Low-Cost Side Channel Remote Traffic Analysis Attack in Packet Networks
|
|
|
- Leon Randall
- 9 years ago
- Views:
Transcription
1 Low-Cost Sde Chael Remote Traffc Aalyss Attack Packet Networks Sach Kadloor, Xu Gog, Negar Kyavash, Tolga Tezca, Nkta Borsov ECE Departmet ad Coordated Scece Lab. IESE Departmet ad Coordated Scece Lab. IESE Departmet Uversty of Illos at Urbaa-Champag {kadloor1,xugog1,kyavash, ttezca, Abstract Ths paper presets a dagerous low-cost traffc aalyss attack packet-based etworks, such as the Iteret. The attack s moutable ay scearo where a shared routg resource exsts amog users. A real-world attack successfully compromsed the prvacy of a user wthout requrg sgfcat resources terms of access, memory, or computatoal power. The effectveess of our attack s demostrated a scearo where the user s DSL router uses FCFS schedulg polcy. Specfcally, we show that by usg a low-rate sequece of probes, a remote attacker ca obta sgfcat traffc-tmg ad volume formato about a partcular user, just by observg the roud trp tme of the probes. We also observe that eve whe the schedulg polcy s chaged to roud-rob, whle the correlato reduces sgfcatly, the attacker ca stll relably deduce user s traffc patter. Most of the router schedulg polces desged to date are evaluated mostly o the metrcs of throughput, delay ad faress. Our work s amed to demostrate a eed for cosderg a addtoal metrc that quatfes the formato leak betwee the dvdual traffc flows through the router. ad measures the roud-trp tme (RTT) of hs probe packets. The DSL has a comg ad a outgog port, for the traffcs addressed to, ad orgatg from Alce s computer. Bob s probe resposes ad Alce s comg traffc share the same queue, hece the delay that Bob observes would vary based o the patter of traffc addressed to Alce. Although the pgs travel through varous termedate routers, ther roudtrp tme s prmarly affected by Alce s traffc. Ths s because of two reasos. Oe, the termedate routers have sgfcatly hgher badwdth compared to the volume of the traffc flowg through them. Also, the termedate routers carry multple traffc flows. These two mply that the delays curred at these routers does ot chage wth tme. Hece, the delay duced by the users traffc s well preserved. I. I NTRODUCTION As more of our daly actvtes are carred out over the Iteret, the cocer for ther secrecy becomes creasgly urget. Ths paper presets a straghtforward, yet powerful traffc aalyss attack that takes advatage of the sde chael that s troduced by shared routg resources wth packetbased etworks, such as the Iteret. To descrbe the sde chael more detal, we wll cosder a example of a user, Alce, usg the Iteret from home. She s coected by a DSL coecto to her Iteret Servce Provder (ISP). The largest threats to the prvacy of Alce s commucato come ether from a compromse of her home computer, or from a uscrupulous employee at her ISP. However, The ISP s boud by at-wretappg laws [1] to ot vade to her prvacy. I ay case, Alce uses cryptographc protecto, such as Trasport Layer Securty (TLS) [2] to protect the most sestve data, such as passwords ad credt card umbers. A attacker, Bob, s curous about Alce s actvtes. He does ot have access to Alce s computer or her ISP. I fact, Bob ca possbly be o aother ISP, possbly aother coutry. However, Bob has access to a resource use by Alce, amely the packet queue sde her DSL router. Ths resource allows hm to create a sde chael that wll leak formato about Alce s traffc. Ths scearo s llustrated Fgure 1. Bob seds a low-badwdth, but hgh frequecy probe to the router Fg. 1. Queueg Sde Chael We wll demostrate that, fact, the delay Bob s traffc patter s strogly correlated wth Alce s traffc patter such that Bob ca fer the actvty Alce egages. The stregth of ths attack les the fact that t does ot requre specal access or prvleges for the attacker. The attacker does ot eve eed hgh computatoal power. Note that our attack ca oly reveal the tmg ad the volume of the traffc, ad ot the actual cotets of the packets. However, recet research has show that sgfcat fereces ca be draw by observg just the traffc patter of a user.
2 Based o hs observatos, Bob ca perform traffc aalyss: recovery of secret data based o packet couts, tmgs, ad szes. Recet research has demostrated that traffc aalyss ca be used for a umber of attacks: detfcato of web stes vsted [3], [4], guesses at passwords typed [5], ad recovery of phrases spoke over VoIP [6]. However, t was prevously assumed that such attacks requred access to oe of the routers alog the path of Alce s traffc. We wll show that ayoe who ca sed probe traffc to oe of these routers ca use the shared router queue as a sde chael to carry out traffc aalyss. Ths dramatcally creases the attack surface avalable for traffc aalyss. Eve teral commucato wholly cotaed wth a etwork a eterprse or mltary base may be subject to traffc aalyss, f the etwork s coected to the publc Iteret. Lkewse, eve o a closed etwork, a lowclearace sder may be able to carry out such probes from a remote locato. Remote traffc aalyss ca be appled to a wde varety of cotexts, so we beg by dscussg a few mportat attack scearos. 1) Cyberstalkg: A attacker may put a partcular user uder survellace order to lear more about that user s behavor o the Iteret. The motves for such dvdual survellace ca vary wdely. A attacker may wat to determe whether a user s actve or ot, whch wll help hm determe whether someoe s lkely to be home at a gve tme. A attacker may also wsh to costruct a profle of the user: Is the user lkely to be affluet? What s the user s geder? Are there chldre the home? Aother possblty for attack s to de-aoymze a user pseudoym, used o a blog or a dscusso board. By correlatg user actvty wth the tmes that updates are posted o the blog/board, t wll evetually be possble to obta statstcal evdece that mplcates the user. Fally, as stated before, some ecrypted traffc aalyss techques reveal the actual cotets of a user s commucato: statstcal models ca recover characters typed based o keystroke tmgs, whle others ca recover features from ecrypted VoIP calls, such as the laguage beg spoke, or test for the presece of specfc phrases. 2) Umaskg Relatoshps: Remote traffc aalyss ca also be used to detect whether two users are commucatg, thus ferrg socal or professoal relatoshps betwee them. Such commucatos may take the form of a drect etwork coecto betwee them va TCP or VoIP, or drect coversato by stat message. I both cases, correlato of messages leavg the computer of oe user ad arrvg at the computer of the other ca gve evdece of commucato. 3) Motorg at Scale: Because each probe requres oly a low volume of traffc, t s possble for attackers to motor multple routers at oce. I addto to beg able to motor multple people, more pervasve survellace ca provde ew opportutes for motorg. For example, whe deaoymzg a pseudoym or fdg coectos betwee users, cyberstalkg allows oly cofrmato attacks, where a exstg suspco ca be cofrmed or dsproved, whereas more pervasve motorg ca dscover prevously ukow relatoshps. Havg dscussed how our attack ca be used to vade to a user s prvacy o the Iteret, we ow dscuss some of the other attacks proposed the lterature. Followg that, Secto III, we formulate mathematcally the problem at had. We the preset the results of our smulato ad the expermet Secto IV. We coclude by descrbg a lst of potetal research problems Secto V, that arse out of the observatos made ths paper. II. RELATED WORK Perhaps the most related work to our proposed attack s the cloggg attack proposed by Back et al. [7], whch was proposed as a attack agast low-latecy aoymty schemes. As the ame suggests, aoymous commucato schemes allow ther users to commucate wth oe aother whle maskg the relatoshps betwee the users,.e. cocealg who commucates wth whom. The majorty of these schemes forward ed-user traffc though redrectg relays, usg multlayered ecrypto betwee the source ad every termedate relay. Ths s doe to rebuff traffc aalyss ad guaratee edto-ed prvacy. The layered ecrypto s mplemeted through a seres of relay odes creatg a vrtual aoymous tuel. I the cloggg attack proposed [7], a adversary at oe ed of a aoymous tuel ca determe whch odes partcpate the tuel by sequetally cloggg each of the possble relays ad lookg for a correspodg drop the throughput across the tuel. However, gve the curret archtecture of the Iteret, lauchg such a attack s feasble because t would requre very hgh badwdth ad tme. Murdoch ad Daezs [8] proposed a dramatcally lowercost form of ths attack ad valdated the Tor etwork [9]. I ther attack, a malcous server, through a o-off traffc patter, systematcally clogs a aoymous tuel, whle measurg the latecy of the coectos that ru across all relays. The relays wth latecy fuctos that are most correlated to the cloggg perods are detfed as the members of the tuel. Evas et al. [10] exteded ths attack to requre less badwdth by usg log paths the Tor etwork. Fally, Chakravarty et al. [11] showed that smlar attacks ca be used to detect ormal Iteret routers that forward Tor paths, as opposed to just Tor odes, by usg avalable badwdth estmato techques [12]. These attacks are structurally smlar to our attack, but the probes are used to detect the presece of a attacker-cotrolled flow order to volate aoymty guaratees. I our attack, the flow of terest s ot uder the attackers cotrol, thus our problem explots a sde chael, rather tha a covert oe. I partcular, prevous work has used coarse-graed o-off patters to detect flow presece, whereas we show that t s possble to fer fegraed formato about a user flow. III. MATHEMATICAL FORMULATION We wll cosder a tme slotted system. I each tme slot, we wll assume that there ca be at most oe packet arrval from each stream. Ths assumpto s vald f we sample the
