features of BCT, but also in its
meeting was conducted on November 16, 2016, wherein adoption to Indian Banking and Financial Sector. In the
important stakeholders from banks have participated. process, the Institute has formed a Working Group to
There has been general appreciation of the initiative of prepare a White Paper detailing all aspects relating to
the Institute to start a forum for Analysts. On the BCT like concept, concerns, global experiences,
occasion of the meeting, a publication of the Institute applicable areas in the Indian scenario and Proof-of-
titled Digital Banking Framework was released by the Concept for a specic case. The White Paper is planned
Chief Guest, Dr. Rajeeva Karandikar, Director, Chennai to be released on January 5, 2017.
Mathematical Institute.
It is the day on which the International Conference on
The other important activities of the Institute included a Distributed Computing and Networking (ICDCN) will be
2-day Conference on Banking Technology for Members inaugurated by Dr. Duvvuri Subbarao, Former Governor,
of Boards of Banks and the 10-day international Reserve Bank of India, along with the release of the
programme on I nformation S ecurity organized in White Paper on BCT. Two workshops on BCT are planned
collaboration with SUNY, Bualo. The Annual IDRBT prior to and during the conference in collaboration with
Doctoral Colloquium (IDC) has been growing as an IIT, Bombay and IBM.
attractive event for doctoral students to show case their
What an exciting way to start the new year!
high quality research work. There has been a very good
response from students of reputed institutes for the IDC Wishing you all a very Happy New Year 2017.
organized during December 8-9, 2016.
The Institute has commenced the one-year Post
Graduate Diploma in Banking Technology (PGDBT)
course from July 2016. The students are exposed to all
(Dr. A. S. Ramasastri)

Fast Forward | January 2017

01
Explore, Enable, Excel

IDRBT Launches Chief Analytics Ocers Forum


Dr. Rajeeva L. Karandikar delivered the keynote address
A NALYTICS has taken signicant strides in the
Banking Sector by creating huge business potential
yet posing several critical challenges in terms of
on Role of Statistics in the Age of Big Data. He stressed
that in the area of Analytics, domain knowledge and
implementation. In order to address the common source of data are of vital importance. He proposed a
problems identied in implementing advanced banking new architecture SI layer (Statistical Intelligence) on top
technologies by leveraging Analytics, Dr. A. S. Ramasastri, of BI (Business Intelligence) layer and explained how
Director, IDRBT, put forth the idea of creating a Chief various models go wrong.
Analytics Ocers (CAO) Forum. A snapshot of the views shared by various bankers is
Taking this idea forward, the Institute launched the presented here under:
Chief Analytics Ocers (CAO) Forum on November 16, Ms. Lalitha Natraj, ICICI Bank, shared how ICICI is
2016 with the participation of Dr. Rajeeva L. Karandikar, using analytics and how their teams are divided
Director, Chennai Mathematical Institute, and 23 into horizontals and verticals
banking executives from various public and private Mr. Rajesh Kumar R, HDFC Bank explained the
sector banks. analytics work in HDFC bank
Speaking on the occasion, the Director, IDRBT Mr. Balaji of Andhra Bank focused on how they are
highlighted the role of the Institute in improving using SQL and R
banking technologies and provided a snapshot of the Mr. R. Bhuvan from Indian Overseas Bank
functioning of the CIO and CISO Forums, which have illustrated how Data Warehouse is built using
become a common platform for the bankers to share, Oracle based BI Tools
discuss and resolve the critical issues faced by the banks
in terms of security, implementation of technologies, Mr. Pankaj Mittal of Axis Bank emphasised usage
etc. The Director also emphasized the role of the Chief of analytics in banking and also explained the
Analytics Ocers in elevating the banks. need of analytics in paving the bank's way
forward
The CAO Forum has Working Groups on Data Mr. Devendra Sharnagat, Kotak Mahindra Bank,
Governance, Business Process Reengineering for shared that they rst implemented OCRM using
Analytics, Risk Analytics, Fraud Analytics, Credit Siebel and also analytics for dashboard creation
Recovery Analytics, Security Analytics, Operational
Analytics, as well as HR Analytics. The initial focus is to Mr. Manas Ranjan Mohanty, State Bank of India
publish Standards and Frameworks in these areas for the highlighted the drastic changes in the size of data
Banking Sector. The various topics of focus suggested by when the SBI Associates are merged.
the bankers include Data Quality, Data Governance, Dr. V. Ravi, Professor, IDRBT, elaborated the objectives of
Audit Analytics, Infrastructure Analytics, Cost Centre of Excellence in Analytics (CoEA) i.e., to run pilot
Analytics, etc. projects with banks on ACRM problems and to provide

CAOs come together for the Inaugural CAO Forum Meet at IDRBT

Continued in Page 25...

Fast Forward | January 2017

02
Explore, Enable, Excel

th
12 IDRBT Banking Technology
IMPACT
Excellence Awards 2015-16
T HE Twelfth edition of the IDRBT Banking
Technology Excellence Awards was held on July 18,
2016. Dr. Raghuram G. Rajan, Governor, Reserve Bank of
focused attention on Mobile Banking, the second
issue dealt with Payment Systems
India, and Visitor, IDRBT was the Chief Guest. He was Organizing the IDRBT Banking Application
joined by Shri R. Gandhi, Deputy Governor, Reserve Contest on April 11, 2016 and the RBI- sponsored
Bank of India, and Chairman, IDRBT. Payment System Innovation Contest on June 24,
Dr. A.S. Ramasastri, Director, IDRBT, extended a warm 2016
welcome to all the distinguished dignitaries and focused Inaugurating the IDRBT BankTech Museum on
attention on the recent achievements of the Institute April 24, 2016.
including:
Shri R. Gandhi, Deputy Governor, RBI and Chairman,
Signing MoUs with NIT, Warangal and NIT, Trichy, IDRBT, presented the Opening Remarks, highlighting
for full-time Ph. D. programmes focusing on the following:
Banking Technology
Banking and nance are eminently suitable,
Re g u l a r l y o r g a n i z i n g r e p u t e d r e s e a r c h co n t i n u o u s , i n n ov a t i ve a p p l i c a t i o n s o f
conferences with the Fifth International technology
Conference on Fuzzy and Neural Computing
(FANCCO), organized in December 2015 and the The ever-increasing volume of transactions and
International Conference on Distributed the ever-changing customer expectations are the
Computing and Networking (ICDCN), being key dierentiating drivers for leveraging better
organized in January 2017 technology
Launching the full-time one-year Post Graduate Reserve Bank has now constituted a Working
Diploma in Banking Technology (PGDBT), with Group on Financial Technology, to fully
the rst batch commencing from July 04, 2016 understand the new paradigm of FinTech and to
chart out the best way of using it
Setting up two new Research Centres on Cloud
Computing and Payment Systems Technology has thrown challenges and the
following ve need special attention:
Starting the bi-annual IDRBT Sta Paper Series on
issues of critical relevance to the Indian Banking w Cyber Security: IT systems of banks are the
and Financial Sector. While the inaugural issue prime target for cyber crimes. For safe and

Dr. Raghuram G Rajan, Governor, RBI and Shri R. Gandhi, Deputy Governor, RBI with Dr. A. S. Ramasastri, Director, IDRBT
during the 12 IDRBT Banking Technology Awards function

