bose sundan | Anna University (original) (raw)

Papers by bose sundan

Research paper thumbnail of Collision Elimination for Random Behavior Nodes in Ad Hoc Wireless Network Using Early Backoff Announcement (EBA)

IFIP Advances in Information and Communication Technology, 2022

Due to the detrimental repercussions of hidden terminals, collision avoidance is essential in con... more Due to the detrimental repercussions of hidden terminals, collision avoidance is essential in contention-based media access control systems for multi-hop adhoc networks. Currently, the most common collision-avoidance strategies are four-way sender-initiated schemes. Although many research has been done to assess the performance of these schemes, the most of it has focused on single-hop ad hoc networks or networks with a limited proportion of hidden terminals. This research presents an enhancement to the existing IEEE 802.11 Distributed Coordination Function (DCF) MAC that reduces collisions, medium idle time, and overall network speed. The modification utilizes the existing Early backoff announcement (EBA) mechanism. The frame header in EBA is used by a station to indicate its upcoming backoff time; the backoff value is determined at random. This reduces collisions but no care has been taken to improve the throughput directly. In this paper, an algorithm for selecting the post backoff value based on certain criteria is proposed. The post backoff selection is selected through a round robin scheduling between the number of stations currently being transmitting. This reduces unnecessary wait time for stations that want to transmit back-to-back.

Research paper thumbnail of A Six-Point Based Approach for Enhanced Broadcasting Using Selective Forwarding Mechanism in Mobile Ad Hoc Networks

Smart innovation, systems and technologies, 2022

Broadcasting is a specific procedure that enables a system of PCs to transmit information bundles... more Broadcasting is a specific procedure that enables a system of PCs to transmit information bundles from a one source to various destinations. In wireless ad hoc networks, broadcasting can be complex because radio signals can overlap geographically. As a result, a basic flooded transmission is often quite expensive and results in significant redundancy. The paper proposes a new approach to broadcasting called Enhanced Broadcasting with Selective Forwarding (EBSF) that extends the distance adaptive broadcasting protocol by introducing a six point approach for finding a modified threshold. In our approach, we introduce six strategic points computed using a centre point, a radius, sine values and cosine values in such way that the strategic points are separated by 60° from the centre of the circle. This research work has the importance of decreasing the number of packets that every node transmits during broadcasting. The proposed technique considerably improved by selecting only an ideal selection of transmission nodes, so reducing redundant broadcasts and ensuring that the data received is equivalent to the information originated.

Research paper thumbnail of An Intrusion Detection and Prevention System for DDoS Attacks using a 2-Player Bayesian Game Theoretic Approach

2021 4th International Conference on Computing and Communications Technologies (ICCCT), Dec 16, 2021

Distributed Denial-of-Service (DDoS) attacks pose a huge risk to the network and threaten its sta... more Distributed Denial-of-Service (DDoS) attacks pose a huge risk to the network and threaten its stability. A game theoretic approach for intrusion detection and prevention is proposed to avoid DDoS attacks in the internet. Game theory provides a control mechanism that automates the intrusion detection and prevention process within a network. In the proposed system, system-subject interaction is modeled as a 2-player Bayesian signaling zero sum game. The game's Nash Equilibrium gives a strategy for the attacker and the system such that neither can increase their payoff by changing their strategy unilaterally. Moreover, the Intent Objective and Strategy (IOS) of the attacker and the system are modeled and quantified using the concept of incentives. In the proposed system, the prevention subsystem consists of three important components namely a game engine, database and a search engine for computing the Nash equilibrium, to store and search the database for providing the optimum defe...

Research paper thumbnail of A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T<sup><b>2</b></sup>Statistics Approach for Network Environments

The Scientific World Journal, 2015

The ever expanding communication requirements in today's world demand extensive and efficient net... more The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T 2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T 2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

Research paper thumbnail of MutatedSocioAgentSim (MSAS): semisupervised modelling of multiagent simulation to predict and detect the mutation in a camouflaged social network

Turkish Journal of Electrical Engineering and Computer Sciences, Mar 30, 2018

A social network is a networked structure formed by a set of agents/actors. It describes their in... more A social network is a networked structure formed by a set of agents/actors. It describes their interrelationships that facilitate the exchange and flow of resources and information. A camouflaged social network is one such community that influences the underlying structure and the profile of the agents, to cause mutation. The proposed MSAM is a novel system that simulates a multiagent network whose community structure is analyzed to identify the critical agents by studying the mutations caused due to attachment and detachment of agents. The isolation of the tagged agents will demonstrate disruption of information flow, which leads to the dismantling of the camouflaged community and giving scope for a predictive study about near future reconciliation. The proposed system simulates the 9/11 covert network based on the belief matrix and uses the novel density-based link prediction and suite of fragmentation algorithms for predictive community analysis. MSAM is claimed to be an intelligent system as agents perceive the knowledge from the dynamic environment through the belief matrix and further co-evolve as a community upon which semisupervised methodologies are used to predict the critical agents causing serious mutation.

Research paper thumbnail of A New Intrusion Detection and Prevention System Using a Hybrid Deep Neural Network in Cloud Environment

Lecture notes on data engineering and communications technologies, 2022

Research paper thumbnail of Smart Phone User Assistance Application for Android

Journal of Engineering Science and Technology, 2015

Nowadays people seem to be more dependent on smart phones rather than any other electronic device... more Nowadays people seem to be more dependent on smart phones rather than any other electronic devices. Smart phones act like mini laptops with the mobilecommunication facility. Moreover, people possess more than one SIM card/Smart phone for many purposes. So non-ambiguity between various roles performed by them is crucial. For an example, person can have smart phone for his personal use at the residence and another phone for his official use. Consider a scenario: person at the residence urgently needs the official contact information available on the phone at his office (remote place). This application plays major dual role by acting as Server (official Smart phone) and Client (personal Smart phone). Irrespective of geographic area, the server smart phone (SSP) provides various services based on the request received from the client smart phone (CSP). The CSP send various requests through the SMS communication. Various requests can be fetching information from SSP such as log for unread...

Research paper thumbnail of Impact of Gray hole attack on adhoc networks

2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013

Mobile adhoc networks are self-configuring network connected by wireless links which forms a rand... more Mobile adhoc networks are self-configuring network connected by wireless links which forms a random topology of mobile nodes. Topology of these network changes rapidly and unpredictably. Due to lack of infrastructure support each node acts as a router and any nodes can join and leave the network at any time. Providing security to these networks is a challenging issue because these type of networks suffer for various kinds of malicious attacks. One of the attacks which are more difficult to detect in the Mobile adhoc network is Gray hole attack. In this paper first an analytical approach to detect Gray Hole attack is developing for AODV protocol. Second, a simple algorithmatical framework is created for generating attacks. Third, experiments are simulated for Gray Hole attacks under variety of adhoc network conditions such as packet delivery ratio, dropped packets. Overhead, normalized routing load in order to understand the severity of this attack.

Research paper thumbnail of Advances in Natural and Applied Sciences

The most lethal attack on any network is Denial of Service attack, which rise to a multifold leve... more The most lethal attack on any network is Denial of Service attack, which rise to a multifold level over the years and become much more sophisticated. The Distributed Denial of service attacks is more potent threat to the network infrastructure nowadays. This work focuses on such attacks on the wireless Mobile Ad hoc networks. Collaborative traffic information sharing based detection and prevention system for DDoS attacks is presented here with Trust Evaluation based routing technique. This system basically focus on energy & packet delivery ratio based on which the system detects and prevents DDoS attacks and compute a trust value. based on the values the routing of message takes place from source to destination. The comparative study of other protocols with the proposed one also provided with the simulation results using DARPA datasets in Network Simulator which proves the supremacy of proposed work, evaluated based on parameters like delay, average energy consumption

Research paper thumbnail of Elaborative survey on storage technologies for XML big data: A real-time approach

2016 International Conference on Recent Trends in Information Technology (ICRTIT), 2016

Recent tremendous increase in the use of huge amount of XML data over the web leads to the develo... more Recent tremendous increase in the use of huge amount of XML data over the web leads to the development of new technologies. The special characteristic of XML is its flexible structure that makes XML as the widely used data format. Big data generally refers large amount of data of any type. As the size of the XML data is increased, XML big data takes the advantage of considering both XML and big data. Hence, innovative technologies are essential to handle XML big data. Therefore, it is necessary for the technologies to emphasize more on storage and management of XML big data. We elucidate the fundamental features of XML and big data. An important aspect of this survey is about the considerations of storage technologies for XML big data in real-time applications. This paper provides a review on latest technologies that can store, process and manage XML big data efficiently. In particular, the paper outlines the efficient storage technologies that can be applied to support XML big data. On the whole, based on the current technologies and literature review, our paper enumerates XML big data storage technologies that are available for real-world applications.

Research paper thumbnail of Secure XML labeling for efficient XML content dissemination

2014 Sixth International Conference on Advanced Computing (ICoAC), 2014

XML is the commonly utilized content specification format for data interchange over the Internet.... more XML is the commonly utilized content specification format for data interchange over the Internet. In Publish/Subscribe model, producer is the source for an XML document and disseminates the XML content to the consumer using a mediator called publisher. Producer labels the XML document and defines access control policies for the consumers. Securely labeled XML document are encrypted and sent to the publisher with consumers access details. Encryption is used to provide confidentiality and integrity for XML content dissemination. Consumer queries the publisher for their accessible content. Here, XML label plays a vital role which locates the XML content uniquely. The objective is to design a secure label that has to identify each XML tag uniquely, should not reveal any additional information about the source XML document. Also, XML label size should be optimal with less label generation time. We proposed a secure and efficient XML labeling scheme called Secure Dewey Coding (SDC) that prevents information leak and assures minimal memory space and time. The implementation results of the proposed XML labeling scheme showed that the XML label size has been reduced to a maximum and an average of 68% and 59% respectively and the generation time also decreased significantly.

Research paper thumbnail of Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem

Procedia Computer Science, 2015

The Detection and Prevention system against many attacks has been formulated in Mobile ad hoc net... more The Detection and Prevention system against many attacks has been formulated in Mobile ad hoc networks to secure the data and to provide the uninterrupted service to the legitimate clients. The formulation of opinion of neighbors or belief value or Trust value plays vital role in the detection system to avoid attacks. The attack detection system always extracts the behaviors of nodes to identify the attack patterns and prediction of future attacks. The False positives and false negatives plays vital role on identification of attackers accurately without any false positives and negatives .Our system uses the Aumann agreement theorem for convergence of Truth on opinion based on the bound of confidence value , such that truth consensus will maintained, The accuracy of system will be enhanced through this methodology

Research paper thumbnail of Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks

2013 Fifth International Conference on Advanced Computing (ICoAC), 2013

Intrusion Detection System (IDS) is the process of monitoring the events that occur in a system o... more Intrusion Detection System (IDS) is the process of monitoring the events that occur in a system or network and process them for possible intrusions where as Intrusion Prevention System (IPS) has the capability to attempt to stop such possible intrusions. Combining the two systems will result in IDPS which not only detects the attacks but also prevent such attacks to occur in the networks. Distributed Denial of Service (DDOS) attacks are the major concern for security in the collaborative networks. Although non DDOS attacks are also make the network performances poor, the effect of DDOS attacks is severe. In DDOS attacks, flooding of the particular node as victim and jam it with massive traffic happens and the complete network performance is affected. In this paper, a novel Intrusion Detection and Prevention System is designed which detects the flooding DDOS attacks based on Firecol and prevents the attacks based on Dynamic Growing Self Organizing Tree (DGSOT) for collaborative networks. Simulation results show that DGSOT with Firecol (DGSOTFC) produces better intrusion detection and prevention system. Performance metrics based on the parameters delay and energy conservation are better in DGSOT-FC than the traditional IDPS systems.

Research paper thumbnail of Efficient encoding of XML document for secure dissemination

2013 Fifth International Conference on Advanced Computing (ICoAC), 2013

The paper proposes an approach for efficient content dissemination to assure content integrity an... more The paper proposes an approach for efficient content dissemination to assure content integrity and confidentiality by exploiting the structural properties of an Extensible Markup Language (XML) document object model (DOM). Our approach proposes Enhanced Dewey Code (EDC), an encoding scheme for XML document and is based on the notion of enhanced level order numbers that supports the integrity and confidentiality requirements of an XML document and also facilitates efficient identification and distribution of selected content from an XML document. By using such notion, we develop a policy-based routing scheme for XML content dissemination which assures that the content is delivered to users according to the access control policies by preventing information leaks. Our XML content dissemination approach represents an efficient and secure mechanism for XML Documents to use in applications such as publish-subscribe systems. Our content dissemination approach provides different levels of confidentiality and integrity requirements in trusted and untrusted networks, which is common across enterprise networks and the web.

Research paper thumbnail of The Combined Approach for Anomaly Detection Using Neural Networks and Clustering Techniques

Computer Science & Engineering: An International Journal, 2012

Nowadays detection of new threats has become a necessity for secured communication to provide abs... more Nowadays detection of new threats has become a necessity for secured communication to provide absolute data confidentiality, integrity and availability. Design and development of such an intrusion detection system in the communication world, should not only be new, accurate and fast but also effective in an environment encompassing the surrounding network. In this paper, a new approach is proposed for network anomaly detection by combining neural network and clustering algorithms. We propose modified Self Organizing Map algorithms which initially starts with null network and grows with the original data space as initial weight vector, updating neighbourhood rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment of simple SOM. New nodes are created using distance threshold parameter and their neighbourhood is identified using connection strength and its learning rule and the weight vector updation is carried out for neighbourhood nodes. The k-means clustering algorithm is employed for grouping similar nodes of Modified SOM into k clusters using similarity measures. Performance of the new approach is evaluated with standard bench mark dataset. The new approach is evaluated using performance metrics such as detection rate and false alarm rate. The result is compared with other individual neural network methods, which shows considerable increase in the detection rate and 2% false alarm rate.

Research paper thumbnail of Chinese remainder Theorem based centralised group key management for secure multicast communication

IET Information Security, 2014

Designing a centralised group key management with minimal computation complexity to support dynam... more Designing a centralised group key management with minimal computation complexity to support dynamic secure multicast communication is a challenging issue in secure multimedia multicast. In this study, the authors propose a Chinese remainder theorem-based group key management scheme that drastically reduces computation complexity of the key server. The computation complexity of key server is reduced to O (1) in this proposed algorithm. Moreover, the computation complexity of group member is also minimised by performing one modulo division operation when a user join or leave operation is performed in a multicast group. The proposed algorithm has been implemented and tested using a key-star-based key management scheme and has been observed that this proposed algorithm reduces the computation complexity significantly.

