THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

Size: px
Start display at page:

Download "THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE"

Transcription

1 Journal of Information Technology Management ISSN # A Publication of the Aociation of Management THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE LI-CHIOU CHEN SCHOOL OF COMPUTER SCIENCE AND INFORMATION SYSTEMS PACE UNIVERSITY lchen@pace.edu THOMAS A. LONGSTAFF SOFTWARE ENGINEERING INSTITUTE CARNEGIE MELLON UNIVERSITY tal@cert.org KATHLEEN M. CARLEY INSTITUTE FOR SOFTWARE RESEARCH INTERNATIONAL CARNEGIE MELLON UNIVERSITY kathleen.carley@cmu.edu ABSTRACT Ditributed denial-of-ervice (DDOS) attack have emerged a a prevalent way to compromie the availability of network and erver, which impoed financial loe for e-commerce buinee. Many defene that mitigate the effect of ongoing DDOS attack have been propoed. However, none of the defene have been widely deployed on the Internet infratructure at thi point becaue of a lack of undertanding in the economic incentive inherent in providing the defene a well a uncertainty in current defene. We propoe that ISP hould provide DDOS defene a network ervice to enure the availability of a network or a erver when the technology i ready. Thi paper provide an analytical framework for the propoed ervice to align the economic incentive. Uing empirical data from ecurity incident, thi paper how that the propoed ervice can bring economic benefit to provider with an appropriate pricing trategy, ome invetigation into the expected lo of ubcriber, and knowledge on the overall rik level of attack. Keyword: network ecurity, ditributed denial of ervice, network ervice, cot-benefit analyi, economic incentive. INTRODUCTION Network ditributed denial-of-ervice (DDOS) attack [12] compromie the availability of victim network or erver. Pat incident have caued financial loe of victim [10, 24-25, 27]. Many defene that mitigate the effect of ongoing DDOS attack have been propoed and the uncertainty inherent in the technology ha been previouly tudied [6, 14, 17]. Currently, ome ISP have developed method to trace the ource of attack traffic on Journal of Information Technology Management Volume XV, Number 3-4,

2 their backbone network [21, 22] and ome ISP 1 have tarted to offer ervice that mitigate the impact of DDOS attack. Automatic mechanim on reponding againt ongoing attack traffic are till underdeveloped in practice. More reearch effort i till needed to develop the automatic repone. Our purpoe here i to ae if any economic incentive would puh ISP toward the development of the automatic mechanim o that ISP will further provide them to their ubcriber. Thi problem i not jut technical but i a management and policy problem a well, involving the etting of policie and meeting the need of divere ubcriber with different prioritie [16, 26]. What would be the economic incentive of ISP to provide defene againt network attack uch a DDOS? Thi paper i intended to addre thi quetion by analyzing the economic benefit and cot of ISP to provide the defene at ome choke point of the Internet infratructure, uch a network router/proxy erver. We propoe that ISP hould provide network defene a network ecurity ervice to their ubcriber. Network ecurity ervice, uch a Virtual Private Network or firewall, have been provided by ISP a optional network ervice to deal with the ecrecy of data tranportation. In thi cae, the ervice that provide DDOS defene enure the availability of a network or a erver during attack. We developed an analytical model to quantify the benefit and cot of the ervice proviion. The model conider both the demand of ubcriber (potential attack victim/ource) and the upply of the provider (ISP) to deploy the network defene. We analyzed the model analytically and calibrated ome parameter uing empirical data on network attack. Baed on thee reult, we provide recommendation on aligning ISP economic incentive. The next ection introduce the propoed ervice and decribe the analytical model, followed by a ection on the analytical reult from the model, another on the empirical calibration and finally the model reult are dicued. Concluion and future work follow. 1 AT&T offer DDOS detection and repone ervice ( tarting from June 2004 but the ervice doe not pecify performance in a Service Level Agreement (SLA). Starting from March, 2004, MCI offer DDOS detection ervice with a SLA that guarantee ome link utilization during DDOS attack. However, thi ervice doe not trigger automatic repone againt attack and it provide only attack detection when cutomer report upiciou attack ( THE ANALYTICAL MODEL FOR PROVISION OF NETWORK SECURITY SERVICES We propoe that ISP provide network ecurity ervice to their ubcriber. The ervice deploy DDOS defene on ome choke point of the Internet infratructure and react actively to filter DDOS attack traffic during attack. We conider two type of DDOS defene: ource filtering and detination filtering. Source filtering refer to the defene that monitor the outbound traffic from a ubcriber in order to prevent the ubcriber from originating attack (attack ource). Detination filtering refer to the defene that monitor the inbound traffic to a ubcriber in order to prevent the ubcriber from being attacked (attack victim). A detail decription of the current technologie i in [6]. We define our analytical model baed on the following aumption: Attack: DDOS attack aturate the network connection of ubcriber to their backbone network or take down erver inide the network of the ubcriber. The attack can be traced to their ource within the adminitrative boundary of one network provider. Even if the attack are originated from ubcriber of another network provider, the provider of the victim can till trace to the network provider that carrie the attack traffic. Subcriber: Subcriber would pay baed on the utility received from the defene. The utility that a ubcriber derive from DDOS defene i the expected lo that would be incurred from DDOS attack. Provider: Provider would offer the ervice to an additional ubcriber when the marginal benefit to the provider i larger than the marginal cot to the provider. Pricing: Provider charge all ubcriber at a flat rate for a certain time period for the ecurity ervice, uch a a month. Many ISP uch a AOL currently offer viru canning and firewall at a flat rate in additional to the network connection ervice that they provide. We will vary thi aumption and analyze other pricing cheme when we dicu the model reult. Market: The ervice i offered in a competitive market where the price for the ervice i determined o that the number of ubcriber that are willing to ubcribe it i equal to the number of ubcriber that the provider would like to offer it. We will alo dicu the ervice proviion in a monopoly market when we dicu the model reult. Journal of Information Technology Management Volume XV, Number 3-4,

