Inadyuti Dutt

Verified @bppimt.ac.in

Assistant Professor and Dept. of Computer Applications
B. P. Poddar Institute of MAnagement & Technology

RESEARCH INTERESTS

Network Security, Cyber Security, AI, ML

6

Scopus Publications

188

Scholar Citations

6

Scholar h-index

4

Scholar i10-index

Scopus Publications

  • Multiple Immune-based Approaches for Network Traffic Analysis
    Inadyuti Dutt, Samarjeet Borah and I. Maitra



  • Immune System Based Intrusion Detection System (IS-IDS): A Proposed
    Inadyuti Dutt, Samarjeet Borah and I. Maitra


    This paper explores the immunological model and implements it in the domain of intrusion detection on computer networks. The main objective of the paper is to monitor, log the network traffic and apply detection algorithms for detecting intrusions within the network. The proposed model mimics the natural Immune System (IS) by considering both of its layers, innate immune system and adaptive immune system respectively. The current work proposes Statistical Modeling based Anomaly Detection (SMAD) as the first layer of Intrusion Detection System (IDS). It works as the Innate Immune System (IIS) interface and captures the initial traffic of a network to find out the first-hand vulnerability. The second layer, Adaptive Immune-based Anomaly Detection (AIAD) has been considered for determining the features of the suspicious network packets for detection of anomaly. It imitates the adaptive immune system by taking into consideration the activation of the T-cells and the B-cells. It captures relevant features from header and payload portions for effective detection of intrusion. Experiments have been conducted on both the real-time network traffic and the standard datasets KDD99 and UNSW-NB15 for intrusion detection. The SMAD model yields as high as 96.04% true positive rate and around 97% true positive rate using real-time traffic and standard data sets. Highly suspicious traffic detected in the SMAD model is further tested for vulnerability in the AIAD model. Results show significant true positive rate, closer to almost 99% of accurately detecting the file-based and user-based anomalies for both the real-time traffic and standard data sets.

  • A Proposed Machine Learning based Scheme for Intrusion Detection
    Inadyuti Dutt, Samarjeet Borah and I. Maitra


    Voluminous data with high velocity and variety have resulted in deceiving the security of internet and intranet facilities. The threats are either having some patterns or lack any definite patterns. Therefore, the data arriving at the network have number of features and wide variety of patterns. Firstly, the number of patterns needs to be reduced and then the filtered set of patterns could be used for detecting unknown threats. This paper presents an approach for developing an Intrusion Detection System (IDS) with the help of Principal Component Analysis (PCA) and machine learning algorithms in WEKA environment. The approach yields better performance by making the detection more effective. The results show highertrue positive and lower false positive ratesin comparison to the existing methods.

  • Real-Time Hybrid Intrusion Detection System Using Machine Learning Techniques
    Inadyuti Dutt, Samarjeet Borah, I. Maitra, Kuharan Bhowmik, Ayindrilla Maity and Suvosmita Das




  • Design and implementation of intrusion detection system using data mining techniques and artificial neural networks


RECENT SCHOLAR PUBLICATIONS

  • Pre-Processing of KDD’99 & UNSW-NB Network Intrusion Datasets
    IKM Inadyuti Dutt, Samarjeet Borah
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (11 2021

  • Immune system based intrusion detection system (IS-IDS): A proposed model
    I Dutt, S Borah, IK Maitra
    IEEE Access 8, 34929-34941 2020

  • Survey of bio-inspired techniques based on system resource usage in intrusion detection
    I Dutt, S Borah, IK Moitra
    Test Eng. Manage 82, 5734-5738 2020

  • Multiple immune-based approaches for network traffic analysis
    I Dutt, S Borah, IK Maitra
    Procedia Computer Science 167, 2111-2123 2020

  • A Proposed Machine Learning Based Scheme for Intrusion Detection
    IKM Inadyuti Dutt, Samarjeet Borah
    International conference on Electronics, Communication and Aerospace 2018

  • A proposed machine learning based scheme for intrusion detection
    I Dutt, S Borah, I Maitra
    2018 Second International Conference on Electronics, Communication and 2018

  • Real-time hybrid intrusion detection system using machine learning techniques
    I Dutt, S Borah, IK Maitra, K Bhowmik, A Maity, S Das
    Advances in Communication, Devices and Networking: Proceedings of ICCDN 2017 2018

  • Design and Implementation of Intrusion Detection System using Data Mining Techniques and Artificial Neural Networks
    I Dutt, S Borah
    Computation and Communication Technologies, 280 2016

  • Intrusion detection system using artificial immune system
    I Dutt, S Borah, I Maitra
    International Journal of Computer Applications 144 (12) 2016

