Padmavathi Ganapathi | Avinashilingam University For Women (original) (raw)

Uploads

IJCSIS Volumes by Padmavathi Ganapathi

Research paper thumbnail of Journal of Computer Science and Information Security September 2009

The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to p... more The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to publish top-level research material in all fields of computer science and related issues like mobile and wireless network, multimedia communication and systems, network security etc. With an openaccess
policy, IJCSIS is an established journal now and will continue to grow as a venue for state-of-art knowledge dissemination. The journal has proven to be on the cutting edge of latest research findings with its growing popularity.

https://sites.google.com/site/ijcsis/Home

Papers by Padmavathi Ganapathi

Research paper thumbnail of Performance Evaluation of Parallel and Series Communication Network with Dynamic Bandwidth Allocation

Networking and Communication Engineering, 2009

In this paper a parallel and series communication network model with dynamic bandwidth allocation... more In this paper a parallel and series communication network model with dynamic bandwidth allocation is developed and analyzed. In order to reduce congestion in buffer and to improve voice quality several congestion control methods like bit dropping,selective packet discarding, flow control etc., are developed and successfully implemented. to have an efficient utilization we propose dynamic allocation of bandwidth i.e. the transmission rate of the data/voice packet dependent on the content of the buffer just before it get transmitted. The end to-end performance of the model is measured by approximating the arrival and service processes of the packets follow poisson process. The transient analysis of the communication network shows that dynamic allocation has a significant effect in reducing mean delays and improving throughput of the transmitter. Graphs illustrate performance of the network model for different parameters.

Research paper thumbnail of A Survey on Scheduling Algorithms in Cloud Computing

IOSR Journal of Computer Engineering, 2014

Research paper thumbnail of Self-healing AIS with Entropy Based SVM and Bayesian Aggregate Model for the Prediction and Isolation of Malicious Nodes Triggering DoS Attacks in VANET

International Journal of Computer Network and Information Security (IJCNIS), Jun 8, 2023

Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traf... more Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traffic monitoring and vehicular safety. Security risks are the main problems in VANET. To handle the security threats and to increase the performance of VANETs, this paper proposes an enhanced trust based aggregate model. In the proposed system, a novel adaptive nodal attack detection approach - entropy-based SVM with linear regression addresses the trust factor with kernel density estimation generating the trustiness value thereby classifying the malicious nodes against the trusted nodes in VANETs. Defending the VANETs is through a novel reliance node estimation approach - Bayesian self-healing AIS with Pearson correlation coefficient aggregate model isolating the malicious node thereby the RSU cluster communication getting secure. Furthermore, even a reliable node may be exploited to deliver harmful messages and requires the authority of both the data and the source node to be carried out by the onboard units of the vehicles getting the reports of incident. DoS attacks (Denial of Service) disrupting the usual functioning of the network leads to inaccessible network to its intended users thereby endangering human lives. The proposed system is explicitly defending the VANET against DoS attacks as it predicts the attack without compromising the performance of the VANET handling nodes with various features and functions based on evaluating the maliciousness of attacking nodes accurately and isolating the intrusion. Furthermore, the performance evaluations prove the effectiveness of the proposed work with increased detection rate by 97%, reduced energy consumption by 39% and reduced latency by 25% compared to the existing studies.

Research paper thumbnail of A survey on resource allocation strategies in cloud computing

International Conference on Information Communication and Embedded Systems (ICICES2014), 2014

Research paper thumbnail of An efficient adaptive fusion scheme for cooperative spectrum sensing in cognitive radios over fading channels

International Conference on Information Communication and Embedded Systems (ICICES2014), 2014

Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of ... more Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of the radio spectrum by opportunistically using the unused frequency bands. Spectrum sensing is the key function of cognitive radio technology. However, detection is compromised when a user experiences shadowing or fading effects. In such cases, user cannot distinguish between an unused band and a deep fade. Thus, cooperative spectrum sensing is proposed in the literature, to improve the sensing performance. In cooperative sensing, decision fusion technique greatly influences the overall sensing performance. We have studied the performance of cooperative spectrum sensing over Rayleigh fading channel with Adaptive Linear Combiner decision fusion algorithm. The weights which correspond to confidence levels of the secondary users are determined adaptively using the Normalized Least Mean Square(NLMS) algorithm to improve the sensing performance.

Research paper thumbnail of Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach

International Journal of Communication Networks and Information Security (IJCNIS)

In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model ... more In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model is integrated to detect the attack in traffic pattern. In misuse detection model, the traffic pattern is classified into known attack and not known attack. Each extracted normal data set does not have known attack and it contains small amount of varied connection patterns than overall normal data set. Anomaly detection model classifies the not known attack as normal data set and unknown attack thus improving the performance of normal traffic behavior. Experiment is carried out using NSL –KDD dataset and performance of proposed approach is compared with traditional learning approaches in terms of training time, testing time, false positive ratio and detection ratio. The proposed method detects the known attacks and unknown attacks with ratio of 99.8 % and 52% respectively.

Research paper thumbnail of Performance of Various Order Statistics Filters in Impulse and Mixed Noise Removal for RS Images

Signal & Image Processing : An International Journal, 2010

Research paper thumbnail of suitable segmentation methodology based on pixel similarities for landmine detection in IR images

International Journal of Advanced Computer Science and Applications, 2010

Research paper thumbnail of Cluster Based Multicast Tree for Secure Multicast Key Distribution in Mobile Adhoc Networks

IJCSNS, 2009

Summary Secure multicast communication in mobile adhoc networks is challenging due to its inheren... more Summary Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence ...

Research paper thumbnail of Performance Analysis of Unsupervised Machine Learning Methods for Mobile Malware Detection

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)

Research paper thumbnail of Detection of Malicious Insider in Cloud Environment based on behavior Analysis

Progressions Made in Cyber-Security World

Research paper thumbnail of Investigation of Deep Learning Optimizers for False Window Size Injection Attack Detection in Unmanned Aerial Vehicle Network Architecture

ICTACT Journal on Communication Technology, Sep 30, 2021

Research paper thumbnail of A Survey of Computational Intelligence Methods used in handling Man in the Middle Attacks in Machine to Machine Communications

International journal of engineering research and technology, 2019

Research paper thumbnail of HSAG-FC: Hybrid of Simulated Annealing with Genetic algorithm and Fuzzy Classification for IDS

Nowadays signature attacks are termed as very big problem because it leads to software vulnerabil... more Nowadays signature attacks are termed as very big problem because it leads to software vulnerability.Malware writers confuse their malicious code to malicious code detectors such as Signature-based detection. However,it fails to detect new malware. This research article addresses the signature based intrusion detection from IntrusionDetection (IDS) systems. The proposed hybrid techniques for Generation of Signature are done using GeneticAlgorithm (GA) and Simulated Annealing (SA) approaches. For this, signature-set in execution statements are selected by using simulated annealing and genetic algorithm, which produce the optimal solution of selection. Then thegenerated signatures are matched with IDS by using the two pattern matching techniques, namely (i). Finite stateautomaton based search for Single Pattern matching technique and (ii) Rabin Karp string search algorithm for multiple pattern matching technique. These techniques are used to match the signature as in an effective mann...

Research paper thumbnail of Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique

International Journal of Security and Its Applications, 2016

Research paper thumbnail of Malicious Traffic Detection and Containment based on Connection Attempt Failures using Kernelized ELM with Automated Worm Containment Algorithm

Indian Journal of Science and Technology, 2016

Research paper thumbnail of Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks

Journal of Computer Networks and Communications, 2016

Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...

Research paper thumbnail of Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks

Journal of Computer Networks and Communications, 2016

Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...

Research paper thumbnail of Evaluation of Principal Component Analysis Variants to Assess Their Suitability for Mobile Malware Detection

Advances in Principal Component Analysis [Working Title]

Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vit... more Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vital role in reducing the dimensions of the data in building an appropriate machine learning model. It is a statistical process that transforms the data containing correlated features into a set of uncorrelated features with the help of orthogonal transformations. Unsupervised machine learning is a concept of self-learning method that involves unlabelled data to identify hidden patterns. PCA converts the data features from a high dimensional space into a low dimensional space. PCA also acts as a feature extraction method since it transforms the ‘n’ number of features into ‘m’ number of principal components (PCs; m < n). Mobile Malware is increasing tremendously in the digital era due to the growth of android mobile users and android applications. Some of the mobile malware are viruses, Trojan horses, worms, adware, spyware, ransomware, riskware, banking malware, SMS malware, keylogger, ...

Research paper thumbnail of Journal of Computer Science and Information Security September 2009

The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to p... more The editorial policy of the Journal of Computer Science and Information Security (IJCSIS) is to publish top-level research material in all fields of computer science and related issues like mobile and wireless network, multimedia communication and systems, network security etc. With an openaccess
policy, IJCSIS is an established journal now and will continue to grow as a venue for state-of-art knowledge dissemination. The journal has proven to be on the cutting edge of latest research findings with its growing popularity.

https://sites.google.com/site/ijcsis/Home

Research paper thumbnail of Performance Evaluation of Parallel and Series Communication Network with Dynamic Bandwidth Allocation

Networking and Communication Engineering, 2009

In this paper a parallel and series communication network model with dynamic bandwidth allocation... more In this paper a parallel and series communication network model with dynamic bandwidth allocation is developed and analyzed. In order to reduce congestion in buffer and to improve voice quality several congestion control methods like bit dropping,selective packet discarding, flow control etc., are developed and successfully implemented. to have an efficient utilization we propose dynamic allocation of bandwidth i.e. the transmission rate of the data/voice packet dependent on the content of the buffer just before it get transmitted. The end to-end performance of the model is measured by approximating the arrival and service processes of the packets follow poisson process. The transient analysis of the communication network shows that dynamic allocation has a significant effect in reducing mean delays and improving throughput of the transmitter. Graphs illustrate performance of the network model for different parameters.

