High-Performance Hardware Monitors to Protect Network Processors from Data Plane Attacks

Size: px
Start display at page:

Download "High-Performance Hardware Monitors to Protect Network Processors from Data Plane Attacks"

Transcription

1 High-Perormnce Hrdwre Monitors to Protect Network Processors rom Dt Plne Attcks Hrikrishnn Chndrikkutty, Deepk Unnikrishnn, Russell Tessier nd Tilmn Wol Deprtment o Electricl nd Computer Engineering University o Msschusetts, Amherst, MA, USA {chndrikkut,unnikrishnn,tessier,wol}@ecs.umss.edu ABSTRACT The Internet represents n essentil communiction inrstructure tht needs to be protected rom mlicious ttcks. Modern network routers re typiclly implemented using embedded multi-core network processors tht re inherently vulnerble to ttck. Hrdwre monitor subsystems, which cn veriy the behvior o router s pcket processing system t runtime, cn be used to identiy nd respond to n ever-chnging rnge o ttcks. While hrdwre monitors hve primrily been described in the context o generlpurpose computing, our work ocuses on two importnt spects tht re relevnt to the embedded networking domin: We present the design nd prototype implementtion o high-perormnce monitor tht cn trck ech processor instruction with low memory overhed. Additionlly, our monitor is cpble o deending ginst ttcks on processors with Hrvrd rchitecture, the dominnt contemporry network processor orgniztion. We demonstrte tht our monitor rchitecture provides no network slowdown in the bsence o n ttck nd provides the cpbility to drop ttck pckets without otherwise ecting regulr network tric when n ttck occurs. 1. INTRODUCTION The Internet is criticl inrstructure component in tody s society. Mny spects o personl communiction, business trnsctions, entertinment, digitl government, etc. rely on the vilbility nd correct opertion o the Internet. In this work, we ocus on the security o pcket processing unctions tht re necessry to hndle pcket orwrding on network router. The pcket processing component o modern router is typiclly implemented using network processor (NP) system. A network processor hs multiple simple embedded processor cores tht cn be progrmmed to hndle network tric. When chnges re necessry, the sotwre on this network processor cn be chnged to dpt the opertion o the router. Unlike trditionl routers tht hve been bsed on ppliction-speciic Permission to mke digitl or hrd copies o ll or prt o this work or personl or clssroom use is grnted without ee provided tht copies re not mde or distributed or proit or commercil dvntge nd tht copies ber this notice nd the ull cittion on the irst pge. To copy otherwise, to republish, to post on servers or to redistribute to lists, requires prior speciic permission nd/or ee. DAC 13, My 9 June 0, 013, Austin, Texs, USA. Copyright 013 ACM /13/05 $ integrted circuit (ASIC) technology, network-processorbsed routers cn be dpted in their unctionlity. However, this lexibility rises n interesting security problem: routers tht use sotwre-progrmmble pcket processors re vulnerble to ttcks [5]. Vulnerble pcket processing code cn be exploited using mlormed dt pckets to lunch n in-network denil-o-service ttck. This type o ttck on contemporry NPs is ddressed by this pper. To reduce the vulnerbility o pcket processors in routers (s well s embedded processors in generl), digitl circuits tht monitor run-time processor opertion hve been proposed [3, 5, 13]. These hrdwre monitors use inormtion bout correct processor sotwre execution to trck the instructions executed by processor core. I n ttck on the processor occurs, devition rom expected, progrmmed behvior is detected nd recovery process is initited. Compred to sotwre-bsed protection mechnisms (e.g., virus scnners), hrdwre-bsed monitors require less perormnce overhed nd rect ster. In the networking domin, low overhed nd st detection speed re prticulrly importnt. Thereore, there hve been ongoing eorts to urther improve NP protection mechnisms to better support the pplictions supported by NPs nd the processor orgniztion typiclly exhibited by NPs. In this pper, we ddress two key problems tht hve not been previously ddressed in protecting network processors rom sotwre ttcks. An eective NP monitoring system must veriy every instruction tht is executed by the processor nd thus needs to operte t very high speeds. This instruction-bsed monitoring opertion cn be viewed s inite utomton with ixed number o cceptble pths. Prior work in hrdwre monitoring [5, 13] hs been bsed on non-deterministic inite utomton (NFA) implementtions, which potentilly require high memory bndwidth when trcking multiple prllel sttes, or corse veriiction t the level o bsic blocks [3], which my not detect ttcks beore they re executed. For our irst contribution, we present n instruction-level monitoring solution or NPs bsed on deterministic inite utomton (DFA) implementtion, which overcomes the shortcomings o both prior techniques. Prior work in embedded NP security hs ssumed von Neumnn processor rchitecture with combined instruction nd dt memory, where n ttck cn execute code rom the processor stck [5]. Most network processors, however, re bsed on Hrvrd rchitectures tht seprte instruction nd dt memory mking stck-bsed code execution impossible. Thereore, it is questionble whether dt

