Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Srinivas Mukkamala is active.

Publication


Featured researches published by Srinivas Mukkamala.


international symposium on neural networks | 2002

Intrusion detection using neural networks and support vector machines

Srinivas Mukkamala; Guadalupe I. Janoski; Andrew H. Sung

Information security is an issue of serious global concern. The complexity, accessibility, and openness of the Internet have served to increase the security risk of information systems tremendously. This paper concerns intrusion detection. We describe approaches to intrusion detection using neural networks and support vector machines. The key ideas are to discover useful patterns or features that describe user behavior on a system, and use the set of relevant features to build classifiers that can recognize anomalies and known intrusions, hopefully in real time. Using a set of benchmark data from a KDD (knowledge discovery and data mining) competition designed by DARPA, we demonstrate that efficient and accurate classifiers can be built to detect intrusions. We compare the performance of neural networks based, and support vector machine based, systems for intrusion detection.


symposium on applications and the internet | 2003

Identifying important features for intrusion detection using support vector machines and neural networks

Andrew H. Sung; Srinivas Mukkamala

Intrusion detection is a critical component of secure information systems. This paper addresses the issue of identifying important input features in building an intrusion detection system (IDS). Since elimination of the insignificant and/or useless inputs leads to a simplification of the problem, faster and more accurate detection may result. Feature ranking and selection, therefore, is an important issue in intrusion detection. We apply the technique of deleting one feature at a time to perform experiments on SVMs and neural networks to rank the importance of input features for the DARPA collected intrusion data. Important features for each of the 5 classes of intrusion patterns in the DARPA data are identified. It is shown that SVM-based and neural network based IDSs using a reduced number of features can deliver enhanced or comparable performance. An IDS for class-specific detection based on five SVMs is proposed.


Journal of Network and Computer Applications | 2005

Intrusion detection using an ensemble of intelligent paradigms

Srinivas Mukkamala; Andrew H. Sung; Ajith Abraham

Soft computing techniques are increasingly being used for problem solving. This paper addresses using an ensemble approach of different soft computing and hard computing techniques for intrusion detection. Due to increasing incidents of cyber attacks, building effective intrusion detection systems are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. We studied the performance of Artificial Neural Networks (ANNs), Support Vector Machines (SVMs) and Multivariate Adaptive Regression Splines (MARS). We show that an ensemble of ANNs, SVMs and MARS is superior to individual approaches for intrusion detection in terms of classification accuracy.


annual computer security applications conference | 2004

Static analyzer of vicious executables (SAVE)

Andrew H. Sung; Jianyun Xu; Patrick Chavez; Srinivas Mukkamala

Software security assurance and malware (Trojans, worms, and viruses, etc.) detection are important topics of information security. Software obfuscation, a general technique that is useful for protecting software from reverse engineering, can also be used by hackers to circumvent the malware detection tools. Current static malware detection techniques have serious limitations, and sandbox testing also fails to provide a complete solution due to time constraints. In this paper, we present a robust signature-based malware detection technique, with emphasis on detecting obfuscated (or polymorphic) malware and mutated (or metamorphic) malware. The hypothesis is that all versions of the same malware share a common core signature that is a combination of several features of the code. After a particular malware has been first identified, it can be analyzed to extract the signature, which provides a basis for detecting variants and mutants of the same malware in the future. Encouraging experimental results on a large set of recent malware are presented.


soft computing | 2008

Detection of Phishing Attacks: A Machine Learning Approach

Ram B. Basnet; Srinivas Mukkamala; Andrew H. Sung

Phishing is a form of identity theft that occurs when a malicious Web site impersonates a legitimate one in order to acquire sensitive information such as passwords, account details, or credit card numbers.Though there are several anti-phishing software and techniques for detecting potential phishing attempts in emails and detecting phishing contents on websites, phishers come up with new and hybrid techniques to circumvent the available software and techniques.


Archive | 2003

Intrusion Detection Using Ensemble of Soft Computing Paradigms

Srinivas Mukkamala; Andrew H. Sung; Ajith Abraham

Soft computing techniques are increasingly being used for problem solving. This paper addresses using ensemble approach of different soft computing techniques for intrusion detection. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDSs) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. Two classes of soft computing techniques are studied: Artificial Neural Networks (ANNs) and Support Vector Machines (SVMs). We show that ensemble of ANN and SVM is superior to individual approaches for intrusion detection in terms of classification accuracy.


international conference on enterprise information systems | 2006

INTRUSION DETECTION SYSTEMS USING ADAPTIVE REGRESSION SPLINES

Srinivas Mukkamala; Andrew H. Sung; Ajith Abraham; Vitorino Ramos

Past few years have witnessed a growing recognition of intelligent techniques for the construction of efficient and reliable intrusion detection systems. Due to increasing incidents of cyber attacks, building effective intrusion detection systems (IDS) are essential for protecting information systems security, and yet it remains an elusive goal and a great challenge. In this paper, we report a performance analysis between Multivariate Adaptive Regression Splines (MARS), neural networks and support vector machines. The MARS procedure builds flexible regression models by fitting separate splines to distinct intervals of the predictor variables. A brief comparison of different neural network learning algorithms is also given.


international conference hybrid intelligent systems | 2004

Polymorphic malicious executable scanner by API sequence analysis

Jianyun Xu; Andrew H. Sung; Patrick Chavez; Srinivas Mukkamala

The proliferation of malware (viruses, Trojans, and other malicious code) in recent years has presented a serious threat to enterprises, organizations, and individuals. Polymorphic (or variant versions of) computer viruses are more complex and difficult than their original versions to detect, often requiring antivirus companies to spend much time to create the routines needed to catch them. In this paper, we propose a new approach for detecting polymorphic malware in the Windows platform. Our approach rests on an analysis based on the Windows API calling sequence that reflects the behavior of a piece of particular code. The analysis is carried out directly on the PE (portable executable) code. It is achieved in two major steps: construct the API calling sequences for both the known virus and the suspicious code, and perform a similarity measurement between the two sequences after a sequence realignment operation is done. Favorable experimental results are obtained and presented.


Lecture Notes in Computer Science | 2004

The feature selection and intrusion detection problems

Andrew H. Sung; Srinivas Mukkamala

Cyber security is a serious global concern. The potential of cyber terrorism has posed a threat to national security; meanwhile the increasing prevalence of malware and incidents of cyber attacks hinder the utilization of the Internet to its greatest benefit and incur significant economic losses to individuals, enterprises, and public organizations. This paper presents some recent advances in intrusion detection, feature selection, and malware detection. In intrusion detection, stealthy and low profile attacks that include only few carefully crafted packets over an extended period of time to delude firewalls and the intrusion detection system (IDS) have been difficult to detect. In protection against malware (trojans, worms, viruses, etc.), how to detect polymorphic and metamorphic versions of recognized malware using static scanners is a great challenge. We present in this paper an agent based IDS architecture that is capable of detecting probe attacks at the originating host and denial of service (DoS) attacks at the boundary controllers. We investigate and compare the performance of different classifiers implemented for intrusion detection purposes. Further, we study the performance of the classifiers in real-time detection of probes and DoS attacks, with respect to intrusion data collected on a real operating network that includes a variety of simulated attacks. Feature selection is as important for IDS as it is for many other modeling problems. We present several techniques for feature selection and compare their performance in the IDS application. It is demonstrated that, with appropriately chosen features, both probes and DoS attacks can be detected in real time or near real time at the originating host or at the boundary controllers. We also briefly present some encouraging recent results in detecting polymorphic and metamorphic malware with advanced static, signature-based scanning techniques.


industrial and engineering applications of artificial intelligence and expert systems | 2004

Modeling intrusion detection systems using linear genetic programming approach

Srinivas Mukkamala; Andrew H. Sung; Ajith Abraham

One of the difficulties of using Artificial Neural Networks (ANNs) to estimate atmospheric temperature is the large number of potential input variables available. In this study, four different feature extraction methods were used to reduce the input vector to train four networks to estimate temperature at different atmospheric levels. The four techniques used were: genetic algorithms (GA), coefficient of determination (CoD), mutual information (MI) and simple neural analysis (SNA). The results demonstrate that of the four methods used for this data set, mutual information and simple neural analysis can generate networks that have a smaller input parameter set, while still maintaining a high degree of accuracy.

Collaboration


Dive into the Srinivas Mukkamala's collaboration.

Top Co-Authors

Avatar

Andrew H. Sung

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Kesav Kancherla

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Ram B. Basnet

Colorado Mesa University

View shared research outputs
Top Co-Authors

Avatar

Krishna Yendrapalli

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Ajith Abraham

Technical University of Ostrava

View shared research outputs
Top Co-Authors

Avatar

Anthonius Sulaiman

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Guadalupe I. Janoski

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar
Top Co-Authors

Avatar

Madhu K. Shankarapani

New Mexico Institute of Mining and Technology

View shared research outputs
Top Co-Authors

Avatar

Manoj Cherukuri

New Mexico Institute of Mining and Technology

View shared research outputs
Researchain Logo
Decentralizing Knowledge