Gokul Kannan Sadasivam
Gokul Kannan Sadasivam
Associate Professor
Associate Professor
About
Works in the intersection of Network Security and Data Science, with ten plus years of experience in teaching/research/industry roles. Research skills/interests in network forensics, network attacks, IoT botnets, and data science. Published several papers in reputed conferences and journals. Good team player with excellent communication/interpersonal skills. Highly motivated to learn new enhancements in technology and a flair for creativity.
About
Works in the intersection of Network Security and Data Science, with ten plus years of experience in teaching/research/industry roles. Research skills/interests in network forensics, network attacks, IoT botnets, and data science. Published several papers in reputed conferences and journals. Good team player with excellent communication/interpersonal skills. Highly motivated to learn new enhancements in technology and a flair for creativity.
Education
- PhD (Computer Science and Engineering), BITS Pilani, 2021
- M.Sc. (Computer Science), San Francisco Bay University, 2012
- M.Sc. (Computer Engineering), National University of Singapore, 2007
- B.E., College of Engineering Guindy, Anna University, 2004
Experience
- Associate Professor, PES University, July 2022 – Till Date
- Associate Professor, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, April 2021 – July 2022
- Guest Faculty, Birla Institute of Technology & Science, Pilani (WILP, Bangalore Center), December 2020 – April 2021
- Academic Advisor (volunteer), Alpha GK Matriculation School, April 2020
- Assistant Professor, Birla Institute of Technology & Science, Pilani, September 2012 – Dec. 2018
- .NET Software Engineer, Sopra Steria Asia Pte Ltd, January 2008 – December 2009
- Systems Engineer, Transit Link Pte Ltd, May 2007 – January 2008
Teaching
- Machine Intelligence
- Blockchain
- Computer Networks
- Statistics for Data Science
- Web Security
- R Programming
- UNIX Shell Programming
Responsibilities
- Class Coordinator
Research Interests
- Network Forensics
- Network Attacks
- IoT Botnets
- Data Science
Conferences
- Gokul Kannan Sadasivam and Chittaranjan Hota. “Efficient Detection of Malwares using Low-Interaction Honeypots”. In: Intelligent systems, Computing and Information Technology (NCICIT), 2014 National Conference on. Anna University, Tiruchirappalli, India, 2014. Page 2 of 6
- Gokul Kannan Sadasivam and Chittaranjan Hota. “Scalable Honeypot Architecture for Identifying Malicious Network Activities”. In: Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on. Pune, India, 2015, pp. 27–31. doi: 10.1109/EITES.2015.15
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Classification of SSH Attacks Using Machine Learning Algorithms”. In: 2016 6th International Conference on IT Convergence and Security (ICITCS). Prague, The Czech Republic, 2016, pp. 1–6. doi:10.1109/ICITCS.2016.7740316
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks”. In: The International Conference Towards Extensible and Adaptable Methods in Computing, TEAMC 2018. 26-28 March. Netaji Subhas Institute of Technology, New Delhi, India, 2018. url: https://drive.google.com/file/d/1bhdcUA0EJBhDTbyMw2Y0mSVkXWlCf8W4
- A Kavitha et al. “Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models”. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). 22 April. Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology, Chennai, India, 2022, pp. 85–90. doi: 10.1109/ICESIC53714.2022.9783501
Journals
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques”. In: Journal of Software Networking 2017.1 (Jan. 2017), pp. 79–100. doi: 10.13052/jsn2445-9739.2017.005. url: doi.org/10.13052/jsn2445-9739.2017.005
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of stealthy single-source SSH password guessing attacks”. In: Evolving Systems (2021). (SCIE, Scopus), pp. 1–15. doi: 10.1007/s12530- 020- 09360-3. url: https://doi.org/10.1007/s12530-020-09360-3
- Vighnesh M S et al. “Attendance Automation Using Deep Learning”. In: International Journal of Engineering Research & Technology (IJERT) 12.3 (2023). doi: 10.17577/IJERTV12IS030043. url: https://www.ijert.org/attendance-automation-using-deep-learning
Others
- Honeypot Challenges and Countermeasures, Symposium on Information Security, Hyderabad, 2013
Education
- PhD (Computer Science and Engineering), BITS Pilani, 2021
- M.Sc. (Computer Science), San Francisco Bay University, 2012
- M.Sc. (Computer Engineering), National University of Singapore, 2007
- B.E., College of Engineering Guindy, Anna University, 2004