2 plne ttcks re even possible in networks. For our second contribution, we present n ttck exmple tht demonstrtes the existence o Hrvrd rchitecture ttcks nd we show tht our monitoring system is eective in deending NPs ginst them. The speciic contributions o our pper re: 1. Design o high-perormnce hrdwre monitoring system or NPs: Our pipelined design cn perorm instruction veriiction with single memory red per instruction nd thus cn operte t speeds suicient to mintin line rte networking dt trnser.. Algorithm or construction o deterministic monitoring grph: We present method to convert the monitoring grph o NP instructions, which initilly is non-deterministic due to control-low chnges (e.g. brnches), into deterministic utomton. The representtion o the DFA is compcted to llow or highly eicient implementtion in the hrdwre monitor. 3. Demonstrtion o n ttck on nd deense o Hrvrd rchitecture network processor: We demonstrte n in-network ttck through the dt plne o the network tht exploits n integer overlow vulnerbility to smsh the processor stck nd lunch returnto-librry ttck. This ttck propgtes the ttck pcket nd crshes the processor system. We lso show tht our hrdwre monitor is eective in deending ginst this ttck nd llowing or continued NPbsed router opertion ter ttck identiiction nd recovery. The reminder o the pper presents these contributions in detil.. RELATED WORK Progrmmbility in the pcket processing systems o routers hs been used incresingly widely over the pst decde. Most mjor router vendors employ network processors in their products (e.g., Cisco QuntumFlow [6], Cvium Octeon []). While the progrmmbility o these devices is hidden rom network users, it is used by vendors to extend system unctionlity. It cn be expected tht routers will continue to hve progrmmble pcket processing components, especilly with network virtuliztion [] emerging s promising technology or the uture Internet. While network security s whole hs received much recent ttention (e.g., end-system vulnerbilities leding to botnets [9], worm propgtion [1], etc.), there hs been little ocus on vulnerbilities in the networking inrstructure itsel. Cui et l. [] hve surveyed vulnerbilities in the control plne o networks, where n ttcker cn potentilly gin ccess to the router system. In the dt plne, Chski et l. [5] hve shown n exmple o how simple integer overlow vulnerbility cn be exploited to lunch denilo-service rom within the network. In this cse, single mlormed User Dtgrm Protocol (UDP) pcket triggers the vulnerbility, chnges the network processor s opertion, nd cuses lood o ttck pckets to be sent by the system. We dpt this ttck exmple to processor system bsed on Hrvrd rchitecture in our work to demonstrte the eectiveness o our monitoring system in detecting nd stopping such dt plne ttcks in prcticl networking environment. Tble 1: Comprison o Monitoring Approches. Monitor grnulrity implemen- underlying ttion rchitecture Chski et l. [5] instruction NFA von Neumnn Aror et l. [3] bsic block DFA von Neumnn This pper instruction DFA Hrvrd Protection mechnisms or embedded processors hve been proposed bsed on hrdwre monitors in generl [1,3,5,10,13,15,16]. These monitors dier by the level o monitoring grnulrity (unction clls, bsic blocks, individul instructions) nd i they require chnges to source code or i they re bsed on progrm binries. We only ocus on pproches tht do not require chnges to the processor binries. The min novelty o the monitoring system we present in this pper is highlighted in Tble 1. In contrst to relted work, we cn monitor t the level o individul instructionsnddosousingdfa,whichcnbeimplemented with high perormnce. 3. HARDWARE MONITOR SYSTEM ARCHITECTURE The system rchitecture o the network processor system with security monitor is shown in Figure 1. The network processorshownontheletotheigureisbsedonconventionl Hrvrd rchitecture with seprte dt memory or network pckets nd processing stte nd instruction memory or pcket processing code. For simplicity, only single processor core is shown; the system cn esily be extended or multiple processor cores. The processing monitor on the right side o the igure veriies the opertion o the processor instruction-by-instruction. For every instruction tht is executed on the processor core, hsh vlue o the executed opertion is reported to the monitor. The monitor uses the comprison logic to compre the reported hsh vlue to the inormtion tht is stored in the monitoring grph. The monitoring grph is derived by oline nlysis o the pcket processing code binry. Any ttck on the system necessrily needs to chnge the opertion o the processor core (otherwise the ttck is not eective). This devition leds to the processor reporting hsh vlues tht do not mtch with the monitoring grph. The comprison logic cn detect this devition nd reset the processor in response. In networking, such reset nd recovery opertion is very simple: The current pcket is dropped (i.e., the pcket buer is clered), the processing stte is reset (i.e., the stck is reset), nd processing continues with the next pcket. Since most pcket processing opertions re not stteul nd there is no gurntee tht pckets re relibly delivered, no urther recovery ctions re necessry. The monitoring grph used by the hrdwre monitor is stte mchine, where ech stte represents speciic processor instruction. The stte mchine is derived rom the pcket processing code s illustrted in Figure. Ech processor instruction corresponds to stte. The edges between sttes re lbeled with inormtion relting to next vlid instruction tht cn be executed ter the current instruction. In cse o control low opertions, there my be multiple outgoing edges rom ech stte (ech being vlid trnsition). In our system, we use 3-bit processor (i.e., open source embedded Plsm processor bsed on the MIPS instruction

3 oline nlysis runtime opertion network processor processing code binry processing code instruction memory network processor core dt memory pcket buer network interce hsh o processing instruction reset/ recovery NFA monitoring grph DFA monitoring grph mon. grph mon. memory comprison logic NFA-to-DFA trnsormtion Figure 1: System rchitecture o network processor with security monitor. [ ] 9c: 9c0010 lhu v0,16(s8) 0: nop : c0033 sltiu v0,v0,51 8: bnez v0,d c: nop b0: 3c06666 lui v0,0x6666 b: ori v1,v0,0x191 b8: 9c0010 lhu v0,16(s8) [ ] hrdwre monitor 0 9c c 6 b0 3 b d b8 Figure : Stte mchine genertion rom processing binry. set). The monitoring system uses -bit hsh o the next instruction to lbel edges in the monitoring grph (s hs been recommended in [13]). A hsh (insted o the ull 3-bit instruction) is used to reduce the size o the monitoring grph nd thus to reduce the implementtion overhed o the hrdwre monitor while still llowing instruction-by-instruction monitoring. The use o hsh (or ny other method tht uses mny-to-one mpping), however, leds to two undmentl problems: Attck detection mbiguity: The mny-to-one mpping tht occurs in hsh unction o the monitor my mke it possible or n ttcker to remin undetected. This would require tht the ttck perorms opertions tht led to sequence o hsh vlues tht mtches the monitoring inormtion o vlid code. Mo et l. hve shown tht this probbility decreses geometriclly with the length o the ttck code nd thus is unlikely to led to prcticl ttcks [13] (in prticulr when the hsh unction is not known to the ttcker). We do not consider this issue urther in this pper. Nondeterminism during monitoring: The mny-to-one mpping lso leds to nondeterminism in the monitoring grph. There my be control low instruction where ech o the next instructions hs the sme hsh vlue. As result, the corresponding node in the monitoring grph hs two outgoing edges with the sme hsh vlue (s illustrted in Figure 3). Since this nondeterminism cn continue or multiple such control low opertions, it cn led to complex implementtions [5], potentilly slowing monitor perormnce. In the ollowing section, we show how we cn ddress the ltter problem by converting the nondeterministic monitoring grph into deterministic monitoring grph, which is esier to use in high-perormnce implementtions.. DETERMINISTIC PROCESSOR MONI- TORING To relize deterministic instruction-level monitor, we irst convert the NFA monitoring grph described in the previous section to DFA monitoring grph. We then describe how to implement monitoring system tht uses this DFA grph..1 Construction o Deterministic Monitoring Grph Trcking nondeterministic inite utomt is diicult to implement in prctice since the utomton cn hve multiple ctive sttes. This leds to high bndwidth requirements between the monitoring logic nd the memory tht mintins the NFA since next-stte inormtion or ll ctive sttes hs to be etched in ech itertion. When using DFA, in contrst, only one stte is ctive nd implementtion becomes much esier. To convert n NFA to DFA, stndrd powerset construction lgorithm cn be used [11]. This lgorithm computes ll possible stte sets in which the utomton cn be situted (i.e., the powerset). Bsed on the powerset, DFA is then constructed. Figure shows the DFA tht corresponds to the NFA shown in Figure 3. Note tht stte{3,5} representsthesetsosttestowheresttecnbrnchwhen hsh vlue c is observed. One potentil problem with NFA-to-DFA conversions is tht the number o sttes in the DFA cn grow exponentilly over the number o sttes in the NFA. However, the monitoring NFAs constructed rom binry code do not exhibit this pthologicl behvior. Our experiments indicte tht this increse is smll nd does not led to drsticlly lrger stte mchines (see Section ). Thus, this pproch is eective or creting deterministic hrdwre monitors.. Implementtion o Monitoring System A key chllenge in the implementtion o our hrdwre monitoring system is how to represent the monitoring DFA in memory. The comprison logic needs to be ble to retrieve the inormtion bout next stte trnsitions or every instruction tht it trcks. Thus, stte trnsitions need to be implemented with no more thn one memory ccess per instruction (to keep up with the network processor core) nd be s compct s possible (to minimize the implementtion overhed o the monitor). The inormtion tht needs to be stored in the monitoring memory is illustrted on the let side o Figure 5. Ech stte represents n instruction nd n outgoing trnsition edge rom this stte represents the hsh vlue o the next expected instruction in the execution sequence. For exmple, stte c hs two next sttes, d nd e, with hsh vlues 11 nd 3, respectively.

4 1 3 5 b c d e c Figure 3: Nondeterministic monitoring grph grouping b d 0 g b d 0 g group group c 3 e h c 3 e h group 3 Figure 5: Grouping o DFA sttes. 1 b c {3,5} d Figure : Deterministic monitoring grph ter NFA-to-DFA conversion. A nïve wy to store the stte mchine in RAM would be to store ech stte nd ll its possible edge trnsitions. This would require h entries per stte or n h-bit hsh. Since most sttes hve only one or two outgoing edges, lrge number o edge trnsitions would never be used, leding to ineicient memory use. Assuming tht only two outgoing trnsitions exist or ech stte is lso not esible due to the cses where powerset construction cretes sttes with up to h outgoing edges. Finlly, or perormnce resons we should only use one memory ccess per stte trnsition, which precludes design where sttes with more thn two outgoing edges re hndled s specil cses. Our min ide to compctly represent DFA sttes with vrying numbers o outgoing edges is to encode ll the necessry inormtion in single tble entry nd to group sttes by the number o outgoing edges. The min chllenge in chieving compctness is to llocte exctly the mount o memory tht is needed or ech stte to store next stte inormtion while still being ble to index this memory without degrding to liner serch. In our representtion, we group sttes together i they hve the sme previous stte. A stte belongs to group g i the previous stte hs g outgoing edges. For monitor with -bit hsh vlue, there re 16 possible groups. For exmple, in Figure 5 on the right side, groups re shown with dierent colors. Note tht stte cn belong to multiple groups (e.g., stte belongs to group (becuse hs two outgoing edges, one to b nd one to ) nd to group 3 (becuse e hs three outgoing edges)). The memory lyout nd bsic opertion o our DFA monitor system is shown in Figure 6. The memory contins tuples o {number o next sttes, oset in stte group, vlid hsh vlues on outgoing edges} nd is logiclly divided into groups. The bse ddresses or ech group re stored in registerilewith16entries. Withingroup, thesetsosttes tht shre the previous stte re grouped together (e.g., b nd re together nd d nd e re together). Within set, sttes re ordered by the hsh vlue on their incoming edge (e.g., e beore d becuse hsh vlue 3 is smller thn hsh vlue 11). The hsh comprison block perorms two unctions: it determines i the one-hot coded hsh bit is set in the 16-bit vlue red rom memory nd it determines k, which is the position o the mtching hsh vlue mong the vlid hsh vlues red rom memory. To illustrte the opertion o the monitor, we describe n exmpletrnsition. Assumethemonitorisinsttendthe processor reports n instruction tht leds to hsh vlue o. To perorm the trnsition, the memory row lbeled is red. The tuple in this row indictes tht there re two outgoing edges. The vlid hsh vlues o these two edges e 5 6 reset/ recovery processor instruction 3 1 hsh comprison one-hot encoding bit hsh unction 3 group 1 group group 3 group 16 k (position o mtching hsh mong vlid hsh vlues) 0x0000 0x000 0x0006 group bse ddress dd -1 c b e d h g mult number o next sttes oset in stte group 0 vlid hsh vlues on outgoing edges stte mchine memory 16 group 1 group group 3 Figure 6: Memory representtion o DFA monitoring grph. re stored in the 16-bit vector. To veriy tht the trnsition is vlid, the hsh comprison unit checks i bit is set in the bit vector (which it is). I this bit is not set, then n invlid trnsition tkes plce, indicting n ttck, nd the processor is reset. Ater the check, the next stte (i.e., stte ) in the DFA needs to be ound in memory. To determine theddressothtstte, thebseddressothegroupothe next stte is looked up in the register ile (i.e., 0x000 since the next stte belongs to group ). To this bse ddress, the product o the set size (i.e., group number) nd the oset in the stte group is dded (to index the correct set within the group). Finlly, k is dded, which is the position o the mtching hsh in the bit vector (in our cse 1 since is the irst mtching hsh (i.e., k=0) nd is the second mtching hsh (i.e., k=1)). Thus the memory loction o stte is 0x = 0x003. Note tht ny stte trnsition tkes only one memory red rom stte mchine memory nd lookup into ixed-size register ile. The DFA is represented compctly without wsting ny memory slots (sttes shown with dots in Figure 6 point to other sttes not shown in our exmple). Thus, this representtion lends itsel to high-perormnce implementtion. 5. HARVARD ARCHITECTURE ATTACKS Even though generl memory error techniques (integer overlow, hep overlow etc.) cnnot be used to generte code injection ttcks, Frncillion et l. [8] demonstrted tht code injection ttcks re still esible on Hrvrd rchitecture processor using return-oriented progrmming technique. Here, n ttcker tkes control o return instructions in the stck to chin ttck code rom n existing librry unction. Since the code is lredy present in executble memory, the ttck will not be prevented rom running. In this section, we describe how such n ttck cn be constructed or the networking environment nd how our monitor cn detect it. Figure shows portions o congestion mngement protocol (CM) nd IPV pcket orwrding ppliction used to build n ttck on the network processor system. The

5 Tble : Evlution o monitoring pproches or our new DFA pproch nd previous NFA-only pproch. The mximum number o memory ccesses or our pproch is 1 or ll benchmrks. CM protocol IPV ppliction Figure : Vulnerble ppliction code. congestion mngement protocol inserts custom protocol hederinthepckethederspcebetweentheiphedernd the UDP heder. During this opertion, the code needs to mke sure the new pcket size does not exceed the mximum dtgrm length (the boxed instruction in the CM code). Exploiting n integer overlow vulnerbility, the boundry check in the CM code cn be circumvented nd the stck cn be smshed. To do so, n ttcker sends mlormed UDP pcket with size 0xe (deciml vlue 6553), which willpssthemximumpcketsizecheck(since6533+1= 10, due to integer overlow). As result, the pcket pylod is copied over the stck. The pcket pylod o the ttck pcket is crted in such wy tht the return ddress is overwritten to direct the control low to the IPv pcket orwrding ppliction (which is librry code on the processor core) nd the vlue o the ip dst low ield is 0x. The port inormtion gets updted with this vlue (the boxed instruction in the IPv code), orwrding the ttck pcket to ll the outgoing ports nd then crshing the processor system. As result, the ttck pcket gets orwrded to ll outgoing interces beore the system crshes, thus propgting the ttck through the network. Since our hrdwre monitor hs no vlid edge between the sttes in the middle o the CM ppliction nd the IPv ppliction, this ttck is detected. As soon s the control low chnges, the hsh vlues reported by the processor no longer mtch the monitoring inormtion nd the system is reset, dropping the mlicious pcket. 6. PROTOTYPE SYSTEM IMPLEMENTA- TION Although n end-system would likely be implemented in ixed logic, we hve prototyped the described network processor nd hrdwre monitoring system on Strtix IV GX30 FPGA locted on n Alter DE bord. The router inrstructure surrounding the NP core is tken rom the NetFPGA reerence router, which hs been migrted to the Strtix IV mily. The DE bord hs our 1 Gbps Ethernet interces or pcket input/output. In our prototype implementtion, the single-core network processor is implemented s sot core nd the monitor is implemented in FPGA logic (using Qurtus or synthesis, plce nd route). Only the memory initiliztion iles need to be reconigured on per-ppliction bsis. To run networking code on the processor plus monitor system, the code is irst pssed through stndrd MIPS-GCC compiler low to generte ssembly-level instructions. The output o the compiler llows or the identiiction o brnch instructions nd their trget ddresses. In our current im- Chski [5] Ours Netw. No. NFA Mx. DFA Mem. Mem. ppli- o sttes mem. sttes entries overction instr. ccess hed rg % mtc % red % wq % plementtion, ll possible brnch trgets nd return instructions re nlyzed t compile time. The monitor cn hndle n rbitrry number o indirect brnches to stticlly known trgets (e.g., return ddresses) since the NFA representtion llows ny number o outgoing brnches. (Our monitor cnnot hndle indirect brnches to stticlly unknown trgets tht re resolved t run time, but such progrmming constructs did not pper in ny o 11 benchmrk pplictions tht we looked t.) The NFA-to-DFA conversion strts with nondeterministic NFA representtion obtined rom the compiler inormtion. Through powerset construction, DFA is constructed. This DFA is then converted into memory initiliztion ile using the process described in Section nd is loded into the monitor when the processing binry is instlled in the processor. To evlute our system, our benchmrks rom the NPbench suite[1] were processed with this low.. EVALUATION RESULTS.1 Monitoring Grphs The results o generting instruction-level monitoring grphs or both our pproch nd previous pproch [5] re illustrted in Tble. The number o entries in the stte mchine memory (Figure 6) or ech benchmrk re shown in the Mem. entries column. A cler beneit o the new pproch is speed. In ll cses, only one ccess to the monitor memory is required or ny benchmrk (including the our shown here). The previous NFA-bsed pproch requires up to three memory ccesses or the benchmrks tested nd potentilly up to 16 or other benchmrks. The conversion rom n NFA to DFA does incur memory overhed o.% on verge or the benchmrks. Tble 3: Resource Utiliztion Resources Secure Network DE Avilble monitor proc. interce in FPGA LUTs 10 3,9 3,803 18,00 FFs 6,10 38, 18,00 Mem. bits 131,0 01,16,550,800 1,65,9

6 Attck Pcket Norml Pcket Norml Pcket orwrded This mteril is bsed upon work supported by the Ntionl Science Foundtion under Grnt No We grteully cknowledge Alter Corportion s dontion o the DE bords nd Qurtus sotwre. Attck detected & pcket dropped Figure 8: Simultion wveorms showing the identiiction o n ttck pcket nd the successul orwrding o the subsequent pcket. This behvior ws conirmed using hrdwre.. Monitoring Speed nd Eectiveness Our network processor nd monitoring system were successully implemented on the DE pltorm. The lookup tble (LUT), lip lop (FF), nd memory resources required or the network processor core, monitor, nd other interce circuitry or the router (e.g. buers, input rbiter, queuing control, etc) re shown in Tble 3. The NP memory includes spce or up to 096 monitor memory entries. All circuitry operted t 15 MHz, the sme clock speed or the system without the monitor. Experiments in simultion nd in the lb on FPGA hrdwre showed tht the processor is ble to orwrd pckets rnging in size rom 6 to 1500 bytes per pcket t the sme rte under monitoring s without monitoring (e.g. no slowdown or monitoring). For hrdwre experiments, pckets were generted nd trnsmitted to the DE with the NP nd monitor t 1 Gbps line rte by seprte DE crd serving s pcket genertor. This sme crd ws used to receive the processed pckets rom the crd with the NP. In inl experiment, we tested the bility o the monitorbsed system to detect nd recover rom n ttck. The vulnerble ppliction code shown in Figure ws implemented nd used with the NP to send copies o pcket to ll ports o the router nd then crsh the router. We conirmed this behvior or system without monitor both in simultion nd in hrdwre. As shown in Figure 8, ter the monitor ws dded to the system, the ttck pcket ws successully identiied, the NP ws reset, nd subsequent regulr pckets were routed successully. This behvior ws veriied using our DE hrdwre setup. 8. SUMMARY AND FUTURE WORK The eective use o the Internet depends on relible network routers tht re impervious to ttck. In this pper, we hve described high-perormnce monitor or network processor tht requires only single memory lookup per network processor instruction. This single memory lookup is mintined regrdless o the complexity o the NP progrm using n NFA-to-DFA trnsltion o the monitoring grph. Our monitor, which trcks individul NP instructions, hs been veriied in hrdwre using n NP with Hrvrd rchitecture. The presence o monitoring does not slow down NP opertion since it is perormed outside o the opertionl pths o the NP. In the uture, we pln to evlute our monitoring pproch using multi-core network processor. Acknowledgements 9. REFERENCES [1] Abdi, M., Budiu, M., Erlingsson, Ú., nd Ligtti, J. Control-low integrity principles, implementtions, nd pplictions. In ACM Conerence on Computer nd Communiction Security (CCS) (Alexndri, VA, Nov. 005), pp [] Anderson, T., Peterson, L., Shenker, S., nd Turner, J. Overcoming the Internet impsse through virtuliztion. Computer 38, (Apr. 005), 3 1. [3] Aror, D., Rvi, S., Rghunthn, A., nd Jh, N. K. Secure embedded processing through hrdwre-ssisted run-time monitoring. In Proc. o the Design, Automtion nd Test in Europe Conerence nd Exhibition (DATE 05) (Munich, Germny, Mr. 005), pp [] Cvium Networks. OCTEON Plus CN58XX to 16-Core MIPS6-Bsed SoCs. Mountin View, CA, 008. [5] Chski, D., nd Wol, T. Attcks nd deenses in the dt plne o networks. IEEE Trnsctions on Dependble nd Secure Computing 9, 6 (Nov. 01), [6] Cisco Systems, Inc. The Cisco QuntumFlow Processor: Cisco s Next Genertion Network Processor. Sn Jose, CA, Feb [] Cui, A., Song, Y., Prbhu, P. V., nd Stolo, S. J. Brve new world: Pervsive insecurity o embedded network devices. In Proc. o 1th Interntionl Symposium on Recent Advnces in Intrusion Detection (RAID) (Sint-Mlo, Frnce, Sept. 009), vol. 558 o Lecture Notes in Computer Science, pp [8] Frncillon, A., nd Cstellucci, C. Code injection ttcks on Hrvrd-rchitecture devices. In Proc. o the 15th ACM Conerence on Computer nd Communictions Security (CSS) (Alexndri, VA, Oct. 008), pp [9] Geer, D. Mlicious bots threten network security. Computer 38, 1 (005), [10] Gognit, G., Wol, T., Burleson, W., Diguet, J.-P., Bossuet, L., nd Vslin, R. Reconigurble hrdwre or high-security/high-perormnce embedded systems: the SAFES perspective. IEEE Trnsctions on Very Lrge Scle Integrtion (VLSI) Systems 16, (Feb. 008), [11] Hopcrot, J. E., nd Ullmn, J. D. Introduction to Automt Theory, Lnguges, nd Computtion. Addison-Wesley, 199. [1] Lee, B. K., nd John, L. K. NpBench: A benchmrk suite or control plne nd dt plne pplictions or network processors. In Proc. o IEEE Interntionl Conerence on Computer Design (ICCD) (Sn Jose, CA, Oct. 003), pp [13] Mo, S., nd Wol, T. Hrdwre support or secure processing in embedded systems. IEEE Trnsctions on Computers 59, 6 (June 010), [1] Moore, D., Shnnon, C., nd Brown, J. Code-Red: cse study on the spred nd victims o n Internet worm. In IMW 0: Proceedings o the nd ACM SIGCOMM Workshop on Internet mesurement (Mrseille, Frnce, Nov. 00), pp [15] Rgel, R. G., nd Prmeswrn, S. IMPRES: integrted monitoring or processor relibility nd security. In Proc. o the 3rd Annul Conerence on Design Automtion (DAC) (Sn Frncisco, CA, USA, July 006), pp [16] Zmbreno, J., Choudhry, A., Simh, R., Nrhri, B., nd Memon, N. SAFE-OPS: An pproch to embedded sotwre security. Trnsctions on Embedded Computing Sys., 1 (Feb. 005),

How To Network A Smll Business

How To Network A Smll Business Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd business. Introducing technology

More information

Small Business Networking

Small Business Networking Why network is n essentil productivity tool for ny smll business Effective technology is essentil for smll businesses looking to increse the productivity of their people nd processes. Introducing technology

More information

Introducing Kashef for Application Monitoring

Introducing Kashef for Application Monitoring WextWise 2010 Introducing Kshef for Appliction The Cse for Rel-time monitoring of dtcenter helth is criticl IT process serving vriety of needs. Avilbility requirements of 6 nd 7 nines of tody SOA oriented

More information

How To Set Up A Network For Your Business

How To Set Up A Network For Your Business Why Network is n Essentil Productivity Tool for Any Smll Business TechAdvisory.org SME Reports sponsored by Effective technology is essentil for smll businesses looking to increse their productivity. Computer

More information

Vendor Rating for Service Desk Selection

Vendor Rating for Service Desk Selection Vendor Presented By DATE Using the scores of 0, 1, 2, or 3, plese rte the vendor's presenttion on how well they demonstrted the functionl requirements in the res below. Also consider how efficient nd functionl

More information

Enterprise Risk Management Software Buyer s Guide

Enterprise Risk Management Software Buyer s Guide Enterprise Risk Mngement Softwre Buyer s Guide 1. Wht is Enterprise Risk Mngement? 2. Gols of n ERM Progrm 3. Why Implement ERM 4. Steps to Implementing Successful ERM Progrm 5. Key Performnce Indictors

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 02/13 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

2. Transaction Cost Economics

2. Transaction Cost Economics 3 2. Trnsction Cost Economics Trnsctions Trnsctions Cn Cn Be Be Internl Internl or or Externl Externl n n Orgniztion Orgniztion Trnsctions Trnsctions occur occur whenever whenever good good or or service

More information

Is Competition Among Charities Bad?

Is Competition Among Charities Bad? Is Competition Among Chrities Bd? Inkyung Ch nd Willim Neilson Tes A&M University, College Sttion, TX 7783 December Abstrct This pper studies tht the eect o incresed competition mong chrities or dontions,

More information

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( )

Polynomial Functions. Polynomial functions in one variable can be written in expanded form as ( ) Polynomil Functions Polynomil functions in one vrible cn be written in expnded form s n n 1 n 2 2 f x = x + x + x + + x + x+ n n 1 n 2 2 1 0 Exmples of polynomils in expnded form re nd 3 8 7 4 = 5 4 +

More information

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report

DlNBVRGH + Sickness Absence Monitoring Report. Executive of the Council. Purpose of report DlNBVRGH + + THE CITY OF EDINBURGH COUNCIL Sickness Absence Monitoring Report Executive of the Council 8fh My 4 I.I...3 Purpose of report This report quntifies the mount of working time lost s result of

More information

Health insurance marketplace What to expect in 2014

Health insurance marketplace What to expect in 2014 Helth insurnce mrketplce Wht to expect in 2014 33096VAEENBVA 06/13 The bsics of the mrketplce As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum

More information

Network Configuration Independence Mechanism

Network Configuration Independence Mechanism 3GPP TSG SA WG3 Security S3#19 S3-010323 3-6 July, 2001 Newbury, UK Source: Title: Document for: AT&T Wireless Network Configurtion Independence Mechnism Approvl 1 Introduction During the lst S3 meeting

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-265 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-280 Technicl notes on using Anlog Devices DSPs, processors nd development tools Visit our Web resources http://www.nlog.com/ee-notes nd http://www.nlog.com/processors or e-mil

More information

JaERM Software-as-a-Solution Package

JaERM Software-as-a-Solution Package JERM Softwre-s--Solution Pckge Enterprise Risk Mngement ( ERM ) Public listed compnies nd orgnistions providing finncil services re required by Monetry Authority of Singpore ( MAS ) nd/or Singpore Stock

More information

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff

Protocol Analysis. 17-654/17-764 Analysis of Software Artifacts Kevin Bierhoff Protocol Anlysis 17-654/17-764 Anlysis of Softwre Artifcts Kevin Bierhoff Tke-Awys Protocols define temporl ordering of events Cn often be cptured with stte mchines Protocol nlysis needs to py ttention

More information

Data replication in mobile computing

Data replication in mobile computing Technicl Report, My 2010 Dt repliction in mobile computing Bchelor s Thesis in Electricl Engineering Rodrigo Christovm Pmplon HALMSTAD UNIVERSITY, IDE SCHOOL OF INFORMATION SCIENCE, COMPUTER AND ELECTRICAL

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs VoIP (Voice over Internet Protocol) offers low cost lterntive to expensive trditionl phone services nd is rpidly becoming the communictions system of choice for smll

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Econ 4721 Money and Banking Problem Set 2 Answer Key

Econ 4721 Money and Banking Problem Set 2 Answer Key Econ 472 Money nd Bnking Problem Set 2 Answer Key Problem (35 points) Consider n overlpping genertions model in which consumers live for two periods. The number of people born in ech genertion grows in

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Blackbaud The Raiser s Edge

Blackbaud The Raiser s Edge Riser s Edge Slesce.com Comprison Summry Introduction (continued) Chrt -(continued) Non-Prit Strter Pck Compny Bckground Optionl Technology Both Slesce modules supports hs become include over Slesce.com

More information

Helicopter Theme and Variations

Helicopter Theme and Variations Helicopter Theme nd Vritions Or, Some Experimentl Designs Employing Pper Helicopters Some possible explntory vribles re: Who drops the helicopter The length of the rotor bldes The height from which the

More information

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment

ClearPeaks Customer Care Guide. Business as Usual (BaU) Services Peace of mind for your BI Investment ClerPeks Customer Cre Guide Business s Usul (BU) Services Pece of mind for your BI Investment ClerPeks Customer Cre Business s Usul Services Tble of Contents 1. Overview...3 Benefits of Choosing ClerPeks

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

AntiSpyware Enterprise Module 8.5

AntiSpyware Enterprise Module 8.5 AntiSpywre Enterprise Module 8.5 Product Guide Aout the AntiSpywre Enterprise Module The McAfee AntiSpywre Enterprise Module 8.5 is n dd-on to the VirusScn Enterprise 8.5i product tht extends its ility

More information

How To Reduce Telecommunictions Costs

How To Reduce Telecommunictions Costs Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Hillsborough Township Public Schools Mathematics Department Computer Programming 1

Hillsborough Township Public Schools Mathematics Department Computer Programming 1 Essentil Unit 1 Introduction to Progrmming Pcing: 15 dys Common Unit Test Wht re the ethicl implictions for ming in tody s world? There re ethicl responsibilities to consider when writing computer s. Citizenship,

More information

EasyMP Network Projection Operation Guide

EasyMP Network Projection Operation Guide EsyMP Network Projection Opertion Guide Contents 2 About EsyMP Network Projection Functions of EsyMP Network Projection... 5 Vrious Screen Trnsfer Functions... 5 Instlling the Softwre... 6 Softwre Requirements...6

More information

Small Business Cloud Services

Small Business Cloud Services Smll Business Cloud Services Summry. We re thick in the midst of historic se-chnge in computing. Like the emergence of personl computers, grphicl user interfces, nd mobile devices, the cloud is lredy profoundly

More information

4. DC MOTORS. Understand the basic principles of operation of a DC motor. Understand the operation and basic characteristics of simple DC motors.

4. DC MOTORS. Understand the basic principles of operation of a DC motor. Understand the operation and basic characteristics of simple DC motors. 4. DC MOTORS Almost every mechnicl movement tht we see round us is ccomplished by n electric motor. Electric mchines re mens o converting energy. Motors tke electricl energy nd produce mechnicl energy.

More information

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER

WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Interntionl Journl of Computers nd Applictions, Vol. 9, No., 007 WEB DELAY ANALYSIS AND REDUCTION BY USING LOAD BALANCING OF A DNS-BASED WEB SERVER CLUSTER Y.W. Bi nd Y.C. Wu Abstrct Bsed on our survey

More information

The 8 Essential Layers of Small-Business IT Security

The 8 Essential Layers of Small-Business IT Security The 8 Essentil Lyers of Smll-Business IT Security While there is no technology tht cn gurntee your network is truly impenetrble, you cn significntly reduce your risk by deploying multiple lyers of defense.

More information

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING

TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING TITLE THE PRINCIPLES OF COIN-TAP METHOD OF NON-DESTRUCTIVE TESTING Sung Joon Kim*, Dong-Chul Che Kore Aerospce Reserch Institute, 45 Eoeun-Dong, Youseong-Gu, Dejeon, 35-333, Kore Phone : 82-42-86-231 FAX

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Reasoning to Solve Equations and Inequalities

Reasoning to Solve Equations and Inequalities Lesson4 Resoning to Solve Equtions nd Inequlities In erlier work in this unit, you modeled situtions with severl vriles nd equtions. For exmple, suppose you were given usiness plns for concert showing

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

System-Level Security for Network Processors with Hardware Monitors

System-Level Security for Network Processors with Hardware Monitors System-Level Security or Network Processors with Hardware Monitors Kekai Hu, Tilman Wol, Thiago Teixeira and Russell Tessier Department o Electrical and Computer Engineering University o Massachusetts,

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business

How To Get A Free Phone Line From A Cell Phone To A Landline For A Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs TechAdvisory.org SME Reports sponsored by Cybernut Solutions provides outsourced IT support from welth of knowledgeble technicins nd system dministrtors certified

More information

2 DIODE CLIPPING and CLAMPING CIRCUITS

2 DIODE CLIPPING and CLAMPING CIRCUITS 2 DIODE CLIPPING nd CLAMPING CIRCUITS 2.1 Ojectives Understnding the operting principle of diode clipping circuit Understnding the operting principle of clmping circuit Understnding the wveform chnge of

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control

Section 5.2, Commands for Configuring ISDN Protocols. Section 5.3, Configuring ISDN Signaling. Section 5.4, Configuring ISDN LAPD and Call Control Chpter 5 Configurtion of ISDN Protocols This chpter provides instructions for configuring the ISDN protocols in the SP201 for signling conversion. Use the sections tht reflect the softwre you re configuring.

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org

Virtual Machine. Part II: Program Control. Building a Modern Computer From First Principles. www.nand2tetris.org Virtul Mchine Prt II: Progrm Control Building Modern Computer From First Principles www.nnd2tetris.org Elements of Computing Systems, Nisn & Schocken, MIT Press, www.nnd2tetris.org, Chpter 8: Virtul Mchine,

More information

Decision Rule Extraction from Trained Neural Networks Using Rough Sets

Decision Rule Extraction from Trained Neural Networks Using Rough Sets Decision Rule Extrction from Trined Neurl Networks Using Rough Sets Alin Lzr nd Ishwr K. Sethi Vision nd Neurl Networks Lbortory Deprtment of Computer Science Wyne Stte University Detroit, MI 48 ABSTRACT

More information

Experiment 6: Friction

Experiment 6: Friction Experiment 6: Friction In previous lbs we studied Newton s lws in n idel setting, tht is, one where friction nd ir resistnce were ignored. However, from our everydy experience with motion, we know tht

More information

VoIP for the Small Business

VoIP for the Small Business VoIP for the Smll Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become

More information

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control

Space Vector Pulse Width Modulation Based Induction Motor with V/F Control Interntionl Journl of Science nd Reserch (IJSR) Spce Vector Pulse Width Modultion Bsed Induction Motor with V/F Control Vikrmrjn Jmbulingm Electricl nd Electronics Engineering, VIT University, Indi Abstrct:

More information

Small Businesses Decisions to Offer Health Insurance to Employees

Small Businesses Decisions to Offer Health Insurance to Employees Smll Businesses Decisions to Offer Helth Insurnce to Employees Ctherine McLughlin nd Adm Swinurn, June 2014 Employer-sponsored helth insurnce (ESI) is the dominnt source of coverge for nonelderly dults

More information

Engineer-to-Engineer Note

Engineer-to-Engineer Note Engineer-to-Engineer Note EE-220 Technicl notes on using Anlog Devices DSPs, processors nd development tools Contct our technicl support t dsp.support@nlog.com nd t dsptools.support@nlog.com Or visit our

More information

Regular Sets and Expressions

Regular Sets and Expressions Regulr Sets nd Expressions Finite utomt re importnt in science, mthemtics, nd engineering. Engineers like them ecuse they re super models for circuits (And, since the dvent of VLSI systems sometimes finite

More information

VoIP for the Small Business

VoIP for the Small Business Reducing your telecommunictions costs Reserch firm IDC 1 hs estimted tht VoIP system cn reduce telephony-relted expenses by 30%. Voice over Internet Protocol (VoIP) hs become vible solution for even the

More information

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning

Software Cost Estimation Model Based on Integration of Multi-agent and Case-Based Reasoning Journl of Computer Science 2 (3): 276-282, 2006 ISSN 1549-3636 2006 Science Publictions Softwre Cost Estimtion Model Bsed on Integrtion of Multi-gent nd Cse-Bsed Resoning Hsn Al-Skrn Informtion Technology

More information

ffiiii::#;#ltlti.*?*:j,'i#,rffi

ffiiii::#;#ltlti.*?*:j,'i#,rffi 5..1 EXPEDTNG A PROJECT. 187 700 6 o 'o-' 600 E 500 17 18 19 20 Project durtion (dys) Figure 6-6 Project cost vs. project durtion for smple crsh problem. Using Excel@ to Crsh Project T" llt ffiiii::#;#ltlti.*?*:j,'i#,rffi

More information

Total Data Protection for Sensitive Data Wherever It May Flow

Total Data Protection for Sensitive Data Wherever It May Flow Totl Dt Protection for Sensitive Dt Wherever It My Flow PGP Corportion nd Protegrity protect sensitive dt throughout its lifecycle, while enforcing nd verifying policy requirements for complince. Protegrity

More information

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist

Techniques for Requirements Gathering and Definition. Kristian Persson Principal Product Specialist Techniques for Requirements Gthering nd Definition Kristin Persson Principl Product Specilist Requirements Lifecycle Mngement Elicit nd define business/user requirements Vlidte requirements Anlyze requirements

More information

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES

LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES LINEAR TRANSFORMATIONS AND THEIR REPRESENTING MATRICES DAVID WEBB CONTENTS Liner trnsformtions 2 The representing mtrix of liner trnsformtion 3 3 An ppliction: reflections in the plne 6 4 The lgebr of

More information

Facilitating Rapid Analysis and Decision Making in the Analytical Lab.

Facilitating Rapid Analysis and Decision Making in the Analytical Lab. Fcilitting Rpid Anlysis nd Decision Mking in the Anlyticl Lb. WHITE PAPER Sponsored by: Accelrys, Inc. Frnk Brown, Ph.D., Chief Science Officer, Accelrys Mrch 2009 Abstrct Competitive success requires

More information

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3.

Treatment Spring Late Summer Fall 0.10 5.56 3.85 0.61 6.97 3.01 1.91 3.01 2.13 2.99 5.33 2.50 1.06 3.53 6.10 Mean = 1.33 Mean = 4.88 Mean = 3. The nlysis of vrince (ANOVA) Although the t-test is one of the most commonly used sttisticl hypothesis tests, it hs limittions. The mjor limittion is tht the t-test cn be used to compre the mens of only

More information

How To Improve Network Performance

How To Improve Network Performance Per 1 INSIDE: 1 Emphsis on ppliction performnce mens greter need for network mngement 2 The role of performnce mngement in ppliction delivery 3 Advnced performnce mngement cpbilities The New Er of Network

More information

Electrical Engineering

Electrical Engineering Electricl Engineering R Wherever Energy Flows or Goods re Produced Our Electricl Engineering Group provides electricl design nd consulting services to electric & gs utilities, oil & gs pipelines, refineries,

More information

Health insurance exchanges What to expect in 2014

Health insurance exchanges What to expect in 2014 Helth insurnce exchnges Wht to expect in 2014 33096CAEENABC 11/12 The bsics of exchnges As prt of the Affordble Cre Act (ACA or helth cre reform lw), strting in 2014 ALL Americns must hve minimum mount

More information

Application-Level Traffic Monitoring and an Analysis on IP Networks

Application-Level Traffic Monitoring and an Analysis on IP Networks Appliction-Level Trffic Monitoring nd n Anlysis on IP Networks Myung-Sup Kim, Young J. Won, nd Jmes Won-Ki Hong Trditionl trffic identifiction methods bsed on wellknown port numbers re not pproprite for

More information

Lecture 3 Gaussian Probability Distribution

Lecture 3 Gaussian Probability Distribution Lecture 3 Gussin Probbility Distribution Introduction l Gussin probbility distribution is perhps the most used distribution in ll of science. u lso clled bell shped curve or norml distribution l Unlike

More information

Recognition Scheme Forensic Science Content Within Educational Programmes

Recognition Scheme Forensic Science Content Within Educational Programmes Recognition Scheme Forensic Science Content Within Eductionl Progrmmes one Introduction The Chrtered Society of Forensic Sciences (CSoFS) hs been ccrediting the forensic content of full degree courses

More information

4.11 Inner Product Spaces

4.11 Inner Product Spaces 314 CHAPTER 4 Vector Spces 9. A mtrix of the form 0 0 b c 0 d 0 0 e 0 f g 0 h 0 cnnot be invertible. 10. A mtrix of the form bc d e f ghi such tht e bd = 0 cnnot be invertible. 4.11 Inner Product Spces

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypssing Spce Explosion in Regulr Expression Mtching for Network Intrusion Detection n Prevention Systems Jignesh Ptel, Alex Liu n Eric Torng Dept. of Computer Science n Engineering Michign Stte University

More information

Unleashing the Power of Cloud

Unleashing the Power of Cloud Unleshing the Power of Cloud A Joint White Pper by FusionLyer nd NetIQ Copyright 2015 FusionLyer, Inc. All rights reserved. No prt of this publiction my be reproduced, stored in retrievl system, or trnsmitted,

More information

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory

Implementation Evaluation Modeling of Selecting ERP Software Based on Fuzzy Theory Implementtion Evlution Modeling of Selecting ERP Softwre Bsed on Fuzzy Theory Xukn Xu 1, Ydong Jing 1 nd Zheng Shi 2 1 Informtion Mngement Deprtment, Chngzhou Cmpus, Hohi University, Chngzhou 213022, Jingsu,

More information

5 a LAN 6 a gateway 7 a modem

5 a LAN 6 a gateway 7 a modem STARTER With the help of this digrm, try to descrie the function of these components of typicl network system: 1 file server 2 ridge 3 router 4 ckone 5 LAN 6 gtewy 7 modem Another Novell LAN Router Internet

More information

Factoring Polynomials

Factoring Polynomials Fctoring Polynomils Some definitions (not necessrily ll for secondry school mthemtics): A polynomil is the sum of one or more terms, in which ech term consists of product of constnt nd one or more vribles

More information

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team

Numeracy across the Curriculum in Key Stages 3 and 4. Helpful advice and suggested resources from the Leicestershire Secondary Mathematics Team Numercy cross the Curriculum in Key Stges 3 nd 4 Helpful dvice nd suggested resources from the Leicestershire Secondry Mthemtics Tem 1 Contents pge The development of whole school policy 3 A definition

More information

According to Webster s, the

According to Webster s, the dt modeling Universl Dt Models nd P tterns By Len Silversn According Webster s, term universl cn be defined s generlly pplicble s well s pplying whole. There re some very common ptterns tht cn be generlly

More information

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K

T H E S E C U R E T R A N S M I S S I O N P R O T O C O L O F S E N S O R A D H O C N E T W O R K Z E S Z Y T Y N A U K O W E A K A D E M I I M A R Y N A R K I W O J E N N E J S C I E N T I F I C J O U R N A L O F P O L I S H N A V A L A C A D E M Y 2015 (LVI) 4 (203) A n d r z e j M r c z k DOI: 10.5604/0860889X.1187607

More information

Corporate Compliance vs. Enterprise-Wide Risk Management

Corporate Compliance vs. Enterprise-Wide Risk Management Corporte Complince vs. Enterprise-Wide Risk Mngement Brent Sunders, Prtner (973) 236-4682 November 2002 Agend Corporte Complince Progrms? Wht is Enterprise-Wide Risk Mngement? Key Differences Why Will

More information

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam

1.00/1.001 Introduction to Computers and Engineering Problem Solving Fall 2011 - Final Exam 1./1.1 Introduction to Computers nd Engineering Problem Solving Fll 211 - Finl Exm Nme: MIT Emil: TA: Section: You hve 3 hours to complete this exm. In ll questions, you should ssume tht ll necessry pckges

More information

Portfolio approach to information technology security resource allocation decisions

Portfolio approach to information technology security resource allocation decisions Portfolio pproch to informtion technology security resource lloction decisions Shivrj Knungo Deprtment of Decision Sciences The George Wshington University Wshington DC 20052 knungo@gwu.edu Abstrct This

More information

Efficient load-balancing routing for wireless mesh networks

Efficient load-balancing routing for wireless mesh networks Computer Networks 51 (007) 50 66 www.elsevier.com/locte/comnet Efficient lod-blncing routing for wireless mesh networks Yigl Bejerno, Seung-Je Hn b, *,1, Amit Kumr c Bell Lbortories, Lucent Technologies,

More information

All pay auctions with certain and uncertain prizes a comment

All pay auctions with certain and uncertain prizes a comment CENTER FOR RESEARC IN ECONOMICS AND MANAGEMENT CREAM Publiction No. 1-2015 All py uctions with certin nd uncertin prizes comment Christin Riis All py uctions with certin nd uncertin prizes comment Christin

More information

Section 7-4 Translation of Axes

Section 7-4 Translation of Axes 62 7 ADDITIONAL TOPICS IN ANALYTIC GEOMETRY Section 7-4 Trnsltion of Aes Trnsltion of Aes Stndrd Equtions of Trnslted Conics Grphing Equtions of the Form A 2 C 2 D E F 0 Finding Equtions of Conics In the

More information

belief Propgtion Lgorithm in Nd Pent Penta

belief Propgtion Lgorithm in Nd Pent Penta IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 375 Itertive Trust nd Reputtion Mngement Using Belief Propgtion Ermn Aydy, Student Member, IEEE, nd Frmrz Feri, Senior

More information

Numerical Methods of Approximating Definite Integrals

Numerical Methods of Approximating Definite Integrals 6 C H A P T E R Numericl Methods o Approimting Deinite Integrls 6. APPROXIMATING SUMS: L n, R n, T n, AND M n Introduction Not only cn we dierentite ll the bsic unctions we ve encountered, polynomils,

More information

Logical or physical organisation and data independence

Logical or physical organisation and data independence Four FILE STRUCTURES Introduction This chpter is minly concerned with the wy in which file structures re used in document retrievl. Most surveys of file structures ddress themselves to pplictions in dt

More information

Warm-up for Differential Calculus

Warm-up for Differential Calculus Summer Assignment Wrm-up for Differentil Clculus Who should complete this pcket? Students who hve completed Functions or Honors Functions nd will be tking Differentil Clculus in the fll of 015. Due Dte:

More information

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2

Quality Evaluation of Entrepreneur Education on Graduate Students Based on AHP-fuzzy Comprehensive Evaluation Approach ZhongXiaojun 1, WangYunfeng 2 Interntionl Journl of Engineering Reserch & Science (IJOER) ISSN [2395-6992] [Vol-2, Issue-1, Jnury- 2016] Qulity Evlution of Entrepreneur Eduction on Grdute Students Bsed on AHP-fuzzy Comprehensive Evlution

More information

New Internet Radio Feature

New Internet Radio Feature XXXXX XXXXX XXXXX /XW-SMA3/XW-SMA4 New Internet Rdio Feture EN This wireless speker hs een designed to llow you to enjoy Pndor*/Internet Rdio. In order to ply Pndor/Internet Rdio, however, it my e necessry

More information

Reputation management for distributed service-oriented architectures

Reputation management for distributed service-oriented architectures Reputtion mngement for distributed service-oriented rchitectures Article Accepted version C. Crpnzno, F. Milzzo, A. De Pol, G. Lo Re In Proceedings of the Fourth IEEE Interntionl Conference on Self- Adptive

More information

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION

THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION KENYA THE INTELLIGENT VEHICLE RECOVERY AND FLEET MANAGEMENT SOLUTION INTRODUCTION Hving estblished itself in no less thn eleven Sub-Shrn countries nd with more thn 230 000 vehicles lredy on its system

More information

Tutorial on How to Create Electric Machine Models

Tutorial on How to Create Electric Machine Models PSIM Sotwre Tutoril on How to Crete Electric Mchine Models Powersi Inc. Septber 2009 www.powersitech.co Tutoril on Creting Electric Mchine Models Users cn crete electric chine odels using the bsic unction

More information

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes

9.3. The Scalar Product. Introduction. Prerequisites. Learning Outcomes The Sclr Product 9.3 Introduction There re two kinds of multipliction involving vectors. The first is known s the sclr product or dot product. This is so-clled becuse when the sclr product of two vectors

More information

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab.

DEVELOPMENT. Introduction to Virtualization E-book. anow is the time to realize all of the benefits of virtualizing your test and development lab. Introduction to Virtuliztion E-book S Now is the time to relize ll of the benefits of virtulizing your test nd development lb. YOUR CHAPTER 3 p 2 A TEST AND p 4 VOLATILE IT S p 7 p 9 p 10 YOUR CHAPTER

More information