Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Manju Khari is active.

Publication


Featured researches published by Manju Khari.


International Journal of Computer Applications | 2011

Defining Malicious Behavior of a Node and its Defensive Methods in Ad Hoc Network

Radhika Saini; Manju Khari

ABSTRACT Any node under attack in ad hoc network exhibits an anomalous behavior called the malicious behavior. In this situation, the entire operation of a network gets disturbed and to preclude such malicious behavior several security solutions have been discovered. In this paper, malicious behavior integrity, confidentiality etc [4]. An intruder takes advantage of of a node is defined and to defend such behavior, security solutions are presented which are used in furnishing a secure and reliable communication in ad hoc. General Terms Security, Algorithms Keywords Ad Hoc Network, Nodes, Security, Attack, Malicious Behavior 1. INTRODUCTION Ad Hoc Network provides quick communication among nodes (like mobile or a laptop) to transfer the packets from one node to other. An example of an ad hoc network is given in figure 1 where nodes are communicating directly with each other. All the links between nodes are wireless. Bluetooth [1] is a typical example of such networks. These networks are independent of any fixed infrastructure or central entity like cellular networks [2] which requires fixed infrastructure to operate. operations.


International Journal of Bio-inspired Computation | 2013

Heuristic search-based approach for automated test data generation: a survey

Ruchika Malhotra; Manju Khari

The complexity of software has been increasing in the past few years, and software testing as a most intensive factor is becoming more and more expensive. Testing costs often account for up to 50% of the total expense of software project development; hence any techniques leading to the automatic test data generation will have great potential to substantially reduce these costs. Existing approaches of automatic test data generation have achieved some success by using heuristic search-based approach, but they are not summarised. In this paper we presented a survey on heuristic search-based approach, i.e., genetic algorithm for automated test data generation. We summarise the work done by researchers those who have applied the concept of heuristic search-based approach for test data generation. The main objective of this paper is to acquire the concepts related to heuristic search-based approach for automated test data generation and moreover the use of heuristic search-based approach fascinated by the fact that many of the testing problems can be formulated as search problem. We also provide constructive guidelines for future research for automated test data generation.


international conference on computer science and information technology | 2012

Survey of Trust Schemes on Ad-Hoc Network

Renu Dalal; Manju Khari; Yudhvir Singh

MANET (Mobile Ad-hoc Network) is a structureless & dynamics network, which consist of mobile nodes without any physical link between them. MANET provides some basic functions like routing, communication, network management and packet forwarding etc over self organized network. Because MANET has not a fixed topology, in which mobile nodes comes and leaves the network within a random period of time. It effects energy, bandwidth and memory computations of network. Providing trust in MANET is such a crucial task because it doesn’t having centralized infrastructure. In this paper, we survey the different trust model schemes of MANET with their unique features, merits and demerits.


international conference on computer science and information technology | 2012

Mobile Ad Hoc Netwoks Security Attacks and Secured Routing Protocols: A Survey

Supriya; Manju Khari

Ad-hoc networks are the collection of autonomous nodes where all the nodes are configured dynamically without any centralized management system. Mobile Adhoc Networks (MANETs) are self-configuring network of mobile routers connected via a wireless link. However,the feature of decentralization and dynamic configuration of nodes makes MANETs vulnerable to various security attacks,that are otherwise not so common in a wired network. For mitigation of these attacks,several secured routing protocols are being proposed till now. This paper provides the view of overall security breaches present in the Ad-hoc Networks till now and will discuss in brief about the several proposed secure routing protocols.


Knowledge Based Systems | 2018

ARM-AMO: An Efficient Association Rule Mining Algorithm Based on Animal Migration Optimization

Le Hoang Son; Francisco Chiclana; Raghavendra Kumar; Mamta Mittal; Manju Khari; Jyotir Moy Chatterjee; Sung Wook Baik

Abstract Association rule mining (ARM) aims to find out association rules that satisfy predefined minimum support and confidence from a given database. However, in many cases ARM generates extremely large number of association rules, which are impossible for end users to comprehend or validate, thereby limiting the usefulness of data mining results. In this paper, we propose a new mining algorithm based on animal migration optimization (AMO), called ARM–AMO, to reduce the number of association rules. It is based on the idea that rules which are not of high support and unnecessary are deleted from the data. Firstly, Apriori algorithm is applied to generate frequent itemsets and association rules. Then, AMO is used to reduce the number of association rules with a new fitness function that incorporates frequent rules. It is observed from the experiments that, in comparison with the other relevant techniques, ARM–AMO greatly reduces the computational time for frequent item set generation, memory for association rule generation, and the number of rules generated.


International Journal of Computer Applications | 2011

Security Holes in Contrast to the New Features Emerging in the Next Generation Protocol

Mohit Wadhwa; Manju Khari

ABSTRACT The next generation protocol (Ipv6) also called Iping, which should replace the current generation of Internet protocol (Ipv4), brings many enhancements over Ipv4. Ipv4 has been a great success for more than 20 years, since its interception in 1980 but due to limited address space, complex configuration and very important lack of security it does not fulfil the requirement of the exponentially growing internet. Because of inadequate address and for other issues, Ipv6 was proposed by the network working group of the internet engineering taskforce (IETF) which provides many new features like quality of services, auto-address configuration, end to end connectivity, security, simple routing header and so on. This paper identifies security holes to the new features introduced in Ipv6 and security holes that are not altered by new futures of Ipv6. Keywords: Ipv4, Ipv6, Ipsec, NAT, TCP/IP, security holes, IP 1. INTRODUCTION The current generation of Internet protocol (IPv4) has been in use for more than 20 years and has not significantly changed since it was introduced in 1981. IPV4 has proven to be robust, interoperable and easily implemented. With Ipv4, options were integrated into the basic Ipv4 header whereas in Ipv6 they are handled as extension headeThe IPV4 specifies a 32 bit IP address field is a key component of the internet infrastructure and have many issues like complex configuration, limited address space, large routing tables, demand for real time data transfer and lack of security which does not fulfil the requirement of the exponential growth of the internet. To eliminate some of the mentioned imperfection, Network-working group of the Internet engineering task force (IETF) proposed a new suite of protocols called the Internet protocol version (IPv6) [1]. Industry stakeholder and Internet experts generally agree that IPv6-based network would be technically superior to the commonly installed base of IPv4-based networks [2]. The IPv6 with 128 bit address space provides large IP addresses and also with classless and auto address configuration features, IPv6 provides a new innovative communication services among the nodes and improved security by using IPsec as a part of packet header. IPv6 provides various improvements over IPv4 like simplicity, large address space, simple routing header format, extension for authentication and privacy, flow labelling capabilities, quality of services (Qos) and very important security at IP level. In addition, through auto configuration and mobility feature of IPv6 nodes on the Internet can communicate in simpler way. However, IPv6 with new features will likely generate newer protocol attacks and IPv4 related attack would morph into new form. Although the IPv6 protocol is still developing, it is fully functional and its implementation and usage in the real network is possible [3]. In section 2, we will discuss the new features introduced in IPv6. In section 3, these features are discussed along with security holes. Section 4 outlines security threats that are common to IPv4. Finally the conclusion will be given.


computational science and engineering | 2012

Authenticity check to provide trusted platform in MANET (ACTP)

Renu Dalal; Manju Khari; Yudhvir Singh

To provide authenticated nodes and secured environment is the important issue in MANET. Frequent path breaking, multihop wireless link between mobile nodes, self organization and maintenance are such properties that makes difficult to provide trust in MANET. This paper proposes the new trust scheme, which provides malicious free atmosphere for mobile ad-hoc network. This model first check the authenticity of nodes through challenge response method and then PKI certificate will be given to only authenticated nodes so as to enable the trusted communication platform.


soft computing | 2017

Optimized test suites for automated testing using different optimization techniques

Manju Khari; Prabhat Kumar; Daniel Burgos; Rubén González Crespo

Automated testing mitigates the risk of test maintenance failure, selects the optimized test suite, improves efficiency and hence reduces cost and time consumption. This paper is based on the development of an automated testing tool which includes two major automated components of software testing, test suite generation and test suite optimization. The control flow of the software under test has been represented by a flow graph. There are five test suite generation methods which are made available in the tool, namely boundary value testing, robustness testing, worst-case testing, robust worst-case testing and random testing. The generated test suite is further optimized to a desired fitness level using the artificial bee colony algorithm or the cuckoo search algorithm. The proposed method is able to provide a set of minimal test cases with maximum path coverage as compared to other algorithms. Finally, the generated optimal test suite is used for automated fault detection.


International Journal of Applied Metaheuristic Computing | 2017

Empirical Evaluation of Hill Climbing Algorithm

Manju Khari; Prabhat Kumar

The software is growing in size and complexity every day due to which strong need is felt by the research community to search for the techniques which can optimize test cases effectively. The current study is inspired by the collective behavior of finding paths from the colony of food and uses different versions of Hill Climbing Algorithm HCA such as Stochastic, and Steepest Ascent HCA for the purpose of finding a good optimal solution. The performance of the proposed algorithm is verified on the basis of three parameters comprising of optimized test cases, time is taken during the optimization process, and the percentage of optimization achieved. The results suggest that proposed Stochastic HCA is significantly average percentage better than Steepest Ascent HCA in reducing the number of test cases in order to accomplish the optimization target.


international conference on information and communication technology | 2016

A Novel Approach for Software Test Data Generation using Cuckoo Algorithm

Manju Khari; Prabhat Kumar

Automated software test data is a process of generating data that satisfies a given criterion. Search-based techniques are being effectively used in various fields of software engineering. Recently a new meta-heuristic search-based algorithm, cuckoo search, has been proposed. In this paper, we propose the application of this algorithm for generating test data. We validate the proposed algorithm against test functions and then compare its performance with those of Hill Climbing algorithms. The initial results prove the effectiveness of the proposed algorithm in test data generation.

Collaboration


Dive into the Manju Khari's collaboration.

Top Co-Authors

Avatar

Manoj Kumar

Guru Gobind Singh Indraprastha University

View shared research outputs
Top Co-Authors

Avatar

Vaishali

Guru Gobind Singh Indraprastha University

View shared research outputs
Top Co-Authors

Avatar

Sonakshi Vij

Guru Gobind Singh Indraprastha University

View shared research outputs
Top Co-Authors

Avatar

Priyank Pandey

Guru Gobind Singh Indraprastha University

View shared research outputs
Top Co-Authors

Avatar

Amita Jain

Ambedkar Institute of Advanced Communication Technologies and Research

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Rashmi Gupta

Maharaja Agrasen Institute of Technology

View shared research outputs
Top Co-Authors

Avatar

Sonam

Ambedkar Institute of Advanced Communication Technologies and Research

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Amita Dev

Guru Gobind Singh Indraprastha University

View shared research outputs
Researchain Logo
Decentralizing Knowledge