Publications

  • PeerShark: Flow-clustering and conversation-generation for malicious peer-to-peer traffic identification, Pratik Narang, Chittaranjan Hota and Venkat Venkatakrishnan. EURASIP Journal on Information Security (Accepted for publication).
  • Designing an Extensible Communication Platform for Rural Area, Abhishek Thakur, and Chittaranjan Hota, 3rd International Conference on Advances in Computing, Communications and Informatics (ICACCI 2014), New Delhi, Sept 2014 (Accepted).
  • Machine-learning Approaches for P2P Botnet Detection using Signal-processing Techniques, Pratik Narang, Vansh Khurana, and Chittaranjan Hota, 8th ACM International Conference on Distributed Event-Based Systems (DEBS'14), ACM SIGMOD/SIGSOFT, Mumbai, India, pp. 338-341, May 2014.
  • PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations, Pratik Narang, Subhajit Ray, Chittaranjan Hota, and Venkat Venkatakrishnan, 35th IEEE Symposium on Security and Privacy (IEEE S&P 2014, IWCC), San Jose, CA, May 2014. 
  • Efficient Detection of Malwares using Low-interaction Honeypots, S Gokul Kannan, and Chittaranjan Hota, National Conference on Intelligent Systems, Computing and Information Technology (NCICIT'14), 4th-5th April 2014, Anna University, Tiruchirappalli, TN, India, April, 2014.
  • Big Data Analytics Framework for Peer-to-Peer Botnet Detection using Random Forests, K Singh, Sharath Chandra G, A Thakur, and Chittaranjan Hota, Information Sciences Journal, Elsevier, Vol. 278, 2014, pp. 488-497.
  • Honeypot Challenges and Countermeasures, S Gokul Kannan, and Chittaranjan Hota, Symposium on Information Security, BITS-Pilani Hyderabad Campus, Hyderabad, 15-16 November 2013 (Poster)
  • P2P Traffic Classification using Ensemble Learning, Jagan Mohan Reddy and Chittaranjan Hota. The 5th IBM Collaborative Academic Research Exchange (I-CARE '13), October 17-19, 2013, IIT-Delhi, New Delhi, India. (acceptance rate of 26%)
  • Feature Selection for Detection of P2P Botnet Traffic, Pratik Narang, Jagan Mohan Reddy and Chittaranjan Hota, The 6th ACM India Computing Convention on Next Generation Computing Paradigms and Technologies, 22nd-24th August 2013, (ACM Compute 2013), India.
  • Sustainable Wireless Internet Connectivity for Rural Areas, Abhishek Thakur, and Chittaranjan Hota, International Symposium on Green Networks and Distributed Systems, GNDS 2013, ICACCI 2013, 22nd-24th August 2013, Mysore, India.
  • Enhanced Search in Unstructured Peer-to-Peer Overlay Networks, Chittaranjan Hota, Vikram Nunia, Mario Di Francesco, Jukka K. Nurminen, and A. Y. Jaaski, 8th International Conference on Grid and Pervasive Computing, Seoul, KOREA, Arabnia H.R, Kim C, Shi W, Gil J (Eds), Lecture Notes in Computer Science 7861 , May 2013. 
  • Adaptive Task Scheduling in Service Oriented Crowd using SLURM, Vikram Nunia, Bhavesh Kakadiya, Chittaranjan Hota, and M Rajarajan, ICDCIT 2013, C R Hota, Pradip K. Srimani (Eds.), Lecture Notes in Computer Science (LNCS 7753), pp.373-385 (2013).
  • P2P Traffic Classification for Intrusion Detection Systems, Jagan Mohan, Pratik Narang, Chittaranjan Hota, Prafulla Kumar, Security and Privacy Symposium 2013, Indian Institute of Technology (IIT), Kanpur, Feb 28th - March 2nd, 2013 (Poster).
  • Approaches for Measuring P2P Classification Efficiency for Intrusion Detection and Prevention Systems, Jagan Mohan Reddy, Abhishek Thakur, and Chittaranjan Hota, First National Conference on Cyber Security, NCCS 2012, Defence Institute of Advanced Technology (DU), Pune, Maharastra, June 7-8, 2012.
  • Tag-based Improved Search in Peer-to-Peer Overlays, Sreeja T, Chittaranjan Hota, and A. Yla Jaaski,Int. J. Computer Applications, Vol. 49, July 2012.
  • GAUR: A method to detect Sybil groups in Peer-to-Peer overlays, Haribabu K, Chittaranjan Hota, and A Paul, Int. J. Grid and Utility Computing, IJGUC, Vol. 3, Nos. 2/3, Inderscience, pp. 145-156, 2012.
  • Distributed Algorithms for Improving Search Efficiency in P2P Overlays, Chittaranjan Hota, Vikram Nunia, and Antti Yla-Jaaski,  International Journal of Computer Network and Information Security, IJCNIS, Vol. 4, No. 3, pp. 1-7, April 2012.
  • Detecting Sybils in P2P Overlays using Psychometric Analysis Methods, K Haribabu, Arindam Pal, Chittaranjan Hota, Proc. of IEEE International Conference on Advanced Information Networking and Applications (AINA), Singapore, March 2011.
  • Detecting  Sybils  in  Peer-to-Peer File Replication Systems, K. Haribabu, Chittaranjan Hota, and  Saravana S, Proc. of International Conference on Information Security and Digital Forensics (ISDF 2009), Sept 2009, City University, London.


No comments:

Post a Comment