Le Routage Robuste Réactif Une combinaison de techniques d ingénierie de trafic proactives et réactives pour traiter le trafic dynamique de réseau

Size: px
Start display at page:

Download "Le Routage Robuste Réactif Une combinaison de techniques d ingénierie de trafic proactives et réactives pour traiter le trafic dynamique de réseau"

Transcription

1 Le Routage Robuste Réactif Une combinaison de techniques d ingénierie de trafic proactives et réactives pour traiter le trafic dynamique de réseau Pedro Casas et Sandrine Vaton Brest, France, mars 2008 TELECOM Bretagne Département Informatique Universidad de la República Facultad de Ingeniería Uruguay

2 Outline 1 Introduction to the problem 2 A proactive approach: the Robust Routing 3 A reactive approach: Anomaly Detection/Localization 4 A combined approach: the Reactive Robust Routing 5 Conclusions and Perspectives

3 Outline 1 Introduction to the problem 2 A proactive approach: the Robust Routing 3 A reactive approach: Anomaly Detection/Localization 4 A combined approach: the Reactive Robust Routing 5 Conclusions and Perspectives

4 Routing Optimization (RO) in current network scenario Current network scenario: network convergence is a tangible reality heterogeneous services make network traffic uncertain and highly variable new kinds of network anomalies increase this traffic uncertainty

5 Routing Optimization (RO) in current network scenario Current network scenario: network convergence is a tangible reality heterogeneous services make network traffic uncertain and highly variable new kinds of network anomalies increase this traffic uncertainty Routing performance under all possible network situations: expected traffic variations: routing optimization for expected traffic unexpected traffic variations (Anomalies): minimize impact on other QoS services between anomalies detection and resolution

6 Routing Optimization (RO) in current network scenario Current network scenario: network convergence is a tangible reality heterogeneous services make network traffic uncertain and highly variable new kinds of network anomalies increase this traffic uncertainty Routing performance under all possible network situations: expected traffic variations: routing optimization for expected traffic unexpected traffic variations (Anomalies): minimize impact on other QoS services between anomalies detection and resolution Major challenge:...how to optimize routing for an unknown traffic demand?

7 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

8 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

9 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

10 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

11 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

12 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

13 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Spontaneous Services (P2P)

14 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Anomalies Spontaneous Services (P2P)

15 RO in current scenario: a challenging task Sources of Demands Variation Daily Periodic Usage Patterns Unexpected Events Equipment Failures Network Attacks External Routing Changes Flash Crowds Anomalies Spontaneous Services (P2P)

16 Additional source of uncertainty traffic demands are rarely available: direct traffic measurements (e.g. CISCO Netflow) seldom available for every ingress/egress links. direct traffic measurements causes router overloading. measurements are generally conducted at a higher level of aggregation, rendering the traffic process non-observable.

17 Examples of Variations in Real Data Correlated volume changes 8000 Link 47 Link 58 Link 104 Link 126 Link Load (unknown unit) Unidentifiable variations Time (min) (a) Traffic patterns in a large Tier-2 network.

18 How to tackle the problem? Proactive approach: Robust Routing Techniques consider traffic uncertainty within the routing optimization. Sources of Traffic Variation Expected variations and small load changes under normal operation Daily Traffic Patterns Unexpected Events Emerging Challenges External Routing Modifications Flash Crowd Events Equipment Failures Multi Hour Robust Routing Network Attacks (DoS/DDoS) Spontaneous Overlay Services (P2P) Reactive Robust Routing Anomaly Detection and Localization

19 How to tackle the problem? Reactive approach: Anomaly Detection and Localization anomaly detection and localization from simple measurements. parsimonious traffic modeling to overcome the non-observability problem. Sources of Traffic Variation Expected variations and small load changes under normal operation Daily Traffic Patterns Unexpected Events Emerging Challenges External Routing Modifications Flash Crowd Events Equipment Failures Multi Hour Robust Routing Network Attacks (DoS/DDoS) Spontaneous Overlay Services (P2P) Reactive Robust Routing Anomaly Detection and Localization

20 How to tackle the problem? Combined approach: Reactive Robust Routing robust routing for usual network operation. anomaly detection/localization for the unexpected events. robust routing reconfiguration to minimize network congestion. anomalies end detection (automation of the routing process). Sources of Traffic Variation Expected variations and small load changes under normal operation Daily Traffic Patterns Unexpected Events Emerging Challenges External Routing Modifications Flash Crowd Events Equipment Failures Multi Hour Robust Routing Network Attacks (DoS/DDoS) Spontaneous Overlay Services (P2P) Reactive Robust Routing Anomaly Detection and Localization

21 Outline 1 Introduction to the problem 2 A proactive approach: the Robust Routing 3 A reactive approach: Anomaly Detection/Localization 4 A combined approach: the Reactive Robust Routing 5 Conclusions and Perspectives

22 A Proactive Approach The Boy Scout motto:

23 A Proactive Approach The Boy Scout motto: Be Prepared!!! Stable Robust Routing robust Traffic Engineering techniques. consider traffic uncertainty in advance (robustness).

24 The Stable Robust Routing (SRR) Problem formulation Consider the following network scenario: Network topology: n nodes. L = {1,..., r} links with capacities in C = (c 1, c 2,...,c r ). N = {OD 1,.., OD m=n(n 1) } Origin-Destination traffic flows. Routing matrix R = {r l,k;l=1..r,k=1..m }, 0 r l,k 1. P(k) = {set of paths p for OD k }, k = 1..m. Traffic OD flows d = {d i,j;i,j=1..n }; d = {d k, k=1..m } Links traffic (aggregated ODs traffic) y = {y l, l=1..r } y(t) = R d(t) t.

25 The Stable Robust Routing Multipath Routing Optimization Given d, C, R and P(k), RO seeks to optimally balance d in P(k) to minimize some performance criterion:

26 The Stable Robust Routing Multipath Routing Optimization Given d, C, R and P(k), RO seeks to optimally balance d in P(k) to minimize some performance criterion: u max (C, d, R) = max l {1...r} k r l,k d k c l y = max l l {1...r} c l

27 The Stable Robust Routing Multipath Routing Optimization Given d, C, R and P(k), RO seeks to optimally balance d in P(k) to minimize some performance criterion: u max (C, d, R) = max l {1...r} k r l,k d k c l y = max l l {1...r} c l xp k, 0 xp k 1, fraction of d k in p P(k) xl k, 0 xl k 1, fraction of d k in l p

28 The Stable Robust Routing Multipath Routing Optimization Given d, C, R and P(k), RO seeks to optimally balance d in P(k) to minimize some performance criterion: u max (C, d, R) = max l {1...r} k r l,k d k c l y = max l l {1...r} c l xp k, 0 xp k 1, fraction of d k in p P(k) xl k, 0 xl k 1, fraction of d k in l p minimize u max subject to: P xp k 1 k N p P(k) P xp k xl k (l, k) (L, N) p P(k), l p P xl k.d k u max c l l L k N xp k, xk l 0 (l, k) (L, N), p P(k) u max 1

29 The Stable Robust Routing Traffic uncertainty set and routing optimization Traffic d is uncertain belongs to a polyhedral uncertainty set D: D = { d R m, R d y max, d 0 } minimize u max subject to: xp k 1 k N p P(k) xp k xl k k N, l L xl k.d k u max c l l L, d D p P(k), l p k N xp k, xl k 0 l L, p P(k), k N u max 1 Solved by a column and constraints generation method [BAK-05]. [BAK-05] W. Ben-Ameur and H. Kerivin, Routing of Uncertain Traffic Demands, Optimization and Engineering, 2005.

30 Trade off in the size of the uncertainty set D D A D B = { d R m, R d y 4:00 18:00 max, d 0 } = { d R m, R d y 18:00 4:00 max, d 0 } Historical Routing Robust Routing B Robust Routing A Maximum Link Utilization :00 7:00 9:00 11:00 13:0015:00 17:00 19:0021:00 23:00 1:00 3:00 Time (hours) Remark: a single stable routing scheme for long-time periods results in sub-optimal performance.

31 The Multi-Hour Robust Routing (MHRR) D t D 1 D 2 β 1 00:00 12:00 time β 2 time 24:00 β 3 Idea: divide the uncertainty set to reduce cost (adapt the set) and consider a SRR configuration for each sub-set.

32 The Multi-Hour Robust Routing (MHRR) D t D 1 D 2 β 1 00:00 12:00 time β 2 time 24:00 β 3 Idea: divide the uncertainty set to reduce cost (adapt the set) and consider a SRR configuration for each sub-set. Partitioning hyperplane α.d = β.

33 The Multi-Hour Robust Routing (MHRR) D t D 1 D 2 β 1 00:00 12:00 time β 2 time 24:00 β 3 Idea: divide the uncertainty set to reduce cost (adapt the set) and consider a SRR configuration for each sub-set. Partitioning hyperplane α.d = β. The optimal division is generally NP-complex.

34 The Multi-Hour Robust Routing (MHRR) D t D 1 D 2 β 1 00:00 12:00 time β 2 time 24:00 β 3 Idea: divide the uncertainty set to reduce cost (adapt the set) and consider a SRR configuration for each sub-set. Partitioning hyperplane α.d = β. The optimal division is generally NP-complex. However, when the direction (α) is known, it can be approximately solved [BA-07]: in our case, we take the time direction [CV-07]. [BA-07] W. Ben-Ameur, Between Fully Dynamic Routing and Robust Stable Routing, DRCN, [CV-07] P. Casas and S. Vaton, An Adaptive Multi-Temporal Approach for Robust Routing, EuroFGI WIPQoS&TC, 2007.

35 Some examples in Abilene Maximum Link Utilization Historical Routing 0.45 Stable Robust Routing A Stable Robust Routing B M H Robust Routing Maximum Link Utilization Historical Routing Stable Robust Routing A Stable Robust Routing B M H Robust Routing :00 23:00 1:00 3:00 5:00 7:00 9:00 11:00 13:00 17:00 19:00 21:00 Time (hours) (a) Expected daily behaviour 0 5:00 7:00 9:00 11:00 13:00 15:00 17:00 19:00 21:00 23:00 1:00 3:00 Time (hours) (b) Anomalous unexpected event Observation: the MHRR outperforms the SRR, but depends on a rough knowledge of the daily uncertainty set (we use it to improve routing for the expected traffic behavior in a robust fashion).

36 Outline 1 Introduction to the problem 2 A proactive approach: the Robust Routing 3 A reactive approach: Anomaly Detection/Localization 4 A combined approach: the Reactive Robust Routing 5 Conclusions and Perspectives

37 Anomaly Detection/Localization The Problem Objectives: detect and localize an abrupt change in traffic demand d(t) from link load measurements y(t) = R d(t). d(t) is seldom available. Conversely, link load measurements are highly spread. Problem: d(t) is non-observable directly from y(t). ill-posed problem r << m.

38 Anomaly Detection/Localization Proposed methodology [FNS-07] Stochastic parsimonious linear model for anomaly-free traffic demand d(t) The anomaly-free is considered as a nuisance parameter. Hypothesis testing to detect/localize an anomaly in the traffic residuals (after removing the modeled traffic) [FNS-07] L. Fillatre, I. Nikiforov and S. Vaton, Détection Localisation Séquentielle d Anomalies Volumiques dans un Réseau, GRETSI, 2007.

39 Anomaly Detection/Localization Stochastic Traffic model The order of increasing anomaly-free OD flows remains constant during long-time periods. The values of the ordered OD flows can be decomposed over a spline-basis with a small number of components. d(t) 1200 λ k(t) k time t (min) Small flows 140 Large flows Medium-size flows Approximation of real OD flows by the spline-based model

40 Anomaly Detection/Localization Stochastic Traffic model Model for the anomaly-free traffic: d(t) = Sµ(t) + ξ(t) ξ(t) is a white Gaussian noise with covariance matrix Σ(t). S = (s 1 s 2... s q ), is a splines basis that describes the traffic spatial distribution. µ(t) = (µ 1 (t)... µ q (t)) T R q, with q << m. the coefficients µ k (t) describe the anomaly-free intensity variations.

41 Anomaly Detection/Localization Stochastic Traffic model Anomaly-free model for y(t): y(t) = Hµ(t) + ζ(t) H = RS R r q, small n o columns easy to retrieve µ(t) from y(t). ζ(t) s covariance is estimated from samples. the anomaly-free traffic is eliminated by projecting y(t) into the null space of H.

42 Anomaly Detection/Localization Detection/localization of volume anomaly at time t 0 as a multiple hypothesis testing: H 0 = {the OD flows are anomaly-free} H j = t 0 =1.. Hj t 0, with H j t 0 = {the j-th OD flow presents an anomalous traffic from an unknown change time t 0 } compute (T,ν), T is the alarm time at which a ν-type change (ν {1, 2,...,m}) is detected and localized.

43 Anomaly Detection/Localization Detection/localization is conducted on the residuals obtained from link load observations, after filtering the anomaly-free traffic. Optimal recursive algorithm with well-established optimality properties in terms of detection delay and false alarm rate [IN-00]. Optimal trade-off between the worst case of the average detection delay (E(T )), the false alarm rate and the false localization probabilities. Multiple recursive detection and decision functions. [IN-00] I. Nikiforov, A Simple Recursive Algorithm for Diagnosis of Abrupt Changes in Random Signals, IEEE Trans. on IT, 2000.

44 Anomaly Detection/Localization Another example in Abilene gt(i, 0) Anomaly begins st(i) Alarm on OD flow 87 Level of alarm Time t (min) Time t (min) (a) Recursive detection functions (b) Decision functions Figure: Typical realizations of decision functions in Abilene.

45 Outline 1 Introduction to the problem 2 A proactive approach: the Robust Routing 3 A reactive approach: Anomaly Detection/Localization 4 A combined approach: the Reactive Robust Routing 5 Conclusions and Perspectives

46 The Reactive Robust Routing Combination of the reactive and the proactive approaches [CFS-08]. MHRR to handle usual-traffic and small changes in traffic demands in a robust and efficient way. Anomaly Detection/Localization algorithm to deal with unexpected events. Exploits the localization ability to compute an adapted SRR after the detection, based on an expansion of the uncertainty set [PLS-08]. Detects the end of the anomaly (if applicable) and takes back the MHRR configuration. [CFV-08] P. Casas, L. Fillatre and S. Vaton, Multi-Hour Robust Routing and Fast Load Change Detection for Traffic Engineering, IEEE ICC, [PLS-08] P. Casas, L. Fillatre and S. Vaton, Robust and Reactive Traffic Engineering for Dynamic Demands, EuroNGI, 2008.

47 Routing reconfiguration y i max + θr i,k y h max + θr h,k D : Before the anomaly D : After the anomaly y j max + θr j,k before the anomaly: D = {R. d y max }

48 Routing reconfiguration y i max + θr i,k y h max + θr h,k D : Before the anomaly D : After the anomaly y j max + θr j,k before the anomaly: D = {R. d y max } { θ = anomaly in OD flow k: d θ.δk = d + θ, δ k = (δ 1,k,.., δ m,k ) T, δ i,k = I i=k

49 Routing reconfiguration y i max + θr i,k y h max + θr h,k D : Before the anomaly D : After the anomaly y j max + θr j,k before the anomaly: D = {R. d y max } { θ = anomaly in OD flow k: d θ.δk = d + θ, δ k = (δ 1,k,.., δ m,k ) T, δ i,k = I i=k after the anomaly: D = {R. d y max + R. θ}

50 Routing reconfiguration y i max + θr i,k y h max + θr h,k D : Before the anomaly D : After the anomaly y j max + θr j,k before the anomaly: D = {R. d y max } { θ = anomaly in OD flow k: d θ.δk = d + θ, δ k = (δ 1,k,.., δ m,k ) T, δ i,k = I i=k after the anomaly: D = {R. d y max + R. θ} robust routing reconfiguration, using D as the uncertainty set (expansion of the uncertainty set).

51 Anomalies end detection The detection algorithm focuses in the abnormal OD flow k after the routing reconfiguration. Two simple hypotheses: H a H b : {the OD flow k is abnormal} : {the OD flow k presents a usual behavior} simple Neyman-Pearson s test (most powerful test for 2 simple hypotheses): (z(t)) = log f 0(z(t)) f k (z(t)) h > 0 H b The decision threshold h is fixed according to the prescribed false alarm probability.

52 Reactive Robust Routing evaluation Multi-Hour Robust Routing, adapted to the expected traffic demand. Anomaly detection/localization in OD flow k = 63 at time t = Robust routing reconfiguration. Detection of the anomaly s end at time t = Return to the MHRR configuration.

53 Reactive Robust Routing evaluation (z(t)) 80 (z(t)), k = k-th anomaly ends 20 Maximum Link Utilization 0.8 HR 0.7 SRR A SRR B MHRR 0.6 RRR replacements Time t (min) (a) Neyman-Pearson Test (z(t)) Time t (min) (b) Performance evaluation

54 Reactive Robust Routing evaluation 0.8 Maximum Link Utilization HR SRR A SRR B MHRR RRR Time t (min) between 20% and 50% of utilization improvement w.r.t. the stable robust routing approach

55 Outline 1 Introduction to the problem 2 A proactive approach: the Robust Routing 3 A reactive approach: Anomaly Detection/Localization 4 A combined approach: the Reactive Robust Routing 5 Conclusions and Perspectives

56 Conclusions of this work Robust TE techniques can not deal by themselves with traffic uncertainty, but they should be used in current traffic scenario. We have shown that reactive and proactive techniques can work together to improve the treatment of large volume anomalies. Decision theory offers powerful and promising techniques for the automation of diagnosis in the field of network anomaly detection (still in the very early stage).

57 Future directions exploit the linear parsimonious traffic model for further studies (d(t) becomes observable, many problems can be solved). use this traffic model for the traffic matrix estimation problem, tracking of traffic demands from simple link measurements, etc. consider other performance criterion for the optimization problem.

58 Thank You for Your Attention!! Remarks & Questions?

Sequential Non-Bayesian Network Traffic Flows Anomaly Detection and Isolation

Sequential Non-Bayesian Network Traffic Flows Anomaly Detection and Isolation Sequential Non-Bayesian Network Traffic Flows Anomaly Detection and Isolation Lionel Fillatre 1, Igor Nikiforov 1, Sandrine Vaton 2, and Pedro Casas 2 1 Institut Charles Delaunay/LM2S, FRE CNRS 2848, Université

More information

QUICKEST MULTIDECISION ABRUPT CHANGE DETECTION WITH SOME APPLICATIONS TO NETWORK MONITORING

QUICKEST MULTIDECISION ABRUPT CHANGE DETECTION WITH SOME APPLICATIONS TO NETWORK MONITORING QUICKEST MULTIDECISION ABRUPT CHANGE DETECTION WITH SOME APPLICATIONS TO NETWORK MONITORING I. Nikiforov Université de Technologie de Troyes, UTT/ICD/LM2S, UMR 6281, CNRS 12, rue Marie Curie, CS 42060

More information

2004 Networks UK Publishers. Reprinted with permission.

2004 Networks UK Publishers. Reprinted with permission. Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET

More information

Robust Routing vs Dynamic Load-Balancing A Comprehensive Study and New Directions

Robust Routing vs Dynamic Load-Balancing A Comprehensive Study and New Directions Robust Routing vs Dynamic Load-Balancing A Comprehensive Study and New Directions Pedro Casas, Federico Larroca, Jean-Louis Rougier and Sandrine Vaton Télécom Bretagne, Brest, France - Email: name.surname@telecom-bretagne.eu

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling

Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot

More information

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources

IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,

More information

Thèse. l École Nationale Supérieure des Télécommunications de Bretagne

Thèse. l École Nationale Supérieure des Télécommunications de Bretagne N o d ordre : 2009telb0111 Thèse présentée à l École Nationale Supérieure des Télécommunications de Bretagne en habilitation conjointe avec l Université de Rennes 1 en cotutelle avec la Universidad de

More information

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot

Mining Anomalies in Network-Wide Flow Data. Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot Mining Anomalies in Network-Wide Flow Data Anukool Lakhina, Ph.D. with Mark Crovella and Christophe Diot SANOG-7, Mumbai, January, 00 Network Anomaly Diagnosis Am I being attacked? Is someone scanning

More information

Network traffic engineering

Network traffic engineering Toolbox, hybrid IP/MPLS optimisation method and fairness Research Unit in Networking EECS Department University of Liège 13 September 005 Outline 1 3 4 5 Outline MPLS principles 1 MPLS principles 3 4 5

More information

A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic

A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic A Closed-Loop Control Traffic Engineering System for the Dynamic Load Balancing of Inter-AS Traffic Mina Amin, Kin Hon Ho, George Pavlou & Michael Howarth Centre for Communication Systems Research, Dept.

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2

On the Traffic Capacity of Cellular Data Networks. 1 Introduction. T. Bonald 1,2, A. Proutière 1,2 On the Traffic Capacity of Cellular Data Networks T. Bonald 1,2, A. Proutière 1,2 1 France Telecom Division R&D, 38-40 rue du Général Leclerc, 92794 Issy-les-Moulineaux, France {thomas.bonald, alexandre.proutiere}@francetelecom.com

More information

Fast Prototyping Network Data Mining Applications. Gianluca Iannaccone Intel Research Berkeley

Fast Prototyping Network Data Mining Applications. Gianluca Iannaccone Intel Research Berkeley Fast Prototyping Network Data Mining Applications Gianluca Iannaccone Intel Research Berkeley Motivation Developing new network monitoring apps is unnecessarily time-consuming Familiar development steps

More information

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs

CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

The CUSUM algorithm a small review. Pierre Granjon

The CUSUM algorithm a small review. Pierre Granjon The CUSUM algorithm a small review Pierre Granjon June, 1 Contents 1 The CUSUM algorithm 1.1 Algorithm............................... 1.1.1 The problem......................... 1.1. The different steps......................

