WorldCat Identities

Uyyālavāḍa Narasiṃhā Reḍḍi -1848

Overview
Works: 10 works in 11 publications in 3 languages and 42 library holdings
Genres: Drama  Motion pictures 
Roles: Thesis advisor, Author
Classifications: PN1997.2,
Publication Timeline
.
Most widely held works by Uyyālavāḍa Narasiṃhā Reḍḍi
7/G reyin̲pō kālan̲i = 7/G rainbow colony( Visual )

1 edition published in 2004 in Tamil and held by 5 WorldCat member libraries worldwide

Tragic love story
7/G Brundavana colony : based on a true story( Visual )

1 edition published in 2004 in Telugu and held by 1 WorldCat member library worldwide

Tragic love story
Protecting Networked Systems from Malware Threats by Seung Won Shin( )

1 edition published in 2013 in English and held by 1 WorldCat member library worldwide

Currently, networks and networked systems are essential media for us to communicate with other people, access resources, and share information. Reading (or sending) emails, navigating web sites, and uploading pictures to social medias are common behaviors using networks. Besides these, networks and networked systems are used to store or access sensitive or private information. In addition, major economic activities, such as buying food and selling used cars, can also be operated with networks. Likewise, we live with networks and networked systems. As network usages are increasing and popular, people face the problems of network attacks. Attackers on the networks can steal people's private information, mislead people to pay money for fake products, and threaten people, who operate online commercial sites, by bothering their services. There are much more diverse types of network attacks that torture many people using networks, and the situation is still serious. The proposal in this dissertation starts from the following two research questions: (i) what kind of network attack is prevalent and how we can investigate it and (ii) how we can protect our networks and networked systems from these attacks. Therefore, this dissertation spans two main areas to provide answers for each question. First, we analyze the behaviors and characteristics of large-scale bot infected hosts, and it provides us new findings of network malware and new insights that are useful to detect (or defeat) recent network threats. To do this, we investigate the characteristics of victims infected by recent popular botnet - Conficker, MegaD, and Srizbi. In addition, we propose a method to detect these bots by correlating network and host features. Second, we suggest new frameworks to make our networks secure based on the new network technology of Software Defined Networking (SDN). Currently, SDN technology is considered as a future major network trend, and it can dynamically program networks as we want. Our suggested frameworks for SDN can be used to devise network security applications easily, and we also provide an approach to make SDN technology secure. The electronic version of this dissertation is accessible from http://hdl.handle.net/1969.1/151219
Scalable Techniques for Anomaly Detection by Sandeep Yadav( )

1 edition published in 2013 in English and held by 1 WorldCat member library worldwide

Computer networks are constantly being attacked by malicious entities for various reasons. Network based attacks include but are not limited to, Distributed Denial of Service (DDoS), DNS based attacks, Cross-site Scripting (XSS) etc. Such attacks have exploited either the network protocol or the end-host software vulnerabilities for perpetration. Current network traffic analysis techniques employed for detection and/or prevention of these anomalies suffer from significant delay or have only limited scalability because of their huge resource requirements. This dissertation proposes more scalable techniques for network anomaly detection. We propose using DNS analysis for detecting a wide variety of network anomalies. The use of DNS is motivated by the fact that DNS traffic comprises only 2-3% of total network traffic reducing the burden on anomaly detection resources. Our motivation additionally follows from the observation that almost any Internet activity (legitimate or otherwise) is marked by the use of DNS. We propose several techniques for DNS traffic analysis to distinguish anomalous DNS traffic patterns which in turn identify different categories of network attacks. First, we present MiND, a system to detect misdirected DNS packets arising due to poisoned name server records or due to local infections such as caused by worms like DNSChanger. MiND validates misdirected DNS packets using an externally collected database of authoritative name servers for second or third-level domains. We deploy this tool at the edge of a university campus network for evaluation. Secondly, we focus on domain-fluxing botnet detection by exploiting the high entropy inherent in the set of domains used for locating the Command and Control (C&C) server. We apply three metrics namely the Kullback-Leibler divergence, the Jaccard Index, and the Edit distance, to different groups of domain names present in Tier-1 ISP DNS traces obtained from South Asia and South America. Our evaluation successfully detects existing domain-fluxing botnets such as Conficker and also recognizes new botnets. We extend this approach by utilizing DNS failures to improve the latency of detection. Alternatively, we propose a system which uses temporal and entropy-based correlation between successful and failed DNS queries, for fluxing botnet detection. We also present an approach which computes the reputation of domains in a bipartite graph of hosts within a network, and the domains accessed by them. The inference technique utilizes belief propagation, an approximation algorithm for marginal probability estimation. The computation of reputation scores is seeded through a small fraction of domains found in black and white lists. An application of this technique, on an HTTP-proxy dataset from a large enterprise, shows a high detection rate with low false positive rates. The electronic version of this dissertation is accessible from http://hdl.handle.net/1969.1/148330
Video servers by Uyyālavāḍa Narasiṃhā Reḍḍi( )

