Manoj Rameshchandra Thakur

Learn More
In this paper, we suggest a multi-dimensional approach towards intrusion detection. Network and system usage parameters like source and destination IP addresses; source and destination ports; incoming and outgoing network traffic data rate and number of CPU cycles per request are divided into multiple dimensions. Rather than analyzing raw bytes of data(More)
One of the most significant threats faced by enterprise networks today is from Bots. A Bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A collection of Bots in a network, used for malicious purposes is referred to as a Botnet. Bot attacks can(More)
A number of systems in recent times suffer from attacks like DDoS and Ping of Death. Such attacks result in loss of critical system resources and CPU cycles, as these compromised systems behave in an abnormal manner. The effect of such abnormalities is worse in case of compromised systems handling financial transaction, since it leads to severe monetary(More)
A number of works in the field of intrusion detection have been based on Artificial Immune System and Soft Computing. Artificial Immune System based approaches attempt to leverage the adaptability, error tolerance, self-monitoring and distributed nature of Human Immune Systems. Whereas Soft Computing based approaches are instrumental in developing fuzzy(More)
A number of works in the field of intrusion detection have been based on Artificial Immune System and Soft Computing. Artificial-Immune-System-based approaches attempt to leverage the adaptability, error tolerance, self-monitoring and distributed nature of Human Immune Systems. The Soft-Computing-based approaches are instrumental in developing(More)
Bots, in recent times, have posed a major threat to enterprise networks. With the distributed nature of the way in which botnets operate, the problems faced by enterprises have become acute. A bot is a program that operates as an agent for a user and runs automated tasks over the internet, at a much higher rate than would be possible for a human alone. A(More)
The introduction of the social networking platform has drastically affected the way individuals interact. Even though most of the effects have been positive, there exist some serious threats associated with the interactions on a social networking website. A considerable proportion of the crimes that occur are initiated through a social networking platform(More)
Nature and natural organisms have always inspired researchers and scientists for solving real world issues. And Computer security is no exception. Artificial Immune System inspired from natural Immune System works efficiently for detecting intrusion in a network. Two layers of defenses: innate system and adaptive system are implemented in this proposed(More)
Much is known about the Escherichia coli nucleotide excision repair (NER) pathway; however, very little is understood about the proteins involved and the molecular mechanism of NER in mycobacteria. In this study, we show that Mycobacterium tuberculosis UvrB (MtUvrB), which exists in solution as a monomer, binds to DNA in a structure-dependent manner. A(More)
  • 1