Amutharaj Joyson | Visvesvaraya Technological University (original) (raw)
Papers by Amutharaj Joyson
Journal of Information Security and Applications
Journal of critical reviews, 2020
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortu... more Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of datasets provide an accuracy of about 99-100%.
The Journal of Contemporary Issues in Business and Government, Apr 30, 2021
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortu... more Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of datasets provide an accuracy of about 99-100%.
Journal of critical reviews, 2020
Interdisciplinary Studies in Literature and Environment, 1996
... [15] K. Stamos, G. Pallis, A. Vakali, D. Katsaros, A. Sidiropoulos, Y. Manolopoulos: &quo... more ... [15] K. Stamos, G. Pallis, A. Vakali, D. Katsaros, A. Sidiropoulos, Y. Manolopoulos: "CDNsim ... He is currently doing his doctoral program from Anna University, Chennai. He is a member of CSI, IAEng, ISTE and Network Technology Group of TIFAC-CORE in Network Engineering. ...
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortu... more Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naive Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of da...
Journal of Networks, 2008
Recently overlay networks have emerged as an efficient and flexible method for content distributi... more Recently overlay networks have emerged as an efficient and flexible method for content distribution. An overlay network is a network running on top of another network, usually the Internet. This network is formed by a subset of underlying physical nodes. The connections between the overlay nodes are provided by overlay links, each of which is usually composed of one or more physical link. These networks are employed in many settings to provide logical communication infrastructure over an existing communication networks. The main objective of the overlay network is to reduce routing path lengths, stretched by the overlay routing process. In the existing solutions developed, a kind of fixed infrastructure in the form of excessive message exchange is necessary to guarantee good overlay properties. The scope of our effort is to construct an overlay network based on Dominating Set Theory to optimize the number of nodes for large data transfer. Fast Replica algorithm is applied to reduce the content transfer time for replicating the content within the semantic network. A dynamic parallel access scheme is introduced to download a file from different peers in parallel from the Semantic Overlay Network (SON), where the end users can access the members of the SON at the same time, fetching different portions of that file from different peers and reassembling them locally. That is, the load is dynamically shared among all the peers. To eliminate the need for retransmission requests from the end users, an enhanced digital fountain with Tornado codes is applied. Decoding algorithm at the receiver will reconstruct the original content. In this no feedback mechanisms are needed to ensure reliable delivery. This paper analyzes the performance of sequential unicast, multiple unicast and fast replica with tornado content distribution strategies in terms of content replication time and delivery ratio. This paper also analyzes the impact of dominating set theory for the construction of semantic overlay networks.
Content Distribution Networks (CDNs) are overlay networks for placing the content near end client... more Content Distribution Networks (CDNs) are overlay networks for placing the content near end clients with the aim at reducing delay, network congestion and balancing the workload, hence improving the service quality perceived by the end clients. The three major research issues in CDN are selection of surrogate server for replicating and retrieving the content, policies for replicating and retrieving the content, and caching. Among these research areas, once the surrogate server is selected for replication, any replication policy can replicate the content in optimal replication time. The main objective of this work is to construct a semantic overlay network of surrogate servers based on dominating set theory. This yields any replication algorithm that can replicate the contents to minimum number of surrogate servers within the SON. Such servers can access from anywhere. Then we propose a content distribution algorithm named Optimal Fast Replica (O-FR) and apply our proposed algorithm t...
Nowadays, content distribution is an important peer-to-peer application on the Internet that has ... more Nowadays, content distribution is an important peer-to-peer application on the Internet that has received considerable research attention. Content distribution applications typically allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content. The primary task in CDN is to replicate the contents over several mirrored web servers (i.e., surrogate servers) strategically placed at various locations in order to deal with the flash crowds. Geographically distributing the web servers’ facilities is a method commonly used by service providers to improve performance and scalability. Hence, contents in CDN are replicated in many surrogate servers according to some content distribution strategies dictated by the application environment. Devising an efficient and resilient content replication policy is crucial since, the content distribution can be limited by several factors in the network. Hence, we pro...
