Botnets Detection Based on IRC-Community

Size: px
Start display at page:

Download "Botnets Detection Based on IRC-Community"

Transcription

1 Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, Botnets are networks of coproised coputers controlled under a coon coand and control (C&C) channel. Recognized as one the ost serious security threats on current Internet infrastructure, botnets are often hidden in existing applications, e.g. IRC, HTTP, or Peer-to-Peer, which akes the botnet detection a challenging proble. Previous attepts for detecting botnets are to exaine traffic content for IRC coand on selected network links or by setting up honeypots. In this paper, we propose a new approach for detecting and characterizing botnets on a large-scale WiFi ISP network, in which we first classify the network traffic into different applications by using payload signatures and a novel clustering algorith and then analyze the specific IRC application counity based on the teporal-frequent characteristics of flows that leads the differentiation of alicious IRC channels created by bots fro noral IRC traffic generated by huan beings. We evaluate our approach with over 60 illion flows collected over five consecutive days on a large scale network and results show the proposed approach successfully detects the botnet flows fro over 60 illion flows with a high detection rate and an acceptable low false alar rate. O I. INTRODUCTION ne of the biggest threats to the current Internet infrastructure is botnets which are usually coprised of large pools of coproised coputers under the control of a botaster. Botnets can be centralized, distributed or peer-topeer (PP) according to different coand and control (C&C) odels and different counication protocols (e.g. HTTP, IRC or PP). The attacks conducted by botnets are very different, ranging fro Distributed Denial-of-Service (DDoS) attacks to e-ail spaing, keylogging, click fraud, and new alware spreading. In Figure, we illustrate a typical lifecycle of a botnet and its attacking behaviours. Botaster.exploit.bot download 7.coand 4.join 5.pass authen. victi server Botnet 6.pass vulnerable host IRC server Fig.. Typical life-cycle of a IRC based botnet and its attacking behaviors 7.coand 8.DDOS DNS server 3.DNS query The botaster usually finds a new bot by exploiting its vulnerabilities reotely. Once affected, the bot will download and install the binary code by itself. After that, each bot on the botnet will attept to find the IRC server address by DNS query, which is illustrated in Step 3 of Figure. Next is the counication step between bots and IRC server. In IRC based counication echanis, a bot first sends a PASS essage to the IRC server to start a session and then the server authenticates the bot by checking its password. In any cases, the botaster also needs to authenticate itself to the IRC server. Upon the copletion of these authentications, the coand and control channels aong botaster, bots, and IRC server will be established. To start a DDoS attack, the botaster only needs to send a siple coand like ".ddos.start victi_ip" while all bots receive this coand and start to attack the victi server. This is shown in Step 8 of Figure. More inforation about the botaster coand library can be found in []. Detecting botnets traffic is a very challenging proble. This is because: () botnets use the existing application protocol, and thus their traffic volue is not that big and is very siilar to the noral traffic behaviour; () classifying traffic applications becoes ore challenging due to the traffic content encryption and the unreliable destination port labelling ethod. Previous attepts on detecting botnets are ainly based on honeypots [,3,4,5,6], passive anoaly analysis [7,8,9] and traffic application classification [0,,]. Setting up and installing honeypots on the Internet is very helpful to capture alwares and understand the basic behaviours of botnets. The passive anoaly analysis for detecting botnets on a network traffic is usually independent of the traffic content and has the potential to find different types of botnets (e.g. HTTP based botnet, IRC based botnet or PP based botnet). The traffic application classification based botnets detection focuses on classifying traffic into IRC traffic and non-irc traffic, and thus it can only detect IRC based botnets, which is the biggest liitation when copared with the anoaly based botnets detection. In this paper, we focus on traffic classification based botnets detection. Instead of labeling and filtering traffic into non-irc and IRC, we propose a generic approach to classify traffic into different application counities (e.g. PP, Chat, Web, etc.). Then, based on each specific application counity, we investigate and apply the teporal-frequent characteristics of network flows to differentiate the alicious botnet behaviors fro the noral application traffic. The ajor contributions of this paper include: () a novel This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.

