Please enable javascript in your browser.
भारत सरकार
Government of India
भारत सरकार
Ministry of Defence
भारत सरकार
Department of Defence Production
A
+
A
A
-
A
A
Language
हिन्दी
About
DIO
iDEX
Organizational Structure
Who’s who
FAQ
Financial FAQ
Grievance & Feedback
Contact Us
INDUS X
Resources
Guidelines
ADITI Scheme
Database
Publications
Scheme for iDEX
Useful Links
Annual Return
Notices
Career
Partners
DISC PI
ADITI PI
iIH
Other Partners
Gallery
Challenges
Log In
Challenges CPT
9
DISC
AUTOMATION OF SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE (SOAR)
Presently we are doing blocking of IPs in Firewall & User ends manually, which should happen automatically through security operations center (SOC).
Challenges
Challenge #1(Army)
DRONE FORENSICS
Challenge #2(Army)
WEBSITE DEFACEMENT DETECTION & MOBILE APP SCANNER.
Challenge #3(Army)
DESIGN AND IMPLEMENTATION OF A GUI-BASED SOCIAL MEDIA MONITORING PLATFORM FOR INTELLIGENCE AND OPERATIONS PURPOSE
Challenge #4(NAVY)
DEVELOPMENT OF AN INDIGENOUS SECURITY INFORMATION AND EVENT MANAGEMENT (SIEM) SOLUTION BASED ON OPEN-SOURCE FRAMEWORK
Challenge #5(NAVY)
DEVELOPMENT OF AN ADVANCED OPEN-SOURCE FRAMEWORK SANITISATION TOOL FACILITATING SECURE TRANSFER OF DATA BETWEEN MULTIPLE AIR-GAPPED NETWORKS.
Challenge #6(NAVY)
AUTONOMOUS AI BASED THREAT DETECTION AND THREAT ELIMINATION ENGINE TO BLOCK RANSOMWARE AND ZERO-DAY ATTACKS
Challenge #7(AIRFORCE)
DEVELOPMENT OF A MULTI-ENGINE AV (ANTI-VIRUS) SOLUTION
Challenge #8(AIRFORCE)
CREATION OF A BROWSER PLUG-IN FOR CHROME AND FIREFOX, WHICH IS ABLE TO DETECT PHISHING MAILS AND TAKE APPROPRIATE ACTION.
Challenge #09
INTELLIGENT (AI BASED) DOCUMENT MANAGEMENT SYSTEM
Challenge #10(AIRFORCE)
MITIGATING RISKS OF UNAUTHORIZED USB DEVICES: A CUSTOM PC SOLUTION
Challenge #11
INDIGENOUS SOFTWARE TO AVOID UNAUTHORISED ACCESS OF DATA FROM SMART DEVICES
Challenge #12(AIRFORCE)
DEVELOPMENT OF A SMARTPHONE SECURITY SOLUTION/ APPLICATION
Challenge #13(AIRFORCE)
INNOVATIVE DECISION SUPPORT SYSTEM DSS FOR ANALYSIS OF UNSTRUCTURED DATABASE
Challenge #14(MIDHANI)
INTEGRATION OF GEM PORTAL TO ERP IN COMPLIANCE WITH CYBER SECURITY NORMS.
Challenge #15
SECURE USB SOLUTION
Challenge #16(GRSE)
IMPLEMENTING INDUSTRY 4.0 FOR SHIPYARD WITHOUT WIFI CONNECTIVITY.
Challenge #17(BEML)
AUTOMATION OF SECURITY ORCHESTRATION, AUTOMATION, AND RESPONSE (SOAR)
Challenge #18(MDL)
LINUX DESKTOP IN WINDOWS ENVIRONMENT
Challenge #19(BEL)
ATTACK SURFACE MONITORING TOOL FOR CONTINUOUS DISCOVERY, ANALYSIS, REMEDIATION AND MONITORING OF CYBER SECURITY VULNERABILITIES AND POTENTIAL ATTACK VECTORS FOR INVENTORY.
Challenge #20(BEL)
INTELLIGENT SYSTEM FOR IDENTIFICATION OF PHISHING EMAILS, FAKE WEBSITES AND SAND-BOXING TARGETED ENTITY
Challenge #21(BEL)
ENHANCING SECURITY FOR ANY POS, BANKING AND ATM BASED TRANSACTION
Challenge #22(MHA-14c)
VOICE RECOGNITION SOFTWARE TO MITIGATE CYBER FRAUDS
Challenge #23(MHA-14C)
A TOOL TO ANALYSE BANK STATEMENTS TO ASSIST IN CYBERCRIME DETECTION
Challenge #24(MHA-14C)
CRYPTOCURRENCY INTELLIGENCE & ANALYSIS TOOL
Challenge #25(MHA-14C)
FRAMEWORK PLATFORM FOR IDENTIFICATION OF PHISHING DOMAINS/URLS
Challenge #26()MHA-14C
PORTABLE MOBILE FORENSIC SUITE AND A CLOUD VERSION
Challenge #27(MHA-14C)
PLUG AND PLAY AGENT BASED CYBER SECURITY AND COMPROMISE ASSESSMENT AUDIT TOOL
Challenge #28(MHA-14C)
CYBER SECURITY AND CYBER INVESTIGATION TRAINING COURSEWARE
idexdio[at]ddpmod[dot]gov[dot]in
search here