Work place: National Institute of Technology, Jalandhar, India
E-mail: Sangal62@yahoo.com
Website:
Research Interests: Computer Networks, Network Architecture, Network Security
Biography
Dr.A. L. Sangal is professor in the Department of Computer Science and Engineering, at Dr. B.R. Ambedkar National Institute of Technology Jalandhar (Punjab), India since 2008. He obtained his B.Tech. Degree from Panjab Engineering College Chandigarh, India in the year 1985 and Master Degree in the year 1991 from Thapar Institute of Engineering & Technology Patiala (Punjab), India and Ph.D. in the field of Scientific Computing from Dr. B.R. Ambedkar National Institute of Technology Jalandhar (Punjab), India in 2008. He has served as a faculty at Thapar Institute of Engineering & Technology Patiala and Dr. B.R. Ambedkar National Institute of Technology Jalandhar and served as Head of the Department of Computer Science and Engineering since 1992-2006. He has published many research papers in the field of Scientific Computing and Wireless Networks in International Journal and Conferences. One candidate has completed his doctorate under his guidance and presently guiding seven research scholars of Ph.D.
By Abhinav Bhandari A.L Sangal Krishan Kumar
DOI: https://doi.org/10.5815/ijcnis.2015.08.02, Pub. Date: 8 Jul. 2015
With all the brisk growth of web, distributed denial of service attacks are becoming the most serious issues in a data center scenarios where lot many servers are deployed. A Distributed Denial of Service attack gen-erates substantial packets by a large number of agents and can easily tire out the processing and communication resources of a victim within very less period of time. Defending DDoS problem involved several steps from detection, characterization and traceback in order todomitigation. The contribution of this research paper is a lot more. Firstly, flooding based DDoS problems is detected using obtained packets based entropy approach in a data center scenario. Secondly entropy based traceback method is applied to find the edge routers from where the whole attack traffic is entering into the ISP domain of the data center. Various simulation scenarios using NS2 are depicted in order to validate the proposed method using GT-ITM primarily based topology generators. Information theory based metrics like entropy; average entropy and differential entropy are used for this purpose.
[...] Read more.By Harminder Singh Bindra A.L Sangal
DOI: https://doi.org/10.5815/ijcnis.2012.12.06, Pub. Date: 8 Nov. 2012
Recent wireless networks observe number of deployments in various conditions where they come across different intensities of link disconnection. On the basis of extent of the operating circumstances these networks are termed as Intermittently Connected Networks (ICNs). The prevailing TCP/IP protocol cannot be operational in ICNs thus providing number of new stimulating problems that are appealing the focus of the researchers. The multi-copy routing schemes achieve higher delivery probability as compared to the single copy routing scheme. This improvement is achieved at the cost of higher resource utilization i.e. multi-copy routing protocols requires more buffer space, more bandwidth, incur more overheads and consume other vital network resources. Contribution of this work is the deletion of useless replicas of the messages which are already delivered to the intended destination. We evaluate our proposed method by simulation, on four major DTNs routing algorithms: Epidemic, Spray and Wait, ProPHET and MaxProp.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals