Padmavathi Ganapathi | Avinashilingam University For Women (original) (raw)
Uploads
IJCSIS Volumes by Padmavathi Ganapathi
The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to p... more The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to publish top-level research material in all fields of computer science and related issues like mobile and wireless network, multimedia communication and systems, network security etc. With an openaccess
policy, IJCSIS is an established journal now and will continue to grow as a venue for state-of-art knowledge dissemination. The journal has proven to be on the cutting edge of latest research findings with its growing popularity.
https://sites.google.com/site/ijcsis/Home
Papers by Padmavathi Ganapathi
Networking and Communication Engineering, 2009
In this paper a parallel and series communication network model with dynamic bandwidth allocation... more In this paper a parallel and series communication network model with dynamic bandwidth allocation is developed and analyzed. In order to reduce congestion in buffer and to improve voice quality several congestion control methods like bit dropping,selective packet discarding, flow control etc., are developed and successfully implemented. to have an efficient utilization we propose dynamic allocation of bandwidth i.e. the transmission rate of the data/voice packet dependent on the content of the buffer just before it get transmitted. The end to-end performance of the model is measured by approximating the arrival and service processes of the packets follow poisson process. The transient analysis of the communication network shows that dynamic allocation has a significant effect in reducing mean delays and improving throughput of the transmitter. Graphs illustrate performance of the network model for different parameters.
IOSR Journal of Computer Engineering, 2014
International Journal of Computer Network and Information Security (IJCNIS), Jun 8, 2023
Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traf... more Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traffic monitoring and vehicular safety. Security risks are the main problems in VANET. To handle the security threats and to increase the performance of VANETs, this paper proposes an enhanced trust based aggregate model. In the proposed system, a novel adaptive nodal attack detection approach - entropy-based SVM with linear regression addresses the trust factor with kernel density estimation generating the trustiness value thereby classifying the malicious nodes against the trusted nodes in VANETs. Defending the VANETs is through a novel reliance node estimation approach - Bayesian self-healing AIS with Pearson correlation coefficient aggregate model isolating the malicious node thereby the RSU cluster communication getting secure. Furthermore, even a reliable node may be exploited to deliver harmful messages and requires the authority of both the data and the source node to be carried out by the onboard units of the vehicles getting the reports of incident. DoS attacks (Denial of Service) disrupting the usual functioning of the network leads to inaccessible network to its intended users thereby endangering human lives. The proposed system is explicitly defending the VANET against DoS attacks as it predicts the attack without compromising the performance of the VANET handling nodes with various features and functions based on evaluating the maliciousness of attacking nodes accurately and isolating the intrusion. Furthermore, the performance evaluations prove the effectiveness of the proposed work with increased detection rate by 97%, reduced energy consumption by 39% and reduced latency by 25% compared to the existing studies.
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014
Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of ... more Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of the radio spectrum by opportunistically using the unused frequency bands. Spectrum sensing is the key function of cognitive radio technology. However, detection is compromised when a user experiences shadowing or fading effects. In such cases, user cannot distinguish between an unused band and a deep fade. Thus, cooperative spectrum sensing is proposed in the literature, to improve the sensing performance. In cooperative sensing, decision fusion technique greatly influences the overall sensing performance. We have studied the performance of cooperative spectrum sensing over Rayleigh fading channel with Adaptive Linear Combiner decision fusion algorithm. The weights which correspond to confidence levels of the secondary users are determined adaptively using the Normalized Least Mean Square(NLMS) algorithm to improve the sensing performance.
International Journal of Communication Networks and Information Security (IJCNIS)
In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model ... more In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model is integrated to detect the attack in traffic pattern. In misuse detection model, the traffic pattern is classified into known attack and not known attack. Each extracted normal data set does not have known attack and it contains small amount of varied connection patterns than overall normal data set. Anomaly detection model classifies the not known attack as normal data set and unknown attack thus improving the performance of normal traffic behavior. Experiment is carried out using NSL –KDD dataset and performance of proposed approach is compared with traditional learning approaches in terms of training time, testing time, false positive ratio and detection ratio. The proposed method detects the known attacks and unknown attacks with ratio of 99.8 % and 52% respectively.
Signal & Image Processing : An International Journal, 2010
International Journal of Advanced Computer Science and Applications, 2010
IJCSNS, 2009
Summary Secure multicast communication in mobile adhoc networks is challenging due to its inheren... more Summary Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence ...
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)
Progressions Made in Cyber-Security World
ICTACT Journal on Communication Technology, Sep 30, 2021
International journal of engineering research and technology, 2019
Nowadays signature attacks are termed as very big problem because it leads to software vulnerabil... more Nowadays signature attacks are termed as very big problem because it leads to software vulnerability.Malware writers confuse their malicious code to malicious code detectors such as Signature-based detection. However,it fails to detect new malware. This research article addresses the signature based intrusion detection from IntrusionDetection (IDS) systems. The proposed hybrid techniques for Generation of Signature are done using GeneticAlgorithm (GA) and Simulated Annealing (SA) approaches. For this, signature-set in execution statements are selected by using simulated annealing and genetic algorithm, which produce the optimal solution of selection. Then thegenerated signatures are matched with IDS by using the two pattern matching techniques, namely (i). Finite stateautomaton based search for Single Pattern matching technique and (ii) Rabin Karp string search algorithm for multiple pattern matching technique. These techniques are used to match the signature as in an effective mann...
International Journal of Security and Its Applications, 2016
Indian Journal of Science and Technology, 2016
Journal of Computer Networks and Communications, 2016
Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...
Journal of Computer Networks and Communications, 2016
Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...
Advances in Principal Component Analysis [Working Title]
Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vit... more Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vital role in reducing the dimensions of the data in building an appropriate machine learning model. It is a statistical process that transforms the data containing correlated features into a set of uncorrelated features with the help of orthogonal transformations. Unsupervised machine learning is a concept of self-learning method that involves unlabelled data to identify hidden patterns. PCA converts the data features from a high dimensional space into a low dimensional space. PCA also acts as a feature extraction method since it transforms the ‘n’ number of features into ‘m’ number of principal components (PCs; m < n). Mobile Malware is increasing tremendously in the digital era due to the growth of android mobile users and android applications. Some of the mobile malware are viruses, Trojan horses, worms, adware, spyware, ransomware, riskware, banking malware, SMS malware, keylogger, ...
The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to p... more The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to publish top-level research material in all fields of computer science and related issues like mobile and wireless network, multimedia communication and systems, network security etc. With an openaccess
policy, IJCSIS is an established journal now and will continue to grow as a venue for state-of-art knowledge dissemination. The journal has proven to be on the cutting edge of latest research findings with its growing popularity.
https://sites.google.com/site/ijcsis/Home
Networking and Communication Engineering, 2009
In this paper a parallel and series communication network model with dynamic bandwidth allocation... more In this paper a parallel and series communication network model with dynamic bandwidth allocation is developed and analyzed. In order to reduce congestion in buffer and to improve voice quality several congestion control methods like bit dropping,selective packet discarding, flow control etc., are developed and successfully implemented. to have an efficient utilization we propose dynamic allocation of bandwidth i.e. the transmission rate of the data/voice packet dependent on the content of the buffer just before it get transmitted. The end to-end performance of the model is measured by approximating the arrival and service processes of the packets follow poisson process. The transient analysis of the communication network shows that dynamic allocation has a significant effect in reducing mean delays and improving throughput of the transmitter. Graphs illustrate performance of the network model for different parameters.
IOSR Journal of Computer Engineering, 2014
International Journal of Computer Network and Information Security (IJCNIS), Jun 8, 2023
Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traf... more Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traffic monitoring and vehicular safety. Security risks are the main problems in VANET. To handle the security threats and to increase the performance of VANETs, this paper proposes an enhanced trust based aggregate model. In the proposed system, a novel adaptive nodal attack detection approach - entropy-based SVM with linear regression addresses the trust factor with kernel density estimation generating the trustiness value thereby classifying the malicious nodes against the trusted nodes in VANETs. Defending the VANETs is through a novel reliance node estimation approach - Bayesian self-healing AIS with Pearson correlation coefficient aggregate model isolating the malicious node thereby the RSU cluster communication getting secure. Furthermore, even a reliable node may be exploited to deliver harmful messages and requires the authority of both the data and the source node to be carried out by the onboard units of the vehicles getting the reports of incident. DoS attacks (Denial of Service) disrupting the usual functioning of the network leads to inaccessible network to its intended users thereby endangering human lives. The proposed system is explicitly defending the VANET against DoS attacks as it predicts the attack without compromising the performance of the VANET handling nodes with various features and functions based on evaluating the maliciousness of attacking nodes accurately and isolating the intrusion. Furthermore, the performance evaluations prove the effectiveness of the proposed work with increased detection rate by 97%, reduced energy consumption by 39% and reduced latency by 25% compared to the existing studies.