3 Benefit and Cot of Subcriber What a ubcriber i willing to pay for DDOS defene i aumed to be le than the utility received from the ecurity ervice. We ue a linear function to quantify the utility. A imilar linear function form ha been ued to quantify the expected lo aociated with the information et being compromied in an attack [11] and the utility of ubcriber for intermediary ervice [1] and digital good [2]. The utility that a ubcriber derive from DDOS defene i the expected lo that would be incurred from DDOS attack. Economic loe from Internet ecurity breache have been tudied previouly [4, 9]. The expected lo i quantified by three factor: the attack frequency, a [0,1], referring to how often attack occur, the expected lo per attack, L, referring to how much lo an attack impoe on the ubcriber and the quality of the defene, q [0,1], quantifying the impact of the performance efficiency on the expected lo. Let U denote the utility function of a ubcriber for the ervice, which i defined a: U = aql (1.a). Conider a implifying ituation that only one type of ervice i offered and the provider charge each ubcriber a flat rate p for a certain time period, uch a a month. Baed on the aumption that a ubcriber i willing to pay le than the utility, the upper bound for the ervice charge p d i: P d aql (1.b). Aume that L for all ubcriber i proportional to a uniform ditribution. Let q denote the quality of the ervice for DDOS defene, which can be conidered a a network performance meaure, uch a the arrival rate of legitimate traffic. The number of ubcriber that will ubcribe to the ervice depend on the ditribution of a. F(a) denote the percentage of the ubcriber that have at leat a attack, and aume that L and a are independent. A a reult, only the ubcriber that expect the attack ql frequency to be larger than would ubcribe to the ervice at P d. Let M repreent the total number of ubcriber of an ISP. Let N d denote the number of ubcriber that are willing to ubcribe to the network ecurity ervice. When the price i et at P, N d i calculated a: N d = F( a) M (1.c). From (1.c), the lowet attack frequency expected by the ubcriber of the network ecurity ervice i a function of N d, which i: P d d K( N d ) = a= F 1 N d ( ) M (1.d). Benefit and Cot of Provider The cot quantification conider only the operational cot of providing DDOS defene but not the capital invetment on the infratructure. Three factor are conidered in quantifying the operational cot. They are: 1) fixed cot (C o ), 2) filter overhead (R), and 3) bandwidth aving (W). Both R and W quantify the per-attack operating cot while C o quantifie the per-ubcriber operating cot. Fixed cot (C o ) quantifie the additional cot per ubcriber that the provider ha to pay in order to et up the ervice for the ubcriber. For example, the cot of additional equipment, uch a dik pace for logging, or additional adminitrative overhead. Filter overhead (R) quantifie the per-attack overhead of a defene on IP tranport due to attack detection and repone. If the provider provide an IP tranport ervice that guarantee a certain quality of ervice (QoS), the additional overhead impoe an economic cot to the provider. On the contrary, bandwidth aving (W) reduce the cot, which quantifie the per-attack tranport benefit. Thi benefit come from filtering attack packet before they are tranported to their detination. Filter overhead per attack R i defined to be proportional to the number of filter H(G), the link utilization by legitimate traffic µ x, and the attack duration τ. Given a network topology G, H(G) i calculated a the number of edge monitored by filter, which are deployed between attack ource and victim. H(G) i influenced by the network topology becaue filter mut be deployed at ome choke point between the attack ource and the victim. The model aume that filter are triggered only when attack are detected and that the proportional relationhip i linear. C r denote the unit economic cot of filter overhead and S denote the number of attack ource, R i defined a: R=τµ x Cr H (G) (2.a). Bandwidth aving per attack W i defined to be proportional to tranport ditance aved D(G), the link utilization by attack traffic µ a, and the attack duration τ. D(G) i calculated a the tranport ditance between filter and the victim network, which i alo topology dependent. f a denote the attack traffic filtering rate and C w denote the unit economic cot of bandwidth. W(G) i defined a: W = τµ C a w D( G, f a ) (2.b). Journal of Information Technology Management Volume XV, Number 3-4,

4 The total cot of providing the defene C i the um of operational cot C o from all ubcriber, and R from all attack. Let Θ ( N) repreent the total number of attack from all ubcriber of the ervice, which i equal to N a i i= 1 where a i i the attack frequency of i th ubcriber. When the ervice i offered to N ubcriber, the total cot for providing the ervice i calculated a: C= C o N + RΘ ( N (2.c). The total benefit for providing the ervice i calculated a: B= P N + WΘ ( N (2.d). The total profit for providing the ervice TP i: TP= B C = P N + ( W R) Θ( N ) C dtp dn o ) N ) (2.e). By etting = 0, the lower bound of the ervice charge (the marginal cot of providing the ervice to one additional ubcriber) i: P C o + [ R W ] K ( N ) ANALYTICAL RESULTS (2.f). From (1.a)-(1.d) and (2.a)-(2.f), the price range of the ecurity ervice obtained i the following: C o + [ R W ] K( n) p K( n) ql (3.a) How a provider et the price within thi range depend on the market (it competitor) and it pricing trategy. In the hort term, if all provider have the ame marginal cot, the equilibrium price and the equilibrium number of ubcriber in a competitive market can be calculated by equaling (3.b) and (3.c). The equilibrium number of ubcriber n will atify C o The equilibrium price i + [ R W ql] K( n ) = 0 (3.b). which i p = K( n ) ql= C o + [ R W ] K( n (3.c). The total provider benefit i equal to it profit, TP= p n [ R W ] Θ( n) C n The total ubcriber benefit i CS = qlθ ( n) p n The total ocial benefit i SB= TP+ CS = [ ql R+ W ] Θ( n) C n o ) o (3.d). (3.e). (3.f). Table 1 lit the impact of each variable on TP, CS and SB. We ummarized two major finding a follow: 1) When the capacity of the network i contrained, provider have more benefit over cot of providing defene mechanim uing flat rate pricing. When the capacity of the ISP network i contrained, the bandwidth aving i larger than the filter overhead (R<W). During a DDOS attack, an ISP network capacity can be contrained becaue attacker intend to caue burt traffic. Even if the ISP expand it network capacity, attacker can till generate attack with increaingly higher packet rate. In thi cae, all TP, CS and SB increae with bandwidth aving and decreae with filter overhead o that the provider interet i aligned with the ubcriber interet. 2) When the capacity of the network i not contrained, provider have more cot over benefit of providing defene mechanim uing flat rate pricing in a competitive market. In thi cae, other pricing trategie hould be conidered. When the capacity of the ISP network i not contrained, the bandwidth aving i maller than filter over head (R>W). In thi cae, provider have loe from providing the defene mechanim becaue the flat rate price cannot fully recover the cot. Subcriber that have low probability of being attacked will not pay for the ervice becaue they imply expect le lo from the attack than the ervice fee. Under thi circumtance, the provider hould conider other pricing trategie. Journal of Information Technology Management Volume XV, Number 3-4,

