Sounak Paul

Work place: Department of Information Technology, Birla Institute of Technology, Mesra, Ranchi, India



Research Interests: Computer Architecture and Organization, Intrusion Detection System, Network Security, Data Structures and Algorithms, Analysis of Algorithms, Numerical Analysis


Sounak Paul is an Assistant professor in the Department of Information Technology, Birla Institute of Technology (BIT), Mesra, Ranchi, India, presently deputed at Birla Institute of Technology, International centre, Muscat, Oman (Waljat College of Applied Sciences). He received his Master in Technology (M.Tech) in Computer science and Engineering from Indian Institute of Technology (IIT), Guwahati, India. He earned his Master in Computer Applications (MCA) from Birla Institute of Technology, Mesra, Ranchi, India. His research interests include network security specially malware analysis and defense, intrusion detection and wireless sensor networks.

Author Articles
Selection of Next Generation Anti-Virus against Virus Attacks in Networks Using AHP

By Sounak Paul Bimal Kumar Mishra

DOI:, Pub. Date: 8 Feb. 2013

Defending against virus attacks in network is a vital part of network security. With the rapid evolution of viruses, its defense mechanism has also been evolved over the years. But given the diversity and complexity of virus propagation and its attack behavior, no defense mechanism is equipped fully to protect the network from such attacks. Several antiviruses are available in the market. But none can give full proof solution to malicious attacks in communication networks. In this paper we present a mechanism to measure and compare the relative ability of antivirus against various kinds of viruses. We construct a hierarchical structure for different virus defense mechanism. Using Analytical Hierarchy Process (AHP) we construct a pair wise comparison matrix and find the value of corresponding Eigen vectors; we then apply the theory of AHP to calculate weight of each defense index. We validated our technique with an example. Our method can provide a strong reference to design an optimal network security solution.

[...] Read more.
Other Articles