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014
International Conference on Information Communication and Embedded Systems (ICICES2014), 2014
Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of ... more Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of the radio spectrum by opportunistically using the unused frequency bands. Spectrum sensing is the key function of cognitive radio technology. However, detection is compromised when a user experiences shadowing or fading effects. In such cases, user cannot distinguish between an unused band and a deep fade. Thus, cooperative spectrum sensing is proposed in the literature, to improve the sensing performance. In cooperative sensing, decision fusion technique greatly influences the overall sensing performance. We have studied the performance of cooperative spectrum sensing over Rayleigh fading channel with Adaptive Linear Combiner decision fusion algorithm. The weights which correspond to confidence levels of the secondary users are determined adaptively using the Normalized Least Mean Square(NLMS) algorithm to improve the sensing performance.
International Journal of Communication Networks and Information Security (IJCNIS)
In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model ... more In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model is integrated to detect the attack in traffic pattern. In misuse detection model, the traffic pattern is classified into known attack and not known attack. Each extracted normal data set does not have known attack and it contains small amount of varied connection patterns than overall normal data set. Anomaly detection model classifies the not known attack as normal data set and unknown attack thus improving the performance of normal traffic behavior. Experiment is carried out using NSL –KDD dataset and performance of proposed approach is compared with traditional learning approaches in terms of training time, testing time, false positive ratio and detection ratio. The proposed method detects the known attacks and unknown attacks with ratio of 99.8 % and 52% respectively.
Signal & Image Processing : An International Journal, 2010
International Journal of Advanced Computer Science and Applications, 2010
IJCSNS, 2009
Summary Secure multicast communication in mobile adhoc networks is challenging due to its inheren... more Summary Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence ...
2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)
Progressions Made in Cyber-Security World
ICTACT Journal on Communication Technology, Sep 30, 2021
International journal of engineering research and technology, 2019
Nowadays signature attacks are termed as very big problem because it leads to software vulnerabil... more Nowadays signature attacks are termed as very big problem because it leads to software vulnerability.Malware writers confuse their malicious code to malicious code detectors such as Signature-based detection. However,it fails to detect new malware. This research article addresses the signature based intrusion detection from IntrusionDetection (IDS) systems. The proposed hybrid techniques for Generation of Signature are done using GeneticAlgorithm (GA) and Simulated Annealing (SA) approaches. For this, signature-set in execution statements are selected by using simulated annealing and genetic algorithm, which produce the optimal solution of selection. Then thegenerated signatures are matched with IDS by using the two pattern matching techniques, namely (i). Finite stateautomaton based search for Single Pattern matching technique and (ii) Rabin Karp string search algorithm for multiple pattern matching technique. These techniques are used to match the signature as in an effective mann...
International Journal of Security and Its Applications, 2016
Indian Journal of Science and Technology, 2016
Journal of Computer Networks and Communications, 2016
Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...
Journal of Computer Networks and Communications, 2016
Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...
Advances in Principal Component Analysis [Working Title]
Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vit... more Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vital role in reducing the dimensions of the data in building an appropriate machine learning model. It is a statistical process that transforms the data containing correlated features into a set of uncorrelated features with the help of orthogonal transformations. Unsupervised machine learning is a concept of self-learning method that involves unlabelled data to identify hidden patterns. PCA converts the data features from a high dimensional space into a low dimensional space. PCA also acts as a feature extraction method since it transforms the ‘n’ number of features into ‘m’ number of principal components (PCs; m < n). Mobile Malware is increasing tremendously in the digital era due to the growth of android mobile users and android applications. Some of the mobile malware are viruses, Trojan horses, worms, adware, spyware, ransomware, riskware, banking malware, SMS malware, keylogger, ...