5 Table 1: The impact 2 of variable on provider benefit, ubcriber benefit and ocial benefit Variable R=W (TP=0) R<W (TP>0) R>W (TP<0) Name Increae in TP CS SB TP CS SB TP CS SB Operational cot C o 0 Reduced expected L,q 0 lo Router overhead R( x, C r, H) 0 Bandwidth aving W( a, C w, D) 0 Attack duration τ EMPIRICAL EVIDENCE FOR PARAMETER CALIBRATIONS We etimated the variation of the demand among individual ubcriber uing empirical data of network attack. The variation can be explained a the variation in the attack rik of ubcriber online ervice. For example, the demand for the ervice from an e-commerce web ite uch a Yahoo or ebay i higher than a peronal web ite ince the probability of attack to an e-commerce web ite i greater. We ued two data et to calibrate the probability of attack F(a) ince F(a) determine the hape of the demand function. Thee two empirical data et are: 1) the DDOS data et [18] and 2) the Code-Red data et [19]. The DDOS data et i ued to etimate the ditribution of attack ent to ubcriber (for detination filtering), and the Code-Red data et i ued to etimate the ditribution of attack originating from ubcriber (for ource filtering). Figure 1 how that both data et can be modeled by a power curve functional form (R-quare = 0.93 and 0.98, repectively). We will ue the two etimated functional form to calibrate F(a) in the next ection. We calculated R and W uing an AT&T backbone network map from [3]. Thi map decribe a core network topology connecting North America citie for AT&T network. In addition, we collected public available data to calibrate parameter of a bae cenario (Table 2). In the next ection, the parameter for the model analyi are et to the value in thi bae cenario unle they are otherwie pecified. Thi bae cenario aume a TCP SYN attack launched at an average packet rate baed on data oberved from ingle attack ource. Detination filtering i deployed to monitor the inbound traffic to ubcriber (victim). The unit bandwidth cot i equal to unit filter overhead becaue thi cae aume that the overhead impoed by filtering a packet i equal to the overhead of forwarding a packet. A detail decription of the data et and the topology calculation i in [5]. 2 0 denote no influence, denote an increae on the parameter will decreae TP, CS or SB, and denote an increae on the parameter will increae TP, CS or SB. Journal of Information Technology Management Volume XV, Number 3-4,

6 Table 2: Parameter etting for the bae cenario Category Unit cot Network topology Defene Attack Notat Bae Decription ion value M 2800 Number of ubcriber to network connection ervice. The number of buine ubcriber for IP tranport i etimated from it market hare. The etimated market hare i 10% and 3.5% for AT&T and Cable & Wirele repectively. Cable & Wirele reported the number of buine ubcriber i 950. Hence, the etimated number of buine ubcriber for the AT& T in 2000 i 95010%/3.5%~2800 [3]. C o $945 /month Operation cot per ubcriber. The operation cot i etimated baed on current AT&T ecurity ervice. AT&T charge a $945 recurring monthly fee for ecurity ervice in a three-year contract. The recurring monthly fee include Tunnel Server, 24x7 management and maintenance, help dek upport, client oftware, and 4 hour time to repone [3]. C r $85,025 /month Unit economic cot of performance overhead. Etimated baed on OC3 155Mbp leaed line acce price from AT&T on Jan C w $85,025 Unit economic benefit of bandwidth aving. Etimated baed on OC3 155Mbp leaed /month line acce price from AT&T on Jan H(G) 1 Number of edge monitored by filter. H and D are et at the value that dynamic filter are triggered at 7 hop away from the victim network (at the border of the network). D(G) 7 Ditance between filter and the victim network q 1 Performance efficiency (in range [0,1]). The bet cae for legitimate traffic arrival ratio. f a 0.99 Attack traffic filtering rate (in range [0,1]). L(q) $4,080 Expected lo of an attack. In [8], the reported average annually loe from denial of /attack ervice for a company i $122,389 in Aume the number of attack i uniformly ditributed among 12 month. The average number of attack i 2.5 from prior analyi. The expected lo reduced by filter per attack = $122,389/(122.5)~$4,080. µ x 30% Link utilization of the edge monitored by filter. The link utilization i 20%-35% and 20%-70% in two OC-3 link in a backbone link monitor project decribed in [20]. 30% i the medium etimation. µ a 60Mb /econd Attack magnitude. It i etimated by 1500 packet per econd (pp) and 40 byte per packet [7]. An attack with 1500 pp i enough to compromie a firewall. In the trace analyzed in [18], 20% of all attack event had an etimated packet 1500 pp or higher. Minimum TCP packet ize which carrie TCP acknowledgement but no payload [15]. Duration of an attack. In the trace analyzed in [18], 20% of attack 5 minute, 50% of attack 10 minute, and 90% of attack 1 hour. τ 10 minute S 1 Number of attack ource. F(a) Cumulative ditribution of the attack frequency. a denote the frequencie of attack. The DDOS data et i ued for the bae cenario. Journal of Information Technology Management Volume XV, Number 3-4,

7 The percentage of ubcriber that have at leat a attack (F(a) ) 1.E-03 1.E-04 Power line (Code-Red) F(a) = 1.39a E-05 Power line (DDOS) F(a) = 0.37a E-06 1.E+02 1.E+03 1.E+04 1.E+05 Attack frequency (a ) Data et DDOS Code-Red Power (Code-Red) Power (DDOS) Figure 1: The empirical data of network attack COST AND BENEFIT ANALYSIS BASED ON EMPIRICAL EVIDENCE The empirical calibration i to clarify three iue that can not be determined by the analytical reult alone. 1) When the capacity of the network i contrained, how do we chooe from different defene technologie? 2) What are the factor that influence the capacity contraint during an attack? 3) If the flat rate pricing cannot upport the ecurity ervice, what are the alternative? Each of the following ub-ection will addre each of the three quetion, repectively. To avoid preenting abolute monetary value of the benefit and cot, we will ue a benefit-cot ratio ( C B ) to preent the empirical reult. Filtering Technology What defene technologie that a network provider hould adopt when bandwidth cot i a concern of the operation? Here we dicu two type of technologie: 1) detination filtering: filtering inbound traffic of ubcriber to prevent the ubcriber from being attacked, and 2) ource filtering: filtering outbound traffic of ubcriber to prevent the ubcriber from ending out attack traffic. We ued the DDOS data to calibrate the demand for detination filtering and the Code-Red data to calibrate the demand for ource filtering. When detination filtering i deployed, the cloer the filter can be to the attack ource, the more benefit both the provider and the ubcriber will have. Figure 2 how that both the provider benefit and the ubcriber benefit increae when the filter location 3 i cloer to the attack ource. The provider gain from the increae of the bandwidth aving becaue attack traffic ha been filtered out before it i tranported. The ubcriber alo benefit from an increae in the quality of the ervice. That i, more legitimate traffic to the ubcriber can bypa the filter. Some ubcriber may be exploited by attacker to launch attack. When ubcriber uffer loe from originating attack, the network provider will be better off to adopt ource filtering than detination filtering. Thi reult occur when the packet rate of an attack i larger than a threhold, 150pp for our cenario (Figure 3). Thi point i where the network capacity i contrained (W>R) a we dicued in the analytical reult from the model. Thi reult implie that a policy i needed to impoe a cot on ubcriber that originate attack. Poible way of impoing uch a cot include blackliting the ubcriber that originate attack, aigning liability to attack ource [13], or revealing the origin of the attack ource. 3 Attack uptream mean the filter i et at one hop uptream of the network that originate attack. Victim uptream mean the filter i et at the acce router to the victim network. Journal of Information Technology Management Volume XV, Number 3-4,

8 The percentage of ubcriber that have at leat a attack (F(a) ) 1.E-03 1.E-04 Power line (Code-Red) F(a) = 1.39a E-05 Power line (DDOS) F(a) = 0.37a E-06 1.E+02 1.E+03 1.E+04 1.E+05 Attack frequency (a ) Data et DDOS Code-Red Power (Code-Red) Power (DDOS) Figure 2: Increae on both the provider benefit and ubcriber benefit by etting filter cloer to the attack ource 1.E+04 benefit-cot ratio 1.E+03 1.E+02 When the packet rate >=150pp, ource filtering i better off ource filtering detination filtering packet rate of an attack to the victim (pp). Figure 3: Benefit-cot ratio per ervice for ource filtering and detination filtering Capacity Contraint What i the impact of other factor on the network capacity contraint? Here we dicu two factor in our model: the ratio of bandwidth cot and filter overhead and the ditribution of attack ource. Firt, the network capacity become contrained when the unit bandwidth cot i 10 time of the unit filter overhead. In thi cae, ource filtering i more beneficial for the provider. Figure 4 how that the benefit cot ratio in ource filtering exceed it value in detination filtering when C w /C r >0.1. Second, the packet rate for the capacity contraint increae when the number of attack ource increae and when the attack ource are ditributed. A in Figure 5, when the packet rate < 3000pp, the benefit-cot ratio for the ource filtering data et i maller than it i for the Journal of Information Technology Management Volume XV, Number 3-4,

9 detination filtering. When the packet rate > 3000pp, the difference of the benefit-cot ratio between the two approache i much maller than it i during a ingle ource attack. Thi reaon for the reult i that, for a given packet rate of an attack received by the victim, the packet rate from one attack ource when the attack i ditributed i le than the packet rate from one attack ource when the attack i from one ource. 1.E+03 1.E+02 ource filtering benefit-cot ratio detination filtering bandwidth cot/filter overhead cot (C w /C r ) Figure 4: The impact of bandwidth cot/filter overhead cot 1.E+04 detinaton filtering, ingle 1.E+03 detination filtering, ditributed benefit-cot ratio 1.E ource filtering, ingle ource filetring, ditributed 1.E-03 packet rate of the attack to the victim (pp) Figure 5: Single ource attack v ditributed ource attack Journal of Information Technology Management Volume XV, Number 3-4,

10 Pricing Strategie The advantage of the flat rate pricing cheme i it implicity. However, under uch a cheme, the provider will not have incentive to provide the ervice if the network i not capacity contrained. We will relax thi flat rate aumption in thi ection. For comparion, we analyzed two other trategie: 1) free bundling and 2) differential pricing. We will dicu the free bundling pricing cheme uing the benefit-cot ratio per attack, which repreent how much benefit over cot that an ISP would obtain without conidering the payment and the fixed cot from each ubcriber. Thi ituation happen when provider would like to attract more ubcriber to the IP tranport ervice or when provider charge the ubcriber for only the fixed cot per ubcriber. Uing ource filtering (Figure 6) a an example, the flat rate pricing cheme ha the approximately ame benefit-cot ratio a the free bundling cheme if the fixed cot i recovered from other ervice. The reaon for thi i that the number of attack frequency i very large in our Code-Red data et o that the benefit per attack i much larger than the benefit from ervice charge. In thi cae, the impact of the ervice charge i negligible. In addition, if the benefit from network connection ervice i larger than the fixed cot, the free bundling cheme i even more beneficial for the provider than the flat rate cheme ince the provider obtain both the bandwidth aving and the additional gain from other ervice. An alternative pricing cheme hould be provided under the monopoly market. A poible pricing cheme i to charge ubcriber differently baed on their individual utility from the ervice (a equation 1.a). However, the individual utility of the ervice could be hard to etimate in practice. An alternative i to differentiate the ervice to everal verion for ubcriber who have different expected lo. Similar cheme have been ued in digital product vertical differentiation [2]. Figure 7 compare the flat rate pricing cheme and the differential pricing cheme for individual ubcriber. The differential pricing conider an extreme cae that the provider can price the ubcriber baed on their individual utility, which i determined by their expected lo and the attack frequency. Acro all packet rate, the differential pricing cheme i more beneficial for the provider than the flat rate cheme. The analyi on the differential pricing here i preliminary. Further mechanim are needed for aligning ubcriber with different price ince it i hard in practice to evaluate the expected lo of ubcriber. 1.E+04 Benefit-cot ratio per ervice 1.E+03 Benefit-cot ratio per attack Benefit-cot ratio 1.E Packet rate of an attack (pp) Figure 6: Benefit-cot ratio per ervice v benefit-cot ratio per attack for ource filtering at the uptream router of attack ource Journal of Information Technology Management Volume XV, Number 3-4,

11 1.E+04 1.E+03 benefit-cot ratio 1.E+02 differential flat rate packet rate of an attack to the victim (pp) Figure 7: Differential pricing v. flat rate pricing in the monopoly market for ource filtering CONCLUSIONS We propoed a quantitative method to invetigate the economic incentive for providing ervice to repond againt ongoing DDOS attack traffic. To introduce the new ervice for their ubcriber, network provider need to enure that the operational profit in the long term would jutify their capital invetment. We found everal factor that will influence the operational profit. At the initial tage, when few provider are able to deploy the ervice (monopoly market), the provider hould implement a differential pricing cheme. By doing thi, the provider can benefit from the different level of expected lo experienced by ubcriber and from the different level of the attack frequency. When more and more provider are able to provide the ervice (competitive market), no ingle provider can benefit from the differential pricing cheme ince ubcriber can have more choice by witching to another provider. In thi cae, three implication can be drawn: 1) Setting the filter location cloer to the attack ource i more beneficial than cloer to the victim network for both the ubcriber and the provider. Thi reult i more ignificant when the network of the provider i capacity contrained. 2) Providing ource filtering i better for a provider than providing detination filtering when mot attack to it ubcriber are launched at high packet rate and when ubcriber that originate attack uffer loe. 3) The provider i better off providing the detination filtering ervice for free if the fixed cot per ubcriber can be recovered from the additional revenue brought by new ubcriber to network tranport ervice. We provided an analyi on the economic incentive of providing DDOS defene. With an appropriate pricing trategy and ome invetigation into the expected lo from attack, network provider can benefit from providing the ecurity ervice and align their interet with ubcriber. Thi work i jut our firt tep to invetigate thi problem. Future work on etimating ubcriber expected lo and collecting data on attack incident are needed to facilitate our propoal. Journal of Information Technology Management Volume XV, Number 3-4,

12 REFERENCES [1] Bhargava, H.K., V. Choudhary, and R. Krihnan, Pricing and product deign: intermediary trategie in an electronic market. International Journal of Electronic Commerce, Vol. 5,No. 1: pp [2] Bhargava, H.K. and V. Choudhary, Information good and vertical differentiation. Journal of Management, Vol. 18,No. 2: pp [3] BW, Directory of Internet Service Provider, The Board Watch Magazine [4] Cavuoglu, H., B. Mihra, and S. Raghunathan. The effect of Internet ecurity breach announcement on market value of breached firm and Internet ecurity developer. Workhop on Information Sytem and Economic Barcelona, Spain. [5] Chen, L.-C., Computational Model for Defene againt Internet-baed Attack, Department of Engineering and Public Policy. 2003, Carnegie Mellon Univerity: Pittburgh. [6] Chen, L.-C., T.A. Longtaff, and K.M. Carley, Characterization of defene mechanim for ditributed of denial of ervice attack. Computer & Security, Vol. 23,No. 8: pp [7] Claffy, K.C., G. Miller, and K. Thompon. The nature of the beat: recent traffic meaurement from an Internet backbone. INET Geneva, Switzerland. [8] CSI, CSI/FBI computer crime and ecurity urvey, Computer Security Iue & Trend [9] Ettredge, M. and V.J. Richardon. Aeing the rik in e-commerce. Proceeding of the 35th Hawaii International Conference on Sytem Science Hawaii. [10] Garber, L., Denial-of-ervice attack rip the Internet. IEEE Computer, Vol. 33,No. 4: pp [11] Gordon, L.A. and M.P. Loeb, The economic of information ecurity invetment. ACM Tranaction on Information and Sytem Security, Vol. 5,No. 4: pp [12] Houle, K.J. and G.M. Weaver, Trend in denial of ervice attack technology. 2001, CERT Coordination Center, Software Engineering Intitute, Carnegie Mellon Univerity: Pittburgh. [13] Kabay, M.E., Ditributed denial-of-ervice attack, contributory negligence and downtream liability. ACM Ubiquity, Vol. No. [14] Lipon, H., Tracking and tracing cyber-attack: technical challenge and global policy iue. 2002, CERT Coordination Center, Software Engineering Intitute: Pittburgh. [15] McCreary, S. and K.C. Claffy. Trend in wide area IP traffic pattern: a view from Ame Internet Exchange. ITC Specialit Seminar Monterey, CA. [16] McCurdy, D., The DHS Infratructure Protection Diviion: Public-Private Partnerhip to Secure Critical Infratructure. 2004, ISAlliance. [17] Mirkovic, J. and P. Reiher, A taxonomy of DDoS attack and DDoS defene mechanim. ACM SIGCOMM Computer Communication Review, Vol. 34,No. 2: pp [18] Moore, D., G.M. Voelker, and S. Savage. Inferring Internet denial-of-ervice activity. USENIX Security Sympoium Wahington DC. [19] Moore, D., C. Shannon, and J. Brown. Code-Red: a cae tudy on the pread and victim of an Internet worm. ACM SIGCOMM/USENIX Internet Meaurement Workhop Mareille, France. [20] Papagiannaki, K., et al. Analyi of meaured ingle- Hop delay from an operational backbone network. IEEE INFOCOMM New York. [21] Snoeren, A.C., et al. Hah-baed IP traceback. ACM SIGCOMM [22] Stone, R. CenterTrack: An IP overlay network for tracking DoS. USENIX Security Sympoium Denver, CO. [23] Symantec, Symantec Internet ecurity threat report. 2004, Symantec. [24] Tran, K.T.L., Hacker attack major Internet ite, temporarily hutting Buy.com, Ebay, Wall Street Journal pp. 3. [25] Verton, D., Teen hacker 'Mafiaboy' plead guilty to 55 charge, ComputerWorld [26] WH, The national trategy to ecure cyberpace. 2003, The White Houe. [27] Yankee, $1.2 Billion Impact Seen a a Reult of Recent Attack Launched by Internet Hacker. 2000, The Yankee Group. ACKNOWLEDGMENTS Thi work wa upported in part by the NSF/ITR and the Pennylvania Infratructure Technology Alliance, a partnerhip of Carnegie Mellon, Lehigh Univerity, and the Commonwealth of Pennylvania' Department of Economic and Community Development. Additional upport wa provided by ICES (the Intitute for Complex Engineered Sytem) and CASOS the Center for Computational Analyi of Social and Organizational Sytem at Carnegie Mellon Univerity ( The view and concluion Journal of Information Technology Management Volume XV, Number 3-4,

13 contained in thi document are thoe of the author and hould not be interpreted a repreenting the official policie, either expreed or implied, of the National Science Foundation, the Commonwealth of Pennylvania or the U.S. government. AUTHORS BIOGRAPHIES Dr. Li-Chiou Chen received her Ph.D. from Carnegie Mellon Univerity in Engineering and Public Policy. She i an aitant profeor at the Department of Information Sytem in the School of Computer Science and Information Sytem, Pace Univerity. Her reearch interet are focued on combining artificial intelligence and agent-baed modeling to conduct technological and policy analyi in the area of information ecurity. Specific area include countermeaure againt the propagation of computer virue, computational modeling for defene againt ditributed denial of ervice attack and agent-baed imulation on policie to counter the pread of epidemic. Dr. Thoma A. Longtaff received hi PhD in 1991 at the Univerity of California, Davi in oftware environment. He i a enior member of the technical taff in the Network Situational Awarene Program at the Software Engineering Intitute (SEI), Carnegie Mellon Univerity. He i currently managing reearch and development in network infratructure ecurity for the program. Hi publication area include information urvivability, inider threat, intruder modeling, and intruion detection. Dr. Kathleen M. Carley received her Ph.D. from Harvard. She i a profeor at the Intitute for Software Reearch International, Carnegie Mellon Univerity. Her reearch combine cognitive cience, ocial network and computer cience. Specific reearch area are dynamic network analyi, computational ocial and organization theory, adaptation and evolution, computational text analyi, and the impact of telecommunication technologie and policy on behavior and dieae contagion within and among group. Her model meld multi-agent technology with network dynamic and empirical data. Illutrative large-cale multi-agent network model he and the CASOS team have developed are: BioWar -- city, cale model of weaponized biological attack; OrgAhead -- a trategic and natural organizational adaptation model; and DyNet -- a change in covert network model. Journal of Information Technology Management Volume XV, Number 3-4,

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Department of Information Sytem School of Computer Science and Information Sytem Pace Univerity

More information

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE

THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE THE ECONOMIC INCENTIVES OF PROVIDING NETWORK SECURITY SERVICES ON THE INTERNET INFRASTRUCTURE Li-Chiou Chen Institute for Software Research International Carnegie Mellon University lichiou@andrew.cmu.edu

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, oaihjj@incheon.ac.kr *2,Correponding

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: kopekcv@gmail.com

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems,

Queueing systems with scheduled arrivals, i.e., appointment systems, are typical for frontal service systems, MANAGEMENT SCIENCE Vol. 54, No. 3, March 28, pp. 565 572 in 25-199 ein 1526-551 8 543 565 inform doi 1.1287/mnc.17.82 28 INFORMS Scheduling Arrival to Queue: A Single-Server Model with No-Show INFORMS

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: maria.caridi@polimi.it Itituto

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective

Growth and Sustainability of Managed Security Services Networks: An Economic Perspective Growth and Sutainability of Managed Security Service etwork: An Economic Perpective Alok Gupta Dmitry Zhdanov Department of Information and Deciion Science Univerity of Minneota Minneapoli, M 55455 (agupta,

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation

1 Introduction. Reza Shokri* Privacy Games: Optimal User-Centric Data Obfuscation Proceeding on Privacy Enhancing Technologie 2015; 2015 (2):1 17 Reza Shokri* Privacy Game: Optimal Uer-Centric Data Obfucation Abtract: Conider uer who hare their data (e.g., location) with an untruted

More information

Name: SID: Instructions

Name: SID: Instructions CS168 Fall 2014 Homework 1 Aigned: Wedneday, 10 September 2014 Due: Monday, 22 September 2014 Name: SID: Dicuion Section (Day/Time): Intruction - Submit thi homework uing Pandagrader/GradeScope(http://www.gradecope.com/

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

How To Prepare For A Mallpox Outbreak

How To Prepare For A Mallpox Outbreak Iue Brief No. 1 Bioterrorim and Health Sytem Preparedne Addreing the Smallpox Threat: Iue, Strategie, and Tool www.ahrq.gov The Agency for Healthcare Reearch and Quality (AHRQ) i the lead agency charged

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

A New Optimum Jitter Protection for Conversational VoIP

A New Optimum Jitter Protection for Conversational VoIP Proc. Int. Conf. Wirele Commun., Signal Proceing (Nanjing, China), 5 pp., Nov. 2009 A New Optimum Jitter Protection for Converational VoIP Qipeng Gong, Peter Kabal Electrical & Computer Engineering, McGill

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET

NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET Chapter 1 NETWORK TRAFFIC ENGINEERING WITH VARIED LEVELS OF PROTECTION IN THE NEXT GENERATION INTERNET S. Srivatava Univerity of Miouri Kana City, USA hekhar@conrel.ice.umkc.edu S. R. Thirumalaetty now

More information

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms

Tap Into Smartphone Demand: Mobile-izing Enterprise Websites by Using Flexible, Open Source Platforms Tap Into Smartphone Demand: Mobile-izing Enterprie Webite by Uing Flexible, Open Source Platform acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Tap Into Smartphone Demand:

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu

Applications of Risk Analysis in Border Security Niyazi Onur Bakir, University of Southern California nbakir@usc.edu Application of Rik Analyi in Border Security Niyazi Onur Bakir, Univerity of Southern California nbakir@uc.edu 1. Overview... 1. Reearch Accomplihment....1. Security of Incoming Truck to U.S. Southwetern

More information

Group Mutual Exclusion Based on Priorities

Group Mutual Exclusion Based on Priorities Group Mutual Excluion Baed on Prioritie Karina M. Cenci Laboratorio de Invetigación en Sitema Ditribuido Univeridad Nacional del Sur Bahía Blanca, Argentina kmc@c.un.edu.ar and Jorge R. Ardenghi Laboratorio

More information

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES

QUANTIFYING THE BULLWHIP EFFECT IN THE SUPPLY CHAIN OF SMALL-SIZED COMPANIES Sixth LACCEI International Latin American and Caribbean Conference for Engineering and Technology (LACCEI 2008) Partnering to Succe: Engineering, Education, Reearch and Development June 4 June 6 2008,

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

A Note on Profit Maximization and Monotonicity for Inbound Call Centers

A Note on Profit Maximization and Monotonicity for Inbound Call Centers OPERATIONS RESEARCH Vol. 59, No. 5, September October 2011, pp. 1304 1308 in 0030-364X ein 1526-5463 11 5905 1304 http://dx.doi.org/10.1287/opre.1110.0990 2011 INFORMS TECHNICAL NOTE INFORMS hold copyright

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Unit 11 Using Linear Regression to Describe Relationships

Unit 11 Using Linear Regression to Describe Relationships Unit 11 Uing Linear Regreion to Decribe Relationhip Objective: To obtain and interpret the lope and intercept of the leat quare line for predicting a quantitative repone variable from a quantitative explanatory

More information

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China,

Health Insurance and Social Welfare. Run Liang. China Center for Economic Research, Peking University, Beijing 100871, China, Health Inurance and Social Welfare Run Liang China Center for Economic Reearch, Peking Univerity, Beijing 100871, China, Email: rliang@ccer.edu.cn and Hao Wang China Center for Economic Reearch, Peking

More information

The Cash Flow Statement: Problems with the Current Rules

The Cash Flow Statement: Problems with the Current Rules A C C O U N T I N G & A U D I T I N G accounting The Cah Flow Statement: Problem with the Current Rule By Neii S. Wei and Jame G.S. Yang In recent year, the tatement of cah flow ha received increaing attention

More information

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc.

Laureate Network Products & Services Copyright 2013 Laureate Education, Inc. Laureate Network Product & Service Copyright 2013 Laureate Education, Inc. KEY Coure Name Laureate Faculty Development...3 Laureate Englih Program...9 Language Laureate Signature Product...12 Length Laureate

More information

Morningstar Fixed Income Style Box TM Methodology

Morningstar Fixed Income Style Box TM Methodology Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction

More information

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms

Risk Management for a Global Supply Chain Planning under Uncertainty: Models and Algorithms Rik Management for a Global Supply Chain Planning under Uncertainty: Model and Algorithm Fengqi You 1, John M. Waick 2, Ignacio E. Gromann 1* 1 Dept. of Chemical Engineering, Carnegie Mellon Univerity,

More information

Bidding for Representative Allocations for Display Advertising

Bidding for Representative Allocations for Display Advertising Bidding for Repreentative Allocation for Diplay Advertiing Arpita Ghoh, Preton McAfee, Kihore Papineni, and Sergei Vailvitkii Yahoo! Reearch. {arpita, mcafee, kpapi, ergei}@yahoo-inc.com Abtract. Diplay

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

Assessing the Discriminatory Power of Credit Scores

Assessing the Discriminatory Power of Credit Scores Aeing the Dicriminatory Power of Credit Score Holger Kraft 1, Gerald Kroiandt 1, Marlene Müller 1,2 1 Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Gottlieb-Daimler-Str. 49, 67663 Kaierlautern,

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring

Redesigning Ratings: Assessing the Discriminatory Power of Credit Scores under Censoring Redeigning Rating: Aeing the Dicriminatory Power of Credit Score under Cenoring Holger Kraft, Gerald Kroiandt, Marlene Müller Fraunhofer Intitut für Techno- und Wirtchaftmathematik (ITWM) Thi verion: June

More information

INFORMATION Technology (IT) infrastructure management

INFORMATION Technology (IT) infrastructure management IEEE TRANSACTIONS ON CLOUD COMPUTING, VOL. 2, NO. 1, MAY 214 1 Buine-Driven Long-term Capacity Planning for SaaS Application David Candeia, Ricardo Araújo Santo and Raquel Lope Abtract Capacity Planning

More information

INSIDE REPUTATION BULLETIN

INSIDE REPUTATION BULLETIN email@inidetory.com.au www.inidetory.com.au +61 (2) 9299 9979 The reputational impact of outourcing overea The global financial crii ha reulted in extra preure on Autralian buinee to tighten their belt.

