Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework

Size: px
Start display at page:

Download "Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework"

Transcription

1 World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos Framework Hoa-Vu Nguye ad Yogsu Cho Iteratoal Scece Idex, Computer ad Iformato Egeerg Vol:4, No:3, 2010 waset.org/publcato/9510 Abstract Dstrbuted deal-of-servce (DDoS) attacks pose a serous threat to etwork securty. There have bee a lot of methodologes ad tools devsed to detect DDoS attacks ad reduce the damage they cause. Stll, most of the methods caot smultaeously acheve (1) effcet detecto wth a small umber of false alarms ad (2) real-tme trasfer of packets. Here, we troduce a method for proactve detecto of DDoS attacks, by classfyg the etwork status, to be utlzed the detecto stage of the proposed at-ddos framework. Itally, we aalyse the DDoS archtecture ad obta detals of ts phases. The, we vestgate the procedures of DDoS attacks ad select varables based o these features. Fally, we apply the k-earest eghbour (k-nn) method to classfy the etwork status to each phase of DDoS attack. The smulato result showed that each phase of the attack scearo s classfed well ad we could detect DDoS attack the early stage. Keywords dstrbuted deal-of-servce (DDoS), k-earest eghbor classfer (k-nn), at-ddos framework, DDoS detecto. I. INTRODUCTION ECURITY techologes have to keep pace wth the rapd Sdevelopmet formato techology ad etwork systems order to protect the systems from attacks. Network securty s oe of the most mportat sectos of the securty doma. Dstrbuted deal-of-servce (DDoS) attacks frst appeared Jue 1998 ad rapdly spread causg extesve damages. For stace, durg the week of 7 11th of February 2000, they emerged as the major attacks the ew category of attacks o the Iteret. They attacked may wellkow stes, cludg Yahoo, Buy, ebay, Amazo, Datek, E*Trade, ad CNN (Todd, 2000). Sce DDoS attacks are very powerful ad pose a serous threat to the etwork securty, t s mportat to uderstad how t works. DDoS attack volves the combed effort of several maches attackg a target system. I may cases, the attacker frst selects some maches havg securty vulerabltes as hadlers ad gas access to them. The, the attacker cotues to clude more maches as zombes through the hadlers. The zombes carry out the actual DDoS attacks by sgfcatly creasg the malcous traffc to a target system. As a result, the vctm mache loses all ts Hoa-Vu Nguye s wth the Departmet of Systems Maagemet Egeerg, Ije Uversty, , South Korea (e-mal: guyehoavu_t@yahoo.com). Yogsu Cho s wth the Departmet of Systems Maagemet Egeerg, Ije Uversty, , South Korea (phoe: ; fax: ; e-mal: yscho@ je.ac.kr). computg ad commucato resources. Although the techque of DDoS attacks s relatvely smple, t ca attack both the Iteret ad system resources. Sce the extet of damage by DDoS attacks has creased, may studes o the detecto mechasm have bee carred out. However, the exstg securty mechasms have faled to provde effectve defece agast these attacks or just ca oly provde defece agast specfc types of DDoS attacks. Some DDoS attack detecto methods are based o traceback, whle others are based o feature motorg of a router or a server. However, exstg methods have lmted success because they caot smultaeously acheve the objectves of (1) effcet detecto wth a small umber of false alarms ad (2) realtme trasfer of all packets. For stace, some methods, whch apply data mg techques, ca obta a hgh correcto rate detectg the attacks. However, these methods usually ca t be employed real-tme computg. Other methods, explotg the abormal crease some types of packets, mtgate oly some types of DDoS attacks. Furthermore, presetly, there exst few effectve ad detaled model frameworks avalable for the detecto ad preveto of DDoS attacks. I ths paper, we frst preset a geeral at-ddos framework that cotas two sequetal stages detecto ad preveto. The, we preset a method for proactve detecto of DDoS attack by classfyg the etwork status to be utlzed the detecto stage of the geeral at-ddos framework. More specfcally, we descrbe the two-stage vew of DDoS archtecture, the cotrol stage ad the attack stage. The, we vestgate the procedures of DDoS attacks to select feature varables that are mportat recogzg DDoS attacks, sce they are to be abormally chaged wheever the attack happes. Fally, we apply the k-earest eghbor (k-nn) method to classfy the status of etworks for each phase of the DDoS attack. The smulato result has show that the phases of the attack have bee classfed well ad DDoS attacks could be detected the early stage, wth effcecy. I sum, we propose a geeral at-ddos framework ad a automated method for the early detecto of DDoS attacks. We apply the k-nn method for DDoS attack detecto wth flexble adjustmet of feature varables. I addto, we provde a sutable method for mappg a documet to a elemet that descrbes the perod of packet trasfer a etwork. The rest of the paper s orgazed as follows. Secto II summarzes prevous studes the area of DDoS attack detecto. I secto III, we aalyze the DDoS archtecture Iteratoal Scholarly ad Scetfc Research & Iovato 4(3)

