• Home
  • Krishan Kumar Saluja
Krishan Kumar Saluja

Krishan Kumar Saluja
University Institute of Engineering & Technology, Panjab University, Chndiagarh · Information Technology

Ph.D.

About

171
Publications
90,814
Reads
How we measure 'reads'
A 'read' is counted each time someone views a publication summary (such as the title, abstract, and list of authors), clicks on a figure, or views or downloads the full-text. Learn more
2,455
Citations
Citations since 2017
82 Research Items
1990 Citations
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
20172018201920202021202220230100200300400500
Additional affiliations
July 2009 - August 2016
Shaheed Bhagat Singh State Technical Campus
Position
  • Professor (Associate)
July 2007 - present
Indian Institute of Technology Roorkee
Position
  • Researcher
Description
  • Associate Professor, CSE
Education
July 2004 - July 2007
Indian Institute of Technology Roorkee
Field of study
  • Computer Science & Engineering
July 1999 - July 2001
July 1991 - July 1995
National Institute of Technology, Hamirpur
Field of study
  • Computer Science & Engineering

Publications

Publications (171)
Article
Machine learning has made significant advances in the field of image processing. The foundation of this success is supervised learning, which necessitates annotated labels generated by humans and hence learns from labelled data, whereas unsupervised learning learns from unlabeled data. Self-supervised learning (SSL) is a type of un-supervised learn...
Article
Augmented Reality (AR) aims to modify the perception of real-world images by overlaying digital data on them. A novel mechanic, it is an enlightening and engaging mechanic that constantly strives for new techniques in every sphere. The real world can be augmented with information in real-time. AR aims to accept the outdoors and come up with a novel...
Article
Full-text available
As of March 31, 2021, the Coronavirus COVID-19 was affecting 219 countries and territories worldwide, with approximately 129,574,017 confirmed cases and 2,830,220 death cases. Social isolation is the most reliable way to deal with this pandemic situation. Motivated by this notion, this paper proposes a deep learning-based technique for automating t...
Article
Full-text available
In the arena of image forensics, detecting manipulations in an image is extremely significant because of the use of images in different fields. Various detection techniques have been suggested in the literature that are based on digging out the features from images to unveil the traces left by manipulation operations. In this paper, a deep learning...
Article
Nowadays, Network Function Virtualization (NFV) is a growing and powerful technology in the research community and IT world. Traditional computer networks consist of hardware appliances such as firewalls and load balancers, called middleboxes. The implementation of these hardware devices is a difficult task due to their proprietary nature. NFV prop...
Article
Full-text available
Nowadays, digital images have been manipulated for various fraudulent purposes from time to time. Therefore, proposing a detection algorithm for such manipulations has become a key interest for investigators. Digital image splicing and copy-move are among the most commonly performed forgeries and their detection is problematic. In spite of the numb...
Article
Full-text available
Network security is being increasingly breached with more ethereal intrusion methods, broadening the challenge of providing integrity and security to networks. During the past few years, substantial research has been conducted for fabricating new methods to thwart various network attacks. This review article scrutinizes those research contributions...
Article
Full-text available
With the advent of Internet, images and videos are the most vulnerable media that can be exploited by criminals to manipulate for hiding the evidence of the crime. This is now easier with the advent of powerful and easily available manipulation tools over the Internet and thus poses a huge threat to the authenticity of images and videos. There is n...
Article
Full-text available
Digital imaging has become elementary in this novel era of technology with unconven-tional image forging techniques and tools. Since, we understand that digital image forgery is possible, it cannot be even presented as a piece of evidence anywhere. Dissecting this fact, we must dig unfathomable into the issue to help alleviate such derelictions. Co...
Article
Full-text available
In today’s world, technology has become an inevitable part of human life. In fact, during the Covid-19 pandemic, everything from the corporate world to educational institutes has shifted from offline to online. It leads to exponential increase in intrusions and attacks over the Internet based technologies. One of the lethal threat surfacing is the...
Article
Full-text available
Distributed denial of service (DDoS) is an immense threat for Internet based-applications and their resources. It immediately floods the victim system by transmitting a large number of network packets, and due to this, the victim system resources become unavailable for legitimate users. Therefore, this attack is claimed to be a dangerous attack for...
Article
Full-text available
A distributed denial of service (DDoS) attack is the most destructive threat for internet-based systems and their resources. It stops the execution of victims by transferring large numbers of network traces. Due to this, legitimate users experience a delay while accessing internet-based systems and their resources. Even a short delay in responses l...
