Skip to main content

Showing 1–9 of 9 results for author: Chowdhary, A

Searching in archive cs. Search in all archives.
.
  1. arXiv:2301.08336  [pdf, other

    cs.MS

    PyOED: An Extensible Suite for Data Assimilation and Model-Constrained Optimal Design of Experiments

    Authors: Abhijit Chowdhary, Shady E. Ahmed, Ahmed Attia

    Abstract: This paper describes PyOED, a highly extensible scientific package that enables developing and testing model-constrained optimal experimental design (OED) for inverse problems. Specifically, PyOED aims to be a comprehensive Python toolkit for model-constrained OED. The package targets scientists and researchers interested in understanding the details of OED formulations and approaches. It is also… ▽ More

    Submitted 19 December, 2023; v1 submitted 19 January, 2023; originally announced January 2023.

    Comments: 22 pages, 8 figures

    MSC Class: 68Vxx

  2. arXiv:1905.00964  [pdf, other

    cs.CR cs.NI

    A Survey of Moving Target Defenses for Network Security

    Authors: Sailik Sengupta, Ankur Chowdhary, Abdulhakim Sabur, Adel Alshamrani, Dijiang Huang, Subbarao Kambhampati

    Abstract: Network defenses based on traditional tools, techniques, and procedures fail to account for the attacker's inherent advantage present due to the static nature of network services and configurations. To take away this asymmetric advantage, Moving Target Defense (MTD) continuously shifts the configuration of the underlying system, in turn reducing the success rate of cyberattacks. In this survey, we… ▽ More

    Submitted 20 March, 2020; v1 submitted 2 May, 2019; originally announced May 2019.

    Comments: The first two authors contributed equally

    Journal ref: IEEE Communications Surveys and Tutorials, 2020

  3. arXiv:1812.09660  [pdf, other

    cs.AI cs.CR cs.GT

    Markov Game Modeling of Moving Target Defense for Strategic Detection of Threats in Cloud Networks

    Authors: Ankur Chowdhary, Sailik Sengupta, Dijiang Huang, Subbarao Kambhampati

    Abstract: The processing and storage of critical data in large-scale cloud networks necessitate the need for scalable security solutions. It has been shown that deploying all possible security measures incurs a cost on performance by using up valuable computing and networking resources which are the primary selling points for cloud service providers. Thus, there has been a recent interest in developing Movi… ▽ More

    Submitted 27 February, 2019; v1 submitted 23 December, 2018; originally announced December 2018.

    Comments: Author names marked with * contributed equally and are listed in alphabetical order

    Report number: AICS/2019/01

  4. arXiv:1811.00657  [pdf, other

    cs.CR

    SUPC: SDN enabled Universal Policy Checking in Cloud Network

    Authors: Ankur Chowdhary, Adel Alshamrani, Dijiang Huang

    Abstract: Multi-tenant cloud networks have various security and monitoring service functions (SFs) that constitute a service function chain (SFC) between two endpoints. SF rule ordering overlaps and policy conflicts can cause increased latency, service disruption and security breaches in cloud networks. Software Defined Network (SDN) based Network Function Virtualization (NFV) has emerged as a solution that… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

    Comments: 5 pages

  5. arXiv:1811.00653  [pdf, other

    cs.CR

    SDN based Network Function Parallelism in Cloud

    Authors: Ankur Chowdhary, Dijiang Huang

    Abstract: Network function virtualization (NFV) based service function chaining (SFC) allows the provisioning of various security and traffic engineering applications in a cloud network. Inefficient deployment of network functions can lead to security violations and performance overhead. In an OpenFlow enabled cloud, the key problem with current mechanisms is that several packet field match and flow rule ac… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

    Comments: 5 pages

  6. arXiv:1811.00651  [pdf, other

    cs.CR

    Adaptive MTD Security using Markov Game Modeling

    Authors: Ankur Chowdhary, Sailik Sengupta, Adel Alshamrani, Dijiang Huang, Abdulhakim Sabur

    Abstract: Large scale cloud networks consist of distributed networking and computing elements that process critical information and thus security is a key requirement for any environment. Unfortunately, assessing the security state of such networks is a challenging task and the tools used in the past by security experts such as packet filtering, firewall, Intrusion Detection Systems (IDS) etc., provide a re… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

    Comments: 5 pages

  7. arXiv:1811.00635  [pdf, other

    cs.CR

    TRUFL: Distributed Trust Management framework in SDN

    Authors: Ankur Chowdhary, Adel Alshamrani, Dijiang Huang, Myong Kang, Anya Kim, Alexander Velazquez

    Abstract: Software Defined Networking (SDN) has emerged as a revolutionary paradigm to manage cloud infrastructure. SDN lacks scalable trust setup and verification mechanism between Data Plane-Control Plane elements, Control Plane elements, and Control Plane-Application Plane. Trust management schemes like Public Key Infrastructure (PKI) used currently in SDN are slow for trust establishment in a larger clo… ▽ More

    Submitted 15 March, 2019; v1 submitted 1 November, 2018; originally announced November 2018.

    Comments: 6 pages

  8. arXiv:1811.00634  [pdf, other

    cs.CR

    SDFW: SDN-based Stateful Distributed Firewall

    Authors: Ankur Chowdhary, Dijiang Huang, Adel Alshamrani, Abdulhakim Sabur, Myong Kang, Anya Kim, Alexander Velazquez

    Abstract: SDN provides a programmable command and control networking system in a multi-tenant cloud network using control and data plane separation. However, separating the control and data planes make it difficult for incorporating some security services (e.g., firewalls) into SDN framework. Most of the existing solutions use SDN switches as packet filters and rely on SDN controllers to implement firewall… ▽ More

    Submitted 1 November, 2018; originally announced November 2018.

    Comments: 6 pages

  9. arXiv:0911.5404  [pdf

    cs.HC cs.CV

    Laser Actuated Presentation System

    Authors: Atul Chowdhary, Vivek Agrawal, Subhajit Karmakar, Sandip Sarkar

    Abstract: We present here a pattern sensitive PowerPoint presentation scheme. The presentation is actuated by simple patterns drawn on the presentation screen by a laser pointer. A specific pattern corresponds to a particular command required to operate the presentation. Laser spot on the screen is captured by a RGB webcam with a red filter mounted, and its location is identified at the blue layer of each… ▽ More

    Submitted 28 November, 2009; originally announced November 2009.

    Comments: 7 pages, 20 figures