2 World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Iteratoal Scece Idex, Computer ad Iformato Egeerg Vol:4, No:3, 2010 waset.org/publcato/9510 ad troduce a geeral at-ddos framework. Next, secto IV, we descrbe the proposed method for the early detecto of DDoS attacks detal. Secto V presets the data collected ad the smulated results. Fally, secto VI, we coclude our works wth drectos of further studes. II. RELATED STUDIES Thus far, may results related to DDoS attack defece have bee reported. We ca classfy DDoS attack defece methods to cogesto-based, aomaly-based, source-based methods, ad others. Exstg methods ether belog to ay oe of these categores or are a combato of them [1]-[9]. Mahaja et al. (2001) [11] ad Ioads ad Bellov (2002) [6] have proposed a aggregate-based cogesto cotrol (ACC) that decreases DDOS attack traffc o the bass of the cogesto level. The detecto algorthm ACC determes the destato addresses of the vctm maches o the bass of the destato of a etwork prefx of packets dropped at the observed router durg a very short perod. ACC wll set the destato address to lst f the umber of dropped packets wth a specfc destato address s greater tha the average umber. If the arrval rate of a etwork prefx exceeds the threshold, ACC marks all traffc to ths etwork prefx as DDoS attack traffc ad respods to all comg traffc set to ths etwork prefx. Cabrera et al. (2001) [1] ad May et al. (2001) [12] have proposed a method based o etwork maagemet formato to detect DDoS attacks. The local Smple Network Maagemet Protocol (SNMP) agets update the varables a maagemet formato base (MIB) perodcally. Hece, the etwork maagemet system aalyses the MIB varable correlatos durg the attack preparato, attack, ad ormal state to detect DDoS attacks. Ths method s effcet oly f the vctm host ad attacker are o the same etwork. It s uable to solve the problem whe the vctm ad attacker are o dfferet etworks. Yaar et al. (2003) [20] have preseted a method based o IP traceback ad packet flterg to mtgate DDoS attack traffc. Packet markg detfes the paths followed by the attack traffc by sertg marks packets. They troduced tellget packet flterg method to flter out the ogog attack traffc. However, the legth of IP detfcato feld s lmted to oly 16 bts ths method, whch s ot suffcet for storg the etre path. I addto, certa codg schemes have to be appled to shorte the legth of marks. Gavrls ad Dermatas (2005) [3] have preseted a DDoS attack detector publc etworks utlzg the radal bass fucto eural etwork (RBFNN), whch s orgally troduced by Hayk (1994) [5]. Ther method s based o the statstcal features estmated short tme wdow aalyss of the comg data packets. Ths method s supported by three modules as: a data collector, features estmator, ad DDoS detector. The DDoS detector s a two-layer eural etwork wth e feature vectors that are used to actvate a two-output RBF etwork at each tme frame. The most actve output euro detects the presece of a DDoS attack or characterzes the tme frame as ormal traffc. Ths approach s hghly effcet, but has some weak pots such as log computg tme. Lee (2006) [9] has preseted a mproved markg techque that detfes DDoS traffc wth tme to lve (TTL) formato at the routers by applyg the support vector mache (SVM) module to cotrol malcous traffc ad maage DDoS attack packets effcetly. Ths method ca flter malcous traffc wth the SVM cogesto sgature ad mproves the badwdth of the etre etwork. Hece, t s possble to restructure the path to the source of DDoS attacks wth a small umber of markg packets. A dsadvatage of ths method s the requremet of addtoal memory at the routers for the DDoS-related detfcato performed by the SVM-based flterg module. Xu et al. (2007) [19] have proposed a ovel DDoS detecto method based o hdde Markov models (HMMs) ad cooperatve reforcemet learg whch a dstrbuted cooperato detecto scheme usg source IP address motorg s employed. To realze earler detecto of DDoS attacks, the detectors are dstrbuted at termedate etwork odes or ear the sources of DDoS attacks ad HMMs are used to establsh a profle for the ormal traffc o the bass of the frequeces of the ew IP addresses. A cooperatve reforcemet learg algorthm computes the optmzed strateges for formato exchage amog the dstrbuted multple detectors so that the detecto accuraces ca be mproved wthout hgh load o formato commucato amog the detectors. However, the evaluato of the HMM-based approach the real-tme DDoS detecto cases s ot cluded ths paper, requrg addtoal algorthms to be appled to realze a better balace betwee detecto accuracy ad commucato load. The abovemetoed methods ad others focus much o the chage traffc flow. Methods based o data mg are sutable for detecto, but they stll ca t esure frequet trasfer of packets. As lke the methods based o eural etworks, t s ot easy to apply HMMs the real world due to log computato tme. O the other hads, some methods ca be appled oly to specfc types of DDoS attacks, that s they are of lmted usefuless ad effcecy. To overcome these lmtatos of exstg methods, we apply the k-nn classfer whch s proved to be useful ad very effcet whe to classfy documets [4]. The way of applyg the k-nn method, for the early detecto of DDoS attacks, s to be descrbed detal secto IV. III. DDOS ATTACH ARCHITECTURE AND ANTI-DDOS FRAMEWORK I ths secto, we descrbe the characterstcs of DDoS attacks wth two-stage vew of DDoS archtecture, the cotrol stage ad the attack stage. Ad the, we troduce a smple at-ddos framework that comprses stages of detecto ad preveto of DDoS attacks A. DDoS Attack Archtecture DDoS attacks frst appeared Jue The attacks start by breakg to hudreds or thousads of maches (hadlers) over the Iteret. The, the attacker stalls DDoS software o the maches, allowg them to cotrol all the Iteratoal Scholarly ad Scetfc Research & Iovato 4(3)

3 World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 attacked maches (zombes or agets) to lauch coordated attacks o target stes. These attacks typcally exhaust the etwork badwdth, router processg capacty, or etwork stack resources, ad dsrupt the etwork coectvty to the vctms. Dfferet types of DDoS attacks have bee developed, whch ca be classfed as TCP flood, UDP flood, ICMP flood, ad smurf [18]. The geeral archtecture of DDoS attacks determed by L ad Tseg (2004) [10] s show Fg. 1. B. At-DDoS Framework I the securty doma, the truso detecto system (IDS) ad truso preveto system (IPS) are well kow [2]- [17]. I smlar way, we costruct our at-ddos framework cotag two sequetal stages of DDoS attack detecto ad DDoS attack preveto. However, we eed to dfferetate DDoS attacks from trusve actvtes. The deftos of detecto ad preveto the cotext of DDoS attacks are dfferet from those the cotext of trusve actvtes. Fg. 2 shows all the compoets each stage of the at-ddos framework detal. Iteratoal Scece Idex, Computer ad Iformato Egeerg Vol:4, No:3, 2010 waset.org/publcato/9510 Fg. 1 Geeral archtecture of DDoS attacks The geeral archtecture of the DDoS attack show Fg. 1 ca be dvded to two stages: Cotrol stage Attack stage I cotrol stage, a sca s performed o a large scale o the etwork to fd a lst of vulerable hosts. Geerally, the vulerable hosts cosst of hadlers ad agets, where the hadlers (the frst level vulerable hosts) are cotrolled by the attackers ad the agets (the secod level vulerable hosts) are cotrolled by attackers through hadlers. The traffc of commucato the cotrol stage takes place through sgal trasmsso from a attacker to a hadler; however, the commucato betwee the hadlers ad agets s bdrectoal. The two levels of topology the locatos of attackers ca be hdde. At the ed of the cotrol stage, the vulerable hosts are used to lauch dstrbuted attackg traffc the attack stage. The attackg traffc cludg UDP flood, ICMP flood, Smurf, TCP SYN, TCP ACK, TCP RST, ad TCP SYN/ACK ca overwhelm the vctm [18]. There are two dfferet types of attack techques followed by DDoS attacks: badwdth cosumpto ad resource cosumpto. I badwdth cosumpto, the attackg traffc lauched by the compromsed hosts, whch are cotrolled by the attackers, s aggregated to a sgle large flood that overwhelms the vctm. I resource cosumpto, the attackers ca use the leak of the etwork protocol or the system securty, such as the techques of SYN flood, lad, ad Teardrop. Ths results the starvato of system resources (CERT/CC, 2003). As the DDoS attack tools have become more complcated the recet years, t s becomg more dffcult to ecouter the upto-date characterstcs of DDoS attacks. Fg. 2 A smple at-ddos framework I case of DDoS attacks, t s dffcult to protect a system some tme after the attacker tated attacks as show fgure 1. Hece, we should detect the DDoS attacks the early stage. The frst stage of the at-ddos framework carres out the early detecto of DDoS attacks, whch wll be descrbed detal secto IV. I case pre-attack or realattack of etwork status s detected, detaled etwork status formato s trasferred to the preveto stage to mtgate DDoS attacks. I ths paper, we just focus o the early detecto of DDoS attacks wthout dggg to detaled mechasm of prevetg DDoS attacks. That s our at- DDoS attack framework oly mtgates the DDoS attack wthout determg the exact attacker host. There already exst may methods of prevetg DDoS attacks [15]. IV. K-NN METHOD FOR EARLY DETECTION OF DDOS ATTACKS Lee (2007) [8] has proposed a effcet method for proactve detecto of DDoS attacks usg cluster aalyss. I hs study, he aalysed detal the characterstcs of the selected varables, whch are used for clusterg by usg the cubc clusterg crtero (CCC). We wll use these features our method. Lee dvded DDoS attacks to three phases so the status of etwork wll be four types. However, as metoed before, we have decded to classfy the status of etwork to three classes: Iteratoal Scholarly ad Scetfc Research & Iovato 4(3)

4 World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Iteratoal Scece Idex, Computer ad Iformato Egeerg Vol:4, No:3, 2010 waset.org/publcato/9510 Pre-attack: cludes the frst two phases. o Phase 1 of DDoS attack selecto of hadlers ad agets o Phase 2 of DDoS attack commucato ad compromse Attack: cludes phase 3 of DDoS attack attack Normal status of etwork Moreover, sce these classes are well dvded, we decde to apply a classfyg method for the early detecto of DDoS attacks. By employg the classfyg method, the detecto wll becomes more accurate ad take shorter tme for computg tha the case whe the clusterg method s appled. I the classfyg module, we choose the k-nn method to classfy because t acheves the two objectves: accurate detecto rate ad short tme computg. The k-nn method had bee devses a log tme back ad s stll useful. For stace, the k-nn method s used to classfy documets by Reuters News, whch s oe of the most famous ews ageces across the world [4]. A. Selecto Features for Detectg DDoS We studed the procedures of DDoS attacks to prmarly select the packets ad traffc parameters that chage uusually each phase of the attack. Lee (2007) [8] has metoed some parameters such as source/destato IP addresses, port umbers, ad packet types (ICMP, TCP SYN, UDP) that wll used as features to detect DDoS attacks. I the pre-attack phase, the attacker spreads packets to fd the maches that have securty vulerabltes to trude them ad ga access to them. Durg ths perod, the destato IP address wll be dstrbuted radomly. However, the last phase of attack lauchg DDoS attack the destato IP address wll rema fxed or rarely chage. To measure ths chage, Lee (2007) [8] had suggested usg the cocept of etropy. If the formato source has depedet symbols each wth a probablty of choce P, the etropy H s defed as follows: H = P log 2 P 1 (1) The other characterstc s the occurrece rate of a type of packet. These characterstcs have bee exploted ad varous methods have bee developed to detect DDoS attacks. Durg the lauch of DDoS attacks, there are some types of packets (DDoS attacks usg a specfc packet type) that chage abormally. Fally, we use the followg features of packet trasfer, whch Lee (2007) [8] had preseted: Etropy of source IP address ad port umber Etropy of destato IP address ad port umber Etropy of packet type Occurrece rate of packet type (ICMP, UDP, ad TCP SYN) Number of packets We use these features as the gradets of the vector descrbg a perod of etwork status. Next, we dscuss the method that s used for classfcato. B. K-NN Classfer Frst, we select the features for detectg DDoS attacks ad classfy the etwork status to three classes. Next, we cosder the classfcato of the curret etwork status to oe of the classes. There are may well-kow methods for classfyg documets such as SVM, NN, fuzzy logc, ad rough set [14]. We choose the k-nn method because ths method has features that are sutable for our goals. These features are: easy mplemetato, short tme computato, ad hgh accuracy. The k-nn algorthm s a smlarty-based learg algorthm ad s kow to be hghly effectve varous problem domas, cludg classfcato problems. Gve a test elemet dt, the k-nn algorthm fds ts k earest eghbors amog the trag elemets, whch form the eghborhood of dt. Majorty votg amog the elemets the eghborhood s used to decde the class for dt. For the example show Fg. 3, we frst fd k elemets that are earest to the elemet to be classfed. From the k earest elemets, we determe the most sutable class for the test elemet [4]-[16]. Fg. 3 Fdg k elemets that are earest to the test elemet, k = 5 The term ear ca be defed as the degree of smlarty betwee two elemets. There are several techques to compute the smlarty degree betwee two elemets. However, the algorthm based o the cose formula s most popular method used for estmatg the smlarty degree. I ths study, we use ths algorthm to compute the smlarty degree. Besdes, we also use the vector space model (VSM) to descrbe each elemet. Hece, each elemet s expressed as a vector that has compoets. The example s gve below. For the 2 elemets X = {x 1, x 2,, x } ad Y = {y 1, y 2,, y }, W = {w 1, w 2,, w } s the weghted vector ad w s the weght of the compoet the geeral vector. The, we compute the smlarty betwee two elemets X ad Y as follows: Smlarty(X, Y) = Cose(X, Y, W) = 1 1 ( x w ) ( y 2 ( x w ) 1 w ) 2 ( y w ) Usg the abovemetoed cose formula, we ca fd the (2) Iteratoal Scholarly ad Scetfc Research & Iovato 4(3)

