Paramvir Singh

Work place: Dr B R Ambedkar National Institute of Technology, Jalandhar 144011, Punjab, India

E-mail: singhpv@nitj.ac.in

Website:

Research Interests: Computational Science and Engineering, Software Engineering, Data Structures and Algorithms

Biography

Paramvir Singh received the Ph.D. degree in computer science and engineering from Guru Nanak Dev University, Amritsar, Punjab, India, in 2011 and the M.Tech. degree in computer science and engineering from Panjab University Chandigarh, India, in 2005. He is currently with Department of Computer Science and Engineering, National Institute of Technology Jalandhar, Punjab. He has published more than 20 papers in refereed international journals and refereed international conferences proceedings. His research interests include software engineering, secure systems, and network security. He is a member of the IEEE and the IEEE Computer Society, and a life member of ISTE.

Author Articles
Fuzzy-based User Behavior Characterization to Detect HTTP-GET Flood Attacks

By Karanpreet Singh Paramvir Singh Krishan Kumar

DOI: https://doi.org/10.5815/ijisa.2018.04.04, Pub. Date: 8 Apr. 2018

Internet was designed to serve the basic requirement of data transfer between systems. The security perspectives were therefore overlooked due to which the Internet remains vulnerable to a variety of attacks. Among all the possible attacks, Distributed Denial of Service (DDoS) attack is one of the eminent threats that target the availability of the online services to the intended clients. Now-a-days, attackers target application layer of the network stack to orchestrate attacks having a high degree of sophistication. GET flood attacks have been very much prevalent in recent years primarily due to advancement of bots allowing impersonating legitimate client behavior. Differentiating between a human client and a bot is therefore necessary to mitigate an attack. This paper introduces a mitigation framework based on Fuzzy Control System that takes as input two novel detection parameters. These detection parameters make use of clients' behavioral characteristic to measure their respective legitimacy. We design an experimental setup that incorporates two widely used benchmark web logs (Clarknet and WorldCup) to build legitimate and attack datasets. Further, we use these datasets to assess the performance of the proposed through well-known evaluation metrics. The results obtained during this work point towards the efficiency of our proposed system to mitigate a wide range of GET flood attack types.

[...] Read more.
Hybrid Black Hole Algorithm for Bi-Criteria Job Scheduling on Parallel Machines

By Kawal Jeet Renu Dhir Paramvir Singh

DOI: https://doi.org/10.5815/ijisa.2016.04.01, Pub. Date: 8 Apr. 2016

Nature-inspired algorithms are recently being appreciated for solving complex optimization and engineering problems. Black hole algorithm is one of the recent nature-inspired algorithms that have obtained inspiration from black hole theory of universe. In this paper, four formulations of multi-objective black hole algorithm have been developed by using combination of weighted objectives, use of secondary storage for managing possible solutions and use of Genetic Algorithm (GA). These formulations are further applied for scheduling jobs on parallel machines while optimizing bi-criteria namely maximum tardiness and weighted flow time. It has been empirically verified that GA based multi-objective Black Hole algorithms leads to better results as compared to their counterparts. Also the use of combination of secondary storage and GA further improves the resulting job sequence. The proposed algorithms are further compared to some of the existing algorithms, and empirically found to be better. The results have been validated by numerical illustrations and statistical tests.

[...] Read more.
Other Articles