Research paper thumbnail of A Survey on Scheduling Algorithms in Cloud Computing

IOSR Journal of Computer Engineering, 2014

Research paper thumbnail of Self-healing AIS with Entropy Based SVM and Bayesian Aggregate Model for the Prediction and Isolation of Malicious Nodes Triggering DoS Attacks in VANET

International Journal of Computer Network and Information Security (IJCNIS), Jun 8, 2023

Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traf... more Vehicle ad hoc networks, or VANETs, are highly mobile wireless networks created to help with traffic monitoring and vehicular safety. Security risks are the main problems in VANET. To handle the security threats and to increase the performance of VANETs, this paper proposes an enhanced trust based aggregate model. In the proposed system, a novel adaptive nodal attack detection approach - entropy-based SVM with linear regression addresses the trust factor with kernel density estimation generating the trustiness value thereby classifying the malicious nodes against the trusted nodes in VANETs. Defending the VANETs is through a novel reliance node estimation approach - Bayesian self-healing AIS with Pearson correlation coefficient aggregate model isolating the malicious node thereby the RSU cluster communication getting secure. Furthermore, even a reliable node may be exploited to deliver harmful messages and requires the authority of both the data and the source node to be carried out by the onboard units of the vehicles getting the reports of incident. DoS attacks (Denial of Service) disrupting the usual functioning of the network leads to inaccessible network to its intended users thereby endangering human lives. The proposed system is explicitly defending the VANET against DoS attacks as it predicts the attack without compromising the performance of the VANET handling nodes with various features and functions based on evaluating the maliciousness of attacking nodes accurately and isolating the intrusion. Furthermore, the performance evaluations prove the effectiveness of the proposed work with increased detection rate by 97%, reduced energy consumption by 39% and reduced latency by 25% compared to the existing studies.

Research paper thumbnail of A survey on resource allocation strategies in cloud computing

International Conference on Information Communication and Embedded Systems (ICICES2014), 2014

Research paper thumbnail of An efficient adaptive fusion scheme for cooperative spectrum sensing in cognitive radios over fading channels

International Conference on Information Communication and Embedded Systems (ICICES2014), 2014

Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of ... more Cognitive Radio is a novel technology that can potentially improve the utilization efficiency of the radio spectrum by opportunistically using the unused frequency bands. Spectrum sensing is the key function of cognitive radio technology. However, detection is compromised when a user experiences shadowing or fading effects. In such cases, user cannot distinguish between an unused band and a deep fade. Thus, cooperative spectrum sensing is proposed in the literature, to improve the sensing performance. In cooperative sensing, decision fusion technique greatly influences the overall sensing performance. We have studied the performance of cooperative spectrum sensing over Rayleigh fading channel with Adaptive Linear Combiner decision fusion algorithm. The weights which correspond to confidence levels of the secondary users are determined adaptively using the Normalized Least Mean Square(NLMS) algorithm to improve the sensing performance.

Research paper thumbnail of Detection of illegal traffic pattern using Hybrid Improved CART and Multiple Extreme Learning Machine Approach

International Journal of Communication Networks and Information Security (IJCNIS)

In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model ... more In the proposed hybrid intrusion detection process, misuse detection and anomaly detection model is integrated to detect the attack in traffic pattern. In misuse detection model, the traffic pattern is classified into known attack and not known attack. Each extracted normal data set does not have known attack and it contains small amount of varied connection patterns than overall normal data set. Anomaly detection model classifies the not known attack as normal data set and unknown attack thus improving the performance of normal traffic behavior. Experiment is carried out using NSL –KDD dataset and performance of proposed approach is compared with traditional learning approaches in terms of training time, testing time, false positive ratio and detection ratio. The proposed method detects the known attacks and unknown attacks with ratio of 99.8 % and 52% respectively.

Research paper thumbnail of Performance of Various Order Statistics Filters in Impulse and Mixed Noise Removal for RS Images

Signal & Image Processing : An International Journal, 2010

Research paper thumbnail of suitable segmentation methodology based on pixel similarities for landmine detection in IR images

International Journal of Advanced Computer Science and Applications, 2010

Research paper thumbnail of Cluster Based Multicast Tree for Secure Multicast Key Distribution in Mobile Adhoc Networks

IJCSNS, 2009

Summary Secure multicast communication in mobile adhoc networks is challenging due to its inheren... more Summary Secure multicast communication in mobile adhoc networks is challenging due to its inherent characteristics of infrastructure-less architecture with lack of central authority, high packet loss rates and limited resources such as bandwidth, time and power. Hence ...

Research paper thumbnail of Performance Analysis of Unsupervised Machine Learning Methods for Mobile Malware Detection

2022 9th International Conference on Computing for Sustainable Global Development (INDIACom)

Research paper thumbnail of Detection of Malicious Insider in Cloud Environment based on behavior Analysis

Progressions Made in Cyber-Security World

Research paper thumbnail of Investigation of Deep Learning Optimizers for False Window Size Injection Attack Detection in Unmanned Aerial Vehicle Network Architecture

ICTACT Journal on Communication Technology, Sep 30, 2021

Research paper thumbnail of A Survey of Computational Intelligence Methods used in handling Man in the Middle Attacks in Machine to Machine Communications

International journal of engineering research and technology, 2019

Research paper thumbnail of HSAG-FC: Hybrid of Simulated Annealing with Genetic algorithm and Fuzzy Classification for IDS

Nowadays signature attacks are termed as very big problem because it leads to software vulnerabil... more Nowadays signature attacks are termed as very big problem because it leads to software vulnerability.Malware writers confuse their malicious code to malicious code detectors such as Signature-based detection. However,it fails to detect new malware. This research article addresses the signature based intrusion detection from IntrusionDetection (IDS) systems. The proposed hybrid techniques for Generation of Signature are done using GeneticAlgorithm (GA) and Simulated Annealing (SA) approaches. For this, signature-set in execution statements are selected by using simulated annealing and genetic algorithm, which produce the optimal solution of selection. Then thegenerated signatures are matched with IDS by using the two pattern matching techniques, namely (i). Finite stateautomaton based search for Single Pattern matching technique and (ii) Rabin Karp string search algorithm for multiple pattern matching technique. These techniques are used to match the signature as in an effective mann...

Research paper thumbnail of Detecting Sinkhole Attack in Wireless Sensor Network using Enhanced Particle Swarm Optimization Technique

International Journal of Security and Its Applications, 2016

Research paper thumbnail of Malicious Traffic Detection and Containment based on Connection Attempt Failures using Kernelized ELM with Automated Worm Containment Algorithm

Indian Journal of Science and Technology, 2016

Research paper thumbnail of Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks

Journal of Computer Networks and Communications, 2016

Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...

Research paper thumbnail of Replica Node Detection Using Enhanced Single Hop Detection with Clonal Selection Algorithm in Mobile Wireless Sensor Networks

Journal of Computer Networks and Communications, 2016

Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed... more Security of Mobile Wireless Sensor Networks is a vital challenge as the sensor nodes are deployed in unattended environment and they are prone to various attacks. One among them is the node replication attack. In this, the physically insecure nodes are acquired by the adversary to clone them by having the same identity of the captured node, and the adversary deploys an unpredictable number of replicas throughout the network. Hence replica node detection is an important challenge in Mobile Wireless Sensor Networks. Various replica node detection techniques have been proposed to detect these replica nodes. These methods incur control overheads and the detection accuracy is low when the replica is selected as a witness node. This paper proposes to solve these issues by enhancing the Single Hop Detection (SHD) method using the Clonal Selection algorithm to detect the clones by selecting the appropriate witness nodes. The advantages of the proposed method include (i) increase in the dete...

Research paper thumbnail of Evaluation of Principal Component Analysis Variants to Assess Their Suitability for Mobile Malware Detection

Advances in Principal Component Analysis [Working Title]

Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vit... more Principal component analysis (PCA) is an unsupervised machine learning algorithm that plays a vital role in reducing the dimensions of the data in building an appropriate machine learning model. It is a statistical process that transforms the data containing correlated features into a set of uncorrelated features with the help of orthogonal transformations. Unsupervised machine learning is a concept of self-learning method that involves unlabelled data to identify hidden patterns. PCA converts the data features from a high dimensional space into a low dimensional space. PCA also acts as a feature extraction method since it transforms the ‘n’ number of features into ‘m’ number of principal components (PCs; m < n). Mobile Malware is increasing tremendously in the digital era due to the growth of android mobile users and android applications. Some of the mobile malware are viruses, Trojan horses, worms, adware, spyware, ransomware, riskware, banking malware, SMS malware, keylogger, ...

Research paper thumbnail of Optimization of Bit Plane Combination for Efficient Digital Image Watermarking