Attack graph analysis using parallel algorithm
|
|
|
- Deborah Stone
- 10 years ago
- Views:
Transcription
1 Attack graph analysis using parallel algorithm Dr. Jamali Mohammad Ashraf Vahid, MA student of computer software, Shabestar Azad University Ashraf Vida, MA student of General Linguistics, Razi University of Kermanshah Abstract Each attack graph shows a set of scenarios of penetrating a computer network. A penetration scenario actually defines the order of steps that an intrudor should take to achieve his goal, and each step is characterized to show which host must be abused. A specified weight is attributed to every abuse in each stpes by analyst. The atributted weight is proportional to a required cost to prevent the abuse. In this paper disadvantages of a network are gathered in a graph and analysed by a parallel algorithm. In a way that allthe available path in the graph which represent successful scenarios processed concurrently, and from each path a node with the least possible cost is selected which correspondes to an abuse. Eventually we have minimal set of disadvantages with the least prevention cost, and by preventing the happening of this mininal set no penetration scenario is applicable on our analytical network. Keywords: attack graph, network graph, parallel algorithm. 1 Introduction In todays networks most of successful attacks contain sequence of abuses such that in each exploitation of specific abuse, an intruder increases the degree of vulnerabilities for the next steps in order to take the desired steps to achieve their ultimate goal [2]. Philips and Swiler(1998) argued the concept of the attack graph for the first time [3]. Each attack graph is a set of scenarios in a way that each path from beginning node to aimed node in the graph represent a scenario that describe the situation of the intruder from the begining till achieving the aimed point [4]. In order to study and analyse the attack graph, Sheyner et al.(2002) used a model checker which they called NUSMV. Defects of a network in this model was gather in an xml file by different network software and finally by using the current information they showed the attack graph in a graphical way [5], Subsequently Noel et al.(2005) offered optimum ways of presenting an attack graph [6].
2 Attack graph analysis help us to make a minimal set of abuses by preventing which no abuses would be exploited. Jha et al.(2002) by considering this problem proved that the solution could be find in the category of NP-HARD problems[10]. They represent an approximate solution to find the almost optimum set. In order to analyse the attack graph, Abadi and Jalili(2007) used a genetic algorithms [7]. Ashraf(2010), in his proposed solution used the parallel genetic algorithms in a way that evaluate the achieved optimum algorithm of Abadi and Jalili faster [8]. In some of the proposed methods [5],[9] of the attack graph analysis weight of abuses is not mentioned but in this paper, by considering the cost of preventing each abuse, analizer dedicates a weight to each of them and finally the minimal set must have the least possible weight. The proposed algorithm named parallel-wag study all scenarios in a parallel way and eventually in the minimum time represents the minimal set. In the experiments we used five attack graphs that contained. After doing experiments and analogies, it would be clear that in addition to accelerating performance, compared to other algorithms that give probable and undecisive answers, this algorithm gives a decisive answer. In this paper we will argue the network security model in the second part, the proposed algorithm in the third part, and in the forth part the algorithm would be implemented and executed by the use of multi pascal simulator and the results will be discussed. 2 Description of the network security model As networks include lots of software and hardware most of which does not interfere with the attack space, we select six members of the network to make an attack model that contains adequate information for representation of each network and the attack scenario. Any security model of a computer network can be defined as a tuple (H,C,T,E,R,IDS) in which H is a set of hosts connected to the network, C is a relationship, T is a trust link between hosts, E is a set of known abuses, R is a model of intruder, and IDS a model of intrusion detection system [1]. In coming sections we will review the network components. 2.1 hosts In the intrusion scenrio each steps targets a host and makes use of the defects of the softwares or bad configuration to facilitate the intruder. The purpose of modeling hosts is to obtain information about components that could be useful in exploiting the defects. Each network host is a foursome (id,svcs,plvl,vuls) in which id is a host's unique identifier, svcs is a set of running services on hosts, plvl shows the degree of intruder access to host. For simplicity, it is assumed that there are only three level of access namely; none, root, user. 2.2 network conectivity
