An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple Protocols

Size: px
Start display at page:

Download "An Approach for Detecting a Flooding Attack Based on Entropy Measurement of Multiple E-Mail Protocols"

Transcription

1 Journal of Appled Scence and Engneerng, Vol. 18, No. 1, pp (2015) DOI: /jase An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols Hsng-Chung Chen 1,2, Chuan-Hsen Mao 1 and Shan-Shyong Tseng 3 * 1 Department of Computer Scence and Informaton Engneerng, Asa Unversty, Tachung, Tawan 413, R.O.C. 2 Department of Medcal Research, Chna Medcal Unversty Hosptal, Chna Medcal Unversty, Tachung, Tawan 404, R.O.C. 3 Department of Appled Informatcs and Multmeda, Asa Unversty, Tachung, Tawan 413, R.O.C. Abstract In recent years, there have been many approaches proposed by many researchers to detect RTT (round-trp tme) and RTO (retransmsson tmeout) message traffc accessng emal and tryng to determne whether these belong to dangerous traffc. The am of ths study s to protect an electronc mal (emal) server system based on the ntegrated entropy calculatons of the multple protocols of RTT and RTO n order to detect floodng attacks. Entropy s an approach n the mathematcal theory of communcaton. It can be used to measure the uncertanty or randomness n a random varable. A normal emal server usually supports four protocols consstng of smple mal transfer protocol (SMTP), post offce protocol verson 3 (POP3), Internet Message Access Protocol verson 4 (IMAP4), and HTTPS beng used by a remote web-based emal. However, n the nternet, there are many floodng attacks that attempt to paralyze an emal server system. Therefore, we propose a new approach for detectng floodng attacks based on the ntegrated entropy measurements for an emal server. Our approach can reduce the msjudged rate compared to conventonal approaches. Key Words: Entropy, Floodng Attack, E-mal Server, RTT, RTO 1. Introducton In recent years, the rapd development of technologes has helped people to communcate nformaton and share nformaton va the nternet. Emal has become one of the necessary communcaton servces for nternet users. The usng of electronc mal (emal) s a method of exchangng dgtal messages from one person to one or more recpents, va connectng through the nternet or computer network. There are many types of reasons for usng emal servces, from prvate purposes to busness purposes. The emal servce provder (ESP) s an organzaton whch provdes emal servers to send, receve and store emals for personal and/or organzatonal necessty. Some ESPs who may provde the servces to the general *Correspondng author. E-mal: sstseng@asa.edu.tw publc for personal emal are Gmal, Yahoo Mal, Hotmal and many others. Each emal server s able to support many knds of protocol. In 1982, the early stage of emal development, the smple mal transfer protocol (SMTP, for short) was formulated n RFC (Request for Comments) 821 [1,2]. SMTP s a protocol for a mal sender that communcates wth a mal recever. On certan types of smaller nodes n the nternet t s often mpractcal to mantan a message transport system [3]. For example, a workstaton may not have suffcent resources (cycles, dsk space) n order to permt a SMTP server [RFC821] [3]. To solve ths problem, The post offce protocol-verson 3 (POP3, for short) s ntended to permt a workstaton to dynamcally access a mal drop on a server host n a useful fashon. Usually, ths means that the POP3 protocol s used to allow a workstaton to retreve mal that the server s holdng for

2 80 Hsng-Chung Chen et al. t. POP3 s an applcaton layer Internet standard protocol used by local emal clents to retreve emal from a remote server over a transmsson control protocol/nternet protocol (TCP/IP) connecton. The other protocol whch s also supported by emal server s Internet Message Access Protocol (IMAP, for short) [4]. In 2003, M. Crspn [5] proposed the latest verson IMAP verson 4rev1 (IMAP4, for short) whch s formulated n RFC It has also been publshed wht the Internet Engneerng Task Force (IETF). The MAP4 allows a clent to access and manpulate electronc mal messages on a server [5]. IMAP4 permts manpulaton of remote message folders, called malboxes, n a way that s functonally equvalent to local malboxes. IMAP4 also provdes the capablty for an offlne clent to resynchronze wth the server. There s the other approach for supportng emal servces called webmal (or web-based emal) [6,7]. It s any emal clent mplemented as a web applcaton accessed va a web browser. For example, when accessng webmal at you wll be redrected to a SSL [6] secured address and your connecton wll be encrypted. The secure sockets layer (SSL) protocol verson 3.0 was proposed by P. Karlton [6], n 2011, whch s formulated n RFC 6101 [6]. It s a securty protocol that provdes communcatons prvacy over the nternet va HTTPS (hypertext transfer protocol secure). Moreover, the most drect approach s usng the RTT (round-trp tme) and RTO (retransmsson tmeout) of transmsson control protocol (TCP) [8]. When a network s creatng a connecton, t communcates from the sender to the recever. The communcaton needs to respond by makng a round trp. By round trp the response obtans the tme of the RTT. It knows f the message traffc s normal or not [8]. The protocol allows clent/server applcatons to communcate n a way that s desgned to prevent eavesdroppng, tamperng, or message forgery [6]. However, a smple emal server has a lot of users and because of ts mportance; t s an easy target to attack. The methods of attacks nclude an SMTP floodng attack, spam attacks and malcous attachments n emals [9 13]. The varous floodng attacks wll ncrease the loadng of the server. In ths paper, we propose an approach for detectng floodng attacks based on an ntegrated entropy measurement n emal server. Then, we use the entropy operatons [14 17] to analyse the receved packets, n order to estmate RTT and RTO from the SMTP together wth POP3, IMAP4, HTTP messages flows [18], and then evaluate ts correspondng rsk nformaton. Therefore, the rsk nformaton wll be used to descrbe the status of the servng server. Accordng to the value of ths status, the server wll determne whether t s has suffered reduced performance by floodng attacks. The remander of ths paper s organzed as follows. Secton 2 descrbes the SMTP, POP3, IMAP4 and entropy operaton related work. In secton 3, we propose a new approach for detectng floodng attacks based on the ntegrated entropy calculatons of multple protocols n an emal server, and descrbe how to calculate the evaluate value of rsk nformaton of emal server. Fnally, we present our conclusons n secton Related Works In our proposed approach, we use the entropy measurement to detect the behavor of traffc of multple protocols for an emal server. Therefore, n secton 2, we wll descrbe the RTT and RTO of normal message flows of the SMTP standard [1,2], POP3 [3], IMAP [5], HTTPS [6] and the entropy operatons [14 17]. 2.1 SMTP Frst of all, SMTP was defned n the RFC 821 [1,2]. It s an ndependent subsystem n a specal communcaton system. In ths communcaton system, t only needs a relable channel to transmt the related sequence message flows. SMTP has an mportant smple delverng emal protocol n whch t can forward an emal between two dfferent networks. The archtecture of SMTP s shown n Fgure 1. In the SMTP archtecture [17], t conssts of a sender, a sender-smtp, a recever-smtp and a recever. When a sender (user or fle server) connects to another recever, t wll send a request message of establshng a connecton to the sender-smtp. Then, the sender-smtp wll establsh a two-way transmsson channel n order to connect the recever. The recever- SMTP wll be at a destnaton pont or a relay pont. Thus, Fgure 1. The SMTP archtecture [1,2,4].

3 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols 81 the sender-smtp wll send the related SMTP commands to the recever-smtp. Fnally, the recever-smtp wll follow these commands to send back a SMTP response message to sender-smtp. Accordng to the above steps, f the command-response par was completed durng one normal tme-perod, t means that a round of the SMTP sesson was completed. The establshed SMTP message flows are dvded nto seven stages [17] as seen below: establshes connecton, HELO, MAIL FROM, RCPT TO, DATA, DATA TRANSFER, and QUIT. The SMTP message flows are shown n Fgure 2 [4]. 2.2 POP 3 (Post Offce Protocol) Post offce protocol (POP) [3] s an applcaton layer nternet standard protocol used by local emal clents to retreve emal from a remote server over a TCP/IP connecton. The POP 3 messages flow s shown as Fgure 3 [3]. The POP3 flow of transacton state s shown as Fgure IMAP (Internet Message Access Protocol) Internet Message Access Protocol (IMAP) s one of two general protocols for recevng electronc mal. The Internet Message Access Protocol verson 4rev1 (IMAP4rev1) [5] allows a clent to access and manpulate electronc mal messages n the server. IMAP4rev1 permts manpulaton of malboxes n a way that s functonally equvalent to local folders IMAP Message Flow IMAP verson 4 has been defned n RFC 3501 [5]. Ths protocol s an nteracton of a clent/server; consstng of a clent command, server data and completon result response. The man archtecture of the IMAP s shown as Fgure 5. The steps of ths fgure are descrbed as below. 1. Connecton wthout pre-authentcaton (OK greetng) 2. Pre-authentcated connecton (PREAUTH greetng) 3. Rejected connecton (BYE greetng) 4. Successful LOGIN or AUTHENTICATE command 5. Successful SELECT or EXAMINE command 6. CLOSE command, or faled SELECT or EXAMINE command 7. LOGOUT command, server shutdown, or connecton closed Fgure 3. POP3 flow authorzaton state [3]. Fgure 2. SMTP message flows [1,2,4]. Fgure 4. POP3 flow transacton state [3].

4 82 Hsng-Chung Chen et al. Once authentcated, t s not possble to re-enter a not authentcated state. In addton the unversal command (any state command) s vald n the NOT Authentcated state. For a descrpton of a not authentcated state clent server communcaton, s shown n the Fgure 7 as seen below. Fgure 5. IMAP archtecture [5] IMAP Clent Commands Any State In the any state clent command, there are three commands: CAPABILITY, NOOP, and LOGOUT. These commands are always be used n NOT Authentcated state, Authentcated state, and selected state. In the communcaton flows of the clent server, any state commands are shown n Fgure IMAP Clent Commands Not an Authentcated State In the not-an-authentcated state, the AUTHENTICATE or LOGIN command establshes authentcaton and enters the authentcated state. The AUTHENTICATE command provdes a general mechansm for a varety of authentcaton technques, prvacy protecton, and ntegrty checkng [5]. The STARTTLS command s an alternate form of establshng sesson prvacy protecton and ntegrty checkng, but doesn t establsh authentcaton or enter the authentcated state. Server mplementatons may allow access to certan malboxes wthout establshng authentcaton. Ths can be done by means of the ANONYMOUS authentcator. An older conventon s a LOGIN command usng use rd anonymous ; n ths case, a password s requred although the server may choose to accept any password. The restrctons placed on anonymous user are mplementaton-dependent [5] IMAP Clent Commands Authentcated State In the authentcated state, commands that manpulate malboxes are permtted. Of these commands, the SELECT and EXAMINE commands wll select a malbox for access and enter the selected state. In the authentcated state, the unversal commands (CAPABILITY, NOOP, and LOGOUT), are also vald and can be used. The commands n an authentcated state are: SELECT, EXAMINE, CREATE, DELETE, RENAME, SUBSCRIBE, UNSUBSCRIBE, LIST, LSUB, STATUS, and APPEND. For a descrpton of clent server communcaton n the authentcated state for IMAP, please see Fgure HTTPs HTTPs s a communcatons protocol for secure communcaton over the nternet. Techncally, t s not a Fgure 6. IMAP flow any state [5]. Fgure 7. IMAP flow not authentcated state [5].

5 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols RTT RTT s the tme requred for a packet to travel from a specfc source to a specfc destnaton and back agan. Typcally, RTT s dvded nto three parts: propagaton delay, processng delay and queung delay [8]. The frst parts of the values for a TCP connecton s the opposte fxed. The router cache s queung and processng tme as the entre network congeston of a degree more changng. Therefore, RTT of changng n a degree react the network of congeston. 1) Mean devaton (MD) It s the mean of the dstances between each value and the mean. It gves us an dea of how spread out from the center the set of values s. The equaton [8] s shown as (1). (1) By calculatng the MD, we are able to determne the volatlty of certan nformaton. As used here, the MD can be used to measure the RTT of jtter state. 2) RTT measurement prncple RTT measurements [8] can be used n two ways: A. TCP Tmestamp Opton TCP tmestamp opton can be used to accurately measure the RTTs [8]. The equaton [8] s shown as (2). Fgure 8. IMAP flow authentcated state [5]. protocol n and of tself; but rather, t s the result of smply layerng the HTTP on top of the SSL/TLS (secure sockets layer/transport layer securty) protocol [6], thus addng the securty capabltes of SSL/TLS to standard HTTP communcatons. In ts popular deployment on the nternet, HTTPS provdes authentcaton of the web ste and assocated web server that one s communcatng wth, whch protects aganst man-n-the-mddle attacks [7]. 2.5 RTT and RTO In ths subsecton, RTT [8] and RTO [8] wll be descrbed as below. RTT = current tme tmestamp recorded (sendng tme) (2) The tmestamp recorded s the packet flow when sendng out of tme. You can easly get a measurement of RTT. It recognzes the receved (current tme) and sent tmes whch can be easly used to get a measurement value of RTT. B. The retransmsson queue control block TCP data packets In the TCP retransmsson, the queue saves the sent data packets, but unacknowledged data. The equaton [8] s shown as (3). RTT = current tme tcp_skb_cb (3) where tcp_skb_cb means the frst data packet transmsson tme. The TCP have to use Karn s algorthm [8] for takng RTT samples. That s, RTT samples MUST NOT be made usng segments that were retransmtted (and thus for whch t s ambguous whether the reply was for the frst nstance of the packet or a later nstance). The only case s when the TCP can safely take RTT samples from retransmtted segments when the TCP tmestamp opton s employed, snce the tmestamp opton removes the ambguty regardng whch nstance of the data segment trggered the acknowledgement [8].

6 84 Hsng-Chung Chen et al RTO The TCP of retransmsson and tmeout are very mportant for obtanng the connected RTT measurements [8]. Because the network traffc s changng the retransmsson tme wll also change. The TCP needs to follow these changes and dynamcally adjust the tmeout of the tmed RTO [8]. The RTO s descrbed n RFC2988, the TCP uses a retransmsson tmer to ensure data delvery n the absence of any feedback from the remote data recever, the duraton of ths tmer s referred to as the RTO [8]. 2.6 Entropy Theory Named after Boltzmann s H-theorem, Shannon [19, 20] defned the entropy H (Greek letter Eta) as a dscrete random varable X wth possble values {x 1,,x n } and probablty mass functon P(X) [19,20] as shown n (4). (4) where E s the expected value operator, and I s the nformaton content of X. I(X) s tself a random varable. When taken from a fnte sample, the entropy [19] can explctly be shown as (5). (5) where b s the base of the logarthm used, The common values of b are 2, natural logarthm e, and 10, and the unt of entropy s a bt, such as b =2,b = e,orb = 10. In the case of p(x )=0forsome, the value of the correspondng summand 0 log b (0) s taken to be 0, whch s consstent wth the well-known lmt as the equaton (6). 3. Emal Server Preventon Aganst Floodng Attack Based on Entropy In ths secton, the ntegrated entropy measurements of multple emal protocols wth the supportng RTT and RTO n an emal server are descrbed as below. There are four emal protocols mentoned n secton 2. It s assumed that the message flows for each protocol wll be dvded nto RTT and RTO message flows between a server and clents. Then, the entropy operatons are used to calculate the entropy values of RTT and RTO message flows for each protocol, ndvdually. The two equatons set (8) and (9), for RTT and RTO respectvely, are lsted n Table 1 as below. Accordng to above those equatons, we defne the Evoluton Algorthm as below. Evoluton Algorthm Input ( H( X K ), H( X )), K, an emal servce message T RTT T, RTO flow par ncludes two entropy values for the RTT and RTO message flow durng the samplng tme duraton T, where T = 1, 2,, t. Output Result cost values C KT of the emal server status n T. The cost values C KT {crtcal hgh, very hgh, hgh, normal, low, very low} = {CH, VH, H, N, L, VL} are the evoluton n order to support further judgements for the emal whether under floodng attacks or not. Also, the result wll show what knd of emal protocol the system s usng s recevng floodng attacks. Begn (6) One may also defne the condtonal entropy of two events X and Y takng values x and y j respectvely, as the equaton (7). (7) where p(x, y j ) s the probablty that X = x and Y = y j. Ths quantty should be understood as the amount of randomness n the random varable X gven that you know the value of Y [19,20].

7 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols 85 Fnally, the algorthm returns the cost values for the current samplng tme duraton T. The cost values can ndcate the evoluton cost n order to support the judgments for the emal server whether under floodng attacks or not. Also, the result wll show what knd of emal protocol the system s usng f recevng floodng attacks. End; 4. Smulaton Results and Dscussons The scheme compared to the proposed scheme [9] s qute fast and easy to gve a real-tme evoluton for judgment processes of detectng floodng attacks n a traffc volume vew. Therefore, an example s shown the smu- Table 1. The equatons set of RTT and RTO message flows generated from four protocols The equatons set for RTT message flow (8) The equatons set for RTO message flows (9) H( X Y) p( x, y )log (, ) u j, j Px yj H( X Z) p( x, z )log (, ) u j, j Px zj H( X S) p( x, s )log (, ) u j, j Px sj HY ( X) py (, x)log (, ) u j, j Py xj HY ( Z) py (, z)log (, ) u j, j Py zj HY ( S) py (, s)log (, ) u j, j Py sj H( Z X) p( z, x )log (, ) u j, j Pz xj H( Z Y) p( z, y )log (, ) u j, j Pz yj H( Z S) p( z, s )log (, ) u j, j Pz sj H( S X) p( s, x )log (, ) u j, j Ps xj H( S Y) p( s, y )log (, ) u j, j Ps yj H( S Z) p( s, z )log (, ) u j, j Ps zj H( X Y) p( x, y )log (, ) v j, j Px yj H( X Z) p( x, z )log (, ) v j, j Px zj H( X S) p( x, s )log (, ) v j, j Px sj HY ( X) py (, x)log (, ) v j, j Py xj HY ( Z) py (, z)log (, ) v j, j Py zj HY ( S) py (, s)log (, ) v j, j Py sj H( Z X) p( z, x )log (, ) v j, j Pz xj H( Z Y) p( z, y )log (, ) v j, j Pz yj H( Z S) p( z, s )log (, ) v j, j Pz sj H( S X) p( s, x )log (, ) v j, j Ps xj H( S Y) p( s, y )log (, ) v j, j Ps yj H( S Z) p( s, z )log (, ) v j, j Ps zj Notes: X: SMTP; Y: POP3; Z: IMAP4; S: HTTP (s); u: RTT; v: RTO, where XK { x,,,..., } T, RTT K x T, RTT K x T, RTT K x T, RTT KT, RTT s a random entropy value of the RTT message flow durng samplng tme duraton T, and XK { x,, T, RTO K x T, RTO KT, RTO KT, RTO K 3 T, RTO 1 2 x,..., x } s a random entropy value of the RTO message flow durng samplng tme duraton T; H ( X, ) K RTT s an entropy value set for the RTT message flow; H( XK, ) T RTO s an entropy value set for the RTO message flow; K {X, Y, Z, S}. T

8 86 Hsng-Chung Chen et al. laton results n example 1. Due to the evoluton algorthm proposed n secton 3, the algorthm s qute smple for detectng heavy traffc wth unmoral traffc flows whch are appled to e-mal protocols. Example 1. Assume that there exsts four protocols servng for e-mal server are montored. After obtanng the RTT values at four dfferent tme perods, where the tme-perod seres s lsted as T {T n 3, T n 2, T n 1, T n }, and T n s current tme, T n 1, T n 2, T n 3 are the past tme perod compared to T n for the tme to measure RTT values. Moreover, the RTO values are then calculated by usng the measured RTT values. The smulated RTT results n Tables 2, 3 and 4 are used to calculate the RTO values on the tme perods T n 1, T n 2, T n 3 whch are three prevous tmes compared to the current tme perod T n. The calculated results are shown n Table 5 for the current tme perod, n whch the RTT smulated values are frst obtaned from network, and the RTO values are also calculated. Fnally, the entropy values are calculated by usng the RTT and RTO values. The entropy values of RTT and RTO are the ones used that wll gan the best cost value compared wth the average cost values obtaned on the three past tme perods. Fnally, ths approach wll provde a result as shown n Table 5. Compared wth the three average cost values obtaned by three prevous tme perods, ths coupled wth the entropy values changng, they can be used to detect whether the e-mal system wth four protocols are sufferng the varety of floodng attacks or not. Fnally, the system wll assgn a letter or combnaton of letters denotng the severty of the floodng attack as follows: CH, VH, H, N, Table 2. RTT values were obtaned at T = T n 3 Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v H RTT + H RTO SMTP POP IMAP POP SMTP IMAP SMTP HTTPS POP STMP POP IMAP POP HTTPS IMAP SMTP IMAP HTTPS HTTPS SMTP HTTPS POP HTTPS IMAP Note: RTT and RTO unt: second. Table 3. RTT values were obtaned at T = T n 2 Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v H RTT + H RTO SMTP POP IMAP POP SMTP IMAP SMTP HTTPS POP STMP POP IMAP POP HTTPS IMAP SMTP IMAP HTTPS HTTPS SMTP HTTPS POP HTTPS IMAP Note: RTT and RTO unt: second.

