Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content
Amitabha Das

    Amitabha Das

    Abstract With the increasing convergence of network, services, and devices, more number of end user devices are accessing digital media content which were hitherto accessible mainly from computers and television sets. This makes the... more
    Abstract With the increasing convergence of network, services, and devices, more number of end user devices are accessing digital media content which were hitherto accessible mainly from computers and television sets. This makes the digital media more prone to illegal ...
    Anomaly-based intrusion detection (AID) techniques are useful for detecting novel intrusions into computing resources. One of the most successful AID detectors proposed to date is stide, which is based on analysis of system call... more
    Anomaly-based intrusion detection (AID) techniques are useful for detecting novel intrusions into computing resources. One of the most successful AID detectors proposed to date is stide, which is based on analysis of system call sequences. In this paper, we present a detailed formal framework to analyze, understand and improve the performance of stide and similar AID techniques. Several important properties of stide-like detectors are established through formal proofs, and validated by carefully conducted experiments using test datasets. Finally, the framework is utilized to design two applications to improve the cost and performance of stide-like detectors which are based on sequence analysis. The first application reduces the cost of developing AID detectors by identifying the critical sections in the training dataset, and the second application identifies the intrusion context in the intrusive dataset, that helps to fine-tune the detectors. Such fine-tuning in turn helps to improve detection rate and reduce false alarm rate, thereby increasing the effectiveness and efficiency of the intrusion detectors.
    Broadcasting is one of the essential communication models of MANETs. Many MANET multicast routing protocols rely heavily upon MAC layer's broadcast support. However, the broadcast mechanism of the standard IEEE 802.11 cannot... more
    Broadcasting is one of the essential communication models of MANETs. Many MANET multicast routing protocols rely heavily upon MAC layer's broadcast support. However, the broadcast mechanism of the standard IEEE 802.11 cannot provide reliable broadcasting service. In this paper, we improve the IEEE 802.11 broadcast mechanism's reliability by introducing the adaptive round-robin acknowledge and retransmit (ARAR) scheme. Different from the
    ABSTRACT
    In a CSMA/CA based multihop wireless network, excessive interference at a receiver or a potential forwarding node causes severe blocking and reduction in throughput. The unbalanced interference forces the node to consume more time... more
    In a CSMA/CA based multihop wireless network, excessive interference at a receiver or a potential forwarding node causes severe blocking and reduction in throughput. The unbalanced interference forces the node to consume more time receiving packets rather than sending them, ...
    This paper proposes a new Markov random field (MRF) model for the detection of occluded regions in image sequences. Motion vectors are not defined in an occluded region, thus the regions with high motion compensated prediction error are... more
    This paper proposes a new Markov random field (MRF) model for the detection of occluded regions in image sequences. Motion vectors are not defined in an occluded region, thus the regions with high motion compensated prediction error are commonly regarded as occluded regions. However, badly motion compensated pixels will also appear as occluded pixels, making it difficult to distinguish the
    Research Interests:
    The use of autonomous software agents enable new types of complex transactions for electronic commerce where multiple agents can exchange their values to complete a single transaction. However, most of the existing transaction protocols... more
    The use of autonomous software agents enable new types of complex transactions for electronic commerce where multiple agents can exchange their values to complete a single transaction. However, most of the existing transaction protocols support only simple transactions and are not sufficient for more flexible and complex transaction scenarios. In this paper, we provide a complex transaction model which describes
    Intrusion signatures are used to detect and/or prevent fast-spreading worms or exploits, and usually, constructing these signatures is an automatic pro- cess without human intervention for the sake of speed. In principle, the automatic... more
    Intrusion signatures are used to detect and/or prevent fast-spreading worms or exploits, and usually, constructing these signatures is an automatic pro- cess without human intervention for the sake of speed. In principle, the automatic signature construction process can produce not only true-positive intrusion sig- natures but also false-positive ones, the latter of which poses a grave problem because they can be misused to disclose privacy information. Manual signature checking (for a whitelist) can solve the problem, but it slows down the reaction time for an attack dramatically. In this paper, we propose a mechanism to generate signatures automatically while preserving the privacy information. Essentially, we transform the original feature values within an audit trail instance into feature ranges, and then use these feature ranges to construct a privacy-preserved intru- sion signature. Our current focus is on the methods constructing feature ranges, and for this purpose, several methods are proposed to discover feature ranges. The experimental results are quite encouraging: the transformation from values to ranges leads not only to the preservation of privacy but also to the enhancement of the detection performance.
    The computational complexity of a parallel algorithm depends critically on the model of computation. We describe a simple and elegant rule-based model of computation in which processors apply rules asynchronously to pairs of objects from... more
    The computational complexity of a parallel algorithm depends critically on the model of computation. We describe a simple and elegant rule-based model of computation in which processors apply rules asynchronously to pairs of objects from a global object space. Application of a rule to a pair of objects results in the creation of a new object if the objects satisfy
    ... The experimental results show that USAID can achieve uniform level of efficiency to detect both known (99.78%) and new intrusions (98.18%), with a significantly reduced false alarm rate (1.45%). ... As before, we can deduce the... more
    ... The experimental results show that USAID can achieve uniform level of efficiency to detect both known (99.78%) and new intrusions (98.18%), with a significantly reduced false alarm rate (1.45%). ... As before, we can deduce the detection performance of USAID as follows. ...
