Somanathan Pillai, Sanjaikanth E Vadakkethil
Unknown Affiliation

Published : 3 Documents Claim Missing Document
Claim Missing Document
Check
Articles

Found 3 Documents
Search

Detection of cyberattacks using bidirectional generative adversarial network Vallabhaneni, Rohith; Vaddadi, Srinivas A.; Somanathan Pillai, Sanjaikanth E Vadakkethil; Addula, Santosh Reddy; Ananthan, Bhuvanesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 35, No 3: September 2024
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v35.i3.pp1653-1660

Abstract

Due to the progress of communication technologies, diverse information is transmitted in distributed systems via a network model. Concurrently, with the evolution of communication technologies, the attacks have broadened, raising concerns about the security of networks. For dealing with different attacks, the analysis of intrusion detection system (IDS) has been carried out. Conventional IDS rely on signatures and are time-consuming for updation, often lacking coverage for all kinds of attacks. Deep learning (DL), specifically generative methods demonstrate potential in detecting intrusions through network data analysis. This work presents a bidirectional generative adversarial network (BiGAN) for the detection of cyberattacks using the IoT23 database. This BiGAN model efficiently detected different attacks and the accuracy and F-score values achieved were 98.8% and 98.2% respectively.
Archimedes assisted LSTM model for blockchain based privacy preserving IoT with smart cities Somanathan Pillai, Sanjaikanth E Vadakkethil; Vallabhaneni, Rohith; Vaddadi, Srinivas A; Addula, Santosh Reddy; Ananthan, Bhuvanesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 37, No 1: January 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v37.i1.pp488-497

Abstract

Presently, the emergence of internet of things (IoT) has significantly improved the processing, analysis, and management of the substantial volume of big data generated by smart cities. Among the various applications of smart cities, notable ones include location-based services, urban design and transportation management. These applications, however, come with several challenges, including privacy concerns, mining complexities, visualization issues and data security. The integration of blockchain (BC) technology into IoT (BIoT) introduces a novel approach to secure smart cities. This work presents an Archimedes assisted long short-term memory (LSTM) model intrusion detection for BC based privacy preserving (PP) IoT with smart cities. After the stage of pre-processing, the LSTM is utilized for automated feature extraction and classification. At last, the Archimedes optimizer (AO) is utilized to optimize the LSTM’s hyper-parameters. In addition, the BC technology is utilized for securing the data transmission.
Vulnerability detection in smart contact using chaos optimization-based DL model Vaddadi, Srinivas A; Somanathan Pillai, Sanjaikanth E Vadakkethil; Vallabhaneni, Rohith; Addula, Santosh Reddy; Ananthan, Bhuvanesh
Indonesian Journal of Electrical Engineering and Computer Science Vol 38, No 3: June 2025
Publisher : Institute of Advanced Engineering and Science

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.11591/ijeecs.v38.i3.pp1793-1803

Abstract

This research article introduces a deep learning (DL) for identifying vulnerabilities in the smart contracts, leveraging an optimized DL method. The proposed method, termed LogT BiLSTM, combines bidirectional long short-term memory (BiLSTM) with logistic chaos Tasmanian devil optimization (LogT) for enhancing detection of vulnerability. The evaluation of the suggested approach is conducted using publicly available datasets. Initially, preprocessing steps involve removing duplicate data and imputing missing data. Subsequently, the vulnerability detection process utilizes BiLSTM, with the optimization of the loss function achieved through LogT. Results indicate promising performance in identifying vulnerabilities in SC, highlighting the efficacy of the LogT-BiLSTM approach.