Faculty Publications

Permanent URI for this communityhttps://idr.nitk.ac.in/handle/123456789/18736

Publications by NITK Faculty

Browse

Search Results

Now showing 1 - 10 of 10
  • Item
    Estimating and prediction of turn around time for incidents in application service maintenance projects
    (Academy Publisher, 2008) Basavaraj, M.J.; Shet, K.C.
    Application Service Maintenance Projects normally deals with Incidents as First Level support function. Incidents in majority directly link with Production Environment, so Turn around Time for Incidents is a significant factor. Many Companies are having Service Level Agreements with Customer for Turn around Time for Incidents. There is a need to focus on Estimating and Predicting Turn around Time for Incidents. Improvement in Turn around Time helps in improving the Service Level Agreements earlier agreed with the Customer. Saved time can be diverted to other Project Activities like Enhancements or for new requests. This will also helps as one of the paths for Companies to get new business with the Customer. We have used Capability Maturity Model Integration(CMMI)V1.2 Quantitative Project Management(QPM) methodology for Application Service Maintenance(ASM) Projects for estimating and predicting turn around time for incidents. By implementing this best practice in SEI CMMI Level 5 Company we have achieved a significant improvement of approximately 50 percent reduction in Average Turn around Time for incidents. © 2008 Academy Publisher.
  • Item
    Autonomic cloud computing: Self management in cloud computing
    (ICIC Express Letters Office icicel@ijicic.org, 2014) Anithakumari, S.; Chandrasekaran, K.
    Cloud computing presents an innovative computing paradigm in which computational power is provided as a service utility similar to electricity. The enhancing dynamism, heterogeneity and interactivity in software services, applications and networks leads to complex and unmanageable systems in cloud environment. This difficulty can be addressed by utilizing self managing computing model such as autonomic computing for cloud service provisioning. The collaboration of cloud and autonomic computing gives rise to anew form of computing service called autonomic cloud service. Without autonomic techniques, efficient monitoring and management of current cloud systems become impossible because the scale of such systems is increasing day by day. This paper gives a brief review of technologies which lead to Autonomic Cloud Computing and also discusses some services, applications and case studies in Autonomic Clouds. © 2014 ICIC International.
  • Item
    DetLogic: A black-box approach for detecting logic vulnerabilities in web applications
    (Academic Press, 2018) Deepa, G.; Santhi Thilagam, P.S.; Praseed, A.; Pais, A.R.
    Web applications are subject to attacks by malicious users owing to the fact that the applications are implemented by software developers with insufficient knowledge about secure programming. The implementation flaws arising due to insecure coding practices allow attackers to exploit the application in order to perform adverse actions leading to undesirable consequences. These flaws can be categorized into injection and logic flaws. As large number of tools and solutions are available for addressing injection flaws, the focus of the attackers is shifting towards exploitation of logic flaws. The logic flaws allow attackers to compromise the application-specific functionality against the expectations of the stakeholders, and hence it is important to identify these flaws in order to avoid exploitation. Therefore, a prototype called DetLogic is developed for detecting different types of logic vulnerabilities such as parameter manipulation, access-control, and workflow bypass vulnerabilities in web applications. DetLogic employs black-box approach, and models the intended behavior of the application as an annotated finite state machine, which is subsequently used for deriving constraints related to input parameters, access-control, and workflows. The derived constraints are violated for simulating attack vectors to identify the vulnerabilities. DetLogic is evaluated against benchmark applications and is found to work effectively. © 2018 Elsevier Ltd
  • Item
    Windows malware detection system based on LSVC recommended hybrid features
    (Springer-Verlag France 22, Rue de Palestro Paris 75002, 2019) Shiva Darshan, S.L.; Jaidhar, C.D.
    To combat exponentially evolved modern malware, an effective Malware Detection System and precise malware classification is highly essential. In this paper, the Linear Support Vector Classification (LSVC) recommended Hybrid Features based Malware Detection System (HF-MDS) has been proposed. It uses a combination of the static and dynamic features of the Portable Executable (PE) files as hybrid features to identify unknown malware. The application program interface calls invoked by the PE files during their execution along with their correspondent category are collected and considered as dynamic features from the PE file behavioural report produced by the Cuckoo Sandbox. The PE files’ header details such as optional header, disk operating system header, and file header are treated as static features. The LSVC is used as a feature selector to choose prominent static and dynamic features from their respective Original Feature Space. The features recommended by the LSVC are highly discriminative and used as final features for the classification process. Different sets of experiments were conducted using real-world malware samples to verify the combination of static and dynamic features, which encourage the classifier to attain high accuracy. The tenfold cross-validation experimental results demonstrate that the proposed HF-MDS is proficient in precisely detecting malware and benign PE files by attaining detection accuracy of 99.743% with sequential minimal optimization classifier consisting of hybrid features. © 2018, Springer-Verlag France SAS, part of Springer Nature.
