13 results on '"Hanumat G. Sastry"'
Search Results
2. DDoS Detection in SDN using Machine Learning Techniques
- Author
-
Madhushi Verma, Venkatadri Marriboyina, Sunil Kumar, Sahar Ahmed Idris, Manjit Kaur, Hammam A. Alshazly, and Hanumat G. Sastry
- Subjects
Biomaterials ,Mechanics of Materials ,business.industry ,Computer science ,Modeling and Simulation ,Denial-of-service attack ,Artificial intelligence ,Electrical and Electronic Engineering ,business ,Machine learning ,computer.software_genre ,computer ,Computer Science Applications - Published
- 2022
3. PBeiD Priority-based Information Dissemination Protocol for V2V Communication
- Author
-
Ravi Tomar, Manish Prateek, and Hanumat G. Sastry
- Subjects
World Wide Web ,Text mining ,Computer science ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Information Dissemination ,business ,Protocol (object-oriented programming) - Abstract
In Vehicular Ad-hoc Networks (VANET)s, efficient information dissemination plays a vital role in its successful deployment. Broadcasting has proven as one of the better ways for Information Dissemination over vehicular Networks, and cooperative behaviour among vehicles for information exchange is critical. However, the existing broadcast techniques are still suffering from multiple issues such as Broadcast storm problem, network partition problem, and network contention. Motivated from the aforementioned discussion, in this paper, we propose a Priority-based Efficient Information Dissemination Protocol (PBeiD) to improve the broadcast efficiency in VANETs. PBeiD protocol developed with a blend of probability and density-based information dissemination concepts and implemented in the testbed environment using simulation tools consisting of SUMO, OMNET++, and VEINS. The proposed protocol is compared with benchmark protocols, and the simulation is carried out based on different scenarios from sparse to dense. We found that our protocol is performing well in almost all the cases and to provide proper justification that our results are significant and not by chance, we applied statistical t-test on the results obtained.
- Published
- 2021
4. A Novel Protocol for Information Dissemination in Vehicular Networks
- Author
-
Hanumat G. Sastry, Ravi Tomar, and Manish Prateek
- Subjects
Broadcasting (networking) ,Vehicular ad hoc network ,business.industry ,Computer science ,Wireless ad hoc network ,Network partition ,business ,Broadcast radiation ,Dissemination ,Information exchange ,Networking hardware ,Computer network - Abstract
The Vehicular Ad Hoc Networks (VANETs) are rapidly emerging as we are moving towards autonomous and self-driving vehicles. Network hardware efficiency is growing day by day. However, optimal algorithms play a vital role in the effective utilization of the network. The need for supporting algorithm is vital. Cooperative network behavior is highly suitable for VANETs in comparison to infrastructure-based networks. The cooperation for active information exchange between vehicles is a prime requirement to provide safe, secure, and smoother experience on roads. Broadcasting is always the best way to disseminate information among all neighboring nodes in this kind of networks. However, broadcasting in VANET has multiple issues such as broadcast storm problem, network partition problem, network contention. The benefits of broadcasting inspire the presented research work and propose a solution as Priority Based Efficient Information Dissemination Protocol (PBEID). The work utilizes probability-based and density-based information dissemination using conventional broadcasting. The work has been compared with popular techniques for information dissemination and has been statistically proven significant.
- Published
- 2020
5. Review of solutions for securing end user data over cloud applications
- Author
-
Hanumat G. Sastry, Vinay Avasthi, Akashdeep Bhardwaj, and Gvb Subramanyam
- Subjects
World Wide Web ,General Computer Science ,business.industry ,Computer science ,End user ,Cloud computing ,Electrical and Electronic Engineering ,business ,Computer security ,computer.software_genre ,computer - Published
- 2016
6. A Review on VANET Routing Protocols and Wireless Standards
- Author
-
Hanumat G. Sastry, Manish Prateek, Ravi Tomar, and Gagandeep Singh
- Subjects
Vehicular ad hoc network ,Computer science ,Wireless ad hoc network ,business.industry ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,Wireless Routing Protocol ,020206 networking & telecommunications ,02 engineering and technology ,Mobile ad hoc network ,Link-state routing protocol ,Optimized Link State Routing Protocol ,Ad hoc On-Demand Distance Vector Routing ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Destination-Sequenced Distance Vector routing ,business ,Computer network - Abstract
The vehicular ad hoc network (VANET) is an ad hoc network system based on the concept of mobile ad hoc network (MANET) in which nodes (vehicle) that are being connected with each other by wireless technologies. But due to the non deterministic mobility behavior and high velocity of automobiles, the topology is unpredictable. Such types of system can work independently and can also be interconnected through internet with in its infrastructure. The system characteristics such as multi-hop paths, node mobility, huge network, device heterogeneity, congestion and bandwidth are the constraints in designing the routing protocols for VANET. The present routing protocols that have been deployed for MANET are used to test the VANET accuracy and performance. Present research efforts are strongly emphasized on designing a novel routing algorithm and its implementations. Recent VANET research are majorly focused on predefined areas such as broadcasting and routing, security, quality of service (QoS) and infotainment with information dissemination during emergencies. In this paper authors present a detailed review of wireless standards used in VANET with a number of trials in VANET and its deployment in many of the developed countries. As a conclusion we conceptualized some of the issues and research challenges in VANET that had not yet addressed so that industry can opt for widespread adoption of scalable, reliable, secure and robust VANET protocols, architectures services and technologies and enable the ubiquitous deployment of it.
- Published
- 2017
7. DDoS attacks, new DDoS taxonomy and mitigation solutions — A survey
- Author
-
Sam Goundar, G. V. B. Subrahmanyam, Hanumat G. Sastry, Akashdeep Bhardwaj, and Vinay Avasthi
- Subjects
020203 distributed computing ,021103 operations research ,Cloud computing security ,Computer science ,business.industry ,Application layer DDoS attack ,0211 other engineering and technologies ,Denial-of-service attack ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Work (electrical) ,Taxonomy (general) ,Server ,0202 electrical engineering, electronic engineering, information engineering ,business ,Trinoo ,computer - Abstract
Cloud computing has started to gain acceptance for adoption and implementation among organizations, however, this new technology area has already started to deal with security, performance and availability challenges. Within Cloud Security issues being paramount for the corporates, private enterprises, the denial of service attacks are rated as the highest priority threat to the cloud environments. This study presents a review on the academic literature research work on the DDoS attack on Cloud, introduces a new DDoS Classification taxonomy and proposes parameters for determining an effective DDoS solution.
- Published
- 2016
8. Design a Resilient Network Infrastructure Security Policy Framework
- Author
-
Hanumat G. Sastry, Vinay Avasthi, Akashdeep Bhardwaj, and G. V. B. Subrahmanyam
- Subjects
Network security ,Computer science ,media_common.quotation_subject ,Covert channel ,Cloud computing ,02 engineering and technology ,Security policy ,Computer security ,computer.software_genre ,Asset (computer security) ,Security testing ,Security information and event management ,Security engineering ,Information security management ,Application security ,0202 electrical engineering, electronic engineering, information engineering ,media_common ,Network architecture ,Multidisciplinary ,Cloud computing security ,business.industry ,020206 networking & telecommunications ,Information security ,Computer security model ,Application layer ,Security service ,Information security standards ,Software security assurance ,Network Access Control ,Security through obscurity ,Security convergence ,Network security policy ,Information security policy ,020201 artificial intelligence & image processing ,The Internet ,business ,computer ,Reputation - Abstract
The information security policy development life cycle tend to lack focus on use of standard terms and semantics. This results in blurred outlines for monitoring, evaluation and enforcement of the security policy for the employees causing confusion in adhering and implementing it which leads to lack of process of publishing form the security policy, end user awareness, translation of high level policy to lowest level component configuration plans and actions to take in time of crisis. This leads to the critical need for the designing an empirically tested, comprehensive security policy design. This paper proposes bridging the gap between the high level information security policy descriptions with the low level network infrastructure security implementation. Background Objectives: With new and innovative technologies such as Cloud, Remote computing, Enterprise Mobility, e-commerce on the rise, network security has remained an ever increasing challenge. This paper presents a security framework to bridge the gap between high level specification requirements and the low level implementation phase for network infrastructure security using the network architecture model with the security policies associated with the network components required to be enforced. Methods/Statistical Analysis: To achieve the framework design, architectural model and a set of design-level security policies are taken into consideration. Also discussed are the advantages and desired characteristics of the model, relating to existing process worked in the design area; and future research directions are pointed. Findings: The current information security policy development life cycle tends to have few disadvantages with the most critical being the overall lack of view of the policy. Typically a narrow view can be found when focusing only on development of the security policy documents and not including the actual practices for implementation or even maintenance of the security policies. This process does not address how the security policy would be development and enforced or even evaluated. The life cycle designs usually focus on policy for development instead of focusing on development process of the information security policy. Application: Utilizing Hybrid cloud architecture design so that internet facing tiers tend to be public clouds and internal secure applications and database tend to be private clouds. This change in network architecture helps take on the volumetric network and application layer DDoS attacks to ensure the traffic reaching the internal network tiers is free from such attackers. Using Rate controls, built-in intelligent WAFs, Client Reputation monitoring, be used in combination as part of a comprehensive defense against all types and sizes of cyber threats.
- Published
- 2016
9. Ransomware Digital Extortion: A Rising New Age Threat
- Author
-
Hanumat G. Sastry, Vinay Avasthi, Akashdeep Bhardwaj, and G. V. B. Subrahmanyam
- Subjects
Multidisciplinary ,Record locking ,Computer science ,business.industry ,020206 networking & telecommunications ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,URL redirection ,World Wide Web ,Cryptovirology ,Ransom ,0202 electrical engineering, electronic engineering, information engineering ,Ransomware ,Malware ,020201 artificial intelligence & image processing ,The Internet ,business ,computer - Abstract
Imagine what would happen if you were stopped from accessing your own files or accessing your own computer system. Now imagine further if to get back the access someone demanded ransom amount from you. Globally increasingly social interactions and financial transactions involve few critical aspects such as digital data, computing device and the internet. This is an area where Ransomware has spread and become a major concern against digital extortion in the form of a new age threat vector to corporates and end users alike. This paper presents the various ways and methods adopted by cyber criminals against Ransomware and present an anti-malware detection system. Background/Objectives: The impact of Ransomware has caused immense damage to end users and corporates alike. Access to authorized data being blocked and being released only after the ransom demand has been mate, is a new age digital extortion has which holds promise as a viable option against the cyber-attacks on user systems, mobiles and handhelds. Methods/Statistical Analysis: The authors reviewed existing Crypto and Locker ransomware, studying their propagation, attack techniques and new emerging threat vectors as file Encryption Ransomware, Screen Lock Ransomware, Windows & Browser Lock, Pop Advertisements and URL Redirection. The authors also designed and tested cloud based malware detection system, performing comparison evaluation with and without the proposed anti-malware solution in form of sandboxes, so even if the environment got compromised, it could be easily decommissioned and rebuilt from a fresh clean virtual snapshots. The system comprised of three virtual environments running services for Malware Behavioral Analysis, Malware Code Analysis and Malware Reporting. Open source and commercial tools were used in each of the three environments. Malware Behavioral environment for analyzing malware for before and after receiving malware payload files and logs from infected user devices. Malware Code Analysis gathered assembly code and memory dumps from memory and performed analysis on malware payload instructions. The Reporting environment analyzed Web URL proactively for malicious sites hosting malware code or payloads and also checked the user system and devices for before and after analysis logs. Findings: When comparing to the standard antivirus scanners that rely on signatures, the proposed malware detection and alerting process has better malware mitigation results and advantages. The Anti-Malware scanning security apart from being a cloud service with the secure scanners operating from cloud platforms display a high level of resilience. Being a Cloud application has the standard cloud feature advantages of being elastic, scalable, pay-as-you-use, user driven cloud model. This model can also help in saving costs by promoting the BYOD concept. Application/Improvements: The Anti-Malware cloud model can be modified to offer specific payload blocking for different customers even as other customers of that very application program are able to access them and even benefit from experience of the infected customers. This model can be scale up dynamically as required.
- Published
- 2016
10. Solutions for DDoS attacks on cloud
- Author
-
Hanumat G. Sastry, Vinay Avasthi, G. V. B. Subrahmanyam, and Akashdeep Bhardwaj
- Subjects
Service (business) ,Cloud computing security ,business.industry ,End user ,Computer science ,Application layer DDoS attack ,Internet privacy ,Denial-of-service attack ,Cloud computing ,Computer security ,computer.software_genre ,ComputingMilieux_MANAGEMENTOFCOMPUTINGANDINFORMATIONSYSTEMS ,The Internet ,business ,Trinoo ,computer - Abstract
The internet has become the key driver for virtually every organization's growth, brand awareness and operational efficiency. Unfortunately cyber terrorists and organized criminals know this fact too. Using a Distributed Denial of Service attack they can deny corporates and end users the access to internet, make web site going slow, and deny access to corporate network and data, unable to service legitimate users. It is not just these that are vulnerable, DDoS attacks are diversions.
- Published
- 2016
11. User Interface Design Challenges for Digital Libraries
- Author
-
Hanumat G. Sastry, G. Manjunath, and Lokanatha C. Reddy
- Subjects
Interactivity ,User experience design ,Multimedia ,Human–computer interaction ,Computer science ,business.industry ,Shell (computing) ,User interface ,business ,computer.software_genre ,Digital library ,computer ,User interface design - Published
- 2011
12. Three Tier Network Architecture to mitigate DDoS Attacks on Hybrid Cloud Environments
- Author
-
Hanumat G. Sastry, Akashdeep Bhardwaj, Vinay Avasthi, and G. V. B. Subrahmanyam
- Subjects
FOS: Computer and information sciences ,Computer Science - Cryptography and Security ,Computer science ,Computer Science - Information Theory ,050801 communication & media studies ,Cloud computing ,Denial-of-service attack ,02 engineering and technology ,Computer Science - Networking and Internet Architecture ,0508 media and communications ,0202 electrical engineering, electronic engineering, information engineering ,Networking and Internet Architecture (cs.NI) ,Network architecture ,business.industry ,Hosting environment ,Cloud systems ,Information Theory (cs.IT) ,05 social sciences ,ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS ,020206 networking & telecommunications ,Cloud service provider ,Network planning and design ,Application firewall ,business ,Cryptography and Security (cs.CR) ,Computer network - Abstract
Connecting the wired and wireless networks particularly the Mobile ad hoc Network is interesting in real world situations due to its usefulness and practicality. Different mechanisms have been proposed to integrate MANETs and the Internet. These strategies differ in gateway discovery mechanism, cell switching criteria, ad hoc routing protocol.In this paper, Mobile-IP is integrated with Hierarchical Cluster-Head Gateway Switch Routing (CGSR) Protocol to provide Internet access to the mobile node of the ad hoc Network. This paper discusses a mechanism for selecting an alternate route in case if the Cluster Head is unable to forward the packets to the destination. The proposed framework provides bi-directional connectivity between the MANET and the Internet nodes. A detailed performance comparison is made between the proposed approach and the other three-tier strategies based on mobility of cluster heads and cluster gateways and other network parameters. The experimental results indicate that the proposed architecture has better packet delivery ratio, end-end delay and mobile node-gateway connectivity ratio for providing full bi-directional connectivity., Comment: This paper has been withdrawn by the author due to a crucial sign error in the findings and paper
- Published
- 2015
- Full Text
- View/download PDF
13. Security Algorithms for Cloud Computing
- Author
-
Hanumat G. Sastry, Akashdeep Bhardwaj, Vinay Avasthi, and G. V. B. Subrahmanyam
- Subjects
3DES ,Computer science ,Distributed computing ,Asymmetric ,Cryptography ,Cloud computing ,02 engineering and technology ,Computer security ,computer.software_genre ,Public-key cryptography ,RSA ,0202 electrical engineering, electronic engineering, information engineering ,RC6 ,General Environmental Science ,Computer Science::Cryptography and Security ,Cloud computing security ,AES ,business.industry ,020206 networking & telecommunications ,Information security ,Symmetric ,MD5 ,Symmetric-key algorithm ,General Earth and Planetary Sciences ,020201 artificial intelligence & image processing ,Link encryption ,business ,Algorithm ,computer ,Security Algorithm - Abstract
With growing awareness and concerns regards to Cloud Computing and Information Security, there is growing awareness and usage of Security Algorithms into data systems and processes. This paper presents a brief overview and comparison of Cryptographic algorithms, with an emphasis on Symmetric algorithms which should be used for Cloud based applications and services that require data and link encryption. In this paper we review Symmetric and Asymmetric algorithms with emphasis on Symmetric Algorithms for security consideration on which one should be used for Cloud based applications and services that require data and link encryption.
- Full Text
- View/download PDF
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.