Classification of Network Traffic via Packet-Level Hidden Markov Models

Size: px
Start display at page:

Download "Classification of Network Traffic via Packet-Level Hidden Markov Models"

Transcription

1 Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato, Perlug Salvo Ross Department of Electroncs and Telecommuncatons Norwegan Unversty of Scence and Technology Abstract Traffc classfcaton and dentfcaton s a fertle research area. Beyond Qualty of Servce, servce dfferentaton, and bllng, one of the most mportant applcatons of traffc classfcaton s n the feld of network securty. Ths paper proposes a packet-level traffc classfcaton approach based on Hdden Markov Model (HMM). Classfcaton s performed by usng real network traffc and estmatng - n a combned fashon - Packet Sze (PS) and Inter Packet Tme (IPT) characterstcs, thus remanng applcable to encrypted traffc too. The effectveness of the proposed approach s evaluated by consderng several traffc typologes: we appled our model to real traffc traces of Age of Mythology and Counter Strke (two Mult Player Network Games), HTTP, SMTP, Edonkey, PPlve (a peer-to-peer IPTV applcaton), and MSN Messenger. An analytcal bass and the mathematcal detals regardng the model are gven. Results show how the proposed approach s able to classfy network traffc by usng packet-level statstcal propertes and therefore t s a good canddate as a component for a mult-classfcaton framework. I. INTRODUCTION Network traffc classfcaton s the process of analyzng traffc flows and assocatng them to dfferent categores of network applcatons and t represents an essental task n the whole chan of network securty. Studes n the feld of traffc classfcaton started n the last years, when the tradtonal use of transport protocol ports for classfcaton purposes became unrelable whle dfferent knds of new network applcatons were emergng (multplayer network games, p2p IPTV, fle sharng). Beyond the need to understand whch knd of traffc s carred on the Internet lnks, other man motvatons for lookng for new and relable traffc classfcaton technques today are to offer proper Qualty of Servce (QoS) dependng on the category of traffc carred by flows, and to perform a bllng not only based on bandwdth usage but also on the traffc category. However, n addton to these ssues, some of the most mportant and wdely spread applcatons of traffc classfcaton pertan to network securty: () the enforcement of securty polces on the use of dfferent applcatons; () the ablty to classfy encrypted traffc; () the dentfcaton of malcous traffc flows. For these reasons, several new approaches to traffc classfcaton are beng proposed and studed. As of today, though, no defntve answer s present. The debate n the scentfc communty s stll open, and, as t happened n the recent past for ntruson detecton systems [], Ths work has been partally supported by PRIN 27 RECIPE Project, by CONTENT NoE, and NETQOS EU projects, by WILATI+ project. approaches based on the jont work of dfferent traffc classfcaton technques (mult-classfcaton) seem to be among the more promsng solutons. New trends n network applcatons and protocol desgn, ndeed, make traffc classfcaton partcularly dffcult. Protocol encapsulaton, encrypted transmsson, use of non-standard ports, concerns related to users prvacy, and need to keep up wth huge traffc loads on network lnks are posng tremendous lmts to some of the developed technques. Payload nspecton technques, for example, make applcaton dentfcaton dffcult or even mpossble under some of the above-cted condtons (manly for both prvacy and performance ssues). On the other sde, approaches based on statstcal propertes of the network traffc are lookng more promsng and robust to encrypton, protocol obfuscaton, prvacy, etc. In ths paper we propose a novel classfcaton technque based on packet-level statstcal propertes of network traffc exhbted by dfferent applcatons. Specfcally, we propose the use of Packet-Level Hdden Markov Models (PL-HMMs), that we have proposed and valdated n the past for modelng purposes [2]. In ths work we present the algorthms, the statstcal propertes taken n consderaton, and we test the proposed classfcaton approach on a set of applcaton traffc that ranges from tradtonal network applcatons (e.g. HTTP, Emal) to more recent ones as network games and peer-topeer vdeo streamng. The presented results are encouragng and show that the proposed PL-HMM approach may be a good canddate as a technque to be used n a mult-classfcaton scenaro (that s, when dfferent classfcaton engnes are used and ther output s combned by a decson system). The rest of the paper s organzed as follows. In Secton II a bref descrpton of the motvatons s gven. Secton III provdes detals on the analytcal model at the base of our classfer. Secton IV dscusses the applcatons consdered and the measurement approach. Fnally, n Secton V we show results of traffc classfcaton. Secton VI ends the paper. II. MOTIVATION AND RELATED WORK Several classfcaton technques have recently been presented n lterature. Approaches based on deep payload nspecton are usually consdered very relable for traffc that s not encapsulated nto other applcaton-level protocols and for un-encrypted traffc. However, the current trends show that /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.