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network

Performance Evaluation and Delay Modelling of VoIP Traffic over 802.11 Wireless Mesh Network International Journal of Computer Application (975 8887) Volume 1 No.9, May 11 Performance Evaluation and Delay Modelling of VoIP Traffic over 8.11 Wirele Meh Network Amit Chhabra Dept. of CSE SDDIET,

More information

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling

Control of Wireless Networks with Flow Level Dynamics under Constant Time Scheduling Control of Wirele Network with Flow Level Dynamic under Contant Time Scheduling Long Le and Ravi R. Mazumdar Department of Electrical and Computer Engineering Univerity of Waterloo,Waterloo, ON, Canada

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Proceedings of Power Tech 2007, July 1-5, Lausanne

Proceedings of Power Tech 2007, July 1-5, Lausanne Second Order Stochatic Dominance Portfolio Optimization for an Electric Energy Company M.-P. Cheong, Student Member, IEEE, G. B. Sheble, Fellow, IEEE, D. Berleant, Senior Member, IEEE and C.-C. Teoh, Student

More information

OPINION PIECE. It s up to the customer to ensure security of the Cloud

OPINION PIECE. It s up to the customer to ensure security of the Cloud OPINION PIECE It up to the cutomer to enure ecurity of the Cloud Content Don t outource what you don t undertand 2 The check lit 2 Step toward control 4 Due Diligence 4 Contract 4 E-dicovery 4 Standard

More information

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds

RO-BURST: A Robust Virtualization Cost Model for Workload Consolidation over Clouds !111! 111!ttthhh IIIEEEEEEEEE///AAACCCMMM IIInnnttteeerrrnnnaaatttiiiooonnnaaalll SSSyyymmmpppoooiiiuuummm ooonnn CCCllluuuttteeerrr,,, CCClllooouuuddd aaannnddd GGGrrriiiddd CCCooommmpppuuutttiiinnnggg

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

RISK MANAGEMENT POLICY

RISK MANAGEMENT POLICY RISK MANAGEMENT POLICY The practice of foreign exchange (FX) rik management i an area thrut into the potlight due to the market volatility that ha prevailed for ome time. A a conequence, many corporation

More information

Towards Control-Relevant Forecasting in Supply Chain Management

Towards Control-Relevant Forecasting in Supply Chain Management 25 American Control Conference June 8-1, 25. Portland, OR, USA WeA7.1 Toward Control-Relevant Forecating in Supply Chain Management Jay D. Schwartz, Daniel E. Rivera 1, and Karl G. Kempf Control Sytem

More information

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn

Distributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Ditributed, Secure Load Balancing with Skew, Heterogeneity, and Churn Jonathan Ledlie and Margo Seltzer Diviion of Engineering and Applied Science Harvard Univerity Abtract Numerou propoal exit for load

More information

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow

Senior Thesis. Horse Play. Optimal Wagers and the Kelly Criterion. Author: Courtney Kempton. Supervisor: Professor Jim Morrow Senior Thei Hore Play Optimal Wager and the Kelly Criterion Author: Courtney Kempton Supervior: Profeor Jim Morrow June 7, 20 Introduction The fundamental problem in gambling i to find betting opportunitie

More information

Office of Tax Analysis U.S. Department of the Treasury. A Dynamic Analysis of Permanent Extension of the President s Tax Relief

Office of Tax Analysis U.S. Department of the Treasury. A Dynamic Analysis of Permanent Extension of the President s Tax Relief Office of Tax Analyi U.S. Department of the Treaury A Dynamic Analyi of Permanent Extenion of the Preident Tax Relief July 25, 2006 Executive Summary Thi Report preent a detailed decription of Treaury

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

SGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal

SGROI FINANCIAL. Contact us if you are interested in getting access to our new Client Portal the SGROI FINANCIAL N E W S L E T T E R INVESTMENTS ANNUITIES ESTATE PLANNING IRA S 401K PLANS 403(b) PLANS ROLLOVERS INSURANCE Sgroi Financial New Client Portal Streamline Information Acce Volume 5 Number

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products

your Rights Consumer Guarantees Understanding Consumer Electronic Devices, Home Appliances & Home Entertainment Products Conumer Guarantee Undertanding your Right Conumer Electronic Device, Home Appliance & Home Entertainment Product Voluntary Warranty Guide February 2014 JB Hi-Fi Group Pty Ltd (ABN 37 093 II4 286) The Autralian

More information

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements :

SPECIFICATIONS FOR PERIMETER FIREWALL. APPENDIX-24 Complied (Yes / No) Remark s. S.No Functional Requirements : S.No Functional Requirement : 1 The propoed olution mut allow ingle policy rule creation for application control, uer baed control, hot profile, threat prevention, Anti-viru, file filtering, content filtering,

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

Algorithms for Advance Bandwidth Reservation in Media Production Networks

Algorithms for Advance Bandwidth Reservation in Media Production Networks Algorithm for Advance Bandwidth Reervation in Media Production Network Maryam Barhan 1, Hendrik Moen 1, Jeroen Famaey 2, Filip De Turck 1 1 Department of Information Technology, Ghent Univerity imind Gaton

More information

Bundled Discounts: Strategic Substitutes or Complements?

Bundled Discounts: Strategic Substitutes or Complements? Bundled Dicount: Strategic Subtitute or Complement? Duarte Brito y Univeridade Nova de Liboa and CEFGE-UE Helder Vaconcelo z Faculdade de Economia, Univeridade do Porto, CEF.UP and CEPR June 2, 24 btract

More information

Socially Optimal Pricing of Cloud Computing Resources

Socially Optimal Pricing of Cloud Computing Resources Socially Optimal Pricing of Cloud Computing Reource Ihai Menache Microoft Reearch New England Cambridge, MA 02142 t-imena@microoft.com Auman Ozdaglar Laboratory for Information and Deciion Sytem Maachuett

More information

Network Architecture for Joint Failure Recovery and Traffic Engineering

Network Architecture for Joint Failure Recovery and Traffic Engineering Network Architecture for Joint Failure Recovery and Traffic Engineering Martin Suchara Dept. of Computer Science Princeton Univerity, NJ 08544 muchara@princeton.edu Dahai Xu AT&T Lab Reearch Florham Park,

More information

AN OVERVIEW ON CLUSTERING METHODS

AN OVERVIEW ON CLUSTERING METHODS IOSR Journal Engineering AN OVERVIEW ON CLUSTERING METHODS T. Soni Madhulatha Aociate Preor, Alluri Intitute Management Science, Warangal. ABSTRACT Clutering i a common technique for tatitical data analyi,

