Papers by sangeetha prabhu

CERN European Organization for Nuclear Research - Zenodo, May 9, 2022
Industrial Control Systems become more vulnerable to digital attacks by merging communication gro... more Industrial Control Systems become more vulnerable to digital attacks by merging communication groups and the Internet of Things, which could have severe implications. An Intrusion Detection System is essential in IoT businesses for identifying and stopping assaults. To ensure data privacy and security in the face of digital attacks, legislation and large enterprises should develop network security policies today. As people-based full frameworks have become more vital in today's society, they've also become targets for hostile activities, compelling both industry and research to concentrate more on dealing with local area disruption recognition issues. Contraption reviewing techniques have shown to be effective tools for resolving in-network interruption location issues. Design/Methodology/Approach: This investigation yielded a very unique strategy for tackling hub moderation utilizing a Classification and Encryption method. The UNSW-NB15 dataset is acquired and divided into Data for preparation and testing from the start. The information is pre-handled and included are eliminated right away within the preparation time frame. The TWM Algorithm is then used to determine the relevant highlights from that moment onward. The BRELU-RESNET classifier then sorts the input into went after and nonwent after categories. The compromised information is then saved in the security log record, and the typical data is encrypted using the ESHP-ECC computation. The shortest path distance is then calculated using Euclidean distance. Finally, the data is available. Finally, using the DSHP-ECC computation, the information is decrypted. If the information is available in the log document during testing, it is regarded as the sought-after data and is prevented from the transmission. If it is not present, then the process of digital assault recognition begins. Findings/Result: The research is based on the UNSW-NB 15 dataset, which shows that the proposed method achieves an unreasonable awareness level of 98.34 percent, particularity

Predicting future community intrusions using a novel type and encryption mechanism architecture for attack node mitigation
Annals of the University of Craiova, Mathematics and Computer Science Series
The recent exponential rise in the number of cyber-attacks has demanded intensive study into comm... more The recent exponential rise in the number of cyber-attacks has demanded intensive study into community intrusion detection, prediction, and mitigation systems. Even though there are a variety of intrusion detection technologies available, predicting future community intrusions is still a work in progress. Existing approaches rely on statistical and/or superficial device mastery techniques to solve the problem, and as a result, feature selection and engineering are required. The truth is that no single classifier can provide the highest level of accuracy for all five types of training data set. Cyber-attack detection is a technique for detecting cyber-attacks as they emerge on a laptop or network device, intending to compromise the gadget's security. As a result, using a novel type and encryption mechanism, this paper offered a unique architecture for attack node mitigation. The input UNSW-NB15 dataset is first acquired and divided into training and testing statistics. First and ...

A Novel Approach of BRELU RESNET Based Cyber Attack Detection System with BAIT Based Approach for Mitigation
International Journal of Applied Engineering and Management Letters
Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging communic... more Purpose: Industrial Control Systems become more vulnerable to digital attacks by merging communication groups and the Internet of Things, which could have severe implications. An Intrusion Detection System is essential in IoT businesses for identifying and stopping assaults. To ensure data privacy and security in the face of digital attacks, legislation and large enterprises should develop network security policies today. As people-based full frameworks have become more vital in today's society, they've also become targets for hostile activities, compelling both industry and research to concentrate more on dealing with local area disruption recognition issues. Contraption reviewing techniques have shown to be effective tools for resolving in-network interruption location issues. Design/Methodology/Approach: This investigation yielded a very unique strategy for tackling hub moderation utilizing a Classification and Encryption method. The UNSW-NB15 dataset is acquired and divi...
Impact of Artificial Intelligence in Existence Each Day
Social Science Research Network, Nov 24, 2019

International Journal of Applied Engineering and Management Letters, 2022
Purpose: Because of the apparent rapid advancement in the field of information and communication ... more Purpose: Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality and security of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool. Design/Methodology/Approach: This research provided a fully unique architecture for attack node ...

A Review on Conceptual Model of Cyber Attack Detection and Mitigation Using Deep Ensemble Model
International Journal of Applied Engineering and Management Letters, 2022
Purpose: When communication networks and the internet of things are integrated into business cont... more Purpose: When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation. Design/Methodology/Approach: This study reviews the current status of various cyber-attack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is ...
International Conference on Emerging Trends in Management, IT and Education

Application of Artificial Intelligence in Samsung – A Case Study
International Journal of Case Studies in Business, IT, and Education, 2020
The global quest for issues with Artificial Intelligence (AI) is in a crisis point and the reward... more The global quest for issues with Artificial Intelligence (AI) is in a crisis point and the rewards are great. AI tech is expected to rapidly become a lifestyle for many consumers by everyday interactions with a digital assistant or personalized IT offering solutions based on a client's visual, tactile, or emotional signals. Samsung has been in a fantastic position to turn the future of connected AI technology into reality, from various electronic devices to 5G hardware to strong chipsets, based on roughly half the billion products sold by the company per year. Samsung works with a vision that says "By dedicating our technologies and expertise to support a broader international world, we create superior services and goods." Looking to be a global leader that evolves alongside people and local communities. Samsung It is the largest multinational corporation in South Korea, and is made up of various firms, several of which are named after Samsung. Lee Byung-Chul founded S...

When communication networks and the internet of things are integrated into business control syste... more When communication networks and the internet of things are integrated into business control systems, they become more vulnerable to cyber-attacks, which can have disastrous consequences. An Intrusion Detection System is critical for identifying and blocking attacks in IoT networks. As a result, utilizing a unique Classification and Encryption approach, this article offered a novel architecture for attack node mitigation. Design/Methodology/Approach: This study reviews the current status of various cyberattack detection models and their mitigation techniques. The proposed model works so that the system is first trained on the dataset, including the DDoS attack and ransomware components. The model examines if it contains malware from DDoS or Ransomware. When tested, we use trained information or a data set to provide the results on attack existence and what sort of attack we offer the extracted characteristics of the input. When the model identifies the attacker node, it is removed via the BAIT technique from the network. Findings/Result: Recognizing the importance of information security is critical to combating cybercrime and encouraging cyber security. There are numerous tactics, strategies, and equipment currently in use to detect intrusion in a computer network, and continuing research is being conducted to improve their ability to detect intrusion. The basic version of a cyberassault detection and mitigation system using the BRELU-RESNET method was evaluated in this study. Originality/Value: This review-based research article examines the present state of cyberattack detection and mitigation, as well as the research gaps and research goals.

Because of the apparent rapid advancement in the field of information and communication technolog... more Because of the apparent rapid advancement in the field of information and communication technology and its constant connection to the internet, customer and organizational data have become vulnerable to cyber-attacks, necessitating the explanation of solutions to ensure the security and protection of information throughout the industry. Today, it is critical for governments and major corporations to implement cybersecurity systems to ensure the confidentiality and security of data in the face of cyber-attacks. As community-based fully systems have become more important in today's society, they've become targets for malicious actions, prompting both industry and the research community to place a greater emphasis on resolving community intrusion detection difficulties. In network intrusion detection challenges, gadget examining algorithms have proven to be a valuable tool. Design/Methodology/Approach: This research provided a fully unique architecture for attack node mitigation as a result of the use of a novel type and encryption mechanism. First, the UNSW-NB15 dataset is received and separated into training and testing data. Within the Training section, information is first and foremost pre-processed, and capabilities are extracted. The relevant features are then chosen using the Taxicab Woodpecker Mating algorithm (TWMA). The BRELU-ResNet classifier is then used to classify the attacked and non-attacked data. The typical statistics are encrypted using the ESHP-ECC method, which is then saved in the security log report. Following that, the shortest distance will be calculated using Euclidean distance. Finally, the information is decrypted utilizing a set of ideas known as DSHP-ECC. If the entry appears in the log record while testing, it is marked as attacked statistics and will not be communicated. The method of detecting cyber-assaults will continue if it is not detected. Findings/Result: The analysis is based on the UNSW-NB 15 dataset, which shows that the proposed approach achieves an excessive security level of 93.75 percent. Originality/Value: This experimental-based research article examines the malicious activities in the cyberspace and mitigated by using a SHP-ECC mechanism.

Production of X-RAYS using X-RAY Tube
Journal of Physics: Conference Series
X-rays are usually the most common form of electric magnetic radiation. Technological development... more X-rays are usually the most common form of electric magnetic radiation. Technological developments in imaging have resulted in increasingly powerful and guided X-ray rays, and also growing use of visible light in adolescence microbial tissues and structural elements of materials like concrete. Since its discovery in 1895 X-ray has been commonly used in medication and some areas of technology, science and engineering. The X-ray tube is an essential component of each X-ray union, and in its early stages scientists and doctors utilized gas ion tubing. X-rays are generating because fast-moving electrons suddenly decelerate when they collision with the target anode and interact with it. Therefore, x-ray tube absorbs and dissipates a large heat charge in order to achieve adequate radiation output for digital radiology influencing the structure and function of a x-ray source. An x-ray tube’s key components include electrode and counter electrode frames, rotor and stator, and tube cover. Th...

Cyber attacks are becoming more common and over the last decade, many attacks have made top news,... more Cyber attacks are becoming more common and over the last decade, many attacks have made top news, targeting manufacturing firms and governmental organisations. Such attacks have triggered substantial financial damage and they've been trying to obstruct key public sector operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internet-connected devices is increasingly growing and being easy target of cyber attacks. To counter cyber attacks, information security researchers rely extensively on intrusion detection systems (IDSs) that can identify suspicious activities by comparing patterns of documented attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection, identification and activity on a wide scale networks and Internet of Things. The proposed research aims at developing a practically deployable cyber security solution to one or more of the cyber attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless inject...

SMART BIN: Smart Monitoring System to Keep our City Clean
The Internet of Things is a rapidly changing concept. The Internet is now a manner of existence w... more The Internet of Things is a rapidly changing concept. The Internet is now a manner of existence with the World becoming linked via the Internet. For all our fundamental requirements, we also need the Internet, say for bank account management, grocery shopping, travel arrangements management, the list is infinite. Most of the appliances (“things”) we use it on a regular basis are regulated on in our own mobile devices only by remotes and sometimes by apps. This has resulted into its own “network” and is also frequently referred to as the “Internet of Things”. Using the IoT, all the facilities we use in our daily lives can be monitored and controlled. Most of the process is achieved in IoT using sensors. Everywhere, detectors are created and these devices transform pure physical information into digital signals and deliver them to their command core. Through the Internet, we can track environmental changes remotely from a corner of the world. I work the same way with the mixture of de...

International Journal of Case Studies in Business, IT, and Education (IJCSBE): 4 pp. 40-64 (2)., 2020
Cyber attacks are becoming more common and over the last decade, many attacks have made top news,... more Cyber attacks are becoming more common and over the last decade, many attacks have made top news, targeting manufacturing firms and governmental organisations. Such attacks have triggered substantial financial damage and they've been trying to obstruct key public sector operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internet-connected devices is increasingly growing and being easy target of cyber attacks. To counter cyber attacks, information security researchers rely extensively on intrusion detection systems (IDSs) that can identify suspicious activities by comparing patterns of documented attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection, identification and activity on a wide scale networks and Internet of Things. The proposed research aims at developing a practically deployable cyber security solution to one or more of the cyber attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks, botnets or other malicious activities will be investigated. In this literature survey we are highlighting the work Performed throughout the area of cyber security by various researchers, various types of cyber attacks and its stages, various approaches to prevent cyber attacks, different challenges faced by a preventer, and some gaps in the research. This literature review is carried out by using the secondary data obtained from peer-reviewed journals and other sources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic.

International Journal of Case Studies in Business, IT, and Education (IJCSBE), Nov 21, 2019
Qualcomm Company was founded in San Diego, California, in July 1985 by Irwin Jacobs and Seven. Qu... more Qualcomm Company was founded in San Diego, California, in July 1985 by Irwin Jacobs and Seven. Qualcomm is a multinational American corporation which seeks to design, create and deliver semiconductor devices and facilities to the industry. Qualcomm originates most of its
income from the companies that produce chips and grant patents. Qualcomm has headquarters in nearly 33 nations, with around 35,400 staff worldwide. Qualcomm's quarterly income recorded a 2 percent rise compared to the prior financial process for fiscal year 2018 of US$
21.301 billion. Its stocks traded between 51 and 75 dollars per stock; its market capitalism was assessed at 105 billion dollars at the beginning of 2018. The business places 133rd in revenue among the biggest US companies in the Fortune 500 ranking. The firm concentrates on a
variety of sectors such as car, schooling, health, networking, Internet forall, portable technology, intelligent housing, intelligent towns, intelligent home applications, and wearables. Qualcomm products include Gobi, IPQ, Snapdragon, Powerline, VIVE Wi-Fi Platforms, Mirasol, Pixtronix, AllPlay, 2net, Brew, HealthyCircles, QChat, QLearn, RaptorQ,
Halo and WiPower. Qualcomm products include all types of Gobi, Hy-fi and IPQ products. In the present article, we analyze Qualcomm's business policies by learning different areas of background, economic policy, STEEP evaluation and SWOT analyzes goods.
IJCSBE by sangeetha prabhu

