How To Detect An Traffc From A Network With A Network Onlne Onlnet

Size: px
Start display at page:

Download "How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet"

Transcription

1 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX Passve Onlne Detecton of Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE, Bng Wang, Member, IEEE, Yu Gu, Member, IEEE, Jm Kurose, Fellow, IEEE, Don Towsley, Fellow, IEEE, and Sharad Jaswal Abstract In ths paper, we propose two onlne algorthms to detect traffc from packet-header data collected passvely at a montorng pont. These algorthms have a number of applcatons n realtme wreless LAN management, for nstance, n detectng unauthorzed access ponts and detectng/predctng performance degradatons. Both algorthms use sequental hypothess tests, and explot fundamental propertes of the CSMA/CA MAC protocol and the half duplex nature of wreless channels. They dffer n that one requres tranng sets, whle the other does not. We have bult a system for onlne wreless traffc detecton usng these algorthms and deployed t at a unversty gateway router. Extensve experments have demonstrated the effectveness of our approach: the algorthm that requres tranng provdes rapd detecton and s extremely accurate (the detecton s mostly wthn 10 seconds, wth very low false postve and false negatve ratos); the algorthm that does not requre tranng detects 60%-76% of the wreless hosts wthout any false postves; both algorthms are lght-weght, wth computaton and storage overhead well wthn the capablty of commodty equpment. Index Terms Wreless LAN management, Wreless traffc detecton, Sequental hypothess testng, TCP ACK-pars. I. INTRODUCTION THE deployment of IEEE wreless networks (WLANs) has been growng at a remarkable rate durng the past several years. The presence of a wreless nfrastructure wthn a network, however, rases varous network management and securty ssues. Several recent studes address these ssues [10], [11], [16], [40], [41], [19], [27], [32] (detaled n Secton II). These studes all adopt the approach of dstrbuted montorng of RF arwaves, whch has also been adopted by most commercal products (e.g., [1], [3], [9], [4], [2], [8]). An alternatve approach to managng a wreless network s through centralzed montorng at a sngle aggregaton pont. Ths sngle montorng pont s located at the edge of a local network (e.g., at a gateway router) and captures all traffc comng nto and gettng out of the local network. Ths centralzed approach s scalable, requrng lttle deployment costs, and s easy to manage and mantan. However, a key challenge when usng ths approach for realtme network management s onlne detecton of wreless traffc. Ths s because a local network typcally supports both Ethernet and WLAN technologes, and hence the aggregaton pont observes a mxture of wred and wreless traffc. Manuscrpt receved xx xx, W. We s wth Unted Technologes Research Center, K. Suh s wth Illnos State Unversty, B. Wang s wth the Unversty of Connectcut, Y. Gu, J. Kurose and D. Towsley are wth the Unversty of Massachusetts, Amherst, and S. Jaswal s wth Alcatel-Lucent Bell Labs, Inda. Onlne detecton of wreless traffc at the aggregaton pont s not an easy task. It cannot be acheved based on IP addresses. Ths s because a network admnstrator may not allocate separate IP address pools for wred and wreless hosts. Even f there were separate pools, a host wth an address from the wred address pool may act as a NAT box for a set of wreless hosts, or nstall a wreless router and becomes a wreless host. In ths paper, we develop two onlne algorthms to detect wreless traffc. Our algorthms take advantage of tmng nformaton at the aggregaton pont and can detect wreless traffc that s behnd NAT boxes or user-nstalled wreless routers. Our man contrbutons are as follows: We extend the analyss n [37] and demonstrate that usng TCP ACK-pars can effectvely dfferentate Ethernet and wreless connectons (ncludng both b and g). Our analyss explots fundamental propertes of the CSMA/CA MAC protocol and the half duplex nature of wreless channels. We develop two onlne algorthms to detect wreless traffc. Both algorthms use sequental hypothess tests and make prompt decsons as TCP ACK-pars are observed at the montorng pont. One algorthm requres tranng data, whle the other does not. To the best of our knowledge, ours are the frst set of passve onlne technques that detect wreless traffc. We have bult a system for onlne detecton of wreless traffc usng the above algorthms and deployed t at the gateway router of the Unversty of Massachusetts, Amherst (UMass). Extensve experments n varous scenaros have demonstrated the effectveness of our algorthms: (1) The algorthm that requres tranng makes detectons mostly wthn 10 seconds, and the false postve and false negatve ratos are close to zero; (2) The algorthm that does not requre tranng detects 60%- 76% of the wreless hosts wthout any false postves; and (3) Both algorthms have computaton and storage overhead well wthn the capablty of commodty equpment. We further demonstrate that our scheme can detect connecton-type swtchngs and wreless networks behnd a NAT box, and t s effectve even when end hosts have hgh CPU, dsk or network utlzatons. Our proposed algorthms have a number of mportant applcatons n realtme WLAN management. For nstance, they are useful to detect rogue or unauthorzed access ponts (APs). Suppose a host not authorzed to use wreless network nstalls a rogue AP for wreless connecton. Traffc of ths host s

2 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX captured at the aggregaton pont. Usng our onlne algorthms, a network admnstrator wll detect that the host uses wreless whle t s not authorzed to do so, and hence determnes that t uses a rogue AP. Our proposed scheme can also help to montor the performance of wreless hosts, whch are more vulnerable to performance problems due to the unrelable nature of the wreless medum. More specfcally, a network admnstrator may dentfy wreless hosts n realtme usng our algorthms, montor ther performance, and predct and/or detect performance degradatons. The rest of the paper s organzed as follows. Secton II descrbes related work. Secton III presents the problem settng and a hgh-level descrpton of our approach. Secton IV analyzes TCP ACK-pars n Ethernet and WLAN. Sectons V and VI present our onlne algorthms and onlne detecton system, respectvely. Sectons VII and VIII present expermental evaluaton methodology and results, respectvely. Fnally, Secton IX dscusses several ssues related to usng our algorthms, and Secton X concludes the paper and presents future work. II. RELATED WORK The study most closely related to ours s [37], whch proposes an teratve Bayesan nference technque to detect wreless traffc based on passve measurement at an aggregaton pont n an offlne manner. The focus there s on determnng the extent of wreless usage and the belef that a flow s from a wreless host. Our focus here s on onlne detecton of wreless traffc. Detectng wreless traffc has also been studed n several other efforts. However, none of them adopts a passve onlne approach. Baamonte et al. [12] use entropes to detect wreless connectons n an offlne manner. Beyah et al. [13] use vsual nspecton to detect wreless traffc, whch cannot be carred out automatcally. Mano et al. [28] propose a technque that requres segmentng large packets nto smaller ones to detect wreless traffc. In other studes, dfferentatng wreless traffc and other types of traffcs s based on actve measurements [39] or certan assumptons about wreless lnks (such as very low bandwdth and hgh loss rates) [18]. Several recent studes focus on WLAN management. Adya et al. [10] present a clent-based archtecture to detect and dagnose faults. Bahl et al. [11] propose usng USB devces that are attached to desktops to montor an enterprse WLAN. Ths archtecture has been recently extended to provde locatonbased management [16]. Yeo et al. propose a framework that merges lnk-level measurement from multple dstrbuted ar montors for WLAN management [40], [41]. Ths framework s substantally extended n Jgsaw [19] and Wt [27], where the authors provde formal and systematc technques to construct a global vew of the network by mergng and synchronzng traces from multple locatons. Based on the global vew, Cheng et al. nfer all sources of delays due to meda access and moblty for cross-layer WLAN dagnoss. In another recent study, Sheth et al. dagnose WLAN problems by detectng root causes at the physcal layer [32]. All the above studes utlze dstrbuted montorng of RF arwaves. Ths s also true for most commercal wreless network Fg. 1. Problem settng: a montorng pont at an aggregaton pont (e.g., the gateway router) captures ncomng traffc and outgong traffc. Our goal s to detect wreless hosts n realtme based on passve measurements at the montorng pont. Ths fgure also llustrates a scenaro where a host not authorzed to use the wreless LAN nstalls a rogue AP. management products [1], [3], [4], [2], [8]. The ratonale s that RF arwave montorng provdes detaled low-level (.e., PHY and MAC) nformaton that s crtcal for analyzng the behavor of a network and pnpont the exact causes of a fault. Our study takes the approach of centralzed montorng at a sngle aggregaton pont. The captured nformaton s at hgher layers (.e., IP and transport layers), and hence may not provde suffcent nsghts nto the root causes of a fault. However, as mentoned earler, t has a number of applcatons n realtme WLAN management, e.g., n detectng rogue APs and detectng/predctng performance degradatons. Two recent studes [42], [26] focus on a specfc WLAN management task rogue AP detecton. Yn et al. [42] use wreless snffers and a verfer n the wred network to detect protected layer-3 rogue APs. Ma et al. [26] propose a framework that combnes dstrbuted detecton through wreless snffers and centralzed detecton at a gateway router. Both studes stll heavly rely on arwave montorng and target at detectng rogue APs only. We provde a scalable onlne approach to detectng wreless traffc, whch has broader applcatons n realtme WLAN management. Passve measurement at a sngle aggregaton pont falls broadly nto measurement-n-the-mddle,.e., measurements are taken at a sngle pont n the mddle of the end-to-end connectons. The studes of [22] and [23] nfer end-to-end propertes of a TCP connecton through measurement-n-themddle. Our study dffers n that we focus on dfferentatng wred and wreless traffc. Last, sequental hypothess testng [35] provdes an opportunty to make decsons as data streams come n, and thus s a sutable technque for our purpose. It has also been used for detectng portscans [24], jammng attacks [25], and msbehavor n WLANs [30], [14]. III. PROBLEM SETTING AND APPROACH Consder a local network (e.g., a unversty campus or an enterprse network), as llustrated n Fg. 1. A montorng pont s placed at an aggregaton pont (e.g., the gateway router) of ths local network, capturng traffc comng n and gong out

3 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX Recever (a)ethernet Recever (b)wlan L1 100Mbps Access Pont Router L1 100Mbps A3 Router 100Mbps L2 P1P2P3 A A3 A1 100Mbps L2 Sender P1P2 P3P4 A A1 Sender Fg. 2. Settngs for the analyss: (a) Ethernet, (b) WLAN (802.11b or g). The dashed rectangle between the sender and the router represents the montorng pont. The par of ACKs, A 1 and A 3, forms an ACK-par. of the network. End hosts wthn ths network use ether wred Ethernet or WLAN to access the Internet. Therefore, the aggregaton pont captures a mxture of wred and wreless traffc. Our goal s to detect what hosts use WLAN nsde the local network n real tme. For ths purpose, we must answer the followng two questons: (1) what statstcs can be used to effectvely detect wreless hosts? (2) how to detect wreless hosts n an onlne manner? We next provde a hghlevel descrpton on how we address these two questons; a detaled descrpton s deferred to Sectons IV and V. We have shown that nter-ack tme s a statstc that can be used to effectvely detect wreless hosts n [37]. An nter-ack tme s the nter-arrval tme of a TCP ACK-par,.e., a par of ACKs correspondng to two data packets that arrve at the montorng pont close n tme. In [37], we analyze the nter- ACK tme n Ethernet and WLAN and demonstrate that t can be used to dfferentate these two connecton types. However, the analyss does not nclude g, snce t was not wdely deployed at that tme. In Secton IV, we extend the analyss n [37] to g, and derve a new set of results for Ethernet and b. Our results demonstrate that nter-ack tmes can effectvely dfferentate Ethernet and WLAN (ncludng both b and g hosts). For onlne detecton of wreless hosts, we develop two lght-weght algorthms (see Secton V), both usng sequental hypothess tests and takng the nter-ack tmes as nput. These two algorthms roughly work as follows. They calculate the lkelhoods that a host uses WLAN and Ethernet as TCP ACKpars are observed. When the rato of the WLAN lkelhood aganst the Ethernet lkelhood exceeds a certan threshold, they make a decson that the host uses WLAN. IV. ANALYSIS OF TCP ACK-PAIRS In ths secton, we extend the analyss n [37] and demonstrate analytcally that nter-ack tme can be used to effectvely dfferentate Ethernet and WLAN (ncludng both b and g). In the followng, we start from the assumptons and settngs, and then present the analytcal results. At the end, we brefly summarze the nsghts obtaned from the analyss. A. Assumptons and settngs The settngs for our analyss are shown n Fg. 2, where an outsde sender sends data to a recever n the local network. In Fg. 2(a), the recever uses Ethernet; n Fg. 2(b), the recever uses b or g WLAN. We refer to the above settngs as Ethernet settng and WLAN settng, respectvely. In both settngs, a router resdes between the sender and the recever, and s connected to the sender by lnk L 2 wth 100 Mbps bandwdth. The montorng pont s between the sender and the router, tappng nto lnk L 2. In the Ethernet settng, the router and the recever are connected by lnk L 1 wth 100 Mbps bandwdth. In the WLAN settng, an access pont resdes between the router and the recever. The access pont and the router are connected by lnk L 1 wth 100 Mbps bandwdth; and the recever s connected to the access pont usng 11 Mbps b or 54 Mbps g. In both the Ethernet and WLAN settngs, the router s queues for ncomng data packets and ACKs are modeled as M/D/1 queues. Let Q D and Q A denote the queues for data and ACKs respectvely. The utlzatons of Q D and Q A are ρ D and ρ A, respectvely. We assume that the recever mplements the TCP delayed ACK polcy 1, snce ths polcy s commonly used n practce [31], [7]. To accommodate the effects of delayed ACK, we consder four data packets P 1, P 2, P 3 and P 4, each of 1500 bytes, sent back-to-back from the sender. Wthout loss of generalty, we assume that packet P 1 s acknowledged. Snce we assume delayed ACK, packet P 3 s also acknowledged. Let A 1 and A 3 denote the ACKs correspondng to packets P 1 and P 3, respectvely. Then A 1 and A 3 form an ACK-par. Let A represent the nter-ack tme of A 1 and A 3 at the montorng pont. Let denote the nter-arrval tme of the data packets P 1 and P 3 at the montorng pont. Then = = 240 µs snce each P ( = 1,...,4) s 1500 bytes and the bandwdth of lnk L 2 s 100 Mbps. Intutvely, the random backoff mechansm n (.e., a host must wat for a random backoff nterval to transmt [21]) and the half duplex nature of wreless channels (.e., data packets and ACKs contend for meda access at a wreless host) may lead to larger nter-ack tmes n WLAN than those n Ethernet. To demonstrate analytcally that ths s ndeed the case, we consder the followng worst-case scenaros (n terms of dfferentatng Ethernet and WLAN hosts). In the Ethernet settng, we assume cross traffc traversng both queues, Q D and Q A, at the router so that the Ethernet lnk may be heavly utlzed. In the WLAN settng, the wreless lnk between the access pont and the recever s under dealzed condtons,.e., the channel s perfect, and s only used by the access pont and the recever. As we shall see, even n the above scenaros, the nter-ack tmes of WLAN are generally larger than those of Ethernet, and hence can be used to dfferentate WLAN and Ethernet connectons. B. Analyss of Ethernet We next present two theorems on nter-ack tmes n the Ethernet settng. Ther proofs are found n Appendces I and 1 That s, a recever releases an ACK after recevng two packets, or f the delayed-ack tmer s trggered after the arrval of a sngle packet.

4 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX II, respectvely. Theorem 1: (Inter-ACK tme dstrbuton for Ethernet) In the Ethernet settng, when 0 < ρ D, ρ A 1, P( A > 600 µs) < Theorem 2: (Medan nter-ack tme for Ethernet) Let { A }n =1 denote an..d sequence of n nter-ack tmes from a host (they can be from dfferent TCP flows) n the Ethernet settng. Let ξ ṇ 5 ( A) denote the sample medan of { A }n =1. Then, when 0 < ρ D, ρ A 1 and 43 n 100, we have P(ξ ṇ 5( A ) 600 µs) 1. Furthermore, lm n P(ξ ṇ 5 ( A) 600 µs) = 1. Both of the above theorems wll be used explctly to construct a sequental hypothess test n Secton V-B. C. Analyss of b WLAN We now analyze the nter-ack tme dstrbuton n the b WLAN settng. As mentoned earler, we assume dealzed condtons, that s, the wreless channel between the access pont and the recever s perfect and there s no contenton from other wreless nodes. For 11 Mbps b, the transmsson overhead for a TCP packet wth zero payload s 508 µs, whch ncludes the overhead to transmt physcallayer, MAC-layer, IP and TCP headers, the overhead for ACK transmsson, and the duratons of one SIFS and DIFS [20]. The slot tme s 20 µs and a wreless devce wats for a random backoff tme unformly dstrbuted n [0, 31] tme slots (.e., [0, 620] µs) before transmttng a packet. Therefore, the MAC servce tme (.e., the sum of the constant transmsson overhead and the random backoff tme) of a data packet of 1500 bytes s unformly dstrbuted n [1570, 2190] µs. The MAC servce tme of an ACK of 40 bytes s unformly dstrbuted n [508, 1128] µs. We have the followng theorem for the b WLAN settng; the proof s found n Appendx III. Theorem 3: (Inter-ACK tme dstrbuton for b) In the b WLAN settng, under dealzed condtons, P( A > 600 µs) > D. Analyss of g WLAN We next show that 54 Mbps g WLAN generally has larger nter-ack tmes than 100 Mbps Ethernet although they have comparable bandwdths. We agan assume deal condtons. For 54 Mbps g, the transmsson overhead for a TCP packet wth zero payload s 103 µs. The slot tme s 9 µs. The recever wats for a random backoff tme unformly dstrbuted n [0, 15] tme slots (.e., [0, 135] µs) before transmttng a packet. Therefore, the MAC servce tme of a data packet (1500 bytes) s unformly dstrbuted n [325, 460] µs; the MAC servce tme of an ACK (40 bytes) s unformly dstrbuted n [109, 244] µs. We have the followng theorem for the g WLAN settng; the proof s found n Appendx IV. Theorem 4: (Inter-ACK tme dstrbuton for g) In the g WLAN settng, under dealzed condtons, P( A > 600 µs) > E. Summary of Analyss The above analyss demonstrates that, even when a WLAN s under dealzed condtons whle an Ethernet LAN s fully utlzed, usng TCP ACK-pars can effectvely dfferentate Ethernet and WLAN connectons: for Ethernet, less than 18% of the nter-ack tmes exceed 600 µs, whle for b and g, at least 96% and 45% of the nter-ack tmes exceed 600 µs respectvely (see Theorems 1, 3 and 4). Under more realstc condtons (e.g., nosy wreless channel and wth contenton), nter-ack tmes n WLAN may be even larger than those n Ethernet. V. ONLINE DETECTION ALGORITHMS In ths secton, we develop two onlne algorthms to detect wreless hosts based on our analyss n the prevous secton. Both algorthms use sequental hypothess test technque and take the nter-ack tmes as the nput. The frst algorthm requres knowng the nter-ack tme dstrbutons for Ethernet and WLAN traffc a pror. The second algorthm does not have such a requrement. Instead, t s drectly based on Theorems 1 and 2 (see Secton IV). We refer to these two algorthms as sequental hypothess test wth tranng and sequental hypothess test wthout tranng respectvely. The algorthm wthout tranng, although not as powerful as the one wth tranng (see Secton VIII), s sutable for scenaros where the nter-ack tme dstrbutons are not avalable a pror (e.g., n organzatons wth no authorzed wreless networks, where detectng wreless traffc s crucal snce the presence of wreless traffc mples rogue APs and hence severe securty threats). We now descrbe these two algorthms n detal. Both algorthms use at most N = 100 ACK-pars to make a decson (.e., whether the connecton s Ethernet or WLAN) to accommodate the scenaros where a host swtches between Ethernet and WLAN connectons. A. Sequental Hypothess Test wth Tranng Algorthm 1 Sequental Hypothess Test wth Tranng n = 0, l E = l W = 0 loop Identfy an ACK-par n = n + 1 p n = P( A n = δ A n E), q n = P( A n = δ A n W) l E = l E + log p n, l W = l W + log q n f l W l E > log K then Report WLAN, n = 0, l E = l W = 0. else f l W l E < log K then Report Ethernet, n = 0, l E = l W = 0. else f n = N then Report undetermned, n = 0, l E = l W = 0. end f end loop We have demonstrated that the nter-ack tme dstrbutons for Ethernet and WLAN dffer sgnfcantly (see Secton IV).

