Neenu Kuriakose - Academia.edu (original) (raw)
Uploads
Papers by Neenu Kuriakose
2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
Indian Journal of Data Communication and Networking
Our lifestyles are increasingly incorporating the Internet of Things. Every year, a growing numbe... more Our lifestyles are increasingly incorporating the Internet of Things. Every year, a growing number of gadgets gain connectivity and communication capabilities via the Internet. There are currently more than 400 million IoT devices in use worldwide, and by 2025, that number is anticipated to reach 1.5 billion. Keeping track of all IoT devices and figuring out which one to connect to in order to make service requests is getting more and more challenging. The device could also end up malfunctioning or performing poorly. We must determine the most effective method of data storage in order to provide the groundwork for how to build trust amongst devices.
Pervasive Computing and Social Networking, 2022
It is only a matter of time before technology emerges to open up a whole new world of opportuniti... more It is only a matter of time before technology emerges to open up a whole new world of opportunities. For example, the invention of the Internet was a development like this that changed the world in almost every theory. Blockchain technology is also one of the emerging technological advances that is expected to change the way transactions are conducted, thus affecting a wide range of potential applications. Blockchain is a distributed software network that works both as a digital logger and a method that allows secure transfer of assets without a mediator. Just as the Internet is a technology that facilitates the flow of digital information, blockchain is a technology that facilitates the digital exchange of digital value. Anything from coins to land titles to votes can be token, stored, and exchanged via a blockchain network.
Through the usage of cryptocurrencies, blockchain technology has been adopted in a variety of ind... more Through the usage of cryptocurrencies, blockchain technology has been adopted in a variety of industries, the most prominent of which is banking. However, in terms of cybersecurity, the technique is practical. Since Satoshi Nakamoto's white paper on Bitcoin was published in 2008, blockchain has steadily grown in popularity as a means of safeguarding data storage and transmission through decentralized, trustless, peer-to-peer networks. In this paper we deal with how can blockchain help to improve cybersecurity and also what are its use cases in this space. Index Terms – Bitcoin, P2P, DDoS, Ethereum, IoT
Botnet analysis aids in comprehending the attack concept and the aggressors' standard operati... more Botnet analysis aids in comprehending the attack concept and the aggressors' standard operating procedure. Botnet attacks are difficult to track due to their fast pace, pestilence nature, and smaller scale. When it comes to botnet assaults, AI is the only solution. It promotes location and aids in the prevention of bot attacks. The effective learning system will examine the client's digital behaviours and actions. It can undeniably discern the essence and scope of each activity by using online media. Nonetheless, the dark cap neighbourhood focuses solely on personal responsibility and spotlights on proliferating vindictive exercises. Botnets are probably the most pressing threat to our increasingly computerised society. By conducting a far-reaching botnet position and criminological analysis, the proposed probe model enhanced the nature of findings.
International Journal for Modern Trends in Science and Technology, 2021
Fraudulent detection is a large number of exercises that try to keep cash or property out of the ... more Fraudulent detection is a large number of exercises that try to keep cash or property out of the way. Fraud surveillance is used in many businesses such as banking or security. At the bank, misrepresentation may involve producing checks or using a Credit Card taken. Different types of robberies can include misfortune or create a problem with the expectation of only a paid Layer Ensemble Method running other AI fields including collecting learning. Recently, there have been one deep group models deployed with a large number of classifiers in each layer. These models, as a result, require a much larger calculation. In addition, the deep integration models are available that use all the separating elements including the unnecessary ones that can reduce the accuracy of the group. In this experiment, we propose a multi-layered learning structure called the Two-Layer Ensemble System to address the issue of definition. The proposed framework is working with a number of weird filters to get...
In this paper a novel carry skip adder structure of 32 bit has been proposed that have better spe... more In this paper a novel carry skip adder structure of 32 bit has been proposed that have better speed and less power consumption than the conventionally used. In this we are analysing the delay, area and power consumption of currently available different carry skip structures, firstly analyse conventional carry skip structure, then we modified the structure for better performance by using the concatenation and incrementation scheme. Then analyze the hybrid variable latency carry skip adder by replacing the nucleus stage of concatenation and incrementation scheme with parallel prefix adder. Later we uses different CSKA implementations in convolver for performing a convolution function along with 16 x 16 reversible Vedic multiplier and the delay and energy consumption of each one is studied. Verilog HDL is used for designing the circuits and Xilinx software tool is used for estimating the delay and power consumption. Keywords— Carry Skip Adder , Convolver, Delay, Hybrid Variable Latency...
International Journal for Research in Applied Science and Engineering Technology, 2021
The Internet of Things (IoT) is ready to transform the quality of life and offer new business opp... more The Internet of Things (IoT) is ready to transform the quality of life and offer new business opportunities with a variety of its applications. However, the benefits of this emerging paradigm go hand in hand with major cyber security issues. Lack of robust cyber security measures to protect IoT systems can lead to cyber-attacks targeting all levels of IoT infrastructure including IoT devices, IoT communication agreements and services that access IoT data. Various IoT malware such as Mirai, BASHLITE and BrickBot show attacks already based on IoT devices and the use of infected IoT devices to launch other cyberattacks. However, as the ongoing deployment and operation of IoT depends largely on the implementation of effective data communication protocols, attacks on other layers of IoT construction are expected to increase. In the IoT country, the rule of publish /-subscribe based Message Queuing Telemetry Transport (MQTT) is very popular. Therefore, cyber security threats to the MQTT protocol are expected to grow in proportion to its increasing use by IoT manufacturers. The purpose of this paper is to explore and understand how security violations can be prevented and reduced in the MQTT protocol to increase its overall safety.