More information

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency

Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor normusliza@kuis.edu.my Abstract.

More information

Validating the System Behavior of Large-Scale Networked Computers

Validating the System Behavior of Large-Scale Networked Computers Validating the System Behavior of Large-Scale Networked Computers Chen-Nee Chuah Robust & Ubiquitous Networking (RUBINET) Lab http://www.ece.ucdavis.edu/rubinet Electrical & Computer Engineering University

More information

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory

Signal Detection. Outline. Detection Theory. Example Applications of Detection Theory Outline Signal Detection M. Sami Fadali Professor of lectrical ngineering University of Nevada, Reno Hypothesis testing. Neyman-Pearson (NP) detector for a known signal in white Gaussian noise (WGN). Matched

More information

Introduction. Chapter 1

Introduction. Chapter 1 Chapter 1 Introduction The area of fault detection and diagnosis is one of the most important aspects in process engineering. This area has received considerable attention from industry and academia because

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Revenue Management for Transportation Problems

Revenue Management for Transportation Problems Revenue Management for Transportation Problems Francesca Guerriero Giovanna Miglionico Filomena Olivito Department of Electronic Informatics and Systems, University of Calabria Via P. Bucci, 87036 Rende

More information

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks

Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks Journal of Computer Science 4 (3): 232-238, 2008 ISSN 1549-3636 2008 Science Publications Enhanced Variable Splitting Ratio Algorithm for Effective Load Balancing in MPLS Networks 1 G. Murugesan, 2 A.M.

More information

A New Forwarding Policy for Load Balancing in Communication Networks

A New Forwarding Policy for Load Balancing in Communication Networks A New Forwarding Policy for Load Balancing in Communication Networks Martin Heusse Yvon Kermarrec ENST de Bretagne BP 83, 985 Brest Cedex, France Martin.Heusse@enst-bretagne.fr Abstract We present in this

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Hybrid processing of SCADA and synchronized phasor measurements for tracking network state

Hybrid processing of SCADA and synchronized phasor measurements for tracking network state IEEE PES General Meeting, Denver, USA, July 2015 1 Hybrid processing of SCADA and synchronized phasor measurements for tracking network state Boris Alcaide-Moreno Claudio Fuerte-Esquivel Universidad Michoacana

More information

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES

CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES CHAPTER 6 SECURE PACKET TRANSMISSION IN WIRELESS SENSOR NETWORKS USING DYNAMIC ROUTING TECHNIQUES 6.1 Introduction The process of dispersive routing provides the required distribution of packets rather

More information

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection 2003 IEEE International Workshop on Information Assurance March 24th, 2003 Darmstadt, Germany Stochastic Protocol Modeling for Anomaly-Based Network Intrusion Detection Juan M. Estévez-Tapiador (tapiador@ugr.es)

More information

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad

Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad Detecting Constant Low-Frequency Appilication Layer Ddos Attacks Using Collaborative Algorithms B. Aravind, (M.Tech) CSE Dept, CMRTC, Hyderabad M. Lakshmi Narayana, M.Tech CSE Dept, CMRTC, Hyderabad Abstract:

More information

Network Security A Decision and Game-Theoretic Approach

Network Security A Decision and Game-Theoretic Approach Network Security A Decision and Game-Theoretic Approach Tansu Alpcan Deutsche Telekom Laboratories, Technical University of Berlin, Germany and Tamer Ba ar University of Illinois at Urbana-Champaign, USA

More information

Network Virtualization Server for Adaptive Network Control

Network Virtualization Server for Adaptive Network Control Network Virtualization Server for Adaptive Network Control Takashi Miyamura,YuichiOhsita, Shin ichi Arakawa,YukiKoizumi, Akeo Masuda, Kohei Shiomoto and Masayuki Murata NTT Network Service Systems Laboratories,

More information

On the Placement of Management and Control Functionality in Software Defined Networks

On the Placement of Management and Control Functionality in Software Defined Networks On the Placement of Management and Control Functionality in Software Defined Networks D.Tuncer et al. Department of Electronic & Electrical Engineering University College London, UK ManSDN/NfV 13 November

More information

Detecting Anomalies Using End-to-End Path Measurements

Detecting Anomalies Using End-to-End Path Measurements Detecting Anomalies Using End-to-End Path Measurements K. V. M. Naidu Debmalya Panigrahi Rajeev Rastogi Bell Labs Research India, Bangalore MIT Bell Labs Research India, Bangalore Abstract In this paper,

More information

Efficient Load Balancing Routing in Wireless Mesh Networks

Efficient Load Balancing Routing in Wireless Mesh Networks ISSN (e): 2250 3005 Vol, 04 Issue, 12 December 2014 International Journal of Computational Engineering Research (IJCER) Efficient Load Balancing Routing in Wireless Mesh Networks S.Irfan Lecturer, Dept

More information

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks

A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks A Power Efficient QoS Provisioning Architecture for Wireless Ad Hoc Networks Didem Gozupek 1,Symeon Papavassiliou 2, Nirwan Ansari 1, and Jie Yang 1 1 Department of Electrical and Computer Engineering

More information

Background: State Estimation

Background: State Estimation State Estimation Cyber Security of the Smart Grid Dr. Deepa Kundur Background: State Estimation University of Toronto Dr. Deepa Kundur (University of Toronto) Cyber Security of the Smart Grid 1 / 81 Dr.

More information

Detecting Network Anomalies. Anant Shah

Detecting Network Anomalies. Anant Shah Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting

More information

A Statistical Framework for Operational Infrasound Monitoring

A Statistical Framework for Operational Infrasound Monitoring A Statistical Framework for Operational Infrasound Monitoring Stephen J. Arrowsmith Rod W. Whitaker LA-UR 11-03040 The views expressed here do not necessarily reflect the views of the United States Government,

More information

Dynamic Neural Networks for Actuator Fault Diagnosis: Application to the DAMADICS Benchmark Problem

Dynamic Neural Networks for Actuator Fault Diagnosis: Application to the DAMADICS Benchmark Problem Dynamic Neural Networks for Actuator Fault Diagnosis: Application to the DAMADICS Benchmark Problem Krzysztof PATAN and Thomas PARISINI University of Zielona Góra Poland e-mail: k.patan@issi.uz.zgora.pl

More information

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme

How To Detect Denial Of Service Attack On A Network With A Network Traffic Characterization Scheme Efficient Detection for DOS Attacks by Multivariate Correlation Analysis and Trace Back Method for Prevention Thivya. T 1, Karthika.M 2 Student, Department of computer science and engineering, Dhanalakshmi

More information

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey

Week 4 / Paper 1. Open issues in Interdomain Routing: a survey Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many

More information

Message-passing sequential detection of multiple change points in networks

Message-passing sequential detection of multiple change points in networks Message-passing sequential detection of multiple change points in networks Long Nguyen, Arash Amini Ram Rajagopal University of Michigan Stanford University ISIT, Boston, July 2012 Nguyen/Amini/Rajagopal

More information

Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing

Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/OSPF Routing Multi-Commodity Flow Traffic Engineering with Hybrid MPLS/ Routing Mingui Zhang Tsinghua University Beijing, China mingui.zhang@gmail.com Bin Liu Tsinghua University Beijing, China liub@tsinghua.edu.cn

More information

A hierarchical multicriteria routing model with traffic splitting for MPLS networks

A hierarchical multicriteria routing model with traffic splitting for MPLS networks A hierarchical multicriteria routing model with traffic splitting for MPLS networks João Clímaco, José Craveirinha, Marta Pascoal jclimaco@inesccpt, jcrav@deecucpt, marta@matucpt University of Coimbra

More information

A MULTI-PERIOD INVESTMENT SELECTION MODEL FOR STRATEGIC RAILWAY CAPACITY PLANNING

A MULTI-PERIOD INVESTMENT SELECTION MODEL FOR STRATEGIC RAILWAY CAPACITY PLANNING A MULTI-PERIOD INVESTMENT SELECTION MODEL FOR STRATEGIC RAILWAY Yung-Cheng (Rex) Lai, Assistant Professor, Department of Civil Engineering, National Taiwan University, Rm 313, Civil Engineering Building,

More information

Signal processing tools for largescale network monitoring: a state of the art

Signal processing tools for largescale network monitoring: a state of the art Signal processing tools for largescale network monitoring: a state of the art Kavé Salamatian Université de Savoie Outline Introduction & Methodologies Anomaly detection basic Statistical anomaly detection

More information

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS

INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by

More information

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks

Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Bandwidth Allocation DBA (BA-DBA) Algorithm for xpon Networks Karamitsos Ioannis Telecom Lab,On Telecoms Athens, Attica 16342, Greece Al-Arfaj Khalid Rayadah Investment Co Riyadh, KSA Kingdom of Saudi

More information

Traffic Driven Analysis of Cellular Data Networks

Traffic Driven Analysis of Cellular Data Networks Traffic Driven Analysis of Cellular Data Networks Samir R. Das Computer Science Department Stony Brook University Joint work with Utpal Paul, Luis Ortiz (Stony Brook U), Milind Buddhikot, Anand Prabhu

More information

Content Distribution over IP: Developments and Challenges

Content Distribution over IP: Developments and Challenges Content Distribution over IP: Developments and Challenges Adrian Popescu, Blekinge Inst of Technology, Sweden Markus Fiedler, Blekinge Inst of Technology, Sweden Demetres D. Kouvatsos, University of Bradford,

More information

A Numerical Study on the Wiretap Network with a Simple Network Topology

A Numerical Study on the Wiretap Network with a Simple Network Topology A Numerical Study on the Wiretap Network with a Simple Network Topology Fan Cheng and Vincent Tan Department of Electrical and Computer Engineering National University of Singapore Mathematical Tools of

More information

Modeling and Performance Evaluation of Computer Systems Security Operation 1

Modeling and Performance Evaluation of Computer Systems Security Operation 1 Modeling and Performance Evaluation of Computer Systems Security Operation 1 D. Guster 2 St.Cloud State University 3 N.K. Krivulin 4 St.Petersburg State University 5 Abstract A model of computer system

More information

Environmental Remote Sensing GEOG 2021

Environmental Remote Sensing GEOG 2021 Environmental Remote Sensing GEOG 2021 Lecture 4 Image classification 2 Purpose categorising data data abstraction / simplification data interpretation mapping for land cover mapping use land cover class

