Work place: Adamas University/CSE, Barasat, 700126, India
E-mail: sajalkrsaha@gmail.com
Website: https://sites.google.com/site/sajalsahaofficial/home
Research Interests: Computer Networks, Network Architecture, Network Security
Biography
Dr. Sajal Saha has 18 years of academic experience working both in the affiliated college and university system. Currently he is the Professor and Head, Department of Computer Science and Engineering and Director-Product & Innovation of Adamas University. Prior to this, he was the Principal of Meghnad Saha Institute of Technology under Techno India Group affiliated to Maulana Abul Kalam Azad University of Technology, West Bengal. From 2019 to 2021, he served as Dean of the School of Computing Sciences and Dean of Research at The Assam Kaziranga University. There he served as Associate Dean (Compliance) from 2016 to 2019. His total number of research publications are 40. He authored 2 books titled “GIS and Remote Sensing: Applications in Flood Damage assessment” and “Mobility Management in IP based Network: Framework, Issues and Challenges”. For more details: https://sites.google.com/site/sajalsahaofficial/home
By Swagata Paul Sajal Saha Radha Tamal Goswami
DOI: https://doi.org/10.5815/ijcnis.2022.05.04, Pub. Date: 8 Oct. 2022
Big data applications running on a big data cluster, creates a set of process on different nodes and exchange data via regular network protocols. The nodes of the cluster may receive some new type of attack or unpredictable internal attack from those applications submitted by client. As the applications are allowed to run on the cluster, it may acquire multiple node resources so that the whole cluster becomes slow or unavailable to other clients. Detection of these new types of attacks is not possible using traditional methods. The cumulative network traffic of the nodes must be analyzed to detect such attacks. This work presents an efficient testbed for internal attack generation, data set creation, and attack detection in the cluster. This work also finds the nodes under attack. A new insider attack named BUSY YARN Attack has been identified and analyzed in this work. The framework can be used to recognize similar insider attacks of type DOS where target node(s) in the cluster is unpredictable.
[...] Read more.Subscribe to receive issue release notifications and newsletters from MECS Press journals