2 application discovery approach for classifying network applications in a large-scale WiFi ISP network, () a new algorith to discriinate botnets IRC fro the noral IRC traffic, which is based on n-gra (frequent characteristics) of flow payload over a tie period (teporal characteristics), and (3) a botnet detection fraework for detecting any types of botnets. The rest of the paper is organized as follows. Section II presents our application classification approach for network flows. Section III is the botnet detection algorith based on the teporal-frequent characteristics of botnets. Section IV is the experiental evaluation for our detection odel with over 60 illion flows collected on a large-scale WiFi ISP network. Finally, soe concluding rearks and future work are given in Section V. II. TRAFFIC APPLICATION CLASSIFICATION Identifying network traffic into different applications is very challenging and is still an issue yet to be solved. In practice, traffic application classification relies to a large extent on the transport layer port nubers, which was an effective way in the early days of the Internet. Port nubers, however, provide very liited inforation nowadays. An alternative way is to exaine the payload of network flows and then create signatures for each application. This, however, generates two ajor liitations: () legal issues related to privacy, and () it is ipossible to identify encrypted traffic. By observing traffic on a large-scale WiFi ISP network, we found that even exploring the flow content exaination ethod, there are still about 40% network flows that cannot be classified into specific applications (i.e. 40% network flows are labeled as unknown applications). Investigating such a huge nuber of unknown traffic is inevitable since they ight stand for the abnoralities in the traffic, alicious behaviors or siply the identification of novel applications. Next we first discuss the payload signatures based classification approach and then present the cross association clustering algorith for classifying the unknown traffic into different known application counities. A. Payload Signatures Based Classification The payload signatures based classifier is to investigate the characteristics of bit strings in the packet payload. For ost applications, their initial protocol handshake steps are usually different and thus can be used for classification. Moreover, the protocol signatures can be odeled through either public docuents like RFC or epirical analysis for deriving the distinct bit strings on both TCP and UDP traffic. The classifier is deployed on a large-scale free wireless fidelity (WiFi) network and the classification results show that about 40% flows cannot be classified by the current application payload signatures based classification ethod. Next, we present a fuzzy cross association clustering algorith in order to address this issue. B. Unknown Traffic Classification The traditional port-based classification ethod is proven to be isleading due to the increase of applications tunneled through HTTP, the constant eergence of new protocols and the doination of PP networking [3]. Exaining the payload signatures of applications iproves the classification accuracy, but still a large nuber of traffic cannot be identified. Recent studies on application classification include "applying achine learning algoriths for clustering and classifying traffic flows" [4], "statistical fingerprint based classification" [5] and "identifying traffic on the fly" [6]. Different with the previous approaches, our ethod is hybrid, cobining the payload signatures with a novel cross association clustering algorith [7]. The payload signatures classify traffic into predefined known application counities. The unknown traffic is then assigned into different application counities with a set of probabilities by using a clustering algorith. Those unknown traffic that cannot be classified into any known application counity will be considered as new or unknown applications. The basic idea of applying cross association algorith is to study the association relationship between known traffic and unknown traffic. In nuerous data ining applications, a large and sparse binary atrix is used to represent the association between two objects (corresponding to rows and coluns). Cross associations are then defined as a set of rectangular regions with different densities. The clustering goal is to suarize the underlying structure of object associations by decoposing the binary atrix into disjoint row and colun groups such that the rectangular intersections of groups are hoogeneous with high or low densities. Previous association clustering algoriths need to predefine the nuber of clusters (i.e. rectangles). This, however, is not realistic in our unknown traffic classification because the actual nuber of applications is unknown. The basis of our unknown traffic classification ethodology is a novel cross association clustering algorith that can fully estiate the nuber of rows and coluns autoatically [7]. During classification, the traffic consists of unknown and known flows are clustered in ters of the source IP and the destination IP. A set of rectangles is generated after this stage. We define these rectangles as counities including either a set of flows or epty. Then flows in each counity are clustered in ters of destination IP and destination port. Siilarly, one counity will be decoposed into several sub-counities, each represents an application counity. After all flows are classified into different application counities, we have to label each application counity. A siple and effective way is to label each application counity based on its content. In particular, we calculate the nuber of flows for each known application in the counity and noralize the nubers into a set of probabilities ranging fro 0 to. The unknown flows in each application will be assigned into a specific application according to a set of probabilities. This idea is siilar with the eber function in fuzzy clustering algorith and the experiental evaluation proves its accuracy and efficiency. An exception for this labeling ethod is if the doinant flow in the counity is the unknown flow, the whole counity will be labeled as This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.