2 the porton of encrypted traffc on the Internet s constantly ncreasng [3], and several applcatons are usng protocol encapsulaton or obfuscaton to evade network polcy enforced through flterng [4]. Moreover, access to full payload s often not possble (e.g. due to prvacy ssues). For these reasons, researchers are proposng approaches that look more robust because based on the ntrnsc propertes of the network traffc as t s generated by dfferent applcatons. Flow-level parameters (e.g. flow duraton, transmtted bytes, transmtted packets) are a popular choce, a vald alternatve or combnaton s to explot measurements comng from packet level (e.g. packet sze, nter-packet tmes). Several notable works [5] [6] [7] [8] [9] presented n lterature consder some of these propertes to buld classfcaton features, and then use statstcal or machne learnng approaches to classfcaton. Results show that a perfect classfcaton approach does not exst. The use of dfferent features and classfers can brng more accuracy under some condtons or n dentfyng some applcatons whle may not be satsfyng n other cases. It s therefore probable that n the future we wll see mult-classfer approaches, able to collect the advantages of dfferent technques and compensate for each weakness, beng proposed. In ths paper we propose a technque for traffc classfcaton based on a statstcal approach that takes nto account some new packet-level propertes of network traffc, tryng to offer a contrbuton n terms of technques to explot ntrnsc propertes of traffc generated by dfferent network applcatons. Indeed, as explaned n the followng sectons, the use of PL- HMMs allows us to take nto account jont characterstcs of nter-packet tmes (IPT) and payload sze (PS), as well as ther temporal correlaton. We use studes from our modelng work based on HMMs [2]: the traffc generated by a specfc applcaton s modeled as a flow of packets, seen as a sequence of (IPT,PS) pars generated accordng to dfferent dstrbutons dependng on the hdden state of the source. In [8], HMMs have been used, and compared wth other technques, for traffc classfcaton of flows at an early stage. Sequences made of only the frst 4 to packets were used to tran HMMs and to attempt flow classfcaton. However, dfferently from our work, only packet szes were consdered n ths paper. An approach based on profle HMMs has been proposed n []. Ths work s very dfferent from ours, n that the authors present two separate classfers workng separately on IPTs or on PSs, and a left-to-rght structure for the state topology of the HMM s used. However, a proposal for extendng ther approach was later presented n a techncal report [], where they try to account for jont IPT and PS modelng va vector quantzaton. Proposed profle HMMs n [] present a very complex state structure dependng on the length of the tranng sequence, wth a par of dfferent states for each packet. They are desgned for one-dmensonal observable varables. IPT and PS jont nformaton s taken nto account va vector quantzaton, thus a codebook labelng IPT and PS allowed pars s used as observable varable. Furthermore, a heurstc technque, namely model surgery, s needed to account for dfferent trace lengths. As t wll IPT PS sequence PL HMM λ PL HMM n PL HMM N λ n λ N argmax(.) traffc class Fg.. Archtecture of the classfer. be clear n the next secton, compared to [], the model proposed n ths paper works drectly on a two-dmensonal observable varable, thus explots IPT and PS jont nformaton wthout needng any pre-processng lke vector quantzaton. Our approach presents a fully-connected structure for the state topology that allows an enormous reducton of the number of states, avods post-processng lke model surgery, and although beng much less structured than the profle HMMs wth respect to the traffc characterstcs s stll able to acheve good classfcaton results. III. THE ANALYTICAL MODEL Notaton - Column vectors are denoted wth lower-case bold letters, wth a denotng the th element of vector a; matrces are denoted wth upper-case bold letters, wth A,j denotng the (, j)th element of matrx A; (.) T and E{.} denote transpose and expectaton operators; a b = b denotes the condtonal random varable a gven that b = b ; the symbol means dstrbuted as. Fgure shows the general system archtecture that we are consderng for traffc classfcaton. It s composed by a bank of parallel PL-HMMs and a mult-nput sngle-output block pontng at the maxmum nput. In order to capture the characterstcs of N dfferent typologes of network traffc, t s assumed that the N dfferent PL-HMMs n the bank have been obtaned va the Baum-Welch tranng proposed n [2]. The Baum-Welch algorthm [2] s an teratve procedure that looks for model parameters maxmzng the probablty that the model tself generates the sequences used as tranng set. Each PL-HMM of the bank s then used to compute the lkelhood (λ n ), representng the probablty that the test sequence belongs to the traffc typology assocated to the PL- HMM. The maxmum lkelhood then selects the best estmate for the traffc typology. A. PL-HMM The sngle PL-HMM s an HMM composed by a dscrete hdden state varable x[l] {s,...,s K } and a contnuous bdmensonal observable varable, y[l] =(d[l],b[l]) T, where K denotes the number of the states for the HMM, d[l] denotes log (IPT/µs) and b[l] denotes PS of the lth packet. IPT and PS are jontly descrbed wth memory and correlaton /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.

3 taken nto account by the state varable, and assumed statstcally ndependent gven the state. The sngle PL-HMM s characterzed by the set of parameters M = {A, g (t), w (t), g (p), w (p) }, denotng the state transton matrx, the condtonal IPT and PS dstrbuton vectors, respectvely,.e. A,j =Pr(x[l +]=s j x[l] =s ); d[l] x[l] =s Gamma(g (t),w (t),w (p) ); b[l] x[l] =s Gamma(g (p) ). It s apparent the Markovan assumpton for the hdden state. The condtonal (n th state) pdf s for IPT and PS, are f (t) (d) = (d/w(t) f (p) (b) = (b/w(p) ) g(t) e (d/w(t) ) w (t) Γ(g (t) ) ) g(p) e (b/w(p) ) w (p) Γ(g (p) ) (d >), (b >). It s worth notcng that, accordng to our notaton, the IPT-PS sequence Y = (y[],...,y[l]) corresponds to the followng par of sequences: D = (d[],...,d[l]) for IPT values and B =(b[],...,b[l]) for PS values. B. Lkelhood Computaton The lkelhood λ =Pr(Y M) of an IPT-PS sequence Y, gven the model M, s computed explotng the dependences captured by the model n both forward and backward drectons. The Forward-Backward algorthm [2] s an effcent technque to compute the Forward varable α and the Backward varable β n a graphcal model,.e. the varables capturng such dependences. More specfcally, for HMM structures t s based on the followng equatons α j [l] = α [l ]A,j f (t) j (d[l])f (p) j (b[l]), β [l] = = j= A,j f (t) j (d[l +])f (p) j (b[l +])β j [l +]. Basng on these formulas, the lkelhood for an IPT-PS sequence Y s computed as λ =Pr(Y M)= α [l]β [l], = for an arbtrary l. The Forward-Backward algorthm s typcally mplemented n the log-doman. C. Traned PL-HMMs Our PL-HMMs present K =4to K =7states, dependng on the complexty of the protocol. We tred to keep the number of states as low as possble n order to contan computatonal complexty, and at the same tme provde suffcent accuracy n modelng the characterstcs of a specfc a network-traffc typology. The set of parameters for the tranng algorthm s chosen n order to cover almost unformly the whole range of observed IPT and PS values. Convergence of the Baum-Welch occurrences occurrences IPT hstogram & IPT pdf dbµ PS hstogram & PS pdf bytes (a) Normalzed hstogram of the tranng set, pdf of the PL- HMM, pdf of the PL-HMM. covarance covarance.5 between IPT and IPT between PS and IPT covarance covarance.5 between IPT and PS between PS and PS (b) IPT-PS auto- and cross-covarance for the tranng set, the PL-HMM, the PL-HMM. Fg. 2. PL-HMM characterstcs. tranng for all typologes was reached n a few (less than ) teratons. Fgure 2 shows the characterstcs of the PL-HMM to model SMTP traffc (please refer to Secton IV for a descrpton of all the applcatons consdered n ths work). From ths fgure, t s clear how frst and second order statstcs are captured by the model. Ths s shown also to gve an ntutve dea of how packet-level propertes related to margnal dstrbutons, tme dependence, and mutual dependence between IPT and PS, are captured by a PL- HMM made of few parameters, that can then be exploted for classfcaton purposes. Table I shows the state parameters for the PL-HMM n whch each state corresponds to a dfferent short-tme behavor of the applcaton n terms of IPT and PS generaton, for more detals refer to [2]. Smlar behavor n terms of modelng capabltes have been obtaned for each of the traffc typologes descrbed n Secton IV. Global statstcs (average value and standard devaton) of /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.

4 TABLE I SMTP: STATE PARAMETERS. PS IPT g (t) w (t) g (p) w (p) st state nd state rd state th state th state TABLE II TRAINING SETS STATISTICS. IPT [dbµ] PS [bytes] mean std dev. mean std dev. AoM CS Edonkey HTTP MSN PPLve SMTP the tranng sets used to characterze each traffc typology are shown n Table II. It s easy to notce that IPT and PS jont characterzaton s needed n order to am at successful classfcaton. Also, analyzng dfferences and smlartes among traffc characterstcs, t s not surprsng that, antcpatng the results shown n Secton V, AoM and PPlve wll present the two best performance for correct classfcaton, whle the the worst performance for msclassfcaton wll be when confusng Edonkey wth SMTP and SMTP wth MSN. IV. CONSIDERED APPLICATIONS AND MEASUREMENT APPROACH We tested our algorthm over a heterogeneous set of network applcatons, shown n Table III. Each of them were verfed through deep payload nspecton and manual checks. The choce of the consdered applcatons to classfy was drven by the followng multdmensonal crtera: () both TCP and UDP based applcatons; () both and sgnalng traffc; () both tradtonal and novel Internet applcatons. As for TCP-based and tradtonal applcatons we consdered the traffc of HTTP and SMTP (respectvely related to Web and Emal), stll responsble for a relevant porton of the overall Internet traffc. Agan, n the class of TCP-based applcatons and stll fallng n the category of tradtonal Internet applcatons, we consdered Instant Messengng. It s used by about 5% of the Internet users all around the world [3], wth MSN Messenger (MSN n the followng) beng the most popular applcaton. In ths work we consder the traffc generated by MSN clents [4]. Also, as last TCP-based applcaton we consdered the traffc assocated to the Edonkey protocol [5], used by peer-to-peer fle sharng applcatons as Emule. Ths category of traffc s qute novel (compared to Web and Emal traffc) and t s partcularly mportant because most of the ssues related to the nablty to dentfy applcatons through protocol ports started wth respect to peer-to-peer fle sharng applcatons. As regard UDP-based and nnovatve (and wth QoS requrements) applcatons, we consdered the traffc generated by Age of Mythology (AoM) [6], a Real Tme Strategy Multplayer game, and CounterStrke (CS) [7], one of the most played Frst Person Shooter games on the Internet. TABLE III CONSIDERED TRAFFIC Tranng Test flows packets bytes flows packets bytes AoM M K CS M K Edonkey M M HTTP M M MSN M M PPlve K K STMP M M Fnally, a category of traffc that s now constantly ncreasng s peer-to-peer vdeo streamng. Trple-player Operators are nterested n dentfyng and classfyng ths traffc wthout damagng the prvacy of the users. For ths reason, we consdered the sgnalng traffc generated by the PPlve applcaton. Therefore, accordng to our multdmensonal crtera, ths last traffc typology falls n the class composed by the trple: UDPbased applcaton, nnovatve Internet servce, sgnalng traffc. To stress the mportance of peer-to-peer vdeo streamng traffc n current networks, t s worth notcng that we prevously studed the traffc generated by PPlve and, whle we were able to recognze that the sgnalng nformaton was transmtted through UDP packets and the vdeo was carred by TCP packets, we were not able to relably dentfy all the vdeo streamng flows on TCP. Thus confrmng that, from the Operator pont of vew, the ablty to recognze sgnalng traffc nstead of traffc s of ndsputable mportance. Except for network games, all the traffc was captured at Unversty of Naples Federco II, Italy, wth the traffc from peer-to-peer applcatons generated by a set of controlled boxes. The AoM traces, nstead, have been provded by the Worcester Polytechnc Insttute, MA (USA) [8]. Whereas the CS traces have been already used for a study on network games traffc modelng [9]. Accordng to the results shown n [2] we can state that the tme nvarance of IPT does not affect the classfcaton process (based on both IPT and PS). We consdered the conventonal defnton of flows - gven by the 4-tuple: source IP, source port, destnaton IP, destnaton port - wth a tmeout of 6 seconds. In ths study we took nto account only traffc extng from observed hosts (e.g. packets wth destnaton port 8 or 25 for HTTP and SMTP respectvely, packets sent by observed machnes n the case of peer-to-peer applcatons, etc.), neglectng flows n the opposte drecton. We separated the avalable flows n two separate sets: a tranng set used for tranng the PL- HMM and thus buldng the models, and a test set used to verfy the classfer. Flows wth less than packets have been excluded both from tranng and test sets n order to avod numercal problems runnng the algorthms. From each consdered flow we extracted sequences of IPT and PS. Snce we wanted to characterze the traffc generated by the applcatons, ndependent as much as possble of the transport protocols, we dropped all packets wth empty payload, as TCPspecfc traffc, lke connecton establshment packets (SYN- ACK-SYNACK) and pure acknowledgment packets. For the same reason, n the estmaton of the PS, we measured the byte length of the TCP/UDP payload /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.