3 tme fe eough. Let x (k) {0, 1} deote the umber of comg packets from stream k {1, 2} tme slot. Let y (k) {0, 1} deote the umber of packets of stream k served the tme slot. LetQ (k) represet the umber of packets of stream k whch have ot bee served utl tme. It follows the recurso Q (k) = Q (k) 1 + x(k) y (k) (1) Let stream 1 deote the strg of pgs, ad let stream 2 deote the traffc patter of the other user. Defe the arrvg tme of the th packet the k th queue as T (k) = f : j=1 x (k) j ad defe the departure tme of the th packet from the k th queue as T (k) = f : y (k) j (3) j=1 The the roudtrp tme of the th packet s T (k) = T (k) (2) T (k) (4) Also, we defe the umber of arrvg packets oe queue betwee two cosecutve arrvals the other queue, x k. = T (2) j=t (2) 1 x (1) j (5) The correlato betwee the roudtrp tmes of the pgs ad the traffc patter the other stream s 1 N T (2) 1 N 1 N T (2) (6) We wll aalyze the performace of frst come frst served, ad the roud-rob polcy agast our attack terms of the correlato metrc the followg secto. IV. PERFORMANCE RESULTS To estmate the effectveess of our attack, we frst ra a seres of smulato expermets. We captured both the tme of arrval of the packets ad the packet szes of real traffc arrvg to our computer usg Wreshark. These captured packets represet the user s traffc, about whch the attacker wats to lear. The packets were captured two scearos, oe whle browsg the Iteret, ad secod whle playg a vdeo o Youtube. The average traffc data rate s vastly dfferet these two scearos, t s 21.8 KBps whle browsg ad 105 KBps whle watchg the vdeo. We the geerate a stream of equally spaced pgs, each of sze 74 Bytes, ad compute the roudtrp tme of these pgs as see by the attacker. Roudtrp tmes are calculated both for the case whe FCFS polcy s mplemeted at the router ad Fg. 2. Pg rate = 5 pgs/sec whe the polcy used s roud-rob. We vary the frequecy of these pgs: 5, 50, ad 500 pgs/sec, whch correspod to a pg data rate of 0.37, 3.7, ad 37 kbps, respectvely. These rates are too small for the router to suspect the presece of a attack. The router s servce rate was fxed at 296 kbps. Fgures 2, 3, ad 4 plot the roud trp tme of each pg frequecy for FCFS ad roud-rob polcy. The top plot each fgure depcts the user s traffc, sampled at the arrval tmes of the pgs. The mddle plot s the roud trp tme of attacker s pgs whe FCFS polcy s used ad the bottom plot the roud trp
4 Fg. 3. Pg rate = 50 pgs/sec Fg. 4. Pg rate = 500 pgs/sec tme whe roud-rob s used. It s clearly see that as log as the pg s ot too frequet, there s a hgh correlato betwee the put traffc ad the roud trp tmes. Whle the roud-rob polcy oly reveals whether the user s actve or ot, the FCFS polcy reveals the exact patter. Ths s however ot true at hgh pg frequeces whe roud-rob polcy reveals as much formato as the FCFS polcy, ad hece s vulerable. The smulatos above demostrate the potetal of our proposed attack to ucover the traffc patter of a remote user. Ca ths attack be used practce? To aswer ths questo, we setup a testbed. We observed traffc of a home DSL user Illos, whle smultaeously sedg a pg probe from a computer New Jersey at a frequecy of 100 per secod. Roud trp tmes were calculated ad were later compared wth the actual traffc patter of the home user. Fgure 5 shows the results of our expermet. The user s traffc s show gree, ad the roud-trp tmes of the pg probe are show red. It s qute clear from the fgure that there s a correlato betwee the two. Note that the data rate of the pgs s less tha 50 Kbps of badwdth, ad s ulkely to be otced.
5 I the most geeral formulato of the problem, the goal of the attacker s to maxmze the mutual formato I(Y ; X Z) where X deotes the traffc patter of terest, Y s the observed watg tme of the probe sgal, ad Z deotes the probe sgal. The queug polcy s modeled by the trasto probablty p(y X, Z). Fdg a optmal prvacy-preservg polcy terms of ether mmzg the correlato metrc or the codtoal mutual formato wll be the focus of our future work. Fg. 5. Real traffc o a DSL le vs. observed probe RTTs V. DISCUSSION We have successfully demostrated a efarous attack that takes advatage of the sde chael troduced by shared routg resources wth packet-based etworks, such as the Iteret. The performace of the attack was show usg real traffc ad smulato of FCFS ad roud-rob polces. Ths smple attack s so powerful because the queug polces are ot desged wth purpose of preservg prvacy of the users. Rather, they are desged havg delay-throughput trade-offs md. Ths work llustrates the urgecy for developmet of prvacy preservg schedulg polces. The objectve of such a polcy wll be to mmze the correlatos betwee the traffc patters of oe user ad the roudtrp tmes (or the watg tmes) of the packets of the other user. Moreover, whle correlato-based metrcs such as (6) are commoly used for determg the amout of formato a adversary ca lear va the sde chael, formato-theoretcally oe would lke to determe the maxmum rate of formato a attacker ca relably lear based o the observatos avalable to her/hm. Thus, a prvacy-preservg schedulg polcy must fact crease the ucertaly of the adversary. REFERENCES [1] Wre ad electroc