Skip to main content

Showing 1–14 of 14 results for author: Gupta, B B

Searching in archive cs. Search in all archives.
.
  1. arXiv:2110.03445  [pdf

    cs.CR cs.AI

    PWG-IDS: An Intrusion Detection Model for Solving Class Imbalance in IIoT Networks Using Generative Adversarial Networks

    Authors: Lei Zhang, Shuaimin Jiang, Xiajiong Shen, Brij B. Gupta, Zhihong Tian

    Abstract: With the continuous development of industrial IoT (IIoT) technology, network security is becoming more and more important. And intrusion detection is an important part of its security. However, since the amount of attack traffic is very small compared to normal traffic, this imbalance makes intrusion detection in it very difficult. To address this imbalance, an intrusion detection system called pr… ▽ More

    Submitted 5 October, 2021; originally announced October 2021.

  2. arXiv:2102.10799  [pdf

    cs.LG

    Clustering Algorithm to Detect Adversaries in Federated Learning

    Authors: Krishna Yadav, B. B Gupta

    Abstract: In recent times, federated machine learning has been very useful in building intelligent intrusion detection systems for IoT devices. As IoT devices are equipped with a security architecture vulnerable to various attacks, these security loopholes may bring a risk during federated training of decentralized IoT devices. Adversaries can take control over these IoT devices and inject false gradients t… ▽ More

    Submitted 22 February, 2021; originally announced February 2021.

    Comments: To appear in 39th IEEE Conference on Consumer Electronics(Jan 11-13 2021 )

  3. arXiv:2009.00236  [pdf, other

    cs.LG stat.ML

    A Survey of Deep Active Learning

    Authors: Pengzhen Ren, Yun Xiao, Xiaojun Chang, Po-Yao Huang, Zhihui Li, Brij B. Gupta, Xiaojiang Chen, Xin Wang

    Abstract: Active learning (AL) attempts to maximize the performance gain of the model by marking the fewest samples. Deep learning (DL) is greedy for data and requires a large amount of data supply to optimize massive parameters, so that the model learns how to extract high-quality features. In recent years, due to the rapid development of internet technology, we are in an era of information torrents and we… ▽ More

    Submitted 5 December, 2021; v1 submitted 30 August, 2020; originally announced September 2020.

  4. arXiv:2005.05304  [pdf, other

    cs.CR cs.LG stat.ML

    Cloud-based Federated Boosting for Mobile Crowdsensing

    Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma

    Abstract: The application of federated extreme gradient boosting to mobile crowdsensing apps brings several benefits, in particular high performance on efficiency and classification. However, it also brings a new challenge for data and model privacy protection. Besides it being vulnerable to Generative Adversarial Network (GAN) based user data reconstruction attack, there is not the existing architecture th… ▽ More

    Submitted 9 May, 2020; originally announced May 2020.

    Comments: 17 pages, 7 figures. arXiv admin note: substantial text overlap with arXiv:1907.10218

  5. arXiv:1705.09819  [pdf

    cs.CR

    Defending against Phishing Attacks: Taxonomy of Methods, Current Issues and Future Directions

    Authors: B. B. Gupta, Nalin Asanka Gamagedara Arachchilage, Konstantinos E. Psannis

    Abstract: Internet technology is so pervasive today, for example, from online social networking to online banking, it has made people's lives more comfortable. Due the growth of Internet technology, security threats to systems and networks are relentlessly inventive. One such a serious threat is "phishing", in which, attackers attempt to steal the user's credentials using fake emails or websites or both. It… ▽ More

    Submitted 27 May, 2017; originally announced May 2017.

    Comments: 32, Telecommunication Systems, Springer, 2017

  6. arXiv:1701.03229  [pdf

    cs.CR

    Security Strength Indicator in Fallback Authentication: Nudging Users for Better Answers in Secret Questions

    Authors: Awanthika Senarath, Nalin Asanka Gamagedara Arachchilage, B. B. Gupta

    Abstract: In this paper, we describe ongoing work that focuses on improving the strength of the answers to security questions. The ultimate goal of the proposed research is to evaluate the possibility of nudging users towards strong answers for ubiquitous security questions. In this research we are proposing a user interface design for fallback authentication to encourage users to design stronger answers. T… ▽ More

    Submitted 11 January, 2017; originally announced January 2017.

    Comments: 5 pages in International Journal for Infonomics (IJI), 2016

  7. arXiv:1304.7073  [pdf

    cs.CR

    Enhanced CBF Packet Filtering Method to Detect DDoS Attack in Cloud Computing Environment

    Authors: Priyanka Negi, Anupama Mishra, B. B. Gupta

    Abstract: Tremendous and extraordinary growths in the field of internet, intranet, extranet and its users have developed an innovative era of great global competition and contention. Denial of service attack by multiple nodes is accomplished of disturbing the services of rival servers. The attack can be for multiple reasons. So it is a major threat for cloud environment. Due to low effectiveness and large s… ▽ More

    Submitted 26 April, 2013; originally announced April 2013.