5 TABLE IV CLASSIFICATION RESULTS: CONFUSION MATRIX AoM CS Edonkey HTTP MSN PPlve SMTP AoM.%.%.%.%.%.%.% CS 2.94% 93.53% 2.94%.%.29%.%.29% Edonkey.%.22% 9.24%.22% 2.44%.22% 3.66% HTTP.%.4%.3% 93.35% 2.8%.49% 2.7% MSN.%.3% 2.34%.94% 94.6%.% 2.43% PPlve.%.%.64%.64%.9% 96.82%.% SMTP.% 2.4% 2.23% 2.25% 3.25%.% 9.23% V. EXPERIMENTAL RESULTS In Table IV we show, summarzed through a confuson matrx, the results of the classfcaton performed on the test sets. Each row represents n percentage the output of a run of the classfer over a dfferent applcaton test set (e.g. the cell correspondng to the HTTP row and Edonkey column tells us that.3% of the flows from the HTTP test set have been erroneously classfed as Edonkey). All the correct classfcaton percentages are shown on the dagonal n bold. We can see that for all the applcatons a correct classfcaton percentage above 9% s acheved, wth the best results obtaned when tryng to dentfy AoM and PPlve traffc. For AoM the % percentage value s manly explaned wth the very reduced number of flows of the test set, however t s mportant to note that the confuson values observable on the AoM column show that t almost never happens that flows from dfferent applcatons are erroneously classfed as AoM (ths actually happens only for CounterStrke whch s a game over UDP as AoM), demonstratng that the AoM model s very strct n capturng AoM traffc propertes. The worst results are obtaned when tryng to dentfy Edonkey or SMTP traffc. Here we see that there are several flows that are confused wth other applcatons. Probably the consdered statstcal propertes of such flows do not ft wth ther correspondng models. However, ths s a typcal stuaton n whch a mult-classfer system may overrde the weaknesses of a sngle approach by countng also on dfferent classfcaton technques based on other propertes. Moreover, t s worth notcng that n ths work we consdered only traffc n one drecton for each host, whereas by buldng models also for the other way and explotng the bond between correspondng flows n the two drectons (beng both generated by the same applcaton) t may be possble to acheve a better accuracy. The extenson of the classfer amng to process both traffc drectons at the same tme s currently under nvestgaton. VI. CONCLUSION Traffc classfcaton represents an essental task for both network management archtectures [23] and network securty solutons [24]. In ths paper we proposed an approach for traffc classfcaton based on HMMs appled to packet-level traffc parameters. Our approach, by jontly consderng IPT and PS and takng nto account also ther temporal structures, s able to classfy a number of traffc typologes (TCP and UDP based, and sgnalng, tradtonal and novel Internet applcatons). We showed how the technque