5 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX When these dstrbutons are known, we can calculate the lkelhoods that a host uses Ethernet and WLAN respectvely gven a sequence of observed nter-ack tmes. If the lkelhood of usng WLAN s much larger than that of usng Ethernet, we conclude that the host uses WLAN (and vce versa). We now descrbe the test n more detal. Let {δ A}n =1 represent a sequence of nter-ack tme observatons from a host, and { A }n =1 represent ther correspondng random varables. Let E and W represent respectvely the events that a host uses Ethernet and WLAN. Let L E = P( A 1 = δ1 A, A 2 = δ2 A,..., A n = δa n E) be the lkelhood that ths observaton sequence s from an Ethernet host. Smlarly, let L W = P( A 1 = δ1 A, A 2 = δ2 A,..., A n = δn A W) be the lkelhood that the observaton sequence s from a WLAN host. Let p = P( A = δ A E) be the probablty that the -th nter-ack tme has value δ A gven that t s from an Ethernet host. Smlarly, let q = P( A = δ A W) be the probablty that the -th nter-ack tme has value δ A gven that t s from a WLAN host. Both p and q are known, obtaned from the nter-ack tme dstrbutons for Ethernet and WLAN traffc respectvely. Assumng that the nter-ack tmes are ndependent and dentcally dstrbuted, we have n L E = P( A 1 = δa 1,..., A n = δa n E) = p, =1 n L W = P( A 1 = δa 1,..., A n = δa n W) = q. =1 Ths test updates L W and L E as an ACK-par s observed. Let K > 1 be a threshold. If after the n-th ACK-par, the rato of L W and L E s over the threshold,.e., L W /L E > K, then the host s classfed as a WLAN host. If L W /L E < 1/K, then the host s classfed as an Ethernet host. If nether decson s made after N ACK-pars, the connecton type s classfed as undetermned. In our mplementaton of the algorthm, for convenence, we use log-lkelhood functon l w = log(l W ) and l E = log(l E ) nstead of the lkelhood functon. Ths test s summarzed n Algorthm 1, where N = 100. As we can see, t has very lttle computaton and storage overhead t only stores the current lkelhoods for Ethernet and WLAN for each IP address beng montored. B. Sequental Hypothess Test wthout Tranng Ths test does not requre knowng the nter-ack tme dstrbutons for Ethernet and WLAN hosts a pror. Instead, t leverages the analytcal results that the probablty of an nter-ack tme exceedng 600 µs s small for Ethernet hosts, whle t s much larger for WLAN hosts (see Secton IV). In the followng, we frst construct a lkelhood rato test [15], and then derve from t a sequental hypothess test. The lkelhood rato test s as follows. Let p be the probablty that an nter-ack tme exceeds 600 µs, that s, p = P( A > 600 µs). By Theorem 1, we have p < θ = 0.18 for Ethernet host. Therefore, f the hypothess p < θ s rejected by the nter-ack tme observaton sequence, we conclude that ths host does not use Ethernet and hence uses WLAN. More specfcally, consder two hypotheses, H 0 and H a, representng Algorthm 2 Sequental Hypothess Test wthout Tranng m = n = 0 loop Identfy an ACK-par n = n + 1 m = m + 1(δn A 600 µs) ˆp = m/n f ˆp = 1 and n > log K log θ then Report WLAN, m = n = 0. m(log ˆp log θ+log(1 θ) log(1 ˆp)) log K log(1 θ) log(1 ˆp) else f n < Report WLAN, m = n = 0. else f n 43 and ˆp 0.5 then Report WLAN, m = n = 0. else f n = N then Report undetermned. m = n = 0. end f end loop then respectvely the null hypothess that a host uses Ethernet and the alternatve hypothess that the host uses WLAN. For a sequence of nter-ack tme observatons {δ A}n =1, let m be the number of observatons that exceed 600 µs. Let K > 1 be a threshold. Then the lkelhood rato test rejects the null hypothess H 0 when λ = sup 0 p θ pm (1 p) n m sup 0 p 1 p m (1 p) n m < 1 K In the mddle term above, the numerator s the maxmum probablty of havng the observed sequence (whch has m nter-ack tmes exceedng 600 µs) computed over parameters n the null hypothess (.e., 0 p θ); the denomnator s the maxmum probablty of havng the observed sequence over all possble parameters (.e., 0 p 1). If λ < 1/K, that s, there are parameter ponts n the alternatve hypothess for whch the observed sample s much more lkely than for any parameter ponts n the null hypothess, the lkelhood rato test concludes that H 0 should be rejected. In other words, f λ < 1/K, the lkelhood rato test concludes that the host uses WLAN. We now derve a sequental hypothess test from the above lkelhood rato test. Let ˆp = m/n, where m s the number of nter-ack tmes exceedng 600 µs and n s the total number of nter-ack tmes. It s straghtforward to show that ˆp s the maxmum lkelhood estmator of p,.e., sup 0 p 1 p m (1 p) n m s acheved when p = ˆp. When ˆp θ, we have sup 0 p θ p m (1 p) n m = sup 0 p 1 p m (1 p) n m, and hence λ = 1 > 1/K. In ths case, the null hypothess H 0 s not rejected. Therefore, we only consder the case where θ < ˆp, whch can be classfed nto two cases: Case 1: θ < ˆp < 1. In ths case, to reject the null hypothess H 0, we need ˆp m (1 ˆp) n m θ m (1 θ) n m > K

6 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX Fg. 3. capture & flter pkt headers onlne detecton engne IP address 1 unacked-data-pkt queues dentfy ACK-pars IP address n unacked-data-pkt queues dentfy ACK-pars Onlne wreless-traffc detecton system. whch s equvalent to n < sequental hypo. tests m(log ˆp log θ + log(1 θ) log(1 ˆp)) log K. (1) log(1 θ) log(1 ˆp) Case 2: ˆp = 1. In ths case, to reject the null hypothess H 0, we need 1 θ n > K whch s equvalent to n > logk log θ. (2) When K = 10 6 and θ = 0.18, from (2), we have n 8. Ths mples that we need at least 8 ACK-pars to detect a WLAN host for the above settng. In addton to condtons (1) and (2), we also derve a complementary condton to reject the null hypothess H 0 drectly from Theorem 2. Theorem 2 states that, when the number of nter-ack observatons n s between 43 and 100, we have P(ξ ṇ 5 ( A) 600 µs) 1 for Ethernet hosts. Therefore, an addtonal condton to reject H 0 s when 43 n 100 and ˆp > 0.5 (because ths condton mples that at least half of the nter-ack observatons exceed 600 µs, that s, ξ ṇ 5 ( A) > 600 µs, whch contradcts Theorem 2). We combne the above three condtons to construct a sequental hypothess test as shown n Algorthm 2, where 1( ) s the ndcator functon and N = 100. As we can see, ths test has very lttle computatonal and storage overhead t only stores the total number of nter-ack tmes and the number of nter-ack tmes exceedng 600 µs for each IP address beng montored. Last, note that t only reports WLAN hosts, whle the sequental hypothess test wth tranng reports both WLAN and Ethernet hosts. VI. ONLINE DETECTION SYSTEM We now descrbe the desgn of a system for onlne detecton of wreless traffc. Ths system conssts of two major components as llustrated n Fg. 3. The data capturng component collects ncomng and outgong packet headers. These packet headers are then passed on to the onlne detecton engne, where WLAN hosts are detected usng the algorthms descrbed n Secton V. We next descrbe the onlne detecton engne, the core component n the system, n more detal. Afterwards, we descrbe how to dentfy ACK-pars n realtme and obtan nter-ack tme dstrbutons beforehand. A. Onlne Detecton Engne The onlne detecton engne makes detectons on a per host (or IP address) bass. Snce TCP data packets and ACKs come n on a per flow bass and a host may have multple smultaneous actve TCP flows 2, the onlne detecton engne mantans a set of data structures n memory, each correspondng to an actve TCP flow. We name the data structure as an unacked-data-packet queue snce t stores the nformaton on all the data packets that have not been acknowledged by the recever. Each tem n a queue represents a data packet n the correspondng actve flow. It records the sequence number (4 bytes), the tmestamp (8 bytes) and sze (2 bytes) of the packet. In addton, the onlne detecton engne also records the latest ACK for each TCP flow n memory. These nformaton s used to dentfy ACK-pars as follows. For each ncomng ACK, the onlne detecton engne fnds ts correspondng unacked-datapacket queue (usng a hash functon for quck lookup) and then matches t wth the tems n the queue to dentfy ACK-pars. Once an ACK-par s dentfed, dependng on whether tranng data s avalable, t s fed nto our algorthm (sequental hypothess test wth or wthout tranng) to determne whether the host uses WLAN. The memory requrement of the onlne detecton system manly comes from storng the unacked-data-packet queues. Each queue contans no more than M tems, where M s the maxmum TCP wndow sze (snce an tem s removed from the queue once ts correspondng ACK arrves). In our experments, we fnd that 90% of the queues contan less than 3 tems (see Secton VIII-C), ndcatng that the memory usage of ths onlne detecton system s low. B. Onlne Identfcaton of TCP ACK-pars As descrbed earler, two successve ACKs form an ACKpar f the nter-arrval tme of ther correspondng data packets at the montorng pont s less than a threshold T (chosen as 240 µs or 400 µs n our system, see Secton VIII). Takng account of several practcal ssues, we further mpose the followng addtonal restrctons when dentfyng ACK-pars. Frst, we exclude all ACKs whose correspondng data packets have been retransmtted or reordered. Second, to ensure that two ACKs are successve, we requre that the dfference of ther IPIDs to be no more than one 3. Thrd, we requre that 2 We defne a flow that has not termnated and has data transmsson durng the last mnute as an actve flow. 3 IPID feld carres a copy of the current value of an IPID counter n a host s IP stack. Many commercal operatng systems mantan a sngle IPID counter that s ncremented whenever a new IP packet s generated; other systems mplement IPID counter as a per-flow counter, as a random number or a constant [17]. Our IPID restrcton s most effectve when a host uses a sngle IPID counter. It s also helpful when a host uses per-flow counters. We do not mpose ths restrcton when IPID s not monotoncally ncreasng.

7 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX the ACKs are for relatvely large data packets (of sze at least 1000 bytes) to be consstent wth the assumpton of our analyss (n Secton IV). We also exclude ACKs due to expraton of delayed-ack tmers (f delayed ACK s mplemented) snce such an ACK s not released mmedately after ts correspondng data packet, and hence the nter-arrval tme of ths ACK and ts prevous ACK does not reflect the characterstcs of the access lnk. We use the technque n [36] to nfer whether delayed ACK s mplemented, whch further requres that the nter-ack tme of an ACK-par to be below 200 ms. C. Obtanng Inter-ACK Tme Dstrbutons Beforehand To apply sequental hypothess test wth tranng, we need to know the nter-ack tme dstrbutons for Ethernet and WLAN beforehand. In general, the nter-ack tme dstrbuton for a connecton type can be acqured from a tranng set, whch contans TCP flows known to use ths connecton type. We detal how we construct tranng sets for our expermental evaluaton n Secton VII-B; tranng sets for other networks can be constructed n a smlar manner. VII. EVALUATION METHODOLOGY We evaluate the performance of our onlne detecton algorthms through extensve experments. In ths secton, we descrbe our evaluaton methodology, ncludng the measurement equpment, tranng sets, test sets, and offlne and onlne evaluaton. A. Measurement Equpment Our measurement equpment conssts of a commodty PC, nstalled wth a DAG card [6] to capture packet headers. It s placed at the gateway router of UMass, Amherst, connected va an optcal spltter to the access lnk that connects the campus network to the commercal network. The TCP and IP headers of all the packets that traverse ths lnk are captured by the DAG card, along wth the current tmestamp. The captured data are streamed to our onlne detecton algorthms, whch are runnng on the commodty PC. The PC has three Intel Xeon Y 2.80 GHz CPUs (cache sze 512 KB), 2 Gbytes memory, and SCSI hard dsks. B. Tranng Sets Tranng sets are requred to obtan nter-ack tme dstrbutons (see Secton VI-C). We construct tranng sets for our expermental evaluaton as follows. Frst, based on our knowledge on the UMass campus network, we dentfy E and W, denotng the set of IP addresses known to use Ethernet and WLAN respectvely. The set E conssts of IP addresses for hosts usng 100 Mbps Ethernet n the Computer Scence Department. The set W conssts of IP addresses that are reserved for the campus publc WLAN (an network provdng wreless access to campus users at publc places such as the lbrares, campus eateres, etc.). The numbers of IP addresses n E and W are 648 and 1177 respectvely. The tranng set for Ethernet (or WLAN) s constructed by emprcal cumulatve probablty LAN WLAN 0.6 msec mlsecs Fg. 4. Ethernet and WLAN nter-ack tme dstrbutons obtaned from tranng sets (T = 240 µs). extractng TCP flows destned to hosts n E (or W) from a trace collected at the montorng pont. The trace for Ethernet was collected between February and Aprl, In early 2006, g APs were deployed on UMass campus and more users started to use g. Therefore, we collected a new set of traces on 9/29/2006 for WLAN. Note that the tranng set for WLAN contans a mxture of b and g traffc snce a host can use ether b or g dependng on whether ts wreless card and ts assocated AP support g. From the tranng set (for Ethernet or WLAN), we dentfy a sequence of ACK-pars, and dscretze the nter-ack tmes to obtan the nter-ack tme dstrbuton. The dscretzaton s as follows. We dvde the range from 0 to 1 ms nto 50µsbns, and dvde the range from 1 ms to 200 ms (whch s the maxmum value for nter-ack tmes) nto 1ms-bns. Fg. 4 plots the CDFs (Cumulatve Dstrbuton Functon) of the nter-ack tmes for Ethernet and WLAN, where the threshold T = 240 µs. We observe that 2.5% of the nter- ACK tmes for Ethernet hosts are above 600 µs, whle 59.0% of the nter-ack tmes for WLAN hosts are above 600 µs, confrmng our analytcal results n Secton IV (for Ethernet, the observed value s lower than the analytcal result because our analyss s very conservatve; for WLAN, the observed value s between the analytcal results for b and g snce the tranng set contans both types of wreless traffc). C. Test Sets To valdate that our algorthms can detect WLAN hosts and do not msclassfy Ethernet hosts, we construct a WLAN and an Ethernet test set, contanng IP addresses known to use WLAN and Ethernet respectvely. The WLAN test set contans the IP addresses (of 1177 addresses) reserved for the campus publc WLAN. The Ethernet test set contans the IP addresses of a subset of Dell desktops that use Ethernet n the Computer Scence buldng. It contans 258 desktops, each wth documented IP address, MAC address, operatng system, and locaton nformaton for ease of valdaton. Among these desktops, 35% of them use dfferent versons of Wndows operatng system (e.g., Wndows 2000, Wndows ME, Wndows XP); the rest use dfferent varants of Lnux and Unx operatng systems (e.g., RedHat, Solars, CentOS, Fedora Core). These