    ... overview of the complete payment protocol, followed by a detailed discussion of the core secure payment protocol ... 2 The Model of Mobile Agents Based E-Commerce System ... The Bank provides a set of basic banking services that... more
    ... overview of the complete payment protocol, followed by a detailed discussion of the core secure payment protocol ... 2 The Model of Mobile Agents Based E-Commerce System ... The Bank provides a set of basic banking services that includes checking accounts, lines of electronic ...
    In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important to evaluate model general- ization with respect to the... more
    In order to complement the incomplete training audit trails, model generalization is always utilized to infer more unknown knowledge for intrusion detection. Thus, it is important to evaluate model general- ization with respect to the detection performance of intrusion detection. In this paper, based on a general intrusion detection methodology, M out of N features in a behavior signature are utilized to detect the be- haviors (M ≤ N ) instead of using all N features. This is because M of N features in a signature can generalize the behavior model to incorporate unknown behaviors, which are useful to detect novel intrusions outside the known behavior model. However, the preliminary experimental re- sults show that all features of any signature should be fully utilized for intrusion detection instead of M features in it. This is because the M of N features scheme will make the behavior identification capability of the behavior model lost by detecting most behaviors as 'anomalies'.
    A major problem faced by intrusion detection is the inten- sive computation in the detection phase, and a possible solution is to reduce model redundancy, and thus economize the detection computa- tion. However, the existing literature... more
    A major problem faced by intrusion detection is the inten- sive computation in the detection phase, and a possible solution is to reduce model redundancy, and thus economize the detection computa- tion. However, the existing literature lacks any formal evaluation of the significance of model redundancy for intrusion detection. In this paper, we try to do such an evaluation. First,
    Abstract To make up for the incompleteness of the known behav - iors of a computing resource, model generalization is utilized to infer more behaviors in the behavior model besides the known behaviors In principle, model generalization... more
    Abstract To make up for the incompleteness of the known behav - iors of a computing resource, model generalization is utilized to infer more behaviors in the behavior model besides the known behaviors In principle, model generalization can improve the detection rate but may also degrade the detection performance Therefore, the relation between model generalization and detection performance is critical
    ... On the other hand, the advancement of Internet and computing applications increases the number of application scenarios ... THEORETICAL BASIS FOR INTRUSION DETECTION In generaI, anintrusion detection system builds the behavior models... more
    ... On the other hand, the advancement of Internet and computing applications increases the number of application scenarios ... THEORETICAL BASIS FOR INTRUSION DETECTION In generaI, anintrusion detection system builds the behavior models of a resource using a set of ...
    Page 1. Proceedings of Intemational Joint Conference on Neural Networks, Montreal, Canada, July 31 - August 4, 2005 A Fast Neural Network-Based Detection and Tracking of Dim Moving Targets in FUR Imagery Jagdish Chandra ...
    Abstract-A computational efficient artificial neural network for adaptive channel equalization in a digital communication system with4-QAM signal constellation is purposed. We proposed a single layer Chebyshev neural network (ChNN) by... more
    Abstract-A computational efficient artificial neural network for adaptive channel equalization in a digital communication system with4-QAM signal constellation is purposed. We proposed a single layer Chebyshev neural network (ChNN) by expanding the input pattern by ...
    ABSTRACT
    Page 1. Primary Channel Assignment based MAC (PCAM) – A Multi-Channel MAC Protocol for Multi-Hop Wireless Networks Jaya Shankar Pathmasuntharam1,2 1Networking Department, Communications and Device Division ...
    ABSTRACT
    Research Interests:
    ... Gray hole attacks are hard to detect due to the sporadic sinking behavior ... In the first stage, theimplementation of the protocol is analyzed for understanding the propaga-tion ... At the second stage, causal relationships between... more
    ... Gray hole attacks are hard to detect due to the sporadic sinking behavior ... In the first stage, theimplementation of the protocol is analyzed for understanding the propaga-tion ... At the second stage, causal relationships between different attack behaviors and the extents of disruption ...
    ... The work introduced a novel concept of evaluating ad hoc IDS models using knownattack libraries in different configurations. ... Detection accuracy and false alarms are the primary evaluation parameters for assessing of the IDS model.... more
    ... The work introduced a novel concept of evaluating ad hoc IDS models using knownattack libraries in different configurations. ... Detection accuracy and false alarms are the primary evaluation parameters for assessing of the IDS model. ...
    ... Liu et al. [9] proposed a novel distributed cross layer ... [7] Thamilarasu, G., et al. A cross-layer based intrusion detection approach for wireless ad hoc networks. ... 2005. [10] Deng, H., Q.-A. Zeng, and DP Agrawal, SVM-based... more
    ... Liu et al. [9] proposed a novel distributed cross layer ... [7] Thamilarasu, G., et al. A cross-layer based intrusion detection approach for wireless ad hoc networks. ... 2005. [10] Deng, H., Q.-A. Zeng, and DP Agrawal, SVM-based intrusion detection system for wireless ad hoc networks. ...
    ... Neural-Network-Based Smart Sensor Framework Operating in a Harsh Environment Jagdish C. Patra Division of Computer Communications, School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email:... more
    ... Neural-Network-Based Smart Sensor Framework Operating in a Harsh Environment Jagdish C. Patra Division of Computer Communications, School of Computer Engineering, Nanyang Technological University, Singapore 639798 Email: aspatra@ntu.edu.sg ...
    ... Jagdish Chandra Patra, Ee Luang Ang and Amitabha Das School of Computer Engineering Nanyang Technological University, Singapore 639798 E.mail addresses: {aspatra, aselang, asadas }@ntu.edu.sg Abstract An artificial neural network... more
    ... Jagdish Chandra Patra, Ee Luang Ang and Amitabha Das School of Computer Engineering Nanyang Technological University, Singapore 639798 E.mail addresses: {aspatra, aselang, asadas }@ntu.edu.sg Abstract An artificial neural network (NN)-based smart interface for ...
    Abstract Widespread application of computer network has evoked a lot of interest for cyber attackers to target these systems. In addition to cryptography based protective techniques such as authentication and authorization, several... more
    Abstract Widespread application of computer network has evoked a lot of interest for cyber attackers to target these systems. In addition to cryptography based protective techniques such as authentication and authorization, several defense measures, like Intrusion ...
    We propose and analyze a generalized self-healing key distribution using vector space access structure in order to reach more flexible performance of the scheme. Our self-healing technique enables better performance gain over previous... more
    We propose and analyze a generalized self-healing key distribution using vector space access structure in order to reach more flexible performance of the scheme. Our self-healing technique enables better performance gain over previous approaches in terms of storage, communication and computation complexity. We provide rigorous treatment of security of our scheme in an appropriate security framework and show it is
    Abstract—Traditional digital rights management (DRM) sys-tems are only two party systems, involving the owner and con-sumers. However, for scalability of business it is often necessary to involve additional levels of distributors and... more
    Abstract—Traditional digital rights management (DRM) sys-tems are only two party systems, involving the owner and con-sumers. However, for scalability of business it is often necessary to involve additional levels of distributors and sub-distributors, who can promote and ...
    We present a parallel algorithm for RNS to binary conversion, which is computationally efficient and requires moderate amount of storage. The algorithm is based on a graphical interpretation of the residue numbers, and imposes no... more
    We present a parallel algorithm for RNS to binary conversion, which is computationally efficient and requires moderate amount of storage. The algorithm is based on a graphical interpretation of the residue numbers, and imposes no restriction on the size or choice of moduli set. The parallel time complexity of the algorithm is Θ upper bound [(log k)], where k is the size of the moduli set
    Research Interests:
    Usually the environmental parameters influence the sensor characteristics in a nonlinear manner. Therefore obtaining correct readout from a sensor under varying environmental conditions is a complex problem. In this paper we propose a... more
    Usually the environmental parameters influence the sensor characteristics in a nonlinear manner. Therefore obtaining correct readout from a sensor under varying environmental conditions is a complex problem. In this paper we propose a neural network (NN)-based interface framework to automatically compensate for the nonlinear influence of the environmental temperature and the nonlinear-response characteristics of a capacitive pressure sensor (CPS) to provide correct readout. With extensive simulation studies we have shown that the NN-based inverse model of the CPS can estimate the applied pressure with a maximum error of +/- 1.0% for a wide temperature variation from 0 to 250 degrees C. A microcontroller unit-based implementation scheme is also proposed.
    This paper presents new MRF (Markov random field) models in a bidirectional Bayesian framework for accurate motion and occlusion field estimation. With careful selection of the five free parameters required by the models, good... more
    This paper presents new MRF (Markov random field) models in a bidirectional Bayesian framework for accurate motion and occlusion field estimation. With careful selection of the five free parameters required by the models, good experimental results have been obtained. The resultant computational speed is also 5.5 times faster compared with the conventional "iterated conditional mode" relaxation using the proposed fast
    The uniqueness of security vulnerabilities in ad hoc networks has given rise to the need for designing novel intrusion detection algorithms, different from those present in conventional networks. In this work, we propose an autonomous... more
    The uniqueness of security vulnerabilities in ad hoc networks has given rise to the need for designing novel intrusion detection algorithms, different from those present in conventional networks. In this work, we propose an autonomous host-based intrusion detection system for detecting malicious sinking behavior. The proposed detection system maximizes the detection accuracy by using cross-layer features to define a routing

    And 8 more