Fast Forward | January 2017

03
EVENT secure banking, providing safe IT systems are Non-bank entities are providing innovative
Explore, Enable, Excel

undeniable requirements. The role of the payment products and services, forcing banks to
Chief Information Security Ocer assumes reect upon their strategy to compete or to
importance, especially in keeping continued collaborate
vigilance and warranting concerted proactive
Desirable Features of Payment Systems:
protective actions
w Our regulations governing payment systems
w New Technologies: Cloud based computing,
have to be ownership, institution, and
blockchain processing technologies and
technology-neutral to encourage the most
virtualization of IT systems are a few examples
ecient outcomes
which hold potential for being used in a big way
w First, being more open to experimentation at
w FinTech Companies: The techies have now
the early stages of a product or method of
grown as FinTech companies and are
service will be cleared in the peer-to-peer
emerging as direct competitors. Technology
lending regulations and the need to be more
has dissected the entire value chain of
conscious of the risks to stability as innovations
banking and nance and bundled out the
catch on and expand. This phased approach is
chunks in innovative ways i.e., they who
now being called the sand-box approach
intermediate between savers and investors, or
elsewhere
between sender and receiver of funds.
Therefore, banks have to nd ways to co- w Second preference would be given to
operate, co-opt and compete with FinTech payment platforms that oer broad based
companies access, rather than that limit access
w Payment Revolution: New initiatives in w Third payment mechanisms should be cheap
payment systems need to aim at providing and scalable, so that they are suited to our
better customer comfort and ensure that the economy where ticket sizes are small but
systems are safe, thus, resulting in the overall transaction volumes huge
eciencies including reduced costs to the
w Fourth need for systems that oer security
common man
even to the unsophisticated user, which
w Varied Choices of Technology for Financial requires greater emphasis on transaction
Inclusion: Financial Inclusion is an achievable monitoring and identication of suspicious
reality, and the role of IT is very signicant and patterns by the system operator
fundamental. Integrating account opening
w Fifth need for an eective process of
and KYC related requirements with other
consumer redressal that allows speedy and
systems such as Aadhaar, allowing use of
fair resolution of customer complaints.
funds without actual movement of cash, and
ensuring that the common persons have Ro l e s a n d Re s p o n s i b i l i t i e s o f B a n k s
access to banking and nancial services at Challenges
their doorsteps are key steps forward.
w Does the bank's vision and strategy take into
Dr. Raghuram G. Rajan, Governor, Reserve Bank of account payment services aspects? Are there
India, and Visitor, IDRBT, delivered the Keynote Address adequate human resources to project
on this special occasion and turned the spotlight on the requirements and implement them?
following:
w Adopting technology is more than
Payment Systems are the plumbing of the automation cal ling for eor ts at re-
nancial system. The Reserve Bank, as the engineering business processes. There has to
regulator of payment and settlement systems, be a conscious evaluation of process
aims to ensure easy accessibility and interoperability dependencies taking into account customer
of the payment infrastructure, while ensuring experience, security issues, etc., besides
safety and security of transactions having a long term view of the developments

Fast Forward | January 2017

04
Explore, Enable, Excel

of interoperability within and across systems


IMPACT
As technology evolves and changes, the categories of
w Despite the huge potential, activation rates
awards also undergo changes. Over the past eleven
and usage levels of various electronic
editions, several categories have been dropped and new
payment services remain at low levels, though
categories introduced. This year, the Institute has
growth is picking up
redened quite a few categories so as to reect the
w Creating appropriate customer awareness technological changes in the Indian Banking and
would not only enable the customers to Financial Sector.
choose their mix of payments taking into
The Jury for the Twelfth Edition of the IDRBT Banking
account time criticality, security and risk and
Technology Excellence Awards is as under:
the cost involved, but also enable the banks to
optimize their payment product mix Smt Usha Thorat, Former Deputy Governor,
depending upon their customer proles Reserve Bank of India (Chairperson)
w Banks have a high level of responsibility when Shri M.V. Tanksale, Chief Executive, Indian
adopting digital channels not only to ensure Banks' Association
security at the infrastructure level, and to
Prof. B.H. Jajoo, Indian Institute of Management,
protect data security and personal privacy at
Ahmedabad
system level, but to create customer
awareness in security matters. Prof. G. Sivakumar, Indian Institute of
Technology, Bombay
Issues concerning customer liability and risk
management for electronic payment transactions need Dr. Santanu Paul, Chief Executive Ocer &
to be addressed. Managing Director, TalentSprint, Hyderabad
Awards 2015-16 Shri Rajesh Doshi, Former Senior Executive
Director, National Securities Depository Limited.
The IDRBT Banking Technology Excellence Awards is
synonymous with excellence in technology adoption, This year, the IDRBT Banking Technology Excellence
upgradation, absorption and innovation. In its twelfth Awards, were presented in eight categories to the
edition this year, the IDRBT Banking Technology Commercial Banks and one categor y each to
Excellence Awards, are the benchmark for recognizing Co-operative Banks and Regional Rural Banks. Since the
banks, which innovate and explore technology to participating banks vary in terms of size and scale of
improve cost, reach, customer service and eciency. business and operations, the banks were classied into
Pioneering and out-of-the-box approaches in the usage three categories large, mid-size and small, on the basis of
of technology for improving productivity and the business they have done to make comparisons and
protability are recognized through these awards. recognition more meaningful and pragmatic.

th
Winners of 12 IDRBT Banking Technology Excellence Awards 2015-16, with the Governor, Deputy Governor, RBI and Director, IDRBT

Fast Forward | January 2017

05
EVENT Explore, Enable, Excel

Dr. Raghuram G. Rajan, presented the IDRBT Banking Technology Excellence Awards for the year 2015 16, at a very
special function at IDRBT and the winners were:

Award Category Award Winner


Best Bank Award for Use of Technology for Financial Inclusion among Large Banks Union Bank of India
Best Bank Award for Use of Technology for Financial Inclusion among Mid-Size Banks Bank of Maharashtra
Special Mention for Use of Technology for Financial Inclusion among Small Banks Karnataka Bank Ltd.

Best Bank Award for Analytics and Big Data among Large Banks ICICI Bank Ltd.

Best Bank Award for Digital Banking among Large Banks State Bank of India

Best Bank Award for Digital Banking among Mid-Size Banks Andhra Bank

Best Bank Award for Digital Banking among Small Banks The Karur Vysya Bank Ltd.

Best Bank Award for Electronic Payments among Large Banks Bank of India

Best Bank Award for Electronic Payments among Mid-Size Banks Vijaya Bank

Best Bank Award for Electronic Payments among Small Banks South Indian Bank Ltd.

Best Bank Award for Use of Technology for Fraud Prevention and NPA Management HDFC Bank Ltd.
among Large Banks

Best Bank Award for Managing IT Ecosystem among Large Banks Bank of India
Best Bank Award for Managing IT Ecosystem among Mid-Size Banks Andhra Bank

Best Bank Award for Managing IT Ecosystem among Small Banks The Karur Vysya Bank Ltd.
Best Bank Award for Cyber Defence among Large Banks ICICI Bank Ltd.

Best Bank Award for Cyber Defence among Mid-Size Banks Yes Bank Ltd.

Best Bank Award for Cyber Defence among Small Banks RBL Bank Ltd.

Best Bank Award for Innovative Use of Technology among Large Banks State Bank of India

Best Bank Award for Innovative Use of Technology among Mid-Size Banks State Bank of Hyderabad

Best Bank Award for Innovative Use of Technology among Small Banks IndusInd Bank Ltd.

Best Bank Award for Best IT-Enabled Regional Rural Bank Andhra Pradesh Grameena Vikas
Bank

Special Mention for IT-Enabled Co-operative Bank The Karad Urban Co-operative Bank
Ltd.

Dr. Y. V. Reddy, Former Governor, Reserve Bank of India, the top management of the Reserve Bank of India and the
Indian Banking Sector including Managing Director & CEOs, CIOs and IT Chiefs of Public, Private and Foreign Banks
participated in this special function at IDRBT, Hyderabad.

Fast Forward | January 2017

06
Explore, Enable, Excel

EXECUTIVE
Seminar on Banking Technology for Directors on Bank Boards

I DRBT organized a two-day seminar on Banking


Technology for Directors on Bank Boards on
September 26-27, 2016, to help them appreciate the need
for taking the digital banking journey forward and at the
same time strengthen the preparedness of banks in
cyber defence, in view of the growing threats.
The seminar opened with a keynote address by
Shri. R. Gandhi, Deputy Governor (DG), RBI and
Chairman, IDRBT, read out by Shri. S. Ganesh Kumar,
CGM-in-Charge of DIT, since the DG could not be
present personally due to sudden exigencies. The DG requirements stipulated and the purpose behind these
exhorted the Directors to play an active role in ensuring initiatives. The need for achieving a baseline cyber
strategic alignment of IT and business in banks to pave security framework and a cyber-crisis management plan
the way for improving eciency and eectiveness of in banks, as early as possible, as envisaged by the RBI was
banking operations. of paramount importance, she reiterated and requested
Prof. G. Sivakumar, IIT Bombay, in his talk on IT the boards to actively help and guide the banks in this
Infrastructure Management in Banks: Challenges and regard.
Opportunities highlighted the various options Dr. Santanu Paul, CEO, TalentSprint, painted a picture of
available for making appropriate technology choices for where the banks are heading with regard to articial
banks. He also emphasised the need for board level intelligence and robotics. The need for using bots for
encouragement and support for the managements in improving internal eciency and enhancing customer
banks to tackle the critical problems associated with experience was demonstrated through the examples of
sourcing, supply and support of technology-enabled what is happening already in a number of other
services and platforms in banking. industries and services.
Cyber Security Preparedness in Banks was the focus of Smt. Shubhalakshmi A. Panse, former CMD of Allahabad
intense interaction between the delegates and Smt. Bank, in her interaction with the delegates on Board
Meena Hemachandra, Executive Director, RBI. She Level Focus on Banking Technology took them through
dwelt at length on the recent circular and guidelines a guided tour on almost all aspects of board level
from RBI in this regard, explained the various decision-making regarding technology alignment,
acquisition, deployment and monitoring. She also listed
out a good number of practical suggestions and useful
tips to help the board members in this important task.
Dr. A. S. Ramasastri, Director, IDRBT, interacted with the
delegates and briefed them on what IDRBT is doing to
promote banking technology adoption, upgradation,
absorption and innovation in India. He also highlighted
the useful and proactive role played by the Research
Centres in IDRBT focusing on Analytics, Mobile Banking,
Cyber Security, Cloud Computing and Aordable
Technologies, in helping banks reduce their lead time in
deploying these technologies and solutions.
Smt. Meena Hemachandra, Executive Director, RBI, The seminar ended with a vote of thanks by
interacting with Directors of Banks Dr. M.V. Sivakumaran, Faculty, IDRBT.

