Kshyamasagar mahanta - Academia.edu (original) (raw)

Uploads

Papers by Kshyamasagar mahanta

Research paper thumbnail of Real-World Applications of Bio-Inspired Swarm Robotics

Advances in computational intelligence and robotics book series, Feb 23, 2024

Research paper thumbnail of Application of Machine Learning for Intrusion Detection in Smart City Applications

Research paper thumbnail of Effective Intrusion Detection Model Using Raptor Optimized Deep Convolutional Neural Network

2023 IEEE Guwahati Subsection Conference (GCON)

Malicious behavior in the system must be recognized for ensure security because the occurrence of... more Malicious behavior in the system must be recognized for ensure security because the occurrence of the intrusions can threaten the valuable data and threatens the quality of the network. An important area of research in network security is network intrusion detection. In recent years the intrusion detection model faced several problems due to low accuracy, data imbalance, lack of optimization and so on. To overcome this issue, in this research, a raptor-optimized deep CNN is used to develop the intrusion detection model, where the occurrence of intrusions is effectively detected. The deep CNN classifier effectively learns the features, and the enabling of the raptor optimization optimizes the weights and bias parameters to enhance the performance of the deep CNN classifier. The raptor optimization improves the classifier convergence time and global search capability, and the enabling of Synthetic Minority Oversampling Technique (SMOTE) resolved the issues of data imbalance, which reduced the complexity of the system. By evaluating the parameters of accuracy, sensitivity, and specificity, the research's superiority is demonstrated, and the suggested raptor-optimized deep CNN classifier achieved values of 96.51%, 90.23%, and 97.71% for dataset 1. The proposed raptor optimization also achieved values of 95.39%, 95.83%, and 95.15% for dataset 2, which is highly efficient compared to other existing methods.

Research paper thumbnail of Data hiding with security improvement using chaos cryptography algorithm

Stochastic Modeling & Applications, Special Issue on Innovative Research in Management, Applied Science and Engineering, 2022

This segment of the review paper provides a brief summary of the main concepts of chaos in data s... more This segment of the review paper provides a brief summary of the main concepts of chaos in data security along with reviewing the role of complexity theory in it. The purpose of the study includes discussion on using various techniques including sequence generation. Role of image encryption in providing data security. This paper employs chaos theory to analyze security vulnerability announcements. It demonstrates that there might be an underlying pattern to seemingly random events. Determining this pattern can lead to a better understanding of the order and structure of vulnerability frequency.

Research paper thumbnail of Safety and Security in AI Systems

Advances in computational intelligence and robotics book series, Feb 17, 2023

Research paper thumbnail of An Enhanced Advanced Encryption Standard Algorithm

In today’s world most of the communication is done using electronic media. Data Security plays a ... more In today’s world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from malicious attacks. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunications, cryptography is necessary when communicating over any unreliable medium, which includes any network particularly the internet. Advanced Encryption Standard (AES), also known as Rijndael, is an encryption standard used for securing information which is defined by The National Institute of Standard and technology (NIST) of United States[1][5][9]. AES is a block cipher algorithm that has analyzed extensively and is now used widely[13]. AES involves the sequence of four primitive functions: Sub Bytes, Shift Rows, Mix Column and Add Round Key. This paper presents some modificati...

Conference Presentations by Kshyamasagar mahanta

Research paper thumbnail of Security in the Internet of Things (IoT): Developing intrusion detection systems for IoT devices and networks and addressing the unique security challenges posed by this connected environment

Proceedings of International Conference on Artificial Intelligence, 5G Communications and Network Technologies (ICA5NT'23), 2023

The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices a... more The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices and networks to the Internet. However, this interconnected environment also poses new security challenges, particularly in terms of intrusion detection. Intrusion detection systems (IDS) play a crucial role in protecting IoT devices and networks from security breaches. In this paper, we propose a novel methodology for developing IDS for the IoT using game theory. This approach models the interaction between the IoT devices and the attacker as a game, allowing the intrusion detection system to make informed decisions based on an understanding of the attacker's behavior and goals. We discuss the various challenges associated with implementing this methodology, as well as its potential to lead to innovative solutions for the security challenges posed by the IoT. Our findings demonstrate the potential of game theory in developing secure and efficient intrusion detection systems for the IoT.