1 edition published in 2000 in English and held by 1 WorldCat member library worldwide

Virtualization of Non-Volatile Ram by Ayush Ruia( )

1 edition published in 2015 in English and held by 1 WorldCat member library worldwide

Virtualization technology is powering today's cloud industry. Virtualization inserts a software layer, the hypervisor, below the Operating System, to manage multiple OS environments simultaneously. Offering numerous benefits such as fault isolation, load balancing, faster server provisioning, etc., virtualization occupies a dominant position, especially in IT infrastructure in data centers. Memory management is one of the core components of a hypervisor. Current implementations assume the underlying memory to be homogenous and volatile. However, with the emergence of NVRAM in the form of Storage Class Memory (SCM), this assumption remains no longer valid. New motherboard architectures will support several different memory classes each with distinct properties and characteristics. The hypervisor has to recognize, manage, and expose them separately to the different virtual machines. This study focuses on building a separate memory management module for Non-Volatile RAM in Xen hypervisor. We show that it can be efficiently implemented with a few code changes and minimal runtime performance overhead. The electronic version of this dissertation is accessible from http://hdl.handle.net/1969.1/154981
 
Audience Level
0
Audience Level
1
  Kids General Special  
Audience level: 0.72 (from 0.50 for 7/G reyin̲ ... to 0.99 for Video serv ...)

Alternative Names
Mujharee Narasimha Reddy -1848

Mujjaree Narasimha Reddy -1848

Narasimha Reddi -1848

Narasiṃhā Reḍḍi, Uyyālavāḍa, -1848

Narasimha Reddy -1848

Narasimha Reddy, Mujjaree -1848

Narasimha Reddy, Uyyalavada -1848

Narasimhareddi -1848

Nārasiṃhāreḍḍi, Uyyālavāḍa, -1848

Narsimha Reddy -1848

Nursimha Reddy -1848

Ooyalawada Narasimha Reddy -1848

Reddi, Narasimha -1848

Reḍḍi, Uyyālavāḍa Narasiṃhā, -1848

Reḍḍi, Uyyāvalāḍa Narasiṃha -1848

Reddy, Mujjaree Narasimha -1848

Reddy, Narasimha -1848

Reddy, Narsimha -1848

Reddy, Nursimha -1848

Reddy, Uyyalavada Narasimha -1848

Uyyālavāḍa Narasiṃhā Reḍḍi, d. 1848

Uyyalavada Narasimha Reddy -1848

Uyyālavāḍa Nārasiṃhāreḍḍi, -1848

Uyyalawada Narasimha Reddy

उय्यालवाड़ा नरसिंहा रेड्डी

ఉయ్యాలవాడ నరసింహారెడ్డి రాయలసీమలో బ్రిటిషు వారిని ఎదిరించిన పాళెగాడు

ഉയ്യലവദ നരസിംഹ റെഡ്ഡി

Languages
Telugu (6)

English (4)

Tamil (1)