More information

RNM Reply Network Manager

RNM Reply Network Manager RNM Reply Network Manager Introduction The development of the telecommunication market and the stronger competition among operators combined with the introduction of new players (such as Mobile Virtual

More information

The Wondrous World of fmri statistics

The Wondrous World of fmri statistics Outline The Wondrous World of fmri statistics FMRI data and Statistics course, Leiden, 11-3-2008 The General Linear Model Overview of fmri data analysis steps fmri timeseries Modeling effects of interest

More information

Time Series Analysis III

Time Series Analysis III Lecture 12: Time Series Analysis III MIT 18.S096 Dr. Kempthorne Fall 2013 MIT 18.S096 Time Series Analysis III 1 Outline Time Series Analysis III 1 Time Series Analysis III MIT 18.S096 Time Series Analysis

More information

4F7 Adaptive Filters (and Spectrum Estimation) Least Mean Square (LMS) Algorithm Sumeetpal Singh Engineering Department Email : sss40@eng.cam.ac.

4F7 Adaptive Filters (and Spectrum Estimation) Least Mean Square (LMS) Algorithm Sumeetpal Singh Engineering Department Email : sss40@eng.cam.ac. 4F7 Adaptive Filters (and Spectrum Estimation) Least Mean Square (LMS) Algorithm Sumeetpal Singh Engineering Department Email : sss40@eng.cam.ac.uk 1 1 Outline The LMS algorithm Overview of LMS issues

More information

Kalman Filter Applied to a Active Queue Management Problem

Kalman Filter Applied to a Active Queue Management Problem IOSR Journal of Electrical and Electronics Engineering (IOSR-JEEE) e-issn: 2278-1676,p-ISSN: 2320-3331, Volume 9, Issue 4 Ver. III (Jul Aug. 2014), PP 23-27 Jyoti Pandey 1 and Prof. Aashih Hiradhar 2 Department

More information

Managing Incompleteness, Complexity and Scale in Big Data

Managing Incompleteness, Complexity and Scale in Big Data Managing Incompleteness, Complexity and Scale in Big Data Nick Duffield Electrical and Computer Engineering Texas A&M University http://nickduffield.net/work Three Challenges for Big Data Complexity Problem:

More information

Diagnosing Network Disruptions with Network-Wide Analysis

Diagnosing Network Disruptions with Network-Wide Analysis Diagnosing Network Disruptions with Network-Wide Analysis Yiyi Huang, Nick Feamster, Anukool Lakhina, Jun (Jim) Xu College of Computing, Georgia Tech, Guavus, Inc. ABSTRACT To maintain high availability

More information

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 info@mushroomnetworks.com

More information

A progressive method to solve large-scale AC Optimal Power Flow with discrete variables and control of the feasibility

A progressive method to solve large-scale AC Optimal Power Flow with discrete variables and control of the feasibility A progressive method to solve large-scale AC Optimal Power Flow with discrete variables and control of the feasibility Manuel Ruiz, Jean Maeght, Alexandre Marié, Patrick Panciatici and Arnaud Renaud manuel.ruiz@artelys.com

More information

Top-Down Network Design

Top-Down Network Design Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer 29 Network Management Design A good design can help an organization achieve

More information

QoS optimization for an. on-demand transportation system via a fractional linear objective function

QoS optimization for an. on-demand transportation system via a fractional linear objective function QoS optimization for an Load charge ratio on-demand transportation system via a fractional linear objective function Thierry Garaix, University of Avignon (France) Column Generation 2008 QoS optimization

More information

STATISTICA Formula Guide: Logistic Regression. Table of Contents

STATISTICA Formula Guide: Logistic Regression. Table of Contents : Table of Contents... 1 Overview of Model... 1 Dispersion... 2 Parameterization... 3 Sigma-Restricted Model... 3 Overparameterized Model... 4 Reference Coding... 4 Model Summary (Summary Tab)... 5 Summary

More information

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth.

5 Performance Management for Web Services. Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology. stadler@ee.kth. 5 Performance Management for Web Services Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se April 2008 Overview Service Management Performance Mgt QoS Mgt

More information

Network Tomography and Internet Traffic Matrices

Network Tomography and Internet Traffic Matrices Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert

More information

Denial of Service and Anomaly Detection

Denial of Service and Anomaly Detection Denial of Service and Anomaly Detection Vasilios A. Siris Institute of Computer Science (ICS) FORTH, Crete, Greece vsiris@ics.forth.gr SCAMPI BoF, Zagreb, May 21 2002 Overview! What the problem is and

More information

A Framework for Routing Assisted Traffic Monitoring

A Framework for Routing Assisted Traffic Monitoring A Framework for Routing Assisted Traffic Monitoring D. Krishna Kumar, B.Sai baba M.Tech Krishna.desa@gmail.com Vishnu Institute of Technology college of Engineering and Technology, Bhimavaram, A.P. Abstract

More information

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS

AN EFFICIENT DISTRIBUTED CONTROL LAW FOR LOAD BALANCING IN CONTENT DELIVERY NETWORKS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Enhancing Wireless Security with Physical Layer Network Cooperation

Enhancing Wireless Security with Physical Layer Network Cooperation Enhancing Wireless Security with Physical Layer Network Cooperation Amitav Mukherjee, Ali Fakoorian, A. Lee Swindlehurst University of California Irvine The Physical Layer Outline Background Game Theory

