Neminath Hubballi

Orcid: 0000-0001-9669-9773

According to our database1, Neminath Hubballi authored at least 67 papers between 2010 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Reducing the Impact of DoS Attack on Static and Dynamic SE Using a Deep Learning-Based Model.
IEEE Trans. Ind. Informatics, October, 2024

Anomaly Detection in SCADA Systems: A State Transition Modeling.
IEEE Trans. Netw. Serv. Manag., June, 2024

SlowTrack: detecting slow rate Denial of Service attacks against HTTP with behavioral parameters.
J. Supercomput., January, 2024

CPCache: Cooperative Popularity based Caching for Named Data Networks.
Proceedings of the International Conference on Information Networking, 2024

PePC: Popularity Based Early Predictive Caching in Named Data Networks.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Detecting Cyber Attacks in Smart-Grid Networks with Probability Distribution Comparison.
Proceedings of the 21st IEEE Consumer Communications & Networking Conference, 2024

Mitigating Resource Depletion and Message Sequencing Attacks in SCADA Systems.
Proceedings of the Advanced Information Networking and Applications, 2024

2023
eNCache: Improving content delivery with cooperative caching in Named Data Networking.
Comput. Networks, December, 2023

Secure Socket Shell Bruteforce Attack Detection With Petri Net Modeling.
IEEE Trans. Netw. Serv. Manag., March, 2023

XSSMitigate: Deep Packet Inspection based XSS Attack Quarantine in Software Defined Networks.
Proceedings of the IEEE International Conference on Consumer Electronics, 2023

2022
Application Layer Denial-of-Service Attacks and Defense Mechanisms: A Survey.
ACM Comput. Surv., 2022

KeyClass: Efficient keyword matching for network traffic classification.
Comput. Commun., 2022

WiP: Characterizing the Impact of Multiplexed DoS Attacks on HTTP and Detection.
Proceedings of the Information Systems Security - 18th International Conference, 2022

WiP: EventTracker-Event Driven Evidence Collection for Digital Forensics.
Proceedings of the Information Systems Security - 18th International Conference, 2022

WiP: Control Plane Saturation Attack Mitigation in Software Defined Networks.
Proceedings of the Information Systems Security - 18th International Conference, 2022

2021
mMIG: Inversion optimization in majority inverter graph with minority operations.
Integr., 2021

IoTHunter: IoT network traffic classification using device specific keywords.
IET Networks, 2021

Preventing time synchronization in NTP broadcast mode.
Comput. Secur., 2021

WiP: Slow Rate HTTP Attack Detection with Behavioral Parameters.
Proceedings of the Information Systems Security - 17th International Conference, 2021

Who is Trying to Compromise Your SSH Server ? An Analysis of Authentication Logs and Detection of Bruteforce Attacks.
Proceedings of the ICDCN '21: International Conference on Distributed Computing and Networking, 2021

2020
BitProb: Probabilistic Bit Signatures for Accurate Application Identification.
IEEE Trans. Netw. Serv. Manag., 2020

Correction to: Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks.
J. Netw. Syst. Manag., 2020

Traffic Dynamics-Aware Probe Selection for Fault Detection in Networks.
J. Netw. Syst. Manag., 2020

Preventing Time Synchronization in NTP's Broadcast Mode.
CoRR, 2020

NViZ: An Interactive Visualization of Network Security Systems Logs.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

Efficient Keyword Matching for Deep Packet Inspection based Network Traffic Classification.
Proceedings of the 2020 International Conference on COMmunication Systems & NETworkS, 2020

POSTER: Towards Automating Detection of Anomalous HTTP Requests with Joint Probability Estimation of Characters.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

POSTER: Distributed SSH Bruteforce Attack Detection with Flow Content Similarity and Login Failure Reputation.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

Network Security Systems Log Analysis for Trends and Insights: A Case Study.
Proceedings of the 14th IEEE International Conference on Advanced Networks and Telecommunications Systems, 2020

2019
SpamDetector : Detecting spam callers in Voice over Internet Protocol with graph anomalies.
Secur. Priv., 2019

Cloud Security Service Level Agreements: Representation and Measurement.
Proceedings of the IEEE INFOCOM 2019, 2019

Identifying Anomalous HTTP Traffic with Association Rule Mining.
Proceedings of the 2019 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2019

