Faculty Publications
Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736
Publications by NITK Faculty
Browse
34 results
Search Results
Item Autonomic computing: A fuzzy control approach towards application development(IGI Global, 2011) Harish, H.S.; Chandra Sekaran, K.C.Autonomic computing (Salehie & Tahvildari, 2005) is a new paradigm to design, develop, deploy, and manage systems by taking inspiration from strategies used by biological systems. An autonomic system has four major characteristics: self-configure, self-heal, self-optimize, and self-protect. The autonomic computing architecture provides a blueprint for developing feedback control loops for self-managing systems. This observation suggests that control theory might provide guidance as to the structure of and requirements for autonomic managers. E-commerce is an area where an Autonomic Computing system could be very effectively deployed. E-commerce has created demand for high quality information technology services, and businesses seek ways to improve the quality of service in a cost-effective way. Properly adjusting tuning parameters for best values is time-consuming and skills-intensive. This chapter describes simulation environments to implement approaches to automate the tuning of MaxClients parameter of Apache web server using fuzzy controllers. These are illustrations of the self-optimizing characteristic of an autonomic computing system. © 2012, IGI Global.Item Proactive models for mitigating internet denial-of-service/distributed denial-of-service attacks(World Scientific Publishing Co., 2010) Nagesh, H.R.; Chandra Sekaran, K.C.The enormous growth of the Internet has had a huge impact on users' daily lives, providing us with a wealth of information easily and conveniently.At the same time, this accessibility has made the Internet an easy target for users who wish to disrupt the flow of information or exploit the Web for personal gain. Those who compromise the flow of information or access information in an unauthorized manner are called attackers.Many tools are now available for attackers to test the vulnerability of Internet. © 2010 by World Scientific Publishing Co. Pte. Ltd. All Rights Reserved.Item TCP congestion control in data center networks(Springer New York, 2015) Tahiliani, R.P.; Tahiliani, M.P.; Chandra Sekaran, K.C.Data Center Networks (DCNs) provide the core infrastructure backbone for various small and large scale enterprise applications, including Cloud Computing applications. TCP is used by a plethora of Internet applications today and it also retains its dominance in DCNs, in terms of the most widely deployed transport protocol. The nature of DCN traffic, however, largely differs from that of the Internet. The fundamental assumptions made during the initial design of TCP hinder its suitability in state-of-the-art DCNs. Impairments such as TCP Incast, TCP Outcast, Buffer pressure, Queue build-up and pseudo-congestion effect severely degrade the performance of traditional TCP variants in DCNs. With cloud computing becoming an important part of the forseeable future, it is extremely crucial to eliminate these impairments. First, this chapter describes the above mentioned impairments in brief and explores TCP variants proposed so far to overcome the same. Second, the advantages and shortcomings of each TCP variant are highlighted in terms of its effificacy and the deployment complexity. Open research issues related to the TCP’s performance in DCNs are also discussed. © Springer Science+Business Media New York 2015.Item Development of a link layer protocol using UML(Institute of Electrical and Electronics Engineers Inc., 2001) Chandra Sekaran, K.C.This paper presents a report on the development of a link layer protocol using an object oriented formal method. It describes the steps involved in the conceptualization, analysis and design of the L2CAP (Logical Link Control and Adaptation Layer Protocol) of the Bluetooth architecture. UML (Unified Modeling Language) is the formal modeling language used in this work. It has been shown how the static, dynamic and operational aspects of the system are captured using various UML diagrams. © 2001 IEEE.Item Implementation of an adaptive buffering algorithm to improve QoS in VoIP(2005) Nagesh, H.R.; Chandra Sekaran, K.C.; Kordcal, A.R.The Internet has evolved into a worldwide communication infrastructure and it now provides various services including Voice over IP (VoIP) or Internet Telephony [7]. VoIP involves transmission of voice packets across the IP network known as IP telephony. Internet Protocol (IP) Telephony has many issues that have to be overcome before it can be considered a rival to the existing telephony infrastructure. One such issue is the Quality of service (QoS). The use of play-out buffering at the receiver helps to improve the quality of Voice over IP (VoIP). There exists a buffering algorithm, which uses a dynamic adaptive approach. In this algorithm the playout times of voice packets are calculated using adaptive estimation of the network delays. In contrast to previous solutions, weighting factor that controls the estimation process is dynamically adjusted according to the observed delay variations. This