Fast Forward | January 2017

07
Explore, Enable, Excel

PROGRAMMES
Fifth International Programme on Information Assurance & Management

C ONTINUING with the initiative to expose the


Indian Banking and Financial Sector to the latest
ideas and innovations in the areas of Information
Assurance and Management, the Institute in
collaboration with the University at Bualo, The State Mr. Prakash Samaga, Senior Vice President, First Niagara
th
University of New York, organized the 5 International Financial Group Inc., presented ways and means for
Programme on Information Assurance and Fighting against Financial Crime and Prof. Mark Frank,
Management, from August 24 September 03, 2016. University at Bualo, spoke on Deception Detection. Dr.
Manish Gupta, Blue Cross Blue Shield, provided a peek
This programme was held in three parts one at IDRBT into Cyber Warfare: Monitoring and Alerts, Cyber and
(August 24-26, 2016), second at Niagara Falls (August 28 Security: Risks and Mitigation. Mr. Subbu Annaswamy,
September 01, 2016) and nally at New York City Executive Director, Morgan Stanley talked on Strategies
(September 2-3, 2016). to Stay Safe and Sound Improving Technology Controls
The programme began at IDRBT with the welcome in the Financial Sector. Mr. Scott R. Patronik, Chief,
address by Dr. A. S. Ramasastri, Director, IDRBT. This was Special Services Division, Erie County Sheri's Oce
followed by a session on Cyber Defence for Banks and focused on Digital Forensics.
Digital Forensics by Dr. B. M. Mehtre, Professor, IDRBT Dr. Varun Chandola, Assistant Professor, University at
and Coordinator of the programme. Other sessions Bualo spoke on Anomaly Detection, followed by a
included Recent Advances in Network Security by Prof. lecture on Strategic Forensics in an Enterprise
Atul Negi, University of Hyderabad; Securing and Environment by Dr. Catherine Ullman Senior
Managing Network Infrastructure to Mitigate Risk by Information Security Analyst, University at Bualo. The
Mr. Samson Naik, Stock Holding Corporation of India next session was on Malware by Dr. Aziz Mohaisen,
Ltd.; Mr. Ashutosh Bahuguna, Scientist, CERT-In, on Assistant Professor, University at Bualo.
Cyber Security and Crisis Management Plan; Mobile
Payment Security by Dr. V. N. Sastry, Professor, IDRBT; The programme also included two panel discussions on:
and Data Center Management and Metrics by Dr. G. R. Key Security Issues for Financial Institutions
Gangadharan, Associate Professor, IDRBT . and What Can be Done to Mitigate Them? The
The second part of the programme in the USA was panel members included Dr. Anoop Singhal, NIST;
handled by a mix of faculty from the academia, industry Johan Walp, KPMG; Mr. Corey Amo, Wall Street
and practitioners including Dr. Venu Govindaraju, Vice AVP/Sr. IS Analyst and Mr. Kevin Thomsen, IBM.
President for Research and Economic Development, Eective Approaches to Tackling Control
University at Bualo, who spoke on Turning Excellence Challenges in the Financial Services. The panel
into Impact. discussion was moderated by Mr. Subbu
Annaswamy, Executive Director, Morgan Stanley,
While Mr. Je Murphy, Information Security Program
NY and the panelists were M/s Brian Barnier,
Manager, University at Bualo, spoke on Security
Value Bridge Advisors; Mr. Khalid Wasti, Partner,
Architecture; Dr. Anoop Singhal, National Institute of
PwC; Mr. Anthony Fanizza, Partner, Deloitte; Mr.
Standards and Technology, explained the Security
Paul Bateman, Daiwa Capital Markets America;
Metrics and Risk Analysis for Enterprise Systems.
and Mr. Nigel James, Managing Director, Morgan
Stanley.
The programme had 20 participants and as part of the
programme, they visited the Computer Science
Department and Center for Unied Biometrics and
Sensors, University at Bualo; Yahoo Data Center and
SUNY Global Center, New York.

Fast Forward | January 2017

08
Explore, Enable, Excel

Indian Banks' CIO FORUM


BANKTECH
T HE Third Meeting of the CIO Forum, held on July
1718, 2016, was fully devoted to exploring ways and
means for meeting the compliance requirements in tune
with the circular on Cyber Security issued by the RBI,
recently.
The Director, IDRBT, exhorted the captains of IT in
banking to be proactive by looking for good, innovative
ideas from dierent sources and try to put them to best
use for the benet of banks and their customers. The
wealth of ideas thrown up by the two contests hosted by
IDRBT, the IBAC and the PSIC can be tapped into by the
banks and the promising ideas can be further worked CISO FORUM
upon with the involvement of the contestants
concerned, he advised.
Thereafter, Shri S. Kumar, GM and CIO, Corporation
D URING the last six months, the CISO Forum met
twice on August 18-19, 2016 at IDRBT, Hyderabad
and November 24-25, 2016 at Corporation Bank,
Bank, set the ball rolling by dwelling at length on the RBI Mangalore.
Circular on Cyber Security while outlining what is
already in place in most of the banks and what needs to Meeting on August 18-19, 2016
be put in place, further.
The Director, IDRBT stressed the need for
Dr. Rajarshi Pal, Faculty, IDRBT, then introduced the empanelment of forensic auditors and
Cyber Security Checklist, prepared by a group of information security professionals so that banks
industry experts, bankers and academics. The purpose of can approach them and work out a calendar for
the checklist is to highlight the relevant details that are Cyber Drill and all member banks can participate
to be taken care of in each of the ve major domains, in it
namely, Enterprise Control, Outsourcing Security, for
CISOs discussed various strategies for cyber
eective Cyber Crisis Management Planning. The CIOs
defence to tackle recent attacks, including the
found this checklist very handy and useful for the
latest malware based compromise of SWIFT
immediate task on hand.
messaging system
The CIOs then formed ve groups to focus on the ve
Shri Patrick Kishore, Senior Domain Expert,
major domains identied in the Cyber Security
IDRBT focused attention on the fortress security
Checklist. The groups deliberated on the modalities and
model and how CIA can be implemented to
approaches for implementation in their respective
protect the assets
domains and presented the outcome of their group
discussions to the forum on the next day. While Dr. B.M. Mehtre, Professor, IDRBT
summarized the IDRBT Cyber Security Checklist,
These presentations not only saw many interesting
Shri Lalit Mohan, Senior Domain Expert, IDRBT
details emerge, but also spurred extensive discussions
presented the results of cloud survey organized
and interventions. The meeting provided the much
by IDRBT and Cloud Security Alliance
needed inputs and clarications for complying with the
guidelines on Cyber Security as per the RBI circular. S h r i J a i d e e p S i n g h Ko c h a r, M i c r o s o f t ,
demonstrated various free security tools such as
The two-day meeting, well-attended by over 25 CIOs
Security Compliance Manager, Attack Surface
from various banks, ended with a vote of thanks by
Analyzer, Enhanced Mitigation Experience
Dr. M.V. Sivakumaran, Faculty, IDRBT.
Toolkit, etc.
CISOs from 47 banks participated.

