Computer Science And Technology - Research Publications
Permanent URI for this collectionhttps://kr.cup.edu.in/handle/32116/82
Browse
7 results
Search Results
Item Handover between Wi-Fi and WiMAX technologies using GRE tunnel(Springer, 2019) Aimen, Aroof; Hamid,, S; Ahmad, S; Chisti, M.A; Khurana, Surinder Singh; Kaur, AmandeepThe next era of wireless grid inclines to be heterogeneous in the composition, i.e., wireless technologies like Wi-Fi and WiMAX networks desire co-breathe, so there is a demand for the best utilization of the accessible mixed chains. This paper considers the issue of handover between Wi-Fi and WiMAX grids with seamless connectivity. For this, first, a mobile terminal that abuts both IEEE 802.11 and IEEE 802.16 technologies was designed in the simulator. The developed mobile node was then introduced in the simulation scenario to study the various metrics. Second, we present the incorporation of GRE tunnel between the home agent and base stations for doing away with latency and packet drop and thereby improving the MOS value of the interest of consumers, giving impetus to efficiency day instant and day forth. © 2019, Springer Nature Singapore Pte Ltd.Item TempR: Application of Stricture Dependent Intelligent Classifier for Fast Flux Domain Detection(Modern Education and Computer Science Press, 2016) Chahal, Prabhjot Singh; Khurana, Surinder SinghFast-flux service networks (FFSN) helps the cyber-criminals to hide the servers used for malicious activities behind a wall of proxies (bots). It provides the reliability and detection evasion to a malicious server. FFSN use a large pool of IP addresses for proxies. Detection of FFSN is difficult as few benign technologies like Content distribution networks and round robin DNS have similar working characteristics. Many approaches have been proposed to detect FFSN and fast flux domains. However, due to dynamic behavior of FFSN, these techniques suffer from a significant number of false positives. In this paper, we present a Temporal and Real time detections based approach (TempR) to detect fast flux domains. The features of fast flux domains and benign domains have been collected and classified using intelligent classifiers. Our technique illustrates 96.99% detection accuracy with the recent behavior of fast flux domains.Item SLA Aware Approach for Virtual Machine Placement in Cloud Datacenter(Publishing India, 2014) Khurana, Surinder Singh; Kaur, NirmaljeetThe massive adoption of cloud computing by IT industry has caused a dramatic increase in energy consumption and its impact on the environment in terms of carbon footprints. The high cost of energy and link between energy consumption and carbon emission have raised an issue of energy management. Recently, a number of approaches have been proposed to address this issue. Most of these approaches are based upon the proper utilization of the resources. On the other side, to avoid Service Level Agreement (SLA) violations, the servers deployed in data centres can be utilized up to a maximum threshold value. To avoid SLA violation, some virtual machines (VMs) will be migrated from over utilized hosts. Although there are many techniques to select such VMs that can be migrated, but no technique considers Service Level Agreement parameters while selecting such machines. In this paper, SLA based approach to select VMs to migrate from overloaded host has been purposed. The purposed approach will work on the basis of VM categories that are negotiated in service level agreement. The simulation results demonstrate that the proposed approach demands slightly more energy than the other efficient technique (Minimization of Migration). However, it reduces the cost paid in lieu of SLA violation as it reduces SLA violations belonging to VM categories for which SLA violation penalties are higher.Item SHED: Spam Ham Email Dataset(International Journal on Recent and Innovation Trends in Computing and Communication (, 2017) Sharma, Upasana; Khurana, Surinder SinghAutomatic filtering of spam emails becomes essential feature for a good email service provider. To gain direct or indirect benefits organizations/individuals are sending a lot of spam emails. Such kind emails activities are not only distracting the user but also consume lot of resources including processing power, memory and network bandwidth. The security issues are also associated with these unwanted emails as these emails may contain malicious content and/or links. Content based spam filtering is one of the effective approaches used for filtering. However, its efficiency depends upon the training set. The most of the existing datasets were collected and prepared a long back and the spammers have been changing the content to evade the filters trained based on these datasets. In this paper, we introduce Spam Ham email dataset (SHED): a dataset consisting spam and ham email. We evaluated the performance of filtering techniques trained by previous datasets and filtering techniques trained by SHED. It was observed that the filtering techniques trained by SHED outperformed the technique trained by other dataset. Furthermore, we also classified the spam email into various categories.Item Recovery Based Architecture To Protect Hids Log Files Using Time Stamps(ACADEMY PUBLISHER, 2010) Khurana, Surinder Singh; Bansal, Divya; Sofat, SanjeevAfter the great revolution in the field of Information Technology, many applications made necessity to run computer systems (either servers or client machines) all the time. Along with improvements and new inventions in technology, the threat of attacks through computer networks becomes a large issue. Host Based Intrusion Detection is a part of security system that protects hosts from various kinds of attacks. It also provides a great degree of visibility (of system activities). It is quite widest that HIDS are vulnerable to attacks. An adversary, if successfully enters in a system can disable HIDS or modify HIDS rules to hide its existence. One can easily evade HIDS. In [7] we propose a new architecture that protects HIDS from such attacks. In this paper, we have proposed a new mechanism to check integrity of log files. We have discussed its affects on performance of system.Item GRAY HOLE ATTACK ON HYBRID 5G NETWORK(International Journal of Advanced Research in Computer Science, 2017) Bhan, Anshu; Khurana, Surinder Singh5G device to device communication is such a product of progressive thinking, a network that uses both LTE communication scenario in conjugation with Wi-Fi low band communication. The main idea for conjunction of two different types of network is based on the fact that base stations suffer large amount of traffic and tend to drop data and information in such cases. Apart from these facts another main stream goal is to provide security for such a communication technology. The network is based on the transitioning nodes, a set of cluster head communicates with another cluster head using base stations and nodes in between transfer from one cluster head to another. Gray hole attack is a situation in which the attacker inserts a malicious node into cluster head and steals information. This paper is based on the performance of 5G networks and effects of gray hole attacks on 5G networks.Item Deployment of Coordinated Multiple Sensors to Detect Stealth Man-in-the-Middle Attack in WLAN(Modern Education and Computer Science Press, 2016) Saini, Ravinder; Khurana, Surinder SinghThe use of wireless devices is increasing tremendously in our day-to-day life because of their portability and ease of deployment. The augmented practices of using these technologies have put the user security at risk. The Stealth Man-In-The-Middle (SMITM) is one of the attacks that has arisen out of the flaw in the wireless technology itself. This attack aims at stealing the data of the network users by redirecting the traffic aimed at a legitimate user towards itself. Moreover the access point or any other detection device connected to the wired media fails to detect this attack. The objective of this work is to develop a technique that would be able to detect SMITM attack efficiently. In this work we present a SMITM detection approach. Our approach detects the SIMTM attack by deploying multiple coordinated sensors. The simulation results witnessed that the proposed scheme is capable of detecting SMITM attack even in case of a mobile attacker.