- Network Security and Intrusion Detection
- Internet Traffic Analysis and Secure E-voting
- Advanced Malware Detection Techniques
- Software-Defined Networks and 5G
- IoT and Edge/Fog Computing
- Information and Cyber Security
- Smart Grid Security and Resilience
- Anomaly Detection Techniques and Applications
- Chemical Synthesis and Reactions
- Network Traffic and Congestion Control
- Inorganic and Organometallic Chemistry
- Blockchain Technology Applications and Security
- Network Packet Processing and Optimization
- Phenothiazines and Benzothiazines Synthesis and Activities
- Thermal and Kinetic Analysis
- Industrial Automation and Control Systems
- Structural Health Monitoring Techniques
- Traffic Prediction and Management Techniques
- Authorship Attribution and Profiling
- Caching and Content Delivery
- Advanced Data and IoT Technologies
- Data Mining Algorithms and Applications
- Advanced Queuing Theory Analysis
- Advanced MIMO Systems Optimization
- Evolutionary Algorithms and Applications
Punjabi University
2015-2024
Punjab Engineering College
2024
Galgotias University
2023
National Institute of Technology Hamirpur
2023
Infant
2022
Panjab University
2020-2021
Chitkara University
2020
Infosys (India)
2020
Institute of Engineering
2020
Yes Technologies (United States)
2020
Abstract In the information age where Internet is most important means of delivery plethora services, distributed denial‐of‐service (DDoS) attacks have emerged as one serious threat. Strategic, security, social, and financial implications these ceaselessly alarmed entire cyber community. To obviate a DDoS attack mitigate its impact, there an irrevocable prerequisite to accurately detect them promptly. An inherent challenge in addressing this issue efficiently distinguish from...
Millions of people worldwide suffer from diabetes, a chronic illness that must be identified early in order to effectively managed and complications avoided. Conventional diagnostic techniques depend on recurring clinical evaluations, which could postpone prompt action. This study investigates the use machine learning (ML) methods for diabetes detection electronic health records (EHRs). To increase predictive accuracy, we offer an optimized framework makes patient's medical history, test...
Diseases should be treated well and on time.If they are not time, can lead to many health problems these may become the cause of death.These becoming worse due scarcity specialists, practitioners facilities.In an effort address such problems, studies made attempts design develop expert systems which provide advice for physicians patients facilitate diagnosis recommend treatment patients.This review paper presents a comprehensive study medical various diseases.It provides brief overview...
In today's cyber world, the Internet has become a vital resource for providing plethora of services. Unavailability these services due to any reason leads huge financial implications or even consequences on society. Distributed Denial Service (DDoS) attacks have emerged as one most serious threats whose aim is completely deny availability different based legitimate users. The attackers compromise large number enabled devices and gain malicious control over them by exploiting their...
Intrusion Detection Systems (IDS) is used as a tool to detect intrusions on IT networks, providing support in network monitoring identify and avoid possible attacks. Most such approaches adopt Signature-based methods for detecting attacks which include matching the input event predefined database signatures. Signature based intrusion detection acts an adaptable device security safeguard technology. This paper discusses various their advantages; given set of signatures basic patterns that...
With all the brisk growth of web, distributed denial service attacks are becoming most serious issues in a data center scenarios where lot many servers deployed.A Distributed Denial Service attack generates substantial packets by large number agents and can easily tire out processing communication resources victim within very less period time.Defending DDoS problem involved several steps from detection, characterization trace back order todomitigation.The contribution this research paper is...
Cloud computing is one of the most quickly developing advances in today's IT environment. The cloud infrastructure links data and software from different geographically serving locations. In past few years, has developed as a contemporary platform for extremely scalable on-demand delivery. difficult challenge been assuring network's reliability. cloud, shared pool services such networks, servers, data, software, utilities are subject to many types intrusion attacks. Intrusion Detection...
In this digital era, Internet has become the most widely used media of communication. Numerous critical services like e-commerce, social media, online banking are based on Internet, so non-availability may lead financial, and legal implications. DDoS attacks serious attack that hampers availability Internet. Their major aim is to deny legitimate users. The current solutions defence not able handle these types sophisticated attacks. Application Layer DDoS(AL-DDoS) in-turn makes problem even...
This paper aims at imparting acquaintance to the researchers an insight into IoT metamorphosis from a security point of view. presents state-of-the-art apprehension botnet landscape with close analysis Mirai. We have elucidated characterization IoT-specific network behaviors such as limited endpoints, sleep time between packets, packet size, etc. that turned out be substantial efficacy contemporary learning algorithms, including neural networks. The algorithms been reliable efficient enough...
Traffic on the network is increasing immensely. Unprecedented development and close integration of devices for Internet Things (IoT) have contributed to an enormous amount data in recent years. A persistent concern detection prevention intrusions. In this paper, we analyzed Network Intrusion Detection System (NIDS) deployment, methodology, taxonomy attacks detected by a NIDS. The purpose study emphasize role NIDS confronting attacks. Deep Learning (DL), has significantly aided Machine (ML)...
Data dimensionality is increasing at a rapid rate, posing difficulties for traditional mining and learning algorithms. Commercial NIDS models make use of statistical measures to analyze feature sets including packet length, inter-arrival time, flow size, in addition other internet traffic parameters. Emerging algorithms must deal with diverse data. While multiple deep learning-based solutions exist the literature, their commercialization still its infancy. Currently available machine...