Research paper thumbnail of Computers and Mathematics with Applications

Computers & Geosciences, 1976

Designing a key distribution protocol with minimal computation and storage complexity is a challe... more Designing a key distribution protocol with minimal computation and storage complexity is a challenging issue in secure multimedia multicast. In most of the multimedia multicast applications, the group membership requires secured dynamic key generation and updation operations that usually consume much of the computation time. In this paper, we propose a new GCD (Greatest Common Divisor) based Key Distribution Protocol which focuses on two dimensions. The first dimension deals with the reduction of computation complexity which is achieved in our protocol by performing fewer multiplication operations during the key updation process. To optimize the number of multiplication operations, the existing Karatsuba divide and conquer approach for multiplication is used in this proposed work. The second dimension aims at reducing the amount of information stored in the Group Center and group members while performing the update operation in the key content. The proposed algorithm which focuses on these two dimensions has been implemented and tested using a Cluster tree based key management scheme and has been found to produce promising results. Comparative analysis to illustrate the performance of various key distribution protocols is shown in this paper and it has been observed that this proposed algorithm reduces the computation and storage complexity significantly.

Research paper thumbnail of Efficient Encoding of XML Document for Secure Dissemination

IEEE, 2013

The paper proposes an approach for efficient content dissemination to assure content integrity an... more The paper proposes an approach for efficient
content dissemination to assure content integrity and
confidentiality by exploiting the structural properties of an
Extensible Markup Language (XML) document object model
(DOM). Our approach proposes Enhanced Dewey Code (EDC),
an encoding scheme for XML document and is based on the
notion of enhanced level order numbers that supports the
integrity and confidentiality requirements of an XML document
and also facilitates efficient identification and distribution of
selected content from an XML document. By using such notion,
we develop a policy-based routing scheme for XML content
dissemination which assures that the content is delivered to users
according to the access control policies by preventing information
leaks. Our XML content dissemination approach represents an
efficient and secure mechanism for XML Documents to use in
applications such as publish-subscribe systems. Our content
dissemination approach provides different levels of confidentiality
and integrity requirements in trusted and untrusted networks,
which is common across enterprise networks and the web.

Research paper thumbnail of Elaborative Survey on Storage Technologies for XML Big Data: A Real-time Approach

IEEE, 2016

Recent tremendous increase in the use of huge amount of XML data over the web leads to the develo... more Recent tremendous increase in the use of huge amount of XML data over the web leads to the development of new technologies. The special characteristic of XML is its flexible structure that makes XML as the widely used data format. Big data generally refers large amount of data of any type. As the size of the XML data is increased, XML big data takes the advantage of considering both XML and big data. Hence, innovative technologies are essential to handle XML big data. Therefore, it is necessary for the technologies to emphasize more on storage and management of XML big data. We elucidate the fundamental features of XML and big data. An important aspect of this survey is about the considerations of storage technologies for XML big data in real-time applications. This paper provides a review on latest technologies that can store, process and manage XML big data efficiently. In particular, the paper outlines the efficient storage technologies that can be applied to support XML big data. On the whole, based on the current technologies and literature review, our paper enumerates XML big data storage technologies that are available for real-world applications.

Research paper thumbnail of Probabilistic Approach for Intrusion Detection System - FOMe Technique

IEEE, 2014

Detection of unexpected and emerging new threats has become a necessity for secured internet comm... more Detection of unexpected and emerging new threats
has become a necessity for secured internet communication with
absolute data confidentiality, integrity, and availability. Design
and development of such a detection system shall not only be new,
accurate and fast but also effective in a dynamic environment
encompassing the surrounding network. In this work, an attempt
is made to design an intrusion detection model based on the
probabilistic approach, first-order Markov chain process, to
effectively detection and predict network intrusions. As a first
step, the states are defined using clustering techniques for the
network traffic profiles; secondly state transition probability
matrix and initial probability distribution are determined based
on the states defined. Based on the network states, the probability
of event occurrence is stochastically measured if the value is lesser
than the predefined probability then it event is predicted as
anomaly. The proposed probabilistic model performance is
evaluated through experiments using KDD Cup99 dataset. The
proposed models achieve better detection rate while the attacks
are detected in levels of stages.

Research paper thumbnail of Collision Elimination for Random Behavior Nodes in Ad Hoc Wireless Network Using Early Backoff Announcement (EBA)

IFIP Advances in Information and Communication Technology, 2022

Due to the detrimental repercussions of hidden terminals, collision avoidance is essential in con... more Due to the detrimental repercussions of hidden terminals, collision avoidance is essential in contention-based media access control systems for multi-hop adhoc networks. Currently, the most common collision-avoidance strategies are four-way sender-initiated schemes. Although many research has been done to assess the performance of these schemes, the most of it has focused on single-hop ad hoc networks or networks with a limited proportion of hidden terminals. This research presents an enhancement to the existing IEEE 802.11 Distributed Coordination Function (DCF) MAC that reduces collisions, medium idle time, and overall network speed. The modification utilizes the existing Early backoff announcement (EBA) mechanism. The frame header in EBA is used by a station to indicate its upcoming backoff time; the backoff value is determined at random. This reduces collisions but no care has been taken to improve the throughput directly. In this paper, an algorithm for selecting the post backoff value based on certain criteria is proposed. The post backoff selection is selected through a round robin scheduling between the number of stations currently being transmitting. This reduces unnecessary wait time for stations that want to transmit back-to-back.

Research paper thumbnail of A Six-Point Based Approach for Enhanced Broadcasting Using Selective Forwarding Mechanism in Mobile Ad Hoc Networks

Smart innovation, systems and technologies, 2022

Broadcasting is a specific procedure that enables a system of PCs to transmit information bundles... more Broadcasting is a specific procedure that enables a system of PCs to transmit information bundles from a one source to various destinations. In wireless ad hoc networks, broadcasting can be complex because radio signals can overlap geographically. As a result, a basic flooded transmission is often quite expensive and results in significant redundancy. The paper proposes a new approach to broadcasting called Enhanced Broadcasting with Selective Forwarding (EBSF) that extends the distance adaptive broadcasting protocol by introducing a six point approach for finding a modified threshold. In our approach, we introduce six strategic points computed using a centre point, a radius, sine values and cosine values in such way that the strategic points are separated by 60° from the centre of the circle. This research work has the importance of decreasing the number of packets that every node transmits during broadcasting. The proposed technique considerably improved by selecting only an ideal selection of transmission nodes, so reducing redundant broadcasts and ensuring that the data received is equivalent to the information originated.

Research paper thumbnail of An Intrusion Detection and Prevention System for DDoS Attacks using a 2-Player Bayesian Game Theoretic Approach

2021 4th International Conference on Computing and Communications Technologies (ICCCT), Dec 16, 2021

Distributed Denial-of-Service (DDoS) attacks pose a huge risk to the network and threaten its sta... more Distributed Denial-of-Service (DDoS) attacks pose a huge risk to the network and threaten its stability. A game theoretic approach for intrusion detection and prevention is proposed to avoid DDoS attacks in the internet. Game theory provides a control mechanism that automates the intrusion detection and prevention process within a network. In the proposed system, system-subject interaction is modeled as a 2-player Bayesian signaling zero sum game. The game&amp;amp;#39;s Nash Equilibrium gives a strategy for the attacker and the system such that neither can increase their payoff by changing their strategy unilaterally. Moreover, the Intent Objective and Strategy (IOS) of the attacker and the system are modeled and quantified using the concept of incentives. In the proposed system, the prevention subsystem consists of three important components namely a game engine, database and a search engine for computing the Nash equilibrium, to store and search the database for providing the optimum defe...

Research paper thumbnail of A Dynamic Intrusion Detection System Based on Multivariate Hotelling’s T<sup><b>2</b></sup>Statistics Approach for Network Environments

The Scientific World Journal, 2015

The ever expanding communication requirements in today's world demand extensive and efficient net... more The ever expanding communication requirements in today's world demand extensive and efficient network systems with equally efficient and reliable security features integrated for safe, confident, and secured communication and data transfer. Providing effective security protocols for any network environment, therefore, assumes paramount importance. Attempts are made continuously for designing more efficient and dynamic network intrusion detection models. In this work, an approach based on Hotelling's T 2 method, a multivariate statistical analysis technique, has been employed for intrusion detection, especially in network environments. Components such as preprocessing, multivariate statistical analysis, and attack detection have been incorporated in developing the multivariate Hotelling's T 2 statistical model and necessary profiles have been generated based on the T-square distance metrics. With a threshold range obtained using the central limit theorem, observed traffic profiles have been classified either as normal or attack types. Performance of the model, as evaluated through validation and testing using KDD Cup'99 dataset, has shown very high detection rates for all classes with low false alarm rates. Accuracy of the model presented in this work, in comparison with the existing models, has been found to be much better.

Research paper thumbnail of MutatedSocioAgentSim (MSAS): semisupervised modelling of multiagent simulation to predict and detect the mutation in a camouflaged social network

Turkish Journal of Electrical Engineering and Computer Sciences, Mar 30, 2018

A social network is a networked structure formed by a set of agents/actors. It describes their in... more A social network is a networked structure formed by a set of agents/actors. It describes their interrelationships that facilitate the exchange and flow of resources and information. A camouflaged social network is one such community that influences the underlying structure and the profile of the agents, to cause mutation. The proposed MSAM is a novel system that simulates a multiagent network whose community structure is analyzed to identify the critical agents by studying the mutations caused due to attachment and detachment of agents. The isolation of the tagged agents will demonstrate disruption of information flow, which leads to the dismantling of the camouflaged community and giving scope for a predictive study about near future reconciliation. The proposed system simulates the 9/11 covert network based on the belief matrix and uses the novel density-based link prediction and suite of fragmentation algorithms for predictive community analysis. MSAM is claimed to be an intelligent system as agents perceive the knowledge from the dynamic environment through the belief matrix and further co-evolve as a community upon which semisupervised methodologies are used to predict the critical agents causing serious mutation.

Research paper thumbnail of A New Intrusion Detection and Prevention System Using a Hybrid Deep Neural Network in Cloud Environment

Lecture notes on data engineering and communications technologies, 2022

Research paper thumbnail of Smart Phone User Assistance Application for Android

Journal of Engineering Science and Technology, 2015

Nowadays people seem to be more dependent on smart phones rather than any other electronic device... more Nowadays people seem to be more dependent on smart phones rather than any other electronic devices. Smart phones act like mini laptops with the mobilecommunication facility. Moreover, people possess more than one SIM card/Smart phone for many purposes. So non-ambiguity between various roles performed by them is crucial. For an example, person can have smart phone for his personal use at the residence and another phone for his official use. Consider a scenario: person at the residence urgently needs the official contact information available on the phone at his office (remote place). This application plays major dual role by acting as Server (official Smart phone) and Client (personal Smart phone). Irrespective of geographic area, the server smart phone (SSP) provides various services based on the request received from the client smart phone (CSP). The CSP send various requests through the SMS communication. Various requests can be fetching information from SSP such as log for unread...

Research paper thumbnail of Impact of Gray hole attack on adhoc networks

2013 International Conference on Information Communication and Embedded Systems (ICICES), 2013

Mobile adhoc networks are self-configuring network connected by wireless links which forms a rand... more Mobile adhoc networks are self-configuring network connected by wireless links which forms a random topology of mobile nodes. Topology of these network changes rapidly and unpredictably. Due to lack of infrastructure support each node acts as a router and any nodes can join and leave the network at any time. Providing security to these networks is a challenging issue because these type of networks suffer for various kinds of malicious attacks. One of the attacks which are more difficult to detect in the Mobile adhoc network is Gray hole attack. In this paper first an analytical approach to detect Gray Hole attack is developing for AODV protocol. Second, a simple algorithmatical framework is created for generating attacks. Third, experiments are simulated for Gray Hole attacks under variety of adhoc network conditions such as packet delivery ratio, dropped packets. Overhead, normalized routing load in order to understand the severity of this attack.

Research paper thumbnail of Advances in Natural and Applied Sciences

The most lethal attack on any network is Denial of Service attack, which rise to a multifold leve... more The most lethal attack on any network is Denial of Service attack, which rise to a multifold level over the years and become much more sophisticated. The Distributed Denial of service attacks is more potent threat to the network infrastructure nowadays. This work focuses on such attacks on the wireless Mobile Ad hoc networks. Collaborative traffic information sharing based detection and prevention system for DDoS attacks is presented here with Trust Evaluation based routing technique. This system basically focus on energy & packet delivery ratio based on which the system detects and prevents DDoS attacks and compute a trust value. based on the values the routing of message takes place from source to destination. The comparative study of other protocols with the proposed one also provided with the simulation results using DARPA datasets in Network Simulator which proves the supremacy of proposed work, evaluated based on parameters like delay, average energy consumption

Research paper thumbnail of Elaborative survey on storage technologies for XML big data: A real-time approach

2016 International Conference on Recent Trends in Information Technology (ICRTIT), 2016

Recent tremendous increase in the use of huge amount of XML data over the web leads to the develo... more Recent tremendous increase in the use of huge amount of XML data over the web leads to the development of new technologies. The special characteristic of XML is its flexible structure that makes XML as the widely used data format. Big data generally refers large amount of data of any type. As the size of the XML data is increased, XML big data takes the advantage of considering both XML and big data. Hence, innovative technologies are essential to handle XML big data. Therefore, it is necessary for the technologies to emphasize more on storage and management of XML big data. We elucidate the fundamental features of XML and big data. An important aspect of this survey is about the considerations of storage technologies for XML big data in real-time applications. This paper provides a review on latest technologies that can store, process and manage XML big data efficiently. In particular, the paper outlines the efficient storage technologies that can be applied to support XML big data. On the whole, based on the current technologies and literature review, our paper enumerates XML big data storage technologies that are available for real-world applications.

Research paper thumbnail of Secure XML labeling for efficient XML content dissemination

2014 Sixth International Conference on Advanced Computing (ICoAC), 2014

XML is the commonly utilized content specification format for data interchange over the Internet.... more XML is the commonly utilized content specification format for data interchange over the Internet. In Publish/Subscribe model, producer is the source for an XML document and disseminates the XML content to the consumer using a mediator called publisher. Producer labels the XML document and defines access control policies for the consumers. Securely labeled XML document are encrypted and sent to the publisher with consumers access details. Encryption is used to provide confidentiality and integrity for XML content dissemination. Consumer queries the publisher for their accessible content. Here, XML label plays a vital role which locates the XML content uniquely. The objective is to design a secure label that has to identify each XML tag uniquely, should not reveal any additional information about the source XML document. Also, XML label size should be optimal with less label generation time. We proposed a secure and efficient XML labeling scheme called Secure Dewey Coding (SDC) that prevents information leak and assures minimal memory space and time. The implementation results of the proposed XML labeling scheme showed that the XML label size has been reduced to a maximum and an average of 68% and 59% respectively and the generation time also decreased significantly.

