• Publications
  • Influence
Polynomial-based key management for secure intra-group and inter-group communication
tl;dr
Proposed polynomial-based key management schemes have the following advantages: (1) Group members can share the intra-group key without any encryption/decryption. Expand
  • 50
  • 6
  • Open Access
A Comprehensive Categorization of DDoS Attack and DDoS Defense Techniques
tl;dr
Distributed Denial of Service (DoS) attack is the greatest security fear for IT managers. Expand
  • 33
  • 2
On Improving the Accuracy and Performance of Content-Based File Type Identification
tl;dr
In the presence of adversaries, analyzing the file content may be a more reliable way to identify file types, but existing approaches of file type analysis still need to be improved in terms of accuracy. Expand
  • 24
  • 2
  • Open Access
Binding Update Authentication Scheme for Mobile IPv6
tl;dr
We improve one of the route optimization security mechanisms called bombing resistant protocol, and propose a new binding update authentication scheme. Expand
  • 2
  • 2
Biologically Inspired Computer Virus Detection System
tl;dr
This paper discusses the principle of artificial immune system and proposes artificial immune based virus detection system that can detect unknown viruses. Expand
  • 10
  • 1
Fast Content-Based File Type Identification
tl;dr
This paper proposes two techniques for reducing the classification time. Expand
  • 24
  • 1
  • Open Access
Collaborative Peer to Peer Defense Mechanism for DDoS Attacks
tl;dr
We investigated the packet flood attacks and presented a collaborative peer to peer defense mechanism, where heterogeneous defence nodes are placed in the network and monitor traffic in cooperative manner with other nodes. Expand
  • 18
  • 1
  • Open Access
Content-based File-type Identification Using Cosine Similarity and a Divide-and-Conquer Approach
tl;dr
We use the cosine distance as a similarity metric when comparing the file content rather than the Mahalanobis distance that is popular and has been used by the other related approaches. Expand
  • 12
  • 1
  • Open Access
Optimal Scheduling Algorithms in WDM Optical Passive Star Networks
tl;dr
We take δ to be an arbitrary nonnegative integer which can be expressed in units of packet durations for arbitrary number of wavelengths and for arbitrary value of the tuning delay. Expand
  • 12
  • 1
  • Open Access
A Dynamic Path Identification Mechanism to Defend Against DDoS Attacks
tl;dr
This paper suggests the method to decide the marking bit size dynamically in accordance with the number of hop counts. Expand
  • 4
  • 1