Dr. Anjan Krishnamurthy - Academia.edu (original) (raw)
Uploads
Papers by Dr. Anjan Krishnamurthy
Communications in Computer and Information Science, 2010
International Journal of Electrical and Computer Engineering (IJECE)
A covert timing channel is based on modulation of the timing information in the network packets i... more A covert timing channel is based on modulation of the timing information in the network packets in a secured communication. The delicacy of this channel is primarily viewed as single coherent channel thwart the detection from any third-party entity or network admin. The timing covert channel is strenuous to detect under many scenarios due to the intricate complexity of the channel. The exploration of timing covert channel shed light on intrinsic design aspects which elevate understanding to an advanced level. This will effectively bring out elite literature aspects of the timing covert channel for seamless implementation. Supraliminal channels are innocuous message-based channel introduced as a trapdoor in the communication system either intentional or as vulnerability of the system. A hybrid covert channel is the existence of homogeneous or heterogeneous network covert channel variants either at same instant or at different instant of time. For instance, one of possible hybrid cove...
Second International Conference on Advances In Computing, Control And Networking - ACCN 2015, 2015
Covert channels is a vital setup in the analyzing the strength of security in a network. Covert C... more Covert channels is a vital setup in the analyzing the strength of security in a network. Covert Channel is illegitimate channeling over the secured channel and establishes a malicious conversation. The trapdoor set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert schemes that enable to build robust covert channel over the network. From an attacker's perspective this will ameliorate by placingmultiple such trapdoors in different protocols in the rudimentary protocol stack. This leads to a unique scenario of "Hybrid Covert Channel", where different covert channel trapdoors exist at the same instance of time in same layer of protocol stack. For detection agents to detect suchevent is complicated due to lack of knowledge over the different covert schemes. Exploring all the clandestine schemes used in formation of Hybrid Covert Channel would assist in understanding the complete search space of the covert possibilities and thereby improving the knowledgeof detection engine. This can be explored by different schemes available and their entropy impact on hybrid covert channel. The paper sets itself an objective to understand the different covert schemes and their usage in different trapdoors.
International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010
Computer network is unpredictable due to information warfare and is prone to various attacks. Suc... more Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitimate network communication that clearly violates security policies laid down. The non-transparency in covert channel is also referred to as trapdoor. A trapdoor is unintended design within legitimate communication whose motto is to leak information. Subliminal channel, a variant of covert channel works similarly except that the trapdoor is set in a cryptographic algorithm. A composition of covert channel with subliminal channel is the ``Hybrid Covert Channel''. Hybrid covert channel is homogenous or heterogeneous mixture of two or more variants of covert channels either active at same instance or at different instances of time. Detecting such malicious channel activity plays a vital role in removing threat to the legitimate network. In this paper, we present a study of multi-trapdoor covert channels and introduce design of a new detection engine for hybrid covert channel in transport layer visualized in TCP and SSL.
Recent Trends in Network Security and Applications, 2010
Covert Channels are malicious conversation in a legitimate secured network communication that vio... more Covert Channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, unintended design in the legitimate communication whose motto is to leak information. Trapdoors are ...
International Journal of Computer Science and Information Technology, 2013
Integer factorization is one of the vital algorithms discussed as a part of analysis of any black... more Integer factorization is one of the vital algorithms discussed as a part of analysis of any black-box cipher suites where the cipher algorithm is based on number theory. The origin of the problem is from Discrete Logarithmic Problem which appears under the analysis of the cryptographic algorithms as seen by a cryptanalyst. The integer factorization algorithm poses a potential in computational science too, obtaining the factors of a very large number is challenging with a limited computing infrastructure. This paper analyses the Pollard's Rho heuristic with a varying input size to evaluate the performance under a multicore environment and also to estimate the threshold for each computing infrastructure.
Advanced Computing: An International Journal, 2012
Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is... more Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is a crucial step in analysing structured data and in finding association relationship between items. This stands as an elementary foundation to supervised learning, which encompasses classifier and feature extraction methods. Applying this algorithm is crucial to understand the behaviour of structured data. Most of the structured data in scientific domain are voluminous. Processing such kind of data requires state of the art computing machines. Setting up such an infrastructure is expensive. Hence a distributed environment such as a clustered setup is employed for tackling such scenarios. Apache Hadoop distribution is one of the cluster frameworks in distributed environment that helps by distributing voluminous data across a number of nodes in the framework. This paper focuses on map/reduce design and implementation of Apriori algorithm for structured data analysis.
Communications in Computer and Information Science, 2010
International Journal of Electrical and Computer Engineering (IJECE)
A covert timing channel is based on modulation of the timing information in the network packets i... more A covert timing channel is based on modulation of the timing information in the network packets in a secured communication. The delicacy of this channel is primarily viewed as single coherent channel thwart the detection from any third-party entity or network admin. The timing covert channel is strenuous to detect under many scenarios due to the intricate complexity of the channel. The exploration of timing covert channel shed light on intrinsic design aspects which elevate understanding to an advanced level. This will effectively bring out elite literature aspects of the timing covert channel for seamless implementation. Supraliminal channels are innocuous message-based channel introduced as a trapdoor in the communication system either intentional or as vulnerability of the system. A hybrid covert channel is the existence of homogeneous or heterogeneous network covert channel variants either at same instant or at different instant of time. For instance, one of possible hybrid cove...
Second International Conference on Advances In Computing, Control And Networking - ACCN 2015, 2015
Covert channels is a vital setup in the analyzing the strength of security in a network. Covert C... more Covert channels is a vital setup in the analyzing the strength of security in a network. Covert Channel is illegitimate channeling over the secured channel and establishes a malicious conversation. The trapdoor set in such channels proliferates making covert channel sophisticated to detect their presence in network firewall. This is due to the intricate covert schemes that enable to build robust covert channel over the network. From an attacker's perspective this will ameliorate by placingmultiple such trapdoors in different protocols in the rudimentary protocol stack. This leads to a unique scenario of "Hybrid Covert Channel", where different covert channel trapdoors exist at the same instance of time in same layer of protocol stack. For detection agents to detect suchevent is complicated due to lack of knowledge over the different covert schemes. Exploring all the clandestine schemes used in formation of Hybrid Covert Channel would assist in understanding the complete search space of the covert possibilities and thereby improving the knowledgeof detection engine. This can be explored by different schemes available and their entropy impact on hybrid covert channel. The paper sets itself an objective to understand the different covert schemes and their usage in different trapdoors.
International Journal of Ad hoc, Sensor & Ubiquitous Computing, 2010
Computer network is unpredictable due to information warfare and is prone to various attacks. Suc... more Computer network is unpredictable due to information warfare and is prone to various attacks. Such attacks on network compromise the most important attribute, the privacy. Most of such attacks are devised using special communication channel called ``Covert Channel''. The word ``Covert'' stands for hidden or non-transparent. Network Covert Channel is a concealed communication path within legitimate network communication that clearly violates security policies laid down. The non-transparency in covert channel is also referred to as trapdoor. A trapdoor is unintended design within legitimate communication whose motto is to leak information. Subliminal channel, a variant of covert channel works similarly except that the trapdoor is set in a cryptographic algorithm. A composition of covert channel with subliminal channel is the ``Hybrid Covert Channel''. Hybrid covert channel is homogenous or heterogeneous mixture of two or more variants of covert channels either active at same instance or at different instances of time. Detecting such malicious channel activity plays a vital role in removing threat to the legitimate network. In this paper, we present a study of multi-trapdoor covert channels and introduce design of a new detection engine for hybrid covert channel in transport layer visualized in TCP and SSL.
Recent Trends in Network Security and Applications, 2010
Covert Channels are malicious conversation in a legitimate secured network communication that vio... more Covert Channels are malicious conversation in a legitimate secured network communication that violates the security policies laid down. Covert channels are hidden, unintended design in the legitimate communication whose motto is to leak information. Trapdoors are ...
International Journal of Computer Science and Information Technology, 2013
Integer factorization is one of the vital algorithms discussed as a part of analysis of any black... more Integer factorization is one of the vital algorithms discussed as a part of analysis of any black-box cipher suites where the cipher algorithm is based on number theory. The origin of the problem is from Discrete Logarithmic Problem which appears under the analysis of the cryptographic algorithms as seen by a cryptanalyst. The integer factorization algorithm poses a potential in computational science too, obtaining the factors of a very large number is challenging with a limited computing infrastructure. This paper analyses the Pollard's Rho heuristic with a varying input size to evaluate the performance under a multicore environment and also to estimate the threshold for each computing infrastructure.
Advanced Computing: An International Journal, 2012
Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is... more Apriori is one of the key algorithms to generate frequent itemsets. Analysing frequent itemset is a crucial step in analysing structured data and in finding association relationship between items. This stands as an elementary foundation to supervised learning, which encompasses classifier and feature extraction methods. Applying this algorithm is crucial to understand the behaviour of structured data. Most of the structured data in scientific domain are voluminous. Processing such kind of data requires state of the art computing machines. Setting up such an infrastructure is expensive. Hence a distributed environment such as a clustered setup is employed for tackling such scenarios. Apache Hadoop distribution is one of the cluster frameworks in distributed environment that helps by distributing voluminous data across a number of nodes in the framework. This paper focuses on map/reduce design and implementation of Apriori algorithm for structured data analysis.