Research paper thumbnail of Detection and Prevention System towards the Truth of Convergence on Decision Using Aumann Agreement Theorem

Procedia Computer Science, 2015

The Detection and Prevention system against many attacks has been formulated in Mobile ad hoc net... more The Detection and Prevention system against many attacks has been formulated in Mobile ad hoc networks to secure the data and to provide the uninterrupted service to the legitimate clients. The formulation of opinion of neighbors or belief value or Trust value plays vital role in the detection system to avoid attacks. The attack detection system always extracts the behaviors of nodes to identify the attack patterns and prediction of future attacks. The False positives and false negatives plays vital role on identification of attackers accurately without any false positives and negatives .Our system uses the Aumann agreement theorem for convergence of Truth on opinion based on the bound of confidence value , such that truth consensus will maintained, The accuracy of system will be enhanced through this methodology

Research paper thumbnail of Design of Intrusion Detection and Prevention System (IDPS) using DGSOTFC in collaborative protection networks

2013 Fifth International Conference on Advanced Computing (ICoAC), 2013

Intrusion Detection System (IDS) is the process of monitoring the events that occur in a system o... more Intrusion Detection System (IDS) is the process of monitoring the events that occur in a system or network and process them for possible intrusions where as Intrusion Prevention System (IPS) has the capability to attempt to stop such possible intrusions. Combining the two systems will result in IDPS which not only detects the attacks but also prevent such attacks to occur in the networks. Distributed Denial of Service (DDOS) attacks are the major concern for security in the collaborative networks. Although non DDOS attacks are also make the network performances poor, the effect of DDOS attacks is severe. In DDOS attacks, flooding of the particular node as victim and jam it with massive traffic happens and the complete network performance is affected. In this paper, a novel Intrusion Detection and Prevention System is designed which detects the flooding DDOS attacks based on Firecol and prevents the attacks based on Dynamic Growing Self Organizing Tree (DGSOT) for collaborative networks. Simulation results show that DGSOT with Firecol (DGSOTFC) produces better intrusion detection and prevention system. Performance metrics based on the parameters delay and energy conservation are better in DGSOT-FC than the traditional IDPS systems.

Research paper thumbnail of Efficient encoding of XML document for secure dissemination

2013 Fifth International Conference on Advanced Computing (ICoAC), 2013

The paper proposes an approach for efficient content dissemination to assure content integrity an... more The paper proposes an approach for efficient content dissemination to assure content integrity and confidentiality by exploiting the structural properties of an Extensible Markup Language (XML) document object model (DOM). Our approach proposes Enhanced Dewey Code (EDC), an encoding scheme for XML document and is based on the notion of enhanced level order numbers that supports the integrity and confidentiality requirements of an XML document and also facilitates efficient identification and distribution of selected content from an XML document. By using such notion, we develop a policy-based routing scheme for XML content dissemination which assures that the content is delivered to users according to the access control policies by preventing information leaks. Our XML content dissemination approach represents an efficient and secure mechanism for XML Documents to use in applications such as publish-subscribe systems. Our content dissemination approach provides different levels of confidentiality and integrity requirements in trusted and untrusted networks, which is common across enterprise networks and the web.

Research paper thumbnail of The Combined Approach for Anomaly Detection Using Neural Networks and Clustering Techniques

Computer Science & Engineering: An International Journal, 2012

Nowadays detection of new threats has become a necessity for secured communication to provide abs... more Nowadays detection of new threats has become a necessity for secured communication to provide absolute data confidentiality, integrity and availability. Design and development of such an intrusion detection system in the communication world, should not only be new, accurate and fast but also effective in an environment encompassing the surrounding network. In this paper, a new approach is proposed for network anomaly detection by combining neural network and clustering algorithms. We propose modified Self Organizing Map algorithms which initially starts with null network and grows with the original data space as initial weight vector, updating neighbourhood rules and learning rate dynamically in order to overcome the fixed architecture and random weight vector assignment of simple SOM. New nodes are created using distance threshold parameter and their neighbourhood is identified using connection strength and its learning rule and the weight vector updation is carried out for neighbourhood nodes. The k-means clustering algorithm is employed for grouping similar nodes of Modified SOM into k clusters using similarity measures. Performance of the new approach is evaluated with standard bench mark dataset. The new approach is evaluated using performance metrics such as detection rate and false alarm rate. The result is compared with other individual neural network methods, which shows considerable increase in the detection rate and 2% false alarm rate.

Research paper thumbnail of Chinese remainder Theorem based centralised group key management for secure multicast communication

IET Information Security, 2014

Designing a centralised group key management with minimal computation complexity to support dynam... more Designing a centralised group key management with minimal computation complexity to support dynamic secure multicast communication is a challenging issue in secure multimedia multicast. In this study, the authors propose a Chinese remainder theorem-based group key management scheme that drastically reduces computation complexity of the key server. The computation complexity of key server is reduced to O (1) in this proposed algorithm. Moreover, the computation complexity of group member is also minimised by performing one modulo division operation when a user join or leave operation is performed in a multicast group. The proposed algorithm has been implemented and tested using a key-star-based key management scheme and has been observed that this proposed algorithm reduces the computation complexity significantly.

