A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

Size: px
Start display at page:

Download "A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks"

Transcription

1 A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract In a scenaro where network bandwdth and traffc are contnuously growng, network applances that have to montor and analyze all flowng packets are reachng ther lmts. These ssues are crtcal especally for Network Intruson Detecton Systems (NIDS) that need to trace and reassemble every connecton, and to examne every packet flowng on the montored lnk(s), to guarantee hgh securty levels. Any NIDS based on a sngle component cannot scale over certan thresholds, even f t has some parts bult n hardware. Hence, parallel archtectures appear as the most valuable alternatve for the future. In ths paper, we propose a parallel NIDS archtecture that s able to provde us wth fully relable analyss, hgh performance and scalablty. These propertes come together wth the low costs and hgh flexblty that are guaranteed by a total software mplementaton. The load balancng mechansm of the proposed NIDS dstrbutes the traffc among a confgurable number of parallel sensors, so that each of them s reached by a manageable amount of traffc. The parallelsm and traffc dstrbuton do not alter the results of the traffc analyss that remans relable and stateful. I. INTRODUCTION Network Intruson Detecton Systems (NIDS) are becomng a valuable element n a modern network nfrastructure for guaranteeng the securty of complex nformaton systems. A NIDS s used to nspect network traffc wth the goal of lookng for evdences of llct actvtes and malcous network packets. To control all the traffc flowng through a network, a NIDS has to perform a stateful analyss on each packet. Ths requres a NIDS to track and reassemble each dstnct connecton. (For example, n a LAN, a NIDS has to get and analyze every Ethernet frame.) The throughput of the montored traffc and the number of concurrent connectons affect the amount of memory and computatonal power that are requred by each NIDS. Varous trends are affectng the capacty of present NIDS applances and ther possblty of beng appled to the most modern network nfrastructures. The ncreasng number of connected devces, the augment of lnk capactes, and the dffuson of network-related applcatons and servces are causng a contnuous growth of traffc flowng through wde and even local area networks. As a consequence, traffc generated n large network nstallatons may easly overwhelm the memory and power capacty of a typcal NIDS. For example, a NIDS mplemented through standard hardware can barely deal wth 100 Mbps traffc [1], even through specal confguratons (e.g., fast loggng n bnary format) [2]. The most common solutons to acheve hgh performance NIDS are beng drected towards custom hardware components, that are specfcally desgned for ntruson detecton on hgh speed lnks. Some valuable results are descrbed n Secton II. On the other hand, we thnk that custom hardware does not represent a long-term soluton for scalablty ssue. These hardware orented solutons only push further the maxmum manageable throughput, but they wll be overwhelmed by the traffc volumes of the near future (10 Gbt Ethernet technologes are behnd the corner). Moreover, they are characterzed by hgh costs and low flexblty that are typcal of hardware-based solutons. In ths paper, we propose an nnovatve parallel NIDS archtecture that acheves hgh performance by combnng conventonal sensors n parallel, wth no need of ad hoc hardware components. We thnk that parallel archtectures are the most valuable alternatve for guaranteeng scalablty and large dffuson of NIDS even to face future hgh capacty networks. We demonstrate that the proposed NIDS can effectvely scale and deal wth ncreasng traffc volumes thanks to a fne-gran traffc dstrbuton algorthm and an nnovatve load balancng technque, that dynamcally dspatches ncomng traffc to the avalable sensors. Ths archtecture allows the NIDS to nspect hgh speed lnks wth no packet loss and no negatve mpact on the accuracy of the traffc analyss, that reman relable and stateful. The rest of ths paper s organzed as followng. Secton II compares our proposal aganst other works n the feld of hgh speed NIDS. Secton III analyzes the detals of the parallel NIDS archtecture. Secton IV descrbes the confguraton rules that may be used to guarantee the effcacy of the proposed archtecture. Secton V presents expermental results acheved by a prototype mplementaton of the proposed NIDS. Fnally, Secton VI outlnes man conclusons and results of ths paper. II. RELATED WORK The most common solutons to acheve hgh performance NIDS rely on hardware-based components. For example, Applcaton Specfc Integrated Crcuts (ASIC) applances can nspect hgh traffc throughput [3], [4], but they do not represent an exhaustve soluton to scalablty. Moreover, ASIC applances are characterzed by hgh costs and low flexblty. Smlar problems affect others hardware-based archtectures, such as FPGA [5] [7] and Network Processors (NP) [8], [9].

