scispace - formally typeset
Search or ask a question
Author

Sureswaran Ramadass

Bio: Sureswaran Ramadass is an academic researcher from Universiti Sains Malaysia. The author has contributed to research in topics: Network packet & The Internet. The author has an hindex of 14, co-authored 93 publications receiving 976 citations.

Papers published on a yearly basis

Papers
More filters
Proceedings ArticleDOI
18 Jun 2009
TL;DR: A survey of botnet and botnet detection techniques is presented, which clarifies botnet phenomenon and discusses botnets detection techniques, and summarizes bot network detection techniques in each class and provides a brief comparison.
Abstract: Among the various forms of malware, botnets are emerging as the most serious threat against cyber-security as they provide a distributed platform for several illegal activities such as launching distributed denial of service attacks against critical targets, malware dissemination, phishing, and click fraud. The defining characteristic of botnets is the use of command and control channels through which they can be updated and directed. Recently, botnet detection has been an interesting research topic related to cyber-threat and cyber-crime prevention. This paper is a survey of botnet and botnet detection. The survey clarifies botnet phenomenon and discusses botnet detection techniques. This survey classifies botnet detection techniques into four classes: signature-based, anomaly-based, DNS-based, and mining-base. It summarizes botnet detection techniques in each class and provides a brief comparison of botnet detection techniques.

356 citations

Journal ArticleDOI
TL;DR: The proposed framework, Phishing Evolving Neural Fuzzy Framework (PENFF), has proved its ability to detect phishing emails by decreasing the error rate in classification process.
Abstract: One of the broadly used internet attacks to deceive customers financially in banks and agencies is unknown “zero-day” phishing Emails “zero-day” phishing Emails is a new phishing email that it has not been trained on old dataset, not included in black list. Accordingly, the current paper seeks to Detection and Prediction of unknown “zero-day” phishing Emails by provide a new framework called Phishing Evolving Neural Fuzzy Framework (PENFF) that is based on adoptive Evolving Fuzzy Neural Network (EFuNN). PENFF does the process of detection of phishing email depending on the level of features similarity between body email and URL email features. The totality of the common features vector is controlled by EFuNN to create rules that help predict the phishing email value in online mode. The proposed framework has proved its ability to detect phishing emails by decreasing the error rate in classification process. The current approach is considered a highly compacted framework. As a performance indicator; the Root Mean Square Error (RMSE) and Non-Dimensional Error Index (NDEI) has 0.12 and 0.21 respectively, which has low error rate compared with other approaches Furthermore, this approach has learning capability with footprint consuming memory."

40 citations

Journal ArticleDOI
TL;DR: Local network security phenomenon and the current defense methods on the IPv6 link local network security vulnerability mitigations are surveyed.
Abstract: IPv6 is a network layer protocol of the OSI reference model. IPv6 uses the Neighbor Discovery Protocol (NDP) that works on link local scope of IPv6 network. NDP covers host initialization and address auto configuration that is one of IPv6 advantages and other important functionalities. IPv6 mandates to support Internet Protocol Security (IPSec) for end-to-end communication security. However, this security protocol does not cover the link local communication that uses NDP. It is important to consider the link local security issues as the Internet being an open network is vulnerable to be exploited by attackers from both outside and inside the network. In addition, most of the security mechanisms typically block external threats but are relatively vulnerable to the threats originating from internal network. Thus, understanding the threat and vulnerability in the local network is very important. This paper surveys local network security phenomenon and the current defense methods on the IPv6 link loca...

39 citations

Journal ArticleDOI
TL;DR: In this article, the authors identified the use of Internet among Malaysian youth and the relation of excessive use to the addictive level and devised an online survey to study the Internet use among the youth; the findings indicate that the youth are indeed susceptible to Internet addiction.
Abstract: The Internet started as a divine gift to the human society, it was meant to enlighten the human society by transferring knowledge, making available all the information needed for human well being, growth and prosperity. But as the Internet grew, it created its own set of problems—one of the key ones being Internet Addiction. According to Dr. Jerald J. Block, from the Center for Internet Addiction, “Internet addiction” affects as many as one in eight Americans. Block also defined Internet addiction as a compulsive activity involving excessive use, withdrawal and negative repercussions including social isolation, lying, low achievement and fatigue. As the Internet grows in Malaysia, Internet addiction is surfacing as a key problem, particularly amongst the younger generation here. This research outlines a method to examine the level of Internet addiction amongst Malaysian youth. The purpose of our study is to identify the use of Internet among Malaysian youth and the relation of excessive use to the addictive level. We have devised an online survey to study the Internet use among the youth; the findings of this study indicate that the youth are indeed susceptible to Internet addiction.

33 citations

Proceedings ArticleDOI
13 Nov 2009
TL;DR: The proposed flow based botnet detection system tackles issues by combining data mining and visualization by aggregating to detect malicious traffic via visualization.
Abstract: Botnet is one of the most recent tools used in cyber-crime including Distributed Denial of Service attacks, phishing, spamming, and spying on remote computers. These days, governments, business, and individuals are facing catastrophic damages caused by hackers using malicious botnets. It is a major challenge for cyber-security research community to combat the emerging threat of botnets. Current network intrusion detection methods based on anomaly detection approaches suffer from fairly high error rate and low performance. The proposed flow based botnet detection system tackles these issues by combining data mining and visualization. The anomalous data is passed to several trust models, and the flows are re-evaluated to obtain their trustfulness, which is then aggregated to detect malicious traffic via visualization. The visualized information will be analyzed by human intellectual and conceptual ability to gain useful knowledge about botnet activities for further precaution and validation.

29 citations


Cited by
More filters
Journal Article
TL;DR: In this article, a professional services was launched having a hope to serve as a total on the internet electronic catalogue that gives usage of many PDF file guide assortment, including trending books, solution key, assessment test questions and answer, guideline sample, exercise guideline, test test, customer guide, user guide, assistance instruction, repair guidebook, etc.
Abstract: Our professional services was launched having a hope to serve as a total on the internet electronic catalogue that gives usage of many PDF file guide assortment. You will probably find many different types of e-guide as well as other literatures from our paperwork database. Distinct preferred topics that spread on our catalog are trending books, solution key, assessment test questions and answer, guideline sample, exercise guideline, test test, customer guide, user guide, assistance instruction, repair guidebook, etc.

6,496 citations

01 Jan 2007
TL;DR: In this paper, the authors provide updates to IEEE 802.16's MIB for the MAC, PHY and asso-ciated management procedures in order to accommodate recent extensions to the standard.
Abstract: This document provides updates to IEEE Std 802.16's MIB for the MAC, PHY and asso- ciated management procedures in order to accommodate recent extensions to the standard.

1,481 citations

Journal ArticleDOI
TL;DR: An overview of the most exploited vulnerabilities in existing hardware, software, and network layers is presented and critiques of existing state-of-the-art mitigation techniques as why they do or don't work are described.

523 citations

Journal ArticleDOI
TL;DR: A comprehensive review that broadly discusses the botnet problem, briefly summarizes the previously published studies and supplements these with a wide ranging discussion of recent works and solution proposals spanning the entire botnet research field is presented.

368 citations