9 An Approach for Detectng a Floodng Attack Based on Entropy Measurement of Multple E-Mal Protocols 87 Table 4. RTT values were obtaned at T = T n 1 Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v H RTT + H RTO SMTP POP IMAP POP SMTP IMAP SMTP HTTPS POP STMP POP IMAP POP HTTPS IMAP SMTP IMAP HTTPS HTTPS SMTP HTTPS POP HTTPS IMAP Note: RTT and RTO unt: second. Table 5. Fnal results for current tme T = T n Protocol RTT RTO Protocol RTT RTO P (x, y) u P (x, y) v H (X Y) u H (X Y) v CK T n CKT past New H Result SMTP POP VH IMAP POP VH SMTP IMAP VL SMTP HTTPS L POP STMP L POP IMAP CH POP HTTPS L IMAP SMTP CH IMAP HTTPS CH HTTPS SMTP L HTTPS POP L HTTPS IMAP VL CK C T 1 T 2 T 3 Notes: K C n K C n K, CK H( X Y), ( ), Tpast T u T H X Y n n v T, and the metrc of RTT and RTO s second. n 3 L, VL, where CH s crtcal hgh, VH s very hgh, H s hgh, N s normal, L s low and VL s very low. 5. Conclusons In ths study, we proposed a new approach for detectng floodng attacks based on the ntegrated entropy measurements of multple emal protocols by usng measured RTT and RTO n an emal system. Our approach can reduce the msjudge rate compared to conventonal approaches. By applyng ths approach, the current status of the emal server s able to be quckly analysed and determned whether the server s sufferng from by multple floodng attacks or not. Fnally, accordng to the evoluton cost value of an emal server by usng the ntegrated entropy measurement approach as proposed n ths paper, t can detect floodng attacks more easly and quckly. Acknowledgements Ths work was supported n part by the Mnstry of Scence and Technology, Tawan, Republc of Chna, under Grant MOST E , also NSC S MY3. References [1] Postel, J. B., A Smple Mal Transfer Protocol, RFC821 (1982).

10 88 Hsng-Chung Chen et al. [2] Klensn, J., A Smple Mal Transfer Protocol, RFC5321 (2008). [3] Myers, J. and Rose, M., Post Offce Protocol-Verson 3, RFC 1939 (1996). [4] Crspn, M., Request for Comments: 2060, Standards Track, Network Workng Group, Dec. (1996). [5] Crpsn, M., Internet Message Access Protocol-Verson 4rev1, RFC3501 (2003). [6] Karlton, P., Request for Comments: 6101, Standards Track, Network Workng Group, August (2011). [7] Wkpeda, HTTP Secure, [On-Lne] peda.org/wk/http_secure, [8] Zhangsk, RTT of Measure and RTO of Calculatons n TCP, [On-Lne] detals/ [9] Chen, H. C., Sun, J. Z. and Wu, Z. D., Dynamc Forenscs System wth Intruson Tolerance Based on Herarchcal Colour Petr-Nets, BWCCA 2010: Internatonal Conference on Broadband and Wreless Com - putng, Communcaton and Applcatons, Fukuoka, Japan, November 4 6, pp do: / BWCCA [10] O Donnell, A. J., The Evolutonary Mcrocosm of Stock Spam, IEEE Securty & Prvacy, pp (2007). do: /MSP [11] Bass, T. and Watt, G., A Smple Framework for Flterng Queued SMTP Emal, Proceedngs of MILCOM 97, Vol. 3, pp (1997). do: /MIL COM [12] Bass, T., Freyre, A., Gruber, D. and Watt, G., Emal Bombs and Countermeasure: Cyber Attack on Avalablty and Brand Integrty, IEEE Network, Vol. 12, No. 2, pp (1998). do: / [13] Wang, X., Chellappan, S., Boyer, P. and Xuan, D., On the Effectveness of Secure Overlay Forwardng Systems Under Intellgent Dstrbuted DoS Attacks, IEEE Transactons on Parallel and Dstrbuted Systems, pp (2006). do: /TPDS [14] Shannon, C. E., A Mathematcal Theory of Communcaton, Bell System Techncal Journal, Vol. 27, pp and (1948). do: /j tb01338.x [15] Astronomy, A., Informaton Entropy, Avalable from: [On-Lne] Informaton_entropy, [16] Weaver, W. and Shannon, C. E., The Mathematcal Theory of Communcaton, 1949, Republshed n Paperback, (1963). do: /j tb00917.x [17] Chen, H. C., Tseng, S. S., Mao, C. H., Lee, C. C. and Churnawan, R., An Approach for Detectng Floodng Attack Based on Integrated Entropy Measurement n E-Mal Server, The 8th Internatonal Conference on Embedded and Multmeda Computng (EMC-13), pp (2013). do: / _107 [18] Kumar, A. and Kaur, M., An Improved Algorthm for Solvng Fuzzy Maxmal Flow Problems, Journal of Appled Scence and Engneerng, Vol. 10, No. 1, pp (2012). do: / _34 [19] Wkpeda, Entropy, [On-Lne] org/wk/entropy, (2015). [20] Lu, H. and Gegov, A., Inducton of Modular Classfcaton Rules by Informaton Entropy Based Rule Generaton, Soft Computng. Sprnger, 16 Jan., (2015). Manuscrpt Receved: Jun. 3, 2014 Accepted: Jan. 22, 2015

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS

AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Internatonal Journal of Network Securty & Its Applcatons (IJNSA), Vol.5, No.3, May 2013 AN EFFICIENT GROUP AUTHENTICATION FOR GROUP COMMUNICATIONS Len Harn 1 and Changlu Ln 2 1 Department of Computer Scence

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage

Watermark-based Provable Data Possession for Multimedia File in Cloud Storage Vol.48 (CIA 014), pp.103-107 http://dx.do.org/10.1457/astl.014.48.18 Watermar-based Provable Data Possesson for Multmeda Fle n Cloud Storage Yongjun Ren 1,, Jang Xu 1,, Jn Wang 1,, Lmng Fang 3, Jeong-U

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010

A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION IN WIRELESS SENSOR NETWORKS. Received March 2010; revised July 2010 Internatonal Journal of Innovatve Computng, Informaton and Control ICIC Internatonal c 2011 ISSN 1349-4198 Volume 7, Number 8, August 2011 pp. 4821 4831 A SECURE BILLING SERVICE WITH TWO-FACTOR USER AUTHENTICATION

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING

ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

Using Certes to Infer Client Response Time at the Web Server

Using Certes to Infer Client Response Time at the Web Server Usng Certes to Infer Clent Response Tme at the eb Server DAVID OLSHEFSKI IBM T.J. atson Research Center and Columba Unversty JASON NIEH Columba Unversty and DAKSHI AGRAAL IBM T.J. atson Research Center

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services

An Evaluation of the Extended Logistic, Simple Logistic, and Gompertz Models for Forecasting Short Lifecycle Products and Services An Evaluaton of the Extended Logstc, Smple Logstc, and Gompertz Models for Forecastng Short Lfecycle Products and Servces Charles V. Trappey a,1, Hsn-yng Wu b a Professor (Management Scence), Natonal Chao

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Estimating the Development Effort of Web Projects in Chile

Estimating the Development Effort of Web Projects in Chile Estmatng the Development Effort of Web Projects n Chle Sergo F. Ochoa Computer Scences Department Unversty of Chle (56 2) 678-4364 sochoa@dcc.uchle.cl M. Cecla Bastarrca Computer Scences Department Unversty

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing

A Novel Problem-solving Metric for Future Internet Routing Based on Virtualization and Cloud-computing www.ijcsi.org 159 A Novel Problem-solvng Metrc for Future Internet Routng Based on Vrtualzaton and Cloud-computng Rujuan Zheng, Mngchuan Zhang, Qngtao Wu, Wangyang We and Haxa Zhao Electronc & Informaton

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network

How To Classfy Onlne Mesh Network Traffc Classfcaton And Onlna Wreless Mesh Network Traffic Onlnge Network Journal of Computatonal Informaton Systems 7:5 (2011) 1524-1532 Avalable at http://www.jofcs.com Onlne Wreless Mesh Network Traffc Classfcaton usng Machne Learnng Chengje GU 1,, Shuny ZHANG 1, Xaozhen

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently.

To manage leave, meeting institutional requirements and treating individual staff members fairly and consistently. Corporate Polces & Procedures Human Resources - Document CPP216 Leave Management Frst Produced: Current Verson: Past Revsons: Revew Cycle: Apples From: 09/09/09 26/10/12 09/09/09 3 years Immedately Authorsaton:

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining

Risk Model of Long-Term Production Scheduling in Open Pit Gold Mining Rsk Model of Long-Term Producton Schedulng n Open Pt Gold Mnng R Halatchev 1 and P Lever 2 ABSTRACT Open pt gold mnng s an mportant sector of the Australan mnng ndustry. It uses large amounts of nvestments,

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

A High-confidence Cyber-Physical Alarm System: Design and Implementation

A High-confidence Cyber-Physical Alarm System: Design and Implementation A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo.

RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL. Yaoqi FENG 1, Hanping QIU 1. China Academy of Space Technology (CAST) yaoqi.feng@yahoo. ICSV4 Carns Australa 9- July, 007 RESEARCH ON DUAL-SHAKER SINE VIBRATION CONTROL Yaoq FENG, Hanpng QIU Dynamc Test Laboratory, BISEE Chna Academy of Space Technology (CAST) yaoq.feng@yahoo.com Abstract

More information

Alarm Task Script Language

Alarm Task Script Language Alarm Task Scrpt Language Verson 5.51 en Scrpt Language Alarm Task Scrpt Language Table of Contents 3 Table of contents 1 Introducton 4 2 Defntons 5 2.1 Actons 5 2.2 Events and states 5 2.3 Alarm Task

More information

Scalable and Secure Architecture for Digital Content Distribution

Scalable and Secure Architecture for Digital Content Distribution Valer Bocan Scalable and Secure Archtecture for Dgtal Content Dstrbuton Mha Fagadar-Cosma Department of Computer Scence and Engneerng Informaton Technology Department Poltehnca Unversty of Tmsoara Alcatel

More information

BERNSTEIN POLYNOMIALS

BERNSTEIN POLYNOMIALS On-Lne Geometrc Modelng Notes BERNSTEIN POLYNOMIALS Kenneth I. Joy Vsualzaton and Graphcs Research Group Department of Computer Scence Unversty of Calforna, Davs Overvew Polynomals are ncredbly useful

More information

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks

LAMOR: Lifetime-Aware Multipath Optimized Routing Algorithm for Video Transmission over Ad Hoc Networks LAMOR: Lfetme-Aware Multpath Optmzed Routng Algorthm for Vdeo ransmsson over Ad Hoc Networks 1 Lansheng an, Lng Xe, Kng-m Ko, Mng Le and Moshe Zukerman Abstract Multpath routng s a key technque to support

More information

An Intelligent Policy System for Channel Allocation of Information Appliance

An Intelligent Policy System for Channel Allocation of Information Appliance Tamkang Journal of Scence and Engneerng, Vol. 5, No., pp. 63-68 (2002) 63 An Intellgent Polcy System for Channel Allocaton of Informaton Applance Cheng-Yuan Ku, Chang-Jnn Tsao 2 and Davd Yen 3 Department

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol

Supporting Recovery, Privacy and Security in RFID Systems Using a Robust Authentication Protocol Supportng Recovery Prvacy and Securty n RFID Systems Usng a Robust Authentcaton Protocol Md. Endadul Hoque MSCS Dept. Marquette Unversty Mlwaukee Wsconsn USA. mhoque@mscs.mu.edu Farzana Rahman MSCS Dept.

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks

P2P/ Grid-based Overlay Architecture to Support VoIP Services in Large Scale IP Networks PP/ Grd-based Overlay Archtecture to Support VoIP Servces n Large Scale IP Networks We Yu *, Srram Chellappan # and Dong Xuan # * Dept. of Computer Scence, Texas A&M Unversty, U.S.A. {weyu}@cs.tamu.edu

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Research on Privacy Protection Approach for Cloud Computing Environments

Research on Privacy Protection Approach for Cloud Computing Environments , pp. 113-120 http://dx.do.org/10.14257/jsa.2015.9.3.11 Research on Prvacy Protecton Approach for Cloud Computng Envronments Xaohu L 1,2, Hongxng Lang 3 and Dan Ja 1 1 College of Electrcal and Informaton

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Research of Network System Reconfigurable Model Based on the Finite State Automation

Research of Network System Reconfigurable Model Based on the Finite State Automation JOURNAL OF NETWORKS, VOL., NO. 5, MAY 24 237 Research of Network System Reconfgurable Model Based on the Fnte State Automaton Shenghan Zhou and Wenbng Chang School of Relablty and System Engneerng, Behang

More information

Activity Scheduling for Cost-Time Investment Optimization in Project Management

Activity Scheduling for Cost-Time Investment Optimization in Project Management PROJECT MANAGEMENT 4 th Internatonal Conference on Industral Engneerng and Industral Management XIV Congreso de Ingenería de Organzacón Donosta- San Sebastán, September 8 th -10 th 010 Actvty Schedulng

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry patrck@mcsharry.net www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

Data security in Intelligent Transport Systems

Data security in Intelligent Transport Systems Data securty n Intellgent Transport Systems Tomas ZELINKA Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc Mroslav SVITEK Czech Techncal Unversty n rague, FTS 110 00 raha 1, Czech Republc

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow

Invoicing and Financial Forecasting of Time and Amount of Corresponding Cash Inflow Dragan Smć Svetlana Smć Vasa Svrčevć Invocng and Fnancal Forecastng of Tme and Amount of Correspondng Cash Inflow Artcle Info:, Vol. 6 (2011), No. 3, pp. 014-021 Receved 13 Janyary 2011 Accepted 20 Aprl

More information

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers

A Secure Nonrepudiable Threshold Proxy Signature Scheme with Known Signers INFORMATICA, 2000, Vol. 11, No. 2, 137 144 137 2000 Insttute of Mathematcs and Informatcs, Vlnus A Secure Nonrepudable Threshold Proxy Sgnature Scheme wth Known Sgners Mn-Shang HWANG, Iuon-Chang LIN, Erc

More information