2 It s mportant to observe that the parallel NIDS archtecture proposed n ths paper should not be confused wth dstrbuted NIDS archtectures that have been extensvely studed n lterature [10] [13], and can be mplemented through commercal or open source software [14] [16]. A dstrbuted NIDS archtecture s composed by sensors deployed at dfferent places of a network. Ther typcal scenaro s represented by a large network consstng of small nterconnected subnets where a dstrbuted NIDS archtecture deploys a sensor n each subnet. These sensors may be connected to a central manager that concentrates and correlates sensors alerts. On the other hand, a parallel NIDS archtecture may be thought as a sngle, logcal NIDS sensor, composed by a traffc dstrbuton devce that s connected to conventonal sensors that operate n parallel, each analyzng only a subset of the traffc on the same lnk. To the best of our knowledge, there are not many other parallel NIDS archtectures. The frst parallel mplementaton of a NIDS descrbed n [17] s characterzed by some drawbacks n the traffc dspatchng algorthm, that s able to classfy packets just on the IP address bass. Ths s a man lmt n many network confguratons, especally f we consder that Network Address Translaton (NAT) mechansms hde entre computer networks behnd a sngle IP address [18]. Hence, even the traffc flowng between two IP addresses may be too much for the capacty of a sngle NIDS sensor, wth the possblty of system bottlenecks and lmts to the archtecture scalablty. On the other hand, the proposed system acheves an effectve, fne-gran traffc sharng between ts NIDS sensors. Moreover, the traffc dspatchng algorthm of the archtecture n [17] does not adapt to the current traffc pattern because the traffc dstrbuton depends on a set of statc rules that assgn dfferent traffc flows to dfferent sensors. The problem s that traffc composton may change rapdly, thus overloadng some sensors wth sgnfcant packet loss and leavng other sensors almost unused. The proposed system addresses even ths ssue. The other nterestng parallel archtecture presented n [19] s characterzed by a custom hardware load balancer that feeds conventonal NIDS sensors. To ensure that every packet belongng to a certan flow s analyzed by the same sensor, the hardware load balancer calculates a set of hashng functons on dfferent felds of the packet. The destnaton NIDS sensor s selected on the bass of the resultng hashes. However, although the balancer may dynamcally adapt to the traffc dspatchng rules, the redrecton of already establshed connectons to a dfferent sensor makes t mpossble to perform a stateful analyss. A seralzaton of the nternal NIDS state was proposed n [20]. Ths s an mportant contrbuton because a seralzed representaton can be propagated to other NIDS sensors to acheve better coordnaton n dstrbuted NIDS archtectures. However, ths paper does not consder state seralzaton as a mean to provde stateful and dynamc load balancng of establshed connectons among dfferent NIDS sensors. The proposed parallel NIDS archtecture dfferentates from all the prevous proposals. It s a total software based soluton where every element s bult wth standard hardware, whch s flexble and nexpensve. The dspatchng algorthm s able to classfy network packets on the bass of many features, such as protocols, IP addresses, and port numbers. Ths mechansm allows the NIDS to acheve an effectve load sharng among multple NIDS sensors. Another nnovatve feature s represented by the ntroducton of a load balancng mechansm that can dynamcally reassgn an already establshed connecton to an arbtrary sensor. Moreover, ths algorthm allows sensors to perform a stateful, n-depth traffc analyss, that guarantee maxmum detecton accuracy together wth load balancng propertes. III. PARALLEL NIDS ARCHITECTURE The proposed archtecture for traffc dstrbuton and analyss conssts of varous components that are descrbed n Fgure 1. The traffc source s nstalled on the hgh-speed montored lnk. Its purpose s to provde the scatterer wth a copy of the traffc that must be nspected. A sutable traffc source may be mplemented by mean of a network tap, a swtch wth SPAN port or a hub. The preference for a network tap nstead of a hub or a swtch s motvated by ts hgher throughput and avalablty. The traffc source feeds a scatterer that, n our mplementaton, captures every Ethernet frame and sends the frame to one of the drectly connected slcers. The scatterer s the only centralzed element, and has to manage traffc at the same throughput of the network lnk. Archtecture scalablty s lmted by the number of slcers that the scatterer s able to handle. In order to keep the computatonal cost reasonably low, scatterng operatons must be as smple as possble. Here, the presented results are based on a smple roundrobn dspatchng polcy, because the comparson of dfferent algorthms s out the scope of ths paper. Fg. 1. Parallel NIDS archtecture

