Search
Close this search box.
Gokul Kannan Sadasivam

Gokul Kannan Sadasivam

Gokul Kannan Sadasivam

Associate Professor

Associate Professor

About

Works in the intersection of Network Security and Data Science, with ten plus years of experience in teaching/research/industry roles. Research skills/interests in network forensics, network attacks, IoT botnets, and data science. Published several papers in reputed conferences and journals. Good team player with excellent communication/interpersonal skills. Highly motivated to learn new enhancements in technology and a flair for creativity.

About

Works in the intersection of Network Security and Data Science, with ten plus years of experience in teaching/research/industry roles. Research skills/interests in network forensics, network attacks, IoT botnets, and data science. Published several papers in reputed conferences and journals. Good team player with excellent communication/interpersonal skills. Highly motivated to learn new enhancements in technology and a flair for creativity.

Education

  • PhD (Computer Science and Engineering), BITS Pilani, 2021
  • M.Sc. (Computer Science), San Francisco Bay University, 2012
  • M.Sc. (Computer Engineering), National University of Singapore, 2007
  • B.E., College of Engineering Guindy, Anna University, 2004

Experience

  • Associate Professor, PES University, July 2022 – Till Date
  • Associate Professor, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, April 2021 – July 2022
  • Guest Faculty, Birla Institute of Technology & Science, Pilani (WILP, Bangalore Center), December 2020 – April 2021
  • Academic Advisor (volunteer), Alpha GK Matriculation School, April 2020
  • Assistant Professor, Birla Institute of Technology & Science, Pilani, September 2012 – Dec. 2018
  • .NET Software Engineer, Sopra Steria Asia Pte Ltd, January 2008 – December 2009
  • Systems Engineer, Transit Link Pte Ltd, May 2007 – January 2008

Teaching

  • Machine Intelligence
  • Blockchain
  • Computer Networks
  • Statistics for Data Science
  • Web Security
  • R Programming
  • UNIX Shell Programming

Responsibilities

  • Class Coordinator

Research Interests

  • Network Forensics
  • Network Attacks
  • IoT Botnets
  • Data Science

Conferences

  • Gokul Kannan Sadasivam and Chittaranjan Hota. “Efficient Detection of Malwares using Low-Interaction Honeypots”. In: Intelligent systems, Computing and Information Technology (NCICIT), 2014 National Conference on. Anna University, Tiruchirappalli, India, 2014. Page 2 of 6
  • Gokul Kannan Sadasivam and Chittaranjan Hota. “Scalable Honeypot Architecture for Identifying Malicious Network Activities”. In: Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on. Pune, India, 2015, pp. 27–31. doi: 10.1109/EITES.2015.15
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Classification of SSH Attacks Using Machine Learning Algorithms”. In: 2016 6th International Conference on IT Convergence and Security (ICITCS). Prague, The Czech Republic, 2016, pp. 1–6. doi:10.1109/ICITCS.2016.7740316
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks”. In: The International Conference Towards Extensible and Adaptable Methods in Computing, TEAMC 2018. 26-28 March. Netaji Subhas Institute of Technology, New Delhi, India, 2018. url: https://drive.google.com/file/d/1bhdcUA0EJBhDTbyMw2Y0mSVkXWlCf8W4
  • A Kavitha et al. “Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models”. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). 22 April. Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology, Chennai, India, 2022, pp. 85–90. doi: 10.1109/ICESIC53714.2022.9783501

Journals

  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques”. In: Journal of Software Networking 2017.1 (Jan. 2017), pp. 79–100. doi: 10.13052/jsn2445-9739.2017.005. url: doi.org/10.13052/jsn2445-9739.2017.005
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of stealthy single-source SSH password guessing attacks”. In: Evolving Systems (2021). (SCIE, Scopus), pp. 1–15. doi: 10.1007/s12530- 020- 09360-3. url: https://doi.org/10.1007/s12530-020-09360-3
  • Vighnesh M S et al. “Attendance Automation Using Deep Learning”. In: International Journal of Engineering Research & Technology (IJERT) 12.3 (2023). doi: 10.17577/IJERTV12IS030043. url: https://www.ijert.org/attendance-automation-using-deep-learning

Others

  • Honeypot Challenges and Countermeasures, Symposium on Information Security, Hyderabad, 2013

Education

  • PhD (Computer Science and Engineering), BITS Pilani, 2021
  • M.Sc. (Computer Science), San Francisco Bay University, 2012
  • M.Sc. (Computer Engineering), National University of Singapore, 2007
  • B.E., College of Engineering Guindy, Anna University, 2004

Additional Information

  • Associate Professor, PES University, July 2022 – Till Date
  • Associate Professor, Vel Tech Rangarajan Dr. Sagunthala R & D Institute of Science and Technology, April 2021 – July 2022
  • Guest Faculty, Birla Institute of Technology & Science, Pilani (WILP, Bangalore Center), December 2020 – April 2021
  • Academic Advisor (volunteer), Alpha GK Matriculation School, April 2020
  • Assistant Professor, Birla Institute of Technology & Science, Pilani, September 2012 – Dec. 2018
  • .NET Software Engineer, Sopra Steria Asia Pte Ltd, January 2008 – December 2009
  • Systems Engineer, Transit Link Pte Ltd, May 2007 – January 2008

Teaching

  • Machine Intelligence
  • Blockchain
  • Computer Networks
  • Statistics for Data Science
  • Web Security
  • R Programming
  • UNIX Shell Programming

Responsibilities

  • Class Coordinator

Research Interests

  • Gokul Kannan Sadasivam and Chittaranjan Hota. “Efficient Detection of Malwares using Low-Interaction Honeypots”. In: Intelligent systems, Computing and Information Technology (NCICIT), 2014 National Conference on. Anna University, Tiruchirappalli, India, 2014. Page 2 of 6
  • Gokul Kannan Sadasivam and Chittaranjan Hota. “Scalable Honeypot Architecture for Identifying Malicious Network Activities”. In: Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on. Pune, India, 2015, pp. 27–31. doi: 10.1109/EITES.2015.15
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Classification of SSH Attacks Using Machine Learning Algorithms”. In: 2016 6th International Conference on IT Convergence and Security (ICITCS). Prague, The Czech Republic, 2016, pp. 1–6. doi:10.1109/ICITCS.2016.7740316
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks”. In: The International Conference Towards Extensible and Adaptable Methods in Computing, TEAMC 2018. 26-28 March. Netaji Subhas Institute of Technology, New Delhi, India, 2018. url: https://drive.google.com/file/d/1bhdcUA0EJBhDTbyMw2Y0mSVkXWlCf8W4
  • A Kavitha et al. “Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models”. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). 22 April. Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology, Chennai, India, 2022, pp. 85–90. doi: 10.1109/ICESIC53714.2022.9783501

Conferences

  • Gokul Kannan Sadasivam and Chittaranjan Hota. “Efficient Detection of Malwares using Low-Interaction Honeypots”. In: Intelligent systems, Computing and Information Technology (NCICIT), 2014 National Conference on. Anna University, Tiruchirappalli, India, 2014. Page 2 of 6
  • Gokul Kannan Sadasivam and Chittaranjan Hota. “Scalable Honeypot Architecture for Identifying Malicious Network Activities”. In: Emerging Information Technology and Engineering Solutions (EITES), 2015 International Conference on. Pune, India, 2015, pp. 27–31. doi: 10.1109/EITES.2015.15
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Classification of SSH Attacks Using Machine Learning Algorithms”. In: 2016 6th International Conference on IT Convergence and Security (ICITCS). Prague, The Czech Republic, 2016, pp. 1–6. doi:10.1109/ICITCS.2016.7740316
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Honeynet Data Analysis and Distributed SSH Brute-Force Attacks”. In: The International Conference Towards Extensible and Adaptable Methods in Computing, TEAMC 2018. 26-28 March. Netaji Subhas Institute of Technology, New Delhi, India, 2018. url: https://drive.google.com/file/d/1bhdcUA0EJBhDTbyMw2Y0mSVkXWlCf8W4
  • A Kavitha et al. “Diagnosing Musculoskeletal Disorders from Shoulder Radiographs Using Deep Learning Models”. In: 2022 International Conference on Electronic Systems and Intelligent Computing (ICESIC). 22 April. Vel Tech Rangarajan Dr Sagunthala R and D Institute of Science and Technology, Chennai, India, 2022, pp. 85–90. doi: 10.1109/ICESIC53714.2022.9783501

Journals

  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of Severe SSH Attacks Using Honeypot Servers and Machine Learning Techniques”. In: Journal of Software Networking 2017.1 (Jan. 2017), pp. 79–100. doi: 10.13052/jsn2445-9739.2017.005. url: doi.org/10.13052/jsn2445-9739.2017.005
  • Gokul Kannan Sadasivam, Chittaranjan Hota, and Anand Bhojan. “Detection of stealthy single-source SSH password guessing attacks”. In: Evolving Systems (2021). (SCIE, Scopus), pp. 1–15. doi: 10.1007/s12530- 020- 09360-3. url: https://doi.org/10.1007/s12530-020-09360-3
  • Vighnesh M S et al. “Attendance Automation Using Deep Learning”. In: International Journal of Engineering Research & Technology (IJERT) 12.3 (2023). doi: 10.17577/IJERTV12IS030043. url: https://www.ijert.org/attendance-automation-using-deep-learning

Others

  • Honeypot Challenges and Countermeasures, Symposium on Information Security, Hyderabad, 2013

Staff Contacts

Staff Contacts

Staff Campus Location

Staff Campus Location