8 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX hosts are three hops away from the unversty gateway router (and the montorng pont). In addton to these two test sets, we further nvestgate whether our schemes can detect connecton-type swtchngs and wreless traffc behnd a NAT box by conductng addtonal experments n the Computer Scence Department. The total IP space montored n our expermental evaluaton has 3217 addresses: 1177 addresses n the WLAN test set and 2540 addresses n the Computer Scence Department. D. Offlne and Onlne Evaluaton We evaluate both the offlne and onlne performance of our algorthms. In the offlne evaluaton, we frst store the traffc measurements (to the hard dsk) and then apply our algorthms on the collected trace. In the onlne evaluaton, we run our algorthms whle capturng the data at the measurement pont. The offlne evaluaton, although not capturng the targeted operaton mode of our algorthms, allows us to nvestgate the mpact of varous parameters (e.g., T, the threshold to dentfy ACK-pars, K, the threshold n the sequental hypothess tests). The onlne evaluaton nvestgates the performance of our algorthms n ther targeted operaton mode. VIII. EXPERIMENTAL EVALUATION We now descrbe our expermental results. In our experments, the onlne detecton algorthms make a decson (.e., detectng WLAN, Ethernet or undetermned) usng at most N ACK-pars, N = 100. A decson of WLAN or Ethernet s referred to as a detecton. The tme t takes to make a detecton s referred to as detecton tme. Correct detecton rato s the total number correct detectons over the total number of detectons. In the followng, we frst evaluate the performance (n accuracy and promptness) of our onlne detecton algorthms (Sectons VIII-A and VIII-B). We then nvestgate the scalablty of our approach (Secton VIII-C). Afterwards, we demonstrate that our approach s effectve n detectng wreless traffc behnd a NAT box (Secton VIII-D). Last, we show that our approach can quckly detect connecton-type swtchngs (Secton VIII-E) and s robust to hgh CPU, dsk or network utlzatons at end hosts (Secton VIII-F). A. Performance of Sequental Hypothess Test wth Tranng We now nvestgate the performance of sequental hypothess test wth tranng. The Ethernet and WLAN nter-ack tme dstrbutons requred by ths algorthm are obtaned as descrbed n Secton VII-B. We descrbe results from both offlne and onlne evaluatons. 1) Offlne Evaluaton: We collect measurements on three consecutve days, from 10/18/2006 to 10/20/2006. For each day, the duraton of the trace s 6 to 7 hours. The threshold to dentfy ACK-pars, T, s ether 240 µs or 400 µs. The threshold to decde a host s connecton type, K, s ether 10 4, 10 5 or We only descrbe the results for the trace collected on 10/20/2006; the results for the other two days are smlar Ethernet WLAN >300 seconds Fg. 5. Detecton-tme dstrbutons for the trace collected on 10/20/2006 (T = 240 µs, K = 10 6, N = 100). Tables I and II present the detecton results for the WLAN and Ethernet test sets respectvely. In both cases we observe that the detecton results are smlar under dfferent values of T and K, ndcatng that our algorthm s nsenstve to the choce of parameters. For all values of T and K, the detecton results are extremely accurate wth a correct detecton rato above 99.38%. On average, t takes less than 10 ACK-pars (correspondng to 250 to 347 data packets) to make a detecton for WLAN and less than 20 ACK-pars (correspondng to 87 to 124 data packets) for Ethernet. The larger number of data packets for detectng a WLAN host can be explaned as follows. Inter-ACK tmes n WLAN tend to be large (compared to those n Ethernet), thus leadng to large nterarrval tmes between newly trggered data packets (due to TCP s self-clockng mechansm). When nter-arrval tmes of data packets exceed the threshold T, the correspondng ACKs do not qualfy as ACK-pars. Ths s confrmed by the lower ACK-par rato (.e., the number of ACK-pars dvded by the total number of packets) n WLAN traffc shown n Tables I and II. The detecton-tme dstrbutons for both Ethernet and WLAN are shown n Fg. 5, where T = 240 µs and K = The medan detecton tmes are around 1 second and 10 seconds for Ethernet and WLAN, respectvely. The much shorter detecton tme n Ethernet s due to hgher ACK-par ratos. We also observe some cases of long detecton tmes (over 5 mnutes) n the fgure. They mght be caused by users change of actvtes (e.g., a user stops usng the computer to thnk or talk and then resume usng t). Fnally, around 84% of ACK-pars used n WLAN detecton and 89% of ACK-pars used n Ethernet detecton are generated by web traffc, ndcatng that our approach s effectve even for short flows. 2) Onlne Evaluaton: We run our detecton algorthm onlne on three consecutve days, from 10/25/2006 to 10/27/2006. The evaluaton on each day lasts for 6 to 7 hours. We set T = 240 µs and K = 10 6, representng a conservatve selecton of parameters. Table III presents the detecton results for both test sets. We observe consstent results as those n the offlne evaluaton the detecton s hghly accurate and prompt. The average numbers of ACK-pars and data packets

9 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX TABLE I OFFLINE EVALUATION OF SEQUENTIAL HYPOTHESIS TEST WITH TRAINING: RESULTS ON WLANS (10/20/2006). T = 240 µs T = 400 µs K = 10 4 K = 10 5 K = 10 6 K = 10 4 K = 10 5 K = 10 6 Avg. # of ACK-pars for a detecton Avg. # of data pkts for a detecton Medan detecton tme (sec) Number of detectons 12, , 882 8, , , , 169 Correct detecton rato 99.43% 99.59% 99.61% 99.38% 99.53% 99.61% ACK-par rato 2% 2% TABLE II OFFLINE EVALUATION OF SEQUENTIAL HYPOTHESIS TEST WITH TRAINING: RESULTS ON ETHERNET (10/20/2006). T = 240 µs T = 400 µs K = 10 4 K = 10 5 K = 10 6 K = 10 4 K = 10 5 K = 10 6 Avg. # of ACK-pars for a detecton Avg. # of data pkts for a detecton Medan detecton tme (sec) Number of detectons 4, 896 3, 990 3, 363 5, 860 4, 747 4, 002 Correct detecton rato 99.88% % 99.97% 99.61% 99.79% 99.78% ACK-par rato 13% 17% requred for a detecton are also consstent wth those n the offlne evaluaton. B. Performance of Sequental Hypothess Test wthout Tranng We now examne the performance of sequental hypothess test wthout tranng. It takes at most N ACK-pars to make a decson (.e., detectng WLAN or undetermned). We apply ths algorthm to traces collected between 10/18/2006 and 10/20/2006 usng T = 240 µs, K = 10 6, and N = 100. For the Ethernet test set, ths algorthm detects no WLAN host for all the traces, ndcatng that t has no false postves. Ths demonstrates that, although ths algorthm s derved usng analytcal results n Secton IV (n a settng where the recever s one hop away from the router), t s accurate n more general settngs (the Ethernet hosts n the Computer Scence buldng are three hops away from the gateway router). Ths s not surprsng snce ths algorthm s based on an extremely conservatve analyss (assumng that the sngle Ethernet lnk s full utlzed). For the WLAN test set, of all the hosts wth at least one ACK-par, ths algorthm detects 60% to 76% of them as WLAN hosts. Table IV presents the expermental results for the WLAN test set. In general, ths algorthm requres more ACK-pars and longer tme to make a detecton than the algorthm that requres tranng. C. Scalablty Study We nvestgate the scalablty of our approach by examnng the CPU and memory usage on the PC that runs the detecton algorthms (the confguraton of the PC s descrbed n Secton VII-A). Durng onlne evaluaton, we sample the CPU usage at the measurement PC every 30 seconds. The Fg. 6. CDF Maxmum number of un ACKed data packets CDF of the number of tems n the unacked-data-packet queues. maxmum CPU usage s 9.1% (we have made no specal efforts to optmze our mplementaton), ndcatng that the measurement task s well wthn the capablty of a commodty PC. For memory usage, we nvestgate the space taken by the unacked-data-packet queues snce the memory usage manly comes from storng these queues (see Secton VI). Fg. 6 plots the CDF of the maxmum number of tems n each queue for the trace collected on 10/20/2006 (results for other traces are smlar). Ths trace was collected over 7 hours and captures 1.8 mllon TCP flows for the IP addresses beng montored (the maxmum number of concurrent flows s 8244). We observe that most of the queues are very short: 90% of them have less than 3 tems, ndcatng a very low memory usage (each data tem only keeps 14 bytes of data; see Secton VI-A). However, we also observe some long queues. We conjecture that these long queues are due to routng changes or abnormal behavors n the routes. As an optmzaton to our onlne detecton system, we can dscard unacked-data-packet queues longer than a certan threshold.