  • Item
    How do open source app developers perceive API changes related to Android battery optimization? An empirical study
    (John Wiley and Sons Ltd, 2021) Marimuthu, C.; Chimalakonda, S.; Chandrasekaran, K.
    There is an increasing interest shown by researchers and developers in reducing the battery consumption of Android applications. Recently, the battery optimization features such as doze mode, app standby, background execution limits, and background location limits were introduced in the form of API changes. According to the API changes, application developers have to change their source code to manage the behavioral changes caused by operating system limitations. These battery optimization features are evolving rapidly, and the apps show unexpected behaviors until updating the source code. Also, developers find it difficult to cope with the changes. Therefore, there is a need to understand the behavioral changes, application developer's perceptions, and response patterns on the API changes to plan upcoming battery optimization features. In this article, we have collected the relevant GitHub issues from 225 open-source Android repositories and performed a thematic analysis of collected data. This study analyzes the 391 related issues to answer three research questions. This study's important finding is that developers often post issues related to delayed app notifications, inconsistent background location updates, and suspended background tasks, and so on. We found that library developers are showing a quick response to API changes compared with application developers. © 2020 John Wiley & Sons Ltd
  • Item
    DTPF Algorithm Based Open-Source Time-Sensitive Network Leveraging SDN Architecture
    (Institute of Electrical and Electronics Engineers Inc., 2023) Hagargund, A.G.; Shet, N.S.V.; Kulkarni, M.
    Time-Sensitive Networking (TSN) has enabled a lot of advancements in industrial automation, aviation, tactile networking, and other ad-hoc networking applications. The bounded latency, reliability, and self-recovering mechanisms for a network are some of the core attributes of the TSN architecture. The reliability of bench-marking of a given TSN architecture, when done with simulators, will not match with that of hardware systems. But the TSN hardware needs more capital investment along with more development time as it involves understanding the hardware-specific parameters. The research in this paper has solved this shortcoming by implementing an open-source and secured SDN(Software Defined Networking)-based TSN framework integrating IEEE's 802.1 Qbv and 802.1Qcc standards. The novelty of implementation involves i) Realization of Centralized User Configuration (CUC), Centralized Network Configuration (CNC) with open source tools. ii) An algorithm called Dynamic TSN Path Finder (DTPF) is implemented for automatically identifying TSN edges participating in TSN flow. iii) Emulation of hardware environment leveraging Linux-based queuing disciplines and traffic shapers. This unique open source-based TSN architecture is then tested with both TSN and Non-TSN traffic, to demonstrate the gating logic and the delay characteristics based on queuing discipline when applied to virtual queues. © 2013 IEEE.
  • Item
    Closed-Loop Vector Formulation in Euler’s Complex Numbers for Multi-Loop Planar Mechanisms With N-bars: A Novel Modeling Approach and Algorithm
    (Defense Scientific Information and Documentation Centre, 2023) Rahul, V.M.; Bhaktha, B.S.; Gangadharan, K.V.
    This paper presents a novel iterative algorithm incorporated in a user-friendly GUI for modeling the kinematics of multiple looped N-bar closed-loop mechanisms. Past research works have used custom coding or expensive commercial software to analyze the mechanisms of specific applications. The proposed algorithm focuses on kinematics and offers a quick, easy-to-use, cost-effective solution to analyze a wide range of generic mechanisms, reducing the need for custom coding and lowering computational costs. The algorithm employs algebraic equations, such as solving complex closed-loop vector equations using the Euler form of complex numbers, to simulate and derive the unknowns necessary to characterise any generic closed-loop mechanism. The Python code implemented in the algorithm adapts to various scenarios by utilising available information on the position, velocity, and acceleration variables of the mechanisms. The simulation tool can display real-time color contour plots (RGB color scale) for linear and angular velocities and accelerations, simulate mechanisms with multiple loops and switch configurations, and find inverse mechanisms. The approach for solving multiple loop problems and the algorithm utilized to solve the configurations, methods, equations used and GUI features implementation are all described in this study. The case study considered for a four-bar mechanism indicates a strong agreement between the results obtained from the proposed kinematics-based simulator and ANSYS software. These results demonstrate the simulator’s effectiveness in providing low-cost and user-friendly simulation results for various generic mechanisms involving multiple interconnected loops. © 2023, DESIDOC.
