Udaya Tupakula

Dr

  • 653 Citations
  • 14 h-Index
20022020

Research output per year

If you made any changes in Pure these will be visible here soon.

Research Outputs

  • 653 Citations
  • 14 h-Index
  • 60 Conference proceeding contribution
  • 16 Article
  • 4 Chapter
  • 1 Conference paper
Article

A hybrid model against TCP SYN and reflection DDoS attacks

Tupakula, U. K. & Varadharajan, V., May 2008, In : Computer Systems Science and Engineering. 23, 3, p. 153-166 14 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., Oct 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticle

11 Citations (Scopus)

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticle

18 Citations (Scopus)
18 Citations (Scopus)

DDoS: design, implementation and analysis of automated model

Tupakula, U. K., Varadharajan, V., Gajam, A. K., Vuppala, S. K. & Rao, P. N. S., 2007, In : International Journal of Wireless and Mobile Computing. 2, 1, p. 72-85 14 p.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Dynamic state-based security architecture for detecting security attacks in virtual machines

Tupakula, U. K. & Varadharajan, V., Apr 2012, In : Computer Journal. 55, 4, p. 397-409 13 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

Intrusion detection techniques in cloud environment: a survey

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 1 Jan 2017, In : Journal of Network and Computer Applications. 77, p. 18-47 30 p.

Research output: Contribution to journalArticle

71 Citations (Scopus)
4 Citations (Scopus)

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2017, In : Journal of Intelligent and Fuzzy Systems. 32, 4, p. 2909-2921 13 p.

Research output: Contribution to journalArticle

6 Citations (Scopus)

Securing services in networked cloud infrastructures

Varadharajan, V. & Tupakula, U., 1 Oct 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1149-1163 15 p., 7473937.

Research output: Contribution to journalArticle

4 Citations (Scopus)

Securing wireless mobile nodes from distributed denial-of-service attacks

Varadharajan, V. & Tupakula, U., 1 Oct 2015, In : Concurrency Computation. 27, 15, p. 3794-3815 22 p.

Research output: Contribution to journalArticle

2 Citations (Scopus)

Security as a service model for cloud environment

Varadharajan, V. & Tupakula, U., Mar 2014, In : IEEE Transactions on Network and Service Management. 11, 1, p. 60-75 16 p.

Research output: Contribution to journalArticle

99 Citations (Scopus)

Tracing DDoS floods: An automated approach

Tupakula, U. K. & Varadharajan, V., Mar 2004, In : Journal of Network and Systems Management. 12, 1, p. 111-135 25 p.

Research output: Contribution to journalArticle

8 Citations (Scopus)

Trust Enhanced Security for Tenant Transactions in the Cloud Environment

Tupakula, U. & Varadharajan, V., Oct 2015, In : Computer Journal. 58, 10, p. 2388-2403 16 p.

Research output: Contribution to journalArticle

5 Citations (Scopus)

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 25 Jun 2017, In : Concurrency Computation. 29, 12, p. 1-21 21 p., e4133.

Research output: Contribution to journalArticle

5 Citations (Scopus)
Chapter

Distributed denial of service attacks in networks

Tupakula, U. K. & Varadharajan, V., 2008, Handbook of research on information security and assurance. Gupta, J. N. D. & Sharma, S. K. (eds.). USA, London UK: IGI Global, p. 85-97 13 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Security in mobile AD HOC networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 1 Jan 2010, Selected topics in communication networks and distributed systems. Misra, S., Misra, S. C. & Woungang, I. (eds.). Singapore: World Scientific Publishing, p. 671-708 38 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

SMRTI: Secure mobile ad hoc network routing with trust intrigue

Balakrishnan, V., Varadharajan, V., Lucs, P. & Tupakula, U., 22 Feb 2010, Mobile Intelligence. Yang, L. T., Waluyo, A. B., Ma, J., Tan, L. & Srinivasan, B. (eds.). Hoboken, N.J: John Wiley & Sons, p. 412-436 25 p.

Research output: Chapter in Book/Report/Conference proceedingChapter

Trust Management in Mobile Ad Hoc Networks

Balakrishnan, V., Varadharajan, V. & Tupakula, U., 2009, Guide to wireless ad hoc networks. Misra, S., Woungang, I. & Misra, S. C. (eds.). London: Springer, Springer Nature, p. 473-502 30 p. (Computer Communications and Networks Series).

Research output: Chapter in Book/Report/Conference proceedingChapter

Conference paper

Security techniques for counteracting attacks in mobile healthcare services

Tupakula, U. & Varadharajan, V., 2013, In : Procedia Computer Science. 21, p. 374-381 8 p.

Research output: Contribution to journalConference paper

7 Citations (Scopus)
Conference proceeding contribution

A controller agent model to counteract DoS attacks in multiple domains

Tupakula, U. K. & Varadharajan, V., 2003, Integrated network management VIII: managing it all. Goldszmidt, G. & Schönwälder, J. (eds.). New York, NY: Springer, Springer Nature, Vol. 118. p. 113-116 4 p. (IFIP Advances in Information and Communication Technology; vol. 118).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
4 Citations (Scopus)
3 Downloads (Pure)

Analysis of Automated Model against DDoS Attacks

Tupakula, U. K. & Varadharajan, V., 2003, 2003 Australian Telecommunications Networks and Applications Conference ATNAC. Craze, S. (ed.). Perth, WA, Australia: Australian Telecommunications CRC (CDROM), p. 1-5 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Analysis of Traceback Techniques

Tupakula, U. K. & Varadharajan, V., 2006, ACSW Frontiers 2006 - Proc. of the Fourth Australasian Symposium on Grid Computing and e-Research, AusGrid 2006 and the Fourth Australasian Information Security Workshop (Network Security), AISW 2006. Buyya, R., Ma, T., Safavi-Naini, R., Steketee, C. & Susilo, W. (eds.). Sydney, Australia: Australian Computer Society, Vol. 54. p. 115-124 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

An approach to counteract distributed denial of service attacks

Tupakula, U. K., Varadharajan, V. & Hofman, M., 2002, Proceedings of the IASTED International Conference, Communications And Computer Networks. Hamza, M. H. (ed.). Anaheim, USA: ACTA Press, p. 158-163 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

An Eclat algorithm based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 7 Sep 2017, Proceedings - 16th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 11th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Conference on Embedded Software and Systems: Trustcom/BigDataSE/ICESS 2017. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1096-1102 7 p. 8029561

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

An enhanced model for network flow based botnet detection

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 38th Australasian Computer Science Conference, ACSC 2015. Parry, D. (ed.). Sydney: Australian Computer Society, Vol. 159. p. 101-110 10 p. (Conferences in Research and Practice in Information Technology; vol. 159).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

A Practical method to counteract denial of service attacks

Tupakula, U. K. & Varadharajan, V., 2003, Proceedings of the 26th Australasian computer science conference. Oudshoorn, M. J. (ed.). Sydney: Australian Computer Society, Vol. 16. 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

A trust model based energy detection for cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., 30 Jan 2017, Proceedings of the Australasian Computer Science Week Multiconference, ACSW 2017. New York: Association for Computing Machinery, p. 1-8 8 p. 68

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

1 Citation (Scopus)

Autoencoder-based feature learning for cyber security applications

Yousefiazar, M., Varadharajan, V., Hamey, L. & Tupakula, U., 30 Jun 2017, International Joint Conference on Neural Networks. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 3854-3861 8 p. 7966342

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

65 Citations (Scopus)

Botnet detection using software defined networking

Wijesinghe, U., Tupakula, U. & Varadharajan, V., 2015, 2015 22nd International Conference on Telecommunications, ICT 2015. New York, NY: Institute of Electrical and Electronics Engineers (IEEE), p. 219-224 6 p. 7124686

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)

Counteracting DDoS attacks in multiple ISP domains using routing arbiter architecture

Tupakula, U. K. & Varadharajan, V., Oct 2003, The 11th IEEE International Conference on Networks, 2003. ICON2003.. Landfeldt, B. & Moors, T. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 455-460 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

9 Citations (Scopus)

Counteracting DDoS attacks in WLAN

Tupakula, U., Varadharajan, V. & Vuppala, S. K., 2011, Proceedings of the 4th International Conference on Security of Information and Networks. New York: Association for Computing Machinery, p. 119-126 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Counteracting TCP SYN DDoS attacks using automated model

Tupakula, U. K., Varadharajan, V. & Gajam, A. K., 2004, GLOBECOM'04 - IEEE Global Telecommunications Conference. Oraintara, S. (ed.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 2240-2244 5 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

4 Citations (Scopus)

Detecting security attacks in trusted virtual domains

Tupakula, U. K. & Varadharajan, V., 2010, Proceedings - IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC 2010. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 529-535 7 p. 5703572

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
2 Citations (Scopus)
2 Downloads (Pure)

Distributed service control technique for detecting security attacks

Tupakula, U. & Varadharajan, V., 2012, Proceedings of the 2012 IEEE Network Operations and Management Symposium, NOMS 2012. De Turck, F., Gaspary, L. P. & Medhi, D. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 574-577 4 p. 6211959

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

DoSTRACK: A system for defending against DoS attacks

Tupakula, U. K., Varadharajan, V. & Pandalaneni, S. R., 2009, 24th Annual ACM Symposium on Applied Computing, SAC 2009. Shin, S. Y. & Ossowski, S. (eds.). New York: ACM, p. 47-53 7 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Efficient approaches for intrusion detection in cloud environment

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 10 Jan 2017, Proceeding - IEEE International Conference on Computing, Communication and Automation, ICCCA 2016. Astya, P. N., Swaroop, A., Sharma, V. & Singh, M. (eds.). Institute of Electrical and Electronics Engineers (IEEE), p. 1211-1216 6 p. 7813926

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

6 Citations (Scopus)

Fellowship: Defense against flooding and packet drop attacks in MANET

Balakrishnan, V., Varadharajan, V. & Tupakula, U. K., 2006, Proceedings of the 10th IEEE/IFIP network operations and management symposium (NOMS 2006). Festor, O. & State, R. (eds.). Bellingham, WA: Institute of Electrical and Electronics Engineers (IEEE), p. 1-4 4 p. 1687659

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
18 Citations (Scopus)

Framework for defending against denial of service attacks in wireless networks

Tupakula, U. K., Varadharajan, V., Gajam, A. K. & Vuppala, S. K., 2006, Proceedings of the 2nd international conference on wireless communication and sensor networks (WCSN 2006). Tiwari, M. D., Tiwary, U. S., Nandi, G. C. & Radhakrishna, M. (eds.). India: Macmillan India Ltd, p. 281-290 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Hypervisor-based security architecture for validating DNS services (Poster)

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2014, Information Security 2014 - Proceedings of the Twelfth Australasian Information Security Conference, AISC 2014. Parampalli, U. & Welch, I. (eds.). Sydney, Australia: Australian Computer Society, Vol. 149. p. 83-86 4 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

2 Citations (Scopus)

Hypervisor-based security architecture to protect web applications

Jayarathna, D., Tupakula, U. & Varadharajan, V., 2015, Proceedings of the 13th Australasian Information Security Conference, AISC 2015. Ian, W. & Yi, X. (eds.). Sydney: Australian Computer Society, Vol. 161. p. 15-24 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Improved detection of primary user emulation attacks in cognitive radio networks

Jin, F., Varadharajan, V. & Tupakula, U., Nov 2015, 25th International Telecommunication Networks and Applications Conference, ITNAC 2015. Piscataway, N.J.: Institute of Electrical and Electronics Engineers (IEEE), p. 274-279 6 p. 7366825

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

22 Citations (Scopus)

Integrated Security Architecture for Virtual Machines

Varadharajan, V. & Tupakula, U., 2013, Security and privacy in communication networks: 9th International ICST Conference, SecureComm 2013 Sydney, NSW Australia, September 2013 Revised Selected Papers. Zia, T., Zomaya, A., Varadharajan, V. & Mao, M. (eds.). Cham: Springer, Springer Nature, p. 140-153 14 p. (Lecture Notes of the Institute for Computer Sciences Social Informatics and Telecommunications Engineering; vol. 127).

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Integrated security for services hosted in virtual environments

Jayarathna, D., Varadharajan, V. & Tupakula, U., 2016, IEEE TrustCom/BigDataSE/ISPA 2016: Proceedings of the 15th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, 10th IEEE International Conference on Big Data Science and Engineering and 14th IEEE International Symposium on Parallel and Distributed Processing with Applications. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 82-89 8 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Intrusion detection techniques for infrastructure as a service cloud

Tupakula, U., Varadharajan, V. & Akku, N., 2011, Proceedings - IEEE 9th International Conference on Dependable, Autonomic and Secure Computing, DASC 2011. Chen, J., Dou, W., Liu, J., Yang, L. T. & Ma, J. (eds.). Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 744-751 8 p. 6118908

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

33 Citations (Scopus)

Intrusion detection techniques for virtual domains

Tupakula, U., Varadharajan, V. & Dutta, D., 2012, 2012 19th International Conference on High Performance Computing, HiPC 2012. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 1-9 9 p. 6507491

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

3 Citations (Scopus)

Mitigating attacks in Software Defined Network (SDN)

Karmakar, K. K., Varadharajan, V. & Tupakula, U., 5 Jun 2017, SDS 2017: Fourth International Conference on Software Defined Systems. Piscataway, NJ: Institute of Electrical and Electronics Engineers (IEEE), p. 112-117 6 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

15 Citations (Scopus)

Mitigating flooding attacks in mobile ad-hoc networks supporting anonymous communications

Balakrishnan, V., Varadharajan, V., Tupakula, U. & Moe, M. E. G., 2007, The 2nd International Conference on Wireless Broadband and Ultra Wideband Communications, AusWireless 2007. O'Conner, L. (ed.). Los Alamitos, CA: Institute of Electrical and Electronics Engineers (IEEE), p. 1-6 6 p. 4299678

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution

Open Access
File
14 Citations (Scopus)
27 Downloads (Pure)

Network DoS Attacks: A New Packet Marking Scheme and Architectural Design

Tupakula, U. K. & Varadharajan, V., 2003, Proceedings of 2nd Workshop on Security and Network Architecture SAR 2003. France: Loria, p. 1-10 10 p.

Research output: Chapter in Book/Report/Conference proceedingConference proceeding contribution