Kshyamasagar mahanta - Academia.edu (original) (raw)
Uploads
Papers by Kshyamasagar mahanta
Advances in computational intelligence and robotics book series, Feb 23, 2024
2023 IEEE Guwahati Subsection Conference (GCON)
Malicious behavior in the system must be recognized for ensure security because the occurrence of... more Malicious behavior in the system must be recognized for ensure security because the occurrence of the intrusions can threaten the valuable data and threatens the quality of the network. An important area of research in network security is network intrusion detection. In recent years the intrusion detection model faced several problems due to low accuracy, data imbalance, lack of optimization and so on. To overcome this issue, in this research, a raptor-optimized deep CNN is used to develop the intrusion detection model, where the occurrence of intrusions is effectively detected. The deep CNN classifier effectively learns the features, and the enabling of the raptor optimization optimizes the weights and bias parameters to enhance the performance of the deep CNN classifier. The raptor optimization improves the classifier convergence time and global search capability, and the enabling of Synthetic Minority Oversampling Technique (SMOTE) resolved the issues of data imbalance, which reduced the complexity of the system. By evaluating the parameters of accuracy, sensitivity, and specificity, the research's superiority is demonstrated, and the suggested raptor-optimized deep CNN classifier achieved values of 96.51%, 90.23%, and 97.71% for dataset 1. The proposed raptor optimization also achieved values of 95.39%, 95.83%, and 95.15% for dataset 2, which is highly efficient compared to other existing methods.
Stochastic Modeling & Applications, Special Issue on Innovative Research in Management, Applied Science and Engineering, 2022
This segment of the review paper provides a brief summary of the main concepts of chaos in data s... more This segment of the review paper provides a brief summary of the main concepts of chaos in data security along with reviewing the role of complexity theory in it. The purpose of the study includes discussion on using various techniques including sequence generation. Role of image encryption in providing data security. This paper employs chaos theory to analyze security vulnerability announcements. It demonstrates that there might be an underlying pattern to seemingly random events. Determining this pattern can lead to a better understanding of the order and structure of vulnerability frequency.
Advances in computational intelligence and robotics book series, Feb 17, 2023
In today’s world most of the communication is done using electronic media. Data Security plays a ... more In today’s world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from malicious attacks. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunications, cryptography is necessary when communicating over any unreliable medium, which includes any network particularly the internet. Advanced Encryption Standard (AES), also known as Rijndael, is an encryption standard used for securing information which is defined by The National Institute of Standard and technology (NIST) of United States[1][5][9]. AES is a block cipher algorithm that has analyzed extensively and is now used widely[13]. AES involves the sequence of four primitive functions: Sub Bytes, Shift Rows, Mix Column and Add Round Key. This paper presents some modificati...
Conference Presentations by Kshyamasagar mahanta
Proceedings of International Conference on Artificial Intelligence, 5G Communications and Network Technologies (ICA5NT'23), 2023
The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices a... more The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices and networks to the Internet. However, this interconnected environment also poses new security challenges, particularly in terms of intrusion detection. Intrusion detection systems (IDS) play a crucial role in protecting IoT devices and networks from security breaches. In this paper, we propose a novel methodology for developing IDS for the IoT using game theory. This approach models the interaction between the IoT devices and the attacker as a game, allowing the intrusion detection system to make informed decisions based on an understanding of the attacker's behavior and goals. We discuss the various challenges associated with implementing this methodology, as well as its potential to lead to innovative solutions for the security challenges posed by the IoT. Our findings demonstrate the potential of game theory in developing secure and efficient intrusion detection systems for the IoT.
Advances in computational intelligence and robotics book series, Feb 23, 2024
2023 IEEE Guwahati Subsection Conference (GCON)
Malicious behavior in the system must be recognized for ensure security because the occurrence of... more Malicious behavior in the system must be recognized for ensure security because the occurrence of the intrusions can threaten the valuable data and threatens the quality of the network. An important area of research in network security is network intrusion detection. In recent years the intrusion detection model faced several problems due to low accuracy, data imbalance, lack of optimization and so on. To overcome this issue, in this research, a raptor-optimized deep CNN is used to develop the intrusion detection model, where the occurrence of intrusions is effectively detected. The deep CNN classifier effectively learns the features, and the enabling of the raptor optimization optimizes the weights and bias parameters to enhance the performance of the deep CNN classifier. The raptor optimization improves the classifier convergence time and global search capability, and the enabling of Synthetic Minority Oversampling Technique (SMOTE) resolved the issues of data imbalance, which reduced the complexity of the system. By evaluating the parameters of accuracy, sensitivity, and specificity, the research's superiority is demonstrated, and the suggested raptor-optimized deep CNN classifier achieved values of 96.51%, 90.23%, and 97.71% for dataset 1. The proposed raptor optimization also achieved values of 95.39%, 95.83%, and 95.15% for dataset 2, which is highly efficient compared to other existing methods.
Stochastic Modeling & Applications, Special Issue on Innovative Research in Management, Applied Science and Engineering, 2022
This segment of the review paper provides a brief summary of the main concepts of chaos in data s... more This segment of the review paper provides a brief summary of the main concepts of chaos in data security along with reviewing the role of complexity theory in it. The purpose of the study includes discussion on using various techniques including sequence generation. Role of image encryption in providing data security. This paper employs chaos theory to analyze security vulnerability announcements. It demonstrates that there might be an underlying pattern to seemingly random events. Determining this pattern can lead to a better understanding of the order and structure of vulnerability frequency.
Advances in computational intelligence and robotics book series, Feb 17, 2023
In today’s world most of the communication is done using electronic media. Data Security plays a ... more In today’s world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from malicious attacks. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunications, cryptography is necessary when communicating over any unreliable medium, which includes any network particularly the internet. Advanced Encryption Standard (AES), also known as Rijndael, is an encryption standard used for securing information which is defined by The National Institute of Standard and technology (NIST) of United States[1][5][9]. AES is a block cipher algorithm that has analyzed extensively and is now used widely[13]. AES involves the sequence of four primitive functions: Sub Bytes, Shift Rows, Mix Column and Add Round Key. This paper presents some modificati...
Proceedings of International Conference on Artificial Intelligence, 5G Communications and Network Technologies (ICA5NT'23), 2023
The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices a... more The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices and networks to the Internet. However, this interconnected environment also poses new security challenges, particularly in terms of intrusion detection. Intrusion detection systems (IDS) play a crucial role in protecting IoT devices and networks from security breaches. In this paper, we propose a novel methodology for developing IDS for the IoT using game theory. This approach models the interaction between the IoT devices and the attacker as a game, allowing the intrusion detection system to make informed decisions based on an understanding of the attacker's behavior and goals. We discuss the various challenges associated with implementing this methodology, as well as its potential to lead to innovative solutions for the security challenges posed by the IoT. Our findings demonstrate the potential of game theory in developing secure and efficient intrusion detection systems for the IoT.