Multi-sensor Data Fusion for Cyber Security Situation Awareness
|
|
- Earl Hodges
- 8 years ago
- Views:
Transcription
1 Avalable onlne at Proceda Envronmental Scences 0 (20 ) rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton Scence and Informaton Applcaton echnology (ESIA 20) echnology Mult-sensor Data Fuson for Cyber Securty Stuaton Awareness Yan Zhang a,b, Shuguang Huang a, Shze Guo b, Junmao Zhu b, a* a Electronc Engneerng Insttute, Hefe , Chna b Insttute of North Electronc Equpment, Bejng 00083, Chna Abstract o analyze the nfluence of securty ncdents on a networed system and accurately evaluate system securty, ths paper proposes a novel cyber securty stuaton assessment model, based on mult-heterogeneous sensors. By usng D-S evdence theory, we fuse securty data submtted from mult-sensors, accordng to the networ topology and the mportance of servces and hosts. Moreover, we adopt the evaluaton polcy that from bottom to top and from local to global n ths model. he evaluaton of a smulated networ ndcates that the proposed approach s sutable for networ envronment, and the evaluaton results are precse and effcent. 20 Publshed by Elsever Ltd. Selecton and/or peer-revew under responsblty of Conference ESIA20 Organzaton 20 Publshed Commttee. by Elsever Ltd. Selecton and/or peer-revew under responsblty of Yjn Wu. Keywords: Sensor; Securty Data; Assessment; Herarchcal Method; Securty Stuaton. Introducton Wth the development of computer networ, nformaton securty deterorates rapdly. o cope wth dfferent types of networ attacs, people often use dfferent types of securty devces (sensor). However, the management of these devces encounters many problems, ncludng Alert Overload, Alert Conflct and hgh False Postve etc. o solve these problems, many studes have tred to apply stuaton awareness to nformaton securty, e.g.: Bass [] proposed mult-sensor data fuson archtecture, Wang et al. [2] proposed the use of neural networ n mult-heterogeneous sensor fuson. We [3] and Zhang [4] mproved the framewor of * Correspondng author. el.: ; fax: E-mal address: eejac@63.com Publshed by Elsever Ltd. Selecton and/or peer-revew under responsblty of Conference ESIA20 Organzaton Commttee. do:0.06/j.proenv
2 030 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) stuaton awareness by jonng n some envronment factors (host number, host servces, servce attacs, etc.), and La [5] used a smple weghted and grey theory to mplement securty stuaton awareness. In ths paper, we use DS Evdence heory to fuse alert that submtted from heterogeneous networ sensors. We perform an experment upon a smulated networ envronment. he results show that the proposed method not only provdes the securty stuaton n the macro system, but also provdes three dfferent levels of assessment of the securty stuaton. 2. Related Wor 2.. Networ securty stuaton awareness Brefly speang, stuaton awareness s to now what s happenng and how to respond. Endsley [6] vewed stuaton awareness as three levels: Percepton, Comprehenson and Projecton. he frst level percepton s to collect data from dfferent sources. he second level comprehenson s to ntegrate and understand these data. And the thrd level projecton s to predct what wll occur wthn a perod of tme. In order to create effcent networ securty stuaton awareness, La [5] proposed a Networ Securty Stuaton Awareness (referred to as NSSA) model. Inspred by Bass [], Lu et al. [7] proposed an nformaton fuson model for networ securty stuaton awareness. Accordng to these studes, current networ securty stuaton awareness only provdes macro nformaton, such as: What nd of networ s beng attaced (Probe, R2L, U2R, DoS...). hs can not help polcy-maers to tae prompt and effectve response. o solve ths problem, we ntroduced the concept of rs assessment, whch can dentfy the most weaness pont DS Evdence heory DS evdence theory s proposed by Shafer n 976. It s used to descrbe dfferent levels of accuracy and often appled to medcal dagnostcs, rs analyss and decson analyss [8]. Before usng the DS fuson rule, the frst step s to defne the target framewor. And then use BPA (Basc Probablty Assgnment) formula to allocate confdence to dfferent sensors. Suppose there are two IDS: O and O 2, and an attac ncdent: H. In O, confdence level m ( H ) represents the probablty that O support the occurrence of H. In O 2, confdence level m 2 ( H ) represents the probablty that O 2 support the occurrence of H. hrough DS rules, the fuson result of O and O 2 evdence s as follows: m( B) m2( C) BCH m2 ( H) () m( B) m2( C) B C After the fuson of the two evdences, m ( ) 2 H s the fnal probablty that the alert may occur. A number of studes have used ths method to lower the False Postve Rate [7] [9]. 3. Proposed Method In ths secton, we proposed a Herarchcal Networ Securty Stuaton Assessment Model (referred HNSSAM) (see Fgure ). hs model jons the DS evdence theory fuson rules wth herarchcal quanttatve rs assessment method, and maes use of confdence level, servce mportance and host mportance. he advantages of ths model are: a) to solve the problem of mass data processng; b) to provde three levels of ntutve securty threat; b) to qucly fnd weanesses n the system or the securty stuaton.
3 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) Mult-Sensors Data Data Verfcaton Formatng D-S Data Fuson Servce Stuaton Assessmen Host Stuaton Assessmen Networ Stuaton Assessmen Stuaton Predcton Fg.. Herarchcal framewor for networ securty stuaton awareness 3.. Pre-processng Data preprocessng module s desgned to collect securty data from dfferent sensors. Data verfcaton mechansm s adopted to determne whether there s a successful attac. By comparng the condtons and the confguraton nformaton (e.g.: OS verson, servces runnng, etc.) necessary for a successful attac, we could smply remove non-mpact attac alert. For example: IDS detected a large number of serv-u drectory traversal attacs whch am at serv-u software runnng on Wndows system. However, the target host s runnng on Lnux system, so attac can not be succeeded. herefore, these nvald alerts should be removed to reduce the number of alerts. Fnally, the securty data wll be converted nto a unform format so as to meet the HNSSAM archtecture D-S Data Fuson Accordng to the basc defnton of DS, we set the target framewor rue _ Postve, False _ Postve. Because the alerts generated by securty equpment clearly have two possbltes: () rue Postve; (2) False Postve, we defne the confdence values of an alert as rue Postve Rate (PR): m (correct alerts) = PR. We obtan PR by supervsed tranng of securty devces n varous attacs. hen the confdence values wll be stored n Knowledge Base for further use. he process of fuson s llustrated n Fgure Herarchcal Quanttatve Stuaton Assessment Fg. 2. D-S rule-based alert fuson model For narratve convenence, we defne the followng concepts: Defnton. A: Attac: he actvtes that trgger FW, IDS, Ant-Vrus and other securty devces to generate an alert. After pre-processng and DS data fuson, attac can be expressed as A AK _ YPE, AK _ BEL, SEVERIY, IME, DIP, where AK _ YPE s representatves of attac
4 032 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) type, AK _ BEL s representatves of the confdence level, SEVERIY s representatves of threat ndex obtaned from the Knowledge Base, IME s representatves of the tme attac taen place, and DIP s representatves of the target host. Defnton 2. Servce Securty Stuaton: he nsecurty degree of a servce after been attaced. Defnton 3. Host Securty Stuaton: he mpact of a number of nsecurty servces on a host. Defnton 4. Networ Securty Stuaton: he mpact of a number of nsecurty hosts on a networ. We frst evaluate how serous the servces provded by the host are under attac. Note that, the mpact of attac on servces s not only related to the level of threat but also related to the networ traffc of user actvtes. Besde, the mpact of attac vares wth dfferent perod of tme [0]. So we proposed the servce securty stuaton assessment formula as follows: B SS 0 j KS t W t Aj (2) In formula (2), S s representatve of servce that s under attac. W s representatve of the weght of tme. We dvde one day nto three contnuous sectons: t, t2, t 3. Based on the statstcal results, networ admnstrators can set each secton a separated traffc descrpton: low, medum, and hgh. he correspondng quanttatve values are, 2, and 3. Followed by normalzaton, we obtan the weght of each tme perodw. W (3) A j s representatve of the value of