Additional Information
- Associate Professor, PES University, July 2022 – Till Date
- Associate Professor, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, April 2021 – July 2022
- Guest Faculty, Birla Institute of Technology & Science, Pilani (WILP, Bangalore Center), December 2020 – April 2021
- Academic Advisor (volunteer), Alpha GK Matriculation School, April 2020
- Assistant Professor, Birla Institute of Technology & Science, Pilani, September 2012 – Dec. 2018
- .NET Software Engineer, Sopra Steria Asia Pte Ltd, January 2008 – December 2009
- Systems Engineer, Transit Link Pte Ltd, May 2007 – January 2008
Teaching
- Machine Intelligence
- Blockchain
- Computer Networks
- Statistics for Data Science
- Web Security
- R Programming
- UNIX Shell Programming
Responsibilities
- Class Coordinator
Research Interests
- Gokul Kannan Sadasivam and Chittaranjan Hota. “Efficient Detection of Malwares using Low-Interaction Honeypots”. In: Intelligent systems, Computing and Information Technology (NCICIT), 2014 National Conference on. Anna University, Tiruchirappalli, India, 2014. Page 2 of 6
- Gokul Kannan Sadasivam and Chittaranjan Hota. “Scalable Honeypot Architecture for Identifying Malicious Network Activities”. In: Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on. Pune, India, 2015, pp. 27–31. doi: 10.1109/EITES.2015.15
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Classification of SSH Attacks Using Machine Learning Algorithms”. In: 2016 6th International Conference on IT Convergence and Security (ICITCS). Prague, The Czech Republic, 2016, pp. 1–6. doi:10.1109/ICITCS.2016.7740316
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks”. In: The International Conference Towards Extensible and Adaptable Methods in Computing, TEAMC 2018. 26-28 March. Netaji Subhas Institute of Technology, New Delhi, India, 2018. url: https://drive.google.com/file/d/1bhdcUA0EJBhDTbyMw2Y0mSVkXWlCf8W4
- A Kavitha et al. “Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models”. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). 22 April. Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology, Chennai, India, 2022, pp. 85–90. doi: 10.1109/ICESIC53714.2022.9783501
Conferences
- Gokul Kannan Sadasivam and Chittaranjan Hota. “Efficient Detection of Malwares using Low-Interaction Honeypots”. In: Intelligent systems, Computing and Information Technology (NCICIT), 2014 National Conference on. Anna University, Tiruchirappalli, India, 2014. Page 2 of 6
- Gokul Kannan Sadasivam and Chittaranjan Hota. “Scalable Honeypot Architecture for Identifying Malicious Network Activities”. In: Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on. Pune, India, 2015, pp. 27–31. doi: 10.1109/EITES.2015.15
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Classification of SSH Attacks Using Machine Learning Algorithms”. In: 2016 6th International Conference on IT Convergence and Security (ICITCS). Prague, The Czech Republic, 2016, pp. 1–6. doi:10.1109/ICITCS.2016.7740316
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks”. In: The International Conference Towards Extensible and Adaptable Methods in Computing, TEAMC 2018. 26-28 March. Netaji Subhas Institute of Technology, New Delhi, India, 2018. url: https://drive.google.com/file/d/1bhdcUA0EJBhDTbyMw2Y0mSVkXWlCf8W4
- A Kavitha et al. “Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models”. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). 22 April. Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology, Chennai, India, 2022, pp. 85–90. doi: 10.1109/ICESIC53714.2022.9783501
Journals
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques”. In: Journal of Software Networking 2017.1 (Jan. 2017), pp. 79–100. doi: 10.13052/jsn2445-9739.2017.005. url: doi.org/10.13052/jsn2445-9739.2017.005
- Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of stealthy single-source SSH password guessing attacks”. In: Evolving Systems (2021). (SCIE, Scopus), pp. 1–15. doi: 10.1007/s12530- 020- 09360-3. url: https://doi.org/10.1007/s12530-020-09360-3
- Vighnesh M S et al. “Attendance Automation Using Deep Learning”. In: International Journal of Engineering Research & Technology (IJERT) 12.3 (2023). doi: 10.17577/IJERTV12IS030043. url: https://www.ijert.org/attendance-automation-using-deep-learning
Others
- Honeypot Challenges and Countermeasures, Symposium on Information Security, Hyderabad, 2013
Staff Contacts
Staff Contacts
- 8026721983
- gokul@pes.edu
- Computer Science
- 8026721983
- gokul@pes.edu
- Computer Science
- EC Campus
- EC Campus