3 The slcers capture every frame from the nput nterface and have to determne the destnaton NIDS sensor of each of them. That operaton cannot be executed by the scatterer, because n our mplementaton the destnaton sensor s selected on the bass of a frame analyss, that s a qute complex operaton. Indeed, each slcer mplements a set of slcng rules, that are used to classfy every receved Ethernet frame. In partcular, our mplementaton of the slcer makes t possble to select the destnaton sensor on the bass of varous features, such as protocols, IP addresses and port numbers. Slcng rules need to be carefully desgned, so to route every frame towards the NIDS that may need t to detect an attack (see Secton IV). Ths s one of the most crtcal task because we want to perform a stateful traffc analyss. Hence, we must guarantee that every frame belongng to the same transport level connecton s routed to the same NIDS sensor. Once appled the slcng rules to determne the destnaton sensor, a slcer wrtes a logcal ndcator of the selected sensor n the MAC destnaton address feld of the Ethernet header. It s also possble that a sngle Ethernet frame has to be sent towards two or more sensors. In those nstances, the slcer creates a copy of the frame for each destnaton sensor, and apples a dfferent ndcator to each copy. After the slcer layer, the frames are sent to the swtch that s used to enforce routng decsons that have been prevously taken by slcers. Every frame comng from one of the swtch nput nterfaces s routed to the sensor ndcated by the value wrtten n the MAC destnaton address of the Ethernet frame header. If the swtch s programmable (that s, f the swtch s provded wth a statc routng table), then sensor ndcators used by the slcers may be unrelated to the real hardware addresses of the sensors nput nterfaces. On the other hand, f the swtch s not programmable, then each sensor ndcator s gven by the MAC address owned by the nput nterface of the correspondng sensor. The next layer of the archtecture conssts of a set of NIDS sensors. In our proposal, NIDS sensors are mplemented through a custom verson of Snort IDS [15], that allows the mgraton of state nformaton related to currently analyzed connectons. Ths new feature makes t possble to redrect an already opened connecton to a dfferent NIDS sensor wthout alterng the results of the traffc analyss. The last element s the coordnator, whch s drectly connected to all slcers and sensors. The coordnator s used to run the load balancng algorthm, and t s mportant to notce that t does not lmt the scalablty of the archtecture. Indeed, t only montors the load of sensors and enforces actons possbly trggered by the load balancng algorthm, lke changes n slcng rules and mgraton of connecton states. NIDS sensors are drectly connected to the swtch, and receves only a subset of the traffc flowng through the montored lnk. That subset of traffc ncludes every necessary frame to carry out a stateful traffc analyss so that the proposed archtecture can safely dstrbute network traffc analyss. Due to the parallel nature of the proposed archtecture, network packets belongng to the same transport level connecton may reach the NIDS sensor n a wrong order. As an example, ths could be due to the use of slcers wth dfferent computatonal power. However, Snort pre-processors are able to restore the correct order of the network packets. Hence, traffc flow reorderng can be carred out by the NIDS sensors, wthout the use of specfc network components. Expermental results that demonstrate scalablty and effcacy of the proposed archtecture are reported n Secton V-A. IV. CONFIGURATION OF THE PARALLEL ARCHITECTURE A parallel NIDS archtecture s a complex nfrastructure that must be carefully confgured. To ths purpose, we need to know (at least approxmately) some mportant characterstcs about the ncomng traffc, such as maxmum throughput and most common protocols. That nformaton allow us to desgn and mplement the set of slcng rules, whch have a great mpact on the overall effcacy of the archtecture. In our verson, a well desgned set of slcng rules has to satsfy the followng man propertes. 1) Packets belongng to the same connecton have to be routed towards the same NIDS sensor. Ths s necessary to trace and reassemble all connectons, as requred by the stateful traffc analyss characterzng the proposed archtecture. 2) Network traffc should be equally dstrbuted among the avalable NIDS sensors. Ths allows the archtecture to acheve good load balancng propertes. Both requrements can be satsfed even through a well desgned set of slcng rules. Whle t s rather smple to wrte slcng rules that preserve transport level connectons, achevng a reasonable load balancng among NIDS sensors s a non-trval task. A. Load Balancng In statc archtectures, such as [17], the set of slcng rule s desgned on the bass of a quanttatve analyss of traffc samples, so that every relevant change n traffc pattern can lead to load unbalance and consequent rsks of packet losses. On the other hand, the proposed parallel archtecture can acheve load balancng by dynamcally adaptng slcng rules and NIDS sensors to the current NIDS sensors load. We have deployed a novel mechansm that allows the parallel NIDS to dynamcally move an open connecton to a dfferent sensor wthout alterng the results of the traffc analyss. To ths purpose, the sensors are mplemented by addng two new features to the orgnal verson of Snort: the frst feature exports state nformaton related to analyzed connecton and to store them n fles; the second reads state nformaton stored n fles generated by other nstances of Snort, thus creatng the correct state for a connecton that has not been yet analyzed. To move a connecton to a dfferent sensor, we have frst to export ts state from the sensor that prevously handled that connecton, and then we have to move fles contanng state nformaton to the new sensor. Fnally, the new sensor can read a fle and mport state nformaton for the moved connecton.

4 Both export and mport operatons can be trggered at run-tme by smply sendng the proper sgnals to a runnng nstance of our Snort verson. Fgures 2, 3 and 4 descrbe an example of the problems related to load balancng for NIDS sensors and the steps of the proposed soluton. In Fgure 2 we have two NIDS sensors that perform a stateful, n-depth analyss on ncomng traffc. We assume that the sensor NIDS 1 analyzes the network connecton Connecton 1, and State 1 represents the state nformaton related to that connecton. The sensor NIDS 2 analyzes two network connectons (Connecton 2 and Connecton 3) that have state nformaton stored n State 2 and State 3, respectvely. Let us suppose that sensor NIDS 2 gets overloaded, and that the load balancng algorthm reacts by movng Connecton 2 from NIDS 2 to NIDS 1. Fgure 3 shows the effects of the load balancng acton through tradtonal NIDS sensors: NIDS 1 pcks Connecton 2 mdstream, but t s unable to create a consstent state and to perform a stateful analyss on that connecton. Instead, our soluton s shown n Fgure 4 showng how t s possble to mgrate the state of Connecton 2 to NIDS 1, thus allowng our system to perform a relable and stateful analyss. on the last part of the connecton. Ths mechansm allows for a dynamc traffc redstrbuton between NIDS sensors wthout alterng the analyss results. Moreover, t s mportant to observe that ths mechansm can work wth any load balancng polcy. B. Dmensonal bndngs An mportant step for the confguraton of the parallel archtecture for NIDS s to carry out a dmensonal bndng for each component. For ths analyss, we use the notatons n Table I. Symbol B Lnk IN B NIC IN N NIC OUT B NIC OUT S IN W IN W T MAX TABLE I CONSTRAINTS OF THE ARCHITECTURE COMPONENTS Meanng Throughput of ncomng traffc Hghest bandwdth of the scatterer nput nterface Number of slcers Bandwdth of the scatterer -th output nterface Hghest bandwdth manageable by the -th slcer Bandwdth of the -th slcer output nterface Bandwdth of the -th nput nterface of the swtch Hghest aggregate throughput of the swtch W OUT I MAX Bandwdth of the -th output nterface of the swtch Hghest throughput manageable by the -th NIDS sensor Fg. 2. Intal stuaton To get a well dmensoned archtecture, where no component s overwhelmed by the ncomng traffc, we have to satsfy the followng condtons: B NIC IN B Lnk IN Fg. 3. Fg. 4. Connecton reassgnment wthout state mgraton Connecton reassgnment wth state mgraton Thanks to our novel technque, the NIDS recevng an already opened connecton, that was prevously analyzed by an overloaded sensor, s able to perform a stateful nspecton The bandwdth manageable by the scatterer nput nterface has to be bgger than the bandwdth of the traffc that we want to nspect. m 1 =0 B NIC OUT B Lnk IN The aggregate output bandwdth of the scatterer has to be bgger than the bandwdth of the traffc that we want to nspect. S IN B NIC OUT, The computatonal capacty of the slcer connected to the - th scatterer output nterface has to be large enough to manage all the traffc generated by that nterface. W IN S OUT, The bandwdth of every nput nterface of the swtch has to be bgger than the traffc produced by the drectly connected

5 slcer. W T MAX m 1 =0 The aggregate throughput of the swtch has to be bgger than the sum of the traffc volumes generated by the slcers. I MAX W OUT, The hghest bandwdth that the -th NIDS sensor s able to manage has to be bgger than the throughput generated by the -th output nterface of the swtch. Dependng on the slcng rules, a sngle frame can be requred by two or more sensors. In that nstance, we have to create a copy of the frame for every sensor that requres t, hence the number of frames generated by the slcers can be bgger than the number of frames captured by the scatterer. We can state that B NIC OUT, Hence, the number of frames to be analyzed by NIDS sensors s equal or greater than the number of frames flowng through the montored lnk. If we consder that slcers share the same confguraton rules, and slcers have the same probablty to receve a frame that s requred by more sensors, then we can state that The constant k s gven by k = = B NIC OUT T 1 t=0 N(f t) T k where T represents the number of frames receved by the -th slcer, and the functon N(f t ) denotes the number of copes of the t-th frame produced by the -th slcer. We can verfy that k 1, and S IN = k = 1 N(f t ) = 1 t The mportant consequence of ths analyss s that the parallel archtecture proposed n ths paper may acheve an ncrement n the volume of traffc to be analyzed by NIDS sensors. Frame duplcaton can be kept reasonably low (eventually nullfed) thanks to a careful desgn of the slcng rules and event space dstrbuton. V. EXPERIMENTAL RESULTS In ths secton we descrbe the most mportant expermental results that am to valdate the functonal propertes of the parallel archtecture, to demonstrate ts scalablty and to prove the feasblty of the load balancng mechansm. The prototype archtecture has been mplemented n C language for GNU/Lnux platforms. A. Archtecture valdaton For the tests we have confgured a vrtual network, where vrtual hosts have been mplemented through User Mode Lnux [21], and vrtual Ethernet lnks through OpenVPN [22]. Vrtual networks allow us to test the effcacy of the archtecture for an arbtrary number of slcers, reassemblers and NIDS sensors, and lmted usage of hardware. The prototype archtecture conssts of three slcers, and three NIDS sensors. Traffc source actvty s emulated through Tcpreplay [23], that replays the IDEVAL [24] [26] traffc towards the nput nterface of the scatterer at a confgurable rate. Each NIDS has been mplemented through the open source software Snort [15]. Many dfferent confguratons have been tested, and for space lmt reasons, here we report the results referrng to one sgnfcant example, where slcers mplement a smple set of slcng rules. The frst rule routes to the sensor 1 every TCP packet comng from or, drected to, port 80. The second rule routes to the sensor 2 every TCP packet comng from, or drected to, port 23. The thrd rule routes to the sensor 3 every packet that has not been routed to sensors 1 or 2. From ths test, we have that the frst NIDS (connected to the frst sensor) analyzes frames and generates 495 alerts, the second NIDS analyzes frames and generates 22 alerts, and the thrd NIDS analyzes frames and generates 2686 alerts. The results are summarzed n Table II. Despte of the smplcty of the slcer rules, we can observe that the traffc s really well dstrbuted among the three NIDS sensors. Load sharng s an mportant property, but we also need to guarantee that the dstrbuton of the traffc analyzes among dfferent components does not affect the stateful analyss propertes. To ths purpose, we collect relable data traffc by usng just one Snort sensor that s confgured wth the same rules that were used for the prevous experment. From ths system, we obtaned a total of 3203 alerts that correspond perfectly to the sum of the alerts obtaned by three sensors reported n Table II. TABLE II VALIDATION OF THE ARCHITECTURE NIDS 1 NIDS 2 NIDS 3 Total Packets Alerts Ths mportant result proves that the proposed archtecture allows us to dstrbute the computatonal costs of traffc analyss wthout alterng the results. B. Scalablty of components and system To verfy the scalablty of the entre archtecture, we carry out several experments for dfferent number of sensors. In each test we measure the hghest network traffc that we are able to analyze correctly, that s, wthout sgnfcant (greater

