Repository logo
Communities & Collections
All of DSpace
  • English
  • العربية
  • বাংলা
  • Català
  • Čeština
  • Deutsch
  • Ελληνικά
  • Español
  • Suomi
  • Français
  • Gàidhlig
  • हिंदी
  • Magyar
  • Italiano
  • Қазақ
  • Latviešu
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Српски
  • Svenska
  • Türkçe
  • Yкраї́нська
  • Tiếng Việt
Log In
Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "M.a, M.A."

Filter results by typing the first few letters
Now showing 1 - 9 of 9
  • Results Per Page
  • Sort Options
  • No Thumbnail Available
    Item
    Comparative study of Principal Component Analysis based Intrusion Detection approach using machine learning algorithms
    (Institute of Electrical and Electronics Engineers Inc., 2015) Chabathula, K.J.; Jaidhar, C.D.; M.a, M.A.
    This paper induces the prominence of variegated machine learning techniques adapted so far for the identifying different network attacks and suggests a preferable Intrusion Detection System (IDS) with the available system resources while optimizing the speed and accuracy. With booming number of intruders and hackers in todays vast and sophisticated computerized world, it is unceasingly challenging to identify unknown attacks in promising time with no false positive and no false negative. Principal Component Analysis (PCA) curtails the amount of data to be compared by reducing their dimensions prior to classification that results in reduction of detection time. In this paper, PCA is adopted to reduce higher dimension dataset to lower dimension dataset. It is accomplished by converting network packet header fields into a vector then PCA applied over high dimensional dataset to reduce the dimension. The reduced dimension dataset is tested with Support Vector Machines (SVM), K-Nearest Neighbors (KNN), J48 Tree algorithm, Random Forest Tree classification algorithm, Adaboost algorihm, Nearest Neighbors generalized Exemplars algorithm, Navebayes probabilistic classifier and Voting Features Interval classification algorithm. Obtained results demonstrates detection accuracy, computational efficiency with minimal false alarms, less system resources utilization. Experimental results are compared with respect to detection rate and detection time and found that TREE classification algorithms achieved superior results over other algorithms. The whole experiment is conducted by using KDD99 data set. © 2015 IEEE.
  • No Thumbnail Available
    Item
    Development of titanium nitride thin film microheaters using laser micromachining
    (Elsevier Ltd, 2022) M.a, M.A.; Lakshmi Ganapathi, K.L.; Ambresh, M.; Nukala, P.; Udayashankar, N.K.; Mohan, S.
    In this paper, we report the fabrication and characterization of titanium nitride (TiN) thin-film-based microheaters. TiN thin films have been optimized on Si and SiO2 substrates for their optimum electrical resistivities by controlling the process parameters, including argon:nitrogen (Ar:N2) ratio in reactive pulsed DC magnetron sputter (PDCMS) deposition technique. An optical emission spectroscope (OES) was used for monitoring the plasma characteristics at various nitrogen flow rates. The microstructural and surface properties of the TiN films have been investigated and correlated with the electrical properties. It has been observed that the amount of nitrogen flux in the TiN plasma plays an essential role in the microstructural, surface, and electrical properties of the TiN thin films. Micro-heaters have been fabricated with TiN thin films with low electrical resistivity using laser engraving techniques instead of conventional lithographic and micromachining techniques. The TiN microheater has shown excellent performance. A temperature of 406 °C has been achieved by applying an input power of 8 W. This work paves the path for developing scalable and economic TiN microheaters using laser micromachining techniques. © 2021
  • No Thumbnail Available
    Item
    Hypervisor and virtual machine dependent Intrusion Detection and Prevention System for virtualized cloud environment
    (Institute of Electrical and Electronics Engineers Inc., 2015) M.a, M.A.; Jaidhar, C.D.
    Cloud Computing enabled by virtualization technology exhibits revolutionary change in IT Infrastructure. Hypervisor is a pillar of virtualization and it allows sharing of resources to virtual machines. Vulnerabilities present in virtual machine leveraged by an attacker to launch the advanced persistent attacks such as stealthy rootkit, Trojan, Denial of Service (DoS) and Distributed Denial of Service (DDoS) attack etc. Virtual Machines are prime target for malignant cloud user or an attacker to launch attacks as they are easily available for rent from Cloud Service Provider (CSP). Attacks on virtual machine can disrupt the normal operation of cloud infrastructure. In order to secure the virtual environment, defence mechanism is highly imperative at each virtual machine to identify the attacks occurring at virtual machine in timely manner. This work proposes In-and-Out-of-the-Box Virtual Machine and Hypervisor based Intrusion Detection and Prevention System for virtualized environment to ensure robust state of the virtual machine by detecting followed by eradicating rootkits as well as other attacks. We conducted experiments using popular open source Host based Intrusion Detection System (HIDS) called Open Source SECurity Event Correlator (OSSEC). Both Linux and windows based rootkits, DoS attack, Files integrity verification test are conducted and they are successfully detected by OSSEC. © 2015 IEEE.
  • No Thumbnail Available
    Item
    Leveraging virtual machine introspection with memory forensics to detect and characterize unknown malware using machine learning techniques at hypervisor
    (Elsevier Ltd, 2017) M.a, M.A.; Jaidhar, C.D.
    The Virtual Machine Introspection (VMI) has emerged as a fine-grained, out-of-VM security solution that detects malware by introspecting and reconstructing the volatile memory state of the live guest Operating System (OS). Specifically, it functions by the Virtual Machine Monitor (VMM), or hypervisor. The reconstructed semantic details obtained by the VMI are available in a combination of benign and malicious states at the hypervisor. In order to distinguish between these two states, the existing out-of-VM security solutions require extensive manual analysis. In this paper, we propose an advanced VMM-based, guest-assisted Automated Internal-and-External (A-IntExt) introspection system by leveraging VMI, Memory Forensics Analysis (MFA), and machine learning techniques at the hypervisor. Further, we use the VMI-based technique to introspect digital artifacts of the live guest OS to obtain a semantic view of the processes details. We implemented an Intelligent Cross View Analyzer (ICVA) and implanted it into our proposed A-IntExt system, which examines the data supplied by the VMI to detect hidden, dead, and dubious processes, while also predicting early symptoms of malware execution on the introspected guest OS in a timely manner. Machine learning techniques are used to analyze the executables that are mined and extracted using MFA-based techniques and ascertain the malicious executables. The practicality of the A-IntExt system is evaluated by executing large real-world malware and benign executables onto the live guest OSs. The evaluation results achieved 99.55% accuracy and 0.004 False Positive Rate (FPR) on the 10-fold cross-validation to detect unknown malware on the generated dataset. Additionally, the proposed system was validated against other benchmarked malware datasets and the A-IntExt system outperforms the detection of real-world malware at the VMM with performance exceeding 6.3%. © 2017 Elsevier Ltd
  • No Thumbnail Available
    Item
    Novel fabrication technique for NiTi and TiN micro-structures by femtosecond lasers
    (IOP Publishing Ltd custserv@iop.org, 2020) M.a, M.A.; Lakshmi Ganapathi, K.L.; Udayashankar, N.K.; Mohan, S.
    NiTi shape memory alloy (SMA) thin films were deposited onto silicon substrate using pulsed DC magnetron sputtering technique. To obtain crystalline NiTi thin films has to be synthesized at higher temperatures (475 - 525) C. This high temperature requirement restricts the ease in conventional lithographic procedures. The recent advancements in the laser micromachining lend their applications into the fabrication of miniaturized systems. The femtosecond lasers (FSL) allow non-thermal processing of materials by ablation. This work focuses on the deposition and fabrication of NiTi (≈1.5 μm. thick) and titanium nitride (TiN ≈0.3 μm. thick) thin films based miniaturized systems by femtosecond laser bulk micromachining. The NiTi and TiN microstructures were release by bottom silicon etch using reactive ion etching chlorine chemistry (RIE-Cl). © Published under licence by IOP Publishing Ltd.
  • No Thumbnail Available
    Item
    Pulse frequency effect on the NiTi plasmas characteristics and thin film properties and fabrication of NiTi micro-comb structures
    (Elsevier Ltd, 2022) M.a, M.A.; Sidhila, P.S.; Udayashankar, N.K.
    Nickel-titanium (NiTi) is a thermal shape memory alloy (SMA) widely used in the actuator domain in miniaturized systems. With a titanium nitride (TiN) capping layer, NiTi exhibits better mechanical properties and enhances biocompatibility in biomedical applications. In addition, TiN can be efficiently heated to a higher temperature than induce the phase transformation in NiTi MEMS structures. This could be easily achieved by fabricating a TiN heater pattern over or alongside the NiTi MEMS structures. The subject of this work is the NiTi thin films deposited utilizing the pulsed DC magnetron sputter (PDCMS) deposition process at various pulse frequencies (50–350 kHz). The TiN capping layer was also grown on the Si/NiTi stack by the same process. The NiTi micro-comb and TiN micro-heater MEMS structures were fabricated using bulk laser micromachining. Freestanding MEMS structures of NiTi and TiN thin films were realized by etching the bottom silicon with an etch rate of 600 nm/Sec using chemical wet etch by tetramethylammonium hydroxide TMAH. © 2022
  • No Thumbnail Available
    Item
    Pulsed DC magnetron sputtered titanium nitride thin films for localized heating applications in MEMS devices
    (Elsevier B.V., 2018) M.a, M.A.; Lakshmi Ganapathi, L.G.; G N V R, V.; Udayashankar, N.K.; Mohan, S.
    Titanium nitride (TiN) thin films are deposited on Si/SiO2 substratesby using Pulsed DC magnetron sputtering and are characterized for their structural, mechanical and electrical properties for their application as localized heating elements in microsystem devices. The influence of substrate temperature on the properties of TiN films has been investigated. The correlation between the structural orientation with mechanical and electrical properties has been established. The films deposited at a substrate temperature of 300 °C have shown better structural, mechanical and electrical properties. This film has been chosen for the fabrication of microheater and its characterization. A maximum temperature of 250 °C is achieved by applying a power of 2.8 W to the microheater. © 2018 Elsevier B.V.
  • No Thumbnail Available
    Item
    Virtual machine introspection based spurious process detection in virtualized cloud computing environment
    (Institute of Electrical and Electronics Engineers Inc., 2015) M.a, M.A.; Jaidhar, C.D.
    Virtual Machines are prime target for adversary to take control by exploiting the identified vulnerability present in it. Due to increasing number of Advanced Persistent Attacks such as malware, rootkit, spyware etc., virtual machine protection is highly challenging task. The key element of Advanced Persistent Threat is rootkit that provides stealthy control of underlining Operating System (kernel). Protecting individual guest operating system by using antivirus and commercial security defense mechanism is cost effective and ineffective for virtualized environment. To solve this problem, Virtual Machine Introspection has emerged as one of the promising approaches to secure the state of the virtual machine. Virtual Machine Introspection inspects the state of multiple virtual machines by operating outside the virtual machine i.e. at hypervisor level. In this work, Virtual Machine Introspection based malicious process detection approach is proposed. It extracts the high level information such as system call details, opened known backdoor ports from introspected memory to identify the spurious process. It triggers an alert in response to detected intrusion. © 2015 IEEE.
  • No Thumbnail Available
    Item
    VMI based automated real-time malware detector for virtualized cloud environment
    (Springer Verlag service@springer.de, 2016) M.a, M.A.; Jaidhar, C.D.
    The Virtual Machine Introspection (VMI) has evolved as a promising future security solution to performs an indirect investigation of the untrustworthy Guest Virtual Machine (GVM) in real-time by operating at the hypervisor in a virtualized cloud environment. The existing VMI techniques are not intelligent enough to read precisely the manipulated semantic information on their reconstructed high-level semantic view of the live GVM. In this paper, a VMI-based Automated-Internal- External (A-IntExt) system is presented that seamlessly introspects the untrustworthy Windows GVM internal semantic view (i.e. Processes) to detect the hidden, dead, and malicious processes. Further, it checks the detected, hidden as well as running processes (not hidden) as benign or malicious. The prime component of the A-IntExt is the Intelligent Cross- View Analyzer (ICV A), which is responsible for detecting hidden-state information from internally and externally gathered state information of the Monitored Virtual Machine (Med−VM). The A-IntExt is designed, implemented, and evaluated by using publicly available malware and Windows real-world rootkits to measure detection proficiency as well as execution speed. The experimental results demonstrate that A-IntExt is effective in detecting malicious and hidden-state information rapidly with maximum performance overhead of 7.2 %. © Springer International Publishing AG 2016.

Maintained by Central Library NITK | DSpace software copyright © 2002-2026 LYRASIS

  • Privacy policy
  • End User Agreement
  • Send Feedback
Repository logo COAR Notify