Back close

Dr. Prabaharan Poornachandran

Director, Centre for Internet Studies and Artificial Intelligence-CISAI | Associate Professor

@amrita.edu

Bio

Dr. Prabaharan Poornachandran (Praba) is the Director at Centre for Internet Studies and Artificial Intelligence-CISAI, School of Engineering, Amrita Vishwa Vidyapeetham, Kollam, Kerala.
Prabaharan and his R&D Team has created several bigdata Analytics platforms that provides deep insights and cutting edge digital tools and technologies. His areas of interest are web-scale systems, Internet Research, AI, ML, Graph theory, Pervasive computing, IoT, Digital Forensics, Critical Infrastructure. He is passionate about using the technological advances to solve societal problems. During the span more than two decades, he has worked with several reputed organizations both in India and abroad such as the World Bank and VeriSign Inc among others He is also a CISSP and CISA certified among other certifications. He has co-authored several research papers, book chapters and publications.

Publications

Journal Article

Year : 2019

Robust Intelligent Malware Detection Using Deep Learning

Cite this Research Publication : R. Vinayakumar, Alazab, M., Dr. Soman K. P., Poornachandran, P., and Venkatraman, S., “Robust Intelligent Malware Detection Using Deep Learning”, IEEE Access, vol. 7, pp. 46717-46738, 2019.

Publisher : IEEE Access

Year : 2017

B-secure: A dynamic reputation system for identifying anomalous BGP paths

Cite this Research Publication : A. U. Prem Sankar, Poornachandran, P., Ashok, A., Manu, R. K., and Hrudya, P., “B-secure: A dynamic reputation system for identifying anomalous BGP paths”, Advances in Intelligent Systems and Computing, vol. 515, pp. 767-775, 2017.

Publisher : Advances in Intelligent Systems and Computing

Year : 2017

Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network

Cite this Research Publication : A. Ashok, Poornachandran, P., Pal, S., Sankar, P., and Surendran, K., “Why so abnormal? Detecting domains receiving anomalous surge traffic in a monitored network”, Journal of Intelligent and Fuzzy Systems, vol. 32, pp. 2901-2907, 2017.

Publisher : Journal of Intelligent and Fuzzy Systems, IOS Press,

Year : 2017

Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)

Cite this Research Publication : Dr. Soman K. P., Vinayakumar, R., and Poornachandran, P., “Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)”, International Journal of Information System Modeling and Design (IJISMD) , vol. 8, no. 3, 2017.

Publisher : International Journal of Information System Modeling and Design (IJISMD)

Year : 2016

Effectiveness of Email Address Obfuscation on Internet Innovations in Computer Science and Engineering

Cite this Research Publication : Prabaharan Poornachandran, Raj, D., and Pal, S., “Effectiveness of Email Address Obfuscation on Internet”, Innovations in Computer Science and Engineering: Proceedings of the Third ICICSE, 2015. Springer Singapore, Singapore, pp. 181–191, 2016.

Publisher : Springer Singapore

Year : 2016

A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping

Cite this Research Publication : P. Poornachandran, B. Premjith, and Dr. Soman K. P., “A distributed approach for predicting malicious activities in a network from a streaming data with support vector machine and explicit random feature mapping”, IIOAB Journal, vol. 7, pp. 24-29, 2016.

Publisher : IIOAB Journal.

Year : 2016

MalJs: Lexical, structural and behavioral analysis of malicious javascripts using ensemble classifier

Cite this Research Publication : K. Surendran, Poornachandran, P., Nair, A. A., Srinath, N., Kumar, Y., and Hrudya, P., “MalJs: Lexical, structural and behavioral analysis of malicious javascripts using ensemble classifier”, Communications in Computer and Information Science, vol. 625, pp. 439-449, 2016.

Publisher : Communications in Computer and Information Science.

Year : 2015

Human vs. Machine: Analyzing the Robustness of Advertisement Based Captchas Advances in Signal Processing and Intelligent Recognition Systems

Cite this Research Publication : P. Poornachandran, Hrudya, P., and Reghunadh, J., “Human vs. machine: Analyzing the robustness of advertisement based CAPTCHAs”, Advances in Intelligent Systems and Computing, vol. 264, pp. 477-489, 2014.

Publisher : Springer Cham

Year : 2014

Demalvertising: A Probabilistic Approach for Detecting Malwares in Advertising Networks

Publisher : International Conference on Advances in Computing, Communications and Informatics

Year : 2012

Effective implementation of des algorithm for voice scrambling

Cite this Research Publication : J. Ea John, Ajai, A. SaRemya, and Poornachandran, Pb, “Effective implementation of des algorithm for voice scrambling”, Communications in Computer and Information Science, vol. 335 CCIS, pp. 75-84, 2012.

Publisher : Communications in Computer and Information Science

Conference Paper

Year : 2019

Amrita_CEN@FACT: Factuality Identification in Spanish Text

Cite this Research Publication : B. Premjith, Dr. Soman K. P., and Prabaharan Poornachandran, “Amrita_CEN@FACT: Factuality Identification in Spanish Text”, in IberLEF@SEPLN, 2019.

Publisher : IberLEF@ SEPLN

Year : 2019

Deep Learning Framework for Domain Generation Algorithms Prediction Using Long Short-term Memory

Cite this Research Publication : S. Akarsh, Sriram, S., Poornachandran, P., Menon, V. K., and Dr. Soman K. P., “Deep Learning Framework for Domain Generation Algorithms Prediction Using Long Short-term Memory”, in 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019, 2019, pp. 666-671.

Publisher : Institute of Electrical and Electronics Engineers Inc.,

Year : 2019

Deep Learning Framework and Visualization for Malware Classification

Cite this Research Publication : S. Akarsh, Simran, K., Poornachandran, P., Menon, V. K., and Dr. Soman K. P., “Deep Learning Framework and Visualization for Malware Classification”, in 2019 5th International Conference on Advanced Computing and Communication Systems, ICACCS 2019, 2019, pp. 1059-1063.

Publisher : Institute of Electrical and Electronics Engineers Inc

Year : 2018

A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features

Cite this Research Publication : B. Premjith, Dr. Soman K. P., and Prabaharan Poornachandran, “A deep learning based Part-of-Speech (POS) tagger for Sanskrit language by embedding character level features”, in FIRE'18, 2018.

Publisher : FIRE'18 .

Year : 2018

SPOOF Net: Syntactic Patterns for Identification of Ominous Online Factors

Cite this Research Publication : V. S. Mohan, Vinayakumar, R., Dr. Soman K. P., and Poornachandran, P., “SPOOF Net: Syntactic Patterns for Identification of Ominous Online Factors”, in 2018 IEEE Security and Privacy Workshops (SPW), 2018.

Publisher : 2018 IEEE Security and Privacy Workshops (SPW)

Year : 2017

Spoofing technique to counterfeit the GPS receiver on a drone

Cite this Research Publication : N. Shijith, Poornachandran, P., Sujadevi, V. G., and Meher Madhu Dharmana, “Spoofing technique to counterfeit the GPS receiver on a drone”, in 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, India, 2017.

Publisher : 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Year : 2017

Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks

Cite this Research Publication : Prof. Prabaharan Poornachandran ,Vinayakumar R ,; Soman KP ."Secure shell (ssh) traffic analysis with flow based features using shallow and deep networks" 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) 2026-2032 2017 IEEE .

Publisher : 2017 International Conference on Advances in Computing Communications and Informatics (ICACCI) .

Year : 2017

Deep encrypted text categorisation

Publisher : IEEE

Year : 2017

Suppressing Parkinson’s diseases induced involuntary movements using wearables

Cite this Research Publication : V. Vidya, Poornachandran, P., Sujadevi, V. G., and Meher Madhu Dharmana, “Suppressing Parkinson's diseases induced involuntary movements using wearables”, in 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy), Kollam, India, 2017.

Publisher : 2017 International Conference on Technological Advancements in Power and Energy ( TAP Energy)

Year : 2017

Deep learning model on stance classification

Cite this Research Publication : G. Rajendran, Prabaharan Poornachandran, and Dr. Bhadrachalam Chitturi, “Deep learning model on stance classification”, in International Conference on Advances in Computing, Communications and Informatics (ICACCI), Udupi, India, 2017.

Publisher : International Conference on Advances in Computing, Communications and Informatics

Year : 2016

MobAware’-Employing Context Awareness, Sensors and Cloud for Automatic Emergency Help Requests

Cite this Research Publication : P. Poornachandran, A. Ashok, AU, P. Shankar, VG, S., Krishnamoorthy, S., Bharataraju, M., Panchagnula, S. K., and Khyati, D., “MobAware’-Employing Context Awareness, Sensors and Cloud for Automatic Emergency Help Requests”, in International Conference on Ambient Assisted Living Technologies based on Internet of Things, 2016.

Publisher : International Conference on Ambient Assisted Living Technologies based on Internet of Things

Year : 2015

Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers

Cite this Research Publication : P. Poornachandran, Sreeram, R., Krishnan, M. R., Pal, S., Sankar, A. U. Prem, and Ashok, A., “Internet of Vulnerable Things (IoVT): Detecting Vulnerable SOHO Routers”, in Proceedings - 2015 14th International Conference on Information Technology, ICIT 2015, 2015, pp. 119-123.

Publisher : 14th International Conference on Information Technology, ICIT

Year : 2015

A lexical approach for classifying malicious URLs

Publisher : International Conference on High Performance Computing & Simulation (HPCS)

Year : 2015

Detecting the network attack vectors on SCADA systems

Cite this Research Publication : R. S. Ramachandruni and Poornachandran, P., “Detecting the network attack vectors on SCADA systems”, in 2015 International Conference on Advances in Computing, Communications and Informatics, ICACCI 2015, 2015, pp. 707-712.

Publisher : International Conference on Advances in Computing, Communications and Informatics, ICACCI

Year : 2015

Development of SCADA automated 33kV substation model as testing platform

Cite this Research Publication : S. M. Ramesh, Smrithi, S., AkhilRajkoti, P., Dr. P. Kanakasabapathy, A.N. Ravishankar, Pal, S., and Poornachandran, P., “Development of SCADA automated 33kV substation model as testing platform”, in IEEE International Conference on Industrial Instrumentation and Control (ICIC 2015), Pune, 2015.

Publisher : IEEE International Conference on Industrial Instrumentation and Control (ICIC 2015)

Year : 2014

Personal Health Data Exchange Using NFC

Publisher : International Symposium on Women in Computing and Informatics (WCI-2014)

Year : 2013

Digital image forgery detection on artificially blurred images

Cite this Research Publication : H. P, Lekha S. Nair, S.M, A., Unni, R., H, V. Priya, and Prabaharan Poornachandran, “Digital Image Forgery Detection on Artificially Blurred Images”, in International Conference on Emerging Trends in Communication, Control, Signal Processing & Computing Applications (C2SPCA), 2013 , Bangalore, India, 2013.

Publisher : IEEE

Year : 2013

Forepart Based Captcha Segmentation And Recognition Using Dft

Cite this Research Publication : H. Poroli, Prabaharan Poornachandran, and G, G. N., “Forepart Based Captcha Segmentation And Recognition Using Dft”, in Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013,, 2013.

Publisher : Fourth International Conference on Recent Trends in Information, Telecommunication and Computing – ITC 2013,

Year : 2012

Secure authentication in multimodal biometric systems using cryptographic hash functions

Cite this Research Publication : A. Ashok, Poornachandran, P., and Dr. Krishnashree Achuthan, “Secure authentication in multimodal biometric systems using cryptographic hash functions”, Communications in Computer and Information Science, vol. 335 CCIS, pp. 168-177, 2012.

Publisher : Springer Berlin Heidelberg

Year : 2012

DVM based scalable and adaptive multipath routing in MANET for emergency rescue application

Cite this Research Publication : Dr. Maneesha V. Ramesh, Prabaharan, P., Shameem, A. A., and Rekha, P., “DVM based Scalable and Adaptive Multipath Routing in MANET For Emergency Rescue Application”, in Wireless and Optical Communications Conference (WOCC), 2012 21st Annual, 2012, pp. 123-129

Publisher : WOCC

Year : 2012

Effective implementation of des algorithm for voice scrambling

Publisher : Springer Berlin Heidelberg

Year : 2012

DVM based multipath routing in MANET for different scalable and adaptive environment

Cite this Research Publication : A. S. Ansar, Prabaharan, P., Dr. Maneesha V. Ramesh, and Rekha, P., “DVM based multipath routing in MANET for different scalable and adaptive environment”, in Data Science & Engineering (ICDSE), 2012 International Conference on, 2012, pp. 187-193.

Publisher : IEEE

Year : 2012

Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images

Cite this Research Publication : Ka Praveen, Poornachandran, Pb, and Remya Ajai A. S., “Implementation of DES using pipelining concept with skew core key scheduling in secure transmission of images”, in ACM International Conference Proceeding Series, Coimbatore, 2012, pp. 637-641.

Publisher : ACM International Conference Proceeding Series

Conference Proceedings

Year : 2017

Deep emotion intensities in tweets

Publisher : Deepcybernet at emoint

Year : 2015

Condition monitoring in roller bearings using cyclostationary

Publisher : International Symposium on Women in Computing and Informatics

Book Chapter

Year : 2018

Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis

Cite this Research Publication : R. Vinayakumar, Poornachandran, P., and Dr. Soman K. P., “Scalable Framework for Cyber Threat Situational Awareness Based on Domain Name Systems Data Analysis”, in Big Data in Engineering Applications, S. Sekhar Roy, Samui, P., Deo, R., and Ntalampiras, S., Eds. Singapore: Springer Singapore, 2018, pp. 113–142.

Publisher : Big Data in Engineering Applications, Springer Singapore, Singapore, p.113–142 .

Journal

Year : 2020

A Compendium on Network and Host based Intrusion Detection Systems

Cite this Research Publication : R. Vigneswaran, Poornachandran, P., and Dr. Soman K. P., “A Compendium on Network and Host based Intrusion Detection Systems”, in Lecture Notes in Electrical Engineering, 2020.

Publisher : Lecture Notes in Electrical Engineering

Year : 2020

Cost-sensitive deep learning based framework for handling multiclass imbalanced dga detection

Publisher : Handbook of Computer Networks and Cyber Security

Year : 2019

A comparative analysis of deep learning approaches for network intrusion detection systems (N-IDSs)

Publisher : Journal of Digital Crime and Forensics (IJDCF)

Year : 2019

Robust Intelligent Malware Detection Using Deep Learning

Cite this Research Publication : R. Vinayakumar, Alazab, M., Dr. Soman K. P., Poornachandran, P., and Venkatraman, S., “Robust Intelligent Malware Detection Using Deep Learning”, IEEE Access, vol. 7, pp. 46717-46738, 2019.

Publisher : IEEE Access

Year : 2018

Evaluating deep learning approaches to characterize and classify malicious URL’s

Publisher : Journal of Intelligent & Fuzzy Systems

Year : 2018

Detecting malicious domain names using deep learning approaches at scale

Publisher : Journal of Intelligent & Fuzzy Systems

Year : 2018

Detecting Android malware using long short-term memory (LSTM)

Publisher : Journal of Intelligent & Fuzzy Systems

Year : 2018

SPOOF Net: Syntactic Patterns for Identification of Ominous Online Factors

Cite this Research Publication : V. S. Mohan, Vinayakumar, R., Dr. Soman K. P., and Poornachandran, P., “SPOOF Net: Syntactic Patterns for Identification of Ominous Online Factors”, in 2018 IEEE Security and Privacy Workshops (SPW), 2018.

Publisher : 2018 IEEE Security and Privacy Workshops (SPW)

Year : 2017

Drive-by-download malware detection in hosts by analyzing system resource utilization using one class support vector machines

Cite this Research Publication : P. Poornachandran, Praveen, S., Ashok, A., Krishnan, M. R., and Dr. Soman K. P., “Drive-by-download malware detection in hosts by analyzing system resource utilization using one class support vector machines”, Advances in Intelligent Systems and Computing, vol. 516, pp. 129-137, 2017.

Publisher : Advances in Intelligent Systems and Computing, Springer Verlag,

Year : 2017

Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)

Cite this Research Publication : Dr. Soman K. P., Vinayakumar, R., and Poornachandran, P., “Evaluation of Recurrent Neural Network and its Variants for Intrusion Detection System (IDS)”, International Journal of Information System Modeling and Design (IJISMD) , vol. 8, no. 3, 2017.

Publisher : International Journal of Information System Modeling and Design (IJISMD)

Year : 2016

Text/Image Region Separation for Document Layout Detection of Old Document Images using Non-linear Diffusion and Level Set Procedia Computer Science

Cite this Research Publication : S. S. Kumar, Rajendran, P., Prabaharan, P., Dr. Soman K. P., J., M., and J., J., “Text/Image Region Separation for Document Layout Detection of Old Document Images Using Non-linear Diffusion and Level Set”, in Procedia Computer Science, 2016, vol. 93, pp. 469-477.

Publisher : Procedia Computer Science, Elsevier.

Year : 2016

Automatic modulation classification using convolutional neural network

Cite this Research Publication : A. S and Dr. Soman K. P., “Automatic Modulation Classification using Convolutional Neural Network”, in International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems (ICAIECES-2016), 2016.

Publisher : International Conference on Artificial Intelligence and Evolutionary Computations in Engineering Systems

Year : 2016

Total Variation Denoising Based Approach for R-peak Detection in ECG Signals Procedia Computer Science

Cite this Research Publication : S. Sa Kumar, Dr. Neethu Mohan, Prabaharan, Pb, Dr. Soman K. P., J., M., and J., J., “Total Variation Denoising Based Approach for R-peak Detection in ECG Signals”, in Procedia Computer Science, 2016, vol. 93, pp. 697-705.

Publisher : Procedia Computer Science, Elsevier.

Admissions Apply Now