Search Results - "Sanjeetha, R"
-
1
Mitigation of DDoS Attack in SDN using Table Miss-entry
Published in 2022 4th International Conference on Circuits, Control, Communication and Computing (I4C) (21-12-2022)“…SDNs or Software Defined Networks differ from traditional networks due to the separation of the control and data plane. However, it is this centralized control…”
Get full text
Conference Proceeding -
2
Mitigation of DDoS attacks in Software Defined Networks at application level
Published in 2019 PhD Colloquium on Ethically Driven Innovation and Technology for Society (PhD EDITS) (01-08-2019)“…Software-Defined Network's (SDN) core working depends on the centralized controller which implements the control plane. With the help of this controller,…”
Get full text
Conference Proceeding -
3
Early Detection and Diminution of DDoS attack instigated by compromised switches on the controller in Software Defined Networks
Published in 2019 IEEE International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics (DISCOVER) (01-08-2019)“…Software Defined Networks (SDN) provides separation of data plane and control plane, which can be used for implementing various network solutions like traffic…”
Get full text
Conference Proceeding -
4
Botnet Forensic Analysis in Software Defined Networks using Ensemble Based Classifier
Published in 2022 4th International Conference on Circuits, Control, Communication and Computing (I4C) (21-12-2022)“…Software Defined Networks (SDN), a developing technology is replacing the conventional networking solutions that are currently in use. It helps greatly with…”
Get full text
Conference Proceeding -
5
Mitigation of Combined DDoS attack on SDN Controller and Primary Server in Software Defined Networks using a priority on traffic variation
Published in 2020 International Conference for Emerging Technology (INCET) (01-06-2020)“…A Distributed Denial of Service ( DDoS ) attack is usually instigated on a primary server that provides important services in a network. However such DDoS…”
Get full text
Conference Proceeding -
6
Mitigating HTTP GET FLOOD DDoS attack using an SDN controller
Published in 2020 International Conference on Recent Trends on Electronics, Information, Communication & Technology (RTEICT) (12-11-2020)“…DDoS attacks are pre-dominant in traditional networks, they are used to bring down the services of important servers in the network, thereby affecting its…”
Get full text
Conference Proceeding -
7
Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks
Published in 2018 IEEE International Conference on Advanced Networks and Telecommunications Systems (ANTS) (01-12-2018)“…One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for…”
Get full text
Conference Proceeding -
8
Detection and Prediction of the Preictal State of an Epileptic Seizure using Machine Learning Techniques on EEG Data
Published in 2019 IEEE Bombay Section Signature Conference (IBSSC) (01-07-2019)“…Epilepsy, a disorder that leads to abnormal activities in the brain is primarily caused by excessive neuronal activity. Patients diagnosed with epilepsy…”
Get full text
Conference Proceeding -
9
Transforming NoSQL Database to Relational Database: An Algorithmic Approach
Published in 2022 IEEE 3rd Global Conference for Advancement in Technology (GCAT) (07-10-2022)“…Use of NoSQL to maintain databases has gained popularity in recent times. However, traditional relational databases provide structured data which helps in…”
Get full text
Conference Proceeding -
10
Detection and Mitigation of Low and Slow DDoS attack in an SDN environment
Published in 2022 International Conference on Distributed Computing, VLSI, Electrical Circuits and Robotics ( DISCOVER) (14-10-2022)“…Distributed Denial of Service (DDoS) attacks aim to make a server unresponsive by flooding the target server with a large volume of packets (Volume based DDoS…”
Get full text
Conference Proceeding -
11
Implementation of hardware agnostic fast path packet processing
Published in 2016 International Conference on Research Advances in Integrated Navigation Systems (RAINS) (01-05-2016)“…The core functionality of a network is packet processing. Fast Path is the functional area that handles processing of packets. The Fast Path functionalities is…”
Get full text
Conference Proceeding -
12
Smart waste Collecting Hopper (SWaCH): A service for all
Published in 2015 Twelfth International Conference on Wireless and Optical Communications Networks (WOCN) (01-09-2015)“…One of the major issues in urban areas is waste disposal. The country's per capita waste generation is so high, that lack of timely waste collection results in…”
Get full text
Conference Proceeding