D. G. Narayan
YOU?
Author Swipe
View article: Hybrid Approach for Detection and Mitigation of DDoS Attacks Using Multi-feature Selection, Unsupervised Learning, and Game Theory
Hybrid Approach for Detection and Mitigation of DDoS Attacks Using Multi-feature Selection, Unsupervised Learning, and Game Theory Open
Software-defined networking (SDN) is now widely used in modern network infrastructures, but its centralized control design makes it vulnerable to distributed denial of service (DDoS) attacks targeting the SDN controller. These attacks are …
View article: ILP Optimized LSTM-based Autoscaling and Scheduling of Containers in Edge-cloud Environment
ILP Optimized LSTM-based Autoscaling and Scheduling of Containers in Edge-cloud Environment Open
Edge computing is a decentralized computing paradigm that brings computation and data storage closer to data sources, enabling faster processing and reduced latency. This approach is critical for real-time applications, but it introduces s…
View article: Digital Education for Health Care Providers: An Advanced Cardiac Life Support Resource
Digital Education for Health Care Providers: An Advanced Cardiac Life Support Resource Open
Advanced cardiovascular life support (ACLS) refers to a set of urgent treatment guidelines for cardiac emergencies to improve patient outcomes. Strong evidence supports online interactive content in facilitating student learning and engage…
View article: A Collaborative Approach to Detecting DDoS Attacks in SDN Using Entropy and Deep Learning
A Collaborative Approach to Detecting DDoS Attacks in SDN Using Entropy and Deep Learning Open
Software-defined networking (SDN) is an approach to network management allowing to enhance the performance of the network and making it more flexible. The centralized architecture of SDN makes it vulnerable to cyberattacks, especially dist…
View article: DPoSEB: Delegated Proof of Stake with Exponential Backoff Consensus Algorithm for Ethereum Blockchain
DPoSEB: Delegated Proof of Stake with Exponential Backoff Consensus Algorithm for Ethereum Blockchain Open
Blockchain is a technology that is rapidly gaining prominence and finding applications in various sectors such as banking, supply chain, healthcare, and e-governance. The consensus algorithm employed in a blockchain network is crucial as i…
View article: An Efficient and Secure Blockchain Consensus Algorithm Using Game Theory
An Efficient and Secure Blockchain Consensus Algorithm Using Game Theory Open
Blockchain technology is a decentralized ledger system that finds applications in various domains such as banking, e-governance, and supply chain management. The consensus algorithm plays a crucial role in any blockchain network as it dire…
View article: Machine Learning Approach to Intrusion Detection: Performance Evaluation
Machine Learning Approach to Intrusion Detection: Performance Evaluation Open
Software-Defined Networking (SDN) simplifies network administration as well as reduces the need for manual configuration on individual devices. SDN is expected to remain a crucial technology in shaping the future of network infrastructure.…
View article: Enabling Attribute-based Access Control for OpenStack Cloud Resources through Smart Contracts
Enabling Attribute-based Access Control for OpenStack Cloud Resources through Smart Contracts Open
The increasing complexity of cloud computing has prompted a greater emphasis on protecting the privacy, integrity, and security of data stored and processed in the cloud. Data privacy is safeguarded through access control, but existing mod…
View article: An Efficient Controller Placement Algorithm using Clustering in Software Defined Networks
An Efficient Controller Placement Algorithm using Clustering in Software Defined Networks Open
Software-defined networking (SDN) is an emerging network paradigm that separates the control plane from data plane and provides programmable network management. The control plane within SDN is responsible for decision-making, while packet …
View article: Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark
Detection of DDoS Attacks in OpenStack-based Private Cloud Using Apache Spark Open
Security is a critical concern for cloud service providers. Distributed denial of service (DDoS) attacks are the most frequent of all cloud security threats, and the consequences of damage caused by DDoS are very serious. Thus, the design …
View article: Self-Managed Block Storage Scheduling for OpenStack-based Cloud
Self-Managed Block Storage Scheduling for OpenStack-based Cloud Open
Software-defined storage (SDS) enables cloud providers to abstract the storage resources from underlying physical hardware by making storage resources programmable. It enhances the scalability and management of storage resources for better…
View article: Cross-layer Optimization for Video Transmission using MDC in Wireless Mesh Networks
Cross-layer Optimization for Video Transmission using MDC in Wireless Mesh Networks Open
In this paper, we propose a cross-layer optimization technique for improving the QoS of video streaming applications in multi-radio Wireless Mesh Networks (WMNs) using Multiple Description Coding (MDC). WMN is an emerging technology which …
View article: Multi-Objective Scheduling using Logistic Regression for OpenStack-based Cloud
Multi-Objective Scheduling using Logistic Regression for OpenStack-based Cloud Open
Efficient resource management in Cloud data center is a challenging problem. Resource monitoring has been reported as a tedious task in multi-tenant data centers. Implementing an effective technique for monitoring and scheduling of the clo…
View article: A Cross-Layer Routing Metric with Link Prediction in Wireless Mesh Networks
A Cross-Layer Routing Metric with Link Prediction in Wireless Mesh Networks Open
Wireless Mesh Networks (WMNs) is one of the encouraging technologies for future-generation wireless network with diverse applications as it is undergoing rapid progress. WMNs are multi-hop networks which are beneficial in situations where …
View article: Distributed Denial of Service (DDoS) Attacks Detection System for OpenStack-based Private Cloud
Distributed Denial of Service (DDoS) Attacks Detection System for OpenStack-based Private Cloud Open
Cloud computing technique is commonly used by fast growing Internet-based applications. Moving to cloud computing results in reducing the cost of managing and maintaining IT infrastructure. Different organizations controls the cloud resour…
View article: Energy-efficient and Dynamic Consolidation of Virtual Machines in OpenStack-based Private Cloud
Energy-efficient and Dynamic Consolidation of Virtual Machines in OpenStack-based Private Cloud Open
Dynamic Virtual Machines (VMs) consolidation is an efficient technique for enhancing resource utilization and reducing energy consumption by the physical servers. Over-utilized host affects the degradation of resource utilization and VM pe…
View article: Performance Evaluation of Docker Container and Virtual Machine
Performance Evaluation of Docker Container and Virtual Machine Open
Server virtualization is a technological innovation broadly used in IT enterprises. Virtualization provides a platform to run different services of operating systems on the cloud. It facilitates to build multiple virtual machines on a sing…
View article: Claims-Based VM Authorization on OpenStack Private Cloud using Blockchain
Claims-Based VM Authorization on OpenStack Private Cloud using Blockchain Open
The complexity of providing secure access, protecting critical data and end-user privacy in cloud data centre is leading to a demand for a new approach in network and data security. Recently, blockchain technology is being used in claims m…
View article: A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish
A Comprehensive Evaluation of Cryptographic Algorithms: DES, 3DES, AES, RSA and Blowfish Open
In today's internet era, with online transactions almost every second and terabytes of data being generated everyday on the internet, securing information is a challenge. Cryptography is an integral part of modern world information securit…
View article: Structured Approach of Designing Data Structure and Algorithms Laboratory Experiments
Structured Approach of Designing Data Structure and Algorithms Laboratory Experiments Open
Data structures and algorithms play amajor role in optimizing any non trivial software application. Learning and applying concepts of this course demands a great amount of analytical and logical thinking skills. Teaching this subject at ea…
View article: Designing and Teaching of Language Independent Object Oriented Programming Course
Designing and Teaching of Language Independent Object Oriented Programming Course Open
Programming Languages play a crucial role in developing any software applications. Academicians and IT professionals give more priority for mastering many programming languages. Learning many language syntax and constructs will not contrib…