Saravanan Kumarasamy - Academia.edu (original) (raw)

Uploads

Papers by Saravanan Kumarasamy

Research paper thumbnail of An Twin Peak Based FLC for Micro-Grid Connected Integrated Hybrid Renewable System

In this paper, the design of a micro-grid power system supplied from different hybrid renewable e... more In this paper, the design of a micro-grid power system supplied from different hybrid renewable energy resource is proposed. The proposed system provides a highly efficient key for energy management, control and operation of micro-grid fed from hybrid energy resources like wind, solar, fuel battery and ultra-capacitor. Maximum Power Point Tracker (MPPT) is designed so as to attain maximum power output from the solar photo voltaic (PV) panel systems. The novelty of the proposed system fabrication in the method of Luo Converter for dc-dc conversion as opposed to single-ended primary inductor converter (SEPIC). A Twin Peak Detection (TPD) algorithm was introduced to determine the maximum output of renewable energy source for connect to the micro grid and other source for storage system. The Fuzzy Logic Controller (FLC) generates the signals to the converter based on the source and energy demand. The performance of the hybrid system was evaluated by simulating the models of individual u...

Research paper thumbnail of An Effective Fusion Technique of Cloud Computing and Networking Series

ArXiv, 2012

Cloud computing is making it possible to separate the process of building an infrastructure for s... more Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that cloud computing requires a reasonably stable infrastructure and networking environment, largely due to management reasons. Networking of Information (NetInf) is an information centric networking paradigm that can support cloud computing by providing new possibilities for network transport and storage. It offers direct access to information objects through a simple API, independent of their location in the network. This abstraction can hide much of the complexity of storage and network transport systems that cloud computing today has to deal with. In this paper we analyze how cloud computing and NetInf can be combined to make cloud computing infrastructures easier...

Research paper thumbnail of Defense Mechanism for TCP SYN Flooding Attacks using Compression Techniques

A front assembly is disclosed for use in a color cathode ray tube. The assembly according to the ... more A front assembly is disclosed for use in a color cathode ray tube. The assembly according to the invention comprises a glass faceplate having a target area with a pattern of phosphor deposits covered with an electron-pervious electrically conductive metallic film. A shadow mask support assembly includes a glass frame sealed to and constituting an integral part of the tube envelope for supporting a shadow mask in precise spaced adjacency to the target area. The frame has an electrically conductive frame coating on at least a portion thereof. An electrically conductive foil shadow mask adapted to be charged with a high voltage is mounted in tension on the frame in electrical contact with a conductive frame coating. Conductive means which may comprise spring means is in contact with the mask or the conductive frame coating and the metallic film or a conductive extension thereof for conducting high voltage on the mask to the metallic film. A funnel has an anode button therethrough for r...

Research paper thumbnail of A new application of Multi modal Biometrics in home and office security system

ArXiv, 2012

Biometric door lock security systems are used at those places where you have important informatio... more Biometric door lock security systems are used at those places where you have important information and stuffs. In that kind of places multibiometric electronic door lock security systems that are based on finger print and iris recognization.Multibiometric door lock security systems are used to prevent the door related burglaries such as break ins occurred in different forms so this is the best method to prevent this type of happenings. Unlike keyed locks, there is no need to take the keys with you when you go out without necessary of worrying about losing keys.This paper proposes a multimodal biometrics door lock system with iris and fingerprint as a computer application for automatically identifying or verifying a person from fingerprint iris recognition system. The first stage is identification and second one is verifying that whether he is a genuine user or imposter. During second stage system compares the input set with all available stored set in database. This comparison gives...

Research paper thumbnail of An Active Defense Mechanism for TCP SYN flooding attacks

Distributed denial-of-service attacks on public servers have recently become a serious problem. T... more Distributed denial-of-service attacks on public servers have recently become a serious problem. To assure that network services will not be interrupted and more effective defense mechanisms to protect against malicious traffic, especially SYN floods. One problem in detecting SYN flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of a SYN flood attack. Another problem is single-point defenses (e.g. firewalls) lack the scalability needed to handle an increase in the attack traffic. We have designed a new defense mechanism to detect the SYN flood attacks. First, we introduce a mechanism for detecting SYN flood traffic more accurately by taking into consideration the time variation of arrival traffic. We investigate the statistics regarding the arrival rates of both normal TCP SYN packets and SYN flood attack packets. We then describe a new detection mechanism based on these statistics. Through the trace driven approac...