6 than 1%) packet loss n NIDS sensors. For the parallel archtecture, we use common PC hardware that was connected as n the scheme of Fgure 1. Generated traffc reproduces IDEVAL traffc that s transmtted through Tcpreplay and flows through a Ggabt Ethernet. The results are shown n Fgure 5, where the X-axs denotes the number of sensors, and the Y-axs the hghest analyzed throughput. Analyzed Traffc [Mbt/s] Fg. 5. Number of NIDS sensors Scalablty of the parallel NIDS archtecture From ths fgure, t s mmedate to observe that the capacty of analyss grows almost lnearly for ncreasng numbers of sensors, thus demonstratng the scalablty propertes of the proposed archtecture. C. Load Balancng Another nnovaton of the proposed archtecture s represented by ts ablty of dynamcally mgratng the states of analyzed connectons between dfferent sensors. Ths feature can be used to acheve load balancng among NIDS sensors, thus ncreasng the scalablty and the overall effectveness of the parallel NIDS archtecture, although t s mandatory not to alter the analyss results. To demonstrate the feasblty of our proposal, we confgure a smple parallel NIDS archtecture, wth two slcers and two NIDS sensors, to analyze the IDEVAL network traffc njected n the scatterer by Tcpreplay. In Fgure 6, we can see the amount of traffc analyzed by each sensor. The Y-axs reports the throughput analyzed by the sensors n Mbt per second, whle the X-axs represents the tme of the experment (n second). We can see that durng the frst 100 seconds both the sensors have to analyze a manageable amount of traffc (always less than 35 Mbt/s). Ths result ndcates that slcng rules acheve an acceptable load sharng between the two sensors. Around 100 second, the traffc pattern changes, and the traffc analyzed by sensor 1 suddenly ncreases, whle the traffc analyzed by sensor 2 remans almost constant. Fgure 6 hghlghts the consequences of a change n network traffc pattern. To address ths load unbalance, wthout tamperng the stateful nspecton carred out by NIDS sensors, we use our load balancng mechansm that allows the mgraton of state nformaton. The desgn of the best load balancng algorthm for a parallel NIDS archtecture s beyond the scope of ths work. Hence, for the purposes of ths paper, we used a smple algorthm based on two thresholds and round-robn dstrbuton. A sensor s consdered overloaded, f t has to analyze over 40 Mbt/s of traffc for more than 5 seconds (on threshold). In ths nstance, the load balancng algorthm assgns slces of traffc from the overloaded NIDS sensor to the other (not overloaded) sensors n a round-robn way. Meanwhle, state nformaton related to the reassgned slces of traffc are moved to the new NIDS sensor. Analyzed Traffc [Mbt/s] Analyzed Traffc [Mbt/s] Sensor 1 Sensor Fg Tme [s] Throughput for sensors 1 and 2 wthout load balancng 10 Sensor 1 Sensor Fg. 7. Tme [s] Throughput for sensors 1 and 2 wth load balancng The results of ths smple load balancng algorthm are presented n Fgure 7. Network traffc and ntal confguraton of the parallel NIDS archtecture are dentcal to the scenaro represented n Fgure 6 for the frst 100 seconds. At ths pont, the ncrement of traffc to the sensor 1 trggers the load balancng algorthm. It moves some packets to the sensor 2 untl the traffc of the sensor 1 goes below the second

