scispace - formally typeset

Author

R. Thandeeswaran

Bio: R. Thandeeswaran is an academic researcher from VIT University. The author has contributed to research in topic(s): Cloud computing & Denial-of-service attack. The author has an hindex of 5, co-authored 12 publication(s) receiving 59 citation(s).
Papers
More filters

Book
N. Jeyanthi1, R. Thandeeswaran1Institutions (1)
01 Feb 2017
TL;DR: Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology.
Abstract: Security Breaches and Threat Prevention in the Internet of Things provides a comprehensive examination of the latest strategies and methods for tracking and blocking threats within industries that work heavily with this technology. Featuring chapters on emerging topics such as security threats in autonomous vehicles, digital forensics, secure communications, and image encryption, this critical reference source is a valuable tool for all academicians, graduate students, practitioners, professionals, and researchers who are interested in expanding their knowledge of security practices pertaining to the Internet of Things.

13 citations


Journal ArticleDOI
TL;DR: Performance analysis, cost analysis and cost-performance ratio analysis are done by comparing different cluster configurations, and high security is provided at this point for data using AES algorithm and also a password protection key for privileged user’s access.
Abstract: Cloud computing is a model where software applications and computing resources are accessed over Internet with minimal cost and effort by interacting with the service provider. Along with these benefits there are also some significant security concerns that need to be addressed for handling sensitive data and critical applications. The simultaneous use of multiple clouds can provide several potential benefits, such as high availability, fault tolerance and reduced infrastructural cost. The model proposed which is the implementation of a secured multi-cloud virtual infrastructure consists of a grid engine on top of the multi-cloud infrastructure to distribute the task among the worker nodes that are supplied with various resources from different clouds to enhance cost efficiency of the infrastructure set up and also to implement high availability feature. The Oracle grid engine is used to schedule the jobs to the worker nodes (in-house and cloud). Worker nodes will be acting like listeners to receive the job from the oracle grid engine master node. High security is provided at this point for data using AES algorithm and also a password protection key for privileged user’s access. Performance analysis, cost analysis and cost-performance ratio analysis are done by comparing different cluster configurations.

10 citations


Journal ArticleDOI
TL;DR: A Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack, which detects the attack at an earlier stage and also helps to prevent from further attacks.
Abstract: Voice over Internet Protocol VoIP is a family of technologies for the transmission of voice over Internet. Voice is converted into digital signals and transmitted as data packets. The Session Initiation Protocol SIP is an IETF protocol for VoIP and other multimedia. SIP is an application layer protocol for creating, modifying and terminating sessions in VoIP communications. Since SIP is a more flexible and simple protocol, it is quite easy to add features to it. Distributed Denial of Service Attack DDoS floods the server with numerous requests from various hosts. Hence, the legitimate clients will not be able to get their intended services. A major concern in VoIP and almost in all network domains is availability rather than data consistency. Most of the surviving techniques could prevent VoIP network only after collision. This paper proposes a Recurrence Quantification based approach to detect and prevent VoIP from a DDoS attack. This model detects the attack at an earlier stage and also helps to prevent from further attacks. In addition, this techniques enables the efficient utilization of resources. QUALNET has been used to simulate the operation of the proposed technology.

9 citations


03 Dec 2016
TL;DR: DPCA is proposed, an authentication at two different phases, where only man is allowed to access the cloud resources, he is authenticated with Dempster Shafter hypothetical approach combined with the user intent and not the content.
Abstract: Every user appreciates the security of their datairrespective of its sensitivity. At the same time, user does not wantto be held up with the legacy systems, which may be stronglysecured but not with fantasy. Network travelled many phases of itsown such as internet, intranet, wireless network, sensor network,Ad-hoc network, Mobile network, Blue-tooth, Cloud and IoT, themost popular technique now. Hence, whatever the type of networkhitting the end user with improvised quality, get compromised insecurity.People feel pleasure upon sharing their moments with theirconnections. Huge amount of data are in transit either by means ofstoring them in cloud or retrieving. Users lose control over theirdata, they are unaware about the people accessing and modifying.Hence DataCentres have to be protected from unauthorized illegalaccess. Illegal data access may be initiated by a boot or a bot. Manor a Machine discrimination has been resolved with CAPTCHA.This paper, DPCA, proposes an authentication at two differentphases. In the first phase, the user is authenticated with the newtype of CAPTCHA. With this methodology, user is segregated asman or machine. Thereby bot-nets are filtered out and the floodingmessages from bots are mitigated. In the second phase, where onlyman is allowed to access the cloud resources, he is authenticatedwith Dempster Shafter hypothetical approach combined with theuser intent and not the content. DPCA has been tested in theinfrastructure and the experimental results proved the strength ofthe algorithm.

6 citations


Proceedings ArticleDOI
17 Jun 2014
TL;DR: This paper lights up on security without compromising quality of service because Secure Cloud based Telemedicine (SCT) uses Cloud which could free the people from administrative and accounting burdens.
Abstract: Telemedicine started its journey and successful deployment over several decades. But still it could not mark a remarkable contribution to neither rural nor urban areas. People realized its impact when it saved a life from becoming an extinct. Telemedicine connects patient and specialized doctors remotely and also allows them to share the sensitive medical records. Irrespective of the mode of data exchange, all types of media are vulnerable to security and performance issues. Remote data exchange during an emergency situation should not be delayed and at the same time should not be altered. While transit, a single bit change could be interpreted differently at the other end. Hence telemedicine comes with all the challenges of performance and security issues. Delay, cost and scalability are the pressing performance factors whereas integrity, availability and accountability are the security issues need to be addressed. This paper lights up on security without compromising quality of service. Telemedicine is on track from standard PSTN, wireless Mobile phones and satellites. Secure Cloud based Telemedicine (SCT) uses Cloud which could free the people from administrative and accounting burdens.

6 citations


Cited by
More filters

Journal ArticleDOI
TL;DR: This paper provides a systematic review of technological growth in eHealth services and analyzes the role of four important technologies, namely, satellite, internet, mobile, and cloud for providing health services.
Abstract: The infusion of information communication technology (ICT) into health services is emerging as an active area of research. It has several advantages but perhaps the most important one is providing medical benefits to one and all irrespective of geographic boundaries in a cost effective manner, providing global expertise and holistic services, in a time bound manner. This paper provides a systematic review of technological growth in eHealth services. The present study reviews and analyzes the role of four important technologies, namely, satellite, internet, mobile, and cloud for providing health services.

36 citations


Journal ArticleDOI
TL;DR: To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes.
Abstract: The Internet of Things (IoT) brings a set of unique and complex challenges to the field of digital forensics. To take advantage of the volume and variety of data captured by and stored in ubiquitous IoT services, forensic investigators need to draw upon evidence-acquisition methods and techniques from all areas of digital forensics and possibly create new IoT-specific investigation processes. Although a number of conceptual process models have been developed to address the unique characteristics of the IoT, many challenges remain unresolved.

29 citations


Journal ArticleDOI
Muhammad Ali Akbar1, Muddassar Farooq1Institutions (1)
TL;DR: This paper proposes an accurate and real-time attack classification system that detects: (1) application layer SIP flood attacks that result in denial of service (DoS) and distributed DoS attacks, and (2) Spam over Internet Telephony (SPIT).
Abstract: Security of session initiation protocol (SIP) servers is a serious concern of Voice over Internet (VoIP) vendors. The important contribution of our paper is an accurate and real-time attack classification system that detects: (1) application layer SIP flood attacks that result in denial of service (DoS) and distributed DoS attacks, and (2) Spam over Internet Telephony (SPIT). The major advantage of our framework over existing schemes is that it performs packet-based analysis using a set of spatial and temporal features. As a result, we do not need to transform network packet streams into traffic flows and thus save significant processing and memory overheads associated with the flow-based analysis. We evaluate our framework on a real-world SIP traffic—collected from the SIP server of a VoIP vendor—by injecting a number of application layer anomalies in it. The results of our experiments show that our proposed framework achieves significantly greater detection accuracy compared with existing state-of-the-art flooding and SPIT detection schemes.

23 citations


Proceedings ArticleDOI
Asma Zahra1, Munam Ali Shah1Institutions (1)
01 Sep 2017
TL;DR: This paper evaluates ransomware attacks statistics for the past 2 years and the present year to estimate growth rate of the most emerging ransomware families from the last 3 years to evaluate most threatening ransomware attacks for IoT and presents a Cryptowall ransomware attack detection model based on the communication and behavioral study of cryptowall for IoT environment.
Abstract: Internet of things (IoT) is internetworking of various physical devices to provide a range of services and applications. IoT is a rapidly growing field, on an account of this; the security measurements for IoT should be at first concern. In the modern day world, the most emerging cyber-attack threat for IoT is ransomware attack. Ransomware is a kind of malware with the aim of rendering a victim's computer unusable or inaccessible, and then asking the user to pay a ransom to revert the destruction. In this paper we are evaluating ransomware attacks statistics for the past 2 years and the present year to estimate growth rate of the most emerging ransomware families from the last 3 years to evaluate most threatening ransomware attacks for IoT. Growth rate results shows that the number of attacks for Cryptowall and locky ransomware are notably increasing therefore, these ransomware families are potential threat to IoT. Moreover, we present a Cryptowall ransomware attack detection model based on the communication and behavioral study of Cryptowall for IoT environment. The proposed model observes incoming TCP/IP traffic through web proxy server then extracts TCP/IP header and uses command and control (C&C) server black listing to detect ransomware attacks.

21 citations


Journal ArticleDOI
TL;DR: Different type of possible network attacks and detection mechanisms proposed by various researchers that are capable of detecting such attacks are reviewed.
Abstract: With the development of large open networks, security threats for the network have increased significantly in the past few years. Different types of attacks possess different types of threats to network and network resources. Many different detection mechanisms have been proposed by various researchers. This paper reviews different type of possible network attacks and detection mechanisms proposed by various researchers that are capable of detecting such attacks. General Terms Network resources, open network, security threats for network

11 citations


Network Information
Related Authors (2)
N. Jeyanthi

52 papers, 307 citations

98% related
M.A. Saleem Durai

30 papers, 201 citations

93% related
Performance
Metrics

Author's H-index: 5

No. of papers from the Author in previous years
YearPapers
20202
20171
20162
20151
20143
20121