An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple Protocols
|
|
- Megan Willis
- 8 years ago
- Views:
Transcription
1 Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp (2015) DOI: /jase An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols Hsng-Chung Chen 1,2, Chuan-Hsen Mao 1 and Shan-Shyong Tseng 3 * 1 Department of Computer Scence and Informaton Engneerng, Asa Unversty, Tachung, Tawan 413, R.O.C. 2 Department of Medcal Research, Chna Medcal Unversty Hosptal, Chna Medcal Unversty, Tachung, Tawan 404, R.O.C. 3 Department of Appled Informatcs and Multmeda, Asa Unversty, Tachung, Tawan 413, R.O.C. Abstract In recent years, there have been many approaches proposed by many researchers to detect RTT (round-trp tme) and RTO (retransmsson tmeout) message traffc accessng emal and tryng to determne whether these belong to dangerous traffc. The am of ths study s to protect an electronc mal (emal) server system based on the ntegrated entropy calculatons of the multple protocols of RTT and RTO n order to detect floodng attacks. Entropy s an approach n the mathematcal theory of communcaton. It can be used to measure the uncertanty or randomness n a random varable. A normal emal server usually supports four protocols consstng of smple mal transfer protocol (SMTP), post offce protocol verson 3 (POP3), Internet Message Access Protocol verson 4 (IMAP4), and HTTPS beng used by a remote web-based emal. However, n the nternet, there are many floodng attacks that attempt to paralyze an emal server system. Therefore, we propose a new approach for detectng floodng attacks based on the ntegrated entropy measurements for an emal server. Our approach can reduce the msjudged rate compared to conventonal approaches. Key Words: Entropy, Floodng Attack, E-mal Server, RTT, RTO 1. Introducton In recent years, the rapd development of technologes has helped people to communcate nformaton and share nformaton va the nternet. Emal has become one of the necessary communcaton servces for nternet users. The usng of electronc mal (emal) s a method of exchangng dgtal messages from one person to one or more recpents, va connectng through the nternet or computer network. There are many types of reasons for usng emal servces, from prvate purposes to busness purposes. The emal servce provder (ESP) s an organzaton whch provdes emal servers to send, receve and store emals for personal and/or organzatonal necessty. Some ESPs who may provde the servces to the general *Correspondng author. E-mal: sstseng@asa.edu.tw publc for personal emal are Gmal, Yahoo Mal, Hotmal and many others. Each emal server s able to support many knds of protocol. In 1982, the early stage of emal development, the smple mal transfer protocol (SMTP, for short) was formulated n RFC (Request for Comments) 821 [1,2]. SMTP s a protocol for a mal sender that communcates wth a mal recever. On certan types of smaller nodes n the nternet t s often mpractcal to mantan a message transport system [3]. For example, a workstaton may not have suffcent resources (cycles, dsk space) n order to permt a SMTP server [RFC821] [3]. To solve ths problem, The post offce protocol-verson 3 (POP3, for short) s ntended to permt a workstaton to dynamcally access a mal drop on a server host n a useful fashon. Usually, ths means that the POP3 protocol s used to allow a workstaton to retreve mal that the server s holdng for
2 80 Hsng-Chung Chen et al. t. POP3 s an applcaton layer Internet standard protocol used by local emal clents to retreve emal from a remote server over a transmsson control protocol/nternet protocol (TCP/IP) connecton. The other protocol whch s also supported by emal server s Internet Message Access Protocol (IMAP, for short) [4]. In 2003, M. Crspn [5] proposed the latest verson IMAP verson 4rev1 (IMAP4, for short) whch s formulated n RFC It has also been publshed wht the Internet Engneerng Task Force (IETF). The MAP4 allows a clent to access and manpulate electronc mal messages on a server [5]. IMAP4 permts manpulaton of remote message folders, called malboxes, n a way that s functonally equvalent to local malboxes. IMAP4 also provdes the capablty for an offlne clent to resynchronze wth the server. There s the other approach for supportng emal servces called webmal (or web-based emal) [6,7]. It s any emal clent mplemented as a web applcaton accessed va a web browser. For example, when accessng webmal at you wll be redrected to a SSL [6] secured address and your connecton wll be encrypted. The secure sockets layer (SSL) protocol verson 3.0 was proposed by P. Karlton [6], n 2011, whch s formulated n RFC 6101 [6]. It s a securty protocol that provdes communcatons prvacy over the nternet va HTTPS (hypertext transfer protocol secure). Moreover, the most drect approach s usng the RTT (round-trp tme) and RTO (retransmsson tmeout) of transmsson control protocol (TCP) [8]. When a network s creatng a connecton, t communcates from the sender to the recever. The communcaton needs to respond by makng a round trp. By round trp the response obtans the tme of the RTT. It knows f the message traffc s normal or not [8]. The protocol allows clent/server applcatons to communcate n a way that s desgned to prevent eavesdroppng, tamperng, or message forgery [6]. However, a smple emal server has a lot of users and because of ts mportance; t s an easy target to attack. The methods of attacks nclude an SMTP floodng attack, spam attacks and malcous attachments n emals [9 13]. The varous floodng attacks wll ncrease the loadng of the server. In ths paper, we propose an approach for detectng floodng attacks based on an ntegrated entropy measurement n emal server. Then, we use the entropy operatons [14 17] to analyse the receved packets, n order to estmate RTT and RTO from the SMTP together wth POP3, IMAP4, HTTP messages flows [18], and then evaluate ts correspondng rsk nformaton. Therefore, the rsk nformaton wll be used to descrbe the status of the servng server. Accordng to the value of ths status, the server wll determne whether t s has suffered reduced performance by floodng attacks. The remander of ths paper s organzed as follows. Secton 2 descrbes the SMTP, POP3, IMAP4 and entropy operaton related work. In secton 3, we propose a new approach for detectng floodng attacks based on the ntegrated entropy calculatons of multple protocols n an emal server, and descrbe how to calculate the evaluate value of rsk nformaton of emal server. Fnally, we present our conclusons n secton Related Works In our proposed approach, we use the entropy measurement to detect the behavor of traffc of multple protocols for an emal server. Therefore, n secton 2, we wll descrbe the RTT and RTO of normal message flows of the SMTP standard [1,2], POP3 [3], IMAP [5], HTTPS [6] and the entropy operatons [14 17]. 2.1 SMTP Frst of all, SMTP was defned n the RFC 821 [1,2]. It s an ndependent subsystem n a specal communcaton system. In ths communcaton system, t only needs a relable channel to transmt the related sequence message flows. SMTP has an mportant smple delverng emal protocol n whch t can forward an emal between two dfferent networks. The archtecture of SMTP s shown n Fgure 1. In the SMTP archtecture [17], t conssts of a sender, a sender-smtp, a recever-smtp and a recever. When a sender (user or fle server) connects to another recever, t wll send a request message of establshng a connecton to the sender-smtp. Then, the sender-smtp wll establsh a two-way transmsson channel n order to connect the recever. The recever- SMTP wll be at a destnaton pont or a relay pont. Thus, Fgure 1. The SMTP archtecture [1,2,4].
3 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols 81 the sender-smtp wll send the related SMTP commands to the recever-smtp. Fnally, the recever-smtp wll follow these commands to send back a SMTP response message to sender-smtp. Accordng to the above steps, f the command-response par was completed durng one normal tme-perod, t means that a round of the SMTP sesson was completed. The establshed SMTP message flows are dvded nto seven stages [17] as seen below: establshes connecton, HELO, MAIL FROM, RCPT TO, DATA, DATA TRANSFER, and QUIT. The SMTP message flows are shown n Fgure 2 [4]. 2.2 POP 3 (Post Offce Protocol) Post offce protocol (POP) [3] s an applcaton layer nternet standard protocol used by local emal clents to retreve emal from a remote server over a TCP/IP connecton. The POP 3 messages flow s shown as Fgure 3 [3]. The POP3 flow of transacton state s shown as Fgure IMAP (Internet Message Access Protocol) Internet Message Access Protocol (IMAP) s one of two general protocols for recevng electronc mal. The Internet Message Access Protocol verson 4rev1 (IMAP4rev1) [5] allows a clent to access and manpulate electronc mal messages n the server. IMAP4rev1 permts manpulaton of malboxes n a way that s functonally equvalent to local folders IMAP Message Flow IMAP verson 4 has been defned n RFC 3501 [5]. Ths protocol s an nteracton of a clent/server; consstng of a clent command, server data and completon result response. The man archtecture of the IMAP s shown as Fgure 5. The steps of ths fgure are descrbed as below. 1. Connecton wthout pre-authentcaton (OK greetng) 2. Pre-authentcated connecton (PREAUTH greetng) 3. Rejected connecton (BYE greetng) 4. Successful LOGIN or AUTHENTICATE command 5. Successful SELECT or EXAMINE command 6. CLOSE command, or faled SELECT or EXAMINE command 7. LOGOUT command, server shutdown, or connecton closed Fgure 3. POP3 flow authorzaton state [3]. Fgure 2. SMTP message flows [1,2,4]. Fgure 4. POP3 flow transacton state [3].
4 82 Hsng-Chung Chen et al. Once authentcated, t s not possble to re-enter a not authentcated state. In addton the unversal command (any state command) s vald n the NOT Authentcated state. For a descrpton of a not authentcated state clent server communcaton, s shown n the Fgure 7 as seen below. Fgure 5. IMAP archtecture [5] IMAP Clent Commands Any State In the any state clent command, there are three commands: CAPABILITY, NOOP, and LOGOUT. These commands are always be used n NOT Authentcated state, Authentcated state, and selected state. In the communcaton flows of the clent server, any state commands are shown n Fgure IMAP Clent Commands Not an Authentcated State In the not-an-authentcated state, the AUTHENTICATE or LOGIN command establshes authentcaton and enters the authentcated state. The AUTHENTICATE command provdes a general mechansm for a varety of authentcaton technques, prvacy protecton, and ntegrty checkng [5]. The STARTTLS command s an alternate form of establshng sesson prvacy protecton and ntegrty checkng, but doesn t establsh authentcaton or enter the authentcated state. Server mplementatons may allow access to certan malboxes wthout establshng authentcaton. Ths can be done by means of the ANONYMOUS authentcator. An older conventon s a LOGIN command usng use rd anonymous ; n ths case, a password s requred although the server may choose to accept any password. The restrctons placed on anonymous user are mplementaton-dependent [5] IMAP Clent Commands Authentcated State In the authentcated state, commands that manpulate malboxes are permtted. Of these commands, the SELECT and EXAMINE commands wll select a malbox for access and enter the selected state. In the authentcated state, the unversal commands (CAPABILITY, NOOP, and LOGOUT), are also vald and can be used. The commands n an authentcated state are: SELECT, EXAMINE, CREATE, DELETE, RENAME, SUBSCRIBE, UNSUBSCRIBE, LIST, LSUB, STATUS, and APPEND. For a descrpton of clent server communcaton n the authentcated state for IMAP, please see Fgure HTTPs HTTPs s a communcatons protocol for secure communcaton over the nternet. Techncally, t s not a Fgure 6. IMAP flow any state [5]. Fgure 7. IMAP flow not authentcated state [5].
5 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols RTT RTT s the tme requred for a packet to travel from a specfc source to a specfc destnaton and back agan. Typcally, RTT s dvded nto three parts: propagaton delay, processng delay and queung delay [8]. The frst parts of the values for a TCP connecton s the opposte fxed. The router cache s queung and processng tme as the entre network congeston of a degree more changng. Therefore, RTT of changng n a degree react the network of congeston. 1) Mean devaton (MD) It s the mean of the dstances between each value and the mean. It gves us an dea of how spread out from the center the set of values s. The equaton [8] s shown as (1). (1) By calculatng the MD, we are able to determne the volatlty of certan nformaton. As used here, the MD can be used to measure the RTT of jtter state. 2) RTT measurement prncple RTT measurements [8] can be used n two ways: A. TCP Tmestamp Opton TCP tmestamp opton can be used to accurately measure the RTTs [8]. The equaton [8] s shown as (2). Fgure 8. IMAP flow authentcated state [5]. protocol n and of tself; but rather, t s the result of smply layerng the HTTP on top of the SSL/TLS (secure sockets layer/transport layer securty) protocol [6], thus addng the securty capabltes of SSL/TLS to standard HTTP communcatons. In ts popular deployment on the nternet, HTTPS provdes authentcaton of the web ste and assocated web server that one s communcatng wth, whch protects aganst man-n-the-mddle attacks [7]. 2.5 RTT and RTO In ths subsecton, RTT [8] and RTO [8] wll be descrbed as below. RTT = current tme tmestamp recorded (sendng tme) (2) The tmestamp recorded s the packet flow when sendng out of tme. You can easly get a measurement of RTT. It recognzes the receved (current tme) and sent tmes whch can be easly used to get a measurement value of RTT. B. The retransmsson queue control block TCP data packets In the TCP retransmsson, the queue saves the sent data packets, but unacknowledged data. The equaton [8] s shown as (3). RTT = current tme tcp_skb_cb (3) where tcp_skb_cb means the frst data packet transmsson tme. The TCP have to use Karn s algorthm [8] for takng RTT samples. That s, RTT samples MUST NOT be made usng segments that were retransmtted (and thus for whch t s ambguous whether the reply was for the frst nstance of the packet or a later nstance). The only case s when the TCP can safely take RTT samples from retransmtted segments when the TCP tmestamp opton s employed, snce the tmestamp opton removes the ambguty regardng whch nstance of the data segment trggered the acknowledgement [8].
6 84 Hsng-Chung Chen et al RTO The TCP of retransmsson and tmeout are very mportant for obtanng the connected RTT measurements [8]. Because the network traffc s changng the retransmsson tme wll also change. The TCP needs to follow these changes and dynamcally adjust the tmeout of the tmed RTO [8]. The RTO s descrbed n RFC2988, the TCP uses a retransmsson tmer to ensure data delvery n the absence of any feedback from the remote data recever, the duraton of ths tmer s referred to as the RTO [8]. 2.6 Entropy Theory Named after Boltzmann s H-theorem, Shannon [19, 20] defned the entropy H (Greek letter Eta) as a dscrete random varable X wth possble values {x 1,,x n } and probablty mass functon P(X) [19,20] as shown n (4). (4) where E s the expected value operator, and I s the nformaton content of X. I(X) s tself a random varable. When taken from a fnte sample, the entropy [19] can explctly be shown as (5). (5) where b s the base of the logarthm used, The common values of b are 2, natural logarthm e, and 10, and the unt of entropy s a bt, such as b =2,b = e,orb = 10. In the case of p(x )=0forsome, the value of the correspondng summand 0 log b (0) s taken to be 0, whch s consstent wth the well-known lmt as the equaton (6). 3. Emal Server Preventon Aganst Floodng Attack Based on Entropy In ths secton, the ntegrated entropy measurements of multple emal protocols wth the supportng RTT and RTO n an emal server are descrbed as below. There are four emal protocols mentoned n secton 2. It s assumed that the message flows for each protocol wll be dvded nto RTT and RTO message flows between a server and clents. Then, the entropy operatons are used to calculate the entropy values of RTT and RTO message flows for each protocol, ndvdually. The two equatons set (8) and (9), for RTT and RTO respectvely, are lsted n Table 1 as below. Accordng to above those equatons, we defne the Evoluton Algorthm as below. Evoluton Algorthm Input ( H( X K ), H( X )), K, an emal servce message T RTT T, RTO flow par ncludes two entropy values for the RTT and RTO message flow durng the samplng tme duraton T, where T = 1, 2,, t. Output Result cost values C KT of the emal server status n T. The cost values C KT {crtcal hgh, very hgh, hgh, normal, low, very low} = {CH, VH, H, N, L, VL} are the evoluton n order to support further judgements for the emal whether under floodng attacks or not. Also, the result wll show what knd of emal protocol the system s usng s recevng floodng attacks. Begn (6) One may also defne the condtonal entropy of two events X and Y takng values x and y j respectvely, as the equaton (7). (7) where p(x, y j ) s the probablty that X = x and Y = y j. Ths quantty should be understood as the amount of randomness n the random varable X gven that you know the value of Y [19,20].
7 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols 85 Fnally, the algorthm returns the cost values for the current samplng tme duraton T. The cost values can ndcate the evoluton cost n order to support the judgments for the emal server whether under floodng attacks or not. Also, the result wll show what knd of emal protocol the system s usng f recevng floodng attacks. End; 4. Smulaton Results and Dscussons The scheme compared to the proposed scheme [9] s qute fast and easy to gve a real-tme evoluton for judgment processes of detectng floodng attacks n a traffc volume vew. Therefore, an example s shown the smu- Table 1. The equatons set of RTT and RTO message flows generated from four protocols The equatons set for RTT message flow (8) The equatons set for RTO message flows (9) H( X Y) p( x, y )log (, ) u j, j Px yj H( X Z) p( x, z )log (, ) u j, j Px zj H( X S) p( x, s )log (, ) u j, j Px sj HY ( X) py (, x)log (, ) u j, j Py xj HY ( Z) py (, z)log (, ) u j, j Py zj HY ( S) py (, s)log (, ) u j, j Py sj H( Z X) p( z, x )log (, ) u j, j Pz xj H( Z Y) p( z, y )log (, ) u j, j Pz yj H( Z S) p( z, s )log (, ) u j, j Pz sj H( S X) p( s, x )log (, ) u j, j Ps xj H( S Y) p( s, y )log (, ) u j, j Ps yj H( S Z) p( s, z )log (, ) u j, j Ps zj H( X Y) p( x, y )log (, ) v j, j Px yj H( X Z) p( x, z )log (, ) v j, j Px zj H( X S) p( x, s )log (, ) v j, j Px sj HY ( X) py (, x)log (, ) v j, j Py xj HY ( Z) py (, z)log (, ) v j, j Py zj HY ( S) py (, s)log (, ) v j, j Py sj H( Z X) p( z, x )log (, ) v j, j Pz xj H( Z Y) p( z, y )log (, ) v j, j Pz yj H( Z S) p( z, s )log (, ) v j, j Pz sj H( S X) p( s, x )log (, ) v j, j Ps xj H( S Y) p( s, y )log (, ) v j, j Ps yj H( S Z) p( s, z )log (, ) v j, j Ps zj Notes: X: SMTP; Y: POP3; Z: IMAP4; S: HTTP (s); u: RTT; v: RTO, where XK { x,,,..., } T, RTT K x T, RTT K x T, RTT K x T, RTT KT, RTT s a random entropy value of the RTT message flow durng samplng tme duraton T, and XK { x,, T, RTO K x T, RTO KT, RTO KT, RTO K 3 T, RTO 1 2 x,..., x } s a random entropy value of the RTO message flow durng samplng tme duraton T; H ( X, ) K RTT s an entropy value set for the RTT message flow; H( XK, ) T RTO s an entropy value set for the RTO message flow; K {X, Y, Z, S}. T
8 86 Hsng-Chung Chen et al. laton results n example 1. Due to the evoluton algorthm proposed n secton 3, the algorthm s qute smple for detectng heavy traffc wth unmoral traffc flows whch are appled to e-mal protocols. Example 1. Assume that there exsts four protocols servng for e-mal server are montored. After obtanng the RTT values at four dfferent tme perods, where the tme-perod seres s lsted as T {T n 3, T n 2, T n 1, T n }, and T n s current tme, T n 1, T n 2, T n 3 are the past tme perod compared to T n for the tme to measure RTT values. Moreover, the RTO values are then calculated by usng the measured RTT values. The smulated RTT results n Tables 2, 3 and 4 are used to calculate the RTO values on the tme perods T n 1, T n 2, T n 3 whch are three prevous tmes compared to the current tme perod T n. The calculated results are shown n Table 5 for the current tme perod, n whch the RTT smulated values are frst obtaned from network, and the RTO values are also calculated. Fnally, the entropy values are calculated by usng the RTT and RTO values. The entropy values of RTT and RTO are the ones used that wll gan the best cost value compared wth the average cost values obtaned on the three past tme perods. Fnally, ths approach wll provde a result as shown n Table 5. Compared wth the three average cost values obtaned by three prevous tme perods, ths coupled wth the entropy values changng, they can be used to detect whether the e-mal system wth four protocols are sufferng the varety of floodng attacks or not. Fnally, the system wll assgn a letter or combnaton of letters denotng the severty of the floodng attack as follows: CH, VH, H, N, Table 2. RTT values were obtaned at T = T n 3 Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v H RTT + H RTO SMTP POP IMAP POP SMTP IMAP SMTP HTTPS POP STMP POP IMAP POP HTTPS IMAP SMTP IMAP HTTPS HTTPS SMTP HTTPS POP HTTPS IMAP Note: RTT and RTO unt: second. Table 3. RTT values were obtaned at T = T n 2 Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v H RTT + H RTO SMTP POP IMAP POP SMTP IMAP SMTP HTTPS POP STMP POP IMAP POP HTTPS IMAP SMTP IMAP HTTPS HTTPS SMTP HTTPS POP HTTPS IMAP Note: RTT and RTO unt: second.
9 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols 87 Table 4. RTT values were obtaned at T = T n 1 Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v H RTT + H RTO SMTP POP IMAP POP SMTP IMAP SMTP HTTPS POP STMP POP IMAP POP HTTPS IMAP SMTP IMAP HTTPS HTTPS SMTP HTTPS POP HTTPS IMAP Note: RTT and RTO unt: second. Table 5. Fnal results for current tme T = T n Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v CK T n CKT past New H Result SMTP POP VH IMAP POP VH SMTP IMAP VL SMTP HTTPS L POP STMP L POP IMAP CH POP HTTPS L IMAP SMTP CH IMAP HTTPS CH HTTPS SMTP L HTTPS POP L HTTPS IMAP VL CK C T 1 T 2 T 3 Notes: K C n K C n K, CK H( X Y), ( ), Tpast T u T H X Y n n v T, and the metrc of RTT and RTO s second. n 3 L, VL, where CH s crtcal hgh, VH s very hgh, H s hgh, N s normal, L s low and VL s very low. 5. Conclusons In ths study, we proposed a new approach for detectng floodng attacks based on the ntegrated entropy measurements of multple emal protocols by usng measured RTT and RTO n an emal system. Our approach can reduce the msjudge rate compared to conventonal approaches. By applyng ths approach, the current status of the emal server s able to be quckly analysed and determned whether the server s sufferng from by multple floodng attacks or not. Fnally, accordng to the evoluton cost value of an emal server by usng the ntegrated entropy measurement approach as proposed n ths paper, t can detect floodng attacks more easly and quckly. Acknowledgements Ths work was supported n part by the Mnstry of Scence and Technology, Tawan, Republc of Chna, under Grant MOST E , also NSC S MY3. References [1] Postel, J. B., A Smple Mal Transfer Protocol, RFC821 (1982).