7 threshold equal to 30 Mbt/s (off threshold). The success of the mechansm s clearly demonstrated by the second part of the experment after 100 seconds n Fgure 7. VI. CONCLUSIONS Network Intruson Detecton Systems have to perform a complete analyss of the traffc flowng through networks that can easly reach Gbps capactes. We should also consder that a fully relable analyss requres the NIDS to track and reassemble each dstnct connecton. Hence, the throughput of montored traffc and the number of concurrently open connectons may represent a lmt to the applcablty of NIDS to the modern and future networks. Any NIDS based on a sngle component cannot scale over certan thresholds, even f t has some parts bult n hardware. Hence, parallel archtectures appear as the most valuable alternatve for achevng a scalable NIDS. In ths paper, we propose a parallel archtecture of a NIDS that guarantees stateful analyss, load balancng and hgh scalablty. The proposed archtecture represents a sgnfcant mprovement wth respect to prevous works. We demonstrate that there s no theoretcal lmt to ncrease the number of the parallel archtecture components. These performance propertes come together wth low costs and hgh flexblty that s guaranteed by a total software mplementaton. Future work s drected to propose and compare dfferent load balancng algorthms that may be ntegrated n the proposed system. REFERENCES [1] L. Schaelcke, T. Slabach, B. Moore, and C. Freeland, Characterzng the performance of network ntruson detecton sensors, n Proceedngs of the Sxth Internatonal Symposum on Recent Advances n Intruson Detecton (RAID 2003), ser. Lecture Notes n Computer Scence. Berln Hedelberg New York: Sprnger-Verlag, September [2] M. Roesch, Snort - lghtweght ntruson detecton for networks, n LISA 99: Proceedngs of the 13th USENIX conference on System admnstraton. Berkeley, CA, USA: USENIX Assocaton, 1999, pp [3] Top layer networks. [Onlne]. Avalable: net [4] Junper networks. [Onlne]. Avalable: [5] H. Song, T. Sproull, M. Attg, and J. Lockwood, Snort offloader: A reconfgurable hardware NIDS flter, n 15th Internatonal Conference on Feld Programmable Logc and Applcatons (FPL), Tampere, Fnland, Aug [6] H. Song and J. W. Lockwood, Effcent packet classfcaton for network ntruson detecton usng fpga, n FPGA 05: Proceedngs of the 2005 ACM/SIGDA 13th nternatonal symposum on Feld-programmable gate arrays. New York, NY, USA: ACM Press, 2005, pp [7] L. Bu and J. A. Chandy, Fpga based network ntruson detecton usng content addressable memores, fccm, vol. 00, pp , [8] C. R. Clark, W. Lee, D. E. Schmmel, D. Conts, M. Kon, and A. Thomas, A hardware platform for network ntruson detecton and preventon, n Workshop on Network Processors and Applcatons at HPCA (NP-3), Madrd, Span, 2004, pp [9] K. Xnds, K. G. Anagnostaks, and E. P. Markatos, Desgn and mplementaton of a hgh-performance network ntruson preventon system. n SEC, 2005, pp [10] S. R. Snapp, J. Brentano, G. V. Das, T. L. Goan, L. T. Heberlen, C.- L. Ho, K. N. Levtt, B. Mukherjee, S. E. Smaha, T. Grance, D. M. Teal, and D. Mansur, Dds (dstrbuted ntruson detecton system) motvaton, archtecture, and an early prototype, Internet beseged: counterng cyberspace scofflaws, pp , [11] S. Snapp, J. Brentano, G. Das, T. Goan, L. Heberlen, C. Ho, K. Levtt, B. Mukherjee, (wth T. Grance D.L. Mansur, K. Pon, and S. Smaha), A system for dstrbuted ntruson detecton, n COMPCON, San Francsco, CA, 1991, pp [12] P. K. Varshney, Dstrbuted Detecton and Data Fuson. Secaucus, NJ, USA: Sprnger-Verlag New York, Inc., [13] D. Burroughs, L. Wlson, and G. Cybenko, Analyss of dstrbuted ntruson detecton systems usng bayesan methods, n IEEE Internatonal Performance Computng and Communcaton Conference, [14] Prelude home page. [Onlne]. Avalable: [15] Snort home page. [Onlne]. Avalable: [16] A. Orebaugh, S. Bles, and J. Babbn, Snort cookbook. O relly, [17] C. Kruegel, F. Valeur, G. Vgna, and R. Kemmerer, Stateful ntruson detecton for hgh-speed networks, n Proceedngs of the IEEE Symposum on Research on Securty and Prvacy. Oakland, CA: IEEE Press, May [18] Y. Janyng, Z. Jantao, W. Pe, and T. Wang, An applcaton of network address translaton on gateway, n Proceedngs of the 2003 Internatonal Conference on Neural Networks and Sgnal Processng, 2003, pp [19] L. Schaelcke, K. Wheeler, and C. Freeland, Spands: a scalable network ntruson detecton loadbalancer, n CF 05: Proceedngs of the 2nd conference on Computng fronters. New York, NY, USA: ACM Press, 2005, pp [20] R. Sommer and V. Paxson, Explotng ndependent state for network ntruson detecton, n ACSAC 05: Proceedngs of the 21st Annual Computer Securty Applcatons Conference. Washngton, DC, USA: IEEE Computer Socety, 2005, pp [21] U. M. L. C. Team, User mode lnux howto. [Onlne]. Avalable: [22] Openvpn home page. [Onlne]. Avalable: [23] Tcpreplay home page. [Onlne]. Avalable: sourceforge.net [24] R. Lppmann, J. W. Hanes, D. J. Fred, J. Korba, and K. Das, Analyss and results of the 1999 darpa off-lne ntruson detecton evaluaton, n RAID 00: Proceedngs of the Thrd Internatonal Workshop on Recent Advances n Intruson Detecton. London, UK: Sprnger-Verlag, 2000, pp [25] J. M. Hugh, Testng ntruson detecton systems: a crtque of the 1998 and 1999 darpa ntruson detecton system evaluatons as performed by lncoln laboratory, ACM Trans. Inf. Syst. Secur., vol. 3, no. 4, pp , [26] M. V. Mahoney and P. K. Chan, An analyss of the 1999 darpa/lncoln laboratory evaluaton data for network anomaly detecton. n RAID, 2003, pp

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines

DBA-VM: Dynamic Bandwidth Allocator for Virtual Machines DBA-VM: Dynamc Bandwdth Allocator for Vrtual Machnes Ahmed Amamou, Manel Bourguba, Kamel Haddadou and Guy Pujolle LIP6, Perre & Mare Cure Unversty, 4 Place Jusseu 755 Pars, France Gand SAS, 65 Boulevard

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

A Dynamic Energy-Efficiency Mechanism for Data Center Networks

A Dynamic Energy-Efficiency Mechanism for Data Center Networks A Dynamc Energy-Effcency Mechansm for Data Center Networks Sun Lang, Zhang Jnfang, Huang Daochao, Yang Dong, Qn Yajuan A Dynamc Energy-Effcency Mechansm for Data Center Networks 1 Sun Lang, 1 Zhang Jnfang,

