Botnets Detection Based on IRC-Community
|
|
- Helen Johnston
- 8 years ago
- Views:
Transcription
1 Botnets Detection Based on IRC-Counity Wei Lu and Ali A. Ghorbani Network Security Laboratory, Faculty of Coputer Science University of New Brunswick, Fredericton, NB E3B 5A3, Canada {wlu, Botnets are networks of coproised coputers controlled under a coon coand and control (C&C) channel. Recognized as one the ost serious security threats on current Internet infrastructure, botnets are often hidden in existing applications, e.g. IRC, HTTP, or Peer-to-Peer, which akes the botnet detection a challenging proble. Previous attepts for detecting botnets are to exaine traffic content for IRC coand on selected network links or by setting up honeypots. In this paper, we propose a new approach for detecting and characterizing botnets on a large-scale WiFi ISP network, in which we first classify the network traffic into different applications by using payload signatures and a novel clustering algorith and then analyze the specific IRC application counity based on the teporal-frequent characteristics of flows that leads the differentiation of alicious IRC channels created by bots fro noral IRC traffic generated by huan beings. We evaluate our approach with over 60 illion flows collected over five consecutive days on a large scale network and results show the proposed approach successfully detects the botnet flows fro over 60 illion flows with a high detection rate and an acceptable low false alar rate. O I. INTRODUCTION ne of the biggest threats to the current Internet infrastructure is botnets which are usually coprised of large pools of coproised coputers under the control of a botaster. Botnets can be centralized, distributed or peer-topeer (PP) according to different coand and control (C&C) odels and different counication protocols (e.g. HTTP, IRC or PP). The attacks conducted by botnets are very different, ranging fro Distributed Denial-of-Service (DDoS) attacks to e-ail spaing, keylogging, click fraud, and new alware spreading. In Figure, we illustrate a typical lifecycle of a botnet and its attacking behaviours. Botaster.exploit.bot download 7.coand 4.join 5.pass authen. victi server Botnet 6.pass vulnerable host IRC server Fig.. Typical life-cycle of a IRC based botnet and its attacking behaviors 7.coand 8.DDOS DNS server 3.DNS query The botaster usually finds a new bot by exploiting its vulnerabilities reotely. Once affected, the bot will download and install the binary code by itself. After that, each bot on the botnet will attept to find the IRC server address by DNS query, which is illustrated in Step 3 of Figure. Next is the counication step between bots and IRC server. In IRC based counication echanis, a bot first sends a PASS essage to the IRC server to start a session and then the server authenticates the bot by checking its password. In any cases, the botaster also needs to authenticate itself to the IRC server. Upon the copletion of these authentications, the coand and control channels aong botaster, bots, and IRC server will be established. To start a DDoS attack, the botaster only needs to send a siple coand like ".ddos.start victi_ip" while all bots receive this coand and start to attack the victi server. This is shown in Step 8 of Figure. More inforation about the botaster coand library can be found in []. Detecting botnets traffic is a very challenging proble. This is because: () botnets use the existing application protocol, and thus their traffic volue is not that big and is very siilar to the noral traffic behaviour; () classifying traffic applications becoes ore challenging due to the traffic content encryption and the unreliable destination port labelling ethod. Previous attepts on detecting botnets are ainly based on honeypots [,3,4,5,6], passive anoaly analysis [7,8,9] and traffic application classification [0,,]. Setting up and installing honeypots on the Internet is very helpful to capture alwares and understand the basic behaviours of botnets. The passive anoaly analysis for detecting botnets on a network traffic is usually independent of the traffic content and has the potential to find different types of botnets (e.g. HTTP based botnet, IRC based botnet or PP based botnet). The traffic application classification based botnets detection focuses on classifying traffic into IRC traffic and non-irc traffic, and thus it can only detect IRC based botnets, which is the biggest liitation when copared with the anoaly based botnets detection. In this paper, we focus on traffic classification based botnets detection. Instead of labeling and filtering traffic into non-irc and IRC, we propose a generic approach to classify traffic into different application counities (e.g. PP, Chat, Web, etc.). Then, based on each specific application counity, we investigate and apply the teporal-frequent characteristics of network flows to differentiate the alicious botnet behaviors fro the noral application traffic. The ajor contributions of this paper include: () a novel This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.