In this paper, we consider an efficient and resilient large file content push problem in a large-... more In this paper, we consider an efficient and resilient large file content push problem in a large-scale distributed Content Delivery Networks. Contents in CDN are replicated in many surrogate servers according to some content distribution strategies dictated by the application environment. Hence, we propose a novel content distribution policy to replicate the content from the origin server to a set of surrogate servers in an efficient and reliable manner. The contributions of this paper are twofold. First we introduce a novel Hybrid Replica (HR) algorithm and theoretically analyze its performance with traditional content replication algorithms. Then, by means of a simulation based performance evaluation, we assess the efficiency and resiliency of the proposed Hybrid Replica (HR), and compare its performance with traditional content replication algorithms as stated in the literature. We demonstrate in experiment that Hybrid Replica (HR) significantly reduces the file replication time ...
Content Distribution Networks (CDNs) are overlay networks for placing the content near the end cl... more Content Distribution Networks (CDNs) are overlay networks for placing the content near the end clients with the aim at reducing the delay, network congestion and balancing the workload, hence improving the service quality perceived by the end clients. The main objective of this work is to construct a semantic overlay network of surrogate servers based on equitable dominating set. This yields any replication algorithm that can replicate the contents to minimum number of surrogate servers within the SON. Such servers can be accessed from anywhere. Then we propose a content distribution algorithm named Optimal Fast Replica (O-FR) and apply our proposed algorithm to distribute the content over the Equitable Dominating set based Semantic Overlay Networks (EDSON). We analyze the performance of our proposed Optimal Fast Replica (O-FR) in terms of average replication time, and maximum replication time and compare its performance with existing content distribution algorithms named Fast Repli...
Journal of Computer Science, 2011
In this study, we considered an efficient and resilient large file content push problem in a larg... more In this study, we considered an efficient and resilient large file content push problem in a large scale distributed content delivery networks and investigated the Quality of Service (QoS) requirements for content distribution. We investigated the effect of equitable dominating set in SON formation and how it was useful in reducing the redundancy? Approach: At first, we constructed an equitable dominating set based semantic overlay network of surrogate servers to form the logical infrastructure of the CDN by choosing the optimal number of surrogate servers. Then we proposed a novel Efficient Fault Resilient Replica Algorithm (EFRRA) to replicate the content from the origin server to the dominant set of surrogate servers in an efficient and reliable manner. Results: We assessed the efficiency and resiliency of the proposed EFRRA algorithm by conducting simulation experiments and compared its performance with traditional content replication algorithms stated in the literature. We extended the simulation experiments to analyze the role of EDSON in maintaining uniform CDN utility of above 0.9. Conclusion: It also observed that equitable dominating set based SON was useful in keeping the average replication time stable and much more predictable. We also investigated the quality of service requirements for the content distribution and evaluated the performance of EDSON based CDN in terms of mean response time, mean CDN utility, latency and hit ratio percentage.
Journal of Computer Science, 2011
Problem statement: This study addressed the user's perceived quality of service requirements in c... more Problem statement: This study addressed the user's perceived quality of service requirements in content distribution and investigated the role of QoS. Aware Dominating set based Semantic Overlay Network (QADSON) in surrogate server selection to achieve the specified quality of service. Approach: At first, we constructed the QoS aware dominating set based semantic overlay network which was a virtual network of surrogate servers that was built on top of existing physical network with the purpose to implement new network services and features such as efficiency, exact-1 domination, controlled redundancy and fault tolerance that are not available in the existing network. We applied EFRRA content replication algorithm to disseminate the content among the surrogate servers and evaluated its performance in QADSON. Results: We assessed the efficiency, exact-1 domination, controlled redundancy and fault resiliency of QADSON in terms of mean response time, mean CDN utility, hit ratio percentage, rejection rate and CDN load. We extended the simulation experiments to analyze the role of QADSON in maintaining uniform CDN utility of above 0.95. Conclusion: We also investigated the quality of service requirements for the content distribution and evaluated performance of QADSON based CDN in terms of mean response time, latency, hit ratio percentage, mean CDN utility, rejection rate and CDN load.
Journal of Information Security and Applications
Journal of critical reviews, 2020
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortu... more Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of datasets provide an accuracy of about 99-100%.
The Journal of Contemporary Issues in Business and Government, Apr 30, 2021
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortu... more Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naïve Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of datasets provide an accuracy of about 99-100%.
Journal of critical reviews, 2020
Interdisciplinary Studies in Literature and Environment, 1996
... [15] K. Stamos, G. Pallis, A. Vakali, D. Katsaros, A. Sidiropoulos, Y. Manolopoulos: &quo... more ... [15] K. Stamos, G. Pallis, A. Vakali, D. Katsaros, A. Sidiropoulos, Y. Manolopoulos: "CDNsim ... He is currently doing his doctoral program from Anna University, Chennai. He is a member of CSI, IAEng, ISTE and Network Technology Group of TIFAC-CORE in Network Engineering. ...
Credit card extortion occasions happen often time and then bring about gigantic monetary misfortu... more Credit card extortion occasions happen often time and then bring about gigantic monetary misfortunes. Culprits can take advantage of some advancement, for example, phishing or Trojan to take another individual's credit card data. Furthermore, strong fraud identification technique is important to recognize the fraud in time when criminals use stolen cards. One strategy is to utilize historical transaction data to obtain normal and fraudulent transactions under the behavioural features of machine learning strategies, and the use of this feature is to verify whether the transaction is valid transaction or invalid transaction. This paper considers four different machine learning algorithms that are Support Vector Machine (SVM), Naive Bayes, K-Nearest Neighbor (KNN), and Random Forest to discipline the behavior of ordinary transactions and fraud features. Confusion matrix is utilized for estimating the performance analysis of the algorithms. Results obtained from the processing of da...
Journal of Networks, 2008
Recently overlay networks have emerged as an efficient and flexible method for content distributi... more Recently overlay networks have emerged as an efficient and flexible method for content distribution. An overlay network is a network running on top of another network, usually the Internet. This network is formed by a subset of underlying physical nodes. The connections between the overlay nodes are provided by overlay links, each of which is usually composed of one or more physical link. These networks are employed in many settings to provide logical communication infrastructure over an existing communication networks. The main objective of the overlay network is to reduce routing path lengths, stretched by the overlay routing process. In the existing solutions developed, a kind of fixed infrastructure in the form of excessive message exchange is necessary to guarantee good overlay properties. The scope of our effort is to construct an overlay network based on Dominating Set Theory to optimize the number of nodes for large data transfer. Fast Replica algorithm is applied to reduce the content transfer time for replicating the content within the semantic network. A dynamic parallel access scheme is introduced to download a file from different peers in parallel from the Semantic Overlay Network (SON), where the end users can access the members of the SON at the same time, fetching different portions of that file from different peers and reassembling them locally. That is, the load is dynamically shared among all the peers. To eliminate the need for retransmission requests from the end users, an enhanced digital fountain with Tornado codes is applied. Decoding algorithm at the receiver will reconstruct the original content. In this no feedback mechanisms are needed to ensure reliable delivery. This paper analyzes the performance of sequential unicast, multiple unicast and fast replica with tornado content distribution strategies in terms of content replication time and delivery ratio. This paper also analyzes the impact of dominating set theory for the construction of semantic overlay networks.
Content Distribution Networks (CDNs) are overlay networks for placing the content near end client... more Content Distribution Networks (CDNs) are overlay networks for placing the content near end clients with the aim at reducing delay, network congestion and balancing the workload, hence improving the service quality perceived by the end clients. The three major research issues in CDN are selection of surrogate server for replicating and retrieving the content, policies for replicating and retrieving the content, and caching. Among these research areas, once the surrogate server is selected for replication, any replication policy can replicate the content in optimal replication time. The main objective of this work is to construct a semantic overlay network of surrogate servers based on dominating set theory. This yields any replication algorithm that can replicate the contents to minimum number of surrogate servers within the SON. Such servers can access from anywhere. Then we propose a content distribution algorithm named Optimal Fast Replica (O-FR) and apply our proposed algorithm t...
Nowadays, content distribution is an important peer-to-peer application on the Internet that has ... more Nowadays, content distribution is an important peer-to-peer application on the Internet that has received considerable research attention. Content distribution applications typically allow personal computers to function in a coordinated manner as a distributed storage medium by contributing, searching, and obtaining digital content. The primary task in CDN is to replicate the contents over several mirrored web servers (i.e., surrogate servers) strategically placed at various locations in order to deal with the flash crowds. Geographically distributing the web servers’ facilities is a method commonly used by service providers to improve performance and scalability. Hence, contents in CDN are replicated in many surrogate servers according to some content distribution strategies dictated by the application environment. Devising an efficient and resilient content replication policy is crucial since, the content distribution can be limited by several factors in the network. Hence, we pro...
In this paper, we consider an efficient and resilient large file content push problem in a large-... more In this paper, we consider an efficient and resilient large file content push problem in a large-scale distributed Content Delivery Networks. Contents in CDN are replicated in many surrogate servers according to some content distribution strategies dictated by the application environment. Hence, we propose a novel content distribution policy to replicate the content from the origin server to a set of surrogate servers in an efficient and reliable manner. The contributions of this paper are twofold. First we introduce a novel Hybrid Replica (HR) algorithm and theoretically analyze its performance with traditional content replication algorithms. Then, by means of a simulation based performance evaluation, we assess the efficiency and resiliency of the proposed Hybrid Replica (HR), and compare its performance with traditional content replication algorithms as stated in the literature. We demonstrate in experiment that Hybrid Replica (HR) significantly reduces the file replication time ...
Content Distribution Networks (CDNs) are overlay networks for placing the content near the end cl... more Content Distribution Networks (CDNs) are overlay networks for placing the content near the end clients with the aim at reducing the delay, network congestion and balancing the workload, hence improving the service quality perceived by the end clients. The main objective of this work is to construct a semantic overlay network of surrogate servers based on equitable dominating set. This yields any replication algorithm that can replicate the contents to minimum number of surrogate servers within the SON. Such servers can be accessed from anywhere. Then we propose a content distribution algorithm named Optimal Fast Replica (O-FR) and apply our proposed algorithm to distribute the content over the Equitable Dominating set based Semantic Overlay Networks (EDSON). We analyze the performance of our proposed Optimal Fast Replica (O-FR) in terms of average replication time, and maximum replication time and compare its performance with existing content distribution algorithms named Fast Repli...
Journal of Computer Science, 2011
In this study, we considered an efficient and resilient large file content push problem in a larg... more In this study, we considered an efficient and resilient large file content push problem in a large scale distributed content delivery networks and investigated the Quality of Service (QoS) requirements for content distribution. We investigated the effect of equitable dominating set in SON formation and how it was useful in reducing the redundancy? Approach: At first, we constructed an equitable dominating set based semantic overlay network of surrogate servers to form the logical infrastructure of the CDN by choosing the optimal number of surrogate servers. Then we proposed a novel Efficient Fault Resilient Replica Algorithm (EFRRA) to replicate the content from the origin server to the dominant set of surrogate servers in an efficient and reliable manner. Results: We assessed the efficiency and resiliency of the proposed EFRRA algorithm by conducting simulation experiments and compared its performance with traditional content replication algorithms stated in the literature. We extended the simulation experiments to analyze the role of EDSON in maintaining uniform CDN utility of above 0.9. Conclusion: It also observed that equitable dominating set based SON was useful in keeping the average replication time stable and much more predictable. We also investigated the quality of service requirements for the content distribution and evaluated the performance of EDSON based CDN in terms of mean response time, mean CDN utility, latency and hit ratio percentage.
Journal of Computer Science, 2011
Problem statement: This study addressed the user's perceived quality of service requirements in c... more Problem statement: This study addressed the user's perceived quality of service requirements in content distribution and investigated the role of QoS. Aware Dominating set based Semantic Overlay Network (QADSON) in surrogate server selection to achieve the specified quality of service. Approach: At first, we constructed the QoS aware dominating set based semantic overlay network which was a virtual network of surrogate servers that was built on top of existing physical network with the purpose to implement new network services and features such as efficiency, exact-1 domination, controlled redundancy and fault tolerance that are not available in the existing network. We applied EFRRA content replication algorithm to disseminate the content among the surrogate servers and evaluated its performance in QADSON. Results: We assessed the efficiency, exact-1 domination, controlled redundancy and fault resiliency of QADSON in terms of mean response time, mean CDN utility, hit ratio percentage, rejection rate and CDN load. We extended the simulation experiments to analyze the role of QADSON in maintaining uniform CDN utility of above 0.95. Conclusion: We also investigated the quality of service requirements for the content distribution and evaluated performance of QADSON based CDN in terms of mean response time, latency, hit ratio percentage, mean CDN utility, rejection rate and CDN load.