Research paper thumbnail of Real-World Applications of Bio-Inspired Swarm Robotics

Advances in computational intelligence and robotics book series, Feb 23, 2024

Research paper thumbnail of Application of Machine Learning for Intrusion Detection in Smart City Applications

Research paper thumbnail of Effective Intrusion Detection Model Using Raptor Optimized Deep Convolutional Neural Network

2023 IEEE Guwahati Subsection Conference (GCON)

Malicious behavior in the system must be recognized for ensure security because the occurrence of... more Malicious behavior in the system must be recognized for ensure security because the occurrence of the intrusions can threaten the valuable data and threatens the quality of the network. An important area of research in network security is network intrusion detection. In recent years the intrusion detection model faced several problems due to low accuracy, data imbalance, lack of optimization and so on. To overcome this issue, in this research, a raptor-optimized deep CNN is used to develop the intrusion detection model, where the occurrence of intrusions is effectively detected. The deep CNN classifier effectively learns the features, and the enabling of the raptor optimization optimizes the weights and bias parameters to enhance the performance of the deep CNN classifier. The raptor optimization improves the classifier convergence time and global search capability, and the enabling of Synthetic Minority Oversampling Technique (SMOTE) resolved the issues of data imbalance, which reduced the complexity of the system. By evaluating the parameters of accuracy, sensitivity, and specificity, the research's superiority is demonstrated, and the suggested raptor-optimized deep CNN classifier achieved values of 96.51%, 90.23%, and 97.71% for dataset 1. The proposed raptor optimization also achieved values of 95.39%, 95.83%, and 95.15% for dataset 2, which is highly efficient compared to other existing methods.

Research paper thumbnail of Data hiding with security improvement using chaos cryptography algorithm

Stochastic Modeling & Applications, Special Issue on Innovative Research in Management, Applied Science and Engineering, 2022

This segment of the review paper provides a brief summary of the main concepts of chaos in data s... more This segment of the review paper provides a brief summary of the main concepts of chaos in data security along with reviewing the role of complexity theory in it. The purpose of the study includes discussion on using various techniques including sequence generation. Role of image encryption in providing data security. This paper employs chaos theory to analyze security vulnerability announcements. It demonstrates that there might be an underlying pattern to seemingly random events. Determining this pattern can lead to a better understanding of the order and structure of vulnerability frequency.

Research paper thumbnail of Safety and Security in AI Systems

Advances in computational intelligence and robotics book series, Feb 17, 2023

Research paper thumbnail of An Enhanced Advanced Encryption Standard Algorithm

In today’s world most of the communication is done using electronic media. Data Security plays a ... more In today’s world most of the communication is done using electronic media. Data Security plays a vital role in such communication. Hence, there is a need to protect data from malicious attacks. Cryptography is the study of mathematical techniques related to aspects of information security such as confidentiality, data integrity, entity authentication and data origin authentication. In data and telecommunications, cryptography is necessary when communicating over any unreliable medium, which includes any network particularly the internet. Advanced Encryption Standard (AES), also known as Rijndael, is an encryption standard used for securing information which is defined by The National Institute of Standard and technology (NIST) of United States[1][5][9]. AES is a block cipher algorithm that has analyzed extensively and is now used widely[13]. AES involves the sequence of four primitive functions: Sub Bytes, Shift Rows, Mix Column and Add Round Key. This paper presents some modificati...

Research paper thumbnail of Security in the Internet of Things (IoT): Developing intrusion detection systems for IoT devices and networks and addressing the unique security challenges posed by this connected environment

Proceedings of International Conference on Artificial Intelligence, 5G Communications and Network Technologies (ICA5NT'23), 2023

The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices a... more The Internet of Things (IoT) has revolutionized the way we live, connecting millions of devices and networks to the Internet. However, this interconnected environment also poses new security challenges, particularly in terms of intrusion detection. Intrusion detection systems (IDS) play a crucial role in protecting IoT devices and networks from security breaches. In this paper, we propose a novel methodology for developing IDS for the IoT using game theory. This approach models the interaction between the IoT devices and the attacker as a game, allowing the intrusion detection system to make informed decisions based on an understanding of the attacker's behavior and goals. We discuss the various challenges associated with implementing this methodology, as well as its potential to lead to innovative solutions for the security challenges posed by the IoT. Our findings demonstrate the potential of game theory in developing secure and efficient intrusion detection systems for the IoT.