  8. arXiv:1302.0629  [pdf

    cs.CR

    Phishing Dynamic Evolving Neural Fuzzy Framework for Online Detection Zero-day Phishing Email

    Authors: Ammar ALmomani, B. B. Gupta, Tat-Chee Wan, Altyeb Altaher, Selvakumar Manickam

    Abstract: Phishing is a kind of attack in which criminals use spoofed emails and fraudulent web sites to trick financial organization and customers. Criminals try to lure online users by convincing them to reveal the username, passwords, credit card number and updating account information or fill billing information.

    Submitted 4 February, 2013; originally announced February 2013.

  9. arXiv:1208.3557  [pdf

    cs.CR

    Distributed Denial of Service Prevention Techniques

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: The significance of the DDoS problem and the increased occurrence, sophistication and strength of attacks has led to the dawn of numerous prevention mechanisms. Each proposed prevention mechanism has some unique advantages and disadvantages over the others. In this paper, we present a classification of available mechanisms that are proposed in literature on preventing Internet services from possib… ▽ More

    Submitted 17 August, 2012; originally announced August 2012.

    Comments: ISSN: 1793-8198

    Journal ref: International Journal of Computer and Electrical Engineering (IJCEE), vol. 2, number 2, pp. 268-276, 2010

  10. Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art

    Authors: Esraa Alomari, Selvakumar Manickam, B. B. Gupta, Shankar Karuppayah, Rafeef Alfaris

    Abstract: Botnets are prevailing mechanisms for the facilitation of the distributed denial of service (DDoS) attacks on computer networks or applications. Currently, Botnet-based DDoS attacks on the application layer are latest and most problematic trends in network security threats. Botnet-based DDoS attacks on the application layer limits resources, curtails revenue, and yields customer dissatisfaction, a… ▽ More

    Submitted 2 August, 2012; originally announced August 2012.

  11. arXiv:1204.5592  [pdf

    cs.CR

    Dynamic and Auto Responsive Solution for Distributed Denial-of-Service Attacks Detection in ISP Network

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: Denial of service (DoS) attacks and more particularly the distributed ones (DDoS) are one of the latest threat and pose a grave danger to users, organizations and infrastructures of the Internet. Several schemes have been proposed on how to detect some of these attacks, but they suffer from a range of problems, some of them being impractical and others not being effective against these attacks. Th… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.2400

    Journal ref: International Journal of Computer Theory and Engineering, Vol. 1, No. 1, April 2009 1793-821X

  12. An Efficient Analytical Solution to Thwart DDoS Attacks in Public Domain

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to construct profile of the traffic normally seen in the network to identify anomalies whenever traffic goes out of profile, we have selected volume and… ▽ More

    Submitted 25 April, 2012; originally announced April 2012.

    Comments: arXiv admin note: substantial text overlap with arXiv:1203.2400

    Journal ref: Proceedings of ACM International Conference on Advances in Computer, Communication and Computing (ICAC3-2008), pp. 503-509, Jan. 23-24, 2009,India

  13. arXiv:1203.2400  [pdf

    cs.CR

    An ISP Level Solution to Combat DDoS Attacks using Combined Statistical Based Approach

    Authors: B. B. Gupta, Manoj Misra, R. C. Joshi

    Abstract: Disruption from service caused by DDoS attacks is an immense threat to Internet today. These attacks can disrupt the availability of Internet services completely, by eating either computational or communication resources through sheer volume of packets sent from distributed locations in a coordinated manner or graceful degradation of network performance by sending attack traffic at low rate. In th… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Journal ref: International Journal of Information Assurance and Security (JIAS), vol. 3, no. 2, pp. 102-110, 2008

  14. arXiv:1203.2399  [pdf

    cs.CR

    Estimating strength of DDoS attack using various regression models

    Authors: B. B. Gupta, R. C. Joshi, Manoj Misra

    Abstract: Anomaly-based DDoS detection systems construct profile of the traffic normally seen in the network, and identify anomalies whenever traffic deviate from normal profile beyond a threshold. This extend of deviation is normally not utilised. This paper reports the evaluation results of proposed approach that utilises this extend of deviation from detection threshold to estimate strength of DDoS attac… ▽ More

    Submitted 12 March, 2012; originally announced March 2012.

    Journal ref: Int. J. Multimedia Intelligence and Security, Vol. 1, No. 4, pp.378-391