2 application discovery approach for classifying network applications in a large-scale WiFi ISP network, () a new algorith to discriinate botnets IRC fro the noral IRC traffic, which is based on n-gra (frequent characteristics) of flow payload over a tie period (teporal characteristics), and (3) a botnet detection fraework for detecting any types of botnets. The rest of the paper is organized as follows. Section II presents our application classification approach for network flows. Section III is the botnet detection algorith based on the teporal-frequent characteristics of botnets. Section IV is the experiental evaluation for our detection odel with over 60 illion flows collected on a large-scale WiFi ISP network. Finally, soe concluding rearks and future work are given in Section V. II. TRAFFIC APPLICATION CLASSIFICATION Identifying network traffic into different applications is very challenging and is still an issue yet to be solved. In practice, traffic application classification relies to a large extent on the transport layer port nubers, which was an effective way in the early days of the Internet. Port nubers, however, provide very liited inforation nowadays. An alternative way is to exaine the payload of network flows and then create signatures for each application. This, however, generates two ajor liitations: () legal issues related to privacy, and () it is ipossible to identify encrypted traffic. By observing traffic on a large-scale WiFi ISP network, we found that even exploring the flow content exaination ethod, there are still about 40% network flows that cannot be classified into specific applications (i.e. 40% network flows are labeled as unknown applications). Investigating such a huge nuber of unknown traffic is inevitable since they ight stand for the abnoralities in the traffic, alicious behaviors or siply the identification of novel applications. Next we first discuss the payload signatures based classification approach and then present the cross association clustering algorith for classifying the unknown traffic into different known application counities. A. Payload Signatures Based Classification The payload signatures based classifier is to investigate the characteristics of bit strings in the packet payload. For ost applications, their initial protocol handshake steps are usually different and thus can be used for classification. Moreover, the protocol signatures can be odeled through either public docuents like RFC or epirical analysis for deriving the distinct bit strings on both TCP and UDP traffic. The classifier is deployed on a large-scale free wireless fidelity (WiFi) network and the classification results show that about 40% flows cannot be classified by the current application payload signatures based classification ethod. Next, we present a fuzzy cross association clustering algorith in order to address this issue. B. Unknown Traffic Classification The traditional port-based classification ethod is proven to be isleading due to the increase of applications tunneled through HTTP, the constant eergence of new protocols and the doination of PP networking [3]. Exaining the payload signatures of applications iproves the classification accuracy, but still a large nuber of traffic cannot be identified. Recent studies on application classification include "applying achine learning algoriths for clustering and classifying traffic flows" [4], "statistical fingerprint based classification" [5] and "identifying traffic on the fly" [6]. Different with the previous approaches, our ethod is hybrid, cobining the payload signatures with a novel cross association clustering algorith [7]. The payload signatures classify traffic into predefined known application counities. The unknown traffic is then assigned into different application counities with a set of probabilities by using a clustering algorith. Those unknown traffic that cannot be classified into any known application counity will be considered as new or unknown applications. The basic idea of applying cross association algorith is to study the association relationship between known traffic and unknown traffic. In nuerous data ining applications, a large and sparse binary atrix is used to represent the association between two objects (corresponding to rows and coluns). Cross associations are then defined as a set of rectangular regions with different densities. The clustering goal is to suarize the underlying structure of object associations by decoposing the binary atrix into disjoint row and colun groups such that the rectangular intersections of groups are hoogeneous with high or low densities. Previous association clustering algoriths need to predefine the nuber of clusters (i.e. rectangles). This, however, is not realistic in our unknown traffic classification because the actual nuber of applications is unknown. The basis of our unknown traffic classification ethodology is a novel cross association clustering algorith that can fully estiate the nuber of rows and coluns autoatically [7]. During classification, the traffic consists of unknown and known flows are clustered in ters of the source IP and the destination IP. A set of rectangles is generated after this stage. We define these rectangles as counities including either a set of flows or epty. Then flows in each counity are clustered in ters of destination IP and destination port. Siilarly, one counity will be decoposed into several sub-counities, each represents an application counity. After all flows are classified into different application counities, we have to label each application counity. A siple and effective way is to label each application counity based on its content. In particular, we calculate the nuber of flows for each known application in the counity and noralize the nubers into a set of probabilities ranging fro 0 to. The unknown flows in each application will be assigned into a specific application according to a set of probabilities. This idea is siilar with the eber function in fuzzy clustering algorith and the experiental evaluation proves its accuracy and efficiency. An exception for this labeling ethod is if the doinant flow in the counity is the unknown flow, the whole counity will be labeled as This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.
3 Index of ASCII Characters "unknown", which has the potential of discovering new or unknown applications. III. BOTNET DETECTION BASED ON IRC COMMUNITY A general ai for intrusion detection is to find various attack types by odeling signatures of known intrusions (isuse detection) or profiles of noral behaviors (anoaly detection). Botnet detection, however, is ore specific due to a given application doain. N-gra bytes distribution has proven its efficiency on detecting network anoalies. In [8] Wang et al. exained -gra byte distribution of the packet payload, represented each packet into a -dienational vector describing the occurrence frequency of one of the ASCII characters in the payload and then constructed the noral packet profile through calculating the statistical average and deviation value of noral packets to a specific application service (e.g. HTTP). Anoalies will be alerted once a Mahalanobis distance deviation of the testing data to the noral profiles exceeds a predefined threshold. Gu et al. iprove this approach and apply it for detecting alware infection in their recent work [9]. Different with previous n-gra based detection approaches, our ethod extends n-gra frequency into a teporal doain and generates a set of -dientional vector representing the teporal-frequent characteristics of the ASCII binary bytes on the payload over a predefined tie interval. The teporal feature is iportant in botnets detection due to two epirical observations of botnets behaviors: () the response tie of bots is usually iediate and accurate once they receive coands fro botaster, while noral huan behaviors ight perfor an action with various possibilities after a reasonable thinking tie, and () bots basically have preprograed activities based on botaster s coands, and thus all bots ight be synchronized with each other. After obtaining the n-gra (n = in this case) features for flows over a tie-window, we then apply K-eans algorith to cluster the data objects with -deensional features. We don t construct the noral profiles because noral traffic is sensitive to the practical networking environent and a high false positive rate ight be generated when deploying the training odel on a new environent. In contrast, K-eans clustering is unsupervised and doesn t define threshold that needs to be tuned in different cases. In our approach, the nuber of initial clusters by K-eans is. We denote the -diensional n-gra byte distribution as a vector ti ti t < f i >, where t f i stands for the frequency of j the j th ASCII character on the payload over a tie window t i (j=,,, and i=0, ). Given a set of N data objects F ~ {F i i=,,,n}, where ti ti t =< i >, the detection approach Fi f is described in Algorith I. In practice, labeling the cluster is always a challenging proble when applying unsupervised algorith for intrusion detection. By observing the noral IRC traffic over a long period on a large scale WiFi ISP network and the IRC botnet traffic collected on a honeypot, we derive a new etric, standard deviation σ for each cluster, to differentiate botnet IRC cluster fro noral IRC clusters. The higher the value of average σ over ACSII characters for flows on a cluster, the ore noral the cluster is. This is reasonable because during noral IRC traffic, huan being s behaviors is ore diverse with various possibilities copared to the alicious IRC traffic generated by bots. Given the frequency vectors for n flows as follows: { < f, f,..., f >, < f > < f n n n > } Suppose σ j is the standard deviation of the j th ASCII over n flows, the average standard deviation σ over ACSII characters for flows can be calculated by the following forula: Average Bytes Frequecny over Noral IRC σi σ= i= ALGORITHM I BOTNET DETECTION Function BotDel (F) returns botnet cluster t Inputs: Collection of data objects i ti t F f i i =< >, i =,,..N Initialization: initialize nuber of clusters k ( e.g. k = ), cluster centers c, k Repeat: q q + Assign data objects to clusters by deterining the closest cluster center points. Calculate the new center point c newfor each cluster. Until: c new c< th or q > th Calculate standard deviation for each cluster : σ, σ,..., σ σ = ax( σ, σ,..., σ ) then cluster b is labeled as botnet cluster If b Return the botnet cluster σ b. Average Bytes Frequency over IRC Botnet Index of ASCII Characters Fig. Average bytes frequency over Fig. 3 Average bytes frequency over ASCIIs for noral IRC flows ASCIIs for botnet IRC As an exaple, Figures and 3 illustrate the average bytes frequency over the noral IRC flows and IRC botnet flows, respectively. The average standard deviation of bytes frequency over ASCII characters for noral IRC traffic is 0.00 and the axial standard deviation of bytes frequency over ASCII characters for noral IRC traffic is 0.05, while the average standard deviation of bytes frequency over ASCII characters for IRC botnet traffic is and its axiu is 0.0, which is uch saller than that of noral IRC traffic. This observation confirs that the noral huan This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. 3 Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.
4 being s IRC traffic is ore diverse than the alicious IRC traffic generated by bots. IV. EXPERIMENTAL EVALUATION We ipleent a prototype syste for the approach and then evaluate it on a large-scale WiFi ISP network over five consecutive business days. The botnet IRC traffic is collected on a honeypot deployed on a real network and is then aggregated into 43 flows. The tie interval for flow aggregation is inute. When evaluating the prototype syste, we randoly insert and replay botnet traffic flows on the noral daily traffic. Since our approach is a two-stage process (i.e. unknown traffic classification first and botnet detection on IRC application counity next), the evaluation is accordingly divided into two parts: () the perforance testing for unknown traffic classification, not only focusing on the capability of our approach to classify the unknown IRC traffic, we also concentrate on the classification accuracy for other unknown applications (e.g. new PP) since we expect the algorith could be extended to detect various types of botnet, like Web based and PP based botnets; () the perforance evaluation for syste to discriinate alicious IRC bonnet traffic fro noral huan being IRC traffic. A. Evaluation on Unknown Traffic Classification Evaluating the unknown traffic classification capability is not an easy task in reality since we have no idea on the novel or recent appeared applications and it always needs the intervention of network experts. During our experient, we randoly choose part of known traffic and then force to label the as unknown. The selection for the nuber of all these label free traffic is decided according to the 40% rule. The final unknown traffic set is coposed by the forcibly labeled known traffic and the 43 botnet IRC flows. Over five days evaluation, we found that all the botnet flows can be accurately classified into the IRC application counity (i.e. 00% classification rate for IRC traffic). However, the general classification accuracy over all applications is about 85% which is not that high copared to the specific IRC application. The general classification accuracy is an average value over all application classification since the approach has different classification rate for different application counities. Table I is a description about known application set and the unknown application set over one hour, e.g. how any known applications the flows belong to, etc. B. Evaluation on Discriinating Botnet fro Noral IRC The proposed approach is evaluated with five full consecutive days traffic. Table II shows the flow distribution for IRC application counity and the total flow counity for each day after the traffic classification step. Two etrics are used to evaluate the perforance of discriinating botnet traffic fro noral IRC traffic, naely Detection Rate (DR) and False Alar Rate (FAR). DR is the ratio of nuber of botnet flows detected over total nuber of botnet flows and FAR is the ratio of nuber of false botnet alars over the total nuber of alars. TABLE I DESCRIPTION ON KNOWN AND UNKNOWN SET OVER ONE HOUR Known et Unknown et Nuber Nuber of Nuber Nuber of of Applications of Applications TABLE II DESCRIPTION ON IRC COMMUNITIES OVER FIVE DAYS Total Known Total IRC Known IRC 35409K 374K K 833K K 574K K 0596K K 096K Table III lists the DR and FAR for all the five days detection and accordingly Table IV lists the average standard deviation over the characters of the payload collected on the network for each cluster. TABLE III DETECTION PERFORMANCE OVER FIVE DAYS Perforance Metrics DR (%) FAR (%) TABLE IV STANDARD DEVIATION OF BYTES FREQUENCY OVER ASCIIS FOR NORMAL AND BOTNET CLUSTERS Average Standard Noral Clusters Botnet Clusters Fro Table II, we see that the total nuber of flows we collect for one day is over 30M and the total nuber of known flows which can be labeled by the payload signatures is over 0M. The nuber of IRC flows over the five consecutive day is fro 00 to 600, which is a very sall part of the total flows. Our traffic classification approach can classify the unknown IRC flows to the IRC application counity with a 00% classification rate on the five days evaluation. The detection rate for differentiating bot IRC traffic fro noral huan being s IRC traffic is 00% on four days testing, while an exception happens on the 3 rd day s testing on which our approach obtained a 77.8% detection rate with a 3.% false alar rate. The best evaluation over the five days testing is a This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. 4 Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.
5 00% detection rate with only.6% false alar rate. Moreover, evaluation results fro Table IV indicate that the average standard deviation of bytes frequency over the ASCIIs on the flow payload is an iportant etric to indicate noral huan IRC clusters and alicious IRC traffic generated by achine bots. V. CONCLUSION In this paper we attept to conduct a taxonoy on all existing botnet detection approaches and classify the into three categories, naely honeypots based, passive anoaly analysis based and traffic application classification based. As claied by Gu et al., anoaly based botnet detection approaches have the potential to find different types of botnets, while current existing traffic classification approaches only focus on differentiating alicious IRC traffic fro noral IRC traffic, which is considered as its biggest liitation. In this paper, we address this liitation by presenting a novel generic application classification approach. Through this unknown applications on the current network will be classified into different application counities, like Chat (or ore specific IRC) counity, PP counity, Web counity, etc. Since botnets are exploring existing application protocols, detection can be conducted in each specific counity. As a result, our approach can be extended to find different types of botnets. In particular, we evaluate our fraework on IRC counity in this paper and evaluation results show that our approach obtains a very high detection with a low false alar rate when detecting IRC botnet traffic. Especially we foralize the botnet behaviours by using an average standard deviation of bytes frequency over ASCIIs on the traffic payload, and conclude an iportant bot identification strategy, that is the higher the value of the average deviation, the ore huan being like the IRC traffic. This indication strategy is iportant when using unsupervised clustering algorith for botnet detection in the later research. In the near future, we will evaluate our approach on the web specific counity and test its perforance on web based botnets. Soe novel PP botnets construction ethods have been proposed and investigated in [], and as a result we will also conduct an evaluation for our approach with the new appeared PP botnets. ACKNOWLEDGMENT The authors graciously acknowledge the funding fro the Atlantic Canada Opportunity Agency (ACOA) through the Atlantic Innovation Fund (AIF) to Dr. Ghorbani. REFERENCES [] P. Barford and V. Yegneswaran, "An inside look at Botnets," Special Workshop on Malware Detection, Advances in Inforation Security, Springer Verlag, ISBN: , 006. [] The Honeynet Project & Research Alliance, "Know your eney: Tracking botnets, " March 005. [3] M.A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, "A ultifaceted approach to understanding the botnet phenoenon, " Proceedings of the 6 th ACM SIGCOMM Conference on Internet easureent, pp. 4-5, October 006. [4] P. Baecher, M. Koetter, T. Holz, M. Dornseif, and F. Freiling, "The nepenthes platfor: an efficient approach to collect alware," Proceedings of Recent Advances in Intrusion Detection, LNCS 49, Springer-Verlag, 006, pp , Haburg, Septeber 006. [5] V. Yegneswaran, P. Barford, and V. Paxson, "Using honeynets for internet situational awareness," Proceedings of the 4 th Workshop on Hot Topics in Networks, College Park, MD, Noveber 005. [6] Z.H. Li, A. Goyal, and Y. Chen, "Honeynet-based botnet scan traffic analysis," Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Inforation Security, Vol. 36, W.K.Lee, C. Wang, D. Dagon, (Eds.), Springer, ISBN: , 008. [7] G.F. Gu, J.J. Zhang, and W.K. Lee, "BotSniffer: detecting botnet coand and control channels in network traffic," Proceedings of the 5 th Annual Network and Distributed Syste Security Syposiu, San Diego, CA, February 008 [8] A. Karasaridis, B. Rexroad, and D. Hoeflin, "Wide-scale botnet detection and characterization," Proceedings of the st Conference on st Workshop on Hot Topics in Understanding Botnets, Cabridge, MA, 007. [9] J. R. Binkley and S. Singh, "An algorith for anoaly-based botnet detection," USENIX SRUTI: nd Workshop on Steps to Reducing Unwanted Traffic on the Internet, July 006. [0] W. T. Strayer, R. Walsh, and C. Livadas, D. Lapsley, "Detecting botnets with tight coand and control," Proceedings st IEEE Conference on Local Coputer Networks, pp. 95-0, Nov [] W. T. Strayer, D. Lapsley, R. Walsh, and C. Livadas, "Botnet Detection Based on Network Behavior," Botnet Detection: Countering the Largest Security Threat, in Series: Advances in Inforation Security, Vol. 36, W.K.Lee, C. Wang, D. Dagon, (Eds.), Springer, ISBN: , 008. [] C. Livadas, R. Walsh, D. Lapsley, and W.T. Strayer, "Using achine learning techniques to identify botnet traffic," Proceedings st IEEE Conference on Local Coputer Networks, pp , Nov [3] A. W. Moore and K. Papagiannaki, "Toward the accurate identification of network applications," Proceedings of 6 th International Workshop on Passive and Active Network Measureent, pp. 4-54, Boston, MA, March 005. [4] N. Willias, S. Zander and G. Aritage, "A preliinary perforance coparison of five achine learning algoriths for practical IP traffic flow classification," ACM SIGCOMM Coputer Counication Review, Vol. 36, Issue 5, pp. 5-6, 006. [5] M. Crotti, M. Dusi, F. Gringoli and L. Salgarelli, "Traffic classification through siple statistical fingerprinting," ACM SIGCOMM Coputer Counication Review, Vol. 37, Issue, pp. 5-6, 007. [6] L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salaatian, "Traffic classification on the fly," ACM SIGCOMM Coputer Counication Review, Vol. 36, Issue, pp. 3-6, 006. [7] D. Chakrabarti, S. Papadiitriou, D. Modha, and C. Faloutsos, "Fully Autoatic Cross-Associations," Proceedings of the 0 th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp , Seattle, Washington, August -5, 004. [8] K. Wang and S. Stolfo, "Anoalous payload-based wor detection and signature generation," Proceedings of the 8 th International Syposiu on Recent Advances in Intrusion Detection (RAID), Seattle, WA, 005. [9] G. F. Gu, P. Porras, V. Yegneswaran, M. Fong, and W.K. Lee, "BotHunter: detecting alware infection through IDS-Driven dialog correlation," Proceedings of the 6 th USENIX Security Syposiu, Boston, MA, August 007. [0] P. Wang, S. Sparks, and C. Zou "An advanced hybrid peer-to-peer botnet," Proceedings of the st conference on st Workshop on Hot Topics in Understanding Botnets, Cabridge, MA, 007. [] C. Zou and R. Cunningha, "Honeypot-aware advanced botnet construction and aintenance," Proceedings of International Conference on Dependable Systes and Networks, June 006. This full text paper was peer reviewed at the direction of IEEE Counications Society subject atter experts for publication in the IEEE "GLOBECOM" 008 proceedings /08/$ IEEE. 5 Authorized licensed use liited to: University of New Brunswick. Downloaded on May 8, 009 at : fro IEEE Xplore. Restrictions apply.
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets
An Anomaly-based Botnet Detection Approach for Identifying Stealthy Botnets Sajjad Arshad 1, Maghsoud Abbaspour 1, Mehdi Kharrazi 2, Hooman Sanatkar 1 1 Electrical and Computer Engineering Department,
More informationApplying Multiple Neural Networks on Large Scale Data
0 International Conference on Inforation and Electronics Engineering IPCSIT vol6 (0) (0) IACSIT Press, Singapore Applying Multiple Neural Networks on Large Scale Data Kritsanatt Boonkiatpong and Sukree
More informationAnalyzing Spatiotemporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy
Vol. 9, No. 5 (2016), pp.303-312 http://dx.doi.org/10.14257/ijgdc.2016.9.5.26 Analyzing Spatioteporal Characteristics of Education Network Traffic with Flexible Multiscale Entropy Chen Yang, Renjie Zhou
More informationAn Innovate Dynamic Load Balancing Algorithm Based on Task
An Innovate Dynaic Load Balancing Algorith Based on Task Classification Hong-bin Wang,,a, Zhi-yi Fang, b, Guan-nan Qu,*,c, Xiao-dan Ren,d College of Coputer Science and Technology, Jilin University, Changchun
More informationExtending Black Domain Name List by Using Co-occurrence Relation between DNS queries
Extending Black Domain Name List by Using Co-occurrence Relation between DNS queries Kazumichi Sato 1 keisuke Ishibashi 1 Tsuyoshi Toyono 2 Nobuhisa Miyake 1 1 NTT Information Sharing Platform Laboratories,
More informationImplementation of Botcatch for Identifying Bot Infected Hosts
Implementation of Botcatch for Identifying Bot Infected Hosts GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas A&M University-Corpus Christi Corpus
More informationSoftware Quality Characteristics Tested For Mobile Application Development
Thesis no: MGSE-2015-02 Software Quality Characteristics Tested For Mobile Application Developent Literature Review and Epirical Survey WALEED ANWAR Faculty of Coputing Blekinge Institute of Technology
More informationPERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO
Bulletin of the Transilvania University of Braşov Series I: Engineering Sciences Vol. 4 (53) No. - 0 PERFORMANCE METRICS FOR THE IT SERVICES PORTFOLIO V. CAZACU I. SZÉKELY F. SANDU 3 T. BĂLAN Abstract:
More informationThe Research of Measuring Approach and Energy Efficiency for Hadoop Periodic Jobs
Send Orders for Reprints to reprints@benthascience.ae 206 The Open Fuels & Energy Science Journal, 2015, 8, 206-210 Open Access The Research of Measuring Approach and Energy Efficiency for Hadoop Periodic
More informationSymptoms Based Detection and Removal of Bot Processes
Symptoms Based Detection and Removal of Bot Processes 1 T Ravi Prasad, 2 Adepu Sridhar Asst. Prof. Computer Science and engg. Vignan University, Guntur, India 1 Thati.Raviprasad@gmail.com, 2 sridharuce@gmail.com
More informationBotCop: An Online Botnet Traffic Classifier
2009 Seventh Annual Communications Networks and Services Research Conerence BotCop: An Online Botnet Traic Classiier Wei Lu, Mahbod Tavallaee, Goaletsa Rammidi and Ali A. Ghorbani Faculty o Computer Science
More informationSUPPORTING YOUR HIPAA COMPLIANCE EFFORTS
WHITE PAPER SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation HEALTHCARE SUPPORTING YOUR HIPAA COMPLIANCE EFFORTS Quanti Solutions. Advancing HIM through Innovation
More informationA Review on IRC Botnet Detection and Defence
A Review on IRC Botnet Detection and Defence Bernhard Waldecker St. Poelten University of Applied Sciences, Austria Bachelor programme: IT-Security 1 Introduction Nowadays botnets pose an enormous security
More informationAn Approach to Combating Free-riding in Peer-to-Peer Networks
An Approach to Cobating Free-riding in Peer-to-Peer Networks Victor Ponce, Jie Wu, and Xiuqi Li Departent of Coputer Science and Engineering Florida Atlantic University Boca Raton, FL 33431 April 7, 2008
More informationOnline Bagging and Boosting
Abstract Bagging and boosting are two of the ost well-known enseble learning ethods due to their theoretical perforance guarantees and strong experiental results. However, these algoriths have been used
More informationReal Time Target Tracking with Binary Sensor Networks and Parallel Computing
Real Tie Target Tracking with Binary Sensor Networks and Parallel Coputing Hong Lin, John Rushing, Sara J. Graves, Steve Tanner, and Evans Criswell Abstract A parallel real tie data fusion and target tracking
More informationModeling Parallel Applications Performance on Heterogeneous Systems
Modeling Parallel Applications Perforance on Heterogeneous Systes Jaeela Al-Jaroodi, Nader Mohaed, Hong Jiang and David Swanson Departent of Coputer Science and Engineering University of Nebraska Lincoln
More informationPerformance Evaluation of Machine Learning Techniques using Software Cost Drivers
Perforance Evaluation of Machine Learning Techniques using Software Cost Drivers Manas Gaur Departent of Coputer Engineering, Delhi Technological University Delhi, India ABSTRACT There is a treendous rise