Fast Forward | January 2017

09
Explore, Enable, Excel

FORUMS
Meeting on November 24-25, 2016
Shri Gopal Murli Bhagat, Executive Director,
Corporation Bank, welcomed the Forum
The Director, IDRBT set the agenda for
deliberation on following key points: Recent card
data compromise in India; setting up task force
for major security breaches to ensure that the
escalation of frauds do not take place; measures
to increase usefulness of IB-CART to banks; VAPT
for IB-CART; empanelment of Security Auditors
with the help of CISO Forum Shri Bharat Panchal, NPCI explained the case of
Shri Anjibabu, Corporation Bank, shared his views card data compromise in detail
on Onion Layered Security Incidents and Shri Babu K., RSA, discussed about advanced
emphasised on the importance of studying the machine learning capabilities to identify
pattern of logs to detect anomalies and to potential threats
conduct proper root-cause analysis of the events
in this context Shri Tarique Ansari, Palo Alto Networks,
explained the modus operandi of few recent
Prof. B. M. Mehtre, Professor, IDRBT, presented a malware attacks
th
summary report of the 7 Cyber Drill
Shri Kunal Pande, KPMG highlighted the
Dr. Rajarshi Pal, Assistant Professor, IDRBT, importance of following points in the context of
presented the latest developments of IB-CART recent cyber-attacks threat intelligence, cyber
Shri V. S. Mahesh, AGM, IDRBT presented security drills, establishing baseline, appropriate
information about recent card data compromise management oversight and team, adequate and
in India and highlighted the importance of the properly deployed technology, Intelligent and
following proper auditing of ATMs and quick response capability
switches; protection of ATMs from malwares and CISOs suggested that IDRBT share the list of tools
skimming devices; vigilance on sta members capable of successfully detecting cyber attacks
who handle critical infrastructure and also deliver selected crucial information
through SMS
CISOs from 34 banks attended the meet.

CISOs of various banks at IDRBT for the CISO Forum meet

Fast Forward | January 2017

10
Explore, Enable, Excel

Sixth IDRBT Doctoral Colloquium

T HE Annual IDRBT Doctoral Colloquium is an


initiative aimed at forming a network of technology
LATEST
researchers, sharing knowledge and exploring emerging
areas of research in various domains of technology. This
year, the Institute organized the Sixth IDRBT Doctoral
Colloquium on December 08-09, 2016, wherein 12
research scholars from reputed institutions like IISc., ISI,
IITs, IIMs, IIITs presented their research. How to utilize the main Bio-ndings and CI
The Colloquium was inaugurated by Prof. Chin-Teng Lin, techniques (Bio-CI) to develop the monitoring
Distinguished Professor, University Technology of and feedback systems
Sydney, Australia. In his inaugural address, Prof. Lin Real-life applications of BCI on various aspects
spoke on Type-1 Fuzzy-Neural-Networks to Type-2 including clinics, homecare, personnel training,
Fuzzy-Neural-Networks and stressed on the following: or even computer gaming.
Many investigators have developed novel Dr. A. S. Ramasastri, Director, IDRBT, focused attention
algorithms based on computational intelligence on the importance of collaboration, the opportunities it
(CI) technologies to monitor, maintain, or track brings and the immense possibilities that exist for
the human cognitive states and operating research and innovation in the Indian FinTech Sector.
performance
The details of the scholars and the topic of their
presentation are as under:

S. No. The Topic The Scholar Institution


On Kernel Density Estimation and Dimensionality Reduction for
1 Sreevani ISI Kolkata
Pattern Recognition

Object Tracking in Complex Environments like Camouage and


2 Ajoy Mondal ISI Kolkata
Occlusion
3 Analysis of Mixed, Correlated and Heterogeneous Data Yogalakshmi Jayabal IIIT Bangalore
Classication of Human Actions using Pose-Based Features and
4 Earnest Paul Ijjina IIT Hyderabad
Stacked Auto Encoder

5 Predicting Amendments via Right to Information Query Analysis Nayantara Kotoky IIT Guwahati

6 Renarrating Web for Better Web Accessibility Gollapudi VRJ Sai Prasad IIIT Hyderabad

A Heterogeneous Network based Tag Recommendation


7 Suman Kalyan Maity IIT Kharagpur
Framework on Stack Overow

8 Linked Data Enrichment using Pattern Extraction Subhashree S IIT Madras


9 A Closer Look into DHCP Starvation Attack in Wireless Networks Nikhil Tripathi IIT Indore

10 Keep it Concurrent and Correct Suvam Mukherjee IISc Bangalore

Unsupervised Parallel Clustering Algorithms with Mixed Data


11 Urvashi Prakash Shukla MNIT Jaipur
Approach for Credit Card Scoring

A Rough Set Approach to Find Cohesive Subgroups in Financial


12 Samrat Gupta IIM Lucknow
Credit Networks

Fast Forward | January 2017

11
Explore, Enable, Excel

RESEARCH
And the Winners were:
A Joint First-Second Prize was shared among three
research scholars which carried a reward of Rs. 50, 000/-
and a citation each.
Mr. Ajoy Mondal, Indian Statistical Institute,
Kolkata, for his contribution entitled Object
Tr a c k i n g i n C o m p l e x E n v i r o n m e n t l i k e
Camouage and Occlusion
Inaugural Address by Prof. Chin-Teng Lin
Mr. Earnest Paul Ijjina, Indian Institute of
Awards and Evaluation Technology Hyderabad for his contribution
The Jury for the Sixth IDRBT Doctoral Colloquium entitled Classication of Human Actions Using
consisted of: Pose-based Features and Stacked Auto Encoder

Prof. Shalabh Bhatnagar, Indian Institute of Mr. Suvam Mukherjee, Indian Institute of
Science, Bangalore Science Bangalore, for his contribution entitled
Keep it Concurrent and Correct".
Prof. Bala Subramanian, Indian Institute of
Technology, Roorkee Third Prize: Mr. Samrat Gupta, Indian Institute of
Management, Lucknow, for his contribution entitled A
Prof. Panduranga Rao, Indian Institute of Rough Set Approach to Find Cohesive Subgroups in
Technology, Hyderabad. rd
Financial Credit Networks. The 3 prize carried a reward
The Jury evaluated the paper presentations on the of INR 35,000/- a citation.
parameters of Originality, Depth of Work (Modelling, The Colloquium , now emerging as the preferred
Design, Experimentation, Results), Technical Content platform for technology researchers in India to
(Models, Optimization, Technologies, Analysis), demonstrate and discuss their research ideas and get
Presentation (PPTs, Graphs, Explanations, Language, invaluable feedback, was coordinated by Dr. N. V.
Clarity), Relevance (Applicability, Modernism) and Narendra Kumar and Dr. Nagesh. S. Bhattu, Faculty,
Correctness of Work (Correct, Complete, Gaps). IDRBT.

Winners of the Sixth IDC along with the Jury, Director, IDRBT and Colloquium Coordinators

Fast Forward | January 2017

12
Explore, Enable, Excel

Mobile Banking through USSD NEW


T HE Centre for Mobile Banking, IDRBT, has prepared
a user guide on Mobile Banking through USSD.
The objective of this user guide is to create more
awareness of usage of USSD based Mobile Banking and
Mobile Payments amongst public and contribute to
make India progress faster in digital payments. The user
guide was released on the Institute's website on Cyber Security Checklist
December 08, 2016.

Digital Banking Framework


D IGITAL Banking is the new paradigm that oers
considerable benets to banks in terms of
increasing productivity and protability. It is dicult to
dene exactly what digital banking is and to say when
any bank has become totally digital. It is equally dicult
for an individual bank to make an assessment of itself,
draw plans and take necessary steps to attain the status
of a digital bank. It is in this context that a need was felt
to provide a framework that can help banks in their
Shri R. Gandhi releasing the Cyber Security Checklist
eorts to move towards digital banking.
The framework presents a holistic way of dening and
designing a digital bank. It provides goals, maps and C YBER Security is a major concern across the Indian
B a n k i n g a n d Fi n a n c i a l S e c t o r. T h e C h i e f
Information Security Ocers and Chief Information
signposts in the digital banking journey and comprises
of various denitions of a digital bank, overview of Ocers of Banks during their regular forum meetings at
distinct functions/dimensions of digital bank. The IDRBT have been sharing the changing challenges being
framework is expected to help banks in their eorts to faced by banks in tackling Cyber Crimes.
go digital. In the Gyan Sangam, an annual retreat of Heads of Public
Dr. Rajeeva L. Karandikar, Director, Chennai Sector Banks along with the top ocials of the
Mathematical Institute released the Digital Banking Government of India and the Reserve Bank of India, held
Framework on November 16, 2016. on March 4-5, 2016, the sub-group on Technology
identied Cyber Security as critical for the Indian
Banking and Financial Sector and expressed the need for
a Cyber Security Checklist.
Accordingly, IDRBT formed an Expert Group with
members from banks, industry and academia to prepare
the Cyber Security Checklist. This checklist is expected
to help banks in identifying the gaps, if any, in their Cyber
Security systems and address them, and also help the
board level sub-committees on Risk Management and
Information Security in monitoring the cyber defence
preparedness of the banks.
Shri R. Gandhi, Deputy Governor, RBI and Chairman,
Dr. Rajeeva L. Karandikar releasing the IDRBT, released the Cyber Security Checklist on July 18,
Digital Banking Framework 2016.

Fast Forward | January 2017

13
Explore, Enable, Excel

PUBLICATIONS
Book on Banking Technology in
India: Present Status and
Future Trends
F OR over a decade, the Institute has been evaluating
and presenting the IDRBT Banking Technology
Excellence Awards. In the process, we have been closely
watching the developments in the adoption of
technology by banks and attempting to share insights
with all by bringing out a book every year. Workshop on Application of
We enhanced the book last year by publishing invited Blockchain Technology in
articles from banking professionals, in addition to the
status of technology adoption based on the information Banking and Finance
furnished by the banks as part of the awards process.
While continuing the invited articles and the status of
the technology adoption; this year, we have included a
T HE Institute is working in the area of blockchain
technology so as to explore the possibilities of its
adoption in banking, payments and other nancial
section by the Knowledge Partner for this year's Banking
applications. Taking forward this work, the Institute
Technology Awards, Deloitte, on what they see as future
organized a one-day Workshop on Application of
trends in Banking Technology.
Blockchain Technology in Banking and Financial Sector
The book, containing contributions from the top on August 19, 2016.
management of Indian Banks' Association, Indian
Senior ocials from RBI, NPCI, CCIL, IBA and banks
Institute of Banking and Finance, IT Heads of seven
along with experts from academia and industry
Public and Private Sector Banks, a Foreign Bank, the
participated and deliberated on the implementation
Knowledge Partner, Deloitte, and a section on IDRBT
strategies, concerns, issues and use-cases of blockchain
Banking Technology Excellence Awards 2015 2016:
technology in the Banking and Financial Sector.
Who won and why?, is evolving into a useful document
detailing the present status and dwelling on future While Dr. Sourav Sen Gupta from Indian Statistical
trends in Banking Technology in India, with glimpses of Institute focused attention on the principles of
global scenario. Blockchain Technology; Shri Deepak Hoshing of Infosys,
presented use cases on storing documents on
Dr. Raghuram G. Rajan released the Book on Banking
Blockchain and Dr. Dilip Krishnaswamy, IBM Research
Technology in India: Present Status & Future Trends on
Labs, spoke on Hyperledger an open source project on
July 18, 2016.
a BCT platform.
Towards the end of the workshop, a Working Group with
representatives from RBI, IDRBT, ISI, NPCI, CCIL, IBA
and a few banks & IT companies was formed to prepare a
white paper on application of Blockchain Technology in
relevant areas of banking and nance in India. The white
paper is expected to be released in January 2017. It was
also agreed to conduct a PoC with active participation
from IDRBT, NPCI and a few banks.
The next two workshops on Blockchain Technology are
Dr. Raghuram G. Rajan releasing the Book on Banking scheduled during January 2-4, 2017 along with IIT
Technology in India: Present Status and Future Trends Bombay and on January 7, 2017 as part of ICDCN 2017.

Fast Forward | January 2017

14
Explore, Enable, Excel

Project Trainees 2016 NETWORKING


T HE IDRBT Project Trainee Scheme oers new avenues for bright youngsters pursuing their Graduation and Post
Graduation from premier Institutions to carry out projects on various aspects of Banking Technology. This
scheme provides an ideal opportunity to put ideas into action and in the last eight years, over 250 students have
carried out projects. This year, 27 students carried out some interesting projects, the details of which are presented
below:

Text Mining Financial News Impact on Indian


Stock Markets
Deliverables
Dataset of news articles for seven major
Rishabh Miglani companies in Indian nancial markets
Integrated M.Sc. (Mathematics and
Computing) III Year A predictive model based on LIWC feature scores
IIT Kharagpur using GMDH, GRNN and other implemented
Guide: Dr. V. Ravi Machine Learning Techniques

Description Comparative analysis of results on extracted


company datasets by various feature selection
Financial time series analysis has emerged as one of the processes.
important topics of interest over time. The proposed
model in this study uses only textual data in the form of
published news articles to prepare a model ecient Development of Graphical User Interface for
enough to predict stock prices in the Indian nancial R Users in Banking Technology
markets. This approach involves the following steps: 1.
Extraction of news articles and historical stock prices
corresponding to companies in Indian stock market; 2.
Processing of extracted news documents using LIWC
(Linguistic Inquiry and Word Count) tool; and 3. &
Preparation of a model solely on the basis of these
semantic textual features. Dierent models like SVR,
QRRF, GMDH, GRNN, RPART, RF and MLP were tested to
obtain relevant results in the prediction analysis. It was Pavan Srikar Akella Anugu Vishwatej Reddy
observed that GMDH and GRNN showed better results
as compared to other machine learning techniques. B. Tech. (ECE) III Year
ISM Dhanbad
Objectives Guide: Dr. V. Ravi
To prepare a predictive model for nancial Description
forecasting using qualitative textual data, without
any use of quantitative numerical data available in The Graphical User Interface (GUI) was developed using
the form of historical prices Python and R programming languages. Python was used
for creating the GUI using the 'PyQt4' module and the
Compare the results of prediction accuracy with
whole back end process was done using R. The Python
application of various models including SVR, QRRF,
module 'rpy2' was used for accessing R environment from
GMDH, GRNN, RPART, RF and MLP using statistical
Python. The 'Qt Designer' enabled us to create the GUI by
error measures MAPE and NRMSE.
its widget drag and drop UI designing feature and the
'PyQt4' module converts the UI into python code for
generating the UI.

Fast Forward | January 2017

15
Explore, Enable, Excel

GENNEXT Deliverables
We tested and analyzed Zeus toolkit and Snort IDS for
botnet detection. The performance of Snort IDS was
evaluated on CTU-13 datasets. The CTU-13 contains 13
datasets of dierent botnets. The overall eciency of the
Objectives present Snort rules for botnet detection is 70% for all
For data analysis, bankers would require in-depth datasets, but for some datasets like BOTNET-44, 47, and
knowledge of programming languages to 49 is very less. The Snort rules are revised and tested on
implement data analysis algorithms for huge data the same datasets. These revised rules contain the new
To develop a GUI for R language users in banking
botnet signatures that was not present in old Snort rules.
technology with basic knowledge of statistics and Because of the addition of new signatures, the botnet
no knowledge of programming languages. detection eciency improved up to 80% and was a
signicant improvement in datasets like BOTNET 44, 47
Deliverables and 49.
A GUI for R users in the banking domain, which is
free from any programming Anti-Forensics Analysis of File Wiping Tools
The GUI has been included with the basic data
mining tasks like basic Classication Techniques, K-
means Clustering, Association Rule Mining,
Multiple Linear Regression. Narendra Panwar
MS (Cyber Security) Final Year
Botnet Detection Tools and Techniques: A Review Sardar Patel University of Police Security
and Criminal Justice, Jodhpur
Guide: Dr. B. M. Mehtre
Description
Kanchan Bhale This study deals with the scope of Anti-Forensics (AF)
Summer Research Fellowship tools and verication of three Anti-Forensics File Wiping
Indian Academy of Sciences, Bangalore Tools. Anti-Forensics is a collection of tools and
Guide: Dr. B. M. Mehtre techniques to counter the forensics process and to
frustrate the forensics investigation. Anti-Forensics tools
Description are either used for privacy or to avoid forensics
Botnet detection techniques are broadly based on either investigation. In this research, we have tested three AF
setting up of a honeypot to collect bot binaries or le wiping tools namely, Eraser, File Shredder and R-
developing intrusion detection system IDS. The IDS Wipe and Clean and examined the Anti-Forensics
identies botnet trac by monitoring network and qualities of these tools.
system logs. It can be based on anomaly behavior or Objectives
signature or DNS. The NetFlow analyzer is a popular tool
for detecting botnet anomaly based detection. The Snort, To identify whether Eraser, File Shredder and R-Wipe
Suricata, ntop and BotHunter are the other tools which and Clean tools are better Anti-Forensics tools or not,
are based on signatures of botnet. The DNS based botnet and to nd out les artifact after wiping the les using
trac is monitored by Wireshark. The BotMiner tool uses these tools.
clustering algorithm to detect botnet. Zeus toolkit is Deliverables
popular among hackers' community for analysis of
All the three tools which we have tested are not
botnet internals.
entirely AF, they leave some le related artifacts in
Objectives the system
To analyze and test botnet detection tools and
techniques.

