Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Avita Katal is active.

Publication


Featured researches published by Avita Katal.


international conference on contemporary computing | 2013

Big data: Issues, challenges, tools and Good practices

Avita Katal; Mohammad Wazid; R. H. Goudar

Big data is defined as large amount of data which requires new technologies and architectures so that it becomes possible to extract value from it by capturing and analysis process. Due to such large size of data it becomes very difficult to perform effective analysis using the existing traditional techniques. Big data due to its various properties like volume, velocity, variety, variability, value and complexity put forward many challenges. Since Big data is a recent upcoming technology in the market which can bring huge benefits to the business organizations, it becomes necessary that various challenges and issues associated in bringing and adapting to this technology are brought into light. This paper introduces the Big data technology along with its importance in the modern world and existing projects which are effective and important in changing the concept of science into big science and society too. The various challenges and issues in adapting and accepting Big data technology, its tools (Hadoop) are also discussed in detail along with the problems Hadoop is facing. The paper concludes with the Good Big data practices to be followed.


international conference on information and communication technologies | 2013

E-TCP for efficient performance of MANET under JF delay variance attack

Mohammad Wazid; Avita Katal; Roshan Singh Sachan; R. H. Goudar

MANETs have some special characteristics such as open network architecture, shared wireless medium and highly dynamic topology which make them much prone to different attacks. Denial Of service (DoS) attack, the most common of all, if occurs becomes difficult to detect and defend. One of such attacks is JellyFish attack which is further categorized as JF Reorder Attack, JF Periodic Dropping Attack and JF Delay Variance Attack. In JF delay variance attack, a JF attacker node intrudes into forwarding group and delays data packets unnecessarily for some amount of time before forwarding them which results in high end-to-end delay in the network. The performance of the network also becomes worse. JF Attack disrupts the whole functionality of Transmission Control Protocol (TCP) as in the presence of JellyFish Delay Variance Attack source retransmits packets again and again causing congestion in the network. Some amendments are required in TCP for JF Attack prone networks. In this paper a modified TCP which is capable of handling congestion in the network caused by JF Attackers is proposed. In the presence of this modified protocol named as Efficient Transmission Control Protocol (ETCP) the performance of the network (i.e. throughput, end-to-end delay etc) improves.


international conference on information and communication technologies | 2013

Hacktivism trends, digital forensic tools and challenges: A survey

Mohammad Wazid; Avita Katal; R. H. Goudar; Sreenivas Rao

Hacktivism is the biggest challenge being faced by the Cyber world. Many digital forensic tools are being developed to deal with this challenge but at the same pace hackers are developing the counter techniques. This paper includes the digital forensics basics along with the recent trends of hacktivism in social networking sites, cloud computing, websites and phishing. The various tools of forensics with the platform supported, the recent versions and licensing details are discussed. The paper extends with the current challenges being faced by digital forensics.


international conference on information and communication technologies | 2013

A cluster based detection and prevention mechanism against novel datagram chunk dropping attack in MANET multimedia transmission

Avita Katal; Mohammad Wazid; R. H. Goudar; Devesh Pratap Singh

All Denial of Service Attacks (DoS) is malignant. Their occurrence in the network affects the entire network performance. Dropping attack either Packet Dropping or Datagram Dropping is DoS in nature. Both these attacks occur corresponding to Transport layer of Mobile Ad hoc Network (MANET) stack which affects the entire functionality of transport layer. In this paper we have discussed a novel kind of Datagram Chunk Dropping Attack occurring in the MANET multimedia transmission. If multimedia transmission is datagram oriented, the datagram are transferred in the form of certain data streams called Chunks. In this attack an intermediate intruder node drops some data streams decreasing the throughput of the network in turn affecting the Quality of Service (QoS). Thus the detection and prevention of this attack becomes very crucial. The Datagram Chunk Dropping Attack detection and prevention technique i.e. Cluster Based Datagram Chunk Dropping Detection and Prevention Technique (CBDCDDPT) is proposed. The network performance parameter i.e. throughput shows considerable amount of improvement by the use of proposed technique.


grid computing | 2012

Cluster and super cluster based intrusion detection and prevention techniques for JellyFish Reorder Attack

Mohammad Wazid; Avita Katal; R. H. Goudar

Denial of service (DoS) is malignant attack in MANET which is difficult to detect and defend. Jellyfish is a new DoS attack which is categorized as JF Reorder Attack, JF Periodic Dropping Attack, JF Delay Variance Attack. Out of these three, JF Reorder is the most effective one. It disrupts the whole functionality of TCP and further produces zero goodput. So its detection and prevention becomes very crucial. In this paper we have proposed two novel JF Reorder attack detection techniques i.e. Cluster Based Intrusion Detection and Prevention Technique (CBIDPT) and Super Cluster Based Intrusion Detection and Prevention Technique (SCBIDPT) and also calculated the improvement done by these techniques on the performance of the network. These techniques improve the goodput of the network while introducing some delay.


international conference on intelligent systems and control | 2013

Misdirection attack in WSN: Topological analysis and an algorithm for delay and throughput prediction

