Search Results - "Kalita, J K"

Refine Results
  1. 1

    Network Anomaly Detection: Methods, Systems and Tools by Bhuyan, Monowar H., Bhattacharyya, D. K., Kalita, J. K.

    Published in IEEE Communications surveys and tutorials (01-01-2014)
    “…Network anomaly detection is an important and dynamic research area. Many network intrusion detection methods and systems (NIDS) have been proposed in the…”
    Get full text
    Journal Article
  2. 2

    MIFS-ND: A mutual information-based feature selection method by Hoque, N., Bhattacharyya, D.K., Kalita, J.K.

    Published in Expert systems with applications (15-10-2014)
    “…•We propose a greedy feature selection method using mutual information theory.•The method uses feature–class and feature–feature mutual information.•We use…”
    Get full text
    Journal Article
  3. 3

    Detecting Distributed Denial of Service Attacks: Methods, Tools and Future Directions by Bhuyan, Monowar H, Kashyap, H J, Bhattacharyya, D K, Kalita, J K

    Published in Computer journal (01-04-2014)
    “…Distributed denial of service (DDoS) attack is a coordinated attack, generally performed on a massive scale on the availability of services of a target system…”
    Get full text
    Journal Article
  4. 4

    Surveying Port Scans and Their Detection Methodologies by Bhuyan, Monowar H., Bhattacharyya, D.K., Kalita, J.K.

    Published in Computer journal (01-10-2011)
    “…Scanning of ports on a computer occurs frequently on the Internet. An attacker performs port scans of Internet protocol addresses to find vulnerable hosts to…”
    Get full text
    Journal Article
  5. 5

    A multi-step outlier-based anomaly detection approach to network-wide traffic by Bhuyan, Monowar H., Bhattacharyya, D.K., Kalita, J.K.

    Published in Information sciences (20-06-2016)
    “…•We propose a multi-step outlier-based anomaly detection approach to network-wide traffic.•We propose a feature selection algorithm to select relevant…”
    Get full text
    Journal Article
  6. 6

    Unmasking the common traits: an ensemble approach for effective malware detection by Borah, Parthajit, Sarmah, Upasana, Bhattacharyya, D. K., Kalita, J. K.

    “…Malware detection has become a critical aspect of ensuring the security and integrity of computer systems. With the ever-evolving landscape of malicious…”
    Get full text
    Journal Article
  7. 7

    Network attacks: Taxonomy, tools and systems by Hoque, N., Bhuyan, Monowar H., Baishya, R.C., Bhattacharyya, D.K., Kalita, J.K.

    “…To prevent and defend networks from the occurrence of attacks, it is highly essential that we have a broad knowledge of existing tools and systems available in…”
    Get full text
    Journal Article
  8. 8

    E‐LDAT: a lightweight system for DDoS flooding attack detection and IP traceback using extended entropy metric by Bhuyan, Monowar H., Bhattacharyya, D. K., Kalita, J. K.

    Published in Security and communication networks (10-11-2016)
    “…Distributed denial‐of‐service (DDoS) attacks cause havoc by exploiting threats to Internet services. In this paper, we propose E‐LDAT, a lightweight…”
    Get full text
    Journal Article
  9. 9

    BicBioEC: biclustering in biomarker identification for ESCC by Kakati, P., Bhattacharyya, D. K., Kalita, J. K.

    “…Analysis of gene expression patterns enables identification of significant genes related to a specific disease. We analyze gene expression data for esophageal…”
    Get full text
    Journal Article
  10. 10

    Detecting protein complexes based on a combination of topological and biological properties in protein-protein interaction network by Sharma, Pooja, Bhattacharyya, D.K., Kalita, J.K.

    “…Protein complexes are known to play a major role in controlling cellular activity in a living being. Identifying complexes from raw protein protein…”
    Get full text
    Journal Article
  11. 11

    A Fuzzy Mutual Information-based Feature Selection Method for Classification by Hoque, N., Ahmed, H.A., Bhattacharyya, D.K., Kalita, J.K.

    Published in Fuzzy information and engineering (01-09-2016)
    “…In this paper, we present a feature selection method called Fuzzy Mutual Information-based Feature Selection with Non-Dominated solution (FMIFS-ND) using a…”
    Get full text
    Journal Article
  12. 12

    An empirical evaluation of information metrics for low-rate and high-rate DDoS attack detection by Bhuyan, Monowar H., Bhattacharyya, D.K., Kalita, J.K.

    Published in Pattern recognition letters (01-01-2015)
    “…•Most common information metrics used in detecting DDoS attacks are discussed.•Empirical evaluation of information metrics for detecting DDoS attack is…”
    Get full text
    Journal Article
  13. 13

    An effective graph-based clustering technique to identify coherent patterns from gene expression data by Priyadarshini, G, Sarmah, R, Chakraborty, B, Bhattacharyya, D K, Kalita, J K

    “…This paper presents an effective parameter-less graph based clustering technique (GCEPD). GCEPD produces highly coherent clusters in terms of various cluster…”
    Get more information
    Journal Article
  14. 14

    XSSD: A Cross-site Scripting Attack Dataset and its Evaluation by Sarmah, Upasana, Bhattacharyya, D. K., Kalita, J. K.

    “…Cross-site Scripting (abbreviated as XSS) attacks are application level code injection attacks where a malicious user injects malicious scripts into the…”
    Get full text
    Conference Proceeding
  15. 15

    A survey of detection methods for XSS attacks by Sarmah, Upasana, Bhattacharyya, D.K., Kalita, J.K.

    “…Cross-site scripting attack (abbreviated as XSS) is an unremitting problem for the Web applications since the early 2000s. It is a code injection attack on the…”
    Get full text
    Journal Article
  16. 16

    Malware Dataset Generation and Evaluation by Borah, Parthajit, Bhattacharyya, DK, Kalita, JK

    “…With the rapid growth of technology and IT-enabled services, the potential damage caused by malware is increasing rapidly. A large number of detection methods…”
    Get full text
    Conference Proceeding
  17. 17

    A Survey of Outlier Detection Methods in Network Anomaly Identification by Gogoi, P., Bhattacharyya, D. K., Borah, B., Kalita, J. K.

    Published in Computer journal (01-04-2011)
    “…The detection of outliers has gained considerable interest in data mining with the realization that outliers can be the key discovery to be made from very…”
    Get full text
    Journal Article
  18. 18

    Low-Rate and High-Rate Distributed DoS Attack Detection Using Partial Rank Correlation by Bhuyan, M. H., Kalwar, A., Goswami, A., Bhattacharyya, D. K., Kalita, J. K.

    “…Distributed Denial of Service (DDoS) attacks pose a serious threat to efficient and uninterrupted Internet services. During Distributed Denial of Service…”
    Get full text
    Conference Proceeding
  19. 19

    MLH-IDS: A Multi-Level Hybrid Intrusion Detection Method by Gogoi, Prasanta, Bhattacharyya, D K, Borah, B, Kalita, Jugal K

    Published in Computer journal (01-04-2014)
    “…With the growth of networked computers and associated applications, intrusion detection has become essential to keeping networks secure. A number of intrusion…”
    Get full text
    Journal Article
  20. 20