Research paper thumbnail of A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB Association model

As an interconnection technology, Bluetooth has to address all traditional security problems, wel... more As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that support Simple Secure Pairing(SSP). From the literature it was proved that the SSP association models such as Numeric comparison, Just works and passkey Entry are not more secure. Here we propose the Out Of Band (OOB) channeling with enhanced security than the previous methods.

Research paper thumbnail of Cluster Based Cost Efficient Intrusion Detection System For Manet

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed... more Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes. The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resour...

Research paper thumbnail of A Pattern Recognition Approach To Secure Cipher Documents

Research paper thumbnail of An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as a popula... more Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing collection particular overhaul disruptions, often for total periods of instance. The relative ease and low costs of initiation such attacks, supplemented by the present insufficient sate of any feasible defense method, have made them one of the top threats to the Internet centre of population nowadays. Since the rising attractiveness of webbased applications has led to quite a lot of significant services being provided more than the Internet, it is very important to monitor the network transfer so as to stop hateful attackers from depleting the assets of the network and denying services to rightful users. The most important drawbacks of the presently existing defense mechanisms and propose a newfangled mechanism for defending a web-server against a DDoS attack. In the proposed mechanism, incoming traffic to the server is always monitored and some irregular rise in the inbound traffic is without delay detected. The detection algorithm is based on a statistical analysis of the inbound traffic on the server and a robust suggestion testing structure. While the detection procedure is on, the sessions from the rightful sources are not disrupted and the load on the server is restored to the usual level by overcrowding the traffic from the attacking sources. The accurate modules employ multifaceted detection logic and hence involve additional overhead for their execution. On the other hand, they have very huge detection accuracy. Simulations approved on the proposed mechanism have produced results that show efficiency of the proposed defense mechanism against DDoS attacks.

Research paper thumbnail of Defense Mechanism for TCP Syn Flooding Attacks Using Compression Techniques

nguyendangbinh.org, 2008

- Denial of Service and the Distributed Denial of Service Attacks has recently emerged as one of ... more - Denial of Service and the Distributed Denial of Service Attacks has recently emerged as one of the most interesting, if not the greatest, weaknesses of the Internet. TCP-based flooding attacks are a common form of Distributed Denial-of-Service (DDoS) attacks which results ...

Research paper thumbnail of Neuro-fuzzy-based clustering of DDoS attack detection in the network

International Journal of Critical Infrastructures, 2017

The detection system developed for wired networks cannot be deployed in wireless networks due to ... more The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker’s packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.

Research paper thumbnail of Ebooksclub-org cloud security a comprehensive guide to secure cloud computing

Research paper thumbnail of An Twin Peak Based FLC for Micro-Grid Connected Integrated Hybrid Renewable System

In this paper, the design of a micro-grid power system supplied from different hybrid renewable e... more In this paper, the design of a micro-grid power system supplied from different hybrid renewable energy resource is proposed. The proposed system provides a highly efficient key for energy management, control and operation of micro-grid fed from hybrid energy resources like wind, solar, fuel battery and ultra-capacitor. Maximum Power Point Tracker (MPPT) is designed so as to attain maximum power output from the solar photo voltaic (PV) panel systems. The novelty of the proposed system fabrication in the method of Luo Converter for dc-dc conversion as opposed to single-ended primary inductor converter (SEPIC). A Twin Peak Detection (TPD) algorithm was introduced to determine the maximum output of renewable energy source for connect to the micro grid and other source for storage system. The Fuzzy Logic Controller (FLC) generates the signals to the converter based on the source and energy demand. The performance of the hybrid system was evaluated by simulating the models of individual u...

Research paper thumbnail of An Effective Fusion Technique of Cloud Computing and Networking Series

ArXiv, 2012

Cloud computing is making it possible to separate the process of building an infrastructure for s... more Cloud computing is making it possible to separate the process of building an infrastructure for service provisioning from the business of providing end user services. Today, such infrastructures are normally provided in large data centres and the applications are executed remotely from the users. One reason for this is that cloud computing requires a reasonably stable infrastructure and networking environment, largely due to management reasons. Networking of Information (NetInf) is an information centric networking paradigm that can support cloud computing by providing new possibilities for network transport and storage. It offers direct access to information objects through a simple API, independent of their location in the network. This abstraction can hide much of the complexity of storage and network transport systems that cloud computing today has to deal with. In this paper we analyze how cloud computing and NetInf can be combined to make cloud computing infrastructures easier...

Research paper thumbnail of Defense Mechanism for TCP SYN Flooding Attacks using Compression Techniques

A front assembly is disclosed for use in a color cathode ray tube. The assembly according to the ... more A front assembly is disclosed for use in a color cathode ray tube. The assembly according to the invention comprises a glass faceplate having a target area with a pattern of phosphor deposits covered with an electron-pervious electrically conductive metallic film. A shadow mask support assembly includes a glass frame sealed to and constituting an integral part of the tube envelope for supporting a shadow mask in precise spaced adjacency to the target area. The frame has an electrically conductive frame coating on at least a portion thereof. An electrically conductive foil shadow mask adapted to be charged with a high voltage is mounted in tension on the frame in electrical contact with a conductive frame coating. Conductive means which may comprise spring means is in contact with the mask or the conductive frame coating and the metallic film or a conductive extension thereof for conducting high voltage on the mask to the metallic film. A funnel has an anode button therethrough for r...

Research paper thumbnail of A new application of Multi modal Biometrics in home and office security system

ArXiv, 2012

Biometric door lock security systems are used at those places where you have important informatio... more Biometric door lock security systems are used at those places where you have important information and stuffs. In that kind of places multibiometric electronic door lock security systems that are based on finger print and iris recognization.Multibiometric door lock security systems are used to prevent the door related burglaries such as break ins occurred in different forms so this is the best method to prevent this type of happenings. Unlike keyed locks, there is no need to take the keys with you when you go out without necessary of worrying about losing keys.This paper proposes a multimodal biometrics door lock system with iris and fingerprint as a computer application for automatically identifying or verifying a person from fingerprint iris recognition system. The first stage is identification and second one is verifying that whether he is a genuine user or imposter. During second stage system compares the input set with all available stored set in database. This comparison gives...

Research paper thumbnail of An Active Defense Mechanism for TCP SYN flooding attacks

Distributed denial-of-service attacks on public servers have recently become a serious problem. T... more Distributed denial-of-service attacks on public servers have recently become a serious problem. To assure that network services will not be interrupted and more effective defense mechanisms to protect against malicious traffic, especially SYN floods. One problem in detecting SYN flood traffic is that server nodes or firewalls cannot distinguish the SYN packets of normal TCP connections from those of a SYN flood attack. Another problem is single-point defenses (e.g. firewalls) lack the scalability needed to handle an increase in the attack traffic. We have designed a new defense mechanism to detect the SYN flood attacks. First, we introduce a mechanism for detecting SYN flood traffic more accurately by taking into consideration the time variation of arrival traffic. We investigate the statistics regarding the arrival rates of both normal TCP SYN packets and SYN flood attack packets. We then describe a new detection mechanism based on these statistics. Through the trace driven approac...

Research paper thumbnail of A Novel Bluetooth Man-In-The-Middle Attack Based On SSP using OOB Association model

As an interconnection technology, Bluetooth has to address all traditional security problems, wel... more As an interconnection technology, Bluetooth has to address all traditional security problems, well known from the distributed networks. Moreover, as Bluetooth networks are formed by the radio links, there are also additional security aspects whose impact is yet not well understood. In this paper, we propose a novel Man-In-The-Middle (MITM) attack against Bluetooth enabled mobile phone that support Simple Secure Pairing(SSP). From the literature it was proved that the SSP association models such as Numeric comparison, Just works and passkey Entry are not more secure. Here we propose the Out Of Band (OOB) channeling with enhanced security than the previous methods.

Research paper thumbnail of Cluster Based Cost Efficient Intrusion Detection System For Manet

Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed... more Mobile ad-hoc networks are temporary wireless networks. Network resources are abnormally consumed by intruders. Anomaly and signature based techniques are used for intrusion detection. Classification techniques are used in anomaly based techniques. Intrusion detection techniques are used for the network attack detection process. Two types of intrusion detection systems are available. They are anomaly detection and signature based detection model. The anomaly detection model uses the historical transactions with attack labels. The signature database is used in the signature based IDS schemes. The mobile ad-hoc networks are infrastructure less environment. The intrusion detection applications are placed in a set of nodes under the mobile ad-hoc network environment. The nodes are grouped into clusters. The leader nodes are assigned for the clusters. The leader node is assigned for the intrusion detection process. Leader nodes are used to initiate the intrusion detection process. Resour...

Research paper thumbnail of A Pattern Recognition Approach To Secure Cipher Documents

Research paper thumbnail of An Efficient Detection Mechanism for Distributed Denial of Service (DDoS) Attack

Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as a popula... more Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks have emerged as a popular means of causing collection particular overhaul disruptions, often for total periods of instance. The relative ease and low costs of initiation such attacks, supplemented by the present insufficient sate of any feasible defense method, have made them one of the top threats to the Internet centre of population nowadays. Since the rising attractiveness of webbased applications has led to quite a lot of significant services being provided more than the Internet, it is very important to monitor the network transfer so as to stop hateful attackers from depleting the assets of the network and denying services to rightful users. The most important drawbacks of the presently existing defense mechanisms and propose a newfangled mechanism for defending a web-server against a DDoS attack. In the proposed mechanism, incoming traffic to the server is always monitored and some irregular rise in the inbound traffic is without delay detected. The detection algorithm is based on a statistical analysis of the inbound traffic on the server and a robust suggestion testing structure. While the detection procedure is on, the sessions from the rightful sources are not disrupted and the load on the server is restored to the usual level by overcrowding the traffic from the attacking sources. The accurate modules employ multifaceted detection logic and hence involve additional overhead for their execution. On the other hand, they have very huge detection accuracy. Simulations approved on the proposed mechanism have produced results that show efficiency of the proposed defense mechanism against DDoS attacks.

Research paper thumbnail of Defense Mechanism for TCP Syn Flooding Attacks Using Compression Techniques

nguyendangbinh.org, 2008

- Denial of Service and the Distributed Denial of Service Attacks has recently emerged as one of ... more - Denial of Service and the Distributed Denial of Service Attacks has recently emerged as one of the most interesting, if not the greatest, weaknesses of the Internet. TCP-based flooding attacks are a common form of Distributed Denial-of-Service (DDoS) attacks which results ...

Research paper thumbnail of Neuro-fuzzy-based clustering of DDoS attack detection in the network

International Journal of Critical Infrastructures, 2017

The detection system developed for wired networks cannot be deployed in wireless networks due to ... more The detection system developed for wired networks cannot be deployed in wireless networks due to the difference between the two types of networks. The data transmission of the wired network is a standard physical routing. However, the data stream routing of wireless network are based on radio signals with a variety of problems of evolution. The attacker’s packet header data are acknowledged with a port number, option field parameters and IP address. The anomalies detection is carried out at a regular interval to monitor the traffic analysed through statistical variance. The change detection detects the statistical variance of the traffic volume. The results obtained from the proposed system are compared with the existing attack detection systems with the propagation delay metric. It shows a reduction of nearly 10% and an improvement of 13% average throughput.

Research paper thumbnail of Ebooksclub-org cloud security a comprehensive guide to secure cloud computing