Chapter
With the advancement of technology, there exists a wide variety of cybersecurity attacks like ID theft, cracking the captcha, data breaches. These attacks are affecting individuals as well as well-established organizations. To handle these attacks, a robust and intelligent system is required. Artificial intelligence (AI) is one of the most emerging...
Article
The recent emergence of technologies such as Network Functions Virtualization (NFV), Intent based Networking, Internet of Things (IoT), 5G, and Cloud Computing have led to the rapid growth of networks. The inflexibility and vendor-specific nature of traditional network devices are unable to fulfill the requirements of modern data centers. Software-...
Article
Full-text available
Content authentication of digital images has captured the attention of forensic experts and security researchers due to a multi-fold increase in the dissemination of multimedia data through the open and vulnerable Internet. Shrewd attackers successfully devise novel ways to challenge state-of-art forensic tools used for forgery detection in digital...
Chapter
Full-text available
In the present era, network intrusion detection system (NIDS) has become the backbone of network security. But providing complete security to online resources from network intrusions is still lacking. Various approaches have been framed to enable effective detection of network-based intrusions by NIDS. However, various problems like high false alar...
Chapter
Software-defined networking (SDN) separates the network intelligence from the forwarding hardware to make the network dynamic, flexible, and programmable. It makes the network management easier by managing the network from the logically centralized controller. However, with the immense advantages of SDN, it is also suffering from various security t...
Chapter
OpenStack is a cloud computing paradigm comprising of a number of open-source software tools called projects, which are responsible for some specific function and expose some application programming interface (API). The most widely used core projects are compute, storage, network, identity, and image that collaborate with other dozens of projects t...
Chapter
Software-defined networking (SDN) is the revolutionary technology that provides flexibility, vendor neutrality, and centralized management by separating the network operating system from the forwarding hardware.Kaur, Sukhveer However, SDN is susceptible to various security attacks due to its centralized and decoupled architecture.Kumar, Krishan Thi...
Article
In current problem, fundamental solution in an isotropic non-local couple stress micropolar thermoelastic solid with voids is investigated. We observed that there are five waves, viz. a set of three coupled longitudinal waves and a set of two coupled transverse waves propagating with different phase velocities. The impact of non-local and void para...
Article
Full-text available
There are many solutions to prevent the spread of the COVID-19 virus and one of the most effective solutions is wearing a face mask. Almost everyone is wearing face masks at all times in public places during the coronavirus pandemic. This encourages us to explore face mask detection technology to monitor people wearing masks in public places. Most...
Conference Paper
Full-text available
Internet has seen exponentially rise in Distributed Denial of service (DDoS) attacks over the years. It has led to huge monetary losses, business loss, damage to a business's reputation, degradation of network performance, and unavailability of services to the legitimate users. Typically, a DDoS attack is launchedby compromising the vulnerable mach...
Article
Full-text available
A Distributed Denial of Service (DDoS) attack is an austere menace to extensively used Internet-based services and applications. Despite the presence of enormous DDoS defense solutions, the in-time detection of DDoS attacks poses a stiff challenge to network security professionals. The problem turns further crucial when such attacks are amalgamated...
Article
Full-text available
An efficient feature detection algorithm and image classification is a very crucial task in computer vision system. There are various state-of-the-art feature detectors and descriptors available for an object recognition task. In this paper, the authors have compared the performance of Shi-Tomasi corner detector with SIFT and SURF feature descripto...
Article
With the growing popularity of biometrics technology in the pattern recognition field, especially identification of human has gained the attention of researchers from both academia and industry. One such type of biometric technique is Gait recognition, which is used to identify a human being based on their walking style. Generally, two types of app...
Article
Full-text available
The entire world relates to some network capabilities in some way or the other. The data transmission on the network is getting more straightforward and quicker. An intrusion detection system helps distinguish unauthorized activities or intrusions that may settle the confidentiality, integrity, or availability of a resource. Nowadays, almost all in...
Article
Software Defined Networking (SDN) is a promising technology that provides flexibility, programmability, and network automation by shifting the network intelligence to the logically centralized controller. In SDN architecture, the controller maintains the global view of network topology; therefore the network management is efficient as compared to t...
Article
A distributed denial of service (DDoS) attack is a significant threat to web‐based applications and hindering legitimate traffic (denies access to benign users) by overwhelming the victim system or its infrastructure (service, bandwidth, networking devices, etc.) with a large volume of attack traffic. It leads to a delay in responses or sometimes a...
Article
The work is concerned with the wave propagation at the interface of isolated exponentially graded couple stress thermoelastic media under initial stress and gravity. We analyse the influence of initial stress and gravity on reflection and refraction coefficients for both upper and lower couple stress thermoelastic half-spaces. Further, we found the...
Article
Full-text available
In the present computer era, the vulnerabilities inherent in the Internet architecture enable various kinds of attacks. Distributed Denial of Service (DDoS) is one of such prominent attack that is a lethal threat to Internet domain that harnesses its computing and communication resources. The increase in network traffic rates of legitimate traffic...
Article
Network Function Virtualization (NFV) has emerged as an innovative network architecture paradigm that uses IT virtualization technology to abstract the network node functions from hardware. The virtualized network services hosted on Virtual Machines (VMs) are called Virtual Network Functions (VNFs). The sequence of multiple VNFs required by network...
Conference Paper
This work is concerned with the propagation of plane wave in an infinite isotropic nonlocal couple stress thermoelastic solid. Two problems have been evaluated by making incidence of (i) a longitudinal displacement wave and (ii) a set of coupled transverse waves. All these waves are dispersive in nature. Reflection phenomenon of an incident coupled...
Article
Full-text available
The spread of COVID-19 around the entire world has placed humankind in an unprecedented situation. Because of the rise of the number of cases and its subsequent load on the organizations and wellbeing experts, some immediate strategies are required to envision the number of cases in the future. In this article, the authors have presented two data-d...
Article
Network technology has experienced explosive growth in the past decades. The generally accepted viewpoint in the security world is that no system or network is totally protected which makes network security an important concern. The work done in this paper focuses on Distributed Denial of Service Attacks (DDoS) where legitimate users are prevented...
Chapter
Distributed Denial of Service (DDoS) attack is one of the most powerful and immense threats to internet-based services. It hinders the victim services within a short duration of time by overwhelming with the huge amount of attack traffic. A sophisticated attacker closely follows the current research of DDoS defense, perform a sophisticated attack b...
Chapter
Full-text available
In providing defense to computer networks the network intrusion detection system (NIDS) plays a very essential role. To cope up with the demands of contemporary networks various concerns like performance evaluation and others related to the networks should be taken under consideration. Proposed work presents a pragmatic analysis of machine learning...
Article
Full-text available
In this paper, prominent keypoint based features are compared in order to analyze their reliability and efficiency against forgery detection. Four features specifically SURF, KAZE, Harris corner points and BRISK features are used individually on a set of images. The method includes four phases: Image pre-processing, keypoint detection, feature vect...
Article
Full-text available
During the past few years, the traffic volume of legitimate traffic and attack traffic has increased manifolds up to Terabytes per second (Tbps). Because of the processing of such a huge traffic volume, it has become implausible to detect high rate attacks in time using conventional DDoS defense architectures. At present, the majority of the DDoS d...
Conference Paper
Full-text available
Digital image forgery detection has turned out to be an influential area of research in the recent couple of years due to the growing number of instances involving modifications to an image. Copy-paste forgery is the most typical form of altering an image that can even be performed by an amateur with the help of software tools available on the web....
Chapter
Full-text available
Cloud computing has transformed the IT industry by providing convenient way of accessing resources, services and applications over the Internet. Cloud computing provides infrastructure, platform, software, and other hybrid models as pay-as-you go based services. Customers pay based on usage of particular utility. There are vulnerabilities in the cl...
Chapter
Full-text available
In today’s modern era, digital images have noteworthy significance because they have become a leading source of information dissemination. However, the images are being manipulated and tampered. The image manipulation is as old as images itself. The history of modifying images dates back to the 1860s’, though it has become very popular in recent ti...
Article
In the present computer era, though the Internet-based applications are the driving force of social evolution, yet its architectural vulnerabilities proffer plethoric leisure to the attackers for conquering diversity of attacks on its services. Distributed Denial of Service (DDoS) is one of such prominent attack that constitutes a lethal threat to...
Article
Internet was designed to serve the basic requirement of data transfer between systems. The security perspectives were therefore overlooked due to which the Internet remains vulnerable to a variety of attacks. Among all the possible attacks, Distributed Denial of Service (DDoS) attack is one of the eminent threats that target the availability of the...
Article
Full-text available
Distributed denial of service (DDoS) attacks poses a severe threat to extensively used web-based services and applications. Many detection approaches have been proposed in the literature but ensuring the security and availability of data, resources, and services to the end users remains an ongoing research challenge. Nowadays, the traffic volume of...
Article
Full-text available
Image manipulation has eroded our trust of digital images, with more subtle forgery methods posing an ever-increasing challenge to the integrity of images and their authenticity. Over recent years, a significant research contribution has been dedicated to devising new techniques for countering various image forgery attacks. In this article, a surve...
Article
Full-text available
Web services are one of the most prominent forms of web presence exercised by the businesses to connect to their possible client base. GET flood attacks, commonly known as Application Layer DDoS attacks, are widely executed exploits that challenge almost all the web servers hosting such services on the Internet. The state-of-art literature provides...
Article
Churn handling has become an active area of research due to increased complexity, high dynamicity of participating nodes and its effect on the performance of overlay network. In this paper, we systematically analyse churn, its causes and implications along with churn handling strategies employed in various state of the art structured overlay networ...
Article
Full-text available
Millions of people across the globe access Internet-based applications and web services in their day to day activities. Distributed Denial of Service (DDoS) attack is one of the prominent attacks that cripple down the computing and communication resources of a web server hosting these services and applications. The situation turns further crucial w...
Conference Paper
Full-text available
Images are the basic media of various information delivering units like our social media, news channel etc. However images are losing credibility because of the improvement in image altering software, so it is very easy for a forger to forge an image. It creates confusion for the receiver to believe on the image. So there is a need for the developm...
Article
A Distributed Denial of Service (DDoS) attack is an austere menace to network security. Nowadays in a technological era, DDoS attacks pose a severe threat to widely used Internet-based services and applications. Disruption of these services even for a fraction of time lead to huge financial losses. A Flash event (FE) is similar to a DDoS attack whe...
Article
Full-text available
The wireless networks have a very bright future in networks and communications because of which they have taken a high interest of the researchers. As the users increased the purpose to use MANETs, they also became more diverse and wide due to which better performance is needed in MANETs. QoS is needed for applications for an efficient communicatio...
Article
A Mobile Ad-hoc Network (MANET) is an infrastructure less and decentralized network which needs a robust routing protocol. With the development of the MANET applications, more importance is given to Quality of Service (QoS) routing strategy. However congestion and mobility of the nodes lead to frequent link failures and packet losses affecting the...
Article
A Distributed Denial of Service (DDoS) attack is an austere menace to extensively used Internet-based services. The in-time detection of DDoS attacks poses a tough challenge to network security. Revealing a low-rate DDoS (LR-DDoS) attack is comparatively more difficult in modern high speed networks, since it can easily conceal itself due to its sim...
Article
Full-text available
Distributed Denial of Service (DDoS) attack imposes a severe threat to the extensively used Internet based services like e-commerce, e-banking, transportation, medicine, education etc. Hackers compromises the vulnerable systems for launching DDoS attacks in order to degrade or sometimes completely disrupt such services. In recent years, DDoS attack...
Article
Full-text available
Distributed Denial of Service (DDoS) attack imposes a severe threat to the extensively used Internet based services like e-commerce, e-banking, transportation, medicine, education etc. Hackers compromises the vulnerable systems for launching DDoS attacks in order to degrade or sometimes completely disrupt such services. In recent years, DDoS attack...
Article
Distributed Denial of Service (DDoS) is an austere menace to network security. The in-time detection of DDoS attacks poses a stiff challenge to network security professionals. In this paper, the authors initiatively propose using a novel set of information theory metrics called -Entropy and - Divergence metrics for detecting DDoS attacks and flash...
Article
Full-text available
Millions of people across the globe access Internet-based applications and web services in their day to day activities. Distributed Denial of Service (DDoS) attack is one of the prominent attacks that cripple down the computing and communication resources of a web server hosting these services and applications. The situation turns further crucial w...
Article
Our dependence on the internet for simple and time critical applications make availability of services a top security concern. There are many attacks to threaten the availability of service, but Distributed Denial of Service (DDoS) attack constitute one of the major and the most growing threat to severely degrade the system performance. DDoS defens...
Data
Full-text available
Distributed Denial of Service (DDoS) attack is a severe threat to the timely delivery of extensively used web-based services. Hackers often compromise the vulnerable systems freely available on the Internet for launching DDoS attacks to degrade or sometimes completely disrupt such web-based services causing inconvenience to the end users and massiv...