Roshan Singh Sachan; Mohammad Wazid; Devesh Pratap Singh; Avita Katal; R. H. Goudar

Wireless Sensor Network (WSN) has a great potential to be deployed in wide range of applications like consumer, industrial and defense sectors. WSNs are susceptible to various attacks, in which misdirection a kind of Denial of Service (DoS) attack is very difficult to detect and defend. In misdirection attack, the intruder misdirects the incoming packets to a node other than the intended node. Due to this attack, high end- to- end delay (sometimes infinite) is introduced in the network and performance of the network (i.e. throughput) is degraded. In this paper we have done a topological analysis of WSN in the presence of misdirection attack and presented an algorithm for the prediction of delay and throughput. We observed that WSN performs better for tree network topology as compared to mesh topology.


international conference on intelligent systems and control | 2013

A framework for detection and prevention of novel keylogger spyware attacks

Mohammad Wazid; Avita Katal; R. H. Goudar; Devesh Pratap Singh; Asit Tyagi; Robin Sharma; Priyanka Bhakuni

Cyber world is susceptible to various attacks, out of which malware attack is the malignant one. It is very difficult to detect and defend. A keylogger spyware contains both scripts keylogger and spyware in a single program. The functionality of this program is that it can capture all key strokes which are pressed by a system user and stores them in a log file, the spyware email this log file to the designers specified address. It is very harmful for those systems which are used in daily transaction process i.e. online banking system. The prevention of these attacks is necessary. In this paper we have proposed a framework for detection and prevention of novel keylogger spyware attack. It is capable to defend against such kind of attacks.


students conference on engineering and systems | 2012

Information storage on the cloud: A survey of effective storage management system

Avita Katal; Niharika Gupta; Seepaj Sharma; R. H. Goudar

In this paper we have discussed about the need of effective information management, Storage area network (SAN). SAN is the hottest buzz word in the computer storage business today. It seems like every company with a storage product, from the smallest garage shop to the largest multi-billion dollar corporation, has a SAN strategy, along with all of the products that todays business owners and IT managers absolutely need to run their business in a SAN environment. It is a high-speed network of storage elements, similar in form and function to a LAN that establishes direct and indirect connections between multiple servers and multiple storage elements. This paper covers the basics of Fibre Channel Storage Area Network (FC SAN), Internet Protocol Storage Area Network (IP SAN), concepts of Zoning and Logical unit number (LUN) masking. The comparison of various vendors EMC, IBM, HP that provide the services of SAN.


Machine Intelligence and Research Advancement (ICMIRA), 2013 International Conference on | 2013

Effective Clustering Technique for Selecting Cluster Heads and Super Cluster Head in MANET

Avita Katal; Mohammad Wazid; Roshan Singh Sachan; Devesh Pratap Singh; R. H. Goudar

Mobile ad Hoc Network consists of a group of mobile nodes which can communicate with each other without any infrastructure. This feature makes them self organized and rapidly deployable. Clustering is a technique used in these networks for best utilization of available bandwidth and for prolonging the network life time also. The entire group of nodes participate in election of the Cluster Head which is most of the times used for network administration but sometimes can also be used for the task of intrusion detection i.e. network security. Super Cluster Head is a node which can be a part of network but not itself a cluster Head and is used to detect a misbehaving Cluster Head not doing the task of intrusion detection properly. In this paper an effective clustering technique has been proposed which is being used for the election of Cluster Heads and Super Cluster Head. It uses five parameters i.e. Communication range, Hop Count, Battery Power, Relative Velocity, Fairness at a time to select a Cluster Head. Always an efficient node which passes all of the criteria will become the Cluster Head. After the selection of Cluster Heads, the election is performed to select a Super Cluster Head. A node is selected as a Super Cluster Head only if it is having maximum battery power and it is not a Cluster Head. The technique used chooses the best of the nodes to become Cluster Head and Super Cluster Head. This technique seems to increase network life time also because of the slow dissipation of the energy.


international conference on intelligent systems and control | 2013

Authentication and authorization: Domain specific Role Based Access Control using Ontology

Avita Katal; Pranjal Gupta; Mohammad Wazid; R. H. Goudar; Abhishek Mittal; Sakshi Panwar; Sanjay Joshi

Access control technologies are being used today in various organizations for assuring the secure and authorized access to the sensitive data or resources. Many technologies have emerged from the past like Discretionary Access Control (DAC) and Mandatory Access Control (MAC). But these technologies had restrictions associated with them to be used for all organizations in commercial arena. The Role Based Access Control (RBAC) has emerged some years back and has become the most widely used technology across organizations for controlling the access. The administration and management of privileges becomes easy as roles can be updated without updating the privileges for every user on an individual basis. In this paper we are implementing Role Based access Control (RBAC) for University domain using Ontology. Roles are implemented in the form of classes having permissions associated with them, in turn making the process of administration and management of access control easy. Two step accesses are provided, first is Authentication and second is Authorization.

Collaboration


Dive into the Avita Katal's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Asit Tyagi

Graphic Era University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge