I am a PhD Information Science and Technology student with a concentration in Cybersecurity from Geroge Mason University.
at the 21st International Conference on Security and Cryptography, SECRYPT 2024
Intrusion Detection Systems (IDS) are strategically installed on specific nodes of an enterprise network to detect ongoing attempts to exploit vulnerable systems. However, deploying a large number of detection rules in each IDS may reduce their efficiency and effectiveness, especially when an IDS is monitoring high-speed data communication channels. Existing research on optimal IDS placement strategies does not address the problem at such a level of granularity. This paper proposes a novel approach for strategic rule deployment subject to various practical constraints. Attack graph-based modeling, along with knowledge of the network topology, is employed to identify the set of suitable rules for deployment on individual IDSs, and capacity constraints are considered to balance the load across IDSs. We provide a formal specification of the optimization problem and propose a practical heuristic solution based on a genetic algorithm.Arka Ghosh, Massimiliano Albanese, Preetam Mukherjee, Amir Alipour-Fanid
at the International Conference on Computer, Electrical & Communication Engineering, ICCECE 2023
An individual model is not always sufficient enough to classify an email. Each spam mail has features that distinguish it from any other regular mail. A model might not always use that feature for classification and thus produce erroneous results. It is essential to cross-verify the output of one model, with that of another model. This can be done using the ensemble learning technique. Previously, this was done using the same model repeatedly, or different variants of the model. However, in this paper, we have used four completely different models and used them to perform max voting, to optimize the result. The models used are Support Vector Machine(SVM), Multinomial Naïve Bayes(MNB), Random Forest(RF), and Decision Tree(DT). After testing all the possible combinations, we were able to conclude that the combination of SVM, MNB, and DT gives the optimal result.Arka Ghosh, Shreyashi Dey, Raja Das, Gautam Mahapatra
June,2021
After the pandemic hit the world, there has been an increase in the number of Cyber Attacks by approximately 600% percent. Cyber Security ventures predict cybercrime damages will be around $6 trillion in 2021 up from $3 trillion in 2015. So, is cybersecurity actually implemented properly or are there improvements that are needed to reduce these heavy losses. In this manuscript, we will understand the basics of cybersecurity and the common attacks, the losses they incur, and how they can be prevented.
Arka Ghosh
•Research and Development work based on Network Virtualisation, SDN, and Moving Target Defence.
•Research and Development work based on Object Detection and Distance Estimation.
•Novel research on topic related to Network Defence under the guidance of Dr. Massimiliano Albanese
•Penetration Testing and Documentation of various vulnerable machines.
• Researched various topics on Java and wrote original articles on them.