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression

A Novel Methodology of Working Capital Management for Large. Public Constructions by Using Fuzzy S-curve Regression Novel Methodology of Workng Captal Management for Large Publc Constructons by Usng Fuzzy S-curve Regresson Cheng-Wu Chen, Morrs H. L. Wang and Tng-Ya Hseh Department of Cvl Engneerng, Natonal Central Unversty,

More information

Scalability of a Mobile Cloud Management System

Scalability of a Mobile Cloud Management System Scalablty of a Moble Cloud Management System Roberto Bfulco Unversty of Napol Federco II roberto.bfulco2@unna.t Marcus Brunner NEC Laboratores Europe brunner@neclab.eu Peer Hasselmeyer NEC Laboratores

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Damage detection in composite laminates using coin-tap method

Damage detection in composite laminates using coin-tap method Damage detecton n composte lamnates usng con-tap method S.J. Km Korea Aerospace Research Insttute, 45 Eoeun-Dong, Youseong-Gu, 35-333 Daejeon, Republc of Korea yaeln@kar.re.kr 45 The con-tap test has the

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to reprnts@benthamscence.ae The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING

FORMAL ANALYSIS FOR REAL-TIME SCHEDULING FORMAL ANALYSIS FOR REAL-TIME SCHEDULING Bruno Dutertre and Vctora Stavrdou, SRI Internatonal, Menlo Park, CA Introducton In modern avoncs archtectures, applcaton software ncreasngly reles on servces provded

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna taposh_kuet20@yahoo.comcsedchan@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Network traffic analysis optimization for signature-based intrusion detection systems

Network traffic analysis optimization for signature-based intrusion detection systems Network traffc analyss optmzaton for sgnature-based ntruson detecton systems Dmtry S. Kazachkn, Student, Computatonal systems lab at CMC MSU, Denns Y. Gamayunov, scentfc advsor, PhD, Computatonal systems

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks

A Resource-trading Mechanism for Efficient Distribution of Large-volume Contents on Peer-to-Peer Networks A Resource-tradng Mechansm for Effcent Dstrbuton of Large-volume Contents on Peer-to-Peer Networks SmonG.M.Koo,C.S.GeorgeLee, Karthk Kannan School of Electrcal and Computer Engneerng Krannet School of

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

Dynamic Fleet Management for Cybercars

Dynamic Fleet Management for Cybercars Proceedngs of the IEEE ITSC 2006 2006 IEEE Intellgent Transportaton Systems Conference Toronto, Canada, September 17-20, 2006 TC7.5 Dynamc Fleet Management for Cybercars Fenghu. Wang, Mng. Yang, Ruqng.

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems

A Passive Network Measurement-based Traffic Control Algorithm in Gateway of. P2P Systems roceedngs of the 7th World Congress The Internatonal Federaton of Automatc Control A assve Network Measurement-based Traffc Control Algorthm n Gateway of 2 Systems Ybo Jang, Weje Chen, Janwe Zheng, Wanlang

More information

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment

Genetic Algorithm Based Optimization Model for Reliable Data Storage in Cloud Environment Advanced Scence and Technology Letters, pp.74-79 http://dx.do.org/10.14257/astl.2014.50.12 Genetc Algorthm Based Optmzaton Model for Relable Data Storage n Cloud Envronment Feng Lu 1,2,3, Hatao Wu 1,3,

More information

A Programming Model for the Cloud Platform

A Programming Model for the Cloud Platform Internatonal Journal of Advanced Scence and Technology A Programmng Model for the Cloud Platform Xaodong Lu School of Computer Engneerng and Scence Shangha Unversty, Shangha 200072, Chna luxaodongxht@qq.com

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

Classification of Network Traffic via Packet-Level Hidden Markov Models

Classification of Network Traffic via Packet-Level Hidden Markov Models Classfcaton of Network Traffc va Packet-Level Hdden Markov Models Alberto Danott, Walter de Donato, Antono Pescapè Department of Computer Scence and Systems Unversty of Naples Federco II {alberto, walter.dedonato,

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Complex Service Provisioning in Collaborative Cloud Markets

Complex Service Provisioning in Collaborative Cloud Markets Melane Sebenhaar, Ulrch Lampe, Tm Lehrg, Sebastan Zöller, Stefan Schulte, Ralf Stenmetz: Complex Servce Provsonng n Collaboratve Cloud Markets. In: W. Abramowcz et al. (Eds.): Proceedngs of the 4th European

More information

Energy Conserving Routing in Wireless Ad-hoc Networks

Energy Conserving Routing in Wireless Ad-hoc Networks Energy Conservng Routng n Wreless Ad-hoc Networks Jae-Hwan Chang and Leandros Tassulas Department of Electrcal and Computer Engneerng & Insttute for Systems Research Unversty of Maryland at College ark

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

Cloud-based Social Application Deployment using Local Processing and Global Distribution

Cloud-based Social Application Deployment using Local Processing and Global Distribution Cloud-based Socal Applcaton Deployment usng Local Processng and Global Dstrbuton Zh Wang *, Baochun L, Lfeng Sun *, and Shqang Yang * * Bejng Key Laboratory of Networked Multmeda Department of Computer

More information

Multi-Source Video Multicast in Peer-to-Peer Networks

Multi-Source Video Multicast in Peer-to-Peer Networks ult-source Vdeo ultcast n Peer-to-Peer Networks Francsco de Asís López-Fuentes*, Eckehard Stenbach Technsche Unverstät ünchen Insttute of Communcaton Networks, eda Technology Group 80333 ünchen, Germany

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks

Energy Efficient Routing in Ad Hoc Disaster Recovery Networks Energy Effcent Routng n Ad Hoc Dsaster Recovery Networks Gl Zussman and Adran Segall Department of Electrcal Engneerng Technon Israel Insttute of Technology Hafa 32000, Israel {glz@tx, segall@ee}.technon.ac.l

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

A New Paradigm for Load Balancing in Wireless Mesh Networks

A New Paradigm for Load Balancing in Wireless Mesh Networks A New Paradgm for Load Balancng n Wreless Mesh Networks Abstract: Obtanng maxmum throughput across a network or a mesh through optmal load balancng s known to be an NP-hard problem. Desgnng effcent load

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Using Elasticity to Improve Inline Data Deduplication Storage Systems

Using Elasticity to Improve Inline Data Deduplication Storage Systems Usng Elastcty to Improve Inlne Data Deduplcaton Storage Systems Yufeng Wang Temple Unversty Phladelpha, PA, USA Y.F.Wang@temple.edu Chu C Tan Temple Unversty Phladelpha, PA, USA cctan@temple.edu Nngfang

More information

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits

Linear Circuits Analysis. Superposition, Thevenin /Norton Equivalent circuits Lnear Crcuts Analyss. Superposton, Theenn /Norton Equalent crcuts So far we hae explored tmendependent (resste) elements that are also lnear. A tmendependent elements s one for whch we can plot an / cure.

More information

Abstract. 1. Introduction

Abstract. 1. Introduction System and Methodology for Usng Moble Phones n Lve Remote Montorng of Physcal Actvtes Hamed Ketabdar and Matt Lyra Qualty and Usablty Lab, Deutsche Telekom Laboratores, TU Berln hamed.ketabdar@telekom.de,

More information

A cooperative connectionist IDS model to identify independent anomalous SNMP situations

A cooperative connectionist IDS model to identify independent anomalous SNMP situations A cooperatve connectonst IDS model to dentfy ndependent anomalous SNMP stuatons Álvaro Herrero, Emlo Corchado, José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos, Span escorchado@ubu.es Abstract

More information

Reliable State Monitoring in Cloud Datacenters

Reliable State Monitoring in Cloud Datacenters Relable State Montorng n Cloud Datacenters Shcong Meng Arun K. Iyengar Isabelle M. Rouvellou Lng Lu Ksung Lee Balaj Palansamy Yuzhe Tang College of Computng, Georga Insttute of Technology, Atlanta, GA

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Figure 1. Time-based operation of AIDP.

Figure 1. Time-based operation of AIDP. Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK a.nadeem@surrey.ac.u ABSTRACT Moble ad-hoc networs (MANETs)

More information

Cloud Auto-Scaling with Deadline and Budget Constraints

Cloud Auto-Scaling with Deadline and Budget Constraints Prelmnary verson. Fnal verson appears In Proceedngs of 11th ACM/IEEE Internatonal Conference on Grd Computng (Grd 21). Oct 25-28, 21. Brussels, Belgum. Cloud Auto-Scalng wth Deadlne and Budget Constrants

More information

Network Services Definition and Deployment in a Differentiated Services Architecture

Network Services Definition and Deployment in a Differentiated Services Architecture etwork Servces Defnton and Deployment n a Dfferentated Servces Archtecture E. kolouzou, S. Manats, P. Sampatakos,. Tsetsekas, I. S. Veners atonal Techncal Unversty of Athens, Department of Electrcal and

More information

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background:

SPEE Recommended Evaluation Practice #6 Definition of Decline Curve Parameters Background: SPEE Recommended Evaluaton Practce #6 efnton of eclne Curve Parameters Background: The producton hstores of ol and gas wells can be analyzed to estmate reserves and future ol and gas producton rates and

More information

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers

Fair Virtual Bandwidth Allocation Model in Virtual Data Centers Far Vrtual Bandwdth Allocaton Model n Vrtual Data Centers Yng Yuan, Cu-rong Wang, Cong Wang School of Informaton Scence and Engneerng ortheastern Unversty Shenyang, Chna School of Computer and Communcaton

More information

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network) Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Improved SVM in Cloud Computing Information Mining

Improved SVM in Cloud Computing Information Mining Internatonal Journal of Grd Dstrbuton Computng Vol.8, No.1 (015), pp.33-40 http://dx.do.org/10.1457/jgdc.015.8.1.04 Improved n Cloud Computng Informaton Mnng Lvshuhong (ZhengDe polytechnc college JangSu

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING

LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING LITERATURE REVIEW: VARIOUS PRIORITY BASED TASK SCHEDULING ALGORITHMS IN CLOUD COMPUTING 1 MS. POOJA.P.VASANI, 2 MR. NISHANT.S. SANGHANI 1 M.Tech. [Software Systems] Student, Patel College of Scence and

More information

Lecture 2: Single Layer Perceptrons Kevin Swingler

Lecture 2: Single Layer Perceptrons Kevin Swingler Lecture 2: Sngle Layer Perceptrons Kevn Sngler kms@cs.str.ac.uk Recap: McCulloch-Ptts Neuron Ths vastly smplfed model of real neurons s also knon as a Threshold Logc Unt: W 2 A Y 3 n W n. A set of synapses

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information