confdence after alert fuson, j FP _ AK _, FP _ AK _2, HP _ AK _,.... B j s representatve of the severty of the attac. he hgher the value of SSKS t s, the hgher the level of servce threats at tme t s. hen the host securty stuaton s evaluated. he securty stuaton of host s affected by the servces and the securty mechansms [4]. he assessment formula s desgned as follows: WS SS S t SSH t (4) W SP H t, H Host_ A, Host_ B, Host_ C,... SAp SS t s representatves of the securty stuaton of host H at the tme. W S s representatve of the mportance weght of the servce S on host H. SS S s representatves of the securty ndex of the servce S on host H. W SA p s representatves of the mportance weght of the securty standards on host H, SAp Confdentalty, Avalablty, Integrty, Authentcaton, Non _ Repudaton. SP S pq s representatves of the level of nfluence of securty mechansm q on securty standard p, q { encryptng, dgtal _ sgnaturng, access _ controllng...}, p SAp. he greater the value of SSH t s, the hgher the level of the threat to the host H at tme t s. herefore, the networ securty stuaton assessment formula s desgned as follows: SS t W SS t (5) N H H W H s representatves of the mportance weght of host n the networ. he larger the value of SS t s, the hgher threat level of networ at tme t s. N 4. Expermental Results and Analyss o test the effect of ths HNSSAM model, we smulated a mult-sensor networ envronment (see Fgure 3). In ths smulated networ envronment, we deployed four dfferent sensors, the frewall at Internet entry, networ ntruson detecton system, the host ntruson detecton system and ant-vrus software nstalled on the hosts. S pq
5 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) Fg. 3. Expermental networ topology Secton. We dvded one day nto three perods: t = 00:00 ~ 08:00, t 2 = 08:00 ~ 8:00, t 3 = 8:00 ~ 24:00. Each perod s assgned wth a dfferent mportance level. Observed tme and 6 fall n perod t 3, 2 ~ 3 fall n perod t, 4 ~ 5 fall n perod t 2. From to 6, collecton the nformaton that FW, NIDS, HIDS, Ant-Vrus detect attac on Host A, B, C. Secton 2. Accordng to the securty data collected from secton, we loo up the confdence level correspondng to the securty data n the Knowledge Base. By DS fuson rule, we fuse the confdence value. hen the results are multpled by the severty value of attacs n the nowledge base. Fnally, the servce securty stuaton value s obtaned by equ. 2. Secton 3. In accordance wth the analyss of secton 2, we draw the results n Fgure 4 a). We could clearly see n Fgure 4 a) that the RPC servces on the Host A suffer hgher level of threats, whch should be deal wth frstly. Accordng to equ. 4, we obtan the host securty stuaton, as shown n Fgure 4 b). It can be clearly seen that the attacs are actve durng tme to 4. Fg. 4. (a) Securty stuaton of all servces on host A; (b) Securty stuaton of host A Secton 4. In accordance wth the analyss of the results generated n secton 3, t s easy to draw the securty stuaton of all hosts n Fgure 5 a). From ths fgure, admnstrators could fnd out the threat level on each host. Accordng to equ.. 5, we obtan the networ securty stuaton. he results are shown n Fgure 5 b). We could fnd out through ths fgure that ths networ s sufferng more attacs from afternoon to mdnght.
6 034 Yan Zhang et al. / Proceda Envronmental Scences 0 ( 20 ) Fg. 5. (a) Securty stuaton of all hosts on LAN; (b) Securty stuaton of LAN Accordng to the analyss above, t can be seen that HNSSAM framewor provdes three levels of cyber securty stuaton. hs method overcomes the shortcomngs of current herarchcal stuaton awareness systems. It can also assst decson-maers to adjust polcy to enhance securty. 5. Conclusons In ths paper, we analyzed the exstng stuaton assessment algorthms, proposed a novel cyber securty stuaton assessment model based on mult-heterogeneous sensors. Accordng to the proposed model, we mplemented a stuaton awareness system. he evaluaton of a smulated networ ndcates that the approach s sutable for networ envronment, and the evaluaton results are precse and effcent. References [] Bass,., Intruson Detecton Systems and Multsensor Data Fuson, Communcatons of the ACM, Vol. 43, No. 4, Aprl [2] Wang Huqang, La Jbao, and Yng Lang, Networ Securty Stuaton Awareness Based on Heterogeneous Mult-Sensor Data Fuson and Neural Networ, Second Internatonal Multsymposum on Computer and Computatonal Scences, [3] We Yong, Lan Y-Feng, A Networ Securty Stuatonal Awareness Model Based on Log Audt and Performance Correcton[J], Chnese Journal of Computers, 2009,(04) [4] Zhang Yong; an Xao-bn; Cu Xao-ln; X Hong-sheng, Networ Securty Stuaton Awareness Approach Based on Marov Game Model[J], Journal of Software, 20,(03) [5] La J-bao; Wang Yng; Wang Hu-qang Zheng Feng-bng Zhou Bng, Research on Networ Securty Stuaton Awareness System Archtecture Based on Mult-source Heterogeneous Sensors[J], Computer Scence, 20,(03) [6] Endsley, M., Desgn and evaluaton for stuaton awareness enhancement, In Proceedngs of the Human Factors Socety 32nd Annual Meetng, Human Factors Socety, pp. 97-0, 988. [7] Lu Mx, Yu Dongme and Zhang Quyu et al., Networ Securty Stuaton Assessment Based on Data Fuson, 2008 Worshop on Knowledge Dscovery and Data Mnng, [8] Sentz, K. and Ferson, S., Combnaton of Evdence n Dempster-Shafer heory, SAND , Unlmted Release, Aprl [9] Me Habn and Gong Jan, Intruson Alert Correlaton Based On D-S Evdence heory, Communcatons and Networng n Chna, Second Internatonal Conference on IEEE, [0] Chen XZ, Zheng QH and Guan XH et al., Quanttatve herarchcal threat evaluaton model for networ securty, Journal of Software, 2006(04)
A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationNEURO-FUZZY INFERENCE SYSTEM FOR E-COMMERCE WEBSITE EVALUATION
NEURO-FUZZY INFERENE SYSTEM FOR E-OMMERE WEBSITE EVALUATION Huan Lu, School of Software, Harbn Unversty of Scence and Technology, Harbn, hna Faculty of Appled Mathematcs and omputer Scence, Belarusan State
More informationStatistical Approach for Offline Handwritten Signature Verification
Journal of Computer Scence 4 (3): 181-185, 2008 ISSN 1549-3636 2008 Scence Publcatons Statstcal Approach for Offlne Handwrtten Sgnature Verfcaton 2 Debnath Bhattacharyya, 1 Samr Kumar Bandyopadhyay, 2
More informationResearch on Evaluation of Customer Experience of B2C Ecommerce Logistics Enterprises
3rd Internatonal Conference on Educaton, Management, Arts, Economcs and Socal Scence (ICEMAESS 2015) Research on Evaluaton of Customer Experence of B2C Ecommerce Logstcs Enterprses Yle Pe1, a, Wanxn Xue1,
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationA Load-Balancing Algorithm for Cluster-based Multi-core Web Servers
Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationA Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
More informationHP Mission-Critical Services
HP Msson-Crtcal Servces Delverng busness value to IT Jelena Bratc Zarko Subotc TS Support tm Mart 2012, Podgorca 2010 Hewlett-Packard Development Company, L.P. The nformaton contaned heren s subject to
More informationAdaptive Intrusion Detection based on Boosting and Naïve Bayesian Classifier
Adaptve Intruson Detecton based on Boostng and Naïve Bayesan Classfer Dewan Md. Fard Department of CSE Jahangrnagar Unversty Dhaka-1342, Bangladesh Mohammad Zahdur Rahman Department of CSE Jahangrnagar
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationA Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna Lnzheng@malst.xjtu.edu.cn
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationA Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationApplication of an Improved BP Neural Network Model in Enterprise Network Security Forecasting
