Protecting Content Distribution Networks from Denial of Service Attacks

Size: px
Start display at page:

Download "Protecting Content Distribution Networks from Denial of Service Attacks"

Transcription

1 Protectig Cotet Distributio Networks from Deial of Service Attacks Kag-Wo Lee, Suresh Chari, Aees Shaikh, Sambit Sahu, Pau-Che Cheg IBM T. J. Watso Research Ceter Hawthore, NY Abstract I this paper, we develop two mechaisms to deter DoS attacks agaist CDN-hosted Web sites ad CDN ifrastructure servers. First, we propose a ovel request routig algorithm which allows CDN servers to effectively distiguish attacks from legitimate requests. Our scheme, based o a keyed hash fuctio, sigificatly improves the resiliece of servers to DoS attacks. Secod, we itroduce several site allocatio algorithms based o biary codes which isure that a attack o oe hosted Web site will have a limited impact o other hosted sites. Our scheme guaratees that a specified miimum umber of servers remai available for o-victimized sites. Together, the proposed schemes sigificatly improve the resiliece of CDN-hosted Web sites, ad complemet other work o couterig distributed DoS attacks. I. INTRODUCTION The problem of detectig ad thwartig deial of service (DoS) attacks agaist Iteret servers has draw cosiderable attetio. These attacks typically flood a etwork or server with bogus requests, rederig it uavailable to hadle legitimate requests. Despite icreased awareess about security issues, deial of service attacks remai a challegig problem. DoS attacks ofte target etwork resources by geeratig a large volume of bogus traffic that cosumes etwork badwidth. The impact of such brute-force attacks ca be mitigated, however, by deployig etwork level mechaisms such as packet filterig ad rate limitig [1]. While etwork level mechaisms provide a first level of protectio, they caot completely prevet attack traffic from reachig its targets. Therefore, cosiderable attetio has bee devoted to developig server-side measures to withstad DoS attacks o Iteret servers [2], [3]. I today s Iteret architecture, may high volume sites are distributed, either by replicatig cotet i several data ceters, or via a cotet distributio service provider (CDSP). Due to the icreased server ad etwork capacity available from their geographically distributed ifrastructure, CDSPs offer icreased resiliece to DoS attacks. However, replicatig servers or hostig o cotet distributio etworks (CDNs) is ot bullet-proof. A attacker ca ifiltrate a large umber of machies usig automated tools ad lauch a large scale distributed DoS (DDoS) attack. Defese agaist such DDoS attacks is hardest whe the attacker uses legitimate packets such as TCP SYN packets, to flood the target site. Hece, we focus o floodig attacks usig TCP SYN packets o CDNs. I additio, the shared ature of a CDN s ifrastructure ca be exploited sice a attack o a sigle CDN-hosted site ca affect may other sites hosted by the same CDN. Without a careful site allocatio strategy, the redudacy provided by the CDN offer limited protectio. I this paper, we develop deterrece mechaisms to DoS attacks that are suited for CDN-like eviromets. Our proposed scheme makes the job of the attacker sigificatly more difficult by leveragig the request routig system, which directs cliet requests to the most appropriate CDN server. We also itroduce ovel site allocatio algorithms to provide sufficiet isolatio amog CDN-hosted sites. As with ay Iteret security measure, our scheme is ot comprehesive by itself. Rather, we propose a set of mechaisms to complemet the existig techiques to combat DDoS attacks. Our proposed mechaisms caot protect, for example, agaist attackers who target the etwork badwidth resources o the liks coected to the CDN servers. Such attacks are better addressed by other DDoS coutermeasures, such as packet filterig ad rate limitig. It should be oted, however, that may observed attacks do ot geerate eough traffic to cosume the badwidth o today s high-speed liks, but are quite sufficiet to overwhelm a server [4]. II. RELATED WORK Network-level mechaisms such as packet filterig [1] ad rate-limitig [5], have bee desiged to mitigate the impact of DDoS attacks. These mechaisms are deployed i etwork routers to prevet potetial attack packets from reachig their destiatio. A umber of recet studies have proposed techiques to determie the origi of attacks as a deterrece mechaism. Examples of such techiques iclude cotrolled floodig [6], audit trails [7], [8], ad traceback [9], [10]. I packet-based traceback, packets are specially marked as they are forwarded by the routers, ad the path back to the origi of ca be costructed, give a large eough umber of marked packets [9], [10]. While traceback techiques deter potetial attackers, they are oly good for postmorem aalysis. Oe of the most commo types of attacks o ed systems is SYN floodig [11], i which a attacker seds a large umber of TCP SYN packets to the target without fully establishig the coectio. Numerous defesive measures have bee proposed icludig SYN cookies [3], radomly droppig SYN packets, reducig the time allowed to complete TCP coectio establishmet. Amog these techiques, SYN cookies are most popular i practice because of its simplicity ad effectiveess. The basic idea of SYN cookies is to ecode the iformatio

2 about the icomig SYN packets i the sequece umber of the correspodig SYN-ACKs. I this way, the server does ot have to maitai state for partially established coectios, thereby substatially improvig the resiliece to SYN flood attacks. I Sectio IV-B, however, we show that SYN cookies aloe may ot provide eough protectio from attacks with very high packet rates as reported i [4]. Ulike most previous work, the mai focus of this paper is to develop security mechaisms tailored to CDNs. Recet work by Jug et al. o flash crows i CDNs [12] is closely related, but is differet i two ways. First, our scheme differetiates attacks from legitimate requests o-lie, while Jug et al. provide a post-mortem aalysis. Secod, our scheme improves the resiliece of a CDN-hosted site by filterig out attack packets whereas Jug et al. proposed a mechaism to dyamically redirect traffic from a overloaded server to less loaded oes. III. PROBLEM FORMULATION A. CDN model We cosider a cotet distributio etwork model cosistig of servers or server clusters distributed i multiple regios. Regios may be arbitrarily defied, though they typically have some topological or geographic sigificace. Each CDN server i a regio is shared i that it serves cotet of multiple Web sites. Cliets access cotet from the CDN by first cotactig a request router which directs the cliet to a server withi the appropriate regio (where the regio is chose based o cliet proximity, for example). We assume that, withi a regio, the performace received by the cliet is equivalet for ay server i the regio. This assumptio is cosistet with a recet work by Krishamurthy et al [13]. Moreover, i certai CDNs, each regio may have oly sigle cluster of servers [14], where all servers i the same cluster provide similar performace. We assume the request router bases its decisio o the cliet IP address, perhaps alog with other iformatio about the state of the etwork or the cadidate servers. I practice, the request router may be a specialized DNS server or Web server which chooses a proximal server whe the cliet makes a ame resolutio request or HTTP request, respectively [15]. If the request router is a DNS server, the additioal modificatios (e.g., as proposed i [16]) are ecessary to expose the cliet IP address. We ote that our proposed mechaisms are desiged to operate i each regio. I other words, the proposed request routig algorithm selects a target server oly from the local regio. Similarly, our site allocatio algorithm makes allocatio decisio per regio. B. Assumptios about the attack I this paper, we assume that the primary target of DDoS attacks o a CDN is the CDN servers. This assumptio is based o observatios that the attacker ca overwhelm a server with a relatively small volume of attack traffic [4], [17]. We also assume that the request routers are less susceptible to DoS attacks tha the servers. Ulike Web/applicatio servers, which may perform complex operatios, such as DB query processig, the request routers hadle simple request ad respose operatios without havig to establish coectios or maitai state. Thus, we cosider attacks agaist CDN servers to pose a more immediate threat. While certai types of DDoS attacks utilize ICMP or UDP packets, recet studies reveal that the majority (more tha 90% i the study) of attacks use TCP packets [4]. Also, the observed attack packets commoly has source IP addresses followig a radom uiform distributio, idicatig that source address spoofig is widely used i. Hece, our focus is o floodig attacks usig TCP SYN packets with spoofed source IP addresses. By spoofig the source IP address, the attacker will try to hide the true origi of the attack [8], [9] ad icrease the effectiveess of the attack. Attacks which use geuie IP addresses are ot hadled by our scheme. Very large-scale attacks usig legitimate addresses (e.g., Code Red ), however, are much more challegig, ad couterig such attacks is a ogoig research. C. Quatifyig resiliece We begi with a simple otio of resiliece of a hostig eviromet. Ituitively, we say server A is more resiliet tha server B if the attacker must sed more attack traffic to brig dow server A tha to brig dow B. Thus, we ca defie the relative resiliece of server A with respect to server B as follows: Defiitio 1 (Resiliece of a server): Server A is k times more resiliet tha server B if k times more attack traffic is required to make server A uavailable tha to make server B uavailable. For example, whe a site is replicated over a group of servers the the replicated site provides O() resiliece compared to a sigle server because it takes roughly times more attack traffic to brig dow all servers. We cosider CDNs to have replicated servers ad thus have O() resiliece. 1 Our secod metric quatifies the degree of isolatio, or protectio, of a Web site from a attack o aother site hosted by the same CDN. For example, cosider a CDSP hostig two sites A ad B. Ideally, a DDoS attack o site A should ot affect the performace or availability of site B, which is true whe the two sites are ot assiged to ay commo CDN servers. I practice, though, a sigle server is shared amog multiple sites for resource sharig. Our goal is to maximize the umber of servers hostig each site while guarateeig a specified degree of isolatio amog them. Oe simple metric for the degree of isolatio is the umber of servers that are ot shared by ay two sites: Defiitio 2 (Isolatio betwee two sites): Let A ad B deote two Web sites, ad S A = {s 1,...,s l } ad S B = {s 1,...,s k } deote the sets of CDN servers allocated to A ad B, respectively. We defie the degree of isolatio betwee A ad B to be mi( S A S B, S B S A ). For example, if S A = {s 1,s 2,s 3 } ad S B = {s 2,s 3,s 4,s 5 }, the degree 1 Some existig CDN architectures do ot provide O() resiliece, however, sice they require the idex page of a site to be retrieved from the origi server.

