Sunteți pe pagina 1din 3

Name: M.

Sathish Kumar
Mail id: sathish540@gmail.com
Mobile: +919885747427

RESUME

CAREER OBJECTIVE:

Seeking a position to utilize my skills and abilities in the Information Technology Industry that offers
professional growth while being resourceful, innovative and flexible.

EDUCATIONAL QUALIFICATIONS:

 M.TECH (Computer Science Engineering ) (2008-2010) from Qis College of engineering and
technology, affiliated to Jawaharlal Nehru Technological University Kakinada with 69 %
aggregate.

 B.Tech (Computer Science Engineering) (2004-2008) from Alfa college of engineering &
technology, affiliated to Jawaharlal Nehru Technological University Hyderabad with 58%
aggregate.

 Intermediate from Board of Intermediate Education (2002-2004), Sri Prathibha junior college,
Ongole (dist) with 63.8% aggregate.

 S.S.C from Board of Secondary Education (2001-2002), Sri Padmavathi high school, Atmakur
with 71.66 % aggregate.

SKILLSET:

Operating Systems : WINDOWS


Programming Languages : C,C#.NET
RDBMS : SQLSERVER2005
Web Technologies : HTML, ASP.NET.
Reporting Tools : CRYSTAL REPORTS
Frame Work : .NET FRAMEWORK
Tools : VS.NET.
Web servers : IIS
Project: Monitoring the Application-Layer DDoS Attacks for Popular Websites.

Hardware Requirements:
Core2Duo compatible processor with 2GB RAM and Minimum HDD capacity

Software Requirements:
OS: Any OS with JRE
Language: JAVA SE and JAVA EE
Server: Tomacat.JBOSS
Markup Language: HTML, XML
Protocol: HTTP, TCP/IP
IDE: Net beans
Build Tool: ANT

Description:

Distributed denial of service (DDOS) attack is a continuous critical threat to the internet. Derived from
the low layers, new application-layer-based ddos attacks utilizing legitimate http requests to overwhelm
victim resources are more undetectable. The case may be more serious when such attacks mimic or occur
during the flash crowd event of a popular website. An access matrix is defined to capture the
spatial-temporal patterns of a normal flash crowd. principal component analysis
and independent component
analysis are applied to abstract the multidimensional access matrix. A novel
anomaly detector based on hidden semi-markovmodel is proposed to describe the
dynamics of access matrix and to detect the attacks. The entropy of document
popularity fitting to the model is used to detect the potential application-layer
DDoS attacks. Numerical results based on real Web traffic data are presented to
demonstrate the effectiveness of the proposed method.

purpose:

As per the approach proposed in the transaction paper considered, need to develop a monitoring system
to detect DDos attacks that are generated under the concept of flash crowd. This can be extended even to
the level of attack prevention.

PERSONAL PROFILE:

 Name : M.Sathish Kumar


 Father’s Name : M.V.Narayana
 Date of Birth : 24/07/1987
 Permanent Address : H.No: 21-112,
Lingayathi Street, Atmakur(Post),
Kurnool (Dist)
Andhra Pradesh – 518422.

DECLARATION

I consider myself familiar with all these aspects. I am also confident of my ability to work in a team.
I hereby declare that the information furnished above is true to the best of my knowledge.
(M. Sathish Kumar)

S-ar putea să vă placă și