International Journal of Case Studies in Business, IT, and Education (IJCSBE), 2020
Cyber-attacks are becoming more common and over the last decade, many attacks have made
top news,... more Cyber-attacks are becoming more common and over the last decade, many attacks have made
top news, targeting manufacturing firms and governmental organisations. Such attacks have
triggered substantial financial damage and they've been trying to obstruct key public sector
operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. To
counter cyber-attacks, information security researchers rely extensively on intrusion detection
systems (IDSs) that can identify suspicious activities by comparing patterns of documented
attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection,
identification and activity on wide scale networks and Internet of Things. The proposed
research aims at developing a practically deployable cyber security solution to one or more of
the cyber-attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks,
botnets or other malicious activities will be investigated. In this literature survey, we are
highlighting the work Performed throughout the area of cyber security by various researchers,
various types of cyber-attacks and its stages, various approaches to prevent cyber-attacks,
different challenges faced by a preventer, and some gaps in the research. This literature review
is carried out by using the secondary data obtained from peer-reviewed journals and other
sources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic.
Uploads
Papers by sangeetha prabhu
income from the companies that produce chips and grant patents. Qualcomm has headquarters in nearly 33 nations, with around 35,400 staff worldwide. Qualcomm's quarterly income recorded a 2 percent rise compared to the prior financial process for fiscal year 2018 of US$
21.301 billion. Its stocks traded between 51 and 75 dollars per stock; its market capitalism was assessed at 105 billion dollars at the beginning of 2018. The business places 133rd in revenue among the biggest US companies in the Fortune 500 ranking. The firm concentrates on a
variety of sectors such as car, schooling, health, networking, Internet forall, portable technology, intelligent housing, intelligent towns, intelligent home applications, and wearables. Qualcomm products include Gobi, IPQ, Snapdragon, Powerline, VIVE Wi-Fi Platforms, Mirasol, Pixtronix, AllPlay, 2net, Brew, HealthyCircles, QChat, QLearn, RaptorQ,
Halo and WiPower. Qualcomm products include all types of Gobi, Hy-fi and IPQ products. In the present article, we analyze Qualcomm's business policies by learning different areas of background, economic policy, STEEP evaluation and SWOT analyzes goods.
IJCSBE by sangeetha prabhu
top news, targeting manufacturing firms and governmental organisations. Such attacks have
triggered substantial financial damage and they've been trying to obstruct key public sector
operations. Furthermore, as the Internet of Things (IoT) has arisen, the number of Internetconnected devices is increasingly growing and being an easy target of cyber-attacks. To
counter cyber-attacks, information security researchers rely extensively on intrusion detection
systems (IDSs) that can identify suspicious activities by comparing patterns of documented
attacks or detecting anomaly-based activities. This survey aims to tackle Trust, Protection,
identification and activity on wide scale networks and Internet of Things. The proposed
research aims at developing a practically deployable cyber security solution to one or more of
the cyber-attacks. Multi-Stage Attacks (MSAs), APT, DoS attacks, wireless injection attacks,
botnets or other malicious activities will be investigated. In this literature survey, we are
highlighting the work Performed throughout the area of cyber security by various researchers,
various types of cyber-attacks and its stages, various approaches to prevent cyber-attacks,
different challenges faced by a preventer, and some gaps in the research. This literature review
is carried out by using the secondary data obtained from peer-reviewed journals and other
sources on the web. This review aims to explain Detecting Malicious Activities in Network Traffic.