More information

Availability of WDM Multi Ring Networks

Availability of WDM Multi Ring Networks Paper Availability of WDM Multi Ring Network Ivan Rado and Katarina Rado H d.o.o. Motar, Motar, Bonia and Herzegovina Faculty of Electrical Engineering, Mechanical Engineering and Naval Architecture, Univerity

More information

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015

Review of Multiple Regression Richard Williams, University of Notre Dame, http://www3.nd.edu/~rwilliam/ Last revised January 13, 2015 Review of Multiple Regreion Richard William, Univerity of Notre Dame, http://www3.nd.edu/~rwilliam/ Lat revied January 13, 015 Aumption about prior nowledge. Thi handout attempt to ummarize and yntheize

More information

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow

Gabriel E. Arrobo and Richard D. Gitlin, NAI Charter Fellow Technology and Innovation, Vol. 15, pp. 227 236, 2013 1949-8241/13 $90.00 +.00 Printed in the USA. All right reerved. DOI: http://dx.doi.org/10.3727/194982413x13790020921825 Copyright ã 2013 Cognizant

More information

Maximizing Acceptance Probability for Active Friending in Online Social Networks

Maximizing Acceptance Probability for Active Friending in Online Social Networks Maximizing for Active Friending in Online Social Network De-Nian Yang, Hui-Ju Hung, Wang-Chien Lee, Wei Chen Academia Sinica, Taipei, Taiwan The Pennylvania State Univerity, State College, Pennylvania,

More information

1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3

1. Introduction. C. Camisullis 1, V. Giard 2, G. Mendy-Bilek 3 Proceeding of the 3 rd International Conference on Information Sytem, Logitic and Supply Chain Creating value through green upply chain ILS 2010 Caablanca (Morocco), April 14-16 The right information to

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

Is Mark-to-Market Accounting Destabilizing? Analysis and Implications for Policy

Is Mark-to-Market Accounting Destabilizing? Analysis and Implications for Policy Firt draft: 4/12/2008 I Mark-to-Market Accounting Detabilizing? Analyi and Implication for Policy John Heaton 1, Deborah Luca 2 Robert McDonald 3 Prepared for the Carnegie Rocheter Conference on Public

More information

January 21, 2015. Abstract

January 21, 2015. Abstract T S U I I E P : T R M -C S J. R January 21, 2015 Abtract Thi paper evaluate the trategic behavior of a monopolit to influence environmental policy, either with taxe or with tandard, comparing two alternative

More information

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System

Research Article An (s, S) Production Inventory Controlled Self-Service Queuing System Probability and Statitic Volume 5, Article ID 558, 8 page http://dxdoiorg/55/5/558 Reearch Article An (, S) Production Inventory Controlled Self-Service Queuing Sytem Anoop N Nair and M J Jacob Department

More information

A Communication Model with Limited Information-Processing Capacity of Recipients. Oleg V. Pavlov WPI. Robert K. Plice San Diego State University

A Communication Model with Limited Information-Processing Capacity of Recipients. Oleg V. Pavlov WPI. Robert K. Plice San Diego State University A Communication Model with Limited Information-Proceing Capacity of Recipient Oleg V. Pavlov WPI Robert K. Plice San Diego State Univerity Nigel Melville Univerity of Michigan, Ann Arbor Keyword pam, email,

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Delivering the Next Generation of Satellite and Terrestrial Communications

Delivering the Next Generation of Satellite and Terrestrial Communications Delivering the Next Generation of Satellite and Terretrial Communication Editor Letter Developing new technology i a daunting and neceary tak if companie are to tay competitive in today global communication

More information

Improving the Performance of Web Service Recommenders Using Semantic Similarity

Improving the Performance of Web Service Recommenders Using Semantic Similarity Improving the Performance of Web Service Recommender Uing Semantic Similarity Juan Manuel Adán-Coello, Carlo Miguel Tobar, Yang Yuming Faculdade de Engenharia de Computação, Pontifícia Univeridade Católica

More information

Sector Concentration in Loan Portfolios and Economic Capital. Abstract

Sector Concentration in Loan Portfolios and Economic Capital. Abstract Sector Concentration in Loan Portfolio and Economic Capital Klau Düllmann and Nancy Machelein 2 Thi verion: September 2006 Abtract The purpoe of thi paper i to meaure the potential impact of buine-ector

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast

Final Award. (exit route if applicable for Postgraduate Taught Programmes) N/A JACS Code. Full-time. Length of Programme. Queen s University Belfast Date of Reviion Date of Previou Reviion Programme Specification (2014-15) A programme pecification i required for any programme on which a tudent may be regitered. All programme of the Univerity are ubject

More information

Exposure Metering Relating Subject Lighting to Film Exposure

Exposure Metering Relating Subject Lighting to Film Exposure Expoure Metering Relating Subject Lighting to Film Expoure By Jeff Conrad A photographic expoure meter meaure ubject lighting and indicate camera etting that nominally reult in the bet expoure of the film.

More information

APEC Environmental Goods and Services Work Program

APEC Environmental Goods and Services Work Program APEC Environmental Good and Service In Sydney in 2007 APEC Leader committed, through wide-ranging and ambitiou action, a et out in the Sydney Action Agenda, to enuring the energy need of the economie whilt

More information

MBA 570x Homework 1 Due 9/24/2014 Solution

MBA 570x Homework 1 Due 9/24/2014 Solution MA 570x Homework 1 Due 9/24/2014 olution Individual work: 1. Quetion related to Chapter 11, T Why do you think i a fund of fund market for hedge fund, but not for mutual fund? Anwer: Invetor can inexpenively

More information

Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001*

Unusual Option Market Activity and the Terrorist Attacks of September 11, 2001* Allen M. Potehman Univerity of Illinoi at Urbana-Champaign Unuual Option Market Activity and the Terrorit Attack of September 11, 2001* I. Introduction In the aftermath of the terrorit attack on the World

More information

How to Maximize User Satisfaction Degree in Multi-service IP Networks

How to Maximize User Satisfaction Degree in Multi-service IP Networks How to Maximize Uer Satifaction Degree in Multi-ervice IP Network Huy Anh Nguyen, Tam Van Nguyen and Deokai Choi Department of Electronic and Computer Engineering Chonnam National Univerity Gwangu, KOREA

More information

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1

Strategic Plan of the Codex Alimentarius Commission 2014-2019 1 Strategic Plan of the Codex Alimentariu Commiion 2014-2019 1 STRATEGIC PLAN OF THE CODEX ALIMENTARIUS COMMISSION 2014-2019 INTRODUCTION The Codex Alimentariu Commiion (CAC) wa etablihed by the Food and

More information

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools

Progress 8 measure in 2016, 2017, and 2018. Guide for maintained secondary schools, academies and free schools Progre 8 meaure in 2016, 2017, and 2018 Guide for maintained econdary chool, academie and free chool July 2016 Content Table of figure 4 Summary 5 A ummary of Attainment 8 and Progre 8 5 Expiry or review

More information