Research paper thumbnail of Computers and Mathematics with Applications

Computers & Geosciences, 1976

Designing a key distribution protocol with minimal computation and storage complexity is a challe... more Designing a key distribution protocol with minimal computation and storage complexity is a challenging issue in secure multimedia multicast. In most of the multimedia multicast applications, the group membership requires secured dynamic key generation and updation operations that usually consume much of the computation time. In this paper, we propose a new GCD (Greatest Common Divisor) based Key Distribution Protocol which focuses on two dimensions. The first dimension deals with the reduction of computation complexity which is achieved in our protocol by performing fewer multiplication operations during the key updation process. To optimize the number of multiplication operations, the existing Karatsuba divide and conquer approach for multiplication is used in this proposed work. The second dimension aims at reducing the amount of information stored in the Group Center and group members while performing the update operation in the key content. The proposed algorithm which focuses on these two dimensions has been implemented and tested using a Cluster tree based key management scheme and has been found to produce promising results. Comparative analysis to illustrate the performance of various key distribution protocols is shown in this paper and it has been observed that this proposed algorithm reduces the computation and storage complexity significantly.

Research paper thumbnail of Efficient Encoding of XML Document for Secure Dissemination

IEEE, 2013

The paper proposes an approach for efficient content dissemination to assure content integrity an... more The paper proposes an approach for efficient
content dissemination to assure content integrity and
confidentiality by exploiting the structural properties of an
Extensible Markup Language (XML) document object model
(DOM). Our approach proposes Enhanced Dewey Code (EDC),
an encoding scheme for XML document and is based on the
notion of enhanced level order numbers that supports the
integrity and confidentiality requirements of an XML document
and also facilitates efficient identification and distribution of
selected content from an XML document. By using such notion,
we develop a policy-based routing scheme for XML content
dissemination which assures that the content is delivered to users
according to the access control policies by preventing information
leaks. Our XML content dissemination approach represents an
efficient and secure mechanism for XML Documents to use in
applications such as publish-subscribe systems. Our content
dissemination approach provides different levels of confidentiality
and integrity requirements in trusted and untrusted networks,
which is common across enterprise networks and the web.

Research paper thumbnail of Elaborative Survey on Storage Technologies for XML Big Data: A Real-time Approach

IEEE, 2016

Recent tremendous increase in the use of huge amount of XML data over the web leads to the develo... more Recent tremendous increase in the use of huge amount of XML data over the web leads to the development of new technologies. The special characteristic of XML is its flexible structure that makes XML as the widely used data format. Big data generally refers large amount of data of any type. As the size of the XML data is increased, XML big data takes the advantage of considering both XML and big data. Hence, innovative technologies are essential to handle XML big data. Therefore, it is necessary for the technologies to emphasize more on storage and management of XML big data. We elucidate the fundamental features of XML and big data. An important aspect of this survey is about the considerations of storage technologies for XML big data in real-time applications. This paper provides a review on latest technologies that can store, process and manage XML big data efficiently. In particular, the paper outlines the efficient storage technologies that can be applied to support XML big data. On the whole, based on the current technologies and literature review, our paper enumerates XML big data storage technologies that are available for real-world applications.

Research paper thumbnail of Probabilistic Approach for Intrusion Detection System - FOMe Technique

IEEE, 2014

Detection of unexpected and emerging new threats has become a necessity for secured internet comm... more Detection of unexpected and emerging new threats
has become a necessity for secured internet communication with
absolute data confidentiality, integrity, and availability. Design
and development of such a detection system shall not only be new,
accurate and fast but also effective in a dynamic environment
encompassing the surrounding network. In this work, an attempt
is made to design an intrusion detection model based on the
probabilistic approach, first-order Markov chain process, to
effectively detection and predict network intrusions. As a first
step, the states are defined using clustering techniques for the
network traffic profiles; secondly state transition probability
matrix and initial probability distribution are determined based
on the states defined. Based on the network states, the probability
of event occurrence is stochastically measured if the value is lesser
than the predefined probability then it event is predicted as
anomaly. The proposed probabilistic model performance is
evaluated through experiments using KDD Cup99 dataset. The
proposed models achieve better detection rate while the attacks
are detected in levels of stages.

Research paper thumbnail of Dynamic PHAD / AHAD Analysis for Network Intrusion Detection and Prevention System for Cloud Environment

IEEE, 2021

Nowadays, cloud computing plays an important role in organizations that offer a lot of resources ... more Nowadays, cloud computing plays an important role in organizations that offer a lot of resources and computing facilities on the internet. Due to its desirable features, a huge number of users are engaged in using cloud systems. As a result, traffic information is attacked both internally and externally in cloud systems. Hence, it is important to formulate an appropriate Intrusion Detection System with high accuracy. Earlier, normal and malicious attacks were detected during traffic information by IDS-based misuse-detection and anomaly detection using heuristic methods, respectively. This paper proposes hybrid IDS with a soft computing method that serves two folds: First, the hybrid IDS method is obtained by combining packet header anomaly detection (PHAD) and application header anomaly detector (AHAD) which are used to analyze anomaly-based IDSs. Second, the work presents an IDS alarm classifier based on the Fuzzy C-Means clustering algorithm to cluster traffic flow patterns. The proposed combined techniques of Gravity search algorithm and Gravity wolf optimization with deep neural network (GSGW-DNN) automatically classify normal or malicious attacks. The experimental result for the overall proposed system performance are evaluated with high accuracy, precision, recall, and F-measure and compared with existing ANN and SVM algorithms. The evaluation results prove that the proposed approach is suitable for effective attack detection and prevention.