5 World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Iteratoal Scece Idex, Computer ad Iformato Egeerg Vol:4, No:3, 2010 waset.org/publcato/9510 k earest elemets. Next, we have to determe the most sutable class for these elemets. We cout the rate of each class types to determe the class that has the hghest rate. Ths s the class whch the test elemet ca be placed. C. Early Detecto of DDoS Attacks Usg k-nn Classfer We use the e features that have bee dscussed part A to classfy the etwork status. Each varable s ormalzed to elmate the effect of dfferece betwee the scales of the varables, as proposed by Lee et al. (2007) [8]. Wth ormalzato, varables become z x x (3) where x, x,, deotes the value of each feature, the mea of the sample dataset, ad the stadard devato, respectvely. To classfy the curret etwork status, we use the k-nn classfer, whch has bee explaed prevously. Frstly, we tra three datasets ormal, pre-attack, ad attack datasets. Each elemet each dataset has e compoets that are computed from the data log for the perod. We compute the curret etwork status as a elemet wth e compoets perod. Fally, we apply the dstace formula (3) to fd the k earest eghbors of the curret etwork status. We set a label for the curret etwork status based o the majorty of the elemets belogg to a class, whch most elemets amog the k elemets are foud. Hece, ths ads the recogto of the curret etwork status ad early detecto of DDoS attacks. The detals of the detecto of DDoS attacks are show Fg. 4. Fg. 4 Geeral model for detectg precursor of DDoS attacks stall Troja mstream DDoS software, ad lauch a DDoS attack o a off-ste server. The fve phases of the attack scearo are: 1- IPsweep of the AFB from a remote ste 2- Probe of lve IP's to look for the sadmd daemo rug o Solars hosts 3- break-s va the sadmd vulerablty, both successful ad usuccessful o those hosts 4- Istallato of the Troja mstream DDoS software o three hosts at AFB 5- Lauch of DDoS attacks Fg. 5 Archtecture of etwork used to obta dataset A attack has fve phases. However, ths study, we slghtly regroup these phases to two groups: Pre-attack phase: cludes the frst four abovemetoed phases Attack phase: cludes the last phase We also have the dataset for the ormal etwork status. Hece, we have three groups of datasets for trag ad testg. All elemets a group are traed as metoed secto IV, part C. The followg elemets are obtaed. Normal class: N1, N2,..., NL Pre-attack class: P1, P2,..., PL Attack class: R1, R2,..., RL where N = (x 1, x 2,, x 9 ), P = (y 1, y 2,, y 9 ), ad R = (z 1, z 2,, z 9 ). The testg dataset wll be obtaed depedetly from the trag dataset to esure the accuracy of the process. The steps volved the expermet are llustrated detal Fg. 6. V. SIMULATION RESULTS Usg the 2000 DARPA truso detecto scearo specfc data set (MIT Lcol Lab, 2000) [13], we employ the proposed method for early detecto of DDoS attacks. Ths dataset cludes a DDoS attack lauched by a ovce attacker. Ths attack s carred out over multple etworks ad audt sessos. These sessos have bee grouped to 5 attack phases over the course of whch the adversary probes break, Fg. 6 Scheme of expermet The result obtaed from the expermet s preseted TABLE I. Iteratoal Scholarly ad Scetfc Research & Iovato 4(3)

6 World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Iteratoal Scece Idex, Computer ad Iformato Egeerg Vol:4, No:3, 2010 waset.org/publcato/9510 Network status class Number of test elemets TABLE I CLASSIFICATION RESULT Correct classfcato Normal Pre-attack Attack Icorrect classfcato Sum (91.886%) 568 (8.114%) The result of the expermet shows that our method s effcet eough for early detecto of DDoS attacks. It ca classfy all elemets well a sutable computg tme. VI. CONCLUSIONS I ths study, we have troduced a geeral at-ddos framework, whch ca be appled ad developed the real world. We have also preseted a sutable method for the early detecto of DDoS attacks usg the k-nn classfer. Ths method ca also be appled to the frst stage of our at-ddos framework. May studes o DDoS attack detecto have bee carred out; however, they focus oly o the chage etwork traffc. The methods based data mg are sutable for the detecto; however, they do ot esure real-tme trasfer of packets. Our method frst selects e features of packet/traffc that are wdely foud varous phases of the attack. The, the curret etwork status s classfed to determe the class to whch t belogs to. Hece, our method ca classfy the curret etwork status well to detect DDoS attacks early. To evaluate ths detecto method, we aalyzed the MIT Lco Lab Dataset (2000 DARPA: Scearo DDoS 1.0) [13] ad the dataset for the ormal etwork status. The result shows that our method ca classfy the DDoS phases correctly ad effcetly detect DDoS attack early. Besdes, the method beg smple ca be easly mplemeted. Short computg tme ad real-tme trasfer of packets ca be acheved. I the future, we wll carry out a detaled aalyss of the features of DDoS attacks usg more advaced k-nn method or other methods ad obta a better result. Fally, we wll apply the method practcal stuatos ad study the behavor of DDoS attacks ad make modfcatos f possble. Moreover, we wll develop a sutable ad effcet method for the secod stage of the at-ddos framework. ACKNOWLEDGMENT Ths work was supported by the Korea Scece ad Egeerg Foudato (KOSEF) grat fuded by the Korea govermet (MOST) (No. R ). REFERENCES [1] J.B.D. Cabrera, et al. Proactve detecto of dstrbuted deal of servce attacks usg MIB traffc varables a feasblty study, Proceedgs of the seveth IFIP/IEEE Iteratoal Symposum o Itegrated Network Maagemet, Seattle, May, 2001, pp [2] S. Chebrolu, A. Abraham, ad P. J. Thomas, Feature deducto ad esemble desg of truso detecto systems, Computers & Securty, Vol. 24, ssue 4, pp [3] D. Gavrls, ad E. Dermatas, Real-tme detecto of dstrbuted dealof-servce attacks usg RBF etworks ad statstcal features, Computer Networks, Vol. 48, ssue 2, pp [4] G. Guo, H. Wag, D. Bell, Y. B, ad K. Greer, Usg knn model for automatc text categorzato, Soft Computg - A Fuso of Foudatos, Methodologes ad Applcatos, Vol. 10, No. 5, pp [5] S. Hayk, Neural Networks: A Comprehesve Foudato, Upper Saddle Rver, Pretce Hall, New Jersey, [6] J. Ioads, ad S. M. Bellov, Implemetg pushback: router-based defese agast DDoS attacks, Preseted at Network ad Dstrbuted System Securty Symposum, [7] M. Km, H. Na, K. Chae, H. Bag, ad J. Na, A Combed Data Mg Approach for DDoS Attack Detecto, ICOIN 2004, LNCS 3090, Sprger-Verlag, Berl Hedelberg, pp [8] K. Lee, J. Km, K. H. Kwo, Y. Ha, ad S. Km, DDoS attack detecto method usg cluster aalyss, Expert Systems wth Applcatos, 2007, Vol. 34, pp [9] H. W. Lee, SVM Based Packet Markg Techque for Traceback o Malcous DDoS Traffc, ICOIN 2006, LNCS 3961, Sprger-Verlag, Berl Hedelberg, pp [10] S. C. L, ad S. S. Tseg, Costructg detecto kowledge for DDoS truso tolerace, Expert Systems wth Applcatos, 2004, Vol. 27, pp [11] R. Mahaja, S. M. Bellov, S. Floyd, J. Ioads, V. Paxso, ad S. Sheker, Cotrollg hgh badwdth aggregate the etwork, ACM SIGCOMM Computer Commucato Revew, 2002, Vol. 32, No. 3 pp [12] J. May, J. Peterso, ad J. Bauma, Attack detecto large etworks, Proceedgs of the DARPA Iformato Survvablty Coferece & Exposto II (DISCEX 01), 2001, Vol. 1, pp [13] MIT Lcol Lab, 2000, DARPA truso detecto scearo specfc datasets, [14] T. M. Mtchell, Mache Learg, MacGraw Hll, New York, [15] K. Park, ad H. Lee, A proactve approach to dstrbuted DoS attack preveto usg route-based packet flterg, Tech. Rep. CSD , Departmet of Computer Sceces, Purdue Uversty, [16] F. Sebasta, Mache learg automated text categorzato, ACM Computg Surveys, Vol. 34, ssue 1, Cosglo Nazoale delle Rcerche, Italy, 2002, pp [17] A. Sharma, A. K. Pujar, ad K. K. Palwal, Itruso detecto usg text processg techques wth a kerel based smlarty measure, Computers & Securty, 2007, Vol. 26, ssue 7 8, 2007, pp [18] B. Todd, Dstrbuted Deal of Servce Attacks, [19] X. Xu, Y. Su, ad Z. Huag, Defedg DDoS Attacks Usg Hdde Markov Models ad Cooperatve Reforcemet Learg, Yag C.C. et al. (Eds.): PAISI 2007, LNCS 4430, Sprger-Verlag, Berl Hedelberg, pp [20] A. Yaar, A. Perrg, ad D. Sog, P: a path detfcato mechasm to defed agast DDos attack, Proceedgs of the IEEE Symposum o Securty ad Prvacy, 2003, pp Hoa-Vu Nguye s a graduate studet the Departmet of Systems Maagemet & Egeerg, Ije Uversty, South Korea. He receved hs B.S. degree from the Departmet of Iformato Techology, Hao Uversty of techology, Vetam. Hs research terests are etwork securty, software egeerg, atural laguage processg, ad busess process maagemet. Yogsu Cho s the Drector of BPM Laboratory ad a Professor the Departmet of Systems Maagemet & Egeerg at Ije Uversty, South Korea. He receved hs B.S. degree Idustral Egeerg from Seoul Natoal Uversty ad hs M.S. ad Ph.D. degrees Idustral Egeerg from Korea Advaced Isttute of Scece ad Techology. Hs research terests clude workflow & busess process maagemet, servce oreted archtecture, ad multple-crtera decso makg. Iteratoal Scholarly ad Scetfc Research & Iovato 4(3)

Green Master based on MapReduce Cluster

Green Master based on MapReduce Cluster Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of

More information

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki

IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira sedgh@eetd.ktu.ac.r,

More information

Efficient Traceback of DoS Attacks using Small Worlds in MANET

Efficient Traceback of DoS Attacks using Small Worlds in MANET Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble

More information

The impact of service-oriented architecture on the scheduling algorithm in cloud computing

The impact of service-oriented architecture on the scheduling algorithm in cloud computing Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg

More information

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li

Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad

More information

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering

Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,

More information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information

An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author

More information

An IG-RS-SVM classifier for analyzing reviews of E-commerce product

An IG-RS-SVM classifier for analyzing reviews of E-commerce product Iteratoal Coferece o Iformato Techology ad Maagemet Iovato (ICITMI 205) A IG-RS-SVM classfer for aalyzg revews of E-commerce product Jaju Ye a, Hua Re b ad Hagxa Zhou c * College of Iformato Egeerg, Cha

More information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information

Models for Selecting an ERP System with Intuitionistic Trapezoidal Fuzzy Information JOURNAL OF SOFWARE, VOL 5, NO 3, MARCH 00 75 Models for Selectg a ERP System wth Itutostc rapezodal Fuzzy Iformato Guwu We, Ru L Departmet of Ecoomcs ad Maagemet, Chogqg Uversty of Arts ad Sceces, Yogchua,

More information

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks

Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks 0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg

More information

RQM: A new rate-based active queue management algorithm

RQM: A new rate-based active queue management algorithm : A ew rate-based actve queue maagemet algorthm Jeff Edmods, Suprakash Datta, Patrck Dymod, Kashf Al Computer Scece ad Egeerg Departmet, York Uversty, Toroto, Caada Abstract I ths paper, we propose a ew

More information

A Parallel Transmission Remote Backup System

A Parallel Transmission Remote Backup System 2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College

More information

Study on prediction of network security situation based on fuzzy neutral network

Study on prediction of network security situation based on fuzzy neutral network Avalable ole www.ocpr.com Joural of Chemcal ad Pharmaceutcal Research, 04, 6(6):00-06 Research Artcle ISS : 0975-7384 CODE(USA) : JCPRC5 Study o predcto of etwork securty stuato based o fuzzy eutral etwork

More information

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1

Banking (Early Repayment of Housing Loans) Order, 5762 2002 1 akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of

More information

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis

6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis 6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces

More information

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS

RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL CLOUD APPLICATIONS Joural of Theoretcal ad Appled Iformato Techology 3 st October 22. Vol. 44 No.2 25-22 JATIT & LLS. All rghts reserved. ISSN: 992-8645 www.jatt.org E-ISSN: 87-395 RESEARCH ON PERFORMANCE MODELING OF TRANSACTIONAL

More information

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks

Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab.

More information

Numerical Methods with MS Excel

Numerical Methods with MS Excel TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how

More information

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm

IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1

More information

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract

Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected

More information

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data

ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there

More information

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology

Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50

More information

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS

A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece

More information

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks

Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad sheha@elec.caterbury.ac.z

More information

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk

The Analysis of Development of Insurance Contract Premiums of General Liability Insurance in the Business Insurance Risk The Aalyss of Developmet of Isurace Cotract Premums of Geeral Lablty Isurace the Busess Isurace Rsk the Frame of the Czech Isurace Market 1998 011 Scetfc Coferece Jue, 10. - 14. 013 Pavla Kubová Departmet

More information

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques

An Evaluation of Naïve Bayesian Anti-Spam Filtering Techniques Proceedgs of the 2007 IEEE Workshop o Iformato Assurace Uted tates Mltary Academy, West Pot, Y 20-22 Jue 2007 A Evaluato of aïve Bayesa At-pam Flterg Techques Vkas P. Deshpade, Robert F. Erbacher, ad Chrs

More information

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation

Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh

More information

Application of Grey Relational Analysis in Computer Communication

Application of Grey Relational Analysis in Computer Communication Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato Jgcha J Applcato of Grey Relatoal Aalyss Computer Commucato Network Securty Evaluato *1 Jgcha J *1, Frst ad Correspodg Author

More information

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK

Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag

More information

Automated Event Registration System in Corporation

Automated Event Registration System in Corporation teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee

More information

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow

Research on Cloud Computing and Its Application in Big Data Processing of Railway Passenger Flow 325 A publcato of CHEMICAL ENGINEERING TRANSACTIONS VOL. 46, 2015 Guest Edtors: Peyu Re, Yacag L, Hupg Sog Copyrght 2015, AIDIC Servz S.r.l., ISBN 978-88-95608-37-2; ISSN 2283-9216 The Itala Assocato of

More information

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability

Maintenance Scheduling of Distribution System with Optimal Economy and Reliability Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,

More information

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time

A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral

More information

Statistical Intrusion Detector with Instance-Based Learning

Statistical Intrusion Detector with Instance-Based Learning Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja va.verdo@sol.et eywords:

More information

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN

SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,

More information

Suspicious Transaction Detection for Anti-Money Laundering

Suspicious Transaction Detection for Anti-Money Laundering Vol.8, No. (014), pp.157-166 http://dx.do.org/10.1457/jsa.014.8..16 Suspcous Trasacto Detecto for At-Moey Lauderg Xgrog Luo Vocatoal ad techcal college Esh Esh, Hube, Cha es_lxr@16.com Abstract Moey lauderg

More information

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =

Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R = Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are

More information

A Novel Method in Scam Detection and Prevention using Data Mining Approaches

A Novel Method in Scam Detection and Prevention using Data Mining Approaches A Novel Method Scam Detecto ad Preveto usg Data Mg Approaches Maryam Mokhtar, Mohammad Saraee, Alreza Haghsheas Departmet of Electrcal ad Computer Egeerg Isfaha Uversty of Techology, Isfaha, Ira Mokhtar@ec.ut.ac.r,

More information

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011

Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011 Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory

More information

Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1

Learning to Filter Spam E-Mail: A Comparison of a Naive Bayesian and a Memory-Based Approach 1 Learg to Flter Spam E-Mal: A Comparso of a Nave Bayesa ad a Memory-Based Approach 1 Io Adroutsopoulos, Georgos Palouras, Vagels Karkaletss, Georgos Sakks, Costate D. Spyropoulos ad Paagots Stamatopoulos

More information

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software

Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao

More information

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree

A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree , pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal

More information

Report 52 Fixed Maturity EUR Industrial Bond Funds

Report 52 Fixed Maturity EUR Industrial Bond Funds Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:

More information

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity

Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute

More information

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment

Research on the Evaluation of Information Security Management under Intuitionisitc Fuzzy Environment Iteratoal Joural of Securty ad Its Applcatos, pp. 43-54 http://dx.do.org/10.14257/sa.2015.9.5.04 Research o the Evaluato of Iformato Securty Maagemet uder Itutostc Fuzzy Evromet LI Feg-Qua College of techology,

More information

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil

ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable

More information

10.5 Future Value and Present Value of a General Annuity Due

10.5 Future Value and Present Value of a General Annuity Due Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the

More information

How To Make A Supply Chain System Work

How To Make A Supply Chain System Work Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr

More information

Modeling of Router-based Request Redirection for Content Distribution Network

Modeling of Router-based Request Redirection for Content Distribution Network Iteratoal Joural of Computer Applcatos (0975 8887) Modelg of Router-based Request Redrecto for Cotet Dstrbuto Network Erw Harahap, Jaaka Wjekoo, Rajtha Teekoo, Fumto Yamaguch, Shch Ishda, Hroak Nsh Hroak

More information

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT

DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa

More information

The Digital Signature Scheme MQQ-SIG

The Digital Signature Scheme MQQ-SIG The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese

More information

On Error Detection with Block Codes

On Error Detection with Block Codes BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 9, No 3 Sofa 2009 O Error Detecto wth Block Codes Rostza Doduekova Chalmers Uversty of Techology ad the Uversty of Gotheburg,

More information

of the relationship between time and the value of money.

of the relationship between time and the value of money. TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp

More information

Agent-based modeling and simulation of multiproject

Agent-based modeling and simulation of multiproject Aget-based modelg ad smulato of multproject schedulg José Alberto Araúzo, Javer Pajares, Adolfo Lopez- Paredes Socal Systems Egeerg Cetre (INSISOC) Uversty of Valladold Valladold (Spa) {arauzo,pajares,adolfo}ssoc.es

More information

CHAPTER 2. Time Value of Money 6-1

CHAPTER 2. Time Value of Money 6-1 CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show

More information

Software Aging Prediction based on Extreme Learning Machine

Software Aging Prediction based on Extreme Learning Machine TELKOMNIKA, Vol.11, No.11, November 2013, pp. 6547~6555 e-issn: 2087-278X 6547 Software Agg Predcto based o Extreme Learg Mache Xaozh Du 1, Hum Lu* 2, Gag Lu 2 1 School of Software Egeerg, X a Jaotog Uversty,

More information

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1

STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ  1 STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ

More information

DIGITAL AUDIO WATERMARKING: SURVEY

DIGITAL AUDIO WATERMARKING: SURVEY DIGITAL AUDIO WATERMARKING: SURVEY MIKDAM A. T. ALSALAMI * MARWAN M. AL-AKAIDI ** * Computer Scece Dept. Zara Prvate Uversty / Jorda ** School of Egeerg ad Techology - De Motfort Uversty / UK Abstract:

More information

Discrete-Event Simulation of Network Systems Using Distributed Object Computing

Discrete-Event Simulation of Network Systems Using Distributed Object Computing Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809

More information

Dynamic Service and Data Migration in the Clouds

Dynamic Service and Data Migration in the Clouds 2009 33rd Aual IEEE Iteratoal Computer Software ad Applcatos Coferece Dyamc Servce ad Data Mgrato the Clouds We Hao Departmet of Computer Scece Norther Ketucky Uversty haow1@ku.edu Abstract Cloud computg

More information

On formula to compute primes and the n th prime

On formula to compute primes and the n th prime Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: ssam.addoura@lu.edu.lb amh Abdul-Nab Lebaese Iteratoal

More information

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center

Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center 200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College

More information

AnySee: Peer-to-Peer Live Streaming

AnySee: Peer-to-Peer Live Streaming ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu

More information

A Bayesian Networks in Intrusion Detection Systems

A Bayesian Networks in Intrusion Detection Systems Joural of Computer Scece 3 (5: 59-65, 007 ISSN 549-3636 007 Scece Publcatos A Bayesa Networs Itruso Detecto Systems M. Mehd, S. Zar, A. Aou ad M. Besebt Electrocs Departmet, Uversty of Blda, Algera Abstract:

More information

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN

ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl

More information

Chapter Eight. f : R R

Chapter Eight. f : R R Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,

More information

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network

Using Phase Swapping to Solve Load Phase Balancing by ADSCHNN in LV Distribution Network Iteratoal Joural of Cotrol ad Automato Vol.7, No.7 (204), pp.-4 http://dx.do.org/0.4257/jca.204.7.7.0 Usg Phase Swappg to Solve Load Phase Balacg by ADSCHNN LV Dstrbuto Network Chu-guo Fe ad Ru Wag College

More information

Classic Problems at a Glance using the TVM Solver

Classic Problems at a Glance using the TVM Solver C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the

More information

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems

A Security-Oriented Task Scheduler for Heterogeneous Distributed Systems A Securty-Oreted Tas Scheduler for Heterogeeous Dstrbuted Systems Tao Xe 1 ad Xao Q 2 1 Departmet of Computer Scece, Sa Dego State Uversty, Sa Dego, CA 92182, USA xe@cs.sdsu.edu 2 Departmet of Computer

More information

Optimizing Software Effort Estimation Models Using Firefly Algorithm

Optimizing Software Effort Estimation Models Using Firefly Algorithm Joural of Software Egeerg ad Applcatos, 205, 8, 33-42 Publshed Ole March 205 ScRes. http://www.scrp.org/joural/jsea http://dx.do.org/0.4236/jsea.205.8304 Optmzg Software Effort Estmato Models Usg Frefly

More information

Network dimensioning for elastic traffic based on flow-level QoS

Network dimensioning for elastic traffic based on flow-level QoS Network dmesog for elastc traffc based o flow-level QoS 1(10) Network dmesog for elastc traffc based o flow-level QoS Pas Lassla ad Jorma Vrtamo Networkg Laboratory Helsk Uversty of Techology Itroducto

More information

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.

Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time. Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E

More information

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms *

Impact of Mobility Prediction on the Temporal Stability of MANET Clustering Algorithms * Impact of Moblty Predcto o the Temporal Stablty of MANET Clusterg Algorthms * Aravdha Vekateswara, Vekatesh Saraga, Nataraa Gautam 1, Ra Acharya Departmet of Comp. Sc. & Egr. Pesylvaa State Uversty Uversty

More information

Robust Realtime Face Recognition And Tracking System

Robust Realtime Face Recognition And Tracking System JCS& Vol. 9 No. October 9 Robust Realtme Face Recogto Ad rackg System Ka Che,Le Ju Zhao East Cha Uversty of Scece ad echology Emal:asa85@hotmal.com Abstract here s some very mportat meag the study of realtme

More information

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom.

n. We know that the sum of squares of p independent standard normal variables has a chi square distribution with p degrees of freedom. UMEÅ UNIVERSITET Matematsk-statstska sttutoe Multvarat dataaalys för tekologer MSTB0 PA TENTAMEN 004-0-9 LÖSNINGSFÖRSLAG TILL TENTAMEN I MATEMATISK STATISTIK Multvarat dataaalys för tekologer B, 5 poäg.

More information

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM

ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM 28-30 August, 2013 Sarawak, Malaysa. Uverst Utara Malaysa (http://www.uum.edu.my ) ROULETTE-TOURNAMENT SELECTION FOR SHRIMP DIET FORMULATION PROBLEM Rosshary Abd. Rahma 1 ad Razam Raml 2 1,2 Uverst Utara

More information

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components

Developing tourism demand forecasting models using machine learning techniques with trend, seasonal, and cyclic components BALKAN JOURNAL OF ELECTRICAL & COMPUTER ENGINEERING, 05, Vol.3, No. 4 Developg toursm demad forecastg models usg mache learg techques wth tred, seasoal, ad cyclc compoets S. Cakurt ad A. Subas Abstract

More information

Fault Tree Analysis of Software Reliability Allocation

Fault Tree Analysis of Software Reliability Allocation Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer

More information

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS

A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS A COMPARATIVE STUDY BETWEEN POLYCLASS AND MULTICLASS LANGUAGE MODELS I Ztou, K Smaïl, S Delge, F Bmbot To cte ths verso: I Ztou, K Smaïl, S Delge, F Bmbot. A COMPARATIVE STUDY BETWEEN POLY- CLASS AND MULTICLASS

More information

Evaluating the Network and Information System Security Based on SVM Model

Evaluating the Network and Information System Security Based on SVM Model JOURNAL OF COMPUTERS, VOL., NO., NOVEMBER 009 Evaluatg the Network ad formato System Securty Based o SVM Model Shaome Yag Ecoomcs ad Maagemet Departmet, North Cha Electrc Power Uversty, Baodg Cty, Cha

More information

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal

The Application of Intuitionistic Fuzzy Set TOPSIS Method in Employee Performance Appraisal Vol.8, No.3 (05), pp.39-344 http://dx.do.org/0.457/uesst.05.8.3.3 The pplcato of Itutostc Fuzzy Set TOPSIS Method Employee Performace pprasal Wag Yghu ad L Welu * School of Ecoomcs ad Maagemet, Shazhuag

More information

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation

A particle Swarm Optimization-based Framework for Agile Software Effort Estimation The Iteratoal Joural Of Egeerg Ad Scece (IJES) olume 3 Issue 6 Pages 30-36 204 ISSN (e): 239 83 ISSN (p): 239 805 A partcle Swarm Optmzato-based Framework for Agle Software Effort Estmato Maga I, & 2 Blamah

More information

A particle swarm optimization to vehicle routing problem with fuzzy demands

A particle swarm optimization to vehicle routing problem with fuzzy demands A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato

More information

A Comparative Study for Email Classification

A Comparative Study for Email Classification A Coparatve Study for Eal Classfcato Seogwook You ad Des McLeod Uversty of Souther Calfora, Los Ageles, CA 90089 USA Abstract - Eal has becoe oe of the fastest ad ost ecoocal fors of coucato. However,

More information

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization

Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve

More information

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data

Time Series Forecasting by Using Hybrid. Models for Monthly Streamflow Data Appled Mathematcal Sceces, Vol. 9, 215, o. 57, 289-2829 HIKARI Ltd, www.m-hkar.com http://dx.do.org/1.12988/ams.215.52164 Tme Seres Forecastg by Usg Hybrd Models for Mothly Streamflow Data Sraj Muhammed

More information

1. The Time Value of Money

1. The Time Value of Money Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg

More information

Average Price Ratios

Average Price Ratios Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or

More information

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring

Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,

More information

APPENDIX III THE ENVELOPE PROPERTY

APPENDIX III THE ENVELOPE PROPERTY Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful

More information

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION

TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION TESTING AND SECURITY IN DISTRIBUTED ECONOMETRIC APPLICATIONS REENGINEERING VIA SOFTWARE EVOLUTION Cosm TOMOZEI 1 Assstat-Lecturer, PhD C. Vasle Alecsadr Uversty of Bacău, Romaa Departmet of Mathematcs

More information

IT & C Projects Duration Assessment Based on Audit and Software Reengineering

IT & C Projects Duration Assessment Based on Audit and Software Reengineering Iformatca Ecoomcă, vol. 13, o. 1/2009 117 IT & C Projects Durato Assessmet Based o Audt ad Software Reegeerg Cosm TOMOZEI, Uversty of Bacău Marus VETRICI, Crsta AMANCEI, Academy of Ecoomc Studes Bucharest

More information

Settlement Prediction by Spatial-temporal Random Process

Settlement Prediction by Spatial-temporal Random Process Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha

More information

A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy

A Game Theory Based Approach to the Generation of Optimal DDoS Defending Strategy A Game Theory Based Approach to the Geerato of Optmal DDo edg trategy Lag Huag, Degguo Feg, Yfeg La, Ygju Zhag, ad Yulg Lu Trusted Computg ad Iformato Assurace Laboratory, Isttute of oftware, The Chese

More information

Integrating Production Scheduling and Maintenance: Practical Implications

Integrating Production Scheduling and Maintenance: Practical Implications Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk

More information

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion

Forecasting Trend and Stock Price with Adaptive Extended Kalman Filter Data Fusion 2011 Iteratoal Coferece o Ecoomcs ad Face Research IPEDR vol.4 (2011 (2011 IACSIT Press, Sgapore Forecastg Tred ad Stoc Prce wth Adaptve Exteded alma Flter Data Fuso Betollah Abar Moghaddam Faculty of

More information

Real-Time Scheduling Models: an Experimental Approach

Real-Time Scheduling Models: an Experimental Approach Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães a.p.magalhaes@fe.up.pt Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -

More information

Software Reliability Index Reasonable Allocation Based on UML

Software Reliability Index Reasonable Allocation Based on UML Sotware Relablty Idex Reasoable Allocato Based o UML esheg Hu, M.Zhao, Jaeg Yag, Guorog Ja Sotware Relablty Idex Reasoable Allocato Based o UML 1 esheg Hu, 2 M.Zhao, 3 Jaeg Yag, 4 Guorog Ja 1, Frst Author

More information

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN

VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE

More information

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing

Mobile Agents in Telecommunications Networks A Simulative Approach to Load Balancing Moble Agets Telecommucatos Networks A Smulatve Approach to Load Balacg Steffe Lpperts Departmet of Computer Scece (4), Uversty of Techology Aache Aache, 52056, Germay Ad Brgt Kreller Corporate Techology

More information