DEPARTMENTS
Amit Praseed
Amit Praseed

Assistant Professor

Office Address:

CSE 202-A, Department of Computer Science and Engineering

Contact no:

+91 (495) 2281301

Home Address:

  • Ph. D in Computer Science and Engineering from NITK Surathkal (Thesis Title: Modelling Behavioural Dynamics for Application Layer Distributed Denial of Service Attack Detection)

  • M.Tech (Computer Science and Engineering - Information Security) from NITK Surathkal

  • B.Tech (Computer Science and Engineering) from College of Engineering Trivandrum, Kerala University

  • Educational Qualifications

    • Ph. D in Computer Science and Engineering from NITK Surathkal (Thesis Title: Modelling Behavioural Dynamics for Application Layer Distributed Denial of Service Attack Detection)

    • M.Tech (Computer Science and Engineering - Information Security) from NITK Surathkal

    • B.Tech (Computer Science and Engineering) from College of Engineering Trivandrum, Kerala University

    Journals

    2024

    S. Lakshminarayana, A. Praseed and P. S. Thilagam, "Securing the IoT Application Layer from an MQTT Protocol Perspective: Challenges and Research Prospects," in IEEE Communications Surveys & Tutorials, doi: 10.1109/COMST.2024.3372630

    2023

    Praseed, A, Rodrigues J, Thilagam SP.  2023.  Hindi fake news detection using transformer ensembles. Engineering Applications of Artificial Intelligence. 119:105731.: Pergamon Abstract

    2022

    Praseed, A, Thilagam SP.  2022.  HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach. Journal of Information Security and Applications. 65:103090.: Elsevier Abstract

    2021

    Praseed, A, Thilagam SP.  2021.  Fuzzy Request Set Modelling for Detecting Multiplexed Asymmetric DDoS Attacks on HTTP/2 servers. Expert Systems with Applications. 186:115697.: Pergamon Abstract

    2020

    Praseed, A, Thilagam SP.  2020.  Modelling behavioural dynamics for asymmetric application layer DDoS detection. IEEE Transactions on Information Forensics and Security. 16:617-626.: IEEE Abstract

    2019

    Praseed, A, Thilagam SP.  2019.  Multiplexed asymmetric attacks: Next-generation DDoS on HTTP/2 servers. IEEE Transactions on Information Forensics and Security. 15:1790-1800.: IEEE Abstract

    2018

    Deepa, G, Thilagam SP, Khan FA, Praseed A, Pais AR, Palsetia N.  2018.  Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications. International Journal of Information Security. 17:105–120., Number 1: Springer Berlin Heidelberg Abstract

    Praseed, A, Thilagam SP.  2018.  DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications. IEEE Communications Surveys & Tutorials. 21:661–685., Number 1: IEEE Abstract

    Deepa, G, Thilagam SP, Praseed A, Pais AR.  2018.  DetLogic: A black-box approach for detecting logic vulnerabilities in web applications. Journal of Network and Computer Applications. 109:89-109.: Elsevier Abstract

    Conferences

    2015

    Praseed, A, Sudheesh RK, Chandrasekaran K.  2015.  Efficient privacy preserving ranked search over encrypted data. 2015 IEEE Recent Advances in Intelligent Computational Systems (RAICS). :128-133.: IEEE Abstract

    Professional Experience

    • Assistant Professor in Computer Science and Engineering at NIT Calicut (12 December 2022 - )

    • Assistant Professor in Computer Science and Engineering at IIIT Sri City (1 December 2020 - 10 December 2022)

    • Adhoc Faculty in Computer Science and Engineering Department at NIT Calicut (2 September 2020 - 18 November 2020)

    PhD Admissions (Monsoon 2024) at NITC

    Applications are invited for the admissions to the PhD programme at CSED, NITC for the Monsoon 2024 Session.

    Eligibilty and Other Details can be found HERE.

    Selection Procedure at CSED: Written Test followed by Interviews

    Last Date to Apply Online: 17 April 2024

    Link to Apply: https://dss.nitc.ac.in/mtechapp/phd/frmLogin.aspx

    Fake News Detection

    Fake news is one of the biggest threats in the modern world. With the advent of social media, it has become effortless to create and dissemiate information. However, verifying the authenticity of this information is a daunting task, requiring extensive applications of techniques from knowledge modeling and artificial intelligence. Recently, stance based fake news detection using transformer based language models have gained attention. However, the performance of these techniques on existing datasets remains comparatively low. The use of ensemble techniques, knowledge modeling, and explainable AI can improve the existing techniques considerably.

    Link to my paper on the use of transformer ensembles for detecting Hindi fake news can be found here.

    Authorship Attribution

    Experienced readers can quickly deduce the author of a prose - nightmarish scenarios are inherently Kafka-esque, while long, complex sentences where delve into a character's consciousness is considered classic Dostoevsky prose. Writing style is often considered to be unique enough to pinpoint the author. Authorship attribution, at its very core aims to do just that - given a particular piece of text and a set of candidate authors, we aim to predict the author of the given piece of text. Although traditionally dominated by syntactic features such as n-grams, the rise of Large Language Models (LLMs) have made this area of research relativley active and interesting. The same line of reasoning can be applied to identification of authors for source codes, which finds considerable applications in the field of digital forensics, plagiarism detection etc. 

    Parallel to this line of thinking, it is also possible to rephrase this problem into identifying whether a given piece of text (or code) was generated by a machine or not. This line of reseach has important implications for the field of academic integrity, plagiarism detection, fake news detection and so on. 

    Modelling User Behaviour for Detection of Cyber Attacks

    Security of web applications and services is of crucial importance in the modern era when much of our transactions is being done online. However, this is by no means easy - given the multitide of attacks that plague us, such as SQL injection, XSS, CSRF, parameter tampering, session violation etc. In addition, there are protocol vulnerabilities, stemming from either weak protocol specifications or vulnerabilities in the implementations. The difficulty in identifying these attacks is due to the fact that a simple rule-based system cannot be used to define these attacks, and often the description of these attacks will simply be "something that normal users wouldn't do". Thus it is necessary to encapsulate what constitutes as legitimate user behaviour, and using this model to identify deviant access to a system. This can be done using simple automata based modelling, scoring mechanisms, or through sophisticated ML/DL models.

    My previous works related to modelling injection and logic vulnerabilities can be found below:

    DetLogic: A black-box approach for detecting logic vulnerabilities in web applications

    Black-box detection of XQuery injection and parameter tampering vulnerabilities in web applications

    My papers on DDoS attack detection through behavioural modelling can be found here:

    DDoS attacks at the application layer: Challenges and research perspectives for safeguarding web applications

    Modelling behavioural dynamics for asymmetric application layer DDoS detection

    Multiplexed asymmetric attacks: Next-generation DDoS on HTTP/2 servers

     

    HTTP request pattern based signatures for early application layer DDoS detection: A firewall agnostic approach

    Fuzzy request set modelling for detecting multiplexed asymmetric ddos attacks on http/2 servers

     

    Full Time

    1. Shilpa Sarat (ongoing)
    2. Nasmath C (ongoing)

    Talks Delivered

    Sl. No. Talk Title Event/Programme Institute Date
    1

    Distributed Denial of Service Attacks in the age of AI/ML

    5 Day Workshop on Machine Learning and Deep Learning Techniques for Cyber Security

    N.M.A.M. Institute of Technology, Udupi 12 January 2024
    2 Introduction to Machine Learning Visiting Faculty Programme, Govt. of Kerala Government College of Engineering, Kannur 25 March 2024