10 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX TABLE III ONLINE EVALUATION OF SEQUENTIAL HYPOTHESIS TEST WITH TRAINING (10/25/ /27/2006). 10/25/ /26/ /27/2006 WLAN Ethernet WLAN Ethernet WLAN Ethernet Avg. # of ACK-pars for a detecton Avg. # of data pkts for a detecton Medan detecton tme (sec) Number of detectons 23, 266 5, , , , 628 2, 948 Correct detecton rato 99.58% 99.93% 98.44% 99.92% 99.72% 99.76% ACK-par rato 2% 11% 2% 13% 2% 12% TABLE IV EVALUATION OF SEQUENTIAL HYPOTHESIS TEST WITHOUT TRAINING ON WLANS. Date 10/18/ /19/ /20/2006 Detecton rato 68% 76% 60% Avg. # of ACK-pars for a detecton Avg. # of data pkts for a detecton Medan detecton tme (sec) Number of detectons 3, 259 6, 539 2, 722 D. Detectng Wreless Networks behnd NAT We now demonstrate that our approach s equally applcable to detect wreless networks behnd a NAT box. Note that schemes based on MAC addresses (e.g., [9], [4], [10]) fal to detect ths type of wreless traffc, snce all traffc gong through a NAT box have the same MAC address (.e., the MAC address of the NAT box). We look at NAT boxes n two settngs, one confgured by ourselves and the other beng used n the Computer Scence Department. 1) Self-confgured NAT: We confgure a Lnux host A as a NAT box. Host A has two network nterfaces, an Ethernet card and a ZCOMAX ArRunner/XI b wreless card. The Ethernet nterface connects drectly to the Internet. The wreless card s confgured to the master mode usng Host AP [5] so that t acts as an AP. We then set up two laptops B and C to access the Internet through the wreless card of A. When host B or C accesses the Internet, ts packets frst reach host A. Host A then translates the addresses of these packets and forwards them to the Internet through ts Ethernet card. We conduct an experment wth the above setup on 10/26/2006. The experment lasts for about two mnutes. We observe 163 ACK-pars. Among them, 92% of the ACKpars are from web traffc va port 80. The remanng ACKpars are from port 1935, whch s used by Macromeda Flash Communcaton Server MX for the RTMP (Real-Tme Messagng Protocol). The sequental hypothess test wth tranng makes 37 onlne detectons, all as WLAN host. On average, one detecton s made for every 4 ACK-pars. The above results demonstrate that our test can effectvely detect wreless networks behnd NAT boxes. 2) NATs n the Computer Scence Department: Two NAT boxes n the Computer Scence Department provde a free local network to users n the department. A host may use ether Ethernet or WLAN to connect to a NAT box. All traffc through a NAT box wll have the IP address of the NAT box. We montor the IP addresses of these two NAT boxes. Our offlne detecton (from 10/18/2006 to 10/20/2006) and onlne detecton (from 10/25/2006 to 10/27/2006) both ndcate a mxture of WLAN and Ethernet connectons. The ACKpar ratos are hgher than that of WLAN and lower than that of Ethernet hosts, whch are consstent wth the settng that these two NAT boxes provde both WLAN and Ethernet connectons. E. Detectng Connecton-type Swtchngs We next explore a scenaro where an end host swtches between wred and wreless connectons. Our goal s to examne whether our detecton approach can accurately report the connecton-type swtchngs. We use an IBM laptop wth both 100 Mbps Ethernet and 54 Mbps g WLAN connectons. Ths laptop uses a web crawler to download the frst 200 web fles from cnn.com (8.3 Mbytes of data) usng Ethernet, and then swtches to WLAN to download the frst 200 web fles from nytmes.com (6.5 Mbytes of data). Ths process s repeated for three tmes. We run sequental hypothess test wth tranng usng T = 240µs, K = 10 6 and N = 100. Our algorthm makes 284 detectons, 283 correct and one ncorrect. The correct detecton rato s 99.65%. Ths demonstrates that our approach s stll effectve when a host swtches between usng Ethernet and WLAN. F. Detecton under Hgh CPU, Dsk or Network Utlzatons We now nvestgate the performance of our approach when an end host has very hgh CPU, dsk or network utlzatons. The reason for consderng these three factors s that they may drectly and/or ndrectly affect packet arrval tmes at the montorng pont (e.g., a hgh CPU or dsk utlzaton affects packet generaton tmes at the end host, whch further affects packet arrval tmes at the montorng pont), and hence may affect the performance of our approach.

11 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX For the above purpose, we stress ether the CPU, dsk or network connecton of an end host, whle downloadng the frst 200 web fles from cnn.com usng a web crawler at the host. For each scenaro, we conduct experments for both Ethernet and WLAN connectons and detect the connecton type usng sequental hypothess test wth tranng. All experments are conducted on an IBM laptop wth both a 100 Mbps Ethernet and a 54 Mbps g WLAN connecton card. We stress the CPU (utlzaton reachng 100%) by runnng an nfnte loop. For the Ethernet connecton, we observe 1077 ACK-pars and 53 detectons. For the WLAN connecton, we observe 921 ACK-pars and 123 detectons. All the detectons are correct. We stress the hard dsk by runnng a vrus scannng program that scans the dsk. For the Ethernet connecton, we observe 1158 ACK-pars and 57 detectons. For the WLAN connecton, we observe 872 ACK-pars and 84 detectons. Agan, all the detectons are correct. To stress the network connecton, we conduct two sets of experments, one stressng the downlnk drecton by downloadng a large fle from the local network; the other stressng the uplnk drecton by uploadng a large fle to the local network. Note that both cases only generate traffc n the local network, whch s not captured at the montorng pont, and hence does not nterfere wth data montorng. When stressng the downlnk, we observe 848 ACK-pars and 42 detectons for the Ethernet connecton; 660 ACK-pars and 72 detectons for the WLAN connecton. When stressng the uplnk, we observe 438 ACK-pars and 21 detectons for the Ethernet connecton; 487 ACK-pars and 46 detectons for the WLAN connecton. All the detectons are correct. When stressng ether the downlnk or uplnk, we observe sgnfcantly less ACK-pars than those when stressng CPU or dsk. Ths s due to cross traffc generated by the local downloadng or uploadng actvtes. We also observe less ACK-pars when stressng the uplnk than those when stressng the downlnk. Ths s because the uploadng data packets may be nserted between ACKs and lead to less ACK-pars. In summary, the above results ndcate that our detecton approach s effectve even when end hosts have hgh CPU, hard dsk or network utlzatons. IX. DISCUSSION We next dscuss several ssues related to usng our algorthms n practce. A. Heterogeneous Ethernet Backbone The algorthm that requres tranng can be easly extended to a network that supports heterogeneous Ethernet (e.g., 10 Mpbs, 100 Mbps and 1Gbps Ethernet) as follows. Consder a network that supports both 10 Mbps and 100 Mbps Ethernet. In ths case, we obtan the nter-ack tme dstrbutons for both 10 Mbps and 100 Mbps Ethernet through ther correspondng tranng sets. The algorthm calculates two lkelhood ratos, for 10 Mbps and 100 Mbps Ethernet over WLAN, respectvely. The decson s that a host uses 10 Mbps Ethernet, 100 Mbps Ethernet, or WLAN. B. Locaton of Montorng Pont If an nsttuton provdes separate Ethernet and WLAN networks (e.g., for securty purposes), we need to place two montorng ponts, at the gateway routers for the Ethernet and WLAN, respectvely. If a local network s multhomed, and the ncomng and outgong traffc do not traverse the same access lnk, we need to montor multple access lnks smultaneously (recent montorng equpment has ths capablty). C. Usng Our Algorthms n Future Networks A natural queston s whether our algorthms wll stll be effectve n the future, when the bandwdths of Ethernet and WLAN ncrease, and WLAN mght provde smlar or even hgher bandwdth than Ethernet. Our algorthm that requres tranng wll stll be effectve as long as the nter-ack tme dstrbutons of Ethernet and WLAN are suffcently dfferent. For nstance, t s lkely to be effectve n dfferentatng 100 Mbps Ethernet and the emergng n, snce n stll uses CSMA-CA and the wreless channel s half duplex. Our algorthm that requres no tranng s based on the analytcal results of 100 Mbps Ethernet and uses medan nter-ack tme. It mght become less effectve when the bandwdth of WLAN technology approaches or exceeds the bandwdth of Ethernet. X. CONCLUSIONS AND FUTURE WORK In ths paper, we have proposed two onlne algorthms, one requres tranng whle the other does not, to detect wreless traffc based on realtme passve measurements collected at a montorng pont. Extensve experments demonstrated that the algorthm that requres tranng provdes rapd detecton and s extremely accurate; the algorthm that does not requre tranng detects 60%-76% of the wreless hosts wthout any false postves; both algorthms have low computaton and storage overhead. Furthermore, our scheme can detect connecton-type swtchngs and wreless networks behnd a NAT box, and remans effectve for end hosts wth hgh CPU, dsk or network utlzatons. As future work, we are explorng n the followng three drectons: (1) optmze the mplementaton of our algorthms for speed and even lower memory usage; (2) evaluate the performance of our algorthms when a router shapes the traffc (e.g., t may prortze ncomng traffc for QoS consderatons); and (3) explore the mpact of moblty on dfferentatng WLAN and Ethernet traffc. ACKNOWLEDGEMENTS A prelmnary verson of ths paper appeared n IMC 2007 [38]. Ths research was supported n part by the Natonal Scence Foundaton under NSF grants ANI , ANI , ANI , CNS , CNS , CNS , and EIA , and NSF CAREER award Any opnons, fndngs, and conclusons or recommendatons expressed n ths materal are those of the authors and do not necessarly reflect the vews of the fundng agences. We would lke to thank Prof. Rchard S. Ells (UMass, Amherst) and Prof. Guanlng Chen (UMass, Lowell) for