10 88 Hsng-Chung Chen et al. [2] Klensn, J., A Smple Mal Transfer Protocol, RFC5321 (2008). [3] Myers, J. and Rose, M., Post Offce Protocol-Verson 3, RFC 1939 (1996). [4] Crspn, M., Request for Comments: 2060, Standards Track, Network Workng Group, Dec. (1996). [5] Crpsn, M., Internet Message Access Protocol-Verson 4rev1, RFC3501 (2003). [6] Karlton, P., Request for Comments: 6101, Standards Track, Network Workng Group, August (2011). [7] Wkpeda, HTTP Secure, [On-Lne] peda.org/wk/http_secure, [8] Zhangsk, RTT of Measure and RTO of Calculatons n TCP, [On-Lne] detals/ [9] Chen, H. C., Sun, J. Z. and Wu, Z. D., Dynamc Forenscs System wth Intruson Tolerance Based on Herarchcal Colour Petr-Nets, BWCCA 2010: Internatonal Conference on Broadband and Wreless Com - putng, Communcaton and Applcatons, Fukuoka, Japan, November 4 6, pp do: / BWCCA [10] O Donnell, A. J., The Evolutonary Mcrocosm of Stock Spam, IEEE Securty & Prvacy, pp (2007). do: /MSP [11] Bass, T. and Watt, G., A Smple Framework for Flterng Queued SMTP Emal, Proceedngs of MILCOM 97, Vol. 3, pp (1997). do: /MIL COM [12] Bass, T., Freyre, A., Gruber, D. and Watt, G., Emal Bombs and Countermeasure: Cyber Attack on Avalablty and Brand Integrty, IEEE Network, Vol. 12, No. 2, pp (1998). do: / [13] Wang, X., Chellappan, S., Boyer, P. and Xuan, D., On the Effectveness of Secure Overlay Forwardng Systems Under Intellgent Dstrbuted DoS Attacks, IEEE Transactons on Parallel and Dstrbuted Systems, pp (2006). do: /TPDS [14] Shannon, C. E., A Mathematcal Theory of Communcaton, Bell System Techncal Journal, Vol. 27, pp and (1948). do: /j tb01338.x [15] Astronomy, A., Informaton Entropy, Avalable from: [On-Lne] Informaton_entropy, [16] Weaver, W. and Shannon, C. E., The Mathematcal Theory of Communcaton, 1949, Republshed n Paperback, (1963). do: /j tb00917.x [17] Chen, H. C., Tseng, S. S., Mao, C. H., Lee, C. C. and Churnawan, R., An Approach for Detectng Floodng Attack Based on Integrated Entropy Measurement n E-Mal Server, The 8th Internatonal Conference on Embedded and Multmeda Computng (EMC-13), pp (2013). do: / _107 [18] Kumar, A. and Kaur, M., An Improved Algorthm for Solvng Fuzzy Maxmal Flow Problems, Journal of Appled Scence and Engneerng, Vol. 10, No. 1, pp (2012). do: / _34 [19] Wkpeda, Entropy, [On-Lne] org/wk/entropy, (2015). [20] Lu, H. and Gegov, A., Inducton of Modular Classfcaton Rules by Informaton Entropy Based Rule Generaton, Soft Computng. Sprnger, 16 Jan., (2015). Manuscrpt Receved: Jun. 3, 2014 Accepted: Jan. 22, 2015
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
More informationCanon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
More informationPAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
More informationVRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.
VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual
More informationModule 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
More informationThe Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.
More informationAn Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
More informationAPPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
More informationFault tolerance in cloud technologies presented as a service
Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance
More informationAn Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
More informationNetwork Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
More informationINVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
More informationDEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
More informationProactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
More informationStudy on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
More informationInstitute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
More informationRecurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
More informationA Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems
roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang
More informationAn RFID Distance Bounding Protocol
An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not
More informationAN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS
Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence
More informationIT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
More informationA Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks
Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton
More informationWatermark-based Provable Data Possession for Multimedia File in Cloud Storage
Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U
More informationMinimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures
Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng
More informationThe OC Curve of Attribute Acceptance Plans
The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4
More informationVembu StoreGrid Windows Client Installation Guide
Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on
More informationA Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing
A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure
More informationForecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
More informationA hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
More informationtaposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com
G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng
More informationEfficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing
Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of
More informationA SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010
Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION
More informationTHE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek
HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo
More informationA Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
More informationTraffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
More informationbenefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
More informationLuby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
More informationANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
More informationUpdating the E5810B firmware
Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert
More informationFrequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters
Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,
More informationUsing Certes to Infer Client Response Time at the Web Server
Usng Certes to Infer Clent Response Tme at the eb Server DAVID OLSHEFSKI IBM T.J. atson Research Center and Columba Unversty JASON NIEH Columba Unversty and DAKSHI AGRAAL IBM T.J. atson Research Center
More informationStochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
More informationPerformance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
More informationForecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems
More informationAn Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services
An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao
More informationReinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)
Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode
More informationWhat is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
More informationEstimating the Development Effort of Web Projects in Chile
Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty
More information1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)
6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes
More informationEffective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
More informationA Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing
www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton
More informationRequIn, a tool for fast web traffic inference
RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked
More informationDynamic Fleet Management for Cybercars
Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.
More informationHow To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network
Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen
More informationCalculating the high frequency transmission line parameters of power cables
< ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,
More informationTo manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.
Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:
More informationM3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
More informationA Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
More informationOn the Optimal Control of a Cascade of Hydro-Electric Power Stations
On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;
More informationRisk Model of Long-Term Production Scheduling in Open Pit Gold Mining
Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,
More informationResearch Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks
The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed
More informationHow To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
More informationAn Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems
STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part
More informationA Load-Balancing Algorithm for Cluster-based Multi-core Web Servers
Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton
More informationGenetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment
Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,
More informationA High-confidence Cyber-Physical Alarm System: Design and Implementation
A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,
More informationEnd-to-end measurements of GPRS-EDGE networks have
End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,
More informationMulti-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
More informationCalculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
More informationData Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
More informationA Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression
Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,
More informationA Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification
IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,
More informationRESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.
ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract
More informationAlarm Task Script Language
Alarm Task Scrpt Language Verson 5.51 en Scrpt Language Alarm Task Scrpt Language Table of Contents 3 Table of contents 1 Introducton 4 2 Defntons 5 2.1 Actons 5 2.2 Events and states 5 2.3 Alarm Task
More informationScalable and Secure Architecture for Digital Content Distribution
Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel
More informationBERNSTEIN POLYNOMIALS
On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful
More informationLAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks
LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support
More informationAn Intelligent Policy System for Channel Allocation of Information Appliance
Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department
More informationVoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays
VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty
More informationSupporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol
Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.
More informationIMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
More informationEVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu
EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of
More informationTraffic State Estimation in the Traffic Management Center of Berlin
Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,
More informationRELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
More informationP2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks
PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu
More informationFeature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
More informationConferencing protocols and Petri net analysis
Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre
More informationDesign and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
More informationResearch on Privacy Protection Approach for Cloud Computing Environments
, pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton
More informationdenote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node
Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate
More informationResearch of Network System Reconfigurable Model Based on the Finite State Automation
JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang
More informationActivity Scheduling for Cost-Time Investment Optimization in Project Management
PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng
More informationCourse outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy
Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton
More informationOptimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm
Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao
More informationOn-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com
More informationImproved SVM in Cloud Computing Information Mining
Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu
More informationData security in Intelligent Transport Systems
Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc
More informationProject Networks With Mixed-Time Constraints
Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa
More informationInvoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow
Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl
More informationA Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers
INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc
More information