s able to acheve promsng results such that t may be consdered as one of the technques to be used n a mult-classfer system. Our ongong work s devoted to both prelmnary longtudnal/portablty analyss (.e. tranng and testng stage usng dfferent traffc traces) and enlarge the set of consdered traffc typologes. Moreover we plan to compare performance aganst other classfers. REFERENCES [] G. Gacnto, F. Rol, L. Ddac, Fuson of multple classfers for ntruson detecton n computer networks, Pattern Recognton Lett., Vol. 24, no. 2, pp , Aug. 23. [2] A. Danott, A. Pescapé, P. Salvo Ross, G. Iannello, G. Ventre, F. Palmer, An HMM Approach to Internet Traffc Modelng, IEEE Global Telecommun. Conf. (GLOBECOM), pp. 6, Dec. 26. [3] Mar. 28. [4] T. Karaganns, A. Brodo, N. Brownlee, K.C. Claffy, M. Faloutsos, Is P2P dyng or just hdng?, IEEE Global Telecommun. Conf. (GLOBE- COM), pp , Dec. 24. [5] S. Zander, T. Nguyen, G. Armtage, Automated traffc classfcaton and applcaton dentfcaton usng machne learnng, IEEE LCN, pp , Nov. 25. [6] M. Crott, F. Grngol, P. Pelosato, L. Salgarell, A Statstcal Approach to IP-level classfcaton of network traffc, IEEE Int. Conf. Commun. (ICC), pp. 7 76, Jun. 26. [7] J. Erman, A. Mahant, M. Arltt, Internet Traffc Identfcaton usng Machne Learnng, IEEE Global Telecommun. Conf. (GLOBECOM), pp. 6, Dec. 26. [8] L. Bernalle, R. Texera, K. Salamatan, Early Applcaton Identfcaton, ACM Co-Next, 26 [9] T. Auld, A.W. Moore, S.F. Gull, Bayesan Neural Networks for Internet Traffc Classfcaton, IEEE Trans. Neural Networks, Vol. 8, no., pp , Jan. 27. [] C. Wrght, F. Monrose, G. Masson, HMM Profles for Network Traffc Classfcaton, VzSEC/DMSEC, pp. 9 5, Oct. 24. [] C. Wrght, F. Monrose, G. Masson, Towards better protocol dentfcaton usng profle HMMs, JHU Tech. Rep. JHU-SPAR52, Jun. 25. [2] L.R. Rabner, A tutoral on Hdden Markov Models and Selected Applcatons n Speech Recognton, Procs. IEEE, Vol. 77, no. 2, pp , Feb [3] Sep. 27. [4] Sep. 27. [5] Mar. 28. [6] Mar. 28. [7] Mar. 28, [8] Sep. 27. [9] W. Feng, F. Chang, W. Feng, J. Walpole, A Traffc Characterzaton of Popular On-lne Games, IEEE/ACM Trans. Networkng, Vol. 3, no. 3, pp , Jun. 25. [2] A. Botta, A. Danott, A. Pescapé, G. Ventre, Searchng for Invarants n Network Games Traffc, Poster at Co-Next 26 Student Workshop. [2] sa/2/mantan/samsec.mspx, Sep. 27. [22] overvew.php, Sep. 27. [23] H. Jang, A.W. Moore, Z. Ge, S. Jn, J. Wang, Lghtweght Applcaton Classfcaton for Network Management, SIGCOMM Work. Internet Network Manag., Aug. 27. [24] O. Marques, P. Ballargeon, Desgn of a multmeda traffc classfer for Snort, Informaton Manag. & Computer Securty J., Vol. 5, no. 2, Jun /8/$ IEEE. Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the IEEE "GLOBECOM" 28 proceedngs.

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

Statistical Approach for Offline Handwritten Signature Verification

Statistical Approach for Offline Handwritten Signature Verification Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching)

Face Verification Problem. Face Recognition Problem. Application: Access Control. Biometric Authentication. Face Verification (1:1 matching) Face Recognton Problem Face Verfcaton Problem Face Verfcaton (1:1 matchng) Querymage face query Face Recognton (1:N matchng) database Applcaton: Access Control www.vsage.com www.vsoncs.com Bometrc Authentcaton

More information

HowHow to Find the Best Online Stock Broker

HowHow to Find the Best Online Stock Broker A GENERAL APPROACH FOR SECURITY MONITORING AND PREVENTIVE CONTROL OF NETWORKS WITH LARGE WIND POWER PRODUCTION Helena Vasconcelos INESC Porto hvasconcelos@nescportopt J N Fdalgo INESC Porto and FEUP jfdalgo@nescportopt

More information

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by

8.5 UNITARY AND HERMITIAN MATRICES. The conjugate transpose of a complex matrix A, denoted by A*, is given by 6 CHAPTER 8 COMPLEX VECTOR SPACES 5. Fnd the kernel of the lnear transformaton gven n Exercse 5. In Exercses 55 and 56, fnd the mage of v, for the ndcated composton, where and are gven by the followng

More information

L10: Linear discriminants analysis

L10: Linear discriminants analysis L0: Lnear dscrmnants analyss Lnear dscrmnant analyss, two classes Lnear dscrmnant analyss, C classes LDA vs. PCA Lmtatons of LDA Varants of LDA Other dmensonalty reducton methods CSCE 666 Pattern Analyss

More information

Single and multiple stage classifiers implementing logistic discrimination

Single and multiple stage classifiers implementing logistic discrimination Sngle and multple stage classfers mplementng logstc dscrmnaton Hélo Radke Bttencourt 1 Dens Alter de Olvera Moraes 2 Vctor Haertel 2 1 Pontfíca Unversdade Católca do Ro Grande do Sul - PUCRS Av. Ipranga,

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending

Bayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success

More information

Sketching Sampled Data Streams

Sketching Sampled Data Streams Sketchng Sampled Data Streams Florn Rusu, Aln Dobra CISE Department Unversty of Florda Ganesvlle, FL, USA frusu@cse.ufl.edu adobra@cse.ufl.edu Abstract Samplng s used as a unversal method to reduce the

More information

A cooperative connectionist IDS model to identify independent anomalous SNMP situations

A cooperative connectionist IDS model to identify independent anomalous SNMP situations A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

An artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes. S. T. A. Niaki*

An artificial Neural Network approach to monitor and diagnose multi-attribute quality control processes. S. T. A. Niaki* Journal of Industral Engneerng Internatonal July 008, Vol. 4, No. 7, 04 Islamc Azad Unversty, South Tehran Branch An artfcal Neural Network approach to montor and dagnose multattrbute qualty control processes

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

Ad-Hoc Games and Packet Forwardng Networks

Ad-Hoc Games and Packet Forwardng Networks On Desgnng Incentve-Compatble Routng and Forwardng Protocols n Wreless Ad-Hoc Networks An Integrated Approach Usng Game Theoretcal and Cryptographc Technques Sheng Zhong L (Erran) L Yanbn Grace Lu Yang

More information

Gender Classification for Real-Time Audience Analysis System

Gender Classification for Real-Time Audience Analysis System Gender Classfcaton for Real-Tme Audence Analyss System Vladmr Khryashchev, Lev Shmaglt, Andrey Shemyakov, Anton Lebedev Yaroslavl State Unversty Yaroslavl, Russa vhr@yandex.ru, shmaglt_lev@yahoo.com, andrey.shemakov@gmal.com,

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

A graph-theoretic framework for isolating botnets in a network

A graph-theoretic framework for isolating botnets in a network SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks (212) Publshed onlne n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 SPECIAL ISSUE PAPER A graph-theoretc framework for solatng botnets n a network

More information

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification

Logistic Regression. Lecture 4: More classifiers and classes. Logistic regression. Adaboost. Optimization. Multiple class classification Lecture 4: More classfers and classes C4B Machne Learnng Hlary 20 A. Zsserman Logstc regresson Loss functons revsted Adaboost Loss functons revsted Optmzaton Multple class classfcaton Logstc Regresson

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada wellng@cs.toronto.edu Abstract Ths s a note to explan support vector machnes.

