scispace - formally typeset
K

Krishan Kumar

Researcher at University Institute of Engineering and Technology, Panjab University

Publications -  229
Citations -  2948

Krishan Kumar is an academic researcher from University Institute of Engineering and Technology, Panjab University. The author has contributed to research in topics: Denial-of-service attack & The Internet. The author has an hindex of 25, co-authored 205 publications receiving 2058 citations. Previous affiliations of Krishan Kumar include Shaheed Bhagat Singh State Technical Campus & Indian Institutes of Technology.

Papers
More filters
Journal ArticleDOI

Face mask detection using YOLOv3 and faster R-CNN models: COVID-19 environment.

TL;DR: In this paper, two state-of-the-art object detection models, namely, YOLOv3 and faster R-CNN, are used to detect face masks.
Journal ArticleDOI

The use of artificial intelligence based techniques for intrusion detection: a review

TL;DR: Various AI based techniques focusing on development of Intrusion detection system (IDS) have been reviewed and related studies have been compared by their source of audit data, processing criteria, technique used, dataset, classifier design, feature reduction technique employed and other experimental environment setup.
Journal ArticleDOI

D-FACE: An anomaly based distributed approach for early detection of DDoS attacks and flash events

TL;DR: An ISP level distributed, flexible, automated, and collaborative (D-FACE) defense system which not only distributes the computational and storage complexity to the nearest point of presence routers but also leads to an early detection of DDoS attacks and flash events.
Journal ArticleDOI

Detection of DDoS attacks and flash events using novel information theory metrics

Sunny Behal, +1 more
- 07 Apr 2017 - 
TL;DR: A generalized detection algorithm has been proposed which uses the entropy difference between traffic flows to detect different types of DDoS attacks and FEs.
Proceedings ArticleDOI

A Distributed Approach using Entropy to Detect DDoS Attacks in ISP Domain

TL;DR: It is proposed to distribute these overheads amongst all POPs of the ISP using an ISP level traffic feature distribution based approach and the comparison with volume based approach clearly indicates the supremacy of the proposed methodology.