3 of isolatio is 1 because S A S B = {s 1 } = 1 ad S B S A = {s 4,s 5 } =2. I Sectio V, we show that if sites are assiged to a equal umber of servers, the the degree of isolatio betwee two sites is d 2 where d (which is always eve) deotes the umber of disjoit CDN servers. IV. HASH-BASED REQUEST ROUTING The key idea of hash-based request routig is to treat requests with legitimate source IP addresses differetlyfrom bogus requests with spoofed source IP addresses so that most of the attack packets are preferetially dropped whe the CDN is overloaded. I particular, the proposed request routig scheme helps the server to filter out 1 fractio of the attack traffic, where servers are hostig the site i a regio. A. Algorithm descriptio Cliet with IP address cli (1) Seds a request with site ad cli Fig. 1. Request router (2) Selects cache usig H H(site, cli) = server id (3) Respods with server id to cotact (4) Seds TCP SYN with cli (6) Respods with SYN ACK Request router ad server secretly shares hash fuctio H (5) Checks with H If (H(site, cli) = self) isert ito ormal queue else isert ito low prio queue Operatio of hash-based request routig Whe a cliet wats to access a CDN-hosted Web site, it first cotacts a request router to fid the IP address of the appropriate CDN server to cotact. I geeral, the request routig decisio is based o performace or load-balacig metrics. I our approach, however, the hash-based request routig aims to differetiate legitimate requests from potetial attack traffic with spoofed IP addresses. This goal is achieved with simple keyed hashig usig a secret key shared betwee request routers ad CDN servers [18]. The operatio of the hash-based request routig algorithm is described below (see Figure 1). 1) The cliet first seds a request to a request router to fid the server address for the target site. 2) The request router selects a CDN server based o the target site ad the cliet s IP address usig a keyed hash fuctio H, ad the secret key K which is shared with the CDN servers. We assume a simple uiform keyed hash fuctio H : IP addr server id. I other words, ay give IP address is equally likelytohashitoay server id i the regio. 3) The request router respods with the address of the CDN server to cotact. Note that the attacker must use a legitimate source address to query the request router because it will ot receive the respose otherwise. 4) Upo receivig the respose from the request router, the cliet seds a TCP SYN packet to the server with server id. Whe the server receives the SYN packet it verifies if the source IP address hashes to its ow address usig the hash fuctio H ad the shared key K. 5) If the hash value matches its ow address, the CDN server iserts the SYN packet ito the ormal service queue. Otherwise, the SYN packet is iserted ito the low priority queue. Packets i the ormal queue are always served before those i the low priority queue. 6) Oce the SYN packet is processed by the server, a SYN-ACK packet is retured to the cliet. There are a few thigs to ote i this procedure. First, the keyed hash fuctio (Step 2) ca dyamically chage its behavior by simply chagig the key. Secod, the attacker caot discover the mappig for arbitrary IP addresses by permutatio because it caot always receive the resposes from the request router (Step 3). Third, the proposed scheme does ot geerate reverse traffic (TCP SYN-ACK), i respose to the attack traffic as SYN cookie does. Resiliece of hash-based request routig: Whe sedig attack traffic, the attacker will try to guess a address that will pass the hashig test at a CDN server. However, the pseudoradomess of the hash fuctio esures that the attacker s guess is o better tha a radom selectio. Suppose the attacker uses radom IP addresses. From our assumptio of a uiform hash fuctio H, statistically oly 1 fractio of the attack traffic, will pass the test at the server, where is the umber of servers i the regio. The other 1 fractio of the attack traffic will fail the test ad be siletly dropped. From the attacker s perspective, this scheme requires sigificatly more attack traffic to brig dow a server. I the previous sectio, we observed that a CDN with servers has O() resiliece. With the additio of hash-based request routig, each CDN server will accept oly 1 of the attack traffic. This effectively icrease the amout of traffic ecessary to brig dow each server by the factor of. As a result, a attacker must geerate O( 2 ) attack traffic i aggregate to victimize all of the CDN servers i the regio. B. Evaluatio cliet attacker attacker attacker Fig BT 1000BT switch 1000BT Testbed cofiguratio CDN server I this sectio, we preset a few performace umbers as a proof of cocept. We set up a testbed cosistig of oe Web server ad four cliets, all ruig Liux o Petium III 500 MHz PCs (Figure 2). Amog the cliets, oe is assumed to be a legitimate user ad the other three serve the role of attackers. The server rus Apache 1.3, ad serves local copies

4 of the CNN.com. I this settig, we examie the performace of a sigle CDN server as if the server is a part of a CDN that employs hash-based request routig. We emulate the umber of other servers by cotrollig the hash parameter. Recall that the proposed hash-based algorithm ca filter out 1 fractio of attack packets at each server if there are CDN servers collaboratig i the same regio. The attackers geerate spoofed TCP packets at a specified rate usig raw IP sockets. We use httperf [19] to geerate request traffic from the legitimate cliet. For each sceario, five sets of data were collected, where each data cosists of results from 1,000 accesses to the Web site. At the server, the Liux SYN cookies implemetatio is tured o as the basic protectio agaist SYN flood attack. We ote that, without SYN cookies, the availability of the server is compromised at a much lower attack rate. Figure 3 presets the umber of timed out requests i the 1,000 accesses from the legitimate user, where timeout is set to 15 secods. The x-axis represets the attack rate (i packets/sec) o each server. The figure plots the results from the SYN cookies oly case i compariso with the SYN cookies+hashig case, where the umber of servers i the regio is assumed to be 2, 3, 4, ad 5. From the figure, we observe that the proposed hashig scheme reduces timeout evets, thereby providig substatially better protectio tha the case whe oly SYN cookies used. For example, with the hashig scheme, the legitimate user does ot experiece timeouts at the attack rate of 3,500 packets/sec, whereas 50% of the requests timeout whe oly SYN cookies were used. We also observe that the level of protectio icreases as the umber of CDN servers i the regio icreases. A similar tred ca be foud from Figure 4 for the average respose time of the HTTP requests that did ot time out. As i the previous case, the average respose time is sigificatly lower whe the hashig scheme is used tha the case without. For the same attack rate, the respose time decreases with the umber of CDN servers i the same regio. V. ISOLATING THE IMPACT OF THE ATTACK I this sectio, we outlie strategies to allocate Web sites to differet CDN servers i order to isolate the impact of a attack o ay idividual site. I particular, we wat to be able to guaratee at least a specified miimum degree of isolatio betwee ay two sites i the CDN, while providig good performace. Ituitively, however, allocatig a large fractio of the servers to each of two differet sites results i sigificat overlap i the set of servers hostig both of the sites. Thus, a attack which brigs dow the servers hostig oe site also collaterally causes a large loss of service for the other site. Therefore, we have the followig two coflictig goals: 1) For each Web site, we wish to serve the site from a large umber of CDN servers i each regio. 2) For ay pair of Web sites, if oe is the target of a DDoS attack the the other should experiece miimal service degradatio. The first goal maximizes the throughput of a site hosted by the CDN, ad the secod protects a Web site from attacks o ay other site. Our cotributios i this paper are to relate the problem of site allocatio to a codig theoretic framework ad obtai good allocatio strategies by adaptig carefully chose codes. We cosider the case where there is oe level of service, where each Web site is hosted o the same umber of CDN servers i each regio. I ogoig work we are ivestigatig similar allocatio strategies to offer multiple levels of service, for example to allocate more servers to more popular sites. A. Relatig site allocatio to codes Let S be the set of CDN servers ad W the set of Web sites to allocate to the servers i S. For each site w W form the bit vector of legth S with bit i set if w is allocated to server i. This bit vector is called the allocatio vector for the site. Followig stadard termiology, the Hammig weight of a biary vector is defied to be the umber of 1s i the vector. The Hammig weight of the allocatio vector of a site represets the umber of CDN servers that serve cotet for this Web site. Hece, our goals may be restated as: Requiremet (1) states that allocatio vectors of each site have the largest Hammig weight possible. Requiremet (2) is that for every pair of sites w 1 ad w 2, the umber of servers which serve w 1 but ot w 2 (ad vice versa) is as large as possible, i.e. if s 1 ad s 2 are the allocatio vectors of w 1 ad w 2 respectively, the the Hammig weights of the bit vectors (s 1 s 2 ) ad (s 2 s 1 ) should be as large as possible. 2 Whe all Web sites are treated equally, i.e. whe all allocatio vectors have equal Hammig weight, we have Hammig weight(s 1 s 2 ) = 2 Hammig weight(s 1 s 2 ) = 2 Hammig weight(s 2 s 1 ), (1) where a b deotes XOR of vectors a ad b. The Hammig weight of (s 1 s 2 ) is called the Hammig distace betwee s 1 ad s 2. Thus, i this restricted case, our problem is to fid allocatio vectors with large Hammig weight uder the costrait that the Hammig distace betwee the vectors is as large as possible. Thus the problem of site allocatio ca be stated as follows: Allocatio problem: Give, the umber of CDN servers i a regio, fid a efficiet algorithm to eumerate a large umber of biary vectors each of legth, each vector havig Hammig weight exactly h (as large as possible) ad the miimum pairwise Hammig distace d betwee vectors beig as large as possible. Give such a algorithm, we ca sequetially geerate such bit vectors ad assig them as the allocatio vectors for each Web site. Uder such a allocatio each Web site is served by h CDN servers out of. If the servers hostig a particular site are all redered ioperative due to a DDoS attack, the ay other site is guarateed to be served by at least d 2 servers. Each Web site thus utilizes h of the available capacity ad 2 x deotes the oes complemet of the biary vector x.

