Tarun Bhaskar

Learn More
Computer networks are now necessities of modern organisations and network security has become a major concern for them. In this paper we have proposed a holistic approach to network security with a hybrid model that includes an Intrusion Detection System (IDS) to detect network attacks and a survivability model to assess the impacts of undetected attacks. A(More)
Recently, mining negative association rules has received some attention and been proved to be useful in real world. This paper presents an efficient algorithm (PNAR) for mining both positive and negative association rules in databases. The algorithm extends traditional association rules to include negative association rules. When mining negative association(More)
Intrusion detection system (IDS) is now becoming an integral part of the network security infrastructure. Data mining tools are widely used for developing an IDS. However, this requires an ability to find the mapping from the input space to the output space with the help of available data. Rough sets and neural networks are the best known data mining tools(More)
Reassembly of file fragments in the absence of file table information is a challenging problem in Digital Forensics and File Recovery. In literature we find file type specific solutions to this problem. In this paper we investigate a generalized solution that can be applied to every type of file. We present a technique to reassemble any type of fragmented(More)
We study joint end-to-end congestion control and Per-link medium access control (MAC) in ad-hoc networks. We use a network utility maximization formulation, where the goal is to find optimal end-to-end source rates at the transport layer and per-link persistence probabilities at the medium access control (MAC) layer to maximize the aggregate source utility.(More)
Server less distributed computing has received significant attention from both the business and the investigate society. Among the most popular applications are the wide-area network file systems, exemplified by CFS, Farsite, and Ocean Store. These file systems store files on a large collection of untrusted nodes that form an overlay network. They use(More)