More information

MIMO CHANNEL CAPACITY

MIMO CHANNEL CAPACITY MIMO CHANNEL CAPACITY Ochi Laboratory Nguyen Dang Khoa (D1) 1 Contents Introduction Review of information theory Fixed MIMO channel Fading MIMO channel Summary and Conclusions 2 1. Introduction The use

More information

SiMPLuS Suite. Unleash the power of IP/MPLS. Vegayan Systems. Making converged networks efficient and effective

SiMPLuS Suite. Unleash the power of IP/MPLS. Vegayan Systems. Making converged networks efficient and effective SiMPLuS Suite Unleash the power of IP/MPLS Vegayan Systems Making converged networks efficient and effective Making converged networks efficient & effective SiMPLuS Operations (OP&TE) offers Centralized

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks

Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Proactive Surge Protection: A Defense Mechanism for Bandwidth-Based Attacks Jerry Chou, Bill Lin University of California, San Diego Subhabrata Sen, Oliver Spatscheck AT&T Labs-Research USENIX Security

More information

NETWORK ISSUES: COSTS & OPTIONS

NETWORK ISSUES: COSTS & OPTIONS VIDEO CONFERENCING NETWORK ISSUES: COSTS & OPTIONS Prepared By: S. Ann Earon, Ph.D., President Telemanagement Resources International Inc. Sponsored by Vidyo By:S.AnnEaron,Ph.D. Introduction Successful

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks

Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research

More information

Multiple Linear Regression in Data Mining

Multiple Linear Regression in Data Mining Multiple Linear Regression in Data Mining Contents 2.1. A Review of Multiple Linear Regression 2.2. Illustration of the Regression Process 2.3. Subset Selection in Linear Regression 1 2 Chap. 2 Multiple

More information

Cyber-Security Analysis of State Estimators in Power Systems

Cyber-Security Analysis of State Estimators in Power Systems Cyber-Security Analysis of State Estimators in Electric Power Systems André Teixeira 1, Saurabh Amin 2, Henrik Sandberg 1, Karl H. Johansson 1, and Shankar Sastry 2 ACCESS Linnaeus Centre, KTH-Royal Institute

More information

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial

Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Defending against Flooding-Based Distributed Denial-of-Service Attacks: A Tutorial Rocky K. C. Chang The Hong Kong Polytechnic University Presented by Scott McLaren 1 Overview DDoS overview Types of attacks

More information

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation

Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Detecting Anomalies in Network Traffic Using Maximum Entropy Estimation Yu Gu, Andrew McCallum, Don Towsley Department of Computer Science, University of Massachusetts, Amherst, MA 01003 Abstract We develop

More information

On the Interaction and Competition among Internet Service Providers

On the Interaction and Competition among Internet Service Providers On the Interaction and Competition among Internet Service Providers Sam C.M. Lee John C.S. Lui + Abstract The current Internet architecture comprises of different privately owned Internet service providers

More information

Geostatistics Exploratory Analysis

Geostatistics Exploratory Analysis Instituto Superior de Estatística e Gestão de Informação Universidade Nova de Lisboa Master of Science in Geospatial Technologies Geostatistics Exploratory Analysis Carlos Alberto Felgueiras cfelgueiras@isegi.unl.pt

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen

Mobile Security Wireless Mesh Network Security. Sascha Alexander Jopen Mobile Security Wireless Mesh Network Security Sascha Alexander Jopen Overview Introduction Wireless Ad-hoc Networks Wireless Mesh Networks Security in Wireless Networks Attacks on Wireless Mesh Networks

More information

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing

TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding

More information

Costs and Benefits of Reputation Management Systems

Costs and Benefits of Reputation Management Systems Costs and Benefits of Reputation Management Systems Roberto G. Cascella University of Trento Dipartimento di Ingegneria e Scienza dell Informazione Via Sommarive 14, I-381 Povo (TN), Italy cascella@disi.unitn.it

More information

AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS

AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based

More information

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below:

Question 1. [7 points] Consider the following scenario and assume host H s routing table is the one given below: Computer Networks II Master degree in Computer Engineering Exam session: 11/02/2009 Teacher: Emiliano Trevisani Last name First name Student Identification number You are only allowed to use a pen and

More information

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.

Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito. Introduction to Quality of Service Andrea Bianco Telecommunication Network Group firstname.lastname@polito.it http://www.telematica.polito.it/ QoS Issues in Telecommunication Networks - 1 Quality of service

More information

Active Queue Management

Active Queue Management Active Queue Management TELCOM2321 CS2520 Wide Area Networks Dr. Walter Cerroni University of Bologna Italy Visiting Assistant Professor at SIS, Telecom Program Slides partly based on Dr. Znati s material

More information

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001

MENTER Overview. Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Overview Prepared by Mark Shayman UMIACS Contract Review Laboratory for Telecommunications Science May 31, 2001 MENTER Goal MPLS Event Notification Traffic Engineering and Restoration Develop an

More information

An Introduction to Machine Learning

An Introduction to Machine Learning An Introduction to Machine Learning L5: Novelty Detection and Regression Alexander J. Smola Statistical Machine Learning Program Canberra, ACT 0200 Australia Alex.Smola@nicta.com.au Tata Institute, Pune,

More information

Journal of Internet Banking and Commerce

Journal of Internet Banking and Commerce Journal of Internet Banking and Commerce An open access Internet journal (http://www.arraydev.com/commerce/jibc/) Journal of Internet Banking and Commerce, December 2009, vol. 14, no.3 (http://www.arraydev.com/commerce/jibc/)

More information