2023 International Conference on Sustainable Computing and Data Communication Systems (ICSCDS)
2022 5th International Conference on Contemporary Computing and Informatics (IC3I)
Indian Journal of Data Communication and Networking
Our lifestyles are increasingly incorporating the Internet of Things. Every year, a growing numbe... more Our lifestyles are increasingly incorporating the Internet of Things. Every year, a growing number of gadgets gain connectivity and communication capabilities via the Internet. There are currently more than 400 million IoT devices in use worldwide, and by 2025, that number is anticipated to reach 1.5 billion. Keeping track of all IoT devices and figuring out which one to connect to in order to make service requests is getting more and more challenging. The device could also end up malfunctioning or performing poorly. We must determine the most effective method of data storage in order to provide the groundwork for how to build trust amongst devices.
Pervasive Computing and Social Networking, 2022
It is only a matter of time before technology emerges to open up a whole new world of opportuniti... more It is only a matter of time before technology emerges to open up a whole new world of opportunities. For example, the invention of the Internet was a development like this that changed the world in almost every theory. Blockchain technology is also one of the emerging technological advances that is expected to change the way transactions are conducted, thus affecting a wide range of potential applications. Blockchain is a distributed software network that works both as a digital logger and a method that allows secure transfer of assets without a mediator. Just as the Internet is a technology that facilitates the flow of digital information, blockchain is a technology that facilitates the digital exchange of digital value. Anything from coins to land titles to votes can be token, stored, and exchanged via a blockchain network.
Through the usage of cryptocurrencies, blockchain technology has been adopted in a variety of ind... more Through the usage of cryptocurrencies, blockchain technology has been adopted in a variety of industries, the most prominent of which is banking. However, in terms of cybersecurity, the technique is practical. Since Satoshi Nakamoto's white paper on Bitcoin was published in 2008, blockchain has steadily grown in popularity as a means of safeguarding data storage and transmission through decentralized, trustless, peer-to-peer networks. In this paper we deal with how can blockchain help to improve cybersecurity and also what are its use cases in this space. Index Terms – Bitcoin, P2P, DDoS, Ethereum, IoT
Botnet analysis aids in comprehending the attack concept and the aggressors' standard operati... more Botnet analysis aids in comprehending the attack concept and the aggressors' standard operating procedure. Botnet attacks are difficult to track due to their fast pace, pestilence nature, and smaller scale. When it comes to botnet assaults, AI is the only solution. It promotes location and aids in the prevention of bot attacks. The effective learning system will examine the client's digital behaviours and actions. It can undeniably discern the essence and scope of each activity by using online media. Nonetheless, the dark cap neighbourhood focuses solely on personal responsibility and spotlights on proliferating vindictive exercises. Botnets are probably the most pressing threat to our increasingly computerised society. By conducting a far-reaching botnet position and criminological analysis, the proposed probe model enhanced the nature of findings.
International Journal for Modern Trends in Science and Technology, 2021
Fraudulent detection is a large number of exercises that try to keep cash or property out of the ... more Fraudulent detection is a large number of exercises that try to keep cash or property out of the way. Fraud surveillance is used in many businesses such as banking or security. At the bank, misrepresentation may involve producing checks or using a Credit Card taken. Different types of robberies can include misfortune or create a problem with the expectation of only a paid Layer Ensemble Method running other AI fields including collecting learning. Recently, there have been one deep group models deployed with a large number of classifiers in each layer. These models, as a result, require a much larger calculation. In addition, the deep integration models are available that use all the separating elements including the unnecessary ones that can reduce the accuracy of the group. In this experiment, we propose a multi-layered learning structure called the Two-Layer Ensemble System to address the issue of definition. The proposed framework is working with a number of weird filters to get...
In this paper a novel carry skip adder structure of 32 bit has been proposed that have better spe... more In this paper a novel carry skip adder structure of 32 bit has been proposed that have better speed and less power consumption than the conventionally used. In this we are analysing the delay, area and power consumption of currently available different carry skip structures, firstly analyse conventional carry skip structure, then we modified the structure for better performance by using the concatenation and incrementation scheme. Then analyze the hybrid variable latency carry skip adder by replacing the nucleus stage of concatenation and incrementation scheme with parallel prefix adder. Later we uses different CSKA implementations in convolver for performing a convolution function along with 16 x 16 reversible Vedic multiplier and the delay and energy consumption of each one is studied. Verilog HDL is used for designing the circuits and Xilinx software tool is used for estimating the delay and power consumption. Keywords— Carry Skip Adder , Convolver, Delay, Hybrid Variable Latency...
International Journal for Research in Applied Science and Engineering Technology, 2021
The Internet of Things (IoT) is ready to transform the quality of life and offer new business opp... more The Internet of Things (IoT) is ready to transform the quality of life and offer new business opportunities with a variety of its applications. However, the benefits of this emerging paradigm go hand in hand with major cyber security issues. Lack of robust cyber security measures to protect IoT systems can lead to cyber-attacks targeting all levels of IoT infrastructure including IoT devices, IoT communication agreements and services that access IoT data. Various IoT malware such as Mirai, BASHLITE and BrickBot show attacks already based on IoT devices and the use of infected IoT devices to launch other cyberattacks. However, as the ongoing deployment and operation of IoT depends largely on the implementation of effective data communication protocols, attacks on other layers of IoT construction are expected to increase. In the IoT country, the rule of publish /-subscribe based Message Queuing Telemetry Transport (MQTT) is very popular. Therefore, cyber security threats to the MQTT protocol are expected to grow in proportion to its increasing use by IoT manufacturers. The purpose of this paper is to explore and understand how security violations can be prevented and reduced in the MQTT protocol to increase its overall safety.