3 Index of ASCII Characters "unknown", which has the potential of discovering new or unknown applications. III. BOTNET DETECTION BASED ON IRC COMMUNITY A general ai for intrusion detection is to find various attack types by odeling signatures of known intrusions (isuse detection) or profiles of noral behaviors (anoaly detection). Botnet detection, however, is ore specific due to a given application doain. N-gra bytes distribution has proven its efficiency on detecting network anoalies. In [8] Wang et al. exained -gra byte distribution of the packet payload, represented each packet into a -dienational vector describing the occurrence frequency of one of the ASCII characters in the payload and then constructed the noral packet profile through calculating the statistical average and deviation value of noral packets to a specific application service (e.g. HTTP). Anoalies will be alerted once a Mahalanobis distance deviation of the testing data to the noral profiles exceeds a predefined threshold. Gu et al. iprove this approach and apply it for detecting alware infection in their recent work [9]. Different with previous n-gra based detection approaches, our ethod extends n-gra frequency into a teporal doain and generates a set of -dientional vector representing the teporal-frequent characteristics of the ASCII binary bytes on the payload over a predefined tie interval. The teporal feature is iportant in botnets detection due to two epirical observations of botnets behaviors: () the response tie of bots is usually iediate and accurate once they receive coands fro botaster, while noral huan behaviors ight perfor an action with various possibilities after a reasonable thinking tie, and () bots basically have preprograed activities based on botaster s coands, and thus all bots ight be synchronized with each other. After obtaining the n-gra (n = in this case) features for flows over a tie-window, we then apply K-eans algorith to cluster the data objects with -deensional features. We don t construct the noral profiles because noral traffic is sensitive to the practical networking environent and a high false positive rate ight be generated when deploying the training odel on a new environent. In contrast, K-eans clustering is unsupervised and doesn t define threshold that needs to be tuned in different cases. In our approach, the nuber of initial clusters by K-eans is. We denote the -diensional n-gra byte distribution as a vector ti ti t < f i >, where t f i stands for the frequency of j the j th ASCII character on the payload over a tie window t i (j=,,, and i=0, ). Given a set of N data objects F ~ {F i i=,,,n}, where ti ti t =< i >, the detection approach Fi f is described in Algorith I. In practice, labeling the cluster is always a challenging proble when applying unsupervised algorith for intrusion detection. By observing the noral IRC traffic over a long period on a large scale WiFi ISP network and the IRC botnet traffic collected on a honeypot, we derive a new etric, standard deviation σ for each cluster, to differentiate botnet IRC cluster fro noral IRC clusters. The higher the value of average σ over ACSII characters for flows on a cluster, the ore noral the cluster is. This is reasonable because during noral IRC traffic, huan being s behaviors is ore diverse with various possibilities copared to the alicious IRC traffic generated by bots. Given the frequency vectors for n flows as follows: { < f, f,..., f >, < f > < f n n n > } Suppose σ j is the standard deviation of the j th ASCII over n flows, the average standard deviation σ over ACSII characters for flows can be calculated by the following forula: Average Bytes Frequecny over Noral IRC σi σ= i= ALGORITHM I BOTNET DETECTION Function BotDel (F) returns botnet cluster t Inputs: Collection of data objects i ti t F f i i =< >, i =,,..N Initialization: initialize nuber of clusters k ( e.g. k = ), cluster centers c, k Repeat: q q + Assign data objects to clusters by deterining the closest cluster center points. Calculate the new center point c newfor each cluster. Until: c new c< th or q > th Calculate standard deviation for each cluster : σ, σ,..., σ σ = ax( σ, σ,..., σ ) then cluster b is labeled as botnet cluster If b Return the botnet cluster σ b. Average Bytes Frequency over IRC Botnet Index of ASCII Characters Fig. Average bytes frequency over Fig. 3 Average bytes frequency over ASCIIs for noral IRC flows ASCIIs for botnet IRC As an exaple, Figures and 3 illustrate the average bytes frequency over the noral IRC flows and IRC botnet flows, respectively. The average standard deviation of bytes frequency over ASCII characters for noral IRC traffic is 0.00 and the axial standard deviation of bytes frequency over ASCII characters for noral IRC traffic is 0.05, while the average standard deviation of bytes frequency over ASCII characters for IRC botnet traffic is and its axiu is 0.0, which is uch saller than that of noral IRC traffic. This observation confirs that the noral huan This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. 3 Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.