results in higher quality estimates of network delay. The contribution of this paper is to analyze, implement and incorporate one such adaptive buffering algorithm into the Session Initiation Protocol (SIP) through which one can achieve better delay/loss trade-off and thus better call quality.Item Design and development of proactive solutions for mitigating denial-of-service attacks(2006) Nagesh, H.R.; Chandra Sekaran, K.C.Denial of Service attacks, orchestrated by a single host or multiple hosts in a coordinated manner, has become an increasingly frequent disturbance in today's Internet. Generally, attackers launch DDoS attacks by directing a massive number of attack sources to send useless traffic to the victim. The victim's services are disrupted when its host or network resources are occupied by the attack traffic. The threat of DDoS attacks has become even more severe as attackers can compromise a huge number of computers using vulnerabilities in popular operating systems [4].This paper deals with Denial of service (DoS) and Distributed DoS (DDoS) attacks. In the first part, we categorize existing defense mechanisms, and analyze their strengths and weaknesses. In the second part of our investigation, we develop and evaluate two defense models for DoS attacks: the Secure Overlay Services (SOS) Model and the Server Hopping Model using distributed firewalls. Each of these models provide defense in a different part of the network, and has different resource requirements. In the third part of our investigation, we assess the effectiveness of our defense models for different types of DoS attack. © 2006 IEEE.Item Detection of reticulation events - A character based method(2006) Navada, K.C.; Chandra Sekaran, K.C.It is observed that during the evolution of species, reticulation is an important event and is very prevalent in several organisms. However, the analytical tools for the representation of these events are still under development. This is primarily because of the difficulty involved in detecting these reticulation events that have taken place during the evolution using the sequences that are currently available in some form. Since it is not possible to get each sequence starting from the root (beginning of the evolution process), inferring the history has to be based on a few assumptions, which are biologically valid. In this paper, we propose an algorithm which, we feel, is a step in this direction. The algorithm detects the sequences which require reticulation events for their formation and returns the count of such sequences. © 2006 IEEE.Item Ubiquitous object categorization and identity(2006) Kulkarni, U.P.; Vadavi, J.V.; Joshi, S.M.; Chandra Sekaran, K.C.; Yardi, A.R.Ubiquitous computing technology provides an environment where users expect to access resources and services anytime and anywhere. Everyday objects communicate with each other and also with the Internet objects available today. People have an increasing desire for such ubiquitous access to information, anywhere, anyplace, and anytime. As ubicomp occurs everywhere, there may be a very large number of users/objects interacting with each other simultaneously in future. This necessitates the question of how to uniquely provide identity to infinitely growing objects and standard towards the uniformity of the data being exchanged by the various objects. The serious security risks and problems arise because resources can now be accessed by almost anyone with a mobile device in such an open model. In this paper, author proposes the way of providing uniqueness in scalable object identity, object categorization and standard in data being exchanged by various ubicomp compliant objects and explore the security issue in ubiquitous computing with a focus on authentication. © 2006 IEEE.Item Active probing based end to end internet path metrics estimation tool(2006) Suryanarayana, V.; Chandra Sekaran, K.C.This paper considers the problem of measuring the various network path metrics such as Connectivity, Capacity, bandwidth, available bandwidth etc. of a network path using probing-based methods. To that end, we propose a new model called an Integrated Metrics Measurement Model (IMMM) to measure all possible performance metrics. It will be designed to probe the network non-intrusively so that the measurements will not disturb the stability of the network. The experimental results of our partial implementation of the proposed model are presented. © 2006 IEEE.Item Distributed multi level security token based authentication for ubiquitous objects -DMSA(2006) Kulkarni, U.P.; Vadavi, J.V.; Joshi, S.M.; Chandra Sekaran, K.C.; Yardi, A.R.Ubiquitous computing technology provides an environment where users expect to access resources and services anytime and anywhere. The serious security risks and problems arise because resources can now be accessed by almost anyone with a mobile device in such an open model. This paper explores security in ubiquitous computing with focus on authentication. We propose a new model, which uses distributed hierarchical tree based approach for authenticating ubiquitous objects which overcomes the problems associated with centralized source of information. © 2006 IEEE.
