Nagesh Shenoy H

Work place: Department of Computer Science & Engineering, Canara Engineering College, Benjanapadavu, India

E-mail: h.nagesh.shenoy@gmail.com

Website:

Research Interests: Autonomic Computing, Computing Platform, Data Structures and Algorithms

Biography

Nagesh Shenoy H received his B. E degree in Information Science & Engineering from Canara Engineering College, Bantwal, M.Tech degree in Computer Science and Engineering from NMAM Institute of Technology, Nitte, Visvesvaraya Technological University, India and M.B.A degree in Information Technology, SMU. His major research interest is in the fields of Cloud Computing and Cloud Security. He has 4 year of industrial experience and 8 years of teaching experience. He is currently pursuing his Ph.D. in the area of Cloud Computing under Visvesvaraya Technological University and working as an Assistant Professor in the Department of Computer Science & Engineering at Canara Engineering College, Benjanapadavu. He is a member of ISTE.

Author Articles
Exploring Deep Learning Techniques in Cloud Computing to Detect Malicious Network Traffic: A Sustainable Computing Approach

By Nagesh Shenoy H K. R. Anil Kumar Suchitra N Shenoy Abhishek S. Rao Rajgopal K T

DOI: https://doi.org/10.5815/ijwmt.2021.05.02, Pub. Date: 8 Oct. 2021

The demand for cloud computing systems has increased tremendously in the IT sector and various business applications due to their high computation and cost-effective solutions to various computing problems. This increased demand has raised several challenges such as load balancing and security in cloud systems. Numerous approaches have been presented for load balancing but providing security and maintaining integrity and privacy remains a less explored research area. Intrusion detection systems have emerged as a promising solution to predict attacks. In this work, we develop a deep learning-based scheme that contains data pre-processing, convolution operations, BiLSTM model, attention layer, and CRF modeling. The current study employs a machine learning-based approach to detect intrusions based on the attackers' historical behavior. Deep learning algorithms were used to extract features from the image and determine the significance of dense packets to generate the salient fine-grained feature that can be used to detect malicious traffic and presents the final classification using fused features.

[...] Read more.
Other Articles