Work place: Department of Information Technology, Birla Institute of Technology, Mesra, Ranchi, India
E-mail: paul.sounak@gmail.com
Website:
Research Interests: Computer Architecture and Organization, Intrusion Detection System, Network Security, Data Structures and Algorithms, Analysis of Algorithms, Numerical Analysis
Biography
Sounak Paul is an Assistant professor in the Department of Information Technology, Birla Institute of Technology (BIT), Mesra, Ranchi, India, presently deputed at Birla Institute of Technology, International centre, Muscat, Oman (Waljat College of Applied Sciences). He received his Master in Technology (M.Tech) in Computer science and Engineering from Indian Institute of Technology (IIT), Guwahati, India. He earned his Master in Computer Applications (MCA) from Birla Institute of Technology, Mesra, Ranchi, India. His research interests include network security specially malware analysis and defense, intrusion detection and wireless sensor networks.
By Sounak Paul Bimal Kumar Mishra
DOI: https://doi.org/10.5815/ijcnis.2013.02.04, Pub. Date: 8 Feb. 2013
Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect the network from such attacks. Several antiviruses are available in the market. But none can give full proof solution to malicious attacks in communication networks. In this paper we present a mechanism to measure and compare the relative ability of antivirus against various kinds of viruses. We construct a hierarchical structure for different virus defense mechanism. Using Analytical Hierarchy Process (AHP) we construct a pair wise comparison matrix and find the value of corresponding Eigen vectors; we then apply the theory of AHP to calculate weight of each defense index. We validated our technique with an example. Our method can provide a strong reference to design an optimal network security solution.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals