An Adaptive Method for Source-end Detection of Pulsing DoS Attacks

Size: px
Start display at page:

Download "An Adaptive Method for Source-end Detection of Pulsing DoS Attacks"

Transcription

1 , pp A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology, Dalia, Chia yu_mig1111@dlut.edu.c Abstract The itermittet attackig behavior of pulsig deial of service (PDoS) attacks poses a real challege to the existig DoS detectio methods. I this paper, a adaptive method is preseted to meet this challege. Three features distiguish this method from others. (i) No assumptio is made o the distributio of the traffic samples. (ii) Automatic adjustmet of the detectio threshold accordig to the traffic coditios. (iii) Timely detectio of the ed of a PDoS attack. Simulatio results validate the efficacy of the proposed method i source-ed detectio of PDoS attacks. They show (i) the miimum malicious traffic that ca be detected by the proposed method is about 20% of the backgroud traffic, uder the requiremets for detectio delays of the start ad the ed of a PDoS attack are withi 3 observatio periods; (ii) the proposed method is more sesitive to pulsig SYN floodig traffic tha it is to pulsig UDP floodig traffic. Keywords: Pulsig deial of service, adaptive detectio, aomaly detectio, etwork security 1. Itroductio At SIGCOMM 2003, Kuzmaovic ad Kightly proposed a ew geeratio of DoS attacks, which could decrease the throughput of ormal TCP traffic by periodically sedig high-volume traffic i a short period. They amed it shrew attack [1]. By further ad deep study o shrew attacks, X.Luo et al., proposed a geeric defiitio of PDoS (Pulsig Deial of Service) [2]. That is, a DoS attack ca be called a PDoS attack oly if its attack traffic is set i a itermittet way. By this defiitio, a shrew attack is cosidered as a kid of PDoS attacks. Differet from traditioal DoS attacks, PDoS traffic is set periodically ad lasts for a short time withi each attackig period. Therefore, it is more difficult to detect PDoS attacks. Accordig to the differet deploymet locatios, a autoomous DoS defese systems ca be classified ito source-ed defese, victim-ed defese ad itermediate-etwork defese [3]. Amog them, source-ed refers to those etworks that uwittigly host attackig machies; victim-ed refers to the target etwork or the etwork that hosts the target machies; itermediate-etwork meas the ifrastructure betwee the attackig machies ad the target. I recet years, source-ed defese agaist DoS attacks has bee a hotspot i etwork security. Several methods have bee proposed for aomaly detectio of the sourceed traffic. Amog them, the oe used i the D-WARD system [4, 5] is widely accepted. It adopts a set of legitimate traffic models to idetify legitimate traffic ad detect or costrai malicious traffic. Ufortuately, these models eed to be updated periodically ad therefore caot adapt to the frequet chages i etwork traffic. This paper expatiates o our latest Mauscript received ; revised ; accepted. ISSN: IJSIA Copyright c 2013 SERSC

2 study o source-ed defese agaist PDoS attacks. Symmetry is a obvious pheomeo i two-way commuicatios that follow a request/respose paradigm, such as HTTP traffic, DNS traffic, NTP traffic ad some types of ICMP traffic. I these commuicatios, oe party seds a request to its peer party, ad waits for a reply before sedig ay more packets. For such commuicatios, it is aomalous to observe a aggressive sedig rate coupled with a low respose rate. Usually, such a aomalous evet may idicate that some local hosts are ivolved i a attack. A source-ed defese system may be deployed to detect those aomalies that disrupt the symmetry i these two-way commuicatios [6, 7], but it is ow challeged by the subtlety ad complexity of the PDoS traffic, ad the bottleeck is how to select thresholds to adapt to the variability of traffic samples. I this paper, a oparametric adaptive method is preseted to meet this challege. Three distict features make this method differet from others i detectio of DoS traffic. (i) No assumptio is made o the distributio of the traffic samples. (ii) Automatic adjustmet of the detectio threshold accordig to the traffic coditios. (iii) Timely detectio of the ed of a aomalous evet. Rest of this paper is orgaized as follows. Sectio 2 gives a brief overview of related works o PDoS detectio methods. Sectio 3 presets the desig of a adaptive method for source-ed detectio of PDoS attacks. Sectio 4 presets the simulatio results o five real traffic traces. Sectio 5 cocludes this paper. 2. Related Works I a few papers [8-11], several methods are proposed for aomaly detectio whe distributios of the traffic samples ivolve ukow parameters. Although these methods are successful i some coditios, two shortcomigs of them are exposed whe used i aomaly detectio of etwork traffic. The first oe is all the methods are desiged with fixed cofiguratios, which ca ot adapt to the frequet chages of etwork traffic. The secod oe is they all require a parametric model for the observatios so that correspodig probability distributio fuctios ca be applied to the desig ad aalysis of these methods; i practice, however, it is usually very difficult to have a prior kowledge about the distributio of etwork traffic. Therefore, it is of crucial importace to desig a itelliget detectio method which ca automatically adjust its parameters to achieve the best performace possible ad work without a prior kowledge about the distributio of the observatios, that is, it is oparametric. Luo ad Chag proposed a two-stage detectio system to detect PDoS attacks o the receiver side [2]. Their method is based o the presece of two types of traffic aomalies iduced by PDoS attacks: periodic fluctuatios i the iboud TCP data traffic ad a declie i the tred of the outboud TCP ackowledgemet (ACK) traffic. I the first stage, the detectio system moitors the iboud data ad outboud ACK traffic usig discrete wavelet trasform. I the secod stage, a oparametric CUSUM algorithm is employed to detect the aomalies. Experimet results show the system is effective i detectig PDoS attacks with costat attack periods. However, it is ieffective i detectig floodig-based DoS attacks because such attacks will ot cause periodic fluctuatios i TCP traffic. Hussai et al., proposed to differetiate betwee sigle-source ad multi-source DoS attacks [12] by aalyzig spectrum of the etwork traffic. Che et al., foud the power spectrum desity of a traffic stream cotaiig shrew attacks has much higher eergy i lowfrequecy bad as compared with legitimate traffic. Based o this observatio, they proposed a spectral template matchig method to detect shrew attacks [13, 14]. However, all these spectrum-based methods are ieffective i detectig PDoS attacks with differet attackig frequecies ad itervals. 280 Copyright c 2013 SERSC

3 Su et al., proposed to detect shrew attacks usig a dyamic time warpig method which is divided ito two stages [15]. I the first stage, autocorrelatio is used to extract the periodic patters i the iboud etwork traffic ad elimiate the problem of time shiftig. I the secod stage, a slightly modified dyamic time warpig algorithm is used to detect the sigature of a shrew attack based o its autocorrelatio coefficiet. However, performace of this method is usatisfactory whe used i detectig PDoS attacks which are ot separated by a costat iterval. Moreover, such methods are ieffective i detectig floodig-based DoS attacks because the assumed square-wave patters i such methods do ot exhibit i the traffic uder attack. The D-WARD system is desiged ad implemeted for source-ed defese of DoS attacks. It adopts a useful metric that computes ratio of the iboud TCP traffic to the outboud TCP ACK traffic i detectig DDoS attacks [4]. Such a metric is also adopted i the Vaguard DoS detectio system [16, 17]. I both systems, however, a fixed ratio of the iboud TCP traffic to the outboud TCP ACK traffic is used to distiguish a attack flow from legitimate oes, which caot adapt to the frequet chages i etwork traffic. Therefore, it is of crucial importace to desig a itelliget detectio method which ca automatically adjust its detectio parameters to adapt to the chagig etwork coditios. I [7], I have proposed a oparametric adaptive CUSUM method for etwork aomaly detectio. This paper expatiates o my latest study of source-ed defese agaist PDoS attacks. Its mai cotributio is to propose a adaptive detectio method for source-ed detectio of PDoS attacks. 3. Desig of a Adaptive Method for Source-ed Detectio of PDoS Attacks 3.1. Problem Formulatio Let us begi by givig the problem formulatio of PDoS detectio before we go deep ito the desig of the proposed adaptive detectio method. Suppose X={x, =1,2, } is a sequece of idepedet radom variables observed sequetially, ad x =[(O - I )/O ] +. Respectively, O ad I deote the umber of outgoig requests ad icomig replies collected withi the th observatio period which is represeted by the symbol T. x + is equal to x if x>0 ad 0 otherwise. For legitimate traffic, O is approximately equal to I, thus we have x 1. Normally, the mea of X (deoted by μ X ) is stable ad close to 1. This coclusio has bee referred by Mirkovic [4]. It is also supported by our aalysis o some real traffic datasets collected at Dalia Uiversity of Techology. Figure 1 gives the result of our aalysis o oe of those datasets. As we ca see, a aomalous evet occurs ad μ X is icreased at a certai momet (radom ad ukow). Whe the aomaly eds, the mea of X is decreased to ormal. Figure 2 illustrates this process. However, o prior kowledge is kow about the probability distributio fuctio of X. The aim of a PDoS detectio method is to accurately detect the start ad the ed of the PDoS attack as soo as possible Desig of the Method Firstly, the slidig widow mechaism is adopted to alleviate the o-statioary ifluece of X o the method. Size of the widow is deoted by N, ad elemets i the widow are j j j deoted by w, where 0 j N-1 ad =0, 1, 2,. Usually, w is iitialized by 0 w0 = a, where Copyright c 2013 SERSC 281

4 0 a 1. I practice, a ca be empirically set ad it does ot have much ifluece o the performace of the method. Figure 1. Aalysis of x based o Oe of the Real Traffic Dataset Figure 2. Illustratio of PDoS Detectio Secodly, the test statistic t is costructed as N 1 = ( 2 j= 0 t j 2 x w 1 ), = 1,, (1) Thirdly, the detectio threshold for raisig a alarm o the start of a PDoS attack is set as N 1 1 1) j = 0 δ = OA/ ( OA + O 1 G start 2 = N (( 1 w 1) δ) (2) j where w = ( w /N ad δ is the ormalized itesity of the aggressive sedig rate. δ is defied as ) requests i a observatio period ad 1, where O A deotes the umber of aggressive outgoig O deotes the averaged umber of ormal outgoig th requests i the 1 observatio period. To reduce false alarms, threshold violatios are couted. If the couter (deoted by Num) reaches a specified umber τ s, a alarm is raised ad the couter is reset to zero. Detectio results are deoted by d, by which d =1 is for raisig alarms ad d =0 for o alarms. Update of elemets i the slidig widow depeds o the detectio results, as ca be see from the codes i Table 1, which gives the key codes for judgig the start of a PDoS attack. Lastly, aother two thresholds, ed G ad G_saved, are used i cacelig a alarm. G_saved ed is set whe a alarm is raised, as ca be see i Table 1. G is set as ed 2 G = 0.5 N ((1 w 1) δ ). The same couter used for reducig false alarms is also used here to avoid missig alarms. A alarm caot be caceled util the couter reaches aother specified umber τ e. I this proposed method, τ s ad τ e are respectively cosidered as the requiremets for detectio delays of the start ad the ed of a PDoS attack. Codes for judgig the ed of a aomalous evet are give i Table Copyright c 2013 SERSC

5 4. Simulatios ad Aalysis Five real traffic traces are used to validate the proposed method. Three of them were collected by a Edace DAG card at Dalia uiversity of techology (DLUT) with a OC- 48c PoS lik coected to CERNET. The other two were collected by the NLANR group at the Uiversity of Aucklad (Auck) with a OC3 Iteret access lik. A summary of these traces is give i Table 3. Table 1. Key Codes for Judgig the Start of a PDoS Attack Table 2. Key Codes for Judgig the Ed of a PDoS Attack Table 3. Summary of the Real Traffic Traces used i the Experimets Trace Start time Ru legth IP headers DLUT-1 09:10:01,Aug 11, :46: millio DLUT-2 09:10:02, Sep 12, :30: millio DLUT-3 14:18:59, Oct 21, :00: millio Auck-1 18:59:16, Ju 8, :00:43 14 millio Auck-2 12:00:00, Ju 9, :00:00 22 millio Firstly, simulatios o source-ed detectio of SYN floodig attacks were carried out to illustrate the efficacy of the proposed method. I these simulatios, the aggressive floodig rates were assumed costat after the attacks were lauched. Durig a attack, the pulsig attack traffic lasted 10 miutes, ad the it stopped for 5 miutes. Some results of the simulatios o the trace of DLUT-1, Auck-1 ad Auck-2 are preseted i Figure 3-Figure 5. For the DLUT-1 trace, four pulsig attacks were lauched respectively at the 105 th, 210 th, 315 th ad 420 th observatio periods, ad each attack persisted for 30 miutes. For the Auck-1 trace, five pulsig attacks were lauched respectively at the 75 th, 255 th, 435 th, 615 th ad 795 th observatio periods, ad each attack persisted for 45 miutes. For the Auck-2 trace, six pulsig attacks were lauched respectively at the 75 th, 255 th, 435 th, 615 th, 795 th ad 975 th Copyright c 2013 SERSC 283

6 observatio periods, ad each attack persisted for 45 miutes. The observatio period T was set to 20 secods. Other parameters ivolved i the proposed method were set as follows: N=4, α=0.1, δ=0.2 ad τ s =τ e =3. Figure 3. Simulatio Results o DLUT-1 Trace Figure 4. Simulatio Results o Auck-1 Trace 284 Copyright c 2013 SERSC

7 Figure 5. Simulatio Results o Auck-2 Trace Secodly, detailed iformatio about the simulatios is preseted to show the efficiecy of the proposed method. For each trace, two types of PDoS traffic were icluded. Respectively, they are SYN floodig traffic ad UDP floodig traffic. All the attacks are lauched every 15 miutes, ad the burstig time of each attackig machies is 10 miutes. Other parameters ivolved i the proposed method were set as follows: N=4, α=0.1, δ=0.2, ad τ s =τ e =3. I this paper, we emphasize o studyig the detectio of low itesity attacks with the detectio delays kept as short as possible. Table 4 ad Table 5 give the averaged detectio results o pulsig SYN floodig traffic ad pulsig UDP floodig traffic by the proposed method after 30 experimets o each trace. Table 4. Averaged Detectio Results o Pulsig SYN Floodig Traffic DLUT-1 DLUT-2 DLUT-3 Auck-1 Auck-2 δ τs ( T ) τ ( ) e T Table 5. Averaged Detectio Results o Pulsig UDP Floodig Traffic DLUT-1 DLUT-2 DLUT-3 Auck-1 Auck-2 δ τs ( T ) τ ( ) e T Two coclusios ca be draw from both tables. (1) Uder the requiremet that the detectio delays be withi oe miute, the lowest Copyright c 2013 SERSC 285

8 itesity of the attacks that ca be detected by the proposed method is This result excels those obtaied i [18, 19] where the lowest itesity of the attacks that ca be detected by the oparametric CUSUM method is (2) The proposed method is more sesitive to the pulsig SYN floodig traffic tha the pulsig UDP floodig traffic. This is because the proportio betwee outgoig SYN packets ad icomig ACK packets is more regular ad closer to 1. I fact, the low itesity of the PDoS attacks that ca be detected by the proposed method depeds o the users requiremets o δ, which reflects the aomalies of the PDoS attacks. As a example, Table 6 gives aother group of the detectio results o pulsig SYN floodig traffic whe δ=0.15 ad other parameters were kept uchaged. As we ca see, the lowest itesity of the attacks that ca be detected is further decreased. However, we thik δ=0.15 is isufficiet to discrimiate betwee the attacks ad the ormal fluctuatio of legitimate traffic so far as SYN floodig attacks are cocered. The experimetal results show the choice of δ completely depeds o the related applicatios ad it rests with the users. Table 6. Averaged Detectio Results o Pulsig SYN Floodig Traffic whe δ=0.15 DLUT-1 DLUT-2 DLUT-3 Auck-1 Auck-2 δ τs ( T ) τ ( ) e T Coclusio I this paper, a adaptive method is preseted for source-ed detectio of PDoS attacks. This method requires little kowledge of the etwork traffic except a loose symmetry betwee the outgoig packets ad the icomig packets. Three distict features of this method are emphasized. Firstly, o assumptio is made o the distributio of the traffic samples. Secodly, it succeeds i implemetig a selfadjustig detectio threshold, which makes it adapt to various traffic coditios. Thirdly, it reacts quickly to the ed of the PDoS attacks. Experimets o real traffic traces show the efficacy of this method i detectig low itesity PDoS attacks. I the future, we pla to employ this method i detectig other DDoS attacks such as DRDoS, SYN/ACK attacks ad RESET attacks. Ackowledgemets This work was supported by (1) Natioal Natural Sciece Foudatio of Chia (Grat No ); (2) the Scietific Research Foudatio for Ph.Ds of Liaoig Provice, Chia (Grat No ). Refereces [1] A. Kuzmaovic ad E. W. Kightly, Low-rate TCP-targeted Deial of Service Attacks: the Shrew vs. the Mice ad Elephats, Proceedigs of ACM SIGCOMM 2003 Coferece o Applicatios, Techologies, Architectures, ad Protocols for Computer Commuicatio, Karlsruhe, Germay, (2003) August [2] X. Luo, ad R. Chag, O a New Class of Pulsig Deial-of-Service Attacks ad the Defese, Proceedigs of Network ad Distributed System Security Symposium, Sa Diego, USA, (2005) February 3-4. [3] Y. Mig, A Noparametric Adaptive CUSUM Method ad Its Applicatio i Source-Ed Defese agaist SYN Floodig Attacks, WuHa Uiversity Joural of Natural Sciece, vol. 16, o. 5, (2011), pp Copyright c 2013 SERSC

9 [4] J. Mirkovic ad P. Reiher, D-WARD: A Source-Ed Defese Agaist Floodig Deial-of-Service Attacks, IEEE Trasactios o Depedable ad Secure Computig, vol. 2, o. 3, (2005), pp [5] O. Pal, P. Jai, S. Goyal, Zia Saquib ad B. L. Meezes, Itrusio Detectio Usig Graph Support: A Hybrid Approach of Supervised ad Usupervised Techiques, Iteratioal Joural of Advacemets i Computig Techology, vol. 2, o. 3, (2010), pp [6] X. Liu, X. Yag ad Y. Xia, NetFece: prevetig iteret deial of service from iside out, SIGCOMM Computer Commuicatio Review, vol. 40, o. 4, (2010), pp [7] M. Yu, A oparametric adaptive CUSUM method ad its applicatio i etwork aomaly detectio, Iteratioal Joural of Advacemets i Computig Techology, vol. 4, o. 1, (2012), pp [8] S. Ehlerta, D. Geeiatakisb ad T. Magedaz, Survey of etwork security systems to couter SIP-based deial-of-service attacks, Computers & Security, vol. 29, o. 2, (2010), pp [9] H. K. Yi, P. K. Park, S. Mi ad J. C. Ryou, DDoS Detectio Algorithm Usig the Bidirectioal Sessio, Commuicatios i Computer ad Iformatio Sciece: Computer Networks, vol. 160, (2010), pp [10] Z. Li, Y. Gao ad Y. Che, HiFIND: A high-speed flow-level itrusio detectio approach with DoS resiliecy, Computer Networks, vol. 54, o. 8, (2010), pp [11] O. I. Sheluhi, A. A. Atayero ad A. B. Garmashev, Detectio of Teletraffic Aomalies Usig Multifractal Aalysis, Iteratioal Joural of Advacemets i Computig Techology, vol. 3, o. 4, (2011), pp [12] A. Hussai, J. Heidema ad C. Papadopoulos, A Framework for Classifyig Deial of Service Attacks, Proceedigs of ACM SIGCOMM 2003 Coferece o Applicatios, Techologies, Architectures, ad Protocols for Computer Commuicatio, Karlsruhe, Germay, (2003)August [13] Y. Che ad K. Hwag, Collaborative Detectio ad Filterig of Shrew DDoS Attacks Usig Spectral Aalysis, Joural of Parallel ad Distributed Computig, vol. 66, o. 9, (2006), pp [14] Y. Che ad K. Hwag, Spectral Aalysis of TCP Flows for Defese agaist Reductio-of-Quality Attacks, Proceedigs of IEEE Iteratioal Coferece o Commuicatios, Glasgow, Scotlad, (2007) Jue [15] H. Su, J. C. S. Lu ad D. K. Y. Yau, Defedig agaist Low-rate TCP Attacks: Dyamic Detectio ad Protectio, Proceedigs of the 12th IEEE Iteratioal Coferece o Network Protocols, Berli, Germay, (2004) October 5-8. [16] X. Luo, E. W. W. Cha ad R. K. C. Chag, Detectig Pulsig Deial-of-Service Attacks with Nodetermiistic Attack Itervals, EURASIP Joural o Advaces i Sigal Processig, vol. 2009, (2009), pp [17] C. W. Zhag, Z. P. Cai, W. F. Che, X. Luo ad J. Yi, Flow Level Detectio ad Filterig of Low-rate DDoS, Computer Networks, vol. 56, o. 15, (2012), pp [18] V. A. Siris ad F. Papagalou, Applicatio of Aomaly Detectio Algorithms for Detectig SYN Floodig Attacks, Proceedigs of GLOBECOM, Dallas, USA, (2004) November 29-December 3. [19] P. Tao, C. Leckie ad K. Ramamohaarao, Proactively Detectig Distributed Deial of Service Attacks Usig Source IP Address Moitorig, Proceedigs of NETWORKING, Athes, Greece, (2004) May Authors Mig Yu received the BS degree i electroics egieerig i 1998 from Shadog Uiversity, Chia. He received the MS degree ad Ph.D degree i iformatio ad telecommuicatio system i 2004 ad 2008 from Xidia Uiversity, Chia. He is curretly a associate professor i Dalia Uiversity of Techology, Chia. He is also a member of IEEE Computer Society. So far, he has 15 papers published i iteratioal jourals. His research iterests iclude etwork security, cloud computig ad DoS defese. Copyright c 2013 SERSC 287

10 288 Copyright c 2013 SERSC

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia sumitk-cs209@itrkl.ac.i, bdsahu@itrkl.ac.i ABSTRACT: Grid computig is

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis

Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis Cotrol Sciece ad Egieerig Volume 2013, Article ID 821315, 6 pages http://dx.doi.org/10.1155/2013/821315 Research Article Real-Time Detectio of Applicatio-Layer DDoS Attack Usig Time Series Aalysis Togguag

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means)

CHAPTER 7: Central Limit Theorem: CLT for Averages (Means) CHAPTER 7: Cetral Limit Theorem: CLT for Averages (Meas) X = the umber obtaied whe rollig oe six sided die oce. If we roll a six sided die oce, the mea of the probability distributio is X P(X = x) Simulatio:

More information

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5

0.7 0.6 0.2 0 0 96 96.5 97 97.5 98 98.5 99 99.5 100 100.5 96.5 97 97.5 98 98.5 99 99.5 100 100.5 Sectio 13 Kolmogorov-Smirov test. Suppose that we have a i.i.d. sample X 1,..., X with some ukow distributio P ad we would like to test the hypothesis that P is equal to a particular distributio P 0, i.e.

