Visible to the public Biblio

Filters: Author is Yuvaraj, D.  [Clear All Filters]
2023-04-14
Yuvaraj, D., Anitha, M, Singh, Brijesh, Karyemsetty, Nagarjuna, Krishnamoorthy, R., Arun, S..  2022.  Systematic Review of Security Authentication based on Block Chain. 2022 3rd International Conference on Smart Electronics and Communication (ICOSEC). :768–771.
One of the fifth generation’s most promising solutions for addressing the network system capacity issue is the ultra-dense network. However, a new problem arises because the user equipment secure access is made up of access points that are independent, transitory, and dynamic. The APs are independent and equal in this. It is possible to think of it as a decentralized access network. The access point’s coverage is less than the standard base stations. The user equipment will interface with access points more frequently as it moves, which is a problem. The current 4G Authentication and Key Agreement method, however, is unable to meet this need for quick and frequent authentication. This study means to research how blockchain innovation is being utilized in production network the executives, as well as its forthcoming purposes and arising patterns. To more readily comprehend the direction of important exploration and illuminate the benefits, issues, and difficulties in the blockchain-production network worldview, a writing overview and a logical evaluation of the current examination on blockchain-based supply chains were finished. Multifaceted verification strategies have as of late been utilized as possible guards against blockchain attacks. To further develop execution, scatter administration, and mechanize processes, inventory network tasks might be upset utilizing blockchain innovation
2021-09-07
Priya, S.Shanmuga, Sivaram, M., Yuvaraj, D., Jayanthiladevi, A..  2020.  Machine Learning Based DDOS Detection. 2020 International Conference on Emerging Smart Computing and Informatics (ESCI). :234–237.
One of a high relentless attack is the crucial distributed DoS attacks. The types and tools for this attacks increases day-to-day as per the technology increases. So the methodology for detection of DDoS should be advanced. For this purpose we created an automated DDoS detector using ML which can run on any commodity hardware. The results are 98.5 % accurate. We use three classification algorithms KNN, RF and NB to classify DDoS packets from normal packets using two features, delta time and packet size. This detector mostly can detect all types of DDoS such as ICMP flood, TCP flood, UDP flood etc. In the older systems they detect only some types of DDoS attacks and some systems may require a large number of features to detect DDoS. Some systems may work only with certain protocols only. But our proposed model overcome these drawbacks by detecting the DDoS of any type without a need of specific protocol that uses less amount of features.
2020-09-14
Sivaram, M., Ahamed A, Mohamed Uvaze, Yuvaraj, D., Megala, G., Porkodi, V., Kandasamy, Manivel.  2019.  Biometric Security and Performance Metrics: FAR, FER, CER, FRR. 2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE). :770–772.
Biometrics manages the computerized acknowledgment of people dependent on natural and social attributes. The example acknowledgment framework perceives an individual by deciding the credibility of a particular conduct normal for person. The primary rule of biometric framework is recognizable proof and check. A biometric confirmation framework use fingerprints, face, hand geometry, iris, and voice, mark, and keystroke elements of a person to recognize an individual or to check a guaranteed character. Biometrics authentication is a form of identification and access control process which identify individuals in packs that are under reconnaissance. Biometric security system increase in the overall security and individuals no longer have to deal with lost ID Cards or forgotten passwords. It helps much organization to see everyone is at a certain time when something might have happened that needs reviewed. The current issues in biometric system with individuals and many organization facing are personal privacy, expensive, data's may be stolen.