161 A publcaton of VOL. 46, 15 CHEMICAL ENGINEERING TRANSACTIONS Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 15, AIDIC Servz S.r.l., ISBN 978-88-9568-37-; ISSN 83-916 The Italan Assocaton of
More informationMethodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationMETHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
More informationBayesian Network Based Causal Relationship Identification and Funding Success Prediction in P2P Lending
Proceedngs of 2012 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 25 (2012) (2012) IACSIT Press, Sngapore Bayesan Network Based Causal Relatonshp Identfcaton and Fundng Success
More informationSet. algorithms based. 1. Introduction. System Diagram. based. Exploration. 2. Index
ISSN (Prnt): 1694-0784 ISSN (Onlne): 1694-0814 www.ijcsi.org 236 IT outsourcng servce provder dynamc evaluaton model and algorthms based on Rough Set L Sh Sh 1,2 1 Internatonal School of Software, Wuhan
More informationOptimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
More informationAn Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols
Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp. 79 88 (2015) DOI: 10.6180/jase.2015.18.1.10 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationPerformance Management and Evaluation Research to University Students
631 A publcaton of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Ren, Yancang L, Hupng Song Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Italan Assocaton
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationEvaluation of the information servicing in a distributed learning environment by using monitoring and stochastic modeling
MultCraft Internatonal Journal of Engneerng, Scence and Technology Vol, o, 9, -4 ITERATIOAL JOURAL OF EGIEERIG, SCIECE AD TECHOLOGY wwwest-ngcom 9 MultCraft Lmted All rghts reserved Evaluaton of the nformaton
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More informationA cooperative connectionist IDS model to identify independent anomalous SNMP situations
A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationA Dynamic Energy-Efficiency Mechanism for Data Center Networks
A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,
More informationAutomated Network Performance Management and Monitoring via One-class Support Vector Machine
Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths
More informationVehicle Detection and Tracking in Video from Moving Airborne Platform
Journal of Computatonal Informaton Systems 10: 12 (2014) 4965 4972 Avalable at http://www.jofcs.com Vehcle Detecton and Trackng n Vdeo from Movng Arborne Platform Lye ZHANG 1,2,, Hua WANG 3, L LI 2 1 School
More informationOverview of monitoring and evaluation
540 Toolkt to Combat Traffckng n Persons Tool 10.1 Overvew of montorng and evaluaton Overvew Ths tool brefly descrbes both montorng and evaluaton, and the dstncton between the two. What s montorng? Montorng
More informationTHE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION
Internatonal Journal of Electronc Busness Management, Vol. 3, No. 4, pp. 30-30 (2005) 30 THE APPLICATION OF DATA MINING TECHNIQUES AND MULTIPLE CLASSIFIERS TO MARKETING DECISION Yu-Mn Chang *, Yu-Cheh
More informationHow To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network
Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationA heuristic task deployment approach for load balancing
Xu Gaochao, Dong Yunmeng, Fu Xaodog, Dng Yan, Lu Peng, Zhao Ja Abstract A heurstc task deployment approach for load balancng Gaochao Xu, Yunmeng Dong, Xaodong Fu, Yan Dng, Peng Lu, Ja Zhao * College of
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationDetermination of Integrated Risk Degrees in Product Development Project
Proceedngs of the World Congress on Engneerng and Computer Scence 009 Vol II WCECS 009, October 0-, 009, San Francsco, USA Determnaton of Integrated sk Degrees n Product Development Project D. W. Cho.,
More informationA new anonymity-based protocol preserving privacy based cloud environment
Abstract A new anonymty-based protocol preservng prvacy based cloud envronment Jan Wang 1*, Le Wang 2 1 College of Computer and Informaton Engneerng, Henan Unversty of Economcs and Law, Chna 2 SIAS Internatonal
More informationwww.olr.ccli.com Introducing Online Reporting Your step-by-step guide to the new online copy report Online Reporting
Onlne Reportng Introducng Onlne Reportng www.olr.ccl.com Your step-by-step gude to the new onlne copy report Important nformaton for all lcence holders No more software to download Reportng as you go...
More informationA FEATURE SELECTION AGENT-BASED IDS
A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,
More informationA DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM
A DYNAMIC CUSTOMIZABLE ARCHITECTURE FOR SAAS BASED PLATFORM 1 WEIZHI LIAO, 2 LINFU SUN 1 School of Electromechancal Engneerng, UESTC of Chna, Chengdu 610054, Chna 2 CAD Engneerng Center, Southwest JIAOTONG
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationA system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings
A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationA Falling Detection System with wireless sensor for the Elderly People Based on Ergnomics
Vol.8, o.1 (14), pp.187-196 http://dx.do.org/1.1457/sh.14.8.1. A Fallng Detecton System wth wreless sensor for the Elderly People Based on Ergnomcs Zhenhe e 1, ng L, Qaoxang Zhao and Xue Lu 3 1 College
More informationA Hierarchical Reliability Model of Service-Based Software System
2009 33rd Annual IEEE Internatonal Computer Software and Applcatons Conference A Herarchcal Relablty Model of Servce-Based Software System Lun Wang, Xaoyng Ba, Lzhu Zhou Department of Computer Scence and
More informationLoad Balancing By Max-Min Algorithm in Private Cloud Environment
Internatonal Journal of Scence and Research (IJSR ISSN (Onlne: 2319-7064 Index Coperncus Value (2013: 6.14 Impact Factor (2013: 4.438 Load Balancng By Max-Mn Algorthm n Prvate Cloud Envronment S M S Suntharam
More informationAssessing Student Learning Through Keyword Density Analysis of Online Class Messages
Assessng Student Learnng Through Keyword Densty Analyss of Onlne Class Messages Xn Chen New Jersey Insttute of Technology xc7@njt.edu Brook Wu New Jersey Insttute of Technology wu@njt.edu ABSTRACT Ths
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationGenetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
More informationProduct Quality and Safety Incident Information Tracking Based on Web
Product Qualty and Safety Incdent Informaton Trackng Based on Web News 1 Yuexang Yang, 2 Correspondng Author Yyang Wang, 2 Shan Yu, 2 Jng Q, 1 Hual Ca 1 Chna Natonal Insttute of Standardzaton, Beng 100088,
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationDamage detection in composite laminates using coin-tap method
Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the
More informationMining Feature Importance: Applying Evolutionary Algorithms within a Web-based Educational System
Mnng Feature Importance: Applyng Evolutonary Algorthms wthn a Web-based Educatonal System Behrouz MINAEI-BIDGOLI 1, and Gerd KORTEMEYER 2, and Wllam F. PUNCH 1 1 Genetc Algorthms Research and Applcatons
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationPEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS
PEER REVIEWER RECOMMENDATION IN ONLINE SOCIAL LEARNING CONTEXT: INTEGRATING INFORMATION OF LEARNERS AND SUBMISSIONS Yunhong Xu, Faculty of Management and Economcs, Kunmng Unversty of Scence and Technology,
More informationWeb Object Indexing Using Domain Knowledge *
Web Object Indexng Usng Doman Knowledge * Muyuan Wang Department of Automaton Tsnghua Unversty Bejng 100084, Chna (86-10)51774518 Zhwe L, Le Lu, We-Yng Ma Mcrosoft Research Asa Sgma Center, Hadan Dstrct
More informationHow To Predct On The Web For Hfmd
Proceedngs of the Twenty-Second Internatonal Jont Conference on Artfcal Intellgence Predctng Epdemc Tendency through Search Behavor Analyss Danqng Xu, Yqun Lu, Mn Zhang, Shaopng Ma, Anq Cu, Lyun Ru State
More informationA Study on Secure Data Storage Strategy in Cloud Computing
Journal of Convergence Informaton Technology Volume 5, Number 7, Setember 00 A Study on Secure Data Storage Strategy n Cloud Comutng Danwe Chen, Yanjun He, Frst Author College of Comuter Technology, Nanjng
More informationPerformance Analysis and Coding Strategy of ECOC SVMs
Internatonal Journal of Grd and Dstrbuted Computng Vol.7, No. (04), pp.67-76 http://dx.do.org/0.457/jgdc.04.7..07 Performance Analyss and Codng Strategy of ECOC SVMs Zhgang Yan, and Yuanxuan Yang, School
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationSemantic Link Analysis for Finding Answer Experts *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 28, 51-65 (2012) Semantc Lnk Analyss for Fndng Answer Experts * YAO LU 1,2,3, XIAOJUN QUAN 2, JINGSHENG LEI 4, XINGLIANG NI 1,2,3, WENYIN LIU 2,3 AND YINLONG
More informationA Novel Auction Mechanism for Selling Time-Sensitive E-Services
A ovel Aucton Mechansm for Sellng Tme-Senstve E-Servces Juong-Sk Lee and Boleslaw K. Szymansk Optmaret Inc. and Department of Computer Scence Rensselaer Polytechnc Insttute 110 8 th Street, Troy, Y 12180,
More informationFuzzy TOPSIS Method in the Selection of Investment Boards by Incorporating Operational Risks
, July 6-8, 2011, London, U.K. Fuzzy TOPSIS Method n the Selecton of Investment Boards by Incorporatng Operatonal Rsks Elssa Nada Mad, and Abu Osman Md Tap Abstract Mult Crtera Decson Makng (MCDM) nvolves
More informationIWFMS: An Internal Workflow Management System/Optimizer for Hadoop
IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn
More informationDaily Mood Assessment based on Mobile Phone Sensing
2012 Nnth Internatonal Conference on Wearable and Implantable Body Sensor Networks Daly Mood Assessment based on Moble Phone Sensng Yuanchao Ma Bn Xu Yn Ba Guodong Sun Department of Computer Scence and
More informationResource Management and Organization in CROWN Grid
Resource Management and Organzaton n CROWN Grd Jnpeng Hua, Tanyu Wo, Yunhao Lu Dept. of Computer Scence and Technology, Behang Unversty Dept. of Computer Scence, Hong Kong Unversty of Scence & Technology
More informationModeling and Simulation of Multi-Agent System of China's Real Estate Market Based on Bayesian Network Decision-Making
Int. J. on Recent Trends n Engneerng and Technology, Vol. 11, No. 1, July 2014 Modelng and Smulaton of Mult-Agent System of Chna's Real Estate Market Based on Bayesan Network Decson-Makng Yang Shen, Shan
More informationOptimal Choice of Random Variables in D-ITG Traffic Generating Tool using Evolutionary Algorithms
Optmal Choce of Random Varables n D-ITG Traffc Generatng Tool usng Evolutonary Algorthms M. R. Mosav* (C.A.), F. Farab* and S. Karam* Abstract: Impressve development of computer networks has been requred
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationHow To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet
IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationSearching for Interacting Features for Spam Filtering
Searchng for Interactng Features for Spam Flterng Chuanlang Chen 1, Yun-Chao Gong 2, Rongfang Be 1,, and X. Z. Gao 3 1 Department of Computer Scence, Bejng Normal Unversty, Bejng 100875, Chna 2 Software
More informationEnterprise Master Patient Index
Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an
More informationAn Integrated Approach of AHP-GP and Visualization for Software Architecture Optimization: A case-study for selection of architecture style
Internatonal Journal of Scentfc & Engneerng Research Volume 2, Issue 7, July-20 An Integrated Approach of AHP-GP and Vsualzaton for Software Archtecture Optmzaton: A case-study for selecton of archtecture
More informationResource Scheduling in Desktop Grid by Grid-JQA
The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty
More informationHow To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
More informationCross-Domain Authorization Management Model for Multi- Levels Hybrid Cloud Computing
Internatonal Journal of Securty and Its Applcatons, pp.343-352 http://dx.do.org/10.14257/sa.2015.9.12.33 Cross-Doman Authorzaton Management Model for Mult- Levels Hybrd Cloud Computng L Na 1, Dong Yun-We
More informationFuzzy Set Approach To Asymmetrical Load Balancing In Distribution Networks
Fuzzy Set Approach To Asymmetrcal Load Balancng n Dstrbuton Networks Goran Majstrovc Energy nsttute Hrvoje Por Zagreb, Croata goran.majstrovc@ehp.hr Slavko Krajcar Faculty of electrcal engneerng and computng
More information