More informationAn Integrated Approach for Monitoring Service Level Parameters of Software-Defined Networking
International Journal of Future Generation Counication and Networking Vol. 8, No. 6 (15), pp. 197-4 http://d.doi.org/1.1457/ijfgcn.15.8.6.19 An Integrated Approach for Monitoring Service Level Paraeters
More informationASIC Design Project Management Supported by Multi Agent Simulation
ASIC Design Project Manageent Supported by Multi Agent Siulation Jana Blaschke, Christian Sebeke, Wolfgang Rosenstiel Abstract The coplexity of Application Specific Integrated Circuits (ASICs) is continuously
More informationP2P-BDS: Peer-2-Peer Botnet Detection System
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 5, Ver. V (Sep Oct. 2014), PP 28-33 P2P-BDS: Peer-2-Peer Botnet Detection System Navjot Kaur 1, Sunny
More informationData Streaming Algorithms for Estimating Entropy of Network Traffic
Data Streaing Algoriths for Estiating Entropy of Network Traffic Ashwin Lall University of Rochester Vyas Sekar Carnegie Mellon University Mitsunori Ogihara University of Rochester Jun (Ji) Xu Georgia
More informationResearch Article Performance Evaluation of Human Resource Outsourcing in Food Processing Enterprises
Advance Journal of Food Science and Technology 9(2): 964-969, 205 ISSN: 2042-4868; e-issn: 2042-4876 205 Maxwell Scientific Publication Corp. Subitted: August 0, 205 Accepted: Septeber 3, 205 Published:
More informationBotnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1,2, Yang Lei 1, Jin Wang 1 1 School of Computer & Software, Nanjing University of Information Science &Technology,
More informationAn Improved Decision-making Model of Human Resource Outsourcing Based on Internet Collaboration
International Journal of Hybrid Inforation Technology, pp. 339-350 http://dx.doi.org/10.14257/hit.2016.9.4.28 An Iproved Decision-aking Model of Huan Resource Outsourcing Based on Internet Collaboration
More informationExploiting Hardware Heterogeneity within the Same Instance Type of Amazon EC2
Exploiting Hardware Heterogeneity within the Sae Instance Type of Aazon EC2 Zhonghong Ou, Hao Zhuang, Jukka K. Nurinen, Antti Ylä-Jääski, Pan Hui Aalto University, Finland; Deutsch Teleko Laboratories,
More informationGenerating Certification Authority Authenticated Public Keys in Ad Hoc Networks
SECURITY AND COMMUNICATION NETWORKS Published online in Wiley InterScience (www.interscience.wiley.co). Generating Certification Authority Authenticated Public Keys in Ad Hoc Networks G. Kounga 1, C. J.
More informationEfficient Key Management for Secure Group Communications with Bursty Behavior
Efficient Key Manageent for Secure Group Counications with Bursty Behavior Xukai Zou, Byrav Raaurthy Departent of Coputer Science and Engineering University of Nebraska-Lincoln Lincoln, NE68588, USA Eail:
More informationMedia Adaptation Framework in Biofeedback System for Stroke Patient Rehabilitation
Media Adaptation Fraework in Biofeedback Syste for Stroke Patient Rehabilitation Yinpeng Chen, Weiwei Xu, Hari Sundara, Thanassis Rikakis, Sheng-Min Liu Arts, Media and Engineering Progra Arizona State
More informationExtended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona Network
2013 European Control Conference (ECC) July 17-19, 2013, Zürich, Switzerland. Extended-Horizon Analysis of Pressure Sensitivities for Leak Detection in Water Distribution Networks: Application to the Barcelona
More informationAn improved TF-IDF approach for text classification *
Zhang et al. / J Zheiang Univ SCI 2005 6A(1:49-55 49 Journal of Zheiang University SCIECE ISS 1009-3095 http://www.zu.edu.cn/zus E-ail: zus@zu.edu.cn An iproved TF-IDF approach for text classification
More informationSearching strategy for multi-target discovery in wireless networks
Searching strategy for ulti-target discovery in wireless networks Zhao Cheng, Wendi B. Heinzelan Departent of Electrical and Coputer Engineering University of Rochester Rochester, NY 467 (585) 75-{878,
More informationStudy on the development of statistical data on the European security technological and industrial base
Study on the developent of statistical data on the European security technological and industrial base Security Sector Survey Analysis: France Client: European Coission DG Migration and Hoe Affairs Brussels,
More informationCRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS
641 CRM FACTORS ASSESSMENT USING ANALYTIC HIERARCHY PROCESS Marketa Zajarosova 1* *Ph.D. VSB - Technical University of Ostrava, THE CZECH REPUBLIC arketa.zajarosova@vsb.cz Abstract Custoer relationship
More informationImage restoration for a rectangular poor-pixels detector
Iage restoration for a rectangular poor-pixels detector Pengcheng Wen 1, Xiangjun Wang 1, Hong Wei 2 1 State Key Laboratory of Precision Measuring Technology and Instruents, Tianjin University, China 2
More informationINTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE SYSTEMS