3 Set of network connectionss defined as a ternary relationship in which P is a set of port numbers, each connection is triad (h s,h t,p) in which h s is a source host, h t is destination host and p is the destination port number. Note that the connection relationship take into consideration the firewalls and other factors that limit the abilities of the other host. 2.3 trust Trust is modeled as a twosome relationship in which T and T(h t,h s ) shows that a user may enter to h t host without confirming the authenticity from h s host. 2.4 services Set of services is a list of independent names for each service on the hosts. We separate softwares from services because network services are often the means of exploiting. Services are also associated with connections. Port numbers and information services should be specified in the host model, so that each service name in the list of host services is taken from the name of services in the service model. 2.5 Intrusion Detection System We relate a logical variable to each action which defines whether IDS has the identification power or not. According to IDS the actions are divided into two categories; if an action is detectable the system will alarm and otherwise it will not realize its running 2.6 actions Any misuse of is a pentamerous (pre,h s,h t,post,cost) in which pre is the list of preconditions that is defined based on networks connections, services, the existing vulnerabilities and degree of access required for source and destination hosts. h s is a host starts an abuse. H t is a host which is a destined to abuse. Post will show the effects of abuses. For simplicity, it is assumed that the required cost for prevention of each abuse is low, medium, high, very high. 3 The proposed algorithm Figure 1. Generation Process of Attack Graph In the proposed algorithm, parallel-wag acts in a way that an array is received from the scenarios and simultaneaously each precessor eliminates an abuse and finds out each scenario that hit with actions and remove them from the set of primary scenarios. The
4 process will be continued till no executable scenario remains. For this algorithm runs simultaneously each processor should remove abuses such that the ultimate achieved set is not like other processors. For this purpose, in each cycle with the replacement of abuses the mother CPU operates in a way that two processors may not remove one abuse at the same time. The proposed algorithm is given by: As you can see in the above algorithm, scenario arrays and the number of actions are Global: Senarioarray : two dimontion array N : integer Procedure parallelwag Input: actionarray,remainsenarioarray,remainsenariocount,level begin END defined in a parallel form, and the function recursively calls itself and obtain all critical sets. By having all critical sets at hand one can easily select an optimum critical set and certainly there would be no other optimum set better than this. 4 Experiments If remainsenariocount=0 begin end Else begin End For i=1 to level-1 Print actionarray[i] For i=level to n Swap(actionarray[i], actionarray[level]) For j=1 to remainsenariocount Remove each senario[j] that hit with action[level] of remainsenarioarray Fork prallelwag(actionarray,remainsenarioarray,remainsenariocount,k+1) In this section, we describe the cunducted experiments to evaluate the parallelwag algorithm.
5 It should be noted that experiments are performed on a machin with Intel 2.7 processor, 1 GB memory, and XP operation system, as well as a multi pascal enviroment and PRAM model is used to simulate a parallel machine. In table 1, five weighted attack graphs that have been randomly generated are shown, and in these attack graphs it is exploited from 20 abuses with the maximum scenario length of 5 and the required weights for preventing abuses are considered 5,1 or 10. senarios sum of weight avrage weight in senario avrage cardinality wag wag wag wag wag Table1. Weighted attack graphs The results of the execution of a prallelwag algorithm in the above attach graphs are shown in table 2. cardinality of critical set weight critical set wag1 3 7 wag2 4 8 wag wag wag Table 2. The results of parallelwag In table 2, the number of a critical set members as well as their weight are shown by preventing which, all attack to the network will be blocked with the lowest cost. In figure 2, the cycle of the required time for performing an algorithm in the parallel and sequential form, as well as degree of speed up are shown. To review all three figures together, we divide the resulting number once to and once to 100 for sequential and parallel mode respectively in order to make the numbers closer to each other to be able to show in one graph.
6 wag1 wag2 wag3 wag4 wag5 parallel/100 seq/10000 speedup Figure 2. Algorithm requierd cycles As is clear in figure 2, as the number of scenarios increases, the sequential time grows significantly while in the parallel form the number of cycle grows a little. 5 conclusions In this paper we proposed an algorithm to evaluate an attack graph in parallel form and an optimum set in the entire network by preventing which all the attack to the network would be failed with the lowest cost. In the past Sheyner et al., and Jalili, Abadi and Ashraf et al. presented a huristic algorithm, the result of which was not a definit answer, while in the proposed algorithm described above the definite answer will be obtained in a minimum time. As you can see in the result of experiments, parallel performance time of algorithm grows a little as the number of scenarios increases while in the sequential form grows much more, thus in a network with a large number of defined scenarios practically executing a graph in the sequential mode takes so many years time but in parallel mode a little time is reqiured to obtain a definite answer. Since there is no program to do processing on CPU in this algorithm, this paper paves the ways for further studis to devise an algorithm which considers load_balancing on CPUs. 6 Refrences [1] P. Ammann, J. Pamula, R. Ritchey, and J. Street, "A host-based approach to network attack chaining analysis," in Proc. Annual Computer Security Applications Conf., pp , Tucson, US, Dec [2] C. Ramakrishnan and R. Sekar, "Model-based vulnerability analysis of computer systems," in Proc. 2nd Int. Workshop on verification Model Checking and Abstract Interpretation, pp [3] C. A. Phillips and L. P. Swiler, "A graph-based system for network vulnerability analysis," in Proc New Security Paradigms Workshop, pp , Charlottesville 1998.
7 [4] O. Sheyner, Scenario Graphs and Attack Graphs, Ph.D. Thesis, Carnegie Mellon University, Apr [5] O. Sheyner, J. Haines, S. Jha, R. Lippmann, and J. M. Wing, "Automated generation and analysis of attack graphs," in Proc. IEEE Symposium on Security and Privacy, pp , Oakland, US, May [6] S. Noel and S. Jajodia, "Managing attack graph complexity through visual hierarchical aggregation," in Proc. ACM CCS Workshop on Visualization and Data Mining for Computer Security, pp , Washington DC, US, Oct [7] M. Abadi and S. Jalili, "Applying genetic algorithms for minimization analysis of network attack graphs," in Proc. 11th Int. CSI Computer Conf., pp , Tehran, Jan [8] V. Ashraf and A.Gholami, " Attack graph analysis using genetic-parallel algorithm" [9] D. E. Goldberg, Genetic Algorithms in Search, Optimization and Machine Learning, Addison Wesley, Reading, MA, [10] S. Jha, O. Sheyner, and J. M. Wing, "Two formal analyses of attack graphs," in Proc. 15th IEEE Computer Security Foundations Workshop, pp , Nova Scotia, Canada, Jun
Scalable, Graph-Based Network Vulnerability Analysis
Scalable, Graph-Based Network Vulnerability Analysis Paul Ammann ISE Department, MS 4A4 Center for Secure Inf. Sys. George Mason University Fairfax, VA 22030, U.S.A. +1 703 993 1660 [email protected] Duminda
VEA-bility Security Metric: A Network Security Analysis Tool
VEA-bility Security Metric: A Network Security Analysis Tool Melanie Tupper Dalhousie University [email protected] A. Nur Zincir-Heywood Dalhousie University [email protected] Abstract In this work, we propose
Parametric Attack Graph Construction and Analysis
Parametric Attack Graph Construction and Analysis Leanid Krautsevich Department of Computer Science, University of Pisa Largo Bruno Pontecorvo 3, Pisa 56127, Italy Istituto di Informatica e Telematica,
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting
Modelling and Analysing Network Security Policies in a Given Vulnerability Setting Roland Rieke Fraunhofer Institute for Secure Information Technology SIT, Darmstadt, Germany [email protected] Abstract.
A Review on Zero Day Attack Safety Using Different Scenarios
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(1): 30-34 Review Article ISSN: 2394-658X A Review on Zero Day Attack Safety Using Different Scenarios
An Analytical Framework for Measuring Network Security using Exploit Dependency Graph
An Analytical Framework for Measuring Network Security using Exploit Dependency Graph Parantapa Bhattacharya Department of Computer Science and Engineering Indian Institute of Technology, Kharagpur Email:
Using Strategy Objectives for Network Security Analysis
Using Strategy Objectives for Network Security Analysis Elie Bursztein 1 and John C. Mitchell 2 {elie mitchell}@cs.stanford.edu 1 Stanford University and LSV, ENS Cachan, INRIA, CNRS 2 Stanford University
Statistical Analysis of Computer Network Security. Goran Kap and Dana Ali
Statistical Analysis of Computer Network Security Goran Kap and Dana Ali October 7, 2013 Abstract In this thesis it is shown how to measure the annual loss expectancy of computer networks due to the risk
Using AI Techniques to improve Pentesting Automation
Using AI Techniques to improve Pentesting Automation Carlos Sarraute Core Security Technologies and Ph.D. program in Informatics Engineering, ITBA Hackito Ergo Sum April 8-10, 2010 Brief presentation My
Attack Graph based Evaluation of Network Security
Attack Graph based Evaluation of Network Security Igor Kotenko and Mikhail Stepashkin SPIIRAS, 39, 14 Liniya, St.-Petersburg, 199178, Russia {ivkote, stepashkin}@comsec.spb.ru Abstract. The perspective
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks. Karnataka. www.ijreat.org
Secure Attack Measure Selection and Intrusion Detection in Virtual Cloud Networks Kruthika S G 1, VenkataRavana Nayak 2, Sunanda Allur 3 1, 2, 3 Department of Computer Science, Visvesvaraya Technological
A Visualization Technique for Monitoring of Network Flow Data
A Visualization Technique for Monitoring of Network Flow Data Manami KIKUCHI Ochanomizu University Graduate School of Humanitics and Sciences Otsuka 2-1-1, Bunkyo-ku, Tokyo, JAPAPN [email protected]
Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification
Introduction Overview Motivating Examples Interleaving Model Semantics of Correctness Testing, Debugging, and Verification Advanced Topics in Software Engineering 1 Concurrent Programs Characterized by
GVScan: Scanning Networks for Global Vulnerabilities
1 GVScan: Scanning Networks for Global Vulnerabilities Fabrizio Baiardi, Fabio Corò and Federico Tonelli Department of Computer Science, University of Pisa, Pisa, Italy Email: [baiardi,fcoro,tonelli]@di.unipi.it
Topological Vulnerability Analysis
Topological Vulnerability Analysis Sushil Jajodia and Steven Noel Traditionally, network administrators rely on labor-intensive processes for tracking network configurations and vulnerabilities. This requires
How To Analyze And Detect A Network Attack Through A Network Graph
Advanced Vulnerability Analysis and Intrusion Detection Through Predictive Attack Graphs Steven Noel and Sushil Jajodia Center for Secure Information Systems, George Mason University, Fairfax, VA, USA
ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU
Computer Science 14 (2) 2013 http://dx.doi.org/10.7494/csci.2013.14.2.243 Marcin Pietroń Pawe l Russek Kazimierz Wiatr ACCELERATING SELECT WHERE AND SELECT JOIN QUERIES ON A GPU Abstract This paper presents
2.1 Symbolic Algorithm
Scenario Graphs Applied to Network Security Jeannette M. Wing Computer Science Department Carnegie Mellon University 5000 Forbes Avenue, Pittsburgh, PA 15213 [email protected] Abstract. Traditional model
FPGA area allocation for parallel C applications
1 FPGA area allocation for parallel C applications Vlad-Mihai Sima, Elena Moscu Panainte, Koen Bertels Computer Engineering Faculty of Electrical Engineering, Mathematics and Computer Science Delft University
Toward Measuring Network Security Using Attack Graphs
Toward Measuring Network Security Using Attack Graphs Lingyu Wang Concordia Institute for Information Systems Engineering Concordia University Montreal, QC H3G 1M8, Canada [email protected] Anoop
Measuring the Overall Security of Network Configurations Using Attack Graphs
Measuring the Overall Security of Network Configurations Using Attack Graphs Lingyu Wang 1, Anoop Singhal 2, and Sushil Jajodia 3 1 Concordia Institute for Information Systems Engineering Concordia University
Binary search tree with SIMD bandwidth optimization using SSE
Binary search tree with SIMD bandwidth optimization using SSE Bowen Zhang, Xinwei Li 1.ABSTRACT In-memory tree structured index search is a fundamental database operation. Modern processors provide tremendous
Structuring a Vulnerability Description for Comprehensive Single System Security Analysis
Structuring a Vulnerability Description for Comprehensive Single System Security Analysis Malgorzata Urbanska, Indrajit Ray, Adele E. Howe, Mark Roberts Computer Science Department Colorado State University
AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION
INTERNATIONAL JOURNAL OF REVIEWS ON RECENT ELECTRONICS AND COMPUTER SCIENCE AN EFFICIENT STRATEGY OF AGGREGATE SECURE DATA TRANSMISSION K.Anusha 1, K.Sudha 2 1 M.Tech Student, Dept of CSE, Aurora's Technological
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS
WEB SITE OPTIMIZATION THROUGH MINING USER NAVIGATIONAL PATTERNS Biswajit Biswal Oracle Corporation [email protected] ABSTRACT With the World Wide Web (www) s ubiquity increase and the rapid development
Tools for Generating and Analyzing Attack Graphs
Tools for Generating and Analyzing Attack Graphs Oleg Sheyner 1 and Jeannette Wing 2 1 Carnegie Mellon University, Computer Science Department 5000 Forbes Avenue, Pittsburgh, PA 15213 [email protected] 2
Chapter 2 Addendum (More on Virtualization)
Chapter 2 Addendum (More on Virtualization) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ More on Systems Virtualization Type I (bare metal)
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM
STUDY AND SIMULATION OF A DISTRIBUTED REAL-TIME FAULT-TOLERANCE WEB MONITORING SYSTEM Albert M. K. Cheng, Shaohong Fang Department of Computer Science University of Houston Houston, TX, 77204, USA http://www.cs.uh.edu
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE
IMPLEMENTATION OF NETWORK SECURITY MODEL IN CLOUD COMPUTING USING ENCRYPTION TECHNIQUE 1 Rajesh L Gaikwad, 2 Dhananjay M Dakhane, 3 Ravindra L Pardhi M.E Student, Associate Professor, Assistant Professor,
A Framework for Analysis A Network Vulnerability
A Framework for Analysis A Tito Waluyo Purboyo 1, Kuspriyanto 2 1,2 School of Electrical Engineering & Informatics, Institut Teknologi Bandung Jl. Ganesha 10 Bandung 40132, Indonesia Abstract: administrators
INSIDER THREAT ANALYSIS USING INFORMATION-CENTRIC MODELING
Chapter 2 INSIDER THREAT ANALYSIS USING INFORMATION-CENTRIC MODELING D. Ha, S. Upadhyaya, H. Ngo, S. Pramanik, R. Chinchani and S. Mathew Abstract Capability acquisition graphs (CAGs) provide a powerful
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING
FAULT TOLERANCE FOR MULTIPROCESSOR SYSTEMS VIA TIME REDUNDANT TASK SCHEDULING Hussain Al-Asaad and Alireza Sarvi Department of Electrical & Computer Engineering University of California Davis, CA, U.S.A.
Network Security and Risk Analysis Using Attack Graphs
Network Security and Risk Analysis Using Attack Graphs Anoop Singhal National Institute of Standards and Technology Coauthors: Lingyu Wang and Sushil Jajodia Concordia University George Mason University
International Journal of Computer & Organization Trends Volume20 Number1 May 2015
Performance Analysis of Various Guest Operating Systems on Ubuntu 14.04 Prof. (Dr.) Viabhakar Pathak 1, Pramod Kumar Ram 2 1 Computer Science and Engineering, Arya College of Engineering, Jaipur, India.
USING GENETIC ALGORITHM IN NETWORK SECURITY
USING GENETIC ALGORITHM IN NETWORK SECURITY Ehab Talal Abdel-Ra'of Bader 1 & Hebah H. O. Nasereddin 2 1 Amman Arab University. 2 Middle East University, P.O. Box: 144378, Code 11814, Amman-Jordan Email:
DELL. Virtual Desktop Infrastructure Study END-TO-END COMPUTING. Dell Enterprise Solutions Engineering
DELL Virtual Desktop Infrastructure Study END-TO-END COMPUTING Dell Enterprise Solutions Engineering 1 THIS WHITE PAPER IS FOR INFORMATIONAL PURPOSES ONLY, AND MAY CONTAIN TYPOGRAPHICAL ERRORS AND TECHNICAL
Big Data Mining Services and Knowledge Discovery Applications on Clouds
Big Data Mining Services and Knowledge Discovery Applications on Clouds Domenico Talia DIMES, Università della Calabria & DtoK Lab Italy [email protected] Data Availability or Data Deluge? Some decades
A Biologically Inspired Approach to Network Vulnerability Identification
A Biologically Inspired Approach to Network Vulnerability Identification Evolving CNO Strategies for CND Todd Hughes, Aron Rubin, Andrew Cortese,, Harris Zebrowitz Senior Member, Engineering Staff Advanced
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION
AN EFFICIENT LOAD BALANCING APPROACH IN CLOUD SERVER USING ANT COLONY OPTIMIZATION Shanmuga Priya.J 1, Sridevi.A 2 1 PG Scholar, Department of Information Technology, J.J College of Engineering and Technology
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach
Parallel Ray Tracing using MPI: A Dynamic Load-balancing Approach S. M. Ashraful Kadir 1 and Tazrian Khan 2 1 Scientific Computing, Royal Institute of Technology (KTH), Stockholm, Sweden [email protected],
Virtualization Technologies (ENCS 691K Chapter 3)
Virtualization Technologies (ENCS 691K Chapter 3) Roch Glitho, PhD Associate Professor and Canada Research Chair My URL - http://users.encs.concordia.ca/~glitho/ The Key Technologies on Which Cloud Computing
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS
A NOVEL OVERLAY IDS FOR WIRELESS SENSOR NETWORKS Sumanta Saha, Md. Safiqul Islam, Md. Sakhawat Hossen School of Information and Communication Technology The Royal Institute of Technology (KTH) Stockholm,
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Project Proposal: Compact Log Management and File Integrity Solution for Small Businesses. Brittany Wilbert Sam Houston State University 10/22/2012
Project Proposal: Compact Log Management and File Integrity Solution for Small Businesses Brittany Wilbert Sam Houston State University 10/22/2012 Background From 2005-2012 over 560,000,000 data breaches
Computer Science. General Education Students must complete the requirements shown in the General Education Requirements section of this catalog.
Computer Science Dr. Ilhyun Lee Professor Dr. Ilhyun Lee is a Professor of Computer Science. He received his Ph.D. degree from Illinois Institute of Technology, Chicago, Illinois (1996). He was selected
Network Intrusion Detection in Virtual Network Systems Using NICE-A
Network Intrusion Detection in Virtual Network Systems Using NICE-A V.Narmada Assistant Professor, Department of Computer Science, Malla Reddy Engineering College for Women, Maisammaguda, Hyderabad. G.Prabhakar
Mobile Cloud Computing for Data-Intensive Applications
Mobile Cloud Computing for Data-Intensive Applications Senior Thesis Final Report Vincent Teo, [email protected] Advisor: Professor Priya Narasimhan, [email protected] Abstract The computational and storage
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Ensuring Reliability and High Availability in Cloud by Employing a Fault Tolerance Enabled Load Balancing Algorithm G.Gayathri [1], N.Prabakaran [2] Department of Computer
Agenda. Enterprise Application Performance Factors. Current form of Enterprise Applications. Factors to Application Performance.
Agenda Enterprise Performance Factors Overall Enterprise Performance Factors Best Practice for generic Enterprise Best Practice for 3-tiers Enterprise Hardware Load Balancer Basic Unix Tuning Performance
RAID Basics Training Guide
RAID Basics Training Guide Discover a Higher Level of Performance RAID matters. Rely on Intel RAID. Table of Contents 1. What is RAID? 2. RAID Levels RAID 0 RAID 1 RAID 5 RAID 6 RAID 10 RAID 0+1 RAID 1E
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
A Protocol Based Packet Sniffer
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios
Automatic Generation of Correlation Rules to Detect Complex Attack Scenarios Erwan Godefroy, Eric Totel, Michel Hurfin, Frédéric Majorczyk To cite this version: Erwan Godefroy, Eric Totel, Michel Hurfin,
International Journal of Computer Science Trends and Technology (IJCST) Volume 3 Issue 3, May-June 2015
RESEARCH ARTICLE OPEN ACCESS Data Mining Technology for Efficient Network Security Management Ankit Naik [1], S.W. Ahmad [2] Student [1], Assistant Professor [2] Department of Computer Science and Engineering
Using Genetic Algorithm for Network Intrusion Detection
Using Genetic Algorithm for Network Intrusion Detection Wei Li Department of Computer Science and Engineering Mississippi State University, Mississippi State, MS 39762 Email: [email protected] Abstract
RevoScaleR Speed and Scalability
EXECUTIVE WHITE PAPER RevoScaleR Speed and Scalability By Lee Edlefsen Ph.D., Chief Scientist, Revolution Analytics Abstract RevoScaleR, the Big Data predictive analytics library included with Revolution
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations
Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Florian Mansmann 1 Fabian Fischer 1 Daniel A. Keim 1 Stephen C. North 2 1 University
ON ATTACK GRAPH MODEL OF NETWORK SECURITY. Hasmik Sahakyan, Daryoush Alipour
26 ON ATTACK GRAPH MODEL OF NETWORK SECURITY Hasmik Sahakyan, Daryoush Alipour Abstract: All types of network systems are subject to computer attacks. The overall security of a network cannot be determined
Mining and Detecting Connection-Chains in Network Traffic
Mining and Detecting Connection-Chains in Network Traffic Ahmad Almulhem and Issa Traore ISOT Research Lab, ECE Department, University of Victoria, Victoria, CANADA Summary. A connection-chain refers to
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities Learning Objectives Name the common categories of vulnerabilities Discuss common system
INTRUSION DETECTION ALARM CORRELATION: A SURVEY
INTRUSION DETECTION ALARM CORRELATION: A SURVEY Urko Zurutuza, Roberto Uribeetxeberria Computer Science Department, Mondragon University Mondragon, Gipuzkoa, (Spain) {uzurutuza,ruribeetxeberria}@eps.mondragon.edu
Secure Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems
Secure Network Intrusion Detection and Countermeasure Selection in Virtual Network Systems Prerana S. Mohod 1 and Prof. Pushpanjali M. Chouragade 2 1 Prerana S. Mohod, Department of CSE, Government College
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem
A Genetic Algorithm Approach for Solving a Flexible Job Shop Scheduling Problem Sayedmohammadreza Vaghefinezhad 1, Kuan Yew Wong 2 1 Department of Manufacturing & Industrial Engineering, Faculty of Mechanical
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING
ANALYSIS OF RSA ALGORITHM USING GPU PROGRAMMING Sonam Mahajan 1 and Maninder Singh 2 1 Department of Computer Science Engineering, Thapar University, Patiala, India 2 Department of Computer Science Engineering,
Enhanced Host based Intrusion Detection Model to prevent Compromised vulnerable virtual machines
Enhanced Host based Intrusion Detection Model to prevent Compromised vulnerable virtual machines Abstract Host-based infringement recognition solutions are desirable to be included and to swathe the whole
DELL s Oracle Database Advisor
DELL s Oracle Database Advisor Underlying Methodology A Dell Technical White Paper Database Solutions Engineering By Roger Lopez Phani MV Dell Product Group January 2010 THIS WHITE PAPER IS FOR INFORMATIONAL
Locality Based Protocol for MultiWriter Replication systems
Locality Based Protocol for MultiWriter Replication systems Lei Gao Department of Computer Science The University of Texas at Austin [email protected] One of the challenging problems in building replication
A Multi-Objective Optimisation Approach to IDS Sensor Placement
A Multi-Objective Optimisation Approach to IDS Sensor Placement Hao Chen 1, John A. Clark 1, Juan E. Tapiador 1, Siraj A. Shaikh 2, Howard Chivers 2, and Philip Nobles 2 1 Department of Computer Science
Decentralized Utility-based Sensor Network Design
Decentralized Utility-based Sensor Network Design Narayanan Sadagopan and Bhaskar Krishnamachari University of Southern California, Los Angeles, CA 90089-0781, USA [email protected], [email protected]
Resource Allocation Schemes for Gang Scheduling
Resource Allocation Schemes for Gang Scheduling B. B. Zhou School of Computing and Mathematics Deakin University Geelong, VIC 327, Australia D. Walsh R. P. Brent Department of Computer Science Australian
A General Framework for Tracking Objects in a Multi-Camera Environment
A General Framework for Tracking Objects in a Multi-Camera Environment Karlene Nguyen, Gavin Yeung, Soheil Ghiasi, Majid Sarrafzadeh {karlene, gavin, soheil, majid}@cs.ucla.edu Abstract We present a framework
FPGA-based Multithreading for In-Memory Hash Joins
FPGA-based Multithreading for In-Memory Hash Joins Robert J. Halstead, Ildar Absalyamov, Walid A. Najjar, Vassilis J. Tsotras University of California, Riverside Outline Background What are FPGAs Multithreaded
Performance Analysis of Web based Applications on Single and Multi Core Servers
Performance Analysis of Web based Applications on Single and Multi Core Servers Gitika Khare, Diptikant Pathy, Alpana Rajan, Alok Jain, Anil Rawat Raja Ramanna Centre for Advanced Technology Department
60467 Project 1. Net Vulnerabilities scans and attacks. Chun Li
60467 Project 1 Net Vulnerabilities scans and attacks Chun Li Hardware used: Desktop PC: Windows Vista service pack Service Pack 2 v113 Intel Core 2 Duo 3GHz CPU, 4GB Ram, D-Link DWA-552 XtremeN Desktop