Fast Forward | January 2017

16
Explore, Enable, Excel

Security Apps on Android Platform: An Evaluation

A report shows detailed forensics examination Vikas Yadav


results of the system after wiping les using these MS (Cyber Security) II Year
three tools Sardar Patel University of Police
Components of ideal Anti-Forensics le wiping Security and Criminal Justice, Jodhpur
tool. Guide: Dr. B. M. Mehtre

Description
Collecting Threat Intelligence from Tor
The popularity of Security Apps has increased the
dependency of the users on these apps. Essentially,
Security Apps claim complete protection for the devices
Tarun Trivedi on par with traditional PC Security Tools. This study
MS (Cyber Security) Final Year evaluates Security Apps to validate their claims against
Sardar Patel University of Police well-known OS-level vulnerabilities on dierent Android
Security and Criminal Justice, Jodhpur OS versions. Apart from this, we introduced a Privacy-
Guide: Dr. B. M. Mehtre Sensitive String Analyzer (PssA), a Python-based script,
which is capable of analyzing apps' source code and nd
Description privacy related sensitive strings in application source
We have developed the tool for extracting the keywords code.
from the onion sites using Tor proxy. Our tool collects all Deliverables
the keywords related to attacks such as hacking, tracing,
tracking, bandwidth, etc., from the onion sites. After We have identied two issues in Security Apps, including
collecting keywords, our tool identies URLs of onion insucient permission documentation and eectiveness
sites whenever the keywords are found. Once URLs are of Security Apps against OS-Level attacks on unpatched
extracted, we send an e-mail to the owner of the onion Android OS versions.
site as a client. The onion site owner replied to the mail
and was received as an e-mail header. Finally, we have Multi-Layer Intrusion Detection and Prevention
located the geographical location of the site and IP as System: A New Approach
well from the e-mail header.
Objectives
Vikash Kumar Saini
This application is useful for intelligence agencies who MS (Cyber Security)
are collecting threats and evidence to monitor and Sardar Patel University of Police
conduct surveillance on the activity in the hidden dark Security and Criminal Justice, Jodhpur
web. We use this technique to prevent the DDoS attack, Guide: Dr. B. M. Mehtre
SYN ood attack, and Snier attack. It also helps to
detect attacks which was done in the past like website Description
attack, e-mail hacking, social account hacking and money
The study focusses on detection and prevention of
fraud.
network attacks. A multi-layer architecture is proposed
Deliverables for intrusion detection and prevention. Two devices
(Snort, Suricata) are used in this scheme. Multi-layer
We monitored and eavesdropped on onion site,
architecture is based on the signatures as well as
where attackers comment and blog about future
anomaly based detection and prevention mechanisms. A
attacks
decision-making process is implemented in the
We predicted the type of attack possible in the architecture. Intrusions and data ood attacks are
near future. detected and blocked by the proposed design. On the

Fast Forward | January 2017

17
Explore, Enable, Excel

basis of test results, it is clear that the proposed To detect all types of post-operation based attacks
architecture gives better performance compared to like noise, blurring, compression, etc., in copy-
individual (single) unit of IDS/IPS. It also collects move forgery.
dropped packets for analysis. This can be used for
Deliverables
prediction and prevention of new attacks. Thus, the
proposed architecture gives enhanced security to the We have implemented a tool (Desktop application) for
network. CMFD which can detect geometric-based attack like
translation, rotation (degree range 0 to 330) and scaling
Objectives
(size range 0.5 to 2).
There is a possibility of bypassing single-level (IDS/IPS)
security by using intrusions. Therefore, a new An Automated Tool for Vulnerability
architecture is proposed for detecting and preventing Assessment of HTTPS Web Applications
intrusions.
Deliverables
We have implemented and tested multi-layer scheme
using the combination of Snort and Suricata. It is Anand Ramesh
observed that Snort detects and prevents more B. Tech. (Avionics) II Year
intrusions as compared to Suricata. Indian Academy of Sciences, Bangalore
Guide: Dr. B. M. Mehtre
Copy Move Forgery Detection Using
Description
Key-Points Structure
This study proposes an ecient method to assess the
vulnerability of HTTPS web applications. We have
developed a completely automated tool using Python,
Vinod Parihar
MS (Cyber Security) Final Year
which can be used to conduct Vulnerability Assessment
Sardar Patel University of Police on web applications which use HTTPS protocol. This tool
Security and Criminal Justice, Jodhpur is user-friendly and no technical knowledge is required to
Guide: Dr. B. M. Mehtre use the tool. It is developed in such a way that it is open to
further development and new functionalities can be
Description easily added in the form of modules. The tool successfully
establishes connection with SSL servers. The test was
Modication of information of an image is an easy task conducted on both local and remote servers. Web
due to increasing number of image editing tools and applications were analyzed and vulnerabilities found.
techniques. This leads to widespread usage of forged
images for various purposes intently and unintently. In Objectives
copy-move image forgery, a region of an image is copied To develop a test web application (HTTP)
and pasted on the same image. In this study, a Copy Move
Manual test of various attacks on the web
Forgery Detection (CMFD) method is proposed, which
application
works well for geometric based attacks like translation,
rotation and scaling. This method is based on keypoint Conversion of the test web application to HTTPS
structure. Another method is also proposed for CMFD Development of an automated tool to analyze the
which is based on Texture feature (Localized Angular vulnerabilities in HTTPS application
Phase (LAP) feature). Testing of the tool on various web applications.
Objectives Deliverables
A basic web application which simulates banking
To detect all types of geometric based attacks like
environment
translation, rotation and scaling in copy-move
forgery A completely automated tool for the vulnerability
assessment of HTTPS web application.

Fast Forward | January 2017

18
Explore, Enable, Excel

Cancellable Fingerprint Templates Objectives


To implement the PSO-based VM scheduling algorithm
using MapReduce Framework.
Deliverables
Bulusu Amrutha Lakshmi
B. Tech. (ECE) III Year Developed a model for optimal scheduling of Virtual
NIT Raipur Machines using Particle Swarm Optimisation in
Guide: Dr. M.V.N.K. Prasad MapReduce environment.

Description Public Key Encryption for Peer-to-Peer


Communication
Cancellable ngerprint templates are generated using
minutiae vicinity decomposition. It involves forming
minutiae vicinities based on Euclidean distance and
nding the local invariant features of the triangles
formed from the vicinities. The feature matrix, thus Giryraj Mahesh
generated is converted into a bit string and bloom lter is B.Tech. (ECE) III Year
applied to the string. Gitam University, Hyderabad
Guide: Dr. G. R. Gangadharan
Objectives
Description
To generate cancellable ngerprint templates in a
method which is feasible and enhances irreversibility, Peer-to-peer systems are now ubiquitous. But the
performance and security. problems faced in peer-to-peer system varies with
respect to many parameters such as the users in the
Deliverables network, network trac, the type of overlay network, the
Cancellable ngerprint templates will be generated from type of cryptographic protocol, etc. This report is a
the above proposed method. survey of Public Key Encryption system. We studied
various identity based encryption protocols with respect
Particle Swarm Optimisation based Virtual to dierent trust models and addressed the problems. A
public key encryption has been proposed which uses the
Machines Scheduling Algorithm using MapReduce
concept of Die Hellman Key Exchange and Shamir's
secret sharing. A code for encrypting a 4-digit integer
message has been executed.
Objectives
R. Sai Pranav
B. Tech. (CSE) III Year To study various types of Public Key Based Encryptions to
VIT University, Chennai analyze the most suitable encryption for various trust
Guide: Dr. G. R. Gangadharan models in a peer-to-peer communication system.
Description Deliverables
Generally, the virtual machine (VM) placement issue is Three dierent identity based encryption protocols
considered as a NP Hard Problem inferring that an have been stated with respect to dierent trust
optimal arrangement cannot be found in deterministic models for peer-to-peer communication
polynomial time. In literature, near optimal solutions are
A public key encryption has been proposed which
achieved using soft computing approaches. This study
focusses on the implementation of a Particle Swarm uses the concept of Die Hellman Key Exchange
Optimisation (PSO) based VM scheduling algorithm and Shamir's secret sharing
which schedules the virtual machines after checking with Code for implementing for a 4-digit integer
the existing load (minimum) of the existing host. message has been executed for the above
mentioned public key encryption.