More information

Web Spam Detection Using Machine Learning in Specific Domain Features

Web Spam Detection Using Machine Learning in Specific Domain Features Journal of Informaton Assurance and Securty 3 (2008) 220-229 Web Spam Detecton Usng Machne Learnng n Specfc Doman Features Hassan Najadat 1, Ismal Hmed 2 Department of Computer Informaton Systems Faculty

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

On the Interaction between Load Balancing and Speed Scaling

On the Interaction between Load Balancing and Speed Scaling On the Interacton between Load Balancng and Speed Scalng Ljun Chen and Na L Abstract Speed scalng has been wdely adopted n computer and communcaton systems, n partcular, to reduce energy consumpton. An

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

The Load Balancing of Database Allocation in the Cloud

The Load Balancing of Database Allocation in the Cloud , March 3-5, 23, Hong Kong The Load Balancng of Database Allocaton n the Cloud Yu-lung Lo and Mn-Shan La Abstract Each database host n the cloud platform often has to servce more than one database applcaton

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Conversion between the vector and raster data structures using Fuzzy Geographical Entities

Conversion between the vector and raster data structures using Fuzzy Geographical Entities Converson between the vector and raster data structures usng Fuzzy Geographcal Enttes Cdála Fonte Department of Mathematcs Faculty of Scences and Technology Unversty of Combra, Apartado 38, 3 454 Combra,

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network

On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg

More information

Statistical Methods to Develop Rating Models

Statistical Methods to Develop Rating Models Statstcal Methods to Develop Ratng Models [Evelyn Hayden and Danel Porath, Österrechsche Natonalbank and Unversty of Appled Scences at Manz] Source: The Basel II Rsk Parameters Estmaton, Valdaton, and

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting

Causal, Explanatory Forecasting. Analysis. Regression Analysis. Simple Linear Regression. Which is Independent? Forecasting Causal, Explanatory Forecastng Assumes cause-and-effect relatonshp between system nputs and ts output Forecastng wth Regresson Analyss Rchard S. Barr Inputs System Cause + Effect Relatonshp The job of

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

The Greedy Method. Introduction. 0/1 Knapsack Problem

The Greedy Method. Introduction. 0/1 Knapsack Problem The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

Use of Numerical Models as Data Proxies for Approximate Ad-Hoc Query Processing

Use of Numerical Models as Data Proxies for Approximate Ad-Hoc Query Processing Preprnt UCRL-JC-?????? Use of Numercal Models as Data Proxes for Approxmate Ad-Hoc Query Processng R. Kammura, G. Abdulla, C. Baldwn, T. Crtchlow, B. Lee, I. Lozares, R. Musck, and N. Tang U.S. Department

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Planning for Marketing Campaigns

Planning for Marketing Campaigns Plannng for Marketng Campagns Qang Yang and Hong Cheng Department of Computer Scence Hong Kong Unversty of Scence and Technology Clearwater Bay, Kowloon, Hong Kong, Chna (qyang, csch)@cs.ust.hk Abstract

More information

J. Parallel Distrib. Comput.

J. Parallel Distrib. Comput. J. Parallel Dstrb. Comput. 71 (2011) 62 76 Contents lsts avalable at ScenceDrect J. Parallel Dstrb. Comput. journal homepage: www.elsever.com/locate/jpdc Optmzng server placement n dstrbuted systems n

More information

Detecting Credit Card Fraud using Periodic Features

Detecting Credit Card Fraud using Periodic Features Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

v a 1 b 1 i, a 2 b 2 i,..., a n b n i.

v a 1 b 1 i, a 2 b 2 i,..., a n b n i. SECTION 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS 455 8.4 COMPLEX VECTOR SPACES AND INNER PRODUCTS All the vector spaces we have studed thus far n the text are real vector spaces snce the scalars are

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

Loop Parallelization

Loop Parallelization - - Loop Parallelzaton C-52 Complaton steps: nested loops operatng on arrays, sequentell executon of teraton space DECLARE B[..,..+] FOR I :=.. FOR J :=.. I B[I,J] := B[I-,J]+B[I-,J-] ED FOR ED FOR analyze

More information

Title Language Model for Information Retrieval

Title Language Model for Information Retrieval Ttle Language Model for Informaton Retreval Rong Jn Language Technologes Insttute School of Computer Scence Carnege Mellon Unversty Alex G. Hauptmann Computer Scence Department School of Computer Scence

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Network traffic analysis optimization for signature-based intrusion detection systems

Network traffic analysis optimization for signature-based intrusion detection systems Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems

More information