Shankar Karuppayah

Orcid: 0000-0003-4801-6370

According to our database1, Shankar Karuppayah authored at least 43 papers between 2011 and 2024.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Peer-to-peer botnets: exploring behavioural characteristics and machine/deep learning-based detection.
EURASIP J. Inf. Secur., December, 2024

Malware cyberattacks detection using a novel feature selection method based on a modified whale optimization algorithm.
Wirel. Networks, November, 2024

RPL-based attack detection approaches in IoT networks: review and taxonomy.
Artif. Intell. Rev., September, 2024

Securing MQTT Ecosystem: Exploring Vulnerabilities, Mitigations, and Future Trajectories.
IEEE Access, 2024

Detecting Version Number Attacks in Low Power and Lossy Networks for Internet of Things Routing: Review and Taxonomy.
IEEE Access, 2024

2023
Federated Learning Attacks Revisited: A Critical Discussion of Gaps, Assumptions, and Evaluation Setups.
Sensors, 2023

The End of the Canonical IoT Botnet: A Measurement Study of Mirai's Descendants.
CoRR, 2023

ES-SECS/GEM: An Efficient Security Mechanism for SECS/GEM Communications.
IEEE Access, 2023

Detection of Real-Time Malicious Intrusions and Attacks in IoT Empowered Cybersecurity Infrastructures.
IEEE Access, 2023

A Robust Security Scheme Based on Enhanced Symmetric Algorithm for MQTT in the Internet of Things.
IEEE Access, 2023

Binary Sight-Seeing: Accelerating Reverse Engineering via Point-of-Interest-Beacons.
Proceedings of the Annual Computer Security Applications Conference, 2023

2022
PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet.
Symmetry, 2022

Processing of botnet tracking data under the GDPR.
Comput. Law Secur. Rev., 2022

Eth-PSD: A Machine Learning-Based Phishing Scam Detection Approach in Ethereum.
IEEE Access, 2022

Applicability of Intrusion Detection System on Ethereum Attacks: A Comprehensive Review.
IEEE Access, 2022

2021
Malware Sight-Seeing: Accelerating Reverse-Engineering via Point-of-Interest-Beacons.
CoRR, 2021

SECS/GEMsec: A Mechanism for Detection and Prevention of Cyber-Attacks on SECS/GEM Communications in Industry 4.0 Landscape.
IEEE Access, 2021

Mathematical Approach as Qualitative Metrics of Distributed Denial of Service Attack Detection Mechanisms.
IEEE Access, 2021

A Review of Scalability Issues in Software-Defined Exchange Point (SDX) Approaches: State-of-the-Art.
IEEE Access, 2021

An Improved Secure Router Discovery Mechanism to Prevent Fake RA Attack in Link Local IPv6 Network.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

Securing Software Defined Networking Using Intrusion Detection System - A Review.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

OSINT Explorer: A Tool Recommender Framework for OSINT Sources.
Proceedings of the Advances in Cyber Security - Third International Conference, 2021

2020
Theory-Based Model and Prediction Analysis of Information Security Compliance Behavior in the Saudi Healthcare Sector.
Symmetry, 2020

2019
A Brief Review on MQTT's Security Issues within the Internet of Things (IoT).
J. Commun., 2019

Poster: Challenges of Accurately Measuring Churn in P2P Botnets.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
Next Generation P2P Botnets: Monitoring Under Adverse Conditions.
Proceedings of the Research in Attacks, Intrusions, and Defenses, 2018

Advanced Monitoring in P2P Botnets - A Dual Perspective
Springer, ISBN: 978-981-10-9049-3, 2018

2017
A Review on Features' Robustness in High Diversity Mobile Traffic Classifications.
Int. J. Commun. Networks Inf. Secur., 2017

I Trust my Zombies: A Trust-enabled Botnet.
CoRR, 2017

A temporal-aware signature extraction method using sliding-window mechanism for scalable, cost-effective and accurate traffic classification.
Proceedings of the 7th IEEE International Conference on Control System, 2017

SensorBuster: On Identifying Sensor Nodes in P2P Botnets.
Proceedings of the 12th International Conference on Availability, Reliability and Security, Reggio Calabria, Italy, August 29, 2017

2016
Advanced monitoring in P2P botnets.
PhD thesis, 2016

BoobyTrap: On autonomously detecting and characterizing crawlers in P2P botnets.
Proceedings of the 2016 IEEE International Conference on Communications, 2016

On the resilience of P2P-based botnet graphs.
Proceedings of the 2016 IEEE Conference on Communications and Network Security, 2016

2015
Taxonomy and Survey of Collaborative Intrusion Detection.
ACM Comput. Surv., 2015

A honeypot-driven cyber incident monitor: lessons learned and steps ahead.
Proceedings of the 8th International Conference on Security of Information and Networks, 2015

Zeus Milker: Circumventing the P2P Zeus Neighbor List Restriction Mechanism.
Proceedings of the 35th IEEE International Conference on Distributed Computing Systems, 2015

Hide and seek: Detecting sensors in P2P botnets.
Proceedings of the 2015 IEEE Conference on Communications and Network Security, 2015

2014
HosTaGe: a Mobile Honeypot for Collaborative Defense.
Proceedings of the 7th International Conference on Security of Information and Networks, 2014

On advanced monitoring in resilient and unstructured P2P botnets.
Proceedings of the IEEE International Conference on Communications, 2014

2013
This network is infected: HosTaGe - a low-interaction honeypot for mobile devices.
Proceedings of the SPSM'13, 2013

2012
Botnet-based Distributed Denial of Service (DDoS) Attacks on Web Servers: Classification and Art
CoRR, 2012

2011
CAD+ : Detecting Colluding Nodes in Gray Hole Attacks.
Proceedings of the Informatiktage 2011, 2011


  Loading...