Friday, September 22, 2006

Flash..Flash..: Recent updates on Research Work

Recently one paper on “Framework for defending Denial of service attacks in wireless networks” got accepted in IEEE 2nd International Conference on Wireless Communication and Sensor Networks (WCSN-2006), Allahabad (http://wcsn.iiita.ac.in/index.html ) . Presenting the paper in the conference on 19th Dec 2006.

Given a presentation on Security issues in Wireless Sensor Networks.

My reserach interests include mobile ad hoc networks, wireless sensor networks and network security. I am working as a Junior Research Associate in the Pervasive IT group at SETLabs.

Credentials

M.Tech Project:

Implementation of reputation based trust management type of “AODV Watch-Dog to mitigate DoS attacks in MANETs”. This is implemented in Network Simulator-2 (NS-2) and awarded A+ grade in evaluation.


PAPER PRESENTATIONS:

Paper was accepted in International Journal of Wireless and Mobile Computing (IJWMC) on Automated model against DDoS attacks and is going to be published soon in the year 2006.

• A paper on ‘IMPACT OF INFORMATION TECHNOLOGY ON SOCIETY’ for State-level paper presentation, TECHNOVISTA-2000 organised by I.S.T.E. Students Chapter, S.V. Engg. College, Suryapet, A.P. and won FIRST PRIZE.

• A paper on ‘E-COMMERCE AND SECURITY’ for National level technical paper presentation Symposium, SOFTWIZ-2001 organized by CSI Chapter, CREC, Calicut on 22 Feb 2001 & for INFOVISION-2001 (KLCE, Vaddeswaram, A.P) on 1st &2nd feb 2001.

• A paper on ‘NETWORK SECURITY’ for technical paper meet organised by I.S.T.E. Students Chapter, GEC, Gudlavalleru, A.P. on the Occasion of Engineers’ Day on 15 sep. 2001 and won FIRST PRIZE.

• Presented seminars on the topics “Secure Routing protocols in Mobile Ad Hoc Networks (MANET)”, “An Introduction to Virtual Private Networks (VPN)”, “An introduction to DNA Computing” and “An Introduction to Reconfigurable Computing”, “Java RMI”.


ACADEMIC ACHIEVEMENTS:

District FIRST in VII class with 93.5%. & School first from VI class to X class.

• Received BEST STUDENT AWARD in our college by Indian Society for Technical Education (I.S.T.E), New Delhi.

• Awarded as the BEST OUTGOING STUDENT in under-graduation with GOLD MEDAL and Rs.10, 000 /- cash prize.

• Received GOLD MEDAL for COLLEGE FIRST in Engineering & 5th position in JNT University Ranking.

• TOPPER of class & Dept. in 2nd, 3rd and 4th semesters in M.Tech (IITR) with SGPAs 9.55, 9.00 & 10.0 respectively
.



CO-CURRICULAR ACTIVITIES

* Secured THIRD prize in STATE SCIENCE SEMINAR -1995 on the topic: RESOURCES FROM THE EARTH – Fossil fuels.

* Secured Second prizes in ELOCUTION in 1992-’93 & 1993-’94. & First prize in 1994-’95 in District Level. & participated in Krishna District MATHS QUIZ & MATHS FAIR and won FIRST Prize in Quiz-finals.


* Participated actively in competitions like Essay writing, Extempore, Dumb-C, Pictionary, Elocution, Debate & Quiz programs and won so many prizes in School/college level, Town level & District level etc.

Thursday, June 15, 2006

Research Experience

M.tech Dissertation @IITR, Roorkee & MQ, Sydney:

“Implementation and Performance evaluation of an Automated model against DDoS attacks".

Credits:
A paper was accepted in International Journal of Wireless and Mobile Computing (IJWMC) on this work is going to be published soon in the year 2006.

Abstract:
In this dissertation, we implemented an automated Controller- Agent model that would greatly minimize DDoS attacks on the Internet. With a new packet marking technique and agent design, the automated model is able to identify the approximate source of attack (nearest router) with a single packet, even in the case of attacks with spoofed source addresses. Here Controller can be centralized or distributed in the network. Agents can be located at edge routers. Victim can be a server or network. The model is invoked only during attack times, is able to process the victims’ traffic separately without disturbing other traffic, is able to establish different attack signatures for different attacking sources and can prevent the attack traffic at the nearest router to the attacking system.

The results from implementation of the model using Network Simulator-2 (NS-2) showed that the automated model seems to be a promising approach to prevent DDoS attacks. It has fast response time, simple in its implementation and can be incrementally deployed. We also extended this model to Wireless Sensor networks to counteract DDoS attacks. Due to the limited energy reserves, computation power of sensor networks victim mechanism of the model is incorporated at base station associated with sensor networks.
----------------------------------------------------------
Wish to go back to homepage then click:
http://sunilvuppala.blogspot.com/