commucatos tercepto ad tercepto of oral commucatos, Uted States Code, Ttle 18, Part I, Chapter 119. [2] T. Derks ad C. Alle, The TLS protocol verso 1.0, RFC2246, Ja [3] G. Bssas, M. Lberatore, D. Jese, ad B. Leve, Prvacy vulerabltes ecrypted HTTP streams, Prvacy Ehacg Techologes, 2006, pp [Ole]. Avalable: / \ 1 [4] M. Lberatore ad B. N. Leve, Iferrg the source of ecrypted HTTP coectos, CCS 06: Proceedgs of the 13th ACM coferece o Computer ad commucatos securty. New York, NY, USA: ACM Press, 2006, pp [Ole]. Avalable: [5] D. X. Sog, D. Wager, ad X. Ta, Tmg aalyss of keystrokes ad SSH tmg attacks, USENIX Securty Symposum, [6] C. V. Wrght, L. Ballard, S. E. Coull, F. Morose, ad G. M. Masso, Spot me f you ca: Ucoverg spoke phrases ecrypted VoIP coversatos, SP 08: Proceedgs of the 2008 IEEE Symposum o Securty ad Prvacy. Washgto, DC, USA: IEEE Computer Socety, 2008, pp [7] A. Back, U. Moller, ad A. Stglc, Traffc aalyss attacks ad tradeoffs aoymty provdg systems, Lecture Notes Computer Scece, vol. 2137, o , p. 76, [8] S. Murdoch ad G. Daezs, Low-cost traffc aalyss of tor, 2005 IEEE Symposum o Securty ad Prvacy, 2005, pp [9] R. Dglede, N. Mathewso, ad P. Syverso, Tor: The secodgeerato oo router, USENIX Securty Symposum, 2004, pp [10] N. S. Evas, R. Dglede, ad C. Grothoff, A practcal cogesto attack o Tor usg log paths, USENIX Securty Symposum, Aug [11] S. Chakravarty, A. Stavrou, ad A. D. Keromyts, Idetfyg proxy odes a Tor aoymzato crcut, Workshop o Securty ad Prvacy Telecommucatos ad Iformato Systems, Dec. 2008, pp [12] J. Strauss, D. Katab, ad F. Kaashoek, A measuremet study of avalable badwdth estmato tools, IMC 03: Proceedgs of the 3rd ACM SIGCOMM coferece o Iteret measuremet. New York, NY, USA: ACM, 2003, pp
IDENTIFICATION OF THE DYNAMICS OF THE GOOGLE S RANKING ALGORITHM. A. Khaki Sedigh, Mehdi Roudaki
IDENIFICAION OF HE DYNAMICS OF HE GOOGLE S RANKING ALGORIHM A. Khak Sedgh, Mehd Roudak Cotrol Dvso, Departmet of Electrcal Egeerg, K.N.oos Uversty of echology P. O. Box: 16315-1355, ehra, Ira [email protected],
6.7 Network analysis. 6.7.1 Introduction. References - Network analysis. Topological analysis
6.7 Network aalyss Le data that explctly store topologcal formato are called etwork data. Besdes spatal operatos, several methods of spatal aalyss are applcable to etwork data. Fgure: Network data Refereces
Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation
Securty Aalyss of RAPP: A RFID Authetcato Protocol based o Permutato Wag Shao-hu,,, Ha Zhje,, Lu Sujua,, Che Da-we, {College of Computer, Najg Uversty of Posts ad Telecommucatos, Najg 004, Cha Jagsu Hgh
Efficient Traceback of DoS Attacks using Small Worlds in MANET
Effcet Traceback of DoS Attacks usg Small Worlds MANET Yog Km, Vshal Sakhla, Ahmed Helmy Departmet. of Electrcal Egeerg, Uversty of Souther Calfora, U.S.A {yogkm, sakhla, helmy}@ceg.usc.edu Abstract Moble
Green Master based on MapReduce Cluster
Gree Master based o MapReduce Cluster Mg-Zh Wu, Yu-Chag L, We-Tsog Lee, Yu-Su L, Fog-Hao Lu Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of Electrcal Egeerg Tamkag Uversty, Tawa, ROC Dept of
Optimal Packetization Interval for VoIP Applications Over IEEE 802.16 Networks
Optmal Packetzato Iterval for VoIP Applcatos Over IEEE 802.16 Networks Sheha Perera Harsha Srsea Krzysztof Pawlkowsk Departmet of Electrcal & Computer Egeerg Uversty of Caterbury New Zealad [email protected]
Average Price Ratios
Average Prce Ratos Morgstar Methodology Paper August 3, 2005 2005 Morgstar, Ic. All rghts reserved. The formato ths documet s the property of Morgstar, Ic. Reproducto or trascrpto by ay meas, whole or
APPENDIX III THE ENVELOPE PROPERTY
Apped III APPENDIX III THE ENVELOPE PROPERTY Optmzato mposes a very strog structure o the problem cosdered Ths s the reaso why eoclasscal ecoomcs whch assumes optmzg behavour has bee the most successful
Fractal-Structured Karatsuba`s Algorithm for Binary Field Multiplication: FK
Fractal-Structured Karatsuba`s Algorthm for Bary Feld Multplcato: FK *The authors are worg at the Isttute of Mathematcs The Academy of Sceces of DPR Korea. **Address : U Jog dstrct Kwahadog Number Pyogyag
Dynamic Provisioning Modeling for Virtualized Multi-tier Applications in Cloud Data Center
200 IEEE 3rd Iteratoal Coferece o Cloud Computg Dyamc Provsog Modelg for Vrtualzed Mult-ter Applcatos Cloud Data Ceter Jg B 3 Zhlag Zhu 2 Ruxog Ta 3 Qgbo Wag 3 School of Iformato Scece ad Egeerg College
ECONOMIC CHOICE OF OPTIMUM FEEDER CABLE CONSIDERING RISK ANALYSIS. University of Brasilia (UnB) and The Brazilian Regulatory Agency (ANEEL), Brazil
ECONOMIC CHOICE OF OPTIMUM FEEDER CABE CONSIDERING RISK ANAYSIS I Camargo, F Fgueredo, M De Olvera Uversty of Brasla (UB) ad The Brazla Regulatory Agecy (ANEE), Brazl The choce of the approprate cable
ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS. Janne Peisa Ericsson Research 02420 Jorvas, Finland. Michael Meyer Ericsson Research, Germany
ANALYTICAL MODEL FOR TCP FILE TRANSFERS OVER UMTS Jae Pesa Erco Research 4 Jorvas, Flad Mchael Meyer Erco Research, Germay Abstract Ths paper proposes a farly complex model to aalyze the performace of
A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS
L et al.: A Dstrbuted Reputato Broker Framework for Web Servce Applcatos A DISTRIBUTED REPUTATION BROKER FRAMEWORK FOR WEB SERVICE APPLICATIONS Kwe-Jay L Departmet of Electrcal Egeerg ad Computer Scece
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN
SHAPIRO-WILK TEST FOR NORMALITY WITH KNOWN MEAN Wojcech Zelńsk Departmet of Ecoometrcs ad Statstcs Warsaw Uversty of Lfe Sceces Nowoursyowska 66, -787 Warszawa e-mal: wojtekzelsk@statystykafo Zofa Hausz,
Numerical Methods with MS Excel
TMME, vol4, o.1, p.84 Numercal Methods wth MS Excel M. El-Gebely & B. Yushau 1 Departmet of Mathematcal Sceces Kg Fahd Uversty of Petroleum & Merals. Dhahra, Saud Araba. Abstract: I ths ote we show how
Integrating Production Scheduling and Maintenance: Practical Implications
Proceedgs of the 2012 Iteratoal Coferece o Idustral Egeerg ad Operatos Maagemet Istabul, Turkey, uly 3 6, 2012 Itegratg Producto Schedulg ad Mateace: Practcal Implcatos Lath A. Hadd ad Umar M. Al-Turk
The Digital Signature Scheme MQQ-SIG
The Dgtal Sgature Scheme MQQ-SIG Itellectual Property Statemet ad Techcal Descrpto Frst publshed: 10 October 2010, Last update: 20 December 2010 Dalo Glgorosk 1 ad Rue Stesmo Ødegård 2 ad Rue Erled Jese
Abraham Zaks. Technion I.I.T. Haifa ISRAEL. and. University of Haifa, Haifa ISRAEL. Abstract
Preset Value of Autes Uder Radom Rates of Iterest By Abraham Zas Techo I.I.T. Hafa ISRAEL ad Uversty of Hafa, Hafa ISRAEL Abstract Some attempts were made to evaluate the future value (FV) of the expected
Credibility Premium Calculation in Motor Third-Party Liability Insurance
Advaces Mathematcal ad Computatoal Methods Credblty remum Calculato Motor Thrd-arty Lablty Isurace BOHA LIA, JAA KUBAOVÁ epartmet of Mathematcs ad Quattatve Methods Uversty of ardubce Studetská 95, 53
CHAPTER 2. Time Value of Money 6-1
CHAPTER 2 Tme Value of Moey 6- Tme Value of Moey (TVM) Tme Les Future value & Preset value Rates of retur Autes & Perpetutes Ueve cash Flow Streams Amortzato 6-2 Tme les 0 2 3 % CF 0 CF CF 2 CF 3 Show
The analysis of annuities relies on the formula for geometric sums: r k = rn+1 1 r 1. (2.1) k=0
Chapter 2 Autes ad loas A auty s a sequece of paymets wth fxed frequecy. The term auty orgally referred to aual paymets (hece the ame), but t s ow also used for paymets wth ay frequecy. Autes appear may
Impact of Interference on the GPRS Multislot Link Level Performance
Impact of Iterferece o the GPRS Multslot Lk Level Performace Javer Gozalvez ad Joh Dulop Uversty of Strathclyde - Departmet of Electroc ad Electrcal Egeerg - George St - Glasgow G-XW- Scotlad Ph.: + 8
A New Bayesian Network Method for Computing Bottom Event's Structural Importance Degree using Jointree
, pp.277-288 http://dx.do.org/10.14257/juesst.2015.8.1.25 A New Bayesa Network Method for Computg Bottom Evet's Structural Importace Degree usg Jotree Wag Yao ad Su Q School of Aeroautcs, Northwester Polytechcal
Compressive Sensing over Strongly Connected Digraph and Its Application in Traffic Monitoring
Compressve Sesg over Strogly Coected Dgraph ad Its Applcato Traffc Motorg Xao Q, Yogca Wag, Yuexua Wag, Lwe Xu Isttute for Iterdscplary Iformato Sceces, Tsghua Uversty, Bejg, Cha {qxao3, kyo.c}@gmal.com,
10.5 Future Value and Present Value of a General Annuity Due
Chapter 10 Autes 371 5. Thomas leases a car worth $4,000 at.99% compouded mothly. He agrees to make 36 lease paymets of $330 each at the begg of every moth. What s the buyout prce (resdual value of the
The impact of service-oriented architecture on the scheduling algorithm in cloud computing
Iteratoal Research Joural of Appled ad Basc Sceces 2015 Avalable ole at www.rjabs.com ISSN 2251-838X / Vol, 9 (3): 387-392 Scece Explorer Publcatos The mpact of servce-oreted archtecture o the schedulg
Proactive Detection of DDoS Attacks Utilizing k-nn Classifier in an Anti-DDos Framework
World Academy of Scece, Egeerg ad Techology Iteratoal Joural of Computer, Electrcal, Automato, Cotrol ad Iformato Egeerg Vol:4, No:3, 2010 Proactve Detecto of DDoS Attacks Utlzg k-nn Classfer a At-DDos
of the relationship between time and the value of money.
TIME AND THE VALUE OF MONEY Most agrbusess maagers are famlar wth the terms compoudg, dscoutg, auty, ad captalzato. That s, most agrbusess maagers have a tutve uderstadg that each term mples some relatoshp
Fast, Secure Encryption for Indexing in a Column-Oriented DBMS
Fast, Secure Ecrypto for Idexg a Colum-Oreted DBMS Tgja Ge, Sta Zdok Brow Uversty {tge, sbz}@cs.brow.edu Abstract Networked formato systems requre strog securty guaratees because of the ew threats that
Settlement Prediction by Spatial-temporal Random Process
Safety, Relablty ad Rs of Structures, Ifrastructures ad Egeerg Systems Furuta, Fragopol & Shozua (eds Taylor & Fracs Group, Lodo, ISBN 978---77- Settlemet Predcto by Spatal-temporal Radom Process P. Rugbaapha
An Approach to Evaluating the Computer Network Security with Hesitant Fuzzy Information
A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog A Approach to Evaluatg the Computer Network Securty wth Hestat Fuzzy Iformato Jafeg Dog, Frst ad Correspodg Author
Capacitated Production Planning and Inventory Control when Demand is Unpredictable for Most Items: The No B/C Strategy
SCHOOL OF OPERATIONS RESEARCH AND INDUSTRIAL ENGINEERING COLLEGE OF ENGINEERING CORNELL UNIVERSITY ITHACA, NY 4853-380 TECHNICAL REPORT Jue 200 Capactated Producto Plag ad Ivetory Cotrol whe Demad s Upredctable
Preprocess a planar map S. Given a query point p, report the face of S containing p. Goal: O(n)-size data structure that enables O(log n) query time.
Computatoal Geometry Chapter 6 Pot Locato 1 Problem Defto Preprocess a plaar map S. Gve a query pot p, report the face of S cotag p. S Goal: O()-sze data structure that eables O(log ) query tme. C p E
ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN
Colloquum Bometrcum 4 ADAPTATION OF SHAPIRO-WILK TEST TO THE CASE OF KNOWN MEAN Zofa Hausz, Joaa Tarasńska Departmet of Appled Mathematcs ad Computer Scece Uversty of Lfe Sceces Lubl Akademcka 3, -95 Lubl
Dynamic Two-phase Truncated Rayleigh Model for Release Date Prediction of Software
J. Software Egeerg & Applcatos 3 63-69 do:.436/jsea..367 Publshed Ole Jue (http://www.scrp.org/joural/jsea) Dyamc Two-phase Trucated Raylegh Model for Release Date Predcto of Software Lafe Qa Qgchua Yao
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS. x, where. = y - ˆ " 1
STATISTICAL PROPERTIES OF LEAST SQUARES ESTIMATORS Recall Assumpto E(Y x) η 0 + η x (lear codtoal mea fucto) Data (x, y ), (x 2, y 2 ),, (x, y ) Least squares estmator ˆ E (Y x) ˆ " 0 + ˆ " x, where ˆ
Cyber Journals: Multidisciplinary Journals in Science and Technology, Journal of Selected Areas in Telecommunications (JSAT), January Edition, 2011
Cyber Jourals: Multdscplary Jourals cece ad Techology, Joural of elected Areas Telecommucatos (JAT), Jauary dto, 2011 A ovel rtual etwork Mappg Algorthm for Cost Mmzg ZHAG hu-l, QIU Xue-sog tate Key Laboratory
Statistical Pattern Recognition (CE-725) Department of Computer Engineering Sharif University of Technology
I The Name of God, The Compassoate, The ercful Name: Problems' eys Studet ID#:. Statstcal Patter Recogto (CE-725) Departmet of Computer Egeerg Sharf Uversty of Techology Fal Exam Soluto - Sprg 202 (50
1. The Time Value of Money
Corporate Face [00-0345]. The Tme Value of Moey. Compoudg ad Dscoutg Captalzato (compoudg, fdg future values) s a process of movg a value forward tme. It yelds the future value gve the relevat compoudg
Discrete-Event Simulation of Network Systems Using Distributed Object Computing
Dscrete-Evet Smulato of Network Systems Usg Dstrbuted Object Computg Welog Hu Arzoa Ceter for Itegratve M&S Computer Scece & Egeerg Dept. Fulto School of Egeerg Arzoa State Uversty, Tempe, Arzoa, 85281-8809
Automated Event Registration System in Corporation
teratoal Joural of Advaces Computer Scece ad Techology JACST), Vol., No., Pages : 0-0 0) Specal ssue of CACST 0 - Held durg 09-0 May, 0 Malaysa Automated Evet Regstrato System Corporato Zafer Al-Makhadmee
Real-Time Scheduling Models: an Experimental Approach
Real-Tme Schedulg Models: a Expermetal Approach (Techcal Report - Nov. 2000) Atóo J. Pessoa de Magalhães [email protected] Fax: 22 207 4247 SAI DEMEGI Faculdade de Egehara da Uversdade do Porto -
AnySee: Peer-to-Peer Live Streaming
ysee: Peer-to-Peer Lve Streamg School of Computer Scece ad Techology Huazhog Uversty of Scece ad Techology Wuha, 40074, Cha {xflao, hj, dfdeg }@hust.edu.c Xaofe Lao, Ha J, *Yuhao Lu, *Loel M. N, ad afu
The Time Value of Money
The Tme Value of Moey 1 Iversemet Optos Year: 1624 Property Traded: Mahatta Islad Prce : $24.00, FV of $24 @ 6%: FV = $24 (1+0.06) 388 = $158.08 bllo Opto 1 0 1 2 3 4 5 t ($519.37) 0 0 0 0 $1,000 Opto
Report 52 Fixed Maturity EUR Industrial Bond Funds
Rep52, Computed & Prted: 17/06/2015 11:53 Report 52 Fxed Maturty EUR Idustral Bod Fuds From Dec 2008 to Dec 2014 31/12/2008 31 December 1999 31/12/2014 Bechmark Noe Defto of the frm ad geeral formato:
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS R =
Chapter 3. AMORTIZATION OF LOAN. SINKING FUNDS Objectves of the Topc: Beg able to formalse ad solve practcal ad mathematcal problems, whch the subjects of loa amortsato ad maagemet of cumulatve fuds are
How To Make A Supply Chain System Work
Iteratoal Joural of Iformato Techology ad Kowledge Maagemet July-December 200, Volume 2, No. 2, pp. 3-35 LATERAL TRANSHIPMENT-A TECHNIQUE FOR INVENTORY CONTROL IN MULTI RETAILER SUPPLY CHAIN SYSTEM Dharamvr
Classic Problems at a Glance using the TVM Solver
C H A P T E R 2 Classc Problems at a Glace usg the TVM Solver The table below llustrates the most commo types of classc face problems. The formulas are gve for each calculato. A bref troducto to usg the
Reinsurance and the distribution of term insurance claims
Resurace ad the dstrbuto of term surace clams By Rchard Bruyel FIAA, FNZSA Preseted to the NZ Socety of Actuares Coferece Queestow - November 006 1 1 Itroducto Ths paper vestgates the effect of resurace
RUSSIAN ROULETTE AND PARTICLE SPLITTING
RUSSAN ROULETTE AND PARTCLE SPLTTNG M. Ragheb 3/7/203 NTRODUCTON To stuatos are ecoutered partcle trasport smulatos:. a multplyg medum, a partcle such as a eutro a cosmc ray partcle or a photo may geerate
Load Balancing Algorithm based Virtual Machine Dynamic Migration Scheme for Datacenter Application with Optical Networks
0 7th Iteratoal ICST Coferece o Commucatos ad Networkg Cha (CHINACOM) Load Balacg Algorthm based Vrtual Mache Dyamc Mgrato Scheme for Dataceter Applcato wth Optcal Networks Xyu Zhag, Yogl Zhao, X Su, Ruyg
A Study of Unrelated Parallel-Machine Scheduling with Deteriorating Maintenance Activities to Minimize the Total Completion Time
Joural of Na Ka, Vol. 0, No., pp.5-9 (20) 5 A Study of Urelated Parallel-Mache Schedulg wth Deteroratg Mateace Actvtes to Mze the Total Copleto Te Suh-Jeq Yag, Ja-Yuar Guo, Hs-Tao Lee Departet of Idustral
Simple Linear Regression
Smple Lear Regresso Regresso equato a equato that descrbes the average relatoshp betwee a respose (depedet) ad a eplaator (depedet) varable. 6 8 Slope-tercept equato for a le m b (,6) slope. (,) 6 6 8
A Parallel Transmission Remote Backup System
2012 2d Iteratoal Coferece o Idustral Techology ad Maagemet (ICITM 2012) IPCSIT vol 49 (2012) (2012) IACSIT Press, Sgapore DOI: 107763/IPCSIT2012V495 2 A Parallel Trasmsso Remote Backup System Che Yu College
Optimal multi-degree reduction of Bézier curves with constraints of endpoints continuity
Computer Aded Geometrc Desg 19 (2002 365 377 wwwelsevercom/locate/comad Optmal mult-degree reducto of Bézer curves wth costrats of edpots cotuty Guo-Dog Che, Guo-J Wag State Key Laboratory of CAD&CG, Isttute
The Gompertz-Makeham distribution. Fredrik Norström. Supervisor: Yuri Belyaev
The Gompertz-Makeham dstrbuto by Fredrk Norström Master s thess Mathematcal Statstcs, Umeå Uversty, 997 Supervsor: Yur Belyaev Abstract Ths work s about the Gompertz-Makeham dstrbuto. The dstrbuto has
T = 1/freq, T = 2/freq, T = i/freq, T = n (number of cash flows = freq n) are :
Bullets bods Let s descrbe frst a fxed rate bod wthout amortzg a more geeral way : Let s ote : C the aual fxed rate t s a percetage N the otoal freq ( 2 4 ) the umber of coupo per year R the redempto of
Applications of Support Vector Machine Based on Boolean Kernel to Spam Filtering
Moder Appled Scece October, 2009 Applcatos of Support Vector Mache Based o Boolea Kerel to Spam Flterg Shugag Lu & Keb Cu School of Computer scece ad techology, North Cha Electrc Power Uversty Hebe 071003,
ANOVA Notes Page 1. Analysis of Variance for a One-Way Classification of Data
ANOVA Notes Page Aalss of Varace for a Oe-Wa Classfcato of Data Cosder a sgle factor or treatmet doe at levels (e, there are,, 3, dfferet varatos o the prescrbed treatmet) Wth a gve treatmet level there
Maintenance Scheduling of Distribution System with Optimal Economy and Reliability
Egeerg, 203, 5, 4-8 http://dx.do.org/0.4236/eg.203.59b003 Publshed Ole September 203 (http://www.scrp.org/joural/eg) Mateace Schedulg of Dstrbuto System wth Optmal Ecoomy ad Relablty Syua Hog, Hafeg L,
Chapter Eight. f : R R
Chapter Eght f : R R 8. Itroducto We shall ow tur our atteto to the very mportat specal case of fuctos that are real, or scalar, valued. These are sometmes called scalar felds. I the very, but mportat,
Managing Interdependent Information Security Risks: Cyberinsurance, Managed Security Services, and Risk Pooling Arrangements
Maagg Iterdepedet Iformato Securty Rsks: Cybersurace, Maaged Securty Servces, ad Rsk Poolg Arragemets Xa Zhao Assstat Professor Departmet of Iformato Systems ad Supply Cha Maagemet Brya School of Busess
On the impact of heterogeneity and back-end scheduling in load balancing designs
O the mpact of heterogety ad back-ed schedulg load balacg desgs Ho-L Che Iformato Scece ad Techology Calfora Isttute of Techology Pasadea CA 925 Jaso R Marde Iformato Scece ad Techology Calfora Isttute
Chapter 3 0.06 = 3000 ( 1.015 ( 1 ) Present Value of an Annuity. Section 4 Present Value of an Annuity; Amortization
Chapter 3 Mathematcs of Face Secto 4 Preset Value of a Auty; Amortzato Preset Value of a Auty I ths secto, we wll address the problem of determg the amout that should be deposted to a accout ow at a gve
A particle swarm optimization to vehicle routing problem with fuzzy demands
A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg, Ye-me Qa A partcle swarm optmzato to vehcle routg problem wth fuzzy demads Yag Peg 1,Ye-me Qa 1 School of computer ad formato
IP Network Topology Link Prediction Based on Improved Local Information Similarity Algorithm
Iteratoal Joural of Grd Dstrbuto Computg, pp.141-150 http://dx.do.org/10.14257/jgdc.2015.8.6.14 IP Network Topology Lk Predcto Based o Improved Local Iformato mlarty Algorthm Che Yu* 1, 2 ad Dua Zhem 1
On formula to compute primes and the n th prime
Joural's Ttle, Vol., 00, o., - O formula to compute prmes ad the th prme Issam Kaddoura Lebaese Iteratoal Uversty Faculty of Arts ad ceces, Lebao Emal: [email protected] amh Abdul-Nab Lebaese Iteratoal
Fault Tree Analysis of Software Reliability Allocation
Fault Tree Aalyss of Software Relablty Allocato Jawe XIANG, Kokch FUTATSUGI School of Iformato Scece, Japa Advaced Isttute of Scece ad Techology - Asahda, Tatsuokuch, Ishkawa, 92-292 Japa ad Yaxag HE Computer
VIDEO REPLICA PLACEMENT STRATEGY FOR STORAGE CLOUD-BASED CDN
Joural of Theoretcal ad Appled Iformato Techology 31 st Jauary 214. Vol. 59 No.3 25-214 JATIT & S. All rghts reserved. ISSN: 1992-8645 www.att.org E-ISSN: 1817-3195 VIDEO REPICA PACEMENT STRATEGY FOR STORAGE
Proceedings of the 2010 Winter Simulation Conference B. Johansson, S. Jain, J. Montoya-Torres, J. Hugan, and E. Yücesan, eds.
Proceedgs of the 21 Wter Smulato Coferece B. Johasso, S. Ja, J. Motoya-Torres, J. Huga, ad E. Yücesa, eds. EMPIRICAL METHODS OR TWO-ECHELON INVENTORY MANAGEMENT WITH SERVICE LEVEL CONSTRAINTS BASED ON
Regression Analysis. 1. Introduction
. Itroducto Regresso aalyss s a statstcal methodology that utlzes the relato betwee two or more quattatve varables so that oe varable ca be predcted from the other, or others. Ths methodology s wdely used
The Popularity Parameter in Unstructured P2P File Sharing Networks
The Popularty Parameter Ustructured P2P Fle Sharg Networks JAIME LLORET, JUAN R. DIAZ, JOSE M. JIMÉNEZ, MANUEL ESTEVE Departmet of Commucatos Polytechc Uversty of Valeca Camo de Vera s/, 4622 Valeca SPAIN
Contention-Free Periodic Message Scheduler Medium Access Control in Wireless Sensor / Actuator Networks
Coteto-Free Perodc Message Sceduler Medum Access Cotrol Wreless Sesor / Actuator Networks Tomas W. Carley ECE Departmet Uversty of Marylad [email protected] Moussa A. Ba Embedded Researc Solutos [email protected]
Beta. A Statistical Analysis of a Stock s Volatility. Courtney Wahlstrom. Iowa State University, Master of School Mathematics. Creative Component
Beta A Statstcal Aalyss of a Stock s Volatlty Courtey Wahlstrom Iowa State Uversty, Master of School Mathematcs Creatve Compoet Fall 008 Amy Froelch, Major Professor Heather Bolles, Commttee Member Travs
Optimal replacement and overhaul decisions with imperfect maintenance and warranty contracts
Optmal replacemet ad overhaul decsos wth mperfect mateace ad warraty cotracts R. Pascual Departmet of Mechacal Egeerg, Uversdad de Chle, Caslla 2777, Satago, Chle Phoe: +56-2-6784591 Fax:+56-2-689657 [email protected]
Banking (Early Repayment of Housing Loans) Order, 5762 2002 1
akg (Early Repaymet of Housg Loas) Order, 5762 2002 y vrtue of the power vested me uder Secto 3 of the akg Ordace 94 (hereafter, the Ordace ), followg cosultato wth the Commttee, ad wth the approval of
How To Value An Annuity
Future Value of a Auty After payg all your blls, you have $200 left each payday (at the ed of each moth) that you wll put to savgs order to save up a dow paymet for a house. If you vest ths moey at 5%
DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT
ESTYLF08, Cuecas Meras (Meres - Lagreo), 7-9 de Septembre de 2008 DECISION MAKING WITH THE OWA OPERATOR IN SPORT MANAGEMENT José M. Mergó Aa M. Gl-Lafuete Departmet of Busess Admstrato, Uversty of Barceloa
CHAPTER 13. Simple Linear Regression LEARNING OBJECTIVES. USING STATISTICS @ Sunflowers Apparel
CHAPTER 3 Smple Lear Regresso USING STATISTICS @ Suflowers Apparel 3 TYPES OF REGRESSION MODELS 3 DETERMINING THE SIMPLE LINEAR REGRESSION EQUATION The Least-Squares Method Vsual Exploratos: Explorg Smple
Statistical Intrusion Detector with Instance-Based Learning
Iformatca 5 (00) xxx yyy Statstcal Itruso Detector wth Istace-Based Learg Iva Verdo, Boja Nova Faulteta za eletroteho raualštvo Uverza v Marboru Smetaova 7, 000 Marbor, Sloveja [email protected] eywords:
Load Balancing Control for Parallel Systems
Proc IEEE Med Symposum o New drectos Cotrol ad Automato, Chaa (Grèce),994, pp66-73 Load Balacg Cotrol for Parallel Systems Jea-Claude Heet LAAS-CNRS, 7 aveue du Coloel Roche, 3077 Toulouse, Frace E-mal
Numerical Comparisons of Quality Control Charts for Variables
Global Vrtual Coferece Aprl, 8. - 2. 203 Nuercal Coparsos of Qualty Cotrol Charts for Varables J.F. Muñoz-Rosas, M.N. Pérez-Aróstegu Uversty of Graada Facultad de Cecas Ecoócas y Epresarales Graada, pa
Projection model for Computer Network Security Evaluation with interval-valued intuitionistic fuzzy information. Qingxiang Li
Iteratoal Joural of Scece Vol No7 05 ISSN: 83-4890 Proecto model for Computer Network Securty Evaluato wth terval-valued tutostc fuzzy formato Qgxag L School of Software Egeerg Chogqg Uversty of rts ad
