Dr.Gaganjot Kaur | APJ Abdul kalam technological university (original) (raw)
Uploads
Papers by Dr.Gaganjot Kaur
Zenodo (CERN European Organization for Nuclear Research), Oct 18, 2018
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we have discuss the 2 types of encryption i.e., Symmetric and Asymmetric. We briefly explain them how these encryption techniques work and in the end explain which one of these techniques is best and why.
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we have discuss the 2 types of encryption i.e., Symmetric and Asymmetric. We briefly explain them how these encryption techniques work and in the end explain which one of these techniques is best and why.
International Journal of Innovative Technology and Exploring Engineering, 2020
Software Defined Network (SDN) is making software interaction with the network. SDN has made the ... more Software Defined Network (SDN) is making software interaction with the network. SDN has made the network flexible and dynamic and also enabled the abstraction feature of applications and services. As the network is independent of any of the devices like in traditional networks there exist routers, hubs, and switches that is why it is preferable these days. Being more preferably used it has become more vulnerable in terms of security. The more common attacks that corrupt the network and hinders the efficiency are distributed denial-of-service (DDOS) attacks. DDOS is an attack that in general leads to exhaust of the network resources in turn stopping the controller. Detection of DDOS attacks requires a classification technique that provides accurate and efficient decision making. As per the analysis Support Vector Machine (SVM), the classifier technique detects more accurately and precisely the attacks. This paper produces a better approach to detecting attacks using SVM classifiers i...
2017 2nd International Conference on Telecommunication and Networks (TEL-NET), 2017
Cloud Computing as the name suggests is the cloud that provides an environment to various web ser... more Cloud Computing as the name suggests is the cloud that provides an environment to various web services. Cloud represents the internet based paradigm for which services are provided on the basis of pay per use feature. Cloud normally uses open source routing protocol. Wireless sensor network can also be incorporated with our cloud system. Cloud is nothing but a network and as it offers wide range of services but for that a proper network is to be followed and for that transfer of packets is to be done. To transfer a packet various routing protocols are required. The paper presents the comparison of routing protocols on the basis of network and its efficiency. We also discuss about how the communication can be done using a wireless networks on cloud which is one of the major concern.
Journal of Intelligent & Fuzzy Systems, 2022
In today’s world, Software-Defined Networking (SDN) plays a significant role in the advancement o... more In today’s world, Software-Defined Networking (SDN) plays a significant role in the advancement of next-generation network architecture that offers vast control to the network operators. However, the control layer is vulnerable to Distributed Denial of Service (DDoS) attacks where DDoS is one of the most powerful and devastating cyber-attacks. Thus, the development of a DDoS attack detection mechanism is very essential since these kinds of attacks have a direct impact on the overall performance of the SDN. In this paper, a new robust Tuned support vector machine-based DDoS attack detection methodology has been proposed to categorize the benign traffic from DDoS attack traffic on the SDN. Primarily, the network is created with controller and OpenFlow switch and the communication can be carried out through secure channels among different benign users and also attackers. Afterward, the multi-characteristic values are extracted by the effective extraction strategy which consists of the ...
International journal of health sciences, 2022
Software-Defined Network is more vulnerable to more frequent and severe security attacks. Distrib... more Software-Defined Network is more vulnerable to more frequent and severe security attacks. Distributed Denial of service (DDoS) spasms corrupt network along with hinder efficiency and performance significantly. DDoS spasms lead to exhaustion of network means, thereby stopping the controller and impeding normal activities. Detection of DDoS attacks requires different classification techniques that provide accurate and efficient decision-making. Various techniques to detect the attacks are proposed in the existing literature. However, analysis of various works reveals various shortcomings of different techniques. In this paper, the existing techniques are analyzed in terms of their accuracy and MSE, and seven methods are compared with regards to suitability to counter DDoS attacks efficiently. Analysis of the results shows limitations and sets the tone for future studies on the topic. Overall, it is suggested to continue looking for better techniques to improve upon the existing learni...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day's hash function for ensuring safer transmission of information.
2017 2nd International Conference on Telecommunication and Networks (TEL-NET), 2017
Information Technology has shown its advancements in terms of field of Big Data Analytics and Clo... more Information Technology has shown its advancements in terms of field of Big Data Analytics and Cloud Computing. Cloud Computing as the name suggests refers to computing of the shared resources in an open manner in terms of internet, electricity grid etc. Cloud Umbrella offers wide range of services and browser based applications to the users and masses. The major key factors that are responsible for the advancement in Cloud are the Virtualization Technology, different Load Balancing Techniques along with various Load Scheduling Strategies. Cloud Computing is becoming more prominent and is required for fast analysis. Cloud Computing is one of the buzzword in the computing and business world for many years now. Cloud computing has matured and evolved in a very short span of time and still more to go. The impact of cloud is massive. International Data Corporation (IDC), the premier global market intelligence firm predicts that by 2020, Growth in SaaS, PaaS & IaaS will exceed $500 billion — over three times what it is today. From the technology point of view, Cloud is a mainstream churner. Right from its inception to the current stage, it has undergone various trials, tests and development phases in terms of its suitability, reliability, security, energy efficiency, cost, trust management and so on. This paper presents a set of novel market survey in the cloud computing. This paper tries to clarify concerns about performance in cloud computing, analyzing the factors that make the performance of clouds unpredictable, the factors which make it efficient as IaaS, PaaS and Saas. A SWOT (Strength, Weaknesses, Opportunities and Threats) analysis has been performed to get the in depth knowledge of the benefits and limitations of the cloud.
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016
Cloud computing is emerging as a critical information communication technology to heavily impact ... more Cloud computing is emerging as a critical information communication technology to heavily impact our daily life in the future. As computing becomes increasingly pervasive, the energy consumption attributable to computing is climbing that marked the foundation of Green Computing. Green Cloud is an Internet Data Center architecture which aims to reduce data center power consumption, and at the same time guarantee the performance from users' perspective, leveraging live virtual machine migration technology. Saving energy or reduction of carbon footprints is one of the aspects of Green Computing. Green Cloud Architecture enables comprehensive online-monitoring, live virtual machine migration and VM placement optimization. A Green Cloud System responds to peak utilization periods and adjusts availability of resources based on them expanding or shrinking the cloud as needed. The aim of this paper is a literature study of the challenges and various issues in field of Green Computing and discusses the future scope of Green Clouds.
Zenodo (CERN European Organization for Nuclear Research), Oct 18, 2018
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we have discuss the 2 types of encryption i.e., Symmetric and Asymmetric. We briefly explain them how these encryption techniques work and in the end explain which one of these techniques is best and why.
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we have discuss the 2 types of encryption i.e., Symmetric and Asymmetric. We briefly explain them how these encryption techniques work and in the end explain which one of these techniques is best and why.
International Journal of Innovative Technology and Exploring Engineering, 2020
Software Defined Network (SDN) is making software interaction with the network. SDN has made the ... more Software Defined Network (SDN) is making software interaction with the network. SDN has made the network flexible and dynamic and also enabled the abstraction feature of applications and services. As the network is independent of any of the devices like in traditional networks there exist routers, hubs, and switches that is why it is preferable these days. Being more preferably used it has become more vulnerable in terms of security. The more common attacks that corrupt the network and hinders the efficiency are distributed denial-of-service (DDOS) attacks. DDOS is an attack that in general leads to exhaust of the network resources in turn stopping the controller. Detection of DDOS attacks requires a classification technique that provides accurate and efficient decision making. As per the analysis Support Vector Machine (SVM), the classifier technique detects more accurately and precisely the attacks. This paper produces a better approach to detecting attacks using SVM classifiers i...
2017 2nd International Conference on Telecommunication and Networks (TEL-NET), 2017
Cloud Computing as the name suggests is the cloud that provides an environment to various web ser... more Cloud Computing as the name suggests is the cloud that provides an environment to various web services. Cloud represents the internet based paradigm for which services are provided on the basis of pay per use feature. Cloud normally uses open source routing protocol. Wireless sensor network can also be incorporated with our cloud system. Cloud is nothing but a network and as it offers wide range of services but for that a proper network is to be followed and for that transfer of packets is to be done. To transfer a packet various routing protocols are required. The paper presents the comparison of routing protocols on the basis of network and its efficiency. We also discuss about how the communication can be done using a wireless networks on cloud which is one of the major concern.
Journal of Intelligent & Fuzzy Systems, 2022
In today’s world, Software-Defined Networking (SDN) plays a significant role in the advancement o... more In today’s world, Software-Defined Networking (SDN) plays a significant role in the advancement of next-generation network architecture that offers vast control to the network operators. However, the control layer is vulnerable to Distributed Denial of Service (DDoS) attacks where DDoS is one of the most powerful and devastating cyber-attacks. Thus, the development of a DDoS attack detection mechanism is very essential since these kinds of attacks have a direct impact on the overall performance of the SDN. In this paper, a new robust Tuned support vector machine-based DDoS attack detection methodology has been proposed to categorize the benign traffic from DDoS attack traffic on the SDN. Primarily, the network is created with controller and OpenFlow switch and the communication can be carried out through secure channels among different benign users and also attackers. Afterward, the multi-characteristic values are extracted by the effective extraction strategy which consists of the ...
International journal of health sciences, 2022
Software-Defined Network is more vulnerable to more frequent and severe security attacks. Distrib... more Software-Defined Network is more vulnerable to more frequent and severe security attacks. Distributed Denial of service (DDoS) spasms corrupt network along with hinder efficiency and performance significantly. DDoS spasms lead to exhaustion of network means, thereby stopping the controller and impeding normal activities. Detection of DDoS attacks requires different classification techniques that provide accurate and efficient decision-making. Various techniques to detect the attacks are proposed in the existing literature. However, analysis of various works reveals various shortcomings of different techniques. In this paper, the existing techniques are analyzed in terms of their accuracy and MSE, and seven methods are compared with regards to suitability to counter DDoS attacks efficiently. Analysis of the results shows limitations and sets the tone for future studies on the topic. Overall, it is suggested to continue looking for better techniques to improve upon the existing learni...
With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social m... more With the arrival and outbreak of high speed internet, www (World Wide Web) and growth of social media, online transaction, application and business, organization across the globe produce too much amount of data every second. Data Security is the most basic and extreme measures to ensure secure passage of information through internet. As the number of user's increases rapidly throughout the globe tremendously which directly entice cracker for doing cyber-attack. Moreover data security is becoming necessity as we are heading towards digital globalization. In this paper we will discuss various algorithm used so far starting from classical ciphers to the modern day's hash function for ensuring safer transmission of information.
2017 2nd International Conference on Telecommunication and Networks (TEL-NET), 2017
Information Technology has shown its advancements in terms of field of Big Data Analytics and Clo... more Information Technology has shown its advancements in terms of field of Big Data Analytics and Cloud Computing. Cloud Computing as the name suggests refers to computing of the shared resources in an open manner in terms of internet, electricity grid etc. Cloud Umbrella offers wide range of services and browser based applications to the users and masses. The major key factors that are responsible for the advancement in Cloud are the Virtualization Technology, different Load Balancing Techniques along with various Load Scheduling Strategies. Cloud Computing is becoming more prominent and is required for fast analysis. Cloud Computing is one of the buzzword in the computing and business world for many years now. Cloud computing has matured and evolved in a very short span of time and still more to go. The impact of cloud is massive. International Data Corporation (IDC), the premier global market intelligence firm predicts that by 2020, Growth in SaaS, PaaS & IaaS will exceed $500 billion — over three times what it is today. From the technology point of view, Cloud is a mainstream churner. Right from its inception to the current stage, it has undergone various trials, tests and development phases in terms of its suitability, reliability, security, energy efficiency, cost, trust management and so on. This paper presents a set of novel market survey in the cloud computing. This paper tries to clarify concerns about performance in cloud computing, analyzing the factors that make the performance of clouds unpredictable, the factors which make it efficient as IaaS, PaaS and Saas. A SWOT (Strength, Weaknesses, Opportunities and Threats) analysis has been performed to get the in depth knowledge of the benefits and limitations of the cloud.
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016
2016 6th International Conference - Cloud System and Big Data Engineering (Confluence), 2016
Cloud computing is emerging as a critical information communication technology to heavily impact ... more Cloud computing is emerging as a critical information communication technology to heavily impact our daily life in the future. As computing becomes increasingly pervasive, the energy consumption attributable to computing is climbing that marked the foundation of Green Computing. Green Cloud is an Internet Data Center architecture which aims to reduce data center power consumption, and at the same time guarantee the performance from users' perspective, leveraging live virtual machine migration technology. Saving energy or reduction of carbon footprints is one of the aspects of Green Computing. Green Cloud Architecture enables comprehensive online-monitoring, live virtual machine migration and VM placement optimization. A Green Cloud System responds to peak utilization periods and adjusts availability of resources based on them expanding or shrinking the cloud as needed. The aim of this paper is a literature study of the challenges and various issues in field of Green Computing and discusses the future scope of Green Clouds.