Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Biju Issac is active.

Publication


Featured researches published by Biju Issac.


international conference on computer engineering and technology | 2009

Improved Bayesian Anti-Spam Filter Implementation and Analysis on Independent Spam Corpuses

Biju Issac; Wendy Japutra Jap; Jofry Hadi Sutanto

Spam emails are causing major resource wastage by unnecessarily flooding the network links. Though many anti-spam solutions have been implemented, the Bayesian spam score approach looks quite promising. A proposal for spam detection algorithm is presented and its implementation using Java is discussed, along with its performance test results on two independent spam corpuses – Ling-spam and Enron-spam. We use the Bayesian calculation for single keyword sets and multiple keywords sets, along with its keyword contexts to improve the spam detection and thus to get good accuracy.


international conference on networks | 2005

Secure unicast address resolution protocol (S-UARP) by extending DHCP

Biju Issac; Lawan A. Mohammed

In IPv4 networks, address resolution protocol (ARP) is used when a source computer wants to find the MAC address corresponding to a particular IP address (of target computer), it wants to contact. The source broadcasts this request and all the hosts in the domain get that request. This broadcast helps the target to reply with the necessary details to the source. The IP-MAC mapping would then be stored in the ARP cache of the source, which remains valid for some time. This broadcasting is a decentralized way to get the IP address to MAC address mapping, which brings in consistent overhead to the network traffic. It is well documented that ARP process is also liable to ARP poisoning attacks. In this paper we seek to propose a secure unicast address resolution protocol (SUARP) which takes a centralized approach that reduces the broadcast overhead and makes ARP poisoning attacks difficult.


ubiquitous computing | 2007

Detailed DoS attacks in wireless networks and countermeasures

Lawan A. Mohammed; Biju Issac

IEEE 802.11 wireless networks have fuzzy boundaries, making it easy for an attacker to capture the transmitted packets. Also the attacker can send massive volume of illegitimate traffic and utilise system resources in a way that renders the system inoperable, thus denying access to authorised users. This paper is two fold in its description. Firstly, it describes some of the major vulnerabilities associated with wireless networks. Secondly, it demonstrates different methods of achieving Denial of Service (DoS) attacks in detail, as it applies to wireless networks and discusses and proposes different countermeasures to minimise the attacks.


ieee region 10 conference | 2006

Spam Detection Proposal in Regular and Text-based Image Emails

Biju Issac; Valliappan Raman

Spam, Emails are invading users without their consent and filling their mail boxes with Email trash. Priceless effort and time of the users and organizations are wasted in handling them. To circumvent anti-spam solutions, many spammers are sending spam Email with image-only content. In this paper we propose a spam detection approach in Emails with text and image contents. In the first part, a novel framework for extracting intelligent information from Emails with image content is presented and a prototype implementation is shown. In the second part, a proposal for multi-layered spam detection algorithm is presented, which enhances existing approaches


computer information and systems sciences and engineering | 2010

Appraising the corporate sustainability reports: text mining and multi-discriminatory analysis

Jashua Rajesh Modapothala; Biju Issac; E. Jayamani

The voluntary disclosure of the sustainability reports by the companies attracts wider stakeholder groups. Diversity in these reports poses challenge to the users of information and regulators. This study appraises the corporate sustainability reports as per GRI (Global Reporting Initiative) guidelines (the most widely accepted and used) across all industrial sectors. Text mining is adopted to carry out the initial analysis with a large sample size of 2650 reports. Statistical analyses were performed for further investigation. The results indicate that the disclosures made by the companies differ across the industrial sectors. Multivariate Discriminant Analysis (MDA) shows that the environmental variable is a greater significant contributing factor towards explanation of sustainability report.


international conference on computer engineering and technology | 2009

Evaluation of Corporate Environmental Reports Using Data Mining Approach

Jashua Rajesh Modapothala; Biju Issac

Growing importance in corporate environmental reporting has undermined the metrics for its examination. Any such metrics are useful in measuring the effectiveness of reports. The main aim of the study in this paper is to examine and analyze the corporate environmental reports (N=539) using data mining approach. The assessment technique implemented in this study is in line with Global Reporting Initiative (GRI) disclosures. Our findings show that the data mining approach is a reliable and robust measurement. Further findings suggest that reports addressing the criteria differ from the nature of business. The study reveals the growing importance of addressing the various stakeholder groups, industrial base approach and organizational strategies in sustainable reporting.


international conference on networks | 2005

The art of war driving and security threats - a Malaysian case study

Biju Issac; S. Jacob; Lawan A. Mohammed

The fact that wireless local area networks (WLAN) use radio spectrum for transmitting data has with it pros and cons. Mobility without wires and the ease to move around to connect to network resources has made IEEE802.11 WLANs quite popular. The users need to have a laptop with a wireless network adapter that negotiates with an access point. Once authenticated and associated with the access point, the user can easily move around in the transmission range of the access point without losing data or network connection enjoying bandwidths of the order of multiples of 10 Mega bytes. On the negative side, these wireless LANs tend to have fuzzy boundaries, making it easy for an intruder to capture these transmission signals with a receiving device fitted with a sensitive antenna. An analysis of these captured packets can be good news to the intruder. We try to investigate on war driving (an act of locating wireless networks from within a moving vehicle), on interception of transmission data from the located wireless LANs in some of the highways in our country and on doing a brief analysis of that, eventually discussing on the attacks and security precautions.


international conference on computer technology and development | 2009

Analysis, Design and Implementation of a Web-Based Payroll Application Software

Husin J. Then; Biju Issac; Lau T. Chung; Susanti Wongso; Riyan Bong; Lesley Lu; Yu P. Ling

The need to develop customized application software is quite high now-a-days with the ever increasing automation process within many companies. In this paper, we analyze, design, implement and test a web-based payroll software for an external company with the Setup module, PI (personnel information) module, OT (over time) module, Payroll module and Report module. These modules and their implementation are discussed in detail. The software development life cycle followed is discussed to show how different phases are evolved and how they interact with each other to form the software that the client needs.


distributed frameworks for multimedia applications | 2006

Pre-Authenticated and Adaptive IP Mobility for WLAN nodes

Biju Issac; Khairuddhin Ab Hamid; C. E. Tan

When a mobile node roams to another network/subnet, new resource reservation has to be made between the sender and receiver. If enough resources are not available, the quality of service may be disrupted and the connection may fail. If resources are reserved indiscriminately, then most of them would be unused and performance degradation would be the result. We would like to propose a pre-authenticated and adaptive micro-mobility management architecture in IP networks. We use pre-authentication to hasten the handoff process. Also the mobility predictor block used will help in reserving the resources aptly. The packets are generally classified based on the ToS field in IPv4 (or traffic class and the flow label fields in IPv6). Here we focus more on the special case of wireless local area networks (WLANs) installation within a building or in a restricted campus. In this paper, we propose a fast and adaptive IP micro mobility management scheme with mobility prediction for WLAN nodes. We also present some basic simulation on WLAN mobile node roaming


Archive | 2006

Implementation of spam detection on regular and image based emails : a case study using spam corpus

Biju Issac; Valliappan Raman

Collaboration


Dive into the Biju Issac's collaboration.

Top Co-Authors

Avatar

Lawan A. Mohammed

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jashua Rajesh Modapothala

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Valliappan Raman

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

E. Jayamani

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Husin J. Then

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Jofry Hadi Sutanto

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lau T. Chung

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Lesley Lu

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

Riyan Bong

Swinburne University of Technology

View shared research outputs
Top Co-Authors

Avatar

S. Jacob

Swinburne University of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge