Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Kiran S. Balagani is active.

Publication


Featured researches published by Kiran S. Balagani.


IEEE Computer | 2004

Adaptive neural network clustering of Web users

Santosh K. Rangarajan; Vir V. Phoha; Kiran S. Balagani; Rastko R. Selmic; S. Sitharama Iyengar

The degree of personalization that a Web site offers in presenting its services to users is an important attribute contributing to the sites popularity. Web server access logs contain substantial data about user access patterns. One way to solve this problem is to group users on the basis of their Web interests and then organize the sites structure according to the needs of different groups. Two main difficulties inhibit this approach: the essentially infinite diversity of user interests and the change in these interests with time. We have developed a clustering algorithm that groups users according to their Web access patterns. The algorithm is based on the ART1 version of adaptive resonance theory. In our ART1-based algorithm, a prototype vector represents each user cluster by generalizing the URLs most frequently accessed by all cluster members. We have compared our algorithms performance with the traditional k-means clustering algorithm. Results showed that the ART1-based technique performed better in terms of intracluster distances. We also applied the technique in a prefetching scheme that predicts future user requests.


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2010

On the Feature Selection Criterion Based on an Approximation of Multidimensional Mutual Information

Kiran S. Balagani; Vir V. Phoha

We derive the feature selection criterion presented in [1] and [2] from the multidimensional mutual information between features and the class. Our derivation: 1) specifies and validates the lower-order dependency assumptions of the criterion and 2) mathematically justifies the utility of the criterion by relating it to Bayes classification error.


intelligent information technology application | 2009

A Weighted Metric Based Adaptive Algorithm for Web Server Load Balancing

Deepak C. Shadrach; Kiran S. Balagani; Vir V. Phoha

We propose a load balancing algorithm that adapts its strategies for allocating Web requests based on the Web servers’ status. The system used in our experiment comprises of two components: (1) a Prober and (2) an Allocator. The Prober gathers the status information from the Web servers every 50 milliseconds. The status information consists of the load on each Web server and a check for a cache hit. Based on this status information, the Allocator calculates a weighted metric for each server. This metric has three components: (1) CPU load on the server, (2) server’s response rate, and (3) the number of requests served by the server. The Allocator chooses the Web server with the least value for this metric. Unique features of this approach are (1) consideration of both the global information (consisting of status at other Web servers) and local information at each Web server to choose the best server to allocate a request, and (2) the algorithm passes the IP address of the chosen Web server to the client that initiated the request and then allows the client to establish a connection with the server directly, thereby eliminating the participation overhead of the intermediate redirector. We compare our algorithm with three different methods: (1) random allocation scheme, (2) round robin allocation scheme, and (3) a recently reported scheme that uses neural networks. Our method is as good as or better (in most cases) in response time, than the other three approaches.


computer vision and pattern recognition | 2011

Making impostor pass rates meaningless: A case of snoop-forge-replay attack on continuous cyber-behavioral verification with keystrokes

Khandaker Abir Rahman; Kiran S. Balagani; Vir V. Phoha

Previous efforts in continuous cyber-behavioral verification have considered only zero-effort impostor attacks. Taking continuous verification with keystroke dynamics as a case in point, we demonstrate that forgery attempts created using snooped information (stolen keystroke timing information in our case) have alarmingly high success rates. In our experiments, with as little as 50 to 200 snooped keystrokes (roughly, less than two lines of text typed in a typical email), we were able to create forgeries that had as high as 87.75 percent success rates against verifier configurations that showed less than 11 percent “zero-effort” impostor pass rates. We performed experiments using keystroke data from 50 users who typed approximately 1300 to 2900 keystrokes of free text during three different periods. Our experiments consisted of two parts. In the first part, we conducted zero-effort verification experiments with two verifiers (“R” and “S”) and obtained EERs between 10 and 15 percent under various verifier configurations. In the second part, we replayed 10,000 forged impostor attempts per user and demonstrated how the zero-effort impostor pass rates became meaningless when impostor attempts were created using stolen keystroke timing information.


systems man and cybernetics | 2010

On Guo and Nixon's Criterion for Feature Subset Selection: Assumptions, Implications, and Alternative Options

Kiran S. Balagani; Vir V. Phoha; S. Sitharama Iyengar; N. Balakrishnan

Guo and Nixon proposed a feature selection method based on maximizing <i>I</i>( <b>x</b>;<i>Y</i>), the multidimensional mutual information between feature vector <b>x</b> and class variable <i>Y</i>. Because computing <i>I</i>(<b>x</b>;<i>Y</i>) can be difficult in practice, Guo and Nixon proposed an approximation of <i>I</i>(<b>x</b>;<i>Y</i>) as the criterion for feature selection. We show that Guo and Nixons criterion originates from approximating the joint probability distributions in <i>I</i>(<b>x</b>;<i>Y</i>) by second-order product distributions. We remark on the limitations of the approximation and discuss computationally attractive alternatives to compute <i>I</i>(<b>x</b>;<i>Y</i>) .


IEEE Transactions on Pattern Analysis and Machine Intelligence | 2007

On the Relationship Between Dependence Tree Classification Error and Bayes Error Rate

Kiran S. Balagani; Vir V. Phoha

Wong and Poon (1989) showed that Chow and Lius tree dependence approximation can be derived by minimizing an upper bound of the Bayes error rate. Wong and Poons result was obtained by expanding the conditional entropy H(omega|X). We derive the correct expansion of H(omega|X) and present its implication.


IEEE Transactions on Knowledge and Data Engineering | 2007

K-Means+ID3: A Novel Method for Supervised Anomaly Detection by Cascading K-Means Clustering and ID3 Decision Tree Learning Methods

Shekhar R. Gaddam; Vir V. Phoha; Kiran S. Balagani


Proceedings from the Fifth Annual IEEE SMC Information Assurance Workshop, 2004. | 2004

Dimension reduction using feature extraction methods for real-time misuse detection systems

Gopi K. Kuchimanchi; Vir V. Phoha; Kiran S. Balagani; Shekhar R. Gaddam


Pattern Recognition Letters | 2011

On the discriminability of keystroke feature vectors used in fixed text keystroke authentication

Kiran S. Balagani; Vir V. Phoha; Asok Ray; Shashi Phoha


Archive | 2008

Method to indentify anomalous data using cascaded K-Means clustering and an ID3 decision tree

Vir V. Phoha; Kiran S. Balagani

Collaboration


Dive into the Kiran S. Balagani's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar

Asok Ray

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

S. Sitharama Iyengar

Florida International University

View shared research outputs
Top Co-Authors

Avatar

Shashi Phoha

Pennsylvania State University

View shared research outputs
Top Co-Authors

Avatar

Shekhar R. Gaddam

Louisiana State University

View shared research outputs
Top Co-Authors

Avatar

Amit U. Nadgar

Louisiana Tech University

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Khandaker Abir Rahman

Saginaw Valley State University

View shared research outputs
Top Co-Authors

Avatar

Paolo Gasti

New York Institute of Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge