Skip to main content

Showing 1–4 of 4 results for author: Chaganti, R

Searching in archive cs. Search in all archives.
.
  1. arXiv:2202.03617  [pdf, other

    cs.CR

    The role of Blockchain in DDoS attacks mitigation: techniques, open challenges and future directions

    Authors: Rajasekhar Chaganti, Bharat Bhushan, Vinayakumar Ravi

    Abstract: With the proliferation of new technologies such as Internet of Things (IOT) and Software-Defined Networking(SDN) in the recent years, the distributed denial of service (DDoS)attack vector has broadened and opened new opportunities for more sophisticated DDoS attacks on the targeted victims. The new attack vector includes unsecured and vulnerable IoT devices connected to the internet, denial of ser… ▽ More

    Submitted 7 February, 2022; originally announced February 2022.

  2. arXiv:2110.06487  [pdf, other

    cs.CY

    Recent trends in Social Engineering Scams and Case study of Gift Card Scam

    Authors: Rajasekhar Chaganti, Bharat Bhushan, Anand Nayyar, Azrour Mourade

    Abstract: Social engineering scams (SES) has been existed since the adoption of the telecommunications by humankind. An earlier version of the scams include leveraging premium phone service to charge the consumers and service providers but not limited to. There are variety of techniques being considered to scam the people due to the advancements in digital data access capabilities and Internet technology. A… ▽ More

    Submitted 13 October, 2021; originally announced October 2021.

  3. arXiv:2110.02504  [pdf, other

    cs.CR

    Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

    Authors: Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham

    Abstract: Malware distribution to the victim network is commonly performed through file attachments in phishing email or from the internet, when the victim interacts with the source of infection. To detect and prevent the malware distribution in the victim machine, the existing end device security applications may leverage techniques such as signature or anomaly-based, machine learning techniques. The well-… ▽ More

    Submitted 6 October, 2021; originally announced October 2021.

  4. arXiv:2102.00647  [pdf, other

    cs.CR

    Intelligent Network Layer for Cyber-Physical Systems Security

    Authors: Raj Chaganti, Deepti Gupta, Naga Vemprala

    Abstract: Cyber-Physical System (CPS) has made a tremendous progress in recent years and also disrupted many technical fields such as smart industries, smart health, smart transportation etc. to flourish the nations economy. However, CPS Security is still one of the concerns for wide adoption owing to high number of devices connecting to the internet and the traditional security solutions may not be suitabl… ▽ More

    Submitted 1 February, 2021; originally announced February 2021.