  • Some Studies in Intrusion Detection using Data Mining Techniques
    DSB Inadyuti Dutt
    International Journal of Innovative Research in Science, Engineering and 2015

  • Issues in Delay Tolerant Networks: A Comparative Study
    I Dutt
    International Journal of Advanced Research in Computer Science and Software 2015

  • Implementation of network security using genetic algorithm
    I Dutt, S Paul, SN Chaudhuri
    Int J Adv Res Comput Sci Software Eng 3 (2), 234-241 2013

  • Design and Implementation of Recovery Management in All –Optical Networks
    SNC Inadyuti Dutt, Soumya Paul
    International Journal of Engineering Science and Advanced Technology 3 (2 2013

  • A Novel Approach for Network Security in WDM Optical Networks
    SNC Soumya Paul, Inadyuti Dutt
    International Journal of Engineering Science and Advanced Technology 3 (2 2013

  • Design and implementation of network security using genetic algorithm
    S Paul, I Dutt, SN Choudhri
    Int J Res Eng Technol 2 (2), 172-177 2013

  • Recovery Management in All Optical Networks Using Biologically-Inspired Complex Adaptive System
    I Dutt, S Paul, SN Chaudhuri
    IJECCE 4 (1), 309-314 2013

  • Security in All-Optical Network using Artificial Neural Network.
    I Dutt, S Paul, D Bandyopadyay
    International Journal of Advanced Research in Computer Science 3 (2) 2012

  • A novel approach for light trail minimization using genetic algorithm in optical networks
    S Paul, I Dutt
    International Journal of Advanced Research in Computer Science and 2012

  • A NOVEL APPROACH FOR WAVELENGTH ASSIGNMENT IN SINGLE FIBRE WDM OPTICAL NETWORKS
    I Dutt, S Paul


  • SECURITY IN AON USING ARTIFICIAL NEURAL NETWORK
    I Dutt, S Paul, R Das


MOST CITED SCHOLAR PUBLICATIONS

  • Immune system based intrusion detection system (IS-IDS): A proposed model
    I Dutt, S Borah, IK Maitra
    IEEE Access 8, 34929-34941 2020
    Citations: 77

  • Real-time hybrid intrusion detection system using machine learning techniques
    I Dutt, S Borah, IK Maitra, K Bhowmik, A Maity, S Das
    Advances in Communication, Devices and Networking: Proceedings of ICCDN 2017 2018
    Citations: 41

  • Intrusion detection system using artificial immune system
    I Dutt, S Borah, I Maitra
    International Journal of Computer Applications 144 (12) 2016
    Citations: 18

  • Some Studies in Intrusion Detection using Data Mining Techniques
    DSB Inadyuti Dutt
    International Journal of Innovative Research in Science, Engineering and 2015
    Citations: 14

  • Implementation of network security using genetic algorithm
    I Dutt, S Paul, SN Chaudhuri
    Int J Adv Res Comput Sci Software Eng 3 (2), 234-241 2013
    Citations: 7

  • A proposed machine learning based scheme for intrusion detection
    I Dutt, S Borah, I Maitra
    2018 Second International Conference on Electronics, Communication and 2018
    Citations: 6

  • Issues in Delay Tolerant Networks: A Comparative Study
    I Dutt
    International Journal of Advanced Research in Computer Science and Software 2015
    Citations: 6

  • Design and implementation of network security using genetic algorithm
    S Paul, I Dutt, SN Choudhri
    Int J Res Eng Technol 2 (2), 172-177 2013
    Citations: 4

  • Pre-Processing of KDD’99 & UNSW-NB Network Intrusion Datasets
    IKM Inadyuti Dutt, Samarjeet Borah
    Turkish Journal of Computer and Mathematics Education (TURCOMAT) 12 (11 2021
    Citations: 3

  • Survey of bio-inspired techniques based on system resource usage in intrusion detection
    I Dutt, S Borah, IK Moitra
    Test Eng. Manage 82, 5734-5738 2020
    Citations: 3

  • Multiple immune-based approaches for network traffic analysis
    I Dutt, S Borah, IK Maitra
    Procedia Computer Science 167, 2111-2123 2020
    Citations: 3

  • Security in All-Optical Network using Artificial Neural Network.
    I Dutt, S Paul, D Bandyopadyay
    International Journal of Advanced Research in Computer Science 3 (2) 2012
    Citations: 3

  • A novel approach for light trail minimization using genetic algorithm in optical networks
    S Paul, I Dutt
    International Journal of Advanced Research in Computer Science and 2012
    Citations: 2

  • Recovery Management in All Optical Networks Using Biologically-Inspired Complex Adaptive System
    I Dutt, S Paul, SN Chaudhuri
    IJECCE 4 (1), 309-314 2013
    Citations: 1