  • Item
    A Detailed Study of SOT-MRAM as an Alternative to DRAM Primary Memory in Multi-Core Environment
    (Institute of Electrical and Electronics Engineers Inc., 2024) Kallinatha, H.D.; Rai, S.; Talawar, B.
    As the current primary memory technology is reaching its limits, it is essential to explore alternative memory technologies to accommodate modern applications and use cases. However, using new memory technology poses the challenge of deriving accurately estimated parameters for integrating new memory technology and doing reliable simulations. This study proposes a new approach incorporating Spin-Orbit-Torque-Magnetic-RAM (SOT-MRAM) into hybrid and full main memory architectures within a multi-core system, encompassing various memory configurations and capacities. The study addresses the challenge of evaluating SOT-MRAM-based memory systems when specific SOT-MRAM memory parameters are not publicly available. The research methodology includes micro-architectural (circuit-level) design space exploration and comprehensive full system simulations, which evaluate benchmark programs representing diverse application domains. The evaluation includes three memory structures with varying memory organizations and capacities. The results show that SOT-MRAM is a robust replacement for DRAM or hybrid memory, offering compelling advantages such as a remarkable 74.05% reduction in power consumption, a noteworthy 40.10% increase in bandwidth utilization, and a significant 72.85% reduction in Energy-Delay Product (EDP). The maximum latency penalties are also minimal, with a 3.71% increase for hybrid structures and a mere 0.07% for standalone SOT-MRAM memory structures. © 2013 IEEE.
  • Item
    Security in 5G Network Slices: Concerns and Opportunities
    (Institute of Electrical and Electronics Engineers Inc., 2024) Singh, V.P.; Singh, M.P.; Hegde, S.; Gupta, M.
    Network slicing has emerged as a cornerstone technology within the 5G ecosystem, enabling efficient resource allocation, service customization, and support for various applications. Its ability to deliver Network-as-a-Service (NaaS) brings a new paradigm of adaptable and efficient network provisioning. However, with the diversification of services and the increasing complexity of network infrastructures, a simultaneous rise in security vulnerabilities becomes evident. These flaws go beyond the limitations of conventional network security and affect various aspects of network slice (NS) implementation and management. The limitations of traditional security, such as static policies, single point of failure, and challenges in effectively securing network slicing deployments, underscore the need to explore security measures tailored to the dynamic nature of 5G networks. To ensure the robust security of 5G networks, it is essential to consider various security concerns such as isolation, authentication, and authorization. Furthermore, dynamic orchestration and inter-slice communication security challenges must be proactively tackled. The security concerns related to 5G networks must be addressed comprehensively to ensure the safe and secure operation of the network. Our survey paper goes into these complex security issues, providing an in-depth and systematic review of the various contexts in which they emerge. We have identified the five most vulnerable areas in Network Slicing: Slice-Lifecycle, Communication type slice uses, Technologies used to provide service, Management threats, and End Devices utilized in service. Apart from threats in these vulnerable areas, we also discussed a few generous attacks that can be launched to disrupt network-slicing services. Furthermore, this study is a valuable resource for evaluating the current state of research efforts in this domain, contributing to the ongoing enhancement of security measures and the overall robustness of network-slicing technology. In doing so, we aim to ensure the secure and sustainable evolution of 5G networks as they become increasingly integral to our digital infrastructure. © 2013 IEEE.
  • Item
    Vulnerability Testing of RESTful APIs Against Application Layer DDoS Attacks
    (Science and Information Organization, 2025) Sivakumar, K.; Santhi Thilagam, P.S.
    In recent years, modern mobile, web applications are shifting from monolithic application to microservice based application because of the issues such as scalability and ease of maintenance.These services are exposed to the clients through Application programming interface (API). APIs are built, integrated and deployed quickly.The very nature of APIs directly interact with backend server, the security is paramount important for CAP. Denial of service attacks are more serious attack which denies service to legitimate request. Rate limiting policies are used to stop the API DoS attacks. But by passing rate limit or flooding attack overload the backend server. Even sophisticated attack using http/2 multiplexing with multiple clients leads severe disruptions of service. This research shows that how sophisticated multi client attack on high workload end point leads to a dos attack. © (2025), (Science and Information Organization). All rights reserved.