Search Results - "Sanjeetha, R"

  • Showing 1 - 12 results of 12
Refine Results
  1. 1

    Mitigation of DDoS Attack in SDN using Table Miss-entry by Singh, Vaibhav, S, Rajarajeswari, Kanavalli, Anita, R, Sanjeetha

    “…SDNs or Software Defined Networks differ from traditional networks due to the separation of the control and data plane. However, it is this centralized control…”
    Get full text
    Conference Proceeding
  2. 2

    Mitigation of DDoS attacks in Software Defined Networks at application level by Sanjeetha, R., Benoor, Pallavi, Kanavalli, Anita

    “…Software-Defined Network's (SDN) core working depends on the centralized controller which implements the control plane. With the help of this controller,…”
    Get full text
    Conference Proceeding
  3. 3

    Early Detection and Diminution of DDoS attack instigated by compromised switches on the controller in Software Defined Networks by R, Sanjeetha, Pattanaik, Ashutosh, Gupta, Anshul, Kanavalli, Anita

    “…Software Defined Networks (SDN) provides separation of data plane and control plane, which can be used for implementing various network solutions like traffic…”
    Get full text
    Conference Proceeding
  4. 4

    Botnet Forensic Analysis in Software Defined Networks using Ensemble Based Classifier by Sanjeetha, R., Mundada, Monica. R., Vaibhavi, G.S

    “…Software Defined Networks (SDN), a developing technology is replacing the conventional networking solutions that are currently in use. It helps greatly with…”
    Get full text
    Conference Proceeding
  5. 5

    Mitigation of Combined DDoS attack on SDN Controller and Primary Server in Software Defined Networks using a priority on traffic variation by R, Sanjeetha, Srivastava, Shikhar, Kanavalli, Anita, Pattanaik, Ashutosh, Gupta, Anshul

    “…A Distributed Denial of Service ( DDoS ) attack is usually instigated on a primary server that provides important services in a network. However such DDoS…”
    Get full text
    Conference Proceeding
  6. 6

    Mitigating HTTP GET FLOOD DDoS attack using an SDN controller by Sanjeetha, R, Shastry, K.N Ajay, Chetan, H.R, Kanavalli, Anita

    “…DDoS attacks are pre-dominant in traditional networks, they are used to bring down the services of important servers in the network, thereby affecting its…”
    Get full text
    Conference Proceeding
  7. 7

    Mitigation of Controller induced DDoS Attack on Primary Server in High Traffic Scenarios of Software Defined Networks by Sanjeetha, R, Prasanna, Akshar, Pradeep Kumar, D, Kanavalli, Anita

    “…One of the major constraint of a Software Defined Network (SDN) is the limited size of the flow table in the switch. These flow tables are required for…”
    Get full text
    Conference Proceeding
  8. 8

    Detection and Prediction of the Preictal State of an Epileptic Seizure using Machine Learning Techniques on EEG Data by Manasvi Bhat, K, Anchalia, Pratiksha P, Yashashree, S, Sanjeetha, R, Kanavalli, Anita

    “…Epilepsy, a disorder that leads to abnormal activities in the brain is primarily caused by excessive neuronal activity. Patients diagnosed with epilepsy…”
    Get full text
    Conference Proceeding
  9. 9

    Transforming NoSQL Database to Relational Database: An Algorithmic Approach by Anchalia, Aniketh, Paudel, Ankit, Sanjeetha, R, Kakati, Anirudh

    “…Use of NoSQL to maintain databases has gained popularity in recent times. However, traditional relational databases provide structured data which helps in…”
    Get full text
    Conference Proceeding
  10. 10

    Detection and Mitigation of Low and Slow DDoS attack in an SDN environment by Sai, A N H Dhatreesh, Tilak, B H, Sanjith, N Sai, Suhas, Padi, Sanjeetha, R

    “…Distributed Denial of Service (DDoS) attacks aim to make a server unresponsive by flooding the target server with a large volume of packets (Volume based DDoS…”
    Get full text
    Conference Proceeding
  11. 11

    Implementation of hardware agnostic fast path packet processing by Nikhila, Athaluri, Sanjeetha, R., Satheesha, N. K., Kurian, Scaria

    “…The core functionality of a network is packet processing. Fast Path is the functional area that handles processing of packets. The Fast Path functionalities is…”
    Get full text
    Conference Proceeding
  12. 12

    Smart waste Collecting Hopper (SWaCH): A service for all by Wilson, Vivin T., Venkatesh, Madhu, Panicker, Sidharth, Bhat, Sneha G., Sanjeetha, R.

    “…One of the major issues in urban areas is waste disposal. The country's per capita waste generation is so high, that lack of timely waste collection results in…”
    Get full text
    Conference Proceeding