4 being s IRC traffic is ore diverse than the alicious IRC traffic generated by bots. IV. EXPERIMENTAL EVALUATION We ipleent a prototype syste for the approach and then evaluate it on a large-scale WiFi ISP network over five consecutive business days. The botnet IRC traffic is collected on a honeypot deployed on a real network and is then aggregated into 43 flows. The tie interval for flow aggregation is inute. When evaluating the prototype syste, we randoly insert and replay botnet traffic flows on the noral daily traffic. Since our approach is a two-stage process (i.e. unknown traffic classification first and botnet detection on IRC application counity next), the evaluation is accordingly divided into two parts: () the perforance testing for unknown traffic classification, not only focusing on the capability of our approach to classify the unknown IRC traffic, we also concentrate on the classification accuracy for other unknown applications (e.g. new PP) since we expect the algorith could be extended to detect various types of botnet, like Web based and PP based botnets; () the perforance evaluation for syste to discriinate alicious IRC bonnet traffic fro noral huan being IRC traffic. A. Evaluation on Unknown Traffic Classification Evaluating the unknown traffic classification capability is not an easy task in reality since we have no idea on the novel or recent appeared applications and it always needs the intervention of network experts. During our experient, we randoly choose part of known traffic and then force to label the as unknown. The selection for the nuber of all these label free traffic is decided according to the 40% rule. The final unknown traffic set is coposed by the forcibly labeled known traffic and the 43 botnet IRC flows. Over five days evaluation, we found that all the botnet flows can be accurately classified into the IRC application counity (i.e. 00% classification rate for IRC traffic). However, the general classification accuracy over all applications is about 85% which is not that high copared to the specific IRC application. The general classification accuracy is an average value over all application classification since the approach has different classification rate for different application counities. Table I is a description about known application set and the unknown application set over one hour, e.g. how any known applications the flows belong to, etc. B. Evaluation on Discriinating Botnet fro Noral IRC The proposed approach is evaluated with five full consecutive days traffic. Table II shows the flow distribution for IRC application counity and the total flow counity for each day after the traffic classification step. Two etrics are used to evaluate the perforance of discriinating botnet traffic fro noral IRC traffic, naely Detection Rate (DR) and False Alar Rate (FAR). DR is the ratio of nuber of botnet flows detected over total nuber of botnet flows and FAR is the ratio of nuber of false botnet alars over the total nuber of alars. TABLE I DESCRIPTION ON KNOWN AND UNKNOWN SET OVER ONE HOUR Known et Unknown et Nuber Nuber of Nuber Nuber of of Applications of Applications TABLE II DESCRIPTION ON IRC COMMUNITIES OVER FIVE DAYS Total Known Total IRC Known IRC 35409K 374K K 833K K 574K K 0596K K 096K Table III lists the DR and FAR for all the five days detection and accordingly Table IV lists the average standard deviation over the characters of the payload collected on the network for each cluster. TABLE III DETECTION PERFORMANCE OVER FIVE DAYS Perforance Metrics DR (%) FAR (%) TABLE IV STANDARD DEVIATION OF BYTES FREQUENCY OVER ASCIIS FOR NORMAL AND BOTNET CLUSTERS Average Standard Noral Clusters Botnet Clusters Fro Table II, we see that the total nuber of flows we collect for one day is over 30M and the total nuber of known flows which can be labeled by the payload signatures is over 0M. The nuber of IRC flows over the five consecutive day is fro 00 to 600, which is a very sall part of the total flows. Our traffic classification approach can classify the unknown IRC flows to the IRC application counity with a 00% classification rate on the five days evaluation. The detection rate for differentiating bot IRC traffic fro noral huan being s IRC traffic is 00% on four days testing, while an exception happens on the 3 rd day s testing on which our approach obtained a 77.8% detection rate with a 3.% false alar rate. The best evaluation over the five days testing is a This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. 4 Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.

5 00% detection rate with only.6% false alar rate. Moreover, evaluation results fro Table IV indicate that the average standard deviation of bytes frequency over the ASCIIs on the flow payload is an iportant etric to indicate noral huan IRC clusters and alicious IRC traffic generated by achine bots. V. CONCLUSION In this paper we attept to conduct a taxonoy on all existing botnet detection approaches and classify the into three categories, naely honeypots based, passive anoaly analysis based and traffic application classification based. As claied by Gu et al., anoaly based botnet detection approaches have the potential to find different types of botnets, while current existing traffic classification approaches only focus on differentiating alicious IRC traffic fro noral IRC traffic, which is considered as its biggest liitation. In this paper, we address this liitation by presenting a novel generic application classification approach. Through this unknown applications on the current network will be classified into different application counities, like Chat (or ore specific IRC) counity, PP counity, Web counity, etc. Since botnets are exploring existing application protocols, detection can be conducted in each specific counity. As a result, our approach can be extended to find different types of botnets. In particular, we evaluate our fraework on IRC counity in this paper and evaluation results show that our approach obtains a very high detection with a low false alar rate when detecting IRC botnet traffic. Especially we foralize the botnet behaviours by using an average standard deviation of bytes frequency over ASCIIs on the traffic payload, and conclude an iportant bot identification strategy, that is the higher the value of the average deviation, the ore huan being like the IRC traffic. This indication strategy is iportant when using unsupervised clustering algorith for botnet detection in the later research. In the near future, we will evaluate our approach on the web specific counity and test its perforance on web based botnets. Soe novel PP botnets construction ethods have been proposed and investigated in [], and as a result we will also conduct an evaluation for our approach with the new appeared PP botnets. ACKNOWLEDGMENT The authors graciously acknowledge the funding fro the Atlantic Canada Opportunity Agency (ACOA) through the Atlantic Innovation Fund (AIF) to Dr. Ghorbani. REFERENCES [] P. Barford and V. Yegneswaran, "An inside look at Botnets," Special Workshop on Malware Detection, Advances in Inforation Security, Springer Verlag, ISBN: , 006. [] The Honeynet Project & Research Alliance, "Know your eney: Tracking botnets, " March 005. [3] M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A ultifaceted approach to understanding the botnet phenoenon, " Proceedings of the 6 th ACM SIGCOMM Conference on Internet easureent, pp. 4-5, October 006. [4] P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, "The nepenthes platfor: an efficient approach to collect alware," Proceedings of Recent Advances in Intrusion Detection, LNCS 49, Springer-Verlag, 006, pp , Haburg, Septeber 006. [5] V. Yegneswaran, P. Barford, and V. Paxson, "Using honeynets for internet situational awareness," Proceedings of the 4 th Workshop on Hot Topics in Networks, College Park, MD, Noveber 005. [6] Z.H. Li, A. Goyal, and Y. Chen, "Honeynet-based botnet scan traffic analysis," Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Inforation Security, Vol. 36, W.K.Lee, C. Wang, D. Dagon, (Eds.), Springer, ISBN: , 008. [7] G.F. Gu, J.J. Zhang, and W.K. Lee, "BotSniffer: detecting botnet coand and control channels in network traffic," Proceedings of the 5 th Annual Network and Distributed Syste Security Syposiu, San Diego, CA, February 008 [8] A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," Proceedings of the st Conference on st Workshop on Hot Topics in Understanding Botnets, Cabridge, MA, 007. [9] J. R. Binkley and S. Singh, "An algorith for anoaly-based botnet detection," USENIX SRUTI: nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, July 006. [0] W. T. Strayer, R. Walsh, and C. Livadas, D. Lapsley, "Detecting botnets with tight coand and control," Proceedings st IEEE Conference on Local Coputer Networks, pp. 95-0, Nov [] W. T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, "Botnet Detection Based on Network Behavior," Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Inforation Security, Vol. 36, W.K.Lee, C. Wang, D. Dagon, (Eds.), Springer, ISBN: , 008. [] C. Livadas, R. Walsh, D. Lapsley, and W.T. Strayer, "Using achine learning techniques to identify botnet traffic," Proceedings st IEEE Conference on Local Coputer Networks, pp , Nov [3] A. W. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," Proceedings of 6 th International Workshop on Passive and Active Network Measureent, pp. 4-54, Boston, MA, March 005. [4] N. Willias, S. Zander and G. Aritage, "A preliinary perforance coparison of five achine learning algoriths for practical IP traffic flow classification," ACM SIGCOMM Coputer Counication Review, Vol. 36, Issue 5, pp. 5-6, 006. [5] M. Crotti, M. Dusi, F. Gringoli and L. Salgarelli, "Traffic classification through siple statistical fingerprinting," ACM SIGCOMM Coputer Counication Review, Vol. 37, Issue, pp. 5-6, 007. [6] L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salaatian, "Traffic classification on the fly," ACM SIGCOMM Coputer Counication Review, Vol. 36, Issue, pp. 3-6, 006. [7] D. Chakrabarti, S. Papadiitriou, D. Modha, and C. Faloutsos, "Fully Autoatic Cross-Associations," Proceedings of the 0 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp , Seattle, Washington, August -5, 004. [8] K. Wang and S. Stolfo, "Anoalous payload-based wor detection and signature generation," Proceedings of the 8 th International Syposiu on Recent Advances in Intrusion Detection (RAID), Seattle, WA, 005. [9] G. F. Gu, P. Porras, V. Yegneswaran, M. Fong, and W.K. Lee, "BotHunter: detecting alware infection through IDS-Driven dialog correlation," Proceedings of the 6 th USENIX Security Syposiu, Boston, MA, August 007. [0] P. Wang, S. Sparks, and C. Zou "An advanced hybrid peer-to-peer botnet," Proceedings of the st conference on st Workshop on Hot Topics in Understanding Botnets, Cabridge, MA, 007. [] C. Zou and R. Cunningha, "Honeypot-aware advanced botnet construction and aintenance," Proceedings of International Conference on Dependable Systes and Networks, June 006. This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. 5 Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets

An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,

More information

Applying Multiple Neural Networks on Large Scale Data

Applying Multiple Neural Networks on Large Scale Data 0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree

More information

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy

Analyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou

More information

An Innovate Dynamic Load Balancing Algorithm Based on Task

An Innovate Dynamic Load Balancing Algorithm Based on Task An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun

More information

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries

Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,

More information

Implementation of Botcatch for Identifying Bot Infected Hosts

Implementation of Botcatch for Identifying Bot Infected Hosts Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus

More information

Software Quality Characteristics Tested For Mobile Application Development

Software Quality Characteristics Tested For Mobile Application Development Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology

More information

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO

PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:

More information

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs

The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic

More information

Symptoms Based Detection and Removal of Bot Processes

Symptoms Based Detection and Removal of Bot Processes Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 Thati.Raviprasad@gmail.com, 2 sridharuce@gmail.com

More information

BotCop: An Online Botnet Traffic Classifier

BotCop: An Online Botnet Traffic Classifier 2009 Seventh Annual Communications Networks and Services Research Conerence BotCop: An Online Botnet Traic Classiier Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani Faculty o Computer Science

More information

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS

SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation

More information

A Review on IRC Botnet Detection and Defence

A Review on IRC Botnet Detection and Defence A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security

More information

An Approach to Combating Free-riding in Peer-to-Peer Networks

An Approach to Combating Free-riding in Peer-to-Peer Networks An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008

More information

Online Bagging and Boosting

Online Bagging and Boosting Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used

More information

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing

Real Time Target Tracking with Binary Sensor Networks and Parallel Computing Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking

More information

Modeling Parallel Applications Performance on Heterogeneous Systems

Modeling Parallel Applications Performance on Heterogeneous Systems Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln

More information

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers

Performance Evaluation of Machine Learning Techniques using Software Cost Drivers Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise

More information

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking

An Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters

More information

ASIC Design Project Management Supported by Multi Agent Simulation

ASIC Design Project Management Supported by Multi Agent Simulation ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously

More information

P2P-BDS: Peer-2-Peer Botnet Detection System

P2P-BDS: Peer-2-Peer Botnet Detection System IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. V (Sep Oct. 2014), PP 28-33 P2P-BDS: Peer-2-Peer Botnet Detection System Navjot Kaur 1, Sunny

More information

Data Streaming Algorithms for Estimating Entropy of Network Traffic

Data Streaming Algorithms for Estimating Entropy of Network Traffic Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia

More information

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises

Research Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,

More information

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration

An Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration

More information

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2

Exploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2 Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,

More information

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks

Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.

More information

Efficient Key Management for Secure Group Communications with Bursty Behavior

Efficient Key Management for Secure Group Communications with Bursty Behavior Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:

More information

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation

Media Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State

More information

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network

Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network 2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona

More information

An improved TF-IDF approach for text classification *

An improved TF-IDF approach for text classification * Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: zus@zu.edu.cn An iproved TF-IDF approach for text classification

More information

Searching strategy for multi-target discovery in wireless networks

Searching strategy for multi-target discovery in wireless networks Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,

More information

Study on the development of statistical data on the European security technological and industrial base

Study on the development of statistical data on the European security technological and industrial base Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,

More information

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS

CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS 641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship

More information

Image restoration for a rectangular poor-pixels detector

Image restoration for a rectangular poor-pixels detector Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2

More information

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS

INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE

More information

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks

Protecting Small Keys in Authentication Protocols for Wireless Sensor Networks Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University

More information

Managing Complex Network Operation with Predictive Analytics

Managing Complex Network Operation with Predictive Analytics Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory

More information

Fuzzy Sets in HR Management

Fuzzy Sets in HR Management Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,

More information

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation

BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol

More information

Information Processing Letters

Information Processing Letters Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul

More information

Detection of Botnets Using Honeypots and P2P Botnets

Detection of Botnets Using Honeypots and P2P Botnets Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.

More information

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center

Markov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava

More information

ADJUSTING FOR QUALITY CHANGE

ADJUSTING FOR QUALITY CHANGE ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes

More information

An Efficient Methodology for Detecting Spam Using Spot System

An Efficient Methodology for Detecting Spam Using Spot System Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

BOTNET SPREADING DETECTION AND PREVENTION VIA WEBSITES

BOTNET SPREADING DETECTION AND PREVENTION VIA WEBSITES BOTNET SPREADING DETECTION AND PREVENTION VIA WEBSITES Jonas Juknius, Nikolaj Goranin Vilnius Gediminas Technical University, Faculty of Fundamental Sciences Saulėtekio al. 11, 10223 Vilnius In this article

More information

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries

A framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries

More information

Use of extrapolation to forecast the working capital in the mechanical engineering companies

Use of extrapolation to forecast the working capital in the mechanical engineering companies ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance

More information

Botnet Command Detection using Virtual Honeynet

Botnet Command Detection using Virtual Honeynet Botnet Command Detection using Virtual Honeynet J.S.Bhatia #1, R.K.Sehgal *2, Sanjeev Kumar #3 # Cyber Security Technology Division, CDAC Mohali, INDIA 160071 #1 jsb@cdacmohali.in *2 rks@cdacmohali.in

More information

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment

The AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment 6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,

More information

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding

IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,

More information

BOTNET Detection Approach by DNS Behavior and Clustering Analysis

BOTNET Detection Approach by DNS Behavior and Clustering Analysis BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the

More information

Local Area Network Management

Local Area Network Management Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area

More information

Dynamic Placement for Clustered Web Applications

Dynamic Placement for Clustered Web Applications Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co

More information

DISTRIBUTED LOW-INTERACTION HONEYPOT SYSTEM TO DETECT BOTNETS

DISTRIBUTED LOW-INTERACTION HONEYPOT SYSTEM TO DETECT BOTNETS DISTRIBUTED LOW-INTERACTION HONEYPOT SYSTEM TO DETECT BOTNETS GONG JIAN 2 jgong@njnet.edu.cn Jiangsu Key Laboratory of Computer Networking Technology, China, Nanjing, Southeast University AHMAD JAKALAN

More information

Botnet Detection Based on Traffic Monitoring

Botnet Detection Based on Traffic Monitoring 201O International Conference on Networking and Information Technology Botnet Detection Based on Traffic Monitoring Hossein Rouhani Zeidanloo, Azizah Bt Manaf Centre for Advanced Software Engineering University

More information

Preference-based Search and Multi-criteria Optimization

Preference-based Search and Multi-criteria Optimization Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr

More information

AUC Optimization vs. Error Rate Minimization

AUC Optimization vs. Error Rate Minimization AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC

More information

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES

REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer

More information

Leak detection in open water channels

Leak detection in open water channels Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical

More information

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)

Fuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3) 324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei

More information

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation

AutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation //j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

Energy Proportionality for Disk Storage Using Replication

Energy Proportionality for Disk Storage Using Replication Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy

More information

Machine Learning Applications in Grid Computing

Machine Learning Applications in Grid Computing Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu

More information

Online Community Detection for Large Complex Networks

Online Community Detection for Large Complex Networks Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Online Counity Detection for Large Coplex Networks Wangsheng Zhang, Gang Pan, Zhaohui Wu, Shijian Li Departent

More information

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1

International Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1 International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi

More information

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel

Adaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme

Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme , pp.81-90 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.09 Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1, 2, Lei Yang 1 and Jin Wang 1 1 School of Computer

More information

An analysis of network trac characteristics for Botnet detection

An analysis of network trac characteristics for Botnet detection An analysis of network trac characteristics for Botnet detection Maria Jose Erquiaga 1, Carlos Catania 1 and Carlos García Garino 1,2 1 Instituto para las Tecnologías de la Información y las Comunicaciones

More information

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects

Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux

More information

Alba A Cognitive Assistant for Network Administration

Alba A Cognitive Assistant for Network Administration Alba A Cognitive Assistant for Network Adinistration Francisco J. Martin and Enric Plaza School of Electrical Engineering and Coputer Science Oregon State University, Corvallis, 97331 OR, USA IIIA - Artificial

More information

Quality evaluation of the model-based forecasts of implied volatility index

Quality evaluation of the model-based forecasts of implied volatility index Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor

More information

Multifaceted Approach to Understanding the Botnet Phenomenon

Multifaceted Approach to Understanding the Botnet Phenomenon Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic

More information

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive

This paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed

More information

Botnet Detection by Abnormal IRC Traffic Analysis

Botnet Detection by Abnormal IRC Traffic Analysis Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National

More information

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials

A Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food

More information

Towards Change Management Capability Assessment Model for Contractors in Building Project

Towards Change Management Capability Assessment Model for Contractors in Building Project Middle-East Journal of Scientific Research 23 (7): 1327-1333, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.ejsr.2015.23.07.120 Towards Change Manageent Capability Assessent Model for

More information

A Scalable Application Placement Controller for Enterprise Data Centers

A Scalable Application Placement Controller for Enterprise Data Centers W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.

More information

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model

Evaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary

More information

Botnet Detection using NetFlow and Clustering

Botnet Detection using NetFlow and Clustering Botnet Detection using NetFlow and Clustering Pedram Amini1, Reza Azmi2 and MuhammadAmin Araghizadeh3 1 2 3 ICT Department, Malek-Ashtar University of Technology Tehran, Iran amini@mut.ac.ir Department

More information

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates

Standards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE

More information

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller

Design of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference

More information

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent

How To Balance Over Redundant Wireless Sensor Networks Based On Diffluent Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received

More information

Factored Models for Probabilistic Modal Logic

Factored Models for Probabilistic Modal Logic Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois

More information

Resource Allocation in Wireless Networks with Multiple Relays

Resource Allocation in Wireless Networks with Multiple Relays Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0

More information

Online Classification of Network Flows

Online Classification of Network Flows 2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University

More information

Equivalent Tapped Delay Line Channel Responses with Reduced Taps

Equivalent Tapped Delay Line Channel Responses with Reduced Taps Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ

More information

Optimal Resource-Constraint Project Scheduling with Overlapping Modes

Optimal Resource-Constraint Project Scheduling with Overlapping Modes Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de

More information

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka

Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques

More information

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure

Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure By Alan Radding and Nick Carr Abstract This paper discusses the issues related to storage design and anageent when an IT

More information

Detecting P2P-Controlled Bots on the Host

Detecting P2P-Controlled Bots on the Host Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of

The individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.

More information

A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process

A decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process African Journal of Business Manageent Vol. 4(3), pp. 339-349, March 00 Available online at http://www.acadeicjournals.org/ajbm ISSN 993-833 00 Acadeic Journals Full Length Research Paper A decision odel

More information

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms

Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue

More information

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES

AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,

More information

The Stock Market and the Financing of Corporate Growth in Africa: The Case of Ghana

The Stock Market and the Financing of Corporate Growth in Africa: The Case of Ghana WP/06/201 The Stock Market and the Financing of Corporate Growth in Africa: The Case of Ghana Charles Ao Yartey 2006 International Monetary Fund WP/06/201 IMF Working Paper Research Departent The Stock

More information