Udaya Tupakula

Dr

  • 555 Citations
  • 12 h-Index
20022019
If you made any changes in Pure these will be visible here soon.

Research Outputs 2002 2019

  • 555 Citations
  • 12 h-Index
  • 59 Conference proceeding contribution
  • 16 Article
  • 4 Chapter
  • 1 Conference paper
Filter
Article
2019

A policy based security architecture for software-defined networks

Varadharajan, V., Karmakar, K., Tupakula, U. & Hitchens, M., Apr 2019, In : IEEE Transactions on Information Forensics and Security. 14, 4, p. 897-912 16 p., 8453023.

Research output: Contribution to journalArticleResearchpeer-review

Switches
Controllers
Network security
Communication
Specifications
2018

Securing services in networked cloud infrastructures

Varadharajan, V. & Tupakula, U., 1 Oct 2018, In : IEEE Transactions on Cloud Computing. 6, 4, p. 1149-1163 15 p., 7473937.

Research output: Contribution to journalArticleResearchpeer-review

Restoration
Virtual machine
Servers
Communication
2017

Intrusion detection techniques in cloud environment: a survey

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 1 Jan 2017, In : Journal of Network and Computer Applications. 77, p. 18-47 30 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Taxonomies
Cloud computing
Computer hardware
Virtual machine

On the design and implementation of an integrated security architecture for cloud with improved resilience

Varadharajan, V. & Tupakula, U., 1 Jul 2017, In : IEEE Transactions on Cloud Computing. 5, 3, p. 375-389 15 p., 7420656.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Access control
Servers
Life cycle
Feedback

PSI-NetVisor: Program semantic aware intrusion detection at network and hypervisor layer in cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 2017, In : Journal of Intelligent and Fuzzy Systems. 32, 4, p. 2909-2921 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Virtual Machine
Intrusion detection
Intrusion Detection
Semantics
Attack

VAED: VMI-assisted evasion detection approach for infrastructure as a service cloud

Mishra, P., Pilli, E. S., Varadharajan, V. & Tupakula, U., 25 Jun 2017, In : Concurrency Computation. 29, 12, p. 1-21 21 p., e4133.

Research output: Contribution to journalArticleResearchpeer-review

Malware
Infrastructure
Virtualization
Computer monitors
Dependency Graph
2015

Securing wireless mobile nodes from distributed denial-of-service attacks

Varadharajan, V. & Tupakula, U., 1 Oct 2015, In : Concurrency Computation. 27, 15, p. 3794-3815 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Denial of Service
Mobile devices
Attack
Vertex of a graph
Mobile Devices

Trust Enhanced Security for Tenant Transactions in the Cloud Environment

Tupakula, U. & Varadharajan, V., Oct 2015, In : Computer Journal. 58, 10, p. 2388-2403 16 p.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Trusted computing
2014

Antivirus security: Naked during updates

Min, B., Varadharajan, V., Tupakula, U. & Hitchens, M., 2014, In : Software - Practice and Experience. 44, 10, p. 1201-1222 22 p.

Research output: Contribution to journalArticleResearchpeer-review

Computer systems
Malware

Counteracting security attacks in virtual machines in the cloud using property based attestation

Varadharajan, V. & Tupakula, U., 2014, In : Journal of Network and Computer Applications. 40, p. 31-45 15 p.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Virtual machine
Mobile phones
Hardware
Hardware security

Security as a service model for cloud environment

Varadharajan, V. & Tupakula, U., 2014, In : IEEE Transactions on Network and Service Management. 11, 1, p. 60-75 16 p., 6805344.

Research output: Contribution to journalArticleResearchpeer-review

Cloud computing
Internet
2012

Dynamic state-based security architecture for detecting security attacks in virtual machines

Tupakula, U. K. & Varadharajan, V., Apr 2012, In : Computer Journal. 55, 4, p. 397-409 13 p.

Research output: Contribution to journalArticleResearchpeer-review

Intrusion detection
Computer operating systems
Computer monitors
Virtual machine
Computer systems
2008

A hybrid model against TCP SYN and reflection DDoS attacks

Tupakula, U. K. & Varadharajan, V., May 2008, In : Computer Systems Science and Engineering. 23, 3, p. 153-166 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Denial of Service
Hybrid Model
Attack
Flooding
Traffic
2007

DDoS: design, implementation and analysis of automated model

Tupakula, U. K., Varadharajan, V., Gajam, A. K., Vuppala, S. K. & Rao, P. N. S., 2007, In : International Journal of Wireless and Mobile Computing. 2, 1, p. 72-85 14 p.

Research output: Contribution to journalArticleResearchpeer-review

Internet
Intrusion detection
Managers
2004

Tracing DDoS floods: An automated approach

Tupakula, U. K. & Varadharajan, V., Mar 2004, In : Journal of Network and Systems Management. 12, 1, p. 111-135 25 p.

Research output: Contribution to journalArticleResearchpeer-review

Routers
Internet
Controllers
Attack
Denial