12 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX helpful dscusson. Last, we wsh to thank Rck Tuthll from the Offce of Informaton Technology at UMass, Amherst, for helpng us understand the UMass network archtecture, and for nstallng and managng the montorng equpment. APPENDIX I PROOF OF THEOREM 1 In the Ethernet settng, we gnore the transmsson tme of an ACK snce t s neglgble. For convenence, we ntroduce a tme unt of 30 µs. Measurement studes show that the average packet sze on the Internet s between 300 and 400 bytes [34], [29]. For ease of calculaton, we assume that all cross-traffc packets are 375 bytes. Then the transmsson tme of a crosstraffc packet on a 100 Mbps lnk s 1 tme unt. Recall that A denotes the nter-ack tme of ACKs A 1 and A 3. We dscretze A usng the tme unt and denote the dscretzed value as I A, that s, I A = A /30. Let D denote the nter-departure tme of packets P 1 and P 3 at queue Q D (.e., the queue at the router n the drecton of data packets). Smlarly, we dscretze D and denote the dscretzed value as I D, that s, I D = D /30. We next state three lemmas that are used to prove Theorem 1. Lemma 1: Let Z = I D 8. When ρ D = 1, Z follows a Posson dstrbuton wth the mean of 8 tme unts. Proof: I D contans two components. One component s the transmsson tme of packets P 1 and P 2 at queue Q D, whch s 2 120/30 = 8 tme unts. The other component s the (dscretzed) transmsson tme of the cross-traffc packets that arrve between P 1 and P 3 at queue Q D, denoted as Z. Then Z = I D 8. By the M/D/1 queue assumpton, Z follows a Posson dstrbuton. Furthermore, snce the nterarrval tme of P 1 and P 3 at queue Q D s 2 120/30 = 8 tme unts, on average, 8 cross-traffc packets arrve between P 1 and P 3 at queue Q D. Ths s because, gven ρ D = 1, the arrval rate of cross-traffc packets at queue Q D s 1 packet per tme unt, equal to the processng rate. Therefore, the mean of Z s 8 tme unts. Lemma 2: Suppose I D = x tme unts. When ρ A = 1, the condtonal dstrbuton of I A gven I D follows a Posson dstrbuton wth the mean of x tme unts. Proof: From Fg. 2(a), I A s the same as the nterdeparture tme of ACKs A 1 and A 3 at queue Q A. Snce we assume no other traffc between the router and the recever, the nter-arrval tme of ACKs A 1 and A 3 at queue Q A s the same as I D. Therefore, gven that I D = x tme unts, the number of cross-traffc packets arrvng between A 1 and A 3 at queue Q A follows a Posson dstrbuton wth the mean of x tme unts (followng a reasonng smlar to the proof for Lemma 1). Therefore, the condtonal dstrbuton of I A gven I D = x follows a Posson dstrbuton wth the mean of x tme unts. Lemma 3: When ρ D = ρ A = 1, 8 y 8 e 8 x y e y P(I A x) = (y 8)!! y=8 =0 Proof: Ths follows drectly from Lemmas 1 and 2. We now proceed to prove Theorem 1. Proof: We frst prove the theorem when ρ D = ρ A = 1. Under ths condton, from Lemma 3, by drect calculaton, we have P(I A > 20) = P( A > 600 µs) < We next prove that the theorem also holds when 0 < ρ D < 1 or 0 < ρ A < 1. When 0 < ρ D < 1, the nter-departure tme of data packets P 1 and P 3 at queue Q D s no more than that when ρ D = 1. Smlarly, when 0 < ρ A < 1, the nter-departure tme of ACKs A 1 and A 3 at queue Q A s no more than that when ρ A = 1. Therefore, P( A > 600 µs) < 0.18 also holds when 0 < ρ D < 1 or 0 < ρ A < 1. APPENDIX II PROOF OF THEOREM 2 We frst present a lemma that s used to prove Theorem 2. Lemma 4: Let g(n, q) = n ( n ) = (n+1)/2 q (1 q) n. Then g(n, q) s an ncreasng functon of q, where 0 q 1. Furthermore, lm n g q (n) = 1 for q > 1/2. Proof: We frst prove the monotoncty of the functon g(n, q) wth respect to q. g(n, q) n n! = q!(n )! q 1 (1 q) n = = = = (n+1)/2 n 1 = (n+1)/2 n = (n+1)/2 n 1 = (n+1)/2 n 1 j= (n+1)/2 1 n 1 = (n+1)/2 n!!(n )! (n )q (1 q) n 1 n! ( 1)!(n )! q 1 (1 q) n n!!(n 1)! q (1 q) n 1 n! j!(n j 1)! qj (1 q) n j 1 n!!(n 1)! q (1 q) n 1 n!q (n+1)/2 1 (1 q) n (n+1)/2 ( (n + 1)/2 1)!(n (n + 1)/2 )! 0 Hence g(n, q) s an ncreasng functon of q, 0 q 1. We now prove the second part of the lemma. Assume that {X } s a set of..d Bernoull random varables wth P(X = 1) = q. By the defnton of a bnomal dstrbuton, ( n =1 g q (n) = P X ) (n + 1)/2 1. We have n =1 X n (n/2) + 1 =1 X n (n + 1)/2 =1 X n/2 n. By the strong law of large numbers, we also have n =1 lm X n n (n/2) + 1 = lm =1 X = 2q a.e. n n/2 Therefore, lm n n =1 X (n + 1)/2 = 2q a.e.

13 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX Snce almost sure convergence mples convergence n probablty [33], we have ( n lm P =1 X ) n (n + 1)/2 2q ǫ = 0 ǫ > 0, whch s equvalent to ( n lm P =1 X ) n (n + 1)/2 (2q ǫ, 2q + ǫ) = 1 ǫ > 0. Snce for q > 1/2 and 0 < ǫ < 2q 1, we have ( n =1 1 g q (n) = P X ) (n + 1)/2 1 ( n =1 P X ) (n + 1)/2 (2q ǫ, 2q + ǫ). It follows that lm n g q (n) = 1 for q > 1/2. We now prove Theorem 2. Let (1) A,..., (n) A be the ordered statstc of A 1,..., A n n the ascendng order. For smplcty, we use ξ ṇ 5 ( A) = ( (n+1)/2 ) A regardless of n beng even or odd. Proof: Let u = P( A 600 µs). n ( ) n P(ξ ṇ 5( A ) 600 µs) = u (1 u) n = (n+1)/2 = g(n, u), where g(n, u) s as defned n Lemma 4. By Lemma 4, g(n, q) s an ncreasng functon of q for 0 q 1. By Theorem 1, we know u > = Therefore, we have g(n, u) g(n, 0.82). Hence, P(ξ ṇ 5( A ) 600 µs) g(n, 0.82). By drect calculaton, we have P(ξ ṇ 5 ( A) 600 µs) 1 for 43 n 100. Furthermore, snce 0.82 > 1/2, by Lemma 4, we have lm n P(ξ ṇ 5 ( A) 600 µs) = 1. APPENDIX III PROOF OF THEOREM 3 Before provng Theorem 3, we frst state a lemma that s used n the proof. Lemma 5: Let D,+1 represent the nter-arrval tme of data packets P and P +1 at the AP, = 1, 2, 3. Then P( D,+1 < 1570 µs) 1, P( D,+1 < 325 µs) Proof: Let I,+1 D be the dscretzed value of D,+1,.e., I,+1 D = D,+1 /30. When ρ D = 1, smlar to the proof of Lemma 1, we can show that I,+1 D follows a Posson dstrbuton wth the parameter of 4 tme unts. Then P( D,+1 < 1570µs) > P(I,+1 D = 52) = 52 x=4 4x 4 e 4 (x 4)! 1. When ρ D < 1, the value of D,+1 s less than that when ρ D = 1, and hence P( D,+1 < 1570µs) 1 also holds. Smlarly, we obtan P( D,+1 < 325 µs) We now prove Theorem 3. Proof: Let C denote the condton that D, µs, = 1, 2, 3. Under ths condton, P +1 arrves at the AP before the AP fnshes transmttng P, snce the MAC servce tme of a data packet s at least 1570 µs n 11 Mbps b. Assumng ndependence, we have 3 P(C) = 1570 µs). =1 P( D,+1 From Lemma 5, P(C) 1. Let C denote the complementary condton of C. Then P( A > 600 µs) = P( A > 600 µs C)P(C) + P( A > 600 µs P( A > 600 µs C)P(C) P( A > 600 µs C) C)P( C) We now derve P( A 600 µs C). To satsfy A 600 µs, no data packet can be transmtted between ACKs A 1 and A 3, snce the transmsson tme of a data packet s at least 1570 µs. Therefore, only the followng two sequences are possble: P 2 P 3 A 1 A 3 P 4 and P 2 P 3 P 4 A 1 A 3. We frst derve the probablty that the frst sequence occurs gven condton C. Snce P 2 arrves at the AP before the AP fnshes transmttng P 1, the recever and the AP contend for the wreless channel: the recever needs to transmt ACK A 1 (whch s generated correspondng to packet P 1 ) whle the AP needs to transmt packet P 2. Let φ denote the probablty that A 1 obtans the channel earler than P 2. Snce ths probablty can be affected by many factors (e.g., the tmng when A 1 reaches the MAC layer, when packet P 2 can be transmtted), we assume φ can take any value n [0, 1]. When P 2 transmts earler than A 1, A 1 wll contend wth packet P 3 for the wreless channel. In ths case, we assume that A 1 and P 3 are equally lkely to wn the contenton, snce they can both be transmtted mmedately. To summarze, the probablty that P 2 and P 3 are earler than A 1 s (1 φ) 1/2, the probablty that A 1 and A 3 are earler than P 4 s 1/2 φ (for smlar reasons as descrbed earler). Therefore, the probablty that the frst sequence occurs gven C s (1 φ) 1/2 1/2 φ = φ(1 φ)/4. For the second sequence, the probablty of havng P 2 and P 3 earler than A 1 s (1 φ) 1/2; the probablty that P 4 s earler than A 1 s 1/2. Therefore, the probablty that the second sequence occurs s (1 φ) 1/2 1/2 = (1 φ)/4. In both sequences, to satsfy A 600 µs, we also requre the MAC servce tme of A 3 to be less than 600 µs. The probablty of ths condton beng satsfed s ( )/620 = 92/620. Therefore, P( A 600 µs C) = [φ(1 φ)/4 + (1 φ)/4]92/620 = 1 4 (1 φ2 ) < Hence, P( A > 600 µs) P( A > 600 µs C) > > APPENDIX IV PROOF OF THEOREM 4 Proof: The proof s smlar to that of Theorem 3. Let C denote the condton that D, µs, = 1, 2, 3. Under ths condton, P +1 arrves at the AP before the AP fnshes transmttng P, snce the MAC servce tme of a data packet s at least 325 µs n 54 Mbps g. Then assumng ndependence and from Lemma 5, P(C) We now obtan P( A 600 µs C). To satsfy A 600 µs, there can be at most one data packet transmtted between ACKs A 1 and A 3, snce the mnmum transmsson tme of

14 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX two data packets and one ACK exceeds 600 µs. Ths constrant leads to the followng four possble sequences: P 2 P 3 A 1 A 3 P 4, P 2 P 3 P 4 A 1 A 3, P 2 A 1 P 3 A 3 P 4, and P 2 P 3 A 1 P 4 A 3. The frst two sequences are the same as those n the proof of Theorem 3. They occur wth respectvely the probabltes of φ(1 φ)/4 and (1 φ)/4, where φ s the probablty that ACK A 1 transmts earler than P 2. Followng a smlar reasonng as that n the proof of Theorem 3, the probablty that the thrd sequence occurs s (1 φ) 1/2 1 φ = φ(1 φ)/2, and the probablty that the last sequence occurs s (1 φ) 1/2 1/2 1/2 = (1 φ)/8. For the frst two sequences, we have A 600 µs. For the thrd sequence, to satsfy A 600 µs, we need the total MAC servce tme of P 3 and A 3 to be below 600 µs. Smlarly, for the fourth sequence, to satsfy A 600 µs, we need the total MAC servce tme of P 4 and A 3 to be below 600 µs. Let X and Y denote respectvely the MAC servce tme of a data packet and an ACK. Then for both the thrd and the fourth sequences, we need X+Y 600 µs. Let α = P(X+Y 600 µs). As descrbed n Secton IV-D, X and Y are unformly dstrbuted n [325, 460] µs and [109, 244] µs, respectvely. Then, by a standard technque, we have α = Hence P( A 600 µs C) = φ(1 φ)/4 + (1 φ)/4 + αφ(1 φ)/2 + α(1 φ)/8 = ( 87718φ φ )/ Therefore, P( A > 600 µs) P( A > 600 µs C)P(C) > (1 0.37) = REFERENCES [1] ArDefense, Wreless LAN Securty. [2] ArMagnet. [3] ArWave, ArWave Management Platform. [4] Csco Wreless LAN Soluton Engne (WLSE). [5] Host AP. [6] [7] Mcrosoft Wndows 2000 TCP/IP mplementaton detals, deploy/depovg/tcpp2k.mspx. [8] NetStumbler. [9] Rogue Access Pont Detecton: Automatcally Detect and Manage Wreless Threats to Your Network. [10] A. Adya, V. Bahl, R. Chandra, and L. Qu. Archtecture and technques for dagnosng faults n IEEE nfrastructure networks. In Proc. of ACM MobCom, September [11] P. Bahl, R. Chandra, J. Padhye, L. Ravndranath, M. Sngh, A. Wolman, and B. Zll. Enhancng the securty of corporate W-F networks usng DAIR. In Proc. of ACM MobSys, June [12] V. Baamonte, K. Papagannak, and G. Iannaccone. Detectng wreless hosts from remote passve observatons. In Proc. IFIP/TC6 Networkng, Atlanta, GE, May [13] R. Beyah, S. Kangude, G. Yu, B. Strckland, and J. Copeland. Rogue access pont detecton usng temporal traffc characterstcs. In GLOBE- COM, December [14] A. A. Cardenas, S. Radosavac, and J. S. Baras. An analytcal evaluaton of MAC layer msbehavor detecton schemes. In Proc. of IEEE INFOCOM, Anchorage, Alaska, May [15] G. Casella and R. L. Berger. Statstcal Inference. Duxbury Thomson Learnng, [16] R. Chandra, J. Padhye, A. Wolman, and B. Zll. A locaton-based management system for enterprse wreless LANs. In Proc. of Networked Systems Desgn & Implementaton (NSDI), Aprl [17] W. Chen, Y. Huang, B. F. Rbero, K. Suh, H. Zhang, E. de Souza e Slva, J. Kurose, and D. Towsley. Explotng the IPID feld to nfer network path and end-system characterstcs. In Proceedngs of Passve & Actve Measurement Workshop (PAM 2005), Boston, MA, [18] L. Cheng and I. Marsc. Fuzzy reasonng for wreless awareness. Internatonal Journal of Wreless Informaton Networks, 8(1), [19] Y.-C. Cheng, J. Bellardo, P. Benko, A. C. Snoeren, G. M. Voelker, and S. Savage. Jgsaw: Solvng the puzzle of enterprse analyss. In Proc. of ACM SIGCOMM, Psa, Italy, September [20] S. Garg, M. Kappes, and A. S. Krshnakumar. On the effect of contenton-wndow szes n IEEE b networks. Techncal Report ALR , Avaya Labs Research, [21] IEEE , a, b standards for wreless local area networks. [22] S. Jaswal, G. Iannaccone, C. Dot, J. Kurose, and D. Towsley. Measurement and classfcaton of out-of-sequence packets n a ter-1 IP backbone. In Proc. of IEEE INFOCOM, March [23] S. Jaswal, G. Iannaccone, C. Dot, J. Kurose, and D. Towsley. Inferrng TCP connecton characterstcs through passve measurements. In Proc. of IEEE INFOCOM, March [24] J. Jung, V. Paxson, A. W. Berger, and H. Balakrshnan. Fast portscan detecton usng sequental hypothess testng. In Proc. IEEE Symposum on Securty and Prvacy, May [25] M. L, I. Koutsopoulos, and R. Poovendran. Optmal jammng attacks and network defense polces n wreless sensor networks. In Proc. of IEEE INFOCOM, Anchorage, Alaska, May [26] L. Ma, A. Y. Teymoran, and X. Cheng. A hybrd rogue access pont protecton framework for commodty W-F networks. In Proc. of IEEE INFOCOM, Aprl [27] R. Mahajan, M. Rodrg, D. Wetherall, and J. Zahorjan. Analyzng the MAC-level behavor of wreless networks n the wld. In Proc. of ACM SIGCOMM, Psa, Italy, September [28] C. Mano, A. Blach, Q. Lao, Y. Jang, D. Salyers, D. Ceslak, and A. Stregel. RIPPS: Rogue dentfyng packet payload slcer detectng unauthorzed wreless hosts through network traffc condtonng. ACM Transactons on Informaton Systems and Securty, 11(2), March [29] Packet trace analyss. [30] S. Radosavac, J. Baras, and I.Koutsopoulos. A framework for MAC protocol msbehavor detecton n wreless networks. In Proc. of ACM Workshop on Wreless Securty (WSe), Cologne, Germany, September [31] P. Sarolaht and A. Kuznetsov. Congeston control n Lnux TCP. In Proc. of USENIX, June [32] A. Sheth, C. Doerr, D. Grunwald, R. Han, and D. C. Scker. MOJO: A dstrbuted physcal layer anomaly detecton system for WLANs. In Proc. of ACM MobSys, June [33] A. N. Shryaev. Probablty. Sprnger, second edton, [34] K. Thompson, G. Mller, and R. Wlder. Wde-area Internet traffc patterns and characterstcs. IEEE Network, 11(6):10 23, Nov./Dec [35] A. Wald. Sequental Analyss. J. Wley & Sons, [36] W. We, S. Jaswal, J. Kurose, and D. Towsley. Identfyng traffc from passve measurements usng teratve Bayesan nference. Techncal Report 05-47, Department of Computer Scence, Unversty of Massachusetts, Amherst, [37] W. We, S. Jaswal, J. Kurose, and D. Towsley. Identfyng traffc from passve measurements usng teratve Bayesan nference. In Proc. of IEEE INFOCOM, Aprl [38] W. We, K. Suh, B. Wang, Y. Gu, J. Kurose, and D. Towsley. Passve onlne rogue access pont detecton usng sequental hypothess testng wth TCP ACK-pars. In Proc. of ACM SIGCOMM Internet Measurement Conference (IMC), October [39] W. We, B. Wang, C. Zhang, J. Kurose, and D. Towsley. Classfcaton of access network types: Ethernet, wreless LAN, ADSL, cable modem or dalup? In Proc. of IEEE INFOCOM, March [40] J. Yeo, M. Youssef, and A. Agrawala. A framework for wreless LAN montorng and ts applcatons. In Proc. of ACM Workshop on Wreless Securty (WSe), October [41] J. Yeo, M. Youssef, T. Henderson, and A. Agrawala. An accurate technque for measurng the wreless sde of wreless networks. In Proc. of USENIX/ACM Workshop on Wreless Traffc Measurements and Modelng (WTMeMo), June [42] H. Yn, G. Chen, and J. Wang. Detectng protected layer-3 rogue APs. In Proc. of IEEE Internatonal Conference on Broadband Communcatons, Networks, and Systems (BROADNETS), Ralegh, NC, September 2007.

398 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 3, MARCH 2009

398 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 3, MARCH 2009 398 IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. 8, NO. 3, MARCH 2009 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member,

More information

Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs

Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs Passive Online Rogue Access Point Detection Using Sequential Hypothesis Testing with TCP ACK-Pairs Wei Wei United Technologies Research Center Yu Gu University of Massachusetts, Amherst Kyoungwon Suh Illinois

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna wangtngzhong2@sna.cn Abstract.

More information

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika.

VRT012 User s guide V0.1. Address: Žirmūnų g. 27, Vilnius LT-09105, Phone: (370-5) 2127472, Fax: (370-5) 276 1380, Email: info@teltonika. VRT012 User s gude V0.1 Thank you for purchasng our product. We hope ths user-frendly devce wll be helpful n realsng your deas and brngng comfort to your lfe. Please take few mnutes to read ths manual

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE ena@chana.tecrete.gr Abstract: Durng a computer conference, users desre

More information

Traffic State Estimation in the Traffic Management Center of Berlin

Traffic State Estimation in the Traffic Management Center of Berlin Traffc State Estmaton n the Traffc Management Center of Berln Authors: Peter Vortsch, PTV AG, Stumpfstrasse, D-763 Karlsruhe, Germany phone ++49/72/965/35, emal peter.vortsch@ptv.de Peter Möhl, PTV AG,

More information

Vembu StoreGrid Windows Client Installation Guide

Vembu StoreGrid Windows Client Installation Guide Ser v cepr ov dered t on Cl enti nst al l at ongu de W ndows Vembu StoreGrd Wndows Clent Installaton Gude Download the Wndows nstaller, VembuStoreGrd_4_2_0_SP_Clent_Only.exe To nstall StoreGrd clent on

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ

Efficient Striping Techniques for Variable Bit Rate Continuous Media File Servers æ Effcent Strpng Technques for Varable Bt Rate Contnuous Meda Fle Servers æ Prashant J. Shenoy Harrck M. Vn Department of Computer Scence, Department of Computer Scences, Unversty of Massachusetts at Amherst

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France Olver.aul@nt-evry.fr, Jean-Etenne.Kba@nt-evry.fr Abstract As networked

More information

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks

Analysis of Energy-Conserving Access Protocols for Wireless Identification Networks From the Proceedngs of Internatonal Conference on Telecommuncaton Systems (ITC-97), March 2-23, 1997. 1 Analyss of Energy-Conservng Access Protocols for Wreless Identfcaton etworks Imrch Chlamtac a, Chara

More information

The OC Curve of Attribute Acceptance Plans

The OC Curve of Attribute Acceptance Plans The OC Curve of Attrbute Acceptance Plans The Operatng Characterstc (OC) curve descrbes the probablty of acceptng a lot as a functon of the lot s qualty. Fgure 1 shows a typcal OC Curve. 10 8 6 4 1 3 4

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Poltecnco d Torno Porto Insttutonal Repostory [Artcle] A cost-effectve cloud computng framework for acceleratng multmeda communcaton smulatons Orgnal Ctaton: D. Angel, E. Masala (2012). A cost-effectve

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye cjngwe@stanford.edu mchen5@stanford.edu nanye@stanford.edu Abstract - Stock market s one of the most complcated systems

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

Updating the E5810B firmware

Updating the E5810B firmware Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy

Answer: A). There is a flatter IS curve in the high MPC economy. Original LM LM after increase in M. IS curve for low MPC economy 4.02 Quz Solutons Fall 2004 Multple-Choce Questons (30/00 ponts) Please, crcle the correct answer for each of the followng 0 multple-choce questons. For each queston, only one of the answers s correct.

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

Hosted Voice Self Service Installation Guide

Hosted Voice Self Service Installation Guide Hosted Voce Self Servce Installaton Gude Contact us at 1-877-355-1501 learnmore@elnk.com www.earthlnk.com 2015 EarthLnk. Trademarks are property of ther respectve owners. All rghts reserved. 1071-07629

More information

Automating Analysis of Large-Scale Botnet Probing Events

Automating Analysis of Large-Scale Botnet Probing Events Automatng Analyss of Large-Scale Botnet Probng Events Zhchun L, Anup Goyal and Yan Chen Northwestern Unversty 2145 Sherdan Road Evanston, IL, USA {lzc,ago210,ychen}@cs.northwestern.edu Vern Paxson UC Berkeley

More information

A graph-theoretic framework for isolating botnets in a network

A graph-theoretic framework for isolating botnets in a network SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks (212) Publshed onlne n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 SPECIAL ISSUE PAPER A graph-theoretc framework for solatng botnets n a network

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments

Performance Analysis and Comparison of QoS Provisioning Mechanisms for CBR Traffic in Noisy IEEE 802.11e WLANs Environments Tamkang Journal of Scence and Engneerng, Vol. 12, No. 2, pp. 143149 (2008) 143 Performance Analyss and Comparson of QoS Provsonng Mechansms for CBR Traffc n Nosy IEEE 802.11e WLANs Envronments Der-Junn

More information

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm

Optimization Model of Reliable Data Storage in Cloud Environment Using Genetic Algorithm Internatonal Journal of Grd Dstrbuton Computng, pp.175-190 http://dx.do.org/10.14257/gdc.2014.7.6.14 Optmzaton odel of Relable Data Storage n Cloud Envronment Usng Genetc Algorthm Feng Lu 1,2,3, Hatao

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc.

The Use of Analytics for Claim Fraud Detection Roosevelt C. Mosley, Jr., FCAS, MAAA Nick Kucera Pinnacle Actuarial Resources Inc. Paper 1837-2014 The Use of Analytcs for Clam Fraud Detecton Roosevelt C. Mosley, Jr., FCAS, MAAA Nck Kucera Pnnacle Actuaral Resources Inc., Bloomngton, IL ABSTRACT As t has been wdely reported n the nsurance

More information

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features

On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: ruoyu.l@skf.com

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He changhua@stanford.edu Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Canon NTSC Help Desk Documentation

Canon NTSC Help Desk Documentation Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

Efficient Project Portfolio as a tool for Enterprise Risk Management

Efficient Project Portfolio as a tool for Enterprise Risk Management Effcent Proect Portfolo as a tool for Enterprse Rsk Management Valentn O. Nkonov Ural State Techncal Unversty Growth Traectory Consultng Company January 5, 27 Effcent Proect Portfolo as a tool for Enterprse

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

Fault tolerance in cloud technologies presented as a service

Fault tolerance in cloud technologies presented as a service Internatonal Scentfc Conference Computer Scence 2015 Pavel Dzhunev, PhD student Fault tolerance n cloud technologes presented as a servce INTRODUCTION Improvements n technques for vrtualzaton and performance

More information

An Empirical Study of Search Engine Advertising Effectiveness

An Empirical Study of Search Engine Advertising Effectiveness An Emprcal Study of Search Engne Advertsng Effectveness Sanjog Msra, Smon School of Busness Unversty of Rochester Edeal Pnker, Smon School of Busness Unversty of Rochester Alan Rmm-Kaufman, Rmm-Kaufman

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

Reliable State Monitoring in Cloud Datacenters

Reliable State Monitoring in Cloud Datacenters Relable State Montorng n Cloud Datacenters Shcong Meng Arun K. Iyengar Isabelle M. Rouvellou Lng Lu Ksung Lee Balaj Palansamy Yuzhe Tang College of Computng, Georga Insttute of Technology, Atlanta, GA

More information

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters

Frequency Selective IQ Phase and IQ Amplitude Imbalance Adjustments for OFDM Direct Conversion Transmitters Frequency Selectve IQ Phase and IQ Ampltude Imbalance Adjustments for OFDM Drect Converson ransmtters Edmund Coersmeer, Ernst Zelnsk Noka, Meesmannstrasse 103, 44807 Bochum, Germany edmund.coersmeer@noka.com,

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

End-to-end measurements of GPRS-EDGE networks have

End-to-end measurements of GPRS-EDGE networks have End-to-end measurements over GPRS-EDGE networks Juan Andrés Negrera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo, Uruguay Javer Perera Facultad de Ingenería, Unversdad de la Repúblca Montevdeo,

More information

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop

IWFMS: An Internal Workflow Management System/Optimizer for Hadoop IWFMS: An Internal Workflow Management System/Optmzer for Hadoop Lan Lu, Yao Shen Department of Computer Scence and Engneerng Shangha JaoTong Unversty Shangha, Chna lustrve@gmal.com, yshen@cs.sjtu.edu.cn

More information

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11

MAC Layer Service Time Distribution of a Fixed Priority Real Time Scheduler over 802.11 Internatonal Journal of Software Engneerng and Its Applcatons Vol., No., Aprl, 008 MAC Layer Servce Tme Dstrbuton of a Fxed Prorty Real Tme Scheduler over 80. Inès El Korb Ecole Natonale des Scences de

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu

EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP. Kun-chan Lan and Tsung-hsun Wu EVALUATING THE PERCEIVED QUALITY OF INFRASTRUCTURE-LESS VOIP Kun-chan Lan and Tsung-hsun Wu Natonal Cheng Kung Unversty klan@cse.ncku.edu.tw, ryan@cse.ncku.edu.tw ABSTRACT Voce over IP (VoIP) s one of

More information

CISCO SPA500G SERIES REFERENCE GUIDE

CISCO SPA500G SERIES REFERENCE GUIDE CISCO SPA500G SERIES REFERENCE GUIDE Part of the Csco Small Busness Pro Seres, the SIP based Csco SPA504G 4-Lne IP phone wth 2-port swtch has been tested to ensure comprehensve nteroperablty wth equpment

More information

Study on Model of Risks Assessment of Standard Operation in Rural Power Network

Study on Model of Risks Assessment of Standard Operation in Rural Power Network Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School

Robust Design of Public Storage Warehouses. Yeming (Yale) Gong EMLYON Business School Robust Desgn of Publc Storage Warehouses Yemng (Yale) Gong EMLYON Busness School Rene de Koster Rotterdam school of management, Erasmus Unversty Abstract We apply robust optmzaton and revenue management

More information

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES

FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES FREQUENCY OF OCCURRENCE OF CERTAIN CHEMICAL CLASSES OF GSR FROM VARIOUS AMMUNITION TYPES Zuzanna BRO EK-MUCHA, Grzegorz ZADORA, 2 Insttute of Forensc Research, Cracow, Poland 2 Faculty of Chemstry, Jagellonan

More information

In some supply chains, materials are ordered periodically according to local information. This paper investigates

In some supply chains, materials are ordered periodically according to local information. This paper investigates MANUFACTURING & SRVIC OPRATIONS MANAGMNT Vol. 12, No. 3, Summer 2010, pp. 430 448 ssn 1523-4614 essn 1526-5498 10 1203 0430 nforms do 10.1287/msom.1090.0277 2010 INFORMS Improvng Supply Chan Performance:

More information

Enabling P2P One-view Multi-party Video Conferencing

Enabling P2P One-view Multi-party Video Conferencing Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P

More information

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and

This article appeared in a journal published by Elsevier. The attached copy is furnished to the author for internal non-commercial research and Ths artcle appeared n a journal publshed by Elsever. The attached copy s furnshed to the author for nternal non-commercal research and educaton use, ncludng for nstructon at the authors nsttuton and sharng

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Evaluating credit risk models: A critique and a new proposal

Evaluating credit risk models: A critique and a new proposal Evaluatng credt rsk models: A crtque and a new proposal Hergen Frerchs* Gunter Löffler Unversty of Frankfurt (Man) February 14, 2001 Abstract Evaluatng the qualty of credt portfolo rsk models s an mportant

More information

Checkng and Testng in Nokia RMS Process

Checkng and Testng in Nokia RMS Process An Integrated Schedulng Mechansm for Fault-Tolerant Modular Avoncs Systems Yann-Hang Lee Mohamed Youns Jeff Zhou CISE Department Unversty of Florda Ganesvlle, FL 326 yhlee@cse.ufl.edu Advanced System Technology

More information

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment

Survey on Virtual Machine Placement Techniques in Cloud Computing Environment Survey on Vrtual Machne Placement Technques n Cloud Computng Envronment Rajeev Kumar Gupta and R. K. Paterya Department of Computer Scence & Engneerng, MANIT, Bhopal, Inda ABSTRACT In tradtonal data center

More information

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems

An Analysis of Central Processor Scheduling in Multiprogrammed Computer Systems STAN-CS-73-355 I SU-SE-73-013 An Analyss of Central Processor Schedulng n Multprogrammed Computer Systems (Dgest Edton) by Thomas G. Prce October 1972 Techncal Report No. 57 Reproducton n whole or n part

More information

SIMPLE LINEAR CORRELATION

SIMPLE LINEAR CORRELATION SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.

More information

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS

IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS IDENTIFICATION AND CORRECTION OF A COMMON ERROR IN GENERAL ANNUITY CALCULATIONS Chrs Deeley* Last revsed: September 22, 200 * Chrs Deeley s a Senor Lecturer n the School of Accountng, Charles Sturt Unversty,

More information

Performance modeling and analysis of mobile Internet access via cellular networks

Performance modeling and analysis of mobile Internet access via cellular networks Performance modelng and analyss of moble Internet access va cellular networks Master s thess Author: Taoyng Yuan Emal: tyuan@few.vu.nl Student ID: #1430610 Unversty: Supervsors: Vrje Unverstet Amsterdam

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network)

How To Plan A Network Wide Load Balancing Route For A Network Wde Network (Network) Network-Wde Load Balancng Routng Wth Performance Guarantees Kartk Gopalan Tz-cker Chueh Yow-Jan Ln Florda State Unversty Stony Brook Unversty Telcorda Research kartk@cs.fsu.edu chueh@cs.sunysb.edu yjln@research.telcorda.com

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

7.5. Present Value of an Annuity. Investigate

7.5. Present Value of an Annuity. Investigate 7.5 Present Value of an Annuty Owen and Anna are approachng retrement and are puttng ther fnances n order. They have worked hard and nvested ther earnngs so that they now have a large amount of money on

More information

Design and Development of a Security Evaluation Platform Based on International Standards

Design and Development of a Security Evaluation Platform Based on International Standards Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School

More information

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW.

SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. SUPPLIER FINANCING AND STOCK MANAGEMENT. A JOINT VIEW. Lucía Isabel García Cebrán Departamento de Economía y Dreccón de Empresas Unversdad de Zaragoza Gran Vía, 2 50.005 Zaragoza (Span) Phone: 976-76-10-00

More information

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements

CS 2750 Machine Learning. Lecture 3. Density estimation. CS 2750 Machine Learning. Announcements Lecture 3 Densty estmaton Mlos Hauskrecht mlos@cs.ptt.edu 5329 Sennott Square Next lecture: Matlab tutoral Announcements Rules for attendng the class: Regstered for credt Regstered for audt (only f there

More information

On the Optimal Control of a Cascade of Hydro-Electric Power Stations

On the Optimal Control of a Cascade of Hydro-Electric Power Stations On the Optmal Control of a Cascade of Hydro-Electrc Power Statons M.C.M. Guedes a, A.F. Rbero a, G.V. Smrnov b and S. Vlela c a Department of Mathematcs, School of Scences, Unversty of Porto, Portugal;

More information

1 Example 1: Axis-aligned rectangles

1 Example 1: Axis-aligned rectangles COS 511: Theoretcal Machne Learnng Lecturer: Rob Schapre Lecture # 6 Scrbe: Aaron Schld February 21, 2013 Last class, we dscussed an analogue for Occam s Razor for nfnte hypothess spaces that, n conjuncton

More information

Brigid Mullany, Ph.D University of North Carolina, Charlotte

Brigid Mullany, Ph.D University of North Carolina, Charlotte Evaluaton And Comparson Of The Dfferent Standards Used To Defne The Postonal Accuracy And Repeatablty Of Numercally Controlled Machnng Center Axes Brgd Mullany, Ph.D Unversty of North Carolna, Charlotte

More information

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA*

HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* HOUSEHOLDS DEBT BURDEN: AN ANALYSIS BASED ON MICROECONOMIC DATA* Luísa Farnha** 1. INTRODUCTION The rapd growth n Portuguese households ndebtedness n the past few years ncreased the concerns that debt

More information

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS

A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS A GENERIC HANDOVER DECISION MANAGEMENT FRAMEWORK FOR NEXT GENERATION NETWORKS Shanthy Menezes 1 and S. Venkatesan 2 1 Department of Computer Scence, Unversty of Texas at Dallas, Rchardson, TX, USA 1 shanthy.menezes@student.utdallas.edu

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000

Number of Levels Cumulative Annual operating Income per year construction costs costs ($) ($) ($) 1 600,000 35,000 100,000 2 2,200,000 60,000 350,000 Problem Set 5 Solutons 1 MIT s consderng buldng a new car park near Kendall Square. o unversty funds are avalable (overhead rates are under pressure and the new faclty would have to pay for tself from

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information