More information

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION

CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha

More information

Research Article Sign Data Derivative Recovery

Research Article Sign Data Derivative Recovery Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

Statistical and Fuzzy Approach for Database Security

Statistical and Fuzzy Approach for Database Security tatistical ad Fuzzy Approach for Database ecurity Gag Lu, Jukai Yi chool of Iformatio ciece ad Techology Beijig iversity of Chemical Techology Beijig 100029, Chia sizheg@126.com Kevi Lü Bruel iversity,

More information

Extracting Similar and Opposite News Websites Based on Sentiment Analysis

Extracting Similar and Opposite News Websites Based on Sentiment Analysis 202 Iteratioal Coferece o Idustrial ad Itelliget Iformatio (ICIII 202) IPCSIT vol.3 (202) (202) IACSIT Press, Sigapore Extractig Similar ad Opposite ews Websites Based o Setimet Aalysis Jiawei Zhag, Yukiko

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

On the Periodicity of Time-series Network and Service Metrics

On the Periodicity of Time-series Network and Service Metrics O the Periodicity of Time-series Network ad Service Metrics Joseph T. Lizier ad Terry J. Dawso Telstra Research Laboratories Sydey, NSW, Australia {oseph.lizier, terry..dawso}@team.telstra.com Abstract

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

A Network Monitoring System with a Peer-to- Peer Architecture

A Network Monitoring System with a Peer-to- Peer Architecture A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data

More information

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing World Applied Scieces Joural 23 (11): 1418-1424, 2013 ISSN 1818-4952 IDOSI Publicatios, 2013 DOI: 10.5829/idosi.wasj.2013.23.11.950 DDoS Verificatio ad Attack Packet Droppig Algorithm i Cloud Computig

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..

C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India.. (IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Estimating Probability Distributions by Observing Betting Practices

Estimating Probability Distributions by Observing Betting Practices 5th Iteratioal Symposium o Imprecise Probability: Theories ad Applicatios, Prague, Czech Republic, 007 Estimatig Probability Distributios by Observig Bettig Practices Dr C Lych Natioal Uiversity of Irelad,

More information

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown

Z-TEST / Z-STATISTIC: used to test hypotheses about. µ when the population standard deviation is unknown Z-TEST / Z-STATISTIC: used to test hypotheses about µ whe the populatio stadard deviatio is kow ad populatio distributio is ormal or sample size is large T-TEST / T-STATISTIC: used to test hypotheses about

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

Quadrat Sampling in Population Ecology

Quadrat Sampling in Population Ecology Quadrat Samplig i Populatio Ecology Backgroud Estimatig the abudace of orgaisms. Ecology is ofte referred to as the "study of distributio ad abudace". This beig true, we would ofte like to kow how may

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack

Faulty Clock Detection for Crypto Circuits Against Differential Fault Analysis Attack Faulty Clock Detectio for Crypto Circuits Agaist Differetial Fault Aalysis Attack Pei uo ad Yusi Fei Email:sileceluo@coe.eu.edu, yfei@ece.eu.edu Departmet of Electrical ad Computer Egieerig Northeaster

More information

Chapter XIV: Fundamentals of Probability and Statistics *

Chapter XIV: Fundamentals of Probability and Statistics * Objectives Chapter XIV: Fudametals o Probability ad Statistics * Preset udametal cocepts o probability ad statistics Review measures o cetral tedecy ad dispersio Aalyze methods ad applicatios o descriptive

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks

Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;

More information

Overview of some probability distributions.

Overview of some probability distributions. Lecture Overview of some probability distributios. I this lecture we will review several commo distributios that will be used ofte throughtout the class. Each distributio is usually described by its probability

More information

Characterizing End-to-End Packet Delay and Loss in the Internet

Characterizing End-to-End Packet Delay and Loss in the Internet Characterizig Ed-to-Ed Packet Delay ad Loss i the Iteret Jea-Chrysostome Bolot Xiyu Sog Preseted by Swaroop Sigh Layout Itroductio Data Collectio Data Aalysis Strategy Aalysis of packet delay Aalysis of

More information

Maximum Likelihood Estimators.

Maximum Likelihood Estimators. Lecture 2 Maximum Likelihood Estimators. Matlab example. As a motivatio, let us look at oe Matlab example. Let us geerate a radom sample of size 00 from beta distributio Beta(5, 2). We will lear the defiitio

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

PSYCHOLOGICAL STATISTICS

PSYCHOLOGICAL STATISTICS UNIVERSITY OF CALICUT SCHOOL OF DISTANCE EDUCATION B Sc. Cousellig Psychology (0 Adm.) IV SEMESTER COMPLEMENTARY COURSE PSYCHOLOGICAL STATISTICS QUESTION BANK. Iferetial statistics is the brach of statistics

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia

STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design

A Combined Continuous/Binary Genetic Algorithm for Microstrip Antenna Design A Combied Cotiuous/Biary Geetic Algorithm for Microstrip Atea Desig Rady L. Haupt The Pesylvaia State Uiversity Applied Research Laboratory P. O. Box 30 State College, PA 16804-0030 haupt@ieee.org Abstract:

More information

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chi-square (χ ) distributio.

More information

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the.

Confidence Intervals. CI for a population mean (σ is known and n > 30 or the variable is normally distributed in the. Cofidece Itervals A cofidece iterval is a iterval whose purpose is to estimate a parameter (a umber that could, i theory, be calculated from the populatio, if measuremets were available for the whole populatio).

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

On Formula to Compute Primes. and the n th Prime

On Formula to Compute Primes. and the n th Prime Applied Mathematical cieces, Vol., 0, o., 35-35 O Formula to Compute Primes ad the th Prime Issam Kaddoura Lebaese Iteratioal Uiversity Faculty of Arts ad cieces, Lebao issam.kaddoura@liu.edu.lb amih Abdul-Nabi

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

Properties of MLE: consistency, asymptotic normality. Fisher information.

Properties of MLE: consistency, asymptotic normality. Fisher information. Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout

More information

Optimization of Large Data in Cloud computing using Replication Methods

Optimization of Large Data in Cloud computing using Replication Methods Optimizatio of Large Data i Cloud computig usig Replicatio Methods Vijaya -Kumar-C, Dr. G.A. Ramachadhra Computer Sciece ad Techology, Sri Krishadevaraya Uiversity Aatapuramu, AdhraPradesh, Idia Abstract-Cloud

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Theorems About Power Series

Theorems About Power Series Physics 6A Witer 20 Theorems About Power Series Cosider a power series, f(x) = a x, () where the a are real coefficiets ad x is a real variable. There exists a real o-egative umber R, called the radius

More information

SIP Threats Detection System

SIP Threats Detection System SIP Threats Detectio System MIROSLAV VOZNAK, FILIP REZAC Departmet of Telecommuicatios VSB Techical Uiversity of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.vozak@vsb.cz, filip.rezac@vsb.cz

More information

Firewall Modules and Modular Firewalls

Firewall Modules and Modular Firewalls Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi acharya@cs.utexas.edu Aditya Joshi Uiversity of Texas at Austi adityaj@cs.utexas.edu M. G. Gouda Natioal Sciece Foudatio

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Verifying the Availability of Cloud Applications

Verifying the Availability of Cloud Applications Melaie Siebehaar, Olga Wege, Roy Has, Hasa Terca, Ralf Steimetz: Verifyig the Availability of Cloud Applicatios. I: Proceedigs of the 3rd Iteratioal Coferece o Cloud Computig ad Services Sciece (CLOSER

More information

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic

Performance Evaluation of the MSMPS Algorithm under Different Distribution Traffic Paper Performace Evaluatio of the MSMPS Algorithm uder Differet Distributio Traffic Grzegorz Dailewicz ad Marci Dziuba Faculty of Electroics ad Telecommuicatios, Poza Uiversity of Techology, Poza, Polad

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

Simulation-based Analysis of Surface Jobsite Logistics in Mechanized Tunneling

Simulation-based Analysis of Surface Jobsite Logistics in Mechanized Tunneling Simulatio-based Aalysis of Surface Jobsite Logistics i Mechaized Tuelig Markus Scheffer 1,a, Tobias Rahm 1,b ad Markus Köig 1,c 1 Chair of Computig i Egieerig, Faculty of Civil ad Evirometal Egieerig,

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation

Modeling the Propagation Process of Topology-Aware Worms: An Innovative Logic Matrix Formulation 2009 Sixth IFIP Iteratioal Coferece o Network ad Parallel Computi Modeli the Propaatio Process of Topoloy-Aware Worms A Iovative Loic Matrix Formulatio Xia Fa School of Maaemet ad Iformatio Systems Cetral

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method Accurate ad Efficiet Traffic Moitorig Usig Adaptive No-liear Samplig Method Chegche Hu, Sheg Wag, Jia Tia, Bi Liu Tsighua Uiversity Beijig, Chia, {hucc,wags,tiaj}@mails.tsighua.edu.c liub@tsighua.edu.c

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

VEHICLE TRACKING USING KALMAN FILTER AND FEATURES

VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Sigal & Image Processig : A Iteratioal Joural (SIPIJ) Vol.2, No.2, Jue 2011 VEHICLE TRACKING USING KALMAN FILTER AND FEATURES Amir Salarpour 1 ad Arezoo Salarpour 2 ad Mahmoud Fathi 2 ad MirHossei Dezfoulia

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Volatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina

Volatility of rates of return on the example of wheat futures. Sławomir Juszczyk. Rafał Balina Overcomig the Crisis: Ecoomic ad Fiacial Developmets i Asia ad Europe Edited by Štefa Bojec, Josef C. Brada, ad Masaaki Kuboiwa http://www.hippocampus.si/isbn/978-961-6832-32-8/cotets.pdf Volatility of

More information

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony

Virtual Machine Scheduling Management on Cloud Computing Using Artificial Bee Colony , March 12-14, 2014, Hog Kog Virtual Machie Schedulig Maagemet o Cloud Computig Usig Artificial Bee Coloy B. Kruekaew ad W. Kimpa Abstract Resource schedulig maagemet desig o Cloud computig is a importat

More information

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate

Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate Iteratioal Coferece o Maagemet Sciece ad Maagemet Iovatio (MSMI 4) Istallmet Joit Life Isurace ctuarial Models with the Stochastic Iterest Rate Nia-Nia JI a,*, Yue LI, Dog-Hui WNG College of Sciece, Harbi

More information

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring

Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy

More information

The Case for a Hybrid Passive/Active Network Monitoring Scheme in the Wireless Internet

The Case for a Hybrid Passive/Active Network Monitoring Scheme in the Wireless Internet The Case for a Hybrid Passive/Active Network Moitorig Scheme i the Wireless Iteret Björ Ladfeldt*, Pipat Sookavataa*,** ad Arua Seevirate** Dept. of Electrical Egieerig ad Telecommuicatios The Uiversity

More information

FortiGuard Fortinet s Global Security Research and Protection

FortiGuard Fortinet s Global Security Research and Protection SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft

More information

Cantilever Beam Experiment

Cantilever Beam Experiment Mechaical Egieerig Departmet Uiversity of Massachusetts Lowell Catilever Beam Experimet Backgroud A disk drive maufacturer is redesigig several disk drive armature mechaisms. This is the result of evaluatio

More information

Protecting Content Distribution Networks from Denial of Service Attacks

Protecting Content Distribution Networks from Denial of Service Attacks Protectig Cotet Distributio Networks from Deial of Service Attacks Kag-Wo Lee, Suresh Chari, Aees Shaikh, Sambit Sahu, Pau-Che Cheg IBM T. J. Watso Research Ceter Hawthore, NY 10532 Abstract I this paper,

More information

Vulnerability test system for SIP network elements

Vulnerability test system for SIP network elements Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic

More information

COMPUTING EFFICIENCY METRICS FOR SYNERGIC INTELLIGENT TRANSPORTATION SYSTEMS

COMPUTING EFFICIENCY METRICS FOR SYNERGIC INTELLIGENT TRANSPORTATION SYSTEMS Trasport ad Teleuicatio Vol, No 4, 200 Trasport ad Teleuicatio, 200, Volume, No 4, 66 74 Trasport ad Teleuicatio Istitute, Lomoosova, Riga, LV-09, Latvia COMPUTING EFFICIENCY METRICS FOR SYNERGIC INTELLIGENT

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas:

Chapter 7 - Sampling Distributions. 1 Introduction. What is statistics? It consist of three major areas: Chapter 7 - Samplig Distributios 1 Itroductio What is statistics? It cosist of three major areas: Data Collectio: samplig plas ad experimetal desigs Descriptive Statistics: umerical ad graphical summaries

More information

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization

Iran. J. Chem. Chem. Eng. Vol. 26, No.1, 2007. Sensitivity Analysis of Water Flooding Optimization by Dynamic Optimization Ira. J. Chem. Chem. Eg. Vol. 6, No., 007 Sesitivity Aalysis of Water Floodig Optimizatio by Dyamic Optimizatio Gharesheiklou, Ali Asghar* + ; Mousavi-Dehghai, Sayed Ali Research Istitute of Petroleum Idustry

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information