2018
Detecting stealth DHCP starvation attack using machine learning approach.
J. Comput. Virol. Hacking Tech., 2018

<i>BitCoding</i>: Network Traffic Classification Through Encoded Bit Level Signatures.
IEEE/ACM Trans. Netw., 2018

<i>RDClass</i>: on using relative distance of keywords for accurate network traffic classification.
IET Networks, 2018

Detecting TCP ACK storm attack: a state transition modelling approach.
IET Networks, 2018

Slow rate denial of service attacks against HTTP/2 and detection.
Comput. Secur., 2018

Congestion-aware probe selection for fault detection in networks.
Proceedings of the 10th International Conference on Communication Systems & Networks, 2018

AppHunter: Mobile Application Traffic Classification.
Proceedings of the IEEE International Conference on Advanced Networks and Telecommunications Systems, 2018

2017
Detecting Anomalous Behavior in VoIP Systems: A Discrete Event System Modeling.
IEEE Trans. Inf. Forensics Secur., 2017

An event based technique for detecting spoofed IP packets.
J. Inf. Secur. Appl., 2017

A closer look into DHCP starvation attack in wireless networks.
Comput. Secur., 2017

BitCoding: Protocol Type Agnostic Robust Bit Level Signatures for Traffic Classification.
Proceedings of the 2017 IEEE Global Communications Conference, 2017

DNS spoofing in local networks made easy.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

Communication recurrence and similarity detection in network flows.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

Security service level agreement measurement in cloud: A proof of concept implementation.
Proceedings of the 2017 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2017

2016
OCPAD: One class Naive Bayes classifier for payload based anomaly detection.
Expert Syst. Appl., 2016

If-what analysis to manage batch systems.
Proceedings of the 8th International Conference on Communication Systems and Networks, 2016

How Secure are Web Servers? An Empirical Study of Slow HTTP DoS Attacks and Detection.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

Detecting Packed Executable File: Supervised or Anomaly Detection Method?
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

VoIP Profiler: Profiling Voice over IP User Communication Behavior.
Proceedings of the 11th International Conference on Availability, Reliability and Security, 2016

A probabilistic anomaly detection scheme to detect DHCP starvation attacks.
Proceedings of the 2016 IEEE International Conference on Advanced Networks and Telecommunications Systems, 2016

2015
Network traffic classification in encrypted environment: A case study of Google Hangout.
Proceedings of the Twenty First National Conference on Communications, 2015

An Experience Report on Scalable Implementation of DDoS Attack Detection.
Proceedings of the Advanced Information Systems Engineering Workshops, 2015

Exploiting DHCP server-side IP address conflict detection: A DHCP starvation attack.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

Rangegram: A novel payload based anomaly detection technique against web traffic.
Proceedings of the 2015 IEEE International Conference on Advanced Networks and Telecommuncations Systems, 2015

2014
False alarm minimization techniques in signature-based intrusion detection systems: A survey.
Comput. Commun., 2014

2013
Towards reducing false alarms in network intrusion detection systems with data summarization technique.
Secur. Commun. Networks, 2013

FlowSummary: Summarizing Network Flows for Communication Periodicity Detection.
Proceedings of the Pattern Recognition and Machine Intelligence, 2013

2012
Pairgram: Modeling frequency information of lookahead pairs for system call based anomaly detection.
Proceedings of the Fourth International Conference on Communication Systems and Networks, 2012

2011
Network specific false alarm reduction in intrusion detection system.
Secur. Commun. Networks, 2011

<i>NDoT</i>: Nearest Neighbor Distance Based Outlier Detection Technique.
Proceedings of the Pattern Recognition and Machine Intelligence, 2011

Sequencegram: n-gram modeling of system calls for program based anomaly detection.
Proceedings of the Third International Conference on Communication Systems and Networks, 2011

A host based DES approach for detecting ARP spoofing.
Proceedings of the 2011 IEEE Symposium on Computational Intelligence in Cyber Security, 2011

2010
An Active Intrusion Detection System for LAN Specific Attacks.
Proceedings of the Advances in Computer Science and Information Technology, 2010

Distance Based Fast Hierarchical Clustering Method for Large Datasets.
Proceedings of the Rough Sets and Current Trends in Computing, 2010

Layered Higher Order N-grams for Hardening Payload Based Anomaly Intrusion Detection.
Proceedings of the ARES 2010, 2010


  Loading...