Fast Forward | January 2017

19
Explore, Enable, Excel

QoS-Aware Web Service Composition

Rishi Yadav
Integrated Dual Degree (CSE) III Year
IIT (BHU), Varanasi
Guide: Dr. G. R. Gangadharan
Description
In web service composition, QoS is an important
criterion to focus on, because it fullls the non-functional
requirements of composition. In this study, we used
'Canonical Correlation Analysis (CCA)', which analyzes
correlation extent between two sets of variables. We
used this method in our algorithm to nd out optimal closest ATMs and bank branches and also obtain
service composition from a service plan. information about the bank such as services available,
IFSC code and working hours. We used mapping tools like
Objectives Quantum Geographic Information System (QGIS),
To nd out optimal web service composition from a QGIS2WEB.
service plan of dierent tasks, each having a number of The second part of the project was to identify the best
candidate services. open source tool for visualization of geospatial data. For
Deliverables this, the map containing the information had to be
published on the web with the help of some publishing
A novel approach to nd out an optimal web service software or plug-in like QGIS2WEB XAMPP along with
composition, considering all the transactional properties MySQL. In the last part, an idea of mobile-based
and QoS metric values at a time. application was proposed to provide specic user-
oriented information based on his/her current location
A Detailed and Practical Analysis of Various Tools and other preferences related to him/her.
for Visualization of Geographic Information in
Banking Sector Objectives
To empirically analyze data visualization tools for
geographic data and then recommend the most
suitable one which provides a mechanism for
& spatial queries
To practically analyze the various tools for
visualization of geographic data and then
recommend the most suitable one which provides
K. L. Harsha Vardhan S. Geetha Reddy the entire query-related facilities.
B. Tech. (CSE) IV Year
Deliverables
JNTU, Hyderabad
Guide: Dr. N. Raghu Kisore After detailed analysis, we concluded that QGIS is the
best tool for the visualization of data on a desktop. On
Description
the other hand, various options are available for
The aim of this study is to build a visualization platform publishing the map on the web. For instance, a XAMPP
for performing geospatial analytics and sharing the server congured with PostgreSQL (spatial database)
results with various stakeholders bank customers, bank along with QGIS2WEB is the best choice for a stable and
ocials and government entities. To the bank customer, systematic visualization application capable of handling
the data visualization tool provides a means to search for data.

Fast Forward | January 2017

20
Explore, Enable, Excel

Prediction-error Expansion based Reversible systems by combining threshold secret sharing (k, n) and
Watermarking using Quad-tree Decomposition proxy re-encryption techniques. In our method, multiple
authorities co-exist and each authority is able to issue
attributes independently and attribute revocation
method can eciently achieve both forward and
backward security.
Aniruddha Rao
M. E. (Embedded Systems) II Year Objectives
BITS-Pilani, Hyderabad
To improve security and eciency in public cloud
Guide: Dr. Rajarshi Pal
storage systems, give data owners more direct
Description control on their access policies, and to
accommodate many data contributors and data
This study aims to exploit the feature of quad-tree
users to access the data in cloud
decomposition to divide the image into homogeneous
regions. The basic objective of reversible data hiding is to To design an ecient and ne-grained data access
make slightest modications in the cover media for control system for public cloud systems
embedding the watermark and at the same time ensure To deal with the shortcomings of multi-authority
that the recovery does not aect the delity of the cover attribute systems by introducing threshold secret
image. The embedding distortion is minimum when data sharing mechanism
is embedded in smoother regions of the image. This study To eciently revoke users from the current
exploits the idea by considering each of the system while minimizing the impact on the
homogeneous blocks as a separate image and embeds remaining legitimate users.
data in each block using the existing PVO-based mapping
scheme in two dimensions. Deliverables

Objectives Designed a full-edged CP-ABE by introducing threshold


secret sharing mechanism and ecient revocation
To develop a new scheme of reversible data hiding that mechanism for ecient and secure data storage and
aims to outperform existing schemes. retrieval in public cloud storage.
Deliverables
A Privacy-Preserving Multi-keyword Ranked Search
Proposed a new scheme of reversible data hiding Scheme over Encrypted Cloud Data using MIR-tree
Compared the proposed scheme with the existing
schemes of reversible data hiding. The scheme
outperforms the existing schemes. The maximum
gain in PSNR values is typically 2 dB. Sonu Pratap Singh Gurjar
Integrated Dual Degree (CSE) III Year
Ecient and Revocable Threshold Multi-Authority IIT (BHU), Varanasi
Access Control System in Public Cloud Storage Guide: Dr. P. Syam Kumar
Description
Privacy preservation and data integrity are the main
Maheswara Reddy Chennuru concerns which restrict users from outsourcing their
B. Tech. (CSE) IV Year sensitive data. In this study, a privacy preserving multi-
ISM Dhanbad keyword ranked search scheme over encrypted cloud
Guide: Dr. P. Syam Kumar data along with data integrity using MIR-tree is
developed.
Description
Objectives
This study designs an ecient and revocable data access
control scheme for multi-authority cloud storage To nd out an optimal veriable search scheme, over the

Fast Forward | January 2017

21
Explore, Enable, Excel

Security of Wi-Fi Direct in Android based Devices

Morampudi Reshma Chowdary


B. Tech. (CSE) III Year
ISM Dhanbad
Guide: Dr. Rajib Ranjan Maiti
large data collection, to provide ecient search result
authentication technique, by considering privacy Description
preservation and integrity of result data.
We investigated the security of Wi-Fi Direct Protocol
Deliverables used in Android based devices by checking whether
Denial-of-Service (DoS) attack vulnerability is present in
This approach increases the condence level of the users
this protocol. We mimic a DoS attacker and launch the
to outsource their sensitive data on the cloud server, and
attack on dierent versions of Android which has Wi-Fi
retrieve it securely without disclosing any information.
Direct feature.
Enabling Cloud Storage Security based on Objectives
Rateless Codes
To study the vulnerabilities present in Wi-Fi Direct
Protocol and to check if the versions of the Android
devices that implement Wi-Fi direct are secured.

Parth Pahariya Deliverables


Integrated Dual Degree (CSE) III Year Using Wi-Fi Direct in Android version 4.4.4 or
IIT (BHU), Varanasi earlier may not be safe as it is seen to be
Guide: Dr. P. Syam Kumar vulnerable to Denial-of-Service attack. In fact, it
Description may cause severe harm as the attack reboots the
device when launched appropriately
We proposed rateless code based cloud to ensure the
Condentiality, Integrity and Availability of data. We However, Android version 5.1.1 or higher is not
modied the rateless codes for improving the reliability v u l n e r a b l e t o D e n i a l - o f- S e r v i c e a t t a c k
and security in cloud. First, the scheme encrypts the data irrespective of whether the corresponding device
blocks into ciphertext, then proxy encodes it using communicates with a vulnerable Wi-Fi Direct
rateless codes and stores redundancy blocks into random enabled device or not.
cloud storage servers. Then, TPA uses parity check matrix Investigating the Quality of VoIP Trac Over
to check the integrity of codewords. Finally, the user
IPv6 Enabled Network
decodes the data using OFG algorithm for data retrieval
and the security and performance of the system is
analyzed.
Objectives
Borra Sahithi
To increase the data storage security in cloud such as B. Tech. (CSE) III Year
Condentiality, Integrity and Availability with minimum ISM Dhanbad
computation overheads. Guide: Dr. Rajib Ranjan Maiti

Deliverables Description

A noble secure protocol based on rateless code for cloud We investigated the quality of VoIP trac sent over a
storage system with parity check matrix for integrity network that use either IPv4 or IPv6 with the help of
check and encryption for securing the data. network simulation using OPNET Modeler 14.5 simulator.

Fast Forward | January 2017

22
Explore, Enable, Excel

We built a network scenario where a set of handsets domain. Our goal is to derive the hidden aspect which has
(both cal ling and cal led) are connected to a been discussed in the text data. Further, we retrieve the
wired/wireless switch which is in turn connected to a aspect intensity with which the user emphasis on a given
router, and the routers in calling and called sides are aspect in the review and give a score to each aspect.
connected through internet with default conguration
Deliverables
present in the simulator. We used a set of performance
metrics like end-to-end delay, voice jitter, packet delay An algorithm to retrieve aspect-based intrinsic
variation, mean opinion score, trac delivery ratio information for analysis of service quality of banks
available in the simulator. and other public entities
Objectives A prepared review dataset of banking domain by
crawling from web sources.
To investigate the feasibility of availing the
services of VoIP over IPv6 enabled network File Transfer API: An Interface between SFMS
To evaluate the performance gain in IPv6 for the and CBS
same.
Deliverables
A detailed project report on the performance
measurement of VoIP over IPv6 and IPv4 enabled &
networks. The measurement is made over both wired and
wireless networks.
Sparse Aspect Rating Model for Sentiment Pranavi Jalapati Satya Naraparaju
Summarization B. Tech. (CSE) II Year
JNTU, Hyderabad
Guide: Shri G. Raghuraj
Description
Agni Besh Chauhan
B. Tech. (CSE) III Year This study proposes an interface between the SFMS
IIT Patna (Structured Financial Messaging System) and CBS (Core
Guide: Dr. S. Nagesh Bhattu Banking System) which invokes two primary functions of
the SFMS Bank API namely 'Send' and 'Receive'
Description messages. The message sent can either be in a le format
This study deals with rigorous analysis of review data or a string structure. The received message has to be in a
crawled from various sources to deliver aspect string structure which is a requirement of the SFMS.
segmented sentiment. It tackles the latent aspect mining After an authorised activation of the interface server, it
problem in an unsupervised manner by considering the dynamically connects to the SFMS server using the port
user and item side information of review text for specied at the client end. The interface supports
modeling of aspect generation leading to improvement multiple le transfer averting network congestion. The
on the accuracy and reliability of predicted aspect server acknowledges successful transfer and reports a
ratings. The task investigated here takes a collection of NAK (Negative Acknowledgment) otherwise. On
review text in banking domain as input with overall receiving a positive acknowledgment, the les at the
numerical rating; and with the goal of discovering a set of parent location are deleted to avoid redundancy.
aspect and predict ratings on each aspect for each review Moreover, all the transactions and login activity is logged
by applying unsupervised machine learning techniques. using a database for accountability.

Objectives Objectives

To investigate aspect mining problem that aims to deliver Transfer multiple les and push messages across
opinion based summarization of text reviews in nancial SFMS and CBS avoiding manual intervention

Fast Forward | January 2017

23
Explore, Enable, Excel

Log the details of all the transaction attempts


along with the login activity
Delete the les at the parent directory once they
are successfully transferred in order to avoid
redundancy.
Deliverables
An API (Application Programme Interface) which pushes
customer and also ensures controls.
multiple les and messages across SFMS and CBS and
logs the transfers attempted and login activity. Deliverables
MIS Module for Issue of Digital Certicate
MIS Module for Issue of Digital Certicate and
Application Tracker Application and Correspondence Tracker.

MIS Module for Issue of Digital Certicate and


Application Tracker
G T Rohit Krishna Raghavendra
B. Tech. (CSE) III Year
Shiv Nadar University
Guide: Shri V. S. Mahesh Sai Krishnan T
B.E. (CSE) III Year
Description
Osmania University
MIS module for Issue of Digital Certicate helps in Guide: Shri S. Lalit Mohan
maintaining customer transactions viz., bank-wise
credits, TDS deducted by customers and types of digital Description
certicates issued to the customers. Service Tax
component is derived. The reports module helps in The aim of the study is to build a search engine for banks,
generating daily, monthly, quarterly and other periodic for searching information related to the domain of
reports. Information with respect to transactions viz. Information Security. We have made use of the open
customer-wise transactions, etc., can be generated. source cloud environment called OpenStack for
managing the nodes. The crawler is used to crawl through
In the Application and Correspondence Tracker, details of the web and collect the necessary information. Once the
applications received for issue of certicate are captured information has been retrieved, ranking algorithms were
and various stages encompassing the life cycle of issuing used to rank the web pages and machine learning tools so
of digital certicate is captured to enable ecient that the search engine will be learning automatically.
delivery to the customer and also ensures controls in Finally, a user interface needs to be created for the user to
place for the department. Similarly, audit reports enter their query and access the information.
received by the department can also be updated
customer-wise for further follow-up. Objectives

Objectives To create a domain-specic search engine than being


generic and the domain dealt here is Information
To maint ain customer transactions viz., Security.
organisation-wise credits, TDS deducted by
customers and types of digital certicates issued Deliverables
to customers Have successfully set up the OpenStack cloud
To capture the details of applications received by environment up and running on the Ubuntu 14.04
the department for issue of and various stages servers, and are able to run the Apache Nutch crawler
encompassing the lifecycle of issuing of digital image using a Docker container.
certicate so as to enable ecient delivery to the

Fast Forward | January 2017

24
Explore, Enable, Excel

Inaugural Batch of Post Graduate ...Continued from Page 02


consultancy on these projects. He briefed about the use
Diploma in Banking Technology of the software available in CoEA SAS Enterprise Miner
Gets Going and IBM SPSS Modeler, KNIME, Rapid Miner, the recent
development of R User Interface for Banking Analytics
T HE Inaugural batch of the Institutes Post Graduate
Di p l o m a i n B a n k i n g Te c h n o l o g y ( P G D BT )
commenced on July 04, 2016. This Post Graduate
(RUIBA). He explained the work done in CoEA especially
in the development of Algorithms/Architectures in
Data/Text/Web Mining, Evolutionary/Fuzzy/Neuro/
Diploma in Banking Technology is a unique programme
Soft Computing, Global/Multi Criteria Optimization,
designed to provide the Indian Banking and Financial
Time Series Data Mining, Social Media Analytics, Big
Sector, on a regular basis, a pool of talented
Data Analytics, Statistical Machine Learning.
professionals with technology expertise to strongly
support their technology deployment initiatives. Dr. Nagesh B. Sristy, Assistant Professor, IDRBT, spoke
on the importance of Analytics and Data Warehouse and
The PGDBT is a full-time regular one year programme,
briey explained the related tools and techniques.
spread over four terms, that provides essential learning
inputs on technology implementation, integration and
management to both directly selected candidates as
well as practicing bankers, so as to enable them to meet
the changing technology requirements of the Banking
Sector. The programme focuses on present technologies COMING UP
as well as emerging technologies that can contribute to
the growth of banks. Second IDRBT Banking Application
The inaugural batch of candidates have completed their Contest
rst two terms and their placement process is on.
Almost half of the batch has already been placed and all
the remaining students are expected to be placed well-
T HE popularity of App or Application Software has
grown tremendously in recent years, with people
across nations, irrespective of age and gender, getting
before they complete even their third term. hooked to the Apps culture.
Admissions to the second batch of the PGDBT Responding to this new habit, Indian banks too have been
programme would be announced by February 2017 and building Apps, but the requirements of customers and
interested candidates may visit the Institute's website at banks may not be met only by the internal teams of
www.idrbt.ac.in for details. banks. Moreover, Apps are an area where there are
talented individuals, geeks and small companies, who are
working with great passion, and there is a need to tap
these apps for the benet of the banking sector.
In order to provide a boost to developing Apps and
bring out the innovations happening in the area of Apps
which could be useful for the Indian Banking and
Financial Sector, the Institute started organizing the
national level Annual IDRBT Banking Application
Contest (IBAC) in 2016 and the rst IBAC was held on
April 11, 2016.
Since new apps are being developed frequently, there is a
need to tap them quickly to benet the banking sector.
Accordingly, the Institute has announced the Second
IDRBT Annual Banking Application Contest on April 07,
2017. Please visit www.idrbt.ac.in for details.

Fast Forward | January 2017

25
FORTHCOMING PROGRAMMES
JANUARY 2017
Migrating to IPv6 09 11
Cyber Defence for Banks 09 13
R for Analytics 17 20
Data Centre Management 18 20
Trends and Technologies in Mobile Banking 23 24
IT Vendor Management 23 25
IT for Functional Executives in Banks 30 01
Digital Forensics for Banks 30 03
FEBRUARY 2017
Big Data Analytics for Banks 01 04
Emerging Trends on Operational DBMS for Banks 06 10
Banking Technologies 06 10
Cloud Adoption in Banks 13 17
Network Security 13 17
Data Quality 20 21
Payment Systems 20 22
Mobile App Development for Banks 27 03
SFMS Platform for LCs, BGs, RTGS & NEFT 27 03
MARCH 2017
Registration Authority Operations 02 03
Secure Coding Practices 06 10
Information Systems Control & Audit 20 24
APRIL 2017
Social Media Analytics for Banks 17 21
Technologies for Financial Inclusion 24 26
Website Security 24 26
MAY 2017
Mobile Security and Mobile Application Testing 01 03
Payment Systems 01 03
SFMS Platform for LCs, BGs, RTGS & NEFT 01 05
Registration Authority Operations 08 09
Data Warehousing for CRM & Analytics 15 18
Security Operations Centre 15 19
Digital Forensics for Banks 15 19
Migrating to IPv6 22 24
Emerging Authentication Techniques for Banks 22 24
Virtualization and Cloud Computing 22 26
JUNE 2017
Open Source Technologies 05 07
Fraud Analytics 12 16
Big Data & Cloud Computing Challenges 19 23
Network Security 19 23
SFMS Platform for LCs, BGs, RTGS & NEFT 19 23
Technologies for Financial Inclusion 27 29
Mobile Governance and Mobile Cloud Services 28 29
Design of Secure Enterprise LAN 28 30
Published by:

Explore, Enable, Excel

Institute for Development and Research in Banking Technology


(Established by Reserve Bank of India)

Castle Hills, Road No. 1, Masab Tank, Hyderabad - 500 057, India.
EPABX : +91 - 40 - 2329 4999, Fax : +91 - 40 - 23535157
Web : www.idrbt.ac.in E-mail : publisher@idrbt.ac.in

Vous aimerez peut-être aussi