5 1000 SYN cookies oly Number of timeouts Respose time for successful requests SYN cookies oly Number of timeouts cookies+hashig ( = 2) cookies+hashig ( = 3) cookies+hashig ( = 4) cookies+hashig ( = 5) Average respose time (msec) cookies+hashig ( = 2) cookies+hashig ( = 3) cookies+hashig ( = 4) cookies+hashig ( = 5) Attack rate (pkt/sec) Attack rate (pkt/sec) Fig. 3. Number of timeouts vs. attack traffic rate (packets/sec) Fig. 4. Respose time vs. attack traffic rate (packets/sec) the resultig loss of service whe ay oe Web site is take dow is at most (1 d 2h ) 100 percet. B. Allocatio strategies from biary codes I this sectio, we outlie geeral allocatio methods where we try to maximize h ad d alog with maximizig m, the total umber of Web sites which we ca accommodate. Our allocatio strategies are adaptatios of results from codig theory ad we outlie geeral costructios without details of actual codes. We refer the iterested reader to [20] for comprehesive details about codes ad their costructios. I geeral, defiig codes with may vectors where all codewords have exactly a fixed Hammig weight, is a very difficult problem i codig theory. The few codes that exist to geerate costat Hammig weight codewords, geerally yield oly a small (polyomial i the legth of the code) umber of codewords. To accommodate a larger umber of Web sites, we take arbitrary codes ad prue them to yield biary vectors fittig our specificatio. Our first cut at a allocatio strategy is the followig aive algorithm: Algorithm 1: Fix a code of legth with a large miimum distace d. Choose parameter h so that there are eough codewords of Hammig weight h. The geerate all biary vectors with Hammig weight exactly h ad output oly those vectors which belog to the code. I this algorithm we first fix a code from a family of codes which fixes the parameter d. Oce we fix a code, the distributio o the Hammig weight of the vectors is defied. The parameter h is the chose to have a allocatio for at least m Web sites based o this distributio of Hammig weights. Besides fidig good values for h ad d, we also wish to use codes which have explicit costructios ad efficiet algorithms to eumerate codewords. A particularly good class of codes which have easy algorithms to idetify codewords are the class of liear codes. This icludes a umber of codes such as the Reed Solomo codes [20]. Defiitio 3: A (, k, d) code is a liear code of legth with miimum distace d ad the dimesio of the liear subspace is k. It is defied by a k biary matrix G called the geerator matrix ad the set of codewords is obtaied by x G where x rages over all biary vectors of legth k [20]. Note that liear codes produce codewords with arbitrary Hammig weight. The algorithm to geerate codewords is straightforward: Sequetially eumerate vectors of legth k ad multiply by the geerator matrix G. Alterately, a liear code is also defied by its sydrome matrix C [20], a ( k) biary matrix: a legth word x belogs to the code if ad oly if x C T =0. Usig properties of liear codes, our ext refiemet is the followig: Algorithm 2: Fix a (, k, d) liear code with a large miimum distace d. Systematically geerate all biary vectors of Hammig weight h ad retai words x such that x C T =0. Alterately, eumerate vectors y of legth k ad geerate codeword y G. Retai oly those with Hammig weight h. As before, the parameters d ad h are chose by first fixig a family of liear codes to defie d. Oce the code is fixed, h is chose to maximize the umber of codewords with Hammig weight h i this code. We describe aother geeral scheme to obtai allocatio vectors, which focuses o a particular value for h. Ituitively, if h is too large, the there are few codewords of Hammig weight h. Also, choosig too large a value for h makes the maximum distace (which ca be at most h) small. O the other had if h is small, the each Web site is served by at most h CDN servers ad thus results i wasted capacity. A particularly good value for h is 2 : this is the weight at which we have the maximum umber of biary vectors ad hece potetially a large umber of codewords. For h = 2 we ca use the followig: Algorithm 3: Fix a code C of legth with miimum distace d. Defie a modified code C such that for each codeword c C, C cotais the 2 legth word c = cc. I the modified code C, each codeword has legth 2 ad weight exactly (half the legth of the code). The miimum distace betwee words i C is at least 2d. This is a quick way to use ay code to produce words of costat Hammig weight with h = 2. The umber of codewords i C is the same as that of C, but ow each codeword ca be used as a allocatio vector. These algorithms are geeral methods to covert codes ito allocatio strategies for Web sites to CDN servers. Pluggig good codes ito the costructios yields good allocatio strategies. The equivalece holds i the other directio: ay

6 allocatio strategy ca be coverted ito a code. This equivalece is useful to verify if allocatio strategies with certai parameters are possible: There are a umber of tables [21] which list (for small values of ), give values for h ad the distace d, the maximum umber of codewords possible i such a code. C. Example Suppose that the CDSP wishes to host 100 Web sites with the guaratee that if a Web site is attacked, all remaiig sites have at least 3 fuctioig servers i the CDN regio. Restated, the problem is: give m = 100 ad miimum distace d =6, fid optimal values for ad h (See Table I). The first step is to fid the miimum value of for which a code with distace d = 6 ad at least m = 100 codewords exists. From stadard tables (see [22]), we see that the miimum possible value for is 15. Our first cut is to use a very specialized o-liear code [22] which yields about 128 codewords with Hammig weight 8 ad with legth =16. This is a fairly optimal allocatio strategy usig a esoteric o-liear code. Aother allocatio ca be obtaied usig the Reed Solomo code of legth =21with a distace of d =5which yields 512 codewords. Ispectig the distributio of the umber of codewords for each Hammig weight, we fid the umber of codewords is maximized at weights 10 ad 11. We choose h =11ad select oly codewords of weight 11 which yields 126 codewords. For these costat weight words, the distace is actually 6. A slightly less optimal, but straightforward, allocatio is to use Algorithm 3 choosig the code C to be the Hammig code of legth 15 ad distace 3. With our parameters the Hammig code has 2048 codewords. Pluggig this code ito the Algorithm 3 gives us a easily implemetable allocatio where =30ad each Web site is assiged to at least 15 servers. While ot optimal, the code yields a large umber of codewords which gives us the flexibility to expad to more Web sites. We have chose these codes from may possibilities, to illustrate the tradeoffs. Optimal codes geerally ted to be o-liear with complex ecodig algorithms. Straightforward choices for codes such as the Reed Solomo code give us slightly less optimal values of. D. Geeral Allocatio Strategies I this sectio we discuss a umber of possible allocatio strategies, usig various codes to place differet emphasis o the umber of hosted Web sites (m), umber of CDN servers per hosted site (h), ad the degree of isolatio betwee sites (d). Table II summarizes the trade-offs of site allocatio usig these codes. Allocatios for a small umber of Web sites: Our first case is whe m is small compared to. Ifm (2 2) we ca use subsets of Hadamard codes [20], [21] ad get very good guaratees o the Hammig distace. The Hadamard code is a (, log(2), 2 ) liear code with 2 codewords. I fact, usig these codes oe ca costruct 2 2 biary vectors each with a Hammig weight 2 with miimum pairwise distace 2. With these as allocatio vectors, we ca assig each site to servers ad guaratee that a site will always be served by 2 4 servers. For small values of m, we ca therefore get very good guaratees o resiliece. Codes with efficiet algorithms: A good class of codes with a large miimum distace ad efficiet algorithms are Reed-Solomo codes. Choosig parameters carefully, ad usig Algorithm 3 stated above, give, we ca use Reed Solomo codes to eumerate a expoetial umber (2 c1 )of codewords with a miimum distace of at least c 2 log(), where c 1 ad c 2 are costats. Thus, we ca guaratee that o Web site will suffer more tha a log() factor drop i service uder attack. Although this is high, these codes have the advatage that allocatio algorithms are easily implemeted. Allocatio strategies for a rage of parameters: There are a umber of advaced codes which ca be coverted to good allocatio strategies. Care should be take, however, sice they typically have complex algorithms for ecodig, ad yield the best parameters oly for large values of. Oe such family of codes are Justese codes [20]. Pluggig these codes i Algorithm 3, gives us a algorithm yieldig a expoetial umber of allocatio vectors where each Web site is allocated to 2 servers ad we ca guaratee that a Web site which is ot uder attack will at most suffer a small costat factor loss of service. VI. DISCUSSION Security vs. performace trade-offs: I most systems security features come at the cost of degraded performace, ad our proposed DDoS coutermeasures for CDNs face a similar trade-off. As described i Sectio IV, the hash-based request routig scheme is ulike a stadard CDN request routig algorithm that chooses the optimal server based o etwork or server load, or etwork proximity. Rather, we assume that each CDN server withi a give regio provides roughly equivalet performace for cliets assiged to that regio. To allow further optimizatio withi a regio, the approach could be modified to use weighted hash fuctios, for istace, where the weights are determied usig covetioal request routig metrics. However, if the request routig fuctio exhibits some predictability based o performace-related iformatio, it may icrease the vulerability of CDN servers to attack. Similarly, the site allocatio strategy preseted i Sectio V potetially reduces the performace of a idividual Web site by assigig it to fewer CDN servers. CDN server distributio ad footprit: The size ad distributio of the CDN iflueces the effectiveess of our DDoS coutermeasures. The mechaisms we propose are directly applicable to large CDSPs which curretly operate thousads of CDN servers distributed across may etworks. O the other had, if the CDN is composed of a few large regios, each cotaiig a small umber of CDN servers, it may be impossible to fid a site allocatio that provides sufficiet Web site isolatio. Similarly, the additioal

7 TABLE I EXAMPLE SITE ALLOCATION FOR 100 WEB SITES WITH DEGREE OF ISOLATION =3(m = 100 AND d =6) # Total server # Servers/site Code Algorithm 1 =16 h =8 specialized o liear code [22] Algorithm 2 =21 h =11 Reed-Solomo code Algorithm 3 =30 h =15 Hammig code TABLE II SUMMARY OF THE SITE ALLOCATION STRATEGIES USING CODES Code Properties Commets Hadamard code [20], [21] m =2 2, h = 2, d = good isolatio, small umber of sites (m) 2 Reed-Solomo code [20] m = O(2 c1 ), h = 2, d = balaces isolatio ad umber of sites, c 2 log efficiet costructio Justese code [20] m = O(2 c1 ), h = 2, d = c 2 good isolatio, may sites, higher complexity protectio afforded by the hash-based request routig is sigificatly reduced with a small umber of servers. The applicability to small CDNs may be improved, however, with the emergece of CDN peerig i which multiple, admiistratively separate CDNs are combied to create a larger virtual CDN with icreased reach ad distributio. VII. CONCLUSION Recet work o couterig DDoS attacks typically has focused primarily o attacks targetig a cetralized server locatio or etwork resources. Icreasigly, however, highprofile sites are distributed usig CDNs. While CDNs, owig to their distributed structure, promise better resiliece to DDoS attacks, the shared ature of the CDN ifrastructure itroduce uique challeges. I this paper, we proposed two mechaisms to sigificatly improve the resiliece of CDN-hosted Web sites ad CDN servers to DDoS attacks: (a) a hash-based request routig scheme that eables CDN servers to effectively distiguish attack traffic from legitimate requests, ad (b) site allocatio algorithms, based o codig theory, which guaratee a miimum level of availability of the sites that are ot directly uder attack. Together, these schemes improve the resiliece of CDN-hosted Web sites, ad complemet existig techiques used to couter DDoS attacks. Several issues remai to be addressed i future work. For example, mechaisms are still eeded to secure request routers from attack. Also, a CDSP may wish to support multiple levels of service, or to hadle cases where some sites require more or fewer servers. Although the direct relatio to codes is ot valid, we are developig allocatio strategies for multiple classes of service usig codes. REFERENCES [1] Kihog Park ad Heejo Lee, O the Effectiveess of Route-Based Packet Filterig for Distributed DoS Attack Prevetio i Power-Law Iterets, i Proceedigs of ACM SIGCOMM, August [2] F. Kargl, J. Maier, ad M. Weber, Protectig Web servers from distributed deial of service attacks, vol. 10, May [3] D. J. Berstei, SYN cookies. html, November [4] David Moore, Geoffrey M. Voelker, ad Stefa Savage, Iferrig Iteret Deial-of-Service Attack, i Proceedigs of USENIX Security Symposium, August [5] Strategies to protect agaist distributed deial of service (DDoS) attacks. Cisco Systems White Paper, February cisco.com/warp/public/707/ewsflash.html. [6] H. Burch ad B. Cheswick, Tracig aoymous packets to their approximate source, i Proceedigs of USENIX Systems Admiistratio Coferece (LISA), December [7] G. Sager, Security fu with OCxmo ad cflowd. Presetatio to Iteret-2 Measuremet Workig Group, November security/1198/. [8] Alex C. Soere, Craig Partridge, Luis A. Sachez, Christie E. Joes, Fabrice Tchakoutio, Stephe T. Ket, ad W. Timothy Strayer, Hashbased IP Traceback, i Proceedigs of ACM SIGCOMM, August [9] Stefa Savage, David Wetherall, Aa Karli, ad Tom Aderso, Practical Network Support for IP Traceback, i Proceedigs of ACM SIGCOMM, August [10] S. M. Bellovi, M. D. Leech, ad T. Taylor. Iteret draft (draft-ietfitrace-01.txt), April [11] CERT Coordiatio Ceter, TCP SYN floodig ad IP spoofig attacks. CERT Advisory CA , September cert.org/advisories/ca html. [12] J. Jug, B. Krishamurthy, ad M. Rabiovich, Flash crowds ad deial of service attacks: Characterizatio ad implicatios for cds ad web sites, i Proceedigs of 11th WWW Coferece, May [13] B. Krishamurthy, C. Wills, ad Y. Zhag, O the use ad performace of cotet distributio etworks, i Proceedigs of ACM SIGCOMM Iteret Measuremet Workshop, November [14] IBM e-busiess Hostig, July services/webhostig. [15] A. Barbir et al., Kow CDN request-routig mechaisms. Iteret Draft (draft-ietf-cdi-kow-request-routig-00.txt), February [16] A. Shaikh, R. Tewari, ad M. Agrawal, O the effectiveess of DNSbased server selectio, i Proceedigs of IEEE INFOCOM, April [17] CERT Coordiatio Ceter, Deial of service attacks. CERT Tech Tips, Jue tips/deial of service.html. [18] Mihir Bellare ad Ra Caetti ad Hugo Krawczyk, Keyed Hash Fuctios for Message Autheticatio, i Proceedigs of CRYPTO, August [19] D. Mosberger ad T. Ji, httperf: A tool for measurig web server performace, ACM Performace Evaluatio Review, vol. 26, December [20] R. E. Blahut, Theory ad practice of Error Cotrol Codes. Addiso Wesley, [21] V. Pless ad W. Huffma, eds., Hadbook of Codig Theory. Elsevier, Amsterdam, [22] M. Best, A. Brouwer, F. MacWilliams, A. Odlyzko, ad N. Sloae, Bouds for Biary Codes of Legth less tha 25, i IEEE Trasactios o Iformatio Theory, Jauary 1978.

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

Asymptotic Growth of Functions

Asymptotic Growth of Functions CMPS Itroductio to Aalysis of Algorithms Fall 3 Asymptotic Growth of Fuctios We itroduce several types of asymptotic otatio which are used to compare the performace ad efficiecy of algorithms As we ll

More information

5 Boolean Decision Trees (February 11)

5 Boolean Decision Trees (February 11) 5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

Measures of Spread and Boxplots Discrete Math, Section 9.4

Measures of Spread and Boxplots Discrete Math, Section 9.4 Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling

Taking DCOP to the Real World: Efficient Complete Solutions for Distributed Multi-Event Scheduling Taig DCOP to the Real World: Efficiet Complete Solutios for Distributed Multi-Evet Schedulig Rajiv T. Maheswara, Milid Tambe, Emma Bowrig, Joatha P. Pearce, ad Pradeep araatham Uiversity of Souther Califoria

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

RISK TRANSFER FOR DESIGN-BUILD TEAMS

RISK TRANSFER FOR DESIGN-BUILD TEAMS WILLIS CONSTRUCTION PRACTICE I-BEAM Jauary 2010 www.willis.com RISK TRANSFER FOR DESIGN-BUILD TEAMS Desig-builD work is icreasig each quarter. cosequetly, we are fieldig more iquiries from cliets regardig

More information

Chapter 7 Methods of Finding Estimators

Chapter 7 Methods of Finding Estimators Chapter 7 for BST 695: Special Topics i Statistical Theory. Kui Zhag, 011 Chapter 7 Methods of Fidig Estimators Sectio 7.1 Itroductio Defiitio 7.1.1 A poit estimator is ay fuctio W( X) W( X1, X,, X ) of

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology

INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

Output Analysis (2, Chapters 10 &11 Law)

Output Analysis (2, Chapters 10 &11 Law) B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth

.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

CHAPTER 3 DIGITAL CODING OF SIGNALS

CHAPTER 3 DIGITAL CODING OF SIGNALS CHAPTER 3 DIGITAL CODING OF SIGNALS Computers are ofte used to automate the recordig of measuremets. The trasducers ad sigal coditioig circuits produce a voltage sigal that is proportioal to a quatity

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

5: Introduction to Estimation

5: Introduction to Estimation 5: Itroductio to Estimatio Cotets Acroyms ad symbols... 1 Statistical iferece... Estimatig µ with cofidece... 3 Samplig distributio of the mea... 3 Cofidece Iterval for μ whe σ is kow before had... 4 Sample

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Subject CT5 Contingencies Core Technical Syllabus

Subject CT5 Contingencies Core Technical Syllabus Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

Department of Computer Science, University of Otago

Department of Computer Science, University of Otago Departmet of Computer Sciece, Uiversity of Otago Techical Report OUCS-2006-09 Permutatios Cotaiig May Patters Authors: M.H. Albert Departmet of Computer Sciece, Uiversity of Otago Micah Colema, Rya Fly

More information

Universal coding for classes of sources

Universal coding for classes of sources Coexios module: m46228 Uiversal codig for classes of sources Dever Greee This work is produced by The Coexios Project ad licesed uder the Creative Commos Attributio Licese We have discussed several parametric

More information

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights

Center, Spread, and Shape in Inference: Claims, Caveats, and Insights Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the

More information

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009)

Lecture 13. Lecturer: Jonathan Kelner Scribe: Jonathan Pines (2009) 18.409 A Algorithmist s Toolkit October 27, 2009 Lecture 13 Lecturer: Joatha Keler Scribe: Joatha Pies (2009) 1 Outlie Last time, we proved the Bru-Mikowski iequality for boxes. Today we ll go over the

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

INVESTMENT PERFORMANCE COUNCIL (IPC)

INVESTMENT PERFORMANCE COUNCIL (IPC) INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks

More information

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as

More information

Tradigms of Astundithi and Toyota

Tradigms of Astundithi and Toyota Tradig the radomess - Desigig a optimal tradig strategy uder a drifted radom walk price model Yuao Wu Math 20 Project Paper Professor Zachary Hamaker Abstract: I this paper the author iteds to explore

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Statistical inference: example 1. Inferential Statistics

Statistical inference: example 1. Inferential Statistics Statistical iferece: example 1 Iferetial Statistics POPULATION SAMPLE A clothig store chai regularly buys from a supplier large quatities of a certai piece of clothig. Each item ca be classified either

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Amendments to employer debt Regulations

Amendments to employer debt Regulations March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

Unicenter TCPaccess FTP Server

Unicenter TCPaccess FTP Server Uiceter TCPaccess FTP Server Release Summary r6.1 SP2 K02213-2E This documetatio ad related computer software program (hereiafter referred to as the Documetatio ) is for the ed user s iformatioal purposes

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING

AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia sumitk-cs209@itrkl.ac.i, bdsahu@itrkl.ac.i ABSTRACT: Grid computig is

More information

A Network Monitoring System with a Peer-to- Peer Architecture

A Network Monitoring System with a Peer-to- Peer Architecture A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data

More information

Overview on S-Box Design Principles

Overview on S-Box Design Principles Overview o S-Box Desig Priciples Debdeep Mukhopadhyay Assistat Professor Departmet of Computer Sciece ad Egieerig Idia Istitute of Techology Kharagpur INDIA -721302 What is a S-Box? S-Boxes are Boolea

More information

How to read A Mutual Fund shareholder report

How to read A Mutual Fund shareholder report Ivestor BulletI How to read A Mutual Fud shareholder report The SEC s Office of Ivestor Educatio ad Advocacy is issuig this Ivestor Bulleti to educate idividual ivestors about mutual fud shareholder reports.

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

How To Understand The Theory Of Coectedess

How To Understand The Theory Of Coectedess 35 Chapter 1: Fudametal Cocepts Sectio 1.3: Vertex Degrees ad Coutig 36 its eighbor o P. Note that P has at least three vertices. If G x v is coected, let y = v. Otherwise, a compoet cut off from P x v

More information

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks

The Fundamental Capacity-Delay Tradeoff in Large Mobile Ad Hoc Networks The Fudametal Capacity-Delay Tradeoff i Large Mobile Ad Hoc Networks Xiaoju Li ad Ness B. Shroff School of Electrical ad Computer Egieerig, Purdue Uiversity West Lafayette, IN 47907, U.S.A. {lix, shroff}@ec.purdue.edu

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method

Accurate and Efficient Traffic Monitoring Using Adaptive Non-linear Sampling Method Accurate ad Efficiet Traffic Moitorig Usig Adaptive No-liear Samplig Method Chegche Hu, Sheg Wag, Jia Tia, Bi Liu Tsighua Uiversity Beijig, Chia, {hucc,wags,tiaj}@mails.tsighua.edu.c liub@tsighua.edu.c

More information

Flood Emergency Response Plan

Flood Emergency Response Plan Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

CREATIVE MARKETING PROJECT 2016

CREATIVE MARKETING PROJECT 2016 CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

Matrix Model of Trust Management in P2P Networks

Matrix Model of Trust Management in P2P Networks Matrix Model of Trust Maagemet i P2P Networks Miroslav Novotý, Filip Zavoral Faculty of Mathematics ad Physics Charles Uiversity Prague, Czech Republic miroslav.ovoty@mff.cui.cz Abstract The trust maagemet

More information

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length

A Faster Clause-Shortening Algorithm for SAT with No Restriction on Clause Length Joural o Satisfiability, Boolea Modelig ad Computatio 1 2005) 49-60 A Faster Clause-Shorteig Algorithm for SAT with No Restrictio o Clause Legth Evgey Datsi Alexader Wolpert Departmet of Computer Sciece

More information

Shared Memory with Caching

Shared Memory with Caching Vorlesug Recherarchitektur 2 Seite 164 Cachig i MIMD-Architectures ] MIMD-Architekture Programmiermodell Behadlug der Kommuikatioslatez Nachrichteorietiert globaler Adressraum Latez miimiere Latez verstecke

More information

BaanERP 5.0c. EDI User Guide

BaanERP 5.0c. EDI User Guide BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Chapter 10 Computer Design Basics

Chapter 10 Computer Design Basics Logic ad Computer Desig Fudametals Chapter 10 Computer Desig Basics Part 1 Datapaths Charles Kime & Thomas Kamiski 2004 Pearso Educatio, Ic. Terms of Use (Hyperliks are active i View Show mode) Overview

More information

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems

Simple Efficient Load Balancing Algorithms for Peer-to-Peer Systems Simple Efficiet Load Balacig Algorithms for Peer-to-Peer Systems David R. Karger MIT Computer Sciece ad Artificial Itelligece Laboratory Cambridge, MA 0139, USA karger@csail.mit.edu Matthias Ruhl IBM Almade

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations

CS103A Handout 23 Winter 2002 February 22, 2002 Solving Recurrence Relations CS3A Hadout 3 Witer 00 February, 00 Solvig Recurrece Relatios Itroductio A wide variety of recurrece problems occur i models. Some of these recurrece relatios ca be solved usig iteratio or some other ad

More information

1. C. The formula for the confidence interval for a population mean is: x t, which was

1. C. The formula for the confidence interval for a population mean is: x t, which was s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value

More information

Biology 171L Environment and Ecology Lab Lab 2: Descriptive Statistics, Presenting Data and Graphing Relationships

Biology 171L Environment and Ecology Lab Lab 2: Descriptive Statistics, Presenting Data and Graphing Relationships Biology 171L Eviromet ad Ecology Lab Lab : Descriptive Statistics, Presetig Data ad Graphig Relatioships Itroductio Log lists of data are ofte ot very useful for idetifyig geeral treds i the data or the

More information

Exploratory Data Analysis

Exploratory Data Analysis 1 Exploratory Data Aalysis Exploratory data aalysis is ofte the rst step i a statistical aalysis, for it helps uderstadig the mai features of the particular sample that a aalyst is usig. Itelliget descriptios

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

Firewall Modules and Modular Firewalls

Firewall Modules and Modular Firewalls Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi acharya@cs.utexas.edu Aditya Joshi Uiversity of Texas at Austi adityaj@cs.utexas.edu M. G. Gouda Natioal Sciece Foudatio

More information

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution

University of California, Los Angeles Department of Statistics. Distributions related to the normal distribution Uiversity of Califoria, Los Ageles Departmet of Statistics Statistics 100B Istructor: Nicolas Christou Three importat distributios: Distributios related to the ormal distributio Chi-square (χ ) distributio.

More information

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable

Week 3 Conditional probabilities, Bayes formula, WEEK 3 page 1 Expected value of a random variable Week 3 Coditioal probabilities, Bayes formula, WEEK 3 page 1 Expected value of a radom variable We recall our discussio of 5 card poker hads. Example 13 : a) What is the probability of evet A that a 5

More information

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks

Telecomunicazione. A Priority-Aware Protection Technique for QoS Enabled WDM Networks Uiversità di Bergamo Facoltà di Igegeria dell Iformazioe e etodi atematici La Protezioe elle Reti di Telecomuicazioe A Priority-Aware Protectio Techique for QoS Eabled WD etworks Fabio artigo Sommario

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Normal Distribution.

Normal Distribution. Normal Distributio www.icrf.l Normal distributio I probability theory, the ormal or Gaussia distributio, is a cotiuous probability distributio that is ofte used as a first approimatio to describe realvalued

More information

Crowds: Anonymity for Web Transactions

Crowds: Anonymity for Web Transactions Crowds: Aoymity for Web Trasactios Michael K. Reiter ad Aviel D. Rubi AT&T Labs Research I this paper we itroduce a system called Crowds for protectig users aoymity o the worldwide-web. Crowds, amed for

More information

Basic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion

Basic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion Theory ad Aalog-to-Digital Coversio Itroductio/Defiitios Aalog-to-digital coversio Rate Frequecy Aalysis Basic Measuremet Issues Reliability the extet to which a measuremet procedure yields the same results

More information

Dynamic House Allocation

Dynamic House Allocation Dyamic House Allocatio Sujit Gujar 1 ad James Zou 2 ad David C. Parkes 3 Abstract. We study a dyamic variat o the house allocatio problem. Each aget ows a distict object (a house) ad is able to trade its

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

CCH Accounts Production

CCH Accounts Production CCH Accouts Productio accouts productio facig today s challeges Preparig statutory ad fiacial accouts is a core activity for our practice, as it is for may professioal firms. Although legislatio ad accoutig

More information

MTO-MTS Production Systems in Supply Chains

MTO-MTS Production Systems in Supply Chains NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost

More information

Systems Design Project: Indoor Location of Wireless Devices

Systems Design Project: Indoor Location of Wireless Devices Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: bcm1@cec.wustl.edu Supervised

More information