Artificial Intelligence Methods and Techniques for Business and Engineering Applications 210 INTEGRATED ENVIRONMENT FOR STORING AND HANDLING INFORMATION IN TASKS OF INDUCTIVE MODELLING FOR BUSINESS INTELLIGENCE
More informationProtecting Small Keys in Authentication Protocols for Wireless Sensor Networks
Protecting Sall Keys in Authentication Protocols for Wireless Sensor Networks Kalvinder Singh Australia Developent Laboratory, IBM and School of Inforation and Counication Technology, Griffith University
More informationManaging Complex Network Operation with Predictive Analytics
Managing Coplex Network Operation with Predictive Analytics Zhenyu Huang, Pak Chung Wong, Patrick Mackey, Yousu Chen, Jian Ma, Kevin Schneider, and Frank L. Greitzer Pacific Northwest National Laboratory
More informationFuzzy Sets in HR Management
Acta Polytechnica Hungarica Vol. 8, No. 3, 2011 Fuzzy Sets in HR Manageent Blanka Zeková AXIOM SW, s.r.o., 760 01 Zlín, Czech Republic blanka.zekova@sezna.cz Jana Talašová Faculty of Science, Palacký Univerzity,
More informationBotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation
BotHunter: Detecting Malware Infection Through IDS-Driven Dialog Correlation Guofei Gu, Phillip Porras, Vinod Yegneswaran, Martin Fong, Wenke Lee USENIX Security Symposium (Security 07) Presented by Nawanol
More informationInformation Processing Letters
Inforation Processing Letters 111 2011) 178 183 Contents lists available at ScienceDirect Inforation Processing Letters www.elsevier.co/locate/ipl Offline file assignents for online load balancing Paul
More informationDetection of Botnets Using Honeypots and P2P Botnets
Detection of Botnets Using Honeypots and P2P Botnets Rajab Challoo Dept. of Electrical Engineering & Computer Science Texas A&M University Kingsville Kingsville, 78363-8202, USA Raghavendra Kotapalli Dept.
More informationMarkov Models and Their Use for Calculations of Important Traffic Parameters of Contact Center
Markov Models and Their Use for Calculations of Iportant Traffic Paraeters of Contact Center ERIK CHROMY, JAN DIEZKA, MATEJ KAVACKY Institute of Telecounications Slovak University of Technology Bratislava
More informationADJUSTING FOR QUALITY CHANGE
ADJUSTING FOR QUALITY CHANGE 7 Introduction 7.1 The easureent of changes in the level of consuer prices is coplicated by the appearance and disappearance of new and old goods and services, as well as changes
More informationAn Efficient Methodology for Detecting Spam Using Spot System
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationBOTNET SPREADING DETECTION AND PREVENTION VIA WEBSITES
BOTNET SPREADING DETECTION AND PREVENTION VIA WEBSITES Jonas Juknius, Nikolaj Goranin Vilnius Gediminas Technical University, Faculty of Fundamental Sciences Saulėtekio al. 11, 10223 Vilnius In this article
More informationA framework for performance monitoring, load balancing, adaptive timeouts and quality of service in digital libraries
Int J Digit Libr (2000) 3: 9 35 INTERNATIONAL JOURNAL ON Digital Libraries Springer-Verlag 2000 A fraework for perforance onitoring, load balancing, adaptive tieouts and quality of service in digital libraries
More informationUse of extrapolation to forecast the working capital in the mechanical engineering companies
ECONTECHMOD. AN INTERNATIONAL QUARTERLY JOURNAL 2014. Vol. 1. No. 1. 23 28 Use of extrapolation to forecast the working capital in the echanical engineering copanies A. Cherep, Y. Shvets Departent of finance
More informationBotnet Command Detection using Virtual Honeynet
Botnet Command Detection using Virtual Honeynet J.S.Bhatia #1, R.K.Sehgal *2, Sanjeev Kumar #3 # Cyber Security Technology Division, CDAC Mohali, INDIA 160071 #1 jsb@cdacmohali.in *2 rks@cdacmohali.in
More informationThe AGA Evaluating Model of Customer Loyalty Based on E-commerce Environment
6 JOURNAL OF SOFTWARE, VOL. 4, NO. 3, MAY 009 The AGA Evaluating Model of Custoer Loyalty Based on E-coerce Environent Shaoei Yang Econoics and Manageent Departent, North China Electric Power University,
More informationIEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1. Secure Wireless Multicast for Delay-Sensitive Data via Network Coding
IEEE TRANSACTIONS ON WIRELESS COMMUNICATIONS, ACCEPTED FOR PUBLICATION 1 Secure Wireless Multicast for Delay-Sensitive Data via Network Coding Tuan T. Tran, Meber, IEEE, Hongxiang Li, Senior Meber, IEEE,
More informationBOTNET Detection Approach by DNS Behavior and Clustering Analysis
BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the
More informationLocal Area Network Management
Technology Guidelines for School Coputer-based Technologies Local Area Network Manageent Local Area Network Manageent Introduction This docuent discusses the tasks associated with anageent of Local Area
More informationDynamic Placement for Clustered Web Applications
Dynaic laceent for Clustered Web Applications A. Karve, T. Kibrel, G. acifici, M. Spreitzer, M. Steinder, M. Sviridenko, and A. Tantawi IBM T.J. Watson Research Center {karve,kibrel,giovