Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
3 results
Search Results
Item Performance Evaluation of Signature Based and Anomaly Based Techniques for Intrusion Detection(Springer Science and Business Media Deutschland GmbH, 2023) Agrawal, V.K.; Rudra, B.In the age of information technology everything is derived using information systems and allows us to communicate with each other. Internet acts as a medium to communicate among various devices from our wrist watch to our personal computers, TVs, refrigerators, etc. all are connected. But with all this luxury of comforts comes with the cost of security threats. Hence, it becomes very important to address issues related to security. We propose a hybrid intrusion detection system that is based on signature based and anomaly based Intrusion Detection System to address the need of today. While signature based approaches are designed to classify previously known attacks, anomaly detection learn traffic profiles and detect which network packets are normal traffic and which are not. With this ability, this technique helps to identify zero day attacks also. Our approach suggests the process from dataset preprocessing to model training and testing, this will provide proper guidance for building any type of Intrusion Detection System (IDS). Our proposed model achieves a accuracy of 99.67 % for signature based approach and 96.833 % for anomaly based approach on the CICIDS2017 dataset. Results show substantial scope for real world applications. © 2023, The Author(s), under exclusive license to Springer Nature Switzerland AG.Item This paper presents a design & implementation methodology for FPGA based MIL-STD-1553 Remote Terminal Sub-System using DDC's BU-61580 device. The interesting part of this paper is that it presents a design of non-processor remote terminal sub-system. The glue logic is put on one FPGA of 176 pins which initializes the BU-61580 in RT mode at power-on. The FPGA design was done using Viewlogic & Actel packages. The simulation has shown the correct results which was then followed by the implementation. In this paper, the design is presented for 9 sensors among which 5 are analog and 4 are digital. For the purpose of testing the circuit, the analog & digital sensors are simulated through the computer.(ISRO Satellite Centre, Design and implementation of FPGA based non-processor MIL-STD-1553 remote terminal sub-system using DDC's BU-61580) Bhagyalakshmi, K.; Ramachandra, G.; Agrawal, V.K.; Subbanna Bhat, P.; Philar, S.R.1999Item Deep learning for network security: a novel GNN-LSTM-based intrusion detection model(Inderscience Publishers, 2025) Agrawal, V.K.; Rudra, B.The rise in the use of IoT devices in daily life has led to an increase in attacks, making it crucial to protect our devices and information. Intrusion detection system (IDS) is vital in preventing potential attacks. This paper presents a novel IDS architecture using a hybrid GNN-LSTM-based approach. Graph neural network (GNN) is used to extract information from graph-based data, while long short-term memory networks (LSTM) helps learn patterns in the extracted embeddings due to its ability to learn from long-term dependencies in data. We introduce a new mechanism for edge-classification using GNN, eliminating the need for node feature aggregation, followed by edge embedding classification using the LSTM model. We also provide a detailed comparison of our proposed model with state-of-the-art machine learning (ML) and deep learning (DL) algorithms for intrusion detection, demonstrating high accuracy. © © 2025 Inderscience Enterprises Ltd.
