PAREEKSHA: a machine learning approach for intrusion and anomaly detection

A Nagaraja, S Aljawarneh - … of the First International Conference on Data …, 2018 - dl.acm.org
Membership functions help us to identify and know the similarity between two elements such
as vectors or sequences. The objective of this paper is to suggest a membership function …

GARUDA: Gaussian dissimilarity measure for feature representation and anomaly detection in Internet of things

SA Aljawarneh, R Vangipuram - The Journal of Supercomputing, 2020 - Springer
The objective of any anomaly detection system is to efficiently detect several types of
malicious traffic patterns that cannot be detected by conventional firewall systems …

CLAPP: A self constructing feature clustering approach for anomaly detection

RK Gunupudi, M Nimmala, N Gugulothu… - Future Generation …, 2017 - Elsevier
The term internet of things is a buzz word these days and as per Google survey conducted
recently, it has even dominated the buzz word big data predominantly. However, IoT area is …

Study of Detection of DDoS attacks in cloud environment Using Regression Analysis

A Nagaraja, U Boregowda, R Vangipuram - International Conference on …, 2021 - dl.acm.org
Distributed Denial of Service (DDoS) attacks in the cloud environment are not as simple as
the same attacks which occur in the traditional physical network environment. Not only one …

ASTRA-A Novel interest measure for unearthing latent temporal associations and trends through extending basic gaussian membership function

V Radhakrishna, SA Aljawarneh… - Multimedia Tools and …, 2019 - Springer
Time profiled association mining is one of the important and challenging research problems
that is relatively less addressed. Time profiled association mining has two main challenges …

Using normal distribution to retrieve temporal associations by Euclidean distance

A Cheruvu, V Radhakrishna… - … on Engineering & MIS …, 2017 - ieeexplore.ieee.org
Euclidean distance measure is widely adopted distance measure to find the distance
between any two vectors. In this paper, we extend the use of Euclidean distance to the …

Trusted system-calls analysis methodology aimed at detection of compromised virtual machines using sequential mining

N Nissim, Y Lapidot, A Cohen, Y Elovici - Knowledge-Based Systems, 2018 - Elsevier
Most organizations today employ cloud-computing environments and virtualization
technology; Due to their prevalence and importance in providing services to the entire …

A similarity measure for outlier detection in timestamped temporal databases

V Radhakrishna, PV Kumar, V Janaki… - … on engineering & …, 2016 - ieeexplore.ieee.org
Outlier Detection is one of the important research problems in temporal data mining. A
pattern in time stamped temporal database is a sequence of probability values. Finding …

SRIHASS-a similarity measure for discovery of hidden time profiled temporal associations

V Radhakrishna, P Veereswara Kumar… - Multimedia Tools and …, 2018 - Springer
Mining and visualization of time profiled temporal associations is an important research
problem that is not addressed in a wider perspective and is understudied. Visual analysis of …

Mining outlier temporal association patterns

V Radhakrishna, PV Kumar, V Janaki - Proceedings of the Second …, 2016 - dl.acm.org
Temporal pattern mining is the recent research among researchers contributing in the areas
of data mining, medical mining, spatial data mining, health informatics and gaining …