Dr.prof .S Murugan.cv.Transcript,Ref
Dr.prof .S Murugan.cv.Transcript,Ref
[email protected]
Email ID :
[email protected]
Professor (Computer
Designation :
Science)
VISITING PROFESSOR -
YESBUD UNIVERSITY online
Higher Education
Professional Experience
• 20 + Years
Editorial Review/Board
• IJ-ETA_ETS: AES –ISSN:0974-3588,3596
• IJDCAS - ISSN 2455-0329
• American Journal of Engineering and applied Sciences Science Publications
• STM journal
INVITED LECTURE :
PROFESSIONAL BODIES:
▪ Computer Science
▪ Data Mining
▪ Internet Computing and Web services
▪ Software Engineering
▪ Wireless Networks
▪ Artificial Intelligence
• IGI Global-USA & Universal Association Of Computer & Electronics Engineers –AM1002417
Administrative Responsibilities (Department Level)
▪ Special Invitee for Computer Science & Applications Syllabus framing Madurai Kamaraj University,Madurai Board of studies .
▪ NBA-Coordinator -MCA-RVSCET-2yrs
▪ AICTE-Coordinator -MCA-RVSCET-2yrs
BOOKS
● Published the Courseware &Question Bank Through EASY , Shencottah,Tamilnadu ,India. &Magnus Publications
●Published Anna University Question Bank for MCA –Through Magnus Publications,Chennai,India
● Optimization Techniques for Engineering applications by RVSCET,Dindigul [10 th& 11th Mar `2k5].
●Image processing and its applications by RVS College of Engg& Tech ,Dindigul [22nd Nov to 05 th Dec’2k4].
●International Conference on Multimedia Processing & Systems by IIT Madras [13 th Aug '2k].
●Information Technology by Maditisia& ZDH Partnership programme [24 th to 25th July '2k].
●Internet & Java programming by P.S.G Tech [08 th to 13th June '98].
● Object oriented Technology in VivekanandaCollegeMadurai [08 th Oct’99].
WEBMINAR ATTENDED :
[1] Attended the AICTE Sponsored One Week Online Short Term Training Programme
On Cyber Physical Systems (CPS) Design Techniques and Applications organized by
the Department of Electronics and Communication Engineering, Kalasalingam Academy
of Research and Education, Krishnankoil, from 20th July 2020 to 25th July 2020 and
scored 80% in the assessment conducted during the STTP.
[3] Participated in the Webinar on “Grow your Career with Inbound Methodology in
2020” , on 20th June 2020.
[4] Participated in the “ International Webinar on Amazon Web Services With EC2, EB
and S3“ held on 29th June - 2020, Presented by Dr.V.Bala Dhandayuthapani, Professor in
Information Technology, Shinas College of Technology, Sultanate of Oman, Organized
by Department of Electronics and Communication Engineering .
[6] Participated in “Research Tools and Technology” (Online) held on 12th May
2021.Organized by Don Bosco College (Co-Ed), Yelagiri Hills, Tirupattur District &
Yelagiri Hills ACM Professional Chapter.India
[7] Prticipated in 3rd National Conclave on Cyber Defence SAJAG 2020 organised by
Shri Vaishnav Vidyapeeth Vishwavidyalaya, Indore on July 25, 2020
Success: The Changing Role of the Teachers" on 27th June 2020, jointly organized by
Yelagiri Hills ACM Chapter and School of Computing Science.
[9] Participated in International Webinar on “Global Higher Education System during
COVID-19” Conducted on 18th December’ 2020 (Friday), Organized by the KLH
Business School, Hyderabad.
[10] Completed the 5days STTP on m/c learning and data science held from 20th April to
24th April 2021 organized by Dept of cse&IT ,held at GHRIBM,Jalgon
[12] Participated in the session tracks of IEEE Virtual Talk Series-2020 focused on Soft
Computing held on June 6, 2020 organized by IEEE AcSIR-CSIO Student Branch,
Chandigarh
[14] Frequently attending Techgic / other web series and other updation from reputed
Institutions.
PROFESSIONAL EXPERIENCE
REFERENCE
Dr. E.R.Naganathan Professor and head, Dept of Computer Sciecne and
Engg, Hindustan university, padur,chennai - 603103. Tamilnadu,India
Tel: +91944311370 (mobile) Email: [email protected]
UOG-GONDER-ETHIOPIA
WKU ,Wolkite
QUALIFICATIONS
NIRF no:IR-Q-U-o435
Registration: 20/11/2009
Dt of Submission: 25/11/2015
MANONMANIUM SUNDARANAR
UNIVERSITY,TIRUNELVELI,TAMILNADU,INDIA
Dt of Registration: 05/2000
Dt of Submission : 01/01/2002
Mark:255/300
Percentage of Marks:68
Class: First
ALAGAPPAUNIVERSITY
(A State University Established in 1985)
KARAIKUDI - 630 003, Tamil Nadu, India
www.alagappauniversity.ac.in
2017 2018 2018 2020 2020
He has completed his M.C.A programme with first class Distinction in the year in the
year 1989-1992 He acquired his Ph.D in Computer Science in the year 2016. He has done his
research work under my supervision in the Department of Computer Science and Engineering
and his research title is “Preventing Unknown Malware Attack by using Intelligence
intrusion Multi detection systems”. He has more than 20 years of teaching experience worked
in various reputed educational institutions in India and overseas. During his teaching profession
he handled Computer Science related courses to Post Graduate Programmes M.Sc,(Computer
Science), M.C.A and Under Graduate Programmges B.Sc (Computer Science), B.C.A,
B.Sc(Information Technology).
He has published research papers in the reputed International and National Journals and
Conference Proceedings, and presented his research contributions in International and National
Conferences and Workshops. Besides, he has published more than 5 Computer Science subject
books.
(K.KUPPUSAMY)
Dr.E.R.Naganathan, MSc.,MTech.,PhD
Professor, Department of Computer
Science and Engineering
Vaddeswaram – 522302.
Guntur Dist., Andhra Pradesh
Dr.Murugan S is consistent in his career as a teacher and presented research papers in National and
International Journals/Proceedings. He is always interested to learn and update in emerging
technologies with great initiatives and positive attitudes.
(E.R.NAGANATHAN)
RESEARCH STATEMENT
My research interests focus in the design and analysis of Security algorithms. Here prior attention has
been on algorithmic methods and more specifically on new methods and model . In order to realize
security issues studying different networks under various platforms more generally approximation
algorithms. Networks and systems must be able to automatically configure themselves with respect to
their security policies. The security policy specification must be dynamic and adapt itself to the changing
environment. Those networks and systems should interoperate securely when their respective security
policies are heterogeneous and possibly conflicting. There must be able to autonomously evaluate the
impact of an intrusion in order to spontaneously select the appropriate and relevant response when a given
intrusion is detected.
The major goal of my research is to design algorithms and develop mechanisms for dealing with networks
behavior. I have focused on algorithms determining how such influence can be applied, as well as
studying dataset dynamics, understanding the properties of network. The emphasis of my work is usually
on algorithms and network properties with provable guarantees.
My research work entitled “Preventing Unknown Malware Attack by using Intelligent Intrusion
Multi Detection System” describes a new active defense system with Intelligence principles named
IIDPS (Intelligence Intrusion Detection Prevention System) for detecting and preventing unknown
malware. This system consists of different models to identify unknown malware using known malware’s
behavior and characteristics. Multi-Method Detection combines multiple detection mechanisms in a
single Module for comprehensive coverage. Multi-Method Detection maximizes the types of attacks
detected, ensuring critical threats do not go undetected.
Most of commercially available antivirus programs apply a detection system based on the pattern
matching or scanner method, this system extract certain objects from known viruses enters them into a
database in the form of hexadecimal strings and matches files against this database to determine whether
they are malware.Unknown malware are not detected whose pattern will not be contained in its database.
It’s difficult to create patterns that can uniquely characterize malware and prevent safe files from being
misidentified as malware. Signature matching methods are detected only known malware,i.e. poorly
adopted in detection of unknown types of malware.This is associated with the fact that they are based on
a comparison of the values of hash function from small sections of file.Thus by virtue of the
cryptographic properties of the hash functions a change in even one bit in the input completely
changes the output result.
.
Development of an Intelligence Intrusion detection prevention system is a significant undertaking due to
its intrinsic multidisciplinary nature. Ideas from fields such as human-computer interaction, artificial
intelligence and expert systems, and software engineering al1 play central roles. This work is concerned
with the development of an IIDPS hybrid with Neural Network for computer science curriculum level.
The intention has been to design the system such that it can be used for other knowledge domains with
only minor structural modifications.
This algorithm remedied the problem of basic standard algorithm. This indicates that the flaw in the
filtering method as only those signatures were filtered out that were found in the training data. A high
number of signatures were found in the clean programs in the test dataset. Assigning the final class
outcome based upon the majority vote for malware and clean signatures in a file decreased the false
positive rate significantly.
To test the performance of IIDPS, the data were collected from the normal usage of three different users.
The attacks used to test IIDPS were chosen to give a good sampling of high-rate attacks. The attacks
cover scenarios when the machine protected by IIDPS was a victim in the attack and when IIDPS
machine was the. Because IIDPS detects packets by comparing detectors with a bit string representation
of the packet headers, attacks were also chosen to cover changes to different parts of the bit string
representation. Since IIDPS can detect traffic coming both in and out of the protected machine, it can
defend against attacks, when the protected machine is the victim as well as the attacker. To test the
working of IIDPS to avoid different attacks, it is trained with the default parameter settings on each user’s
data, and then tested on the highest rate attack data for each attack. The comparative analysis of IIDPS
with CPC-CPS models and other Intrusion Detection Systems and Techniques reviewed in the literature
survey in predicting and classifying the Unknown malware in the network. The classifiers using
Classification Prediction Combined and Classification Prediction Separated models give better detection
accuracy than the classifiers using other system features. As the result it is concluded that the proposed
IIDPS produces good results in worm detection and produces perfect result in detecting the presence of
worm in the network even for unknown worms.
My Teaching Philosophy/ Statement
The goal of education should be encourage seeking answers, as it is in this way that we
advance. I am seeking to facilitate this advancement of knowledge, and the main theme
of my teaching philosophy is reasoned thought. I am particularly emphasize learning to
think about trends and directions, rather than memorization of facts.
In order to further encourage seeking answers to the questions around us, try to
encourage the questions themselves. The class is based on first asking the questions, and
then developing the principles to explain the concepts as needed.
Finally, my aim to encourage a sense of wonderment in the world around us. We must
continue to ask the "how?" and "why?" questions in order to advance. Only if answers to
these questions continue to come, will the questions continue to flow.
1.A positive atmosphere. Students are called upon to discuss questions, but mistakes are
treated as opportunities to explore misconceptions, not as a reflection of a student's
abilities.
2.A window on the world. Almost any event you can link to the business world, has
accounting implications.
4.Access to a caring individual., work with my office door open, and I am available to
help.
6.Empowerment. believe that anyone can do well in accounting if they are willing to
spend the time at it. Some pick it up quickly, some need to spend more time. If provide
any value added, it is in encouraging all my students to be interested enough in the
subject to invest more time. Then, I am trying to make sure they spend their time
productively.
7.Respect. Students work hard, earn their grades, and are entitled to their opinions. My
task is to facilitate their learning process.