Work place: University Institute of Engineering & Technology, Panjab University, Chndiagarh, India
E-mail: K.Salujasbs@gmail.com
Website: https://www.researchgate.net/profile/Krishan-Saluja
Research Interests: Sensor, Wireless Networks, Computer Networks, Intrusion Detection System, Network Security, Wireless Ad Hoc Network
Biography
Dr. Krishan Kumar Saluja
Professor
Department of Information Technology
UNIVERSITY INSTITUTE OF ENGINEERING & TECHNOLOGY
PANJAB UNIVERSITY, Sector 25, Chandigarh, India
He has done B. Tech. Computer Science & Engineering from National Institute of Technology, Hamirpur in 1995. He completed his Master of Software Systems from Birla Institute of Technology & Sciences, Pilani in 2001. He finished his regular Ph.D. from Indian Institute of Technology, Roorkee in February, 2008. He has 20 years of teaching, research and administrative experience. His general research interests are in the areas of Network Security and Computer Networks. Specific research interests include Intrusion Detection, Protection from Internet Attacks, Web performance, Network architecture/protocols, and Network measurement/ modeling .He has published 2 national and 2 International Books in the field of Computer Science & Network security. He has published more than 90 papers in national / International peer reviewed / Indexed / impact factor Journals and IEEE, ACM and Springer proceedings. His publications are well cited by eminent researchers in the field.
By Abhinav Bhandari A.L Sangal Krishan Kumar
DOI: https://doi.org/10.5815/ijcnis.2015.08.02, Pub. Date: 8 Jul. 2015
With all the brisk growth of web, distributed denial of service attacks are becoming the most serious issues in a data center scenarios where lot many servers are deployed. A Distributed Denial of Service attack gen-erates substantial packets by a large number of agents and can easily tire out the processing and communication resources of a victim within very less period of time. Defending DDoS problem involved several steps from detection, characterization and traceback in order todomitigation. The contribution of this research paper is a lot more. Firstly, flooding based DDoS problems is detected using obtained packets based entropy approach in a data center scenario. Secondly entropy based traceback method is applied to find the edge routers from where the whole attack traffic is entering into the ISP domain of the data center. Various simulation scenarios using NS2 are depicted in order to validate the proposed method using GT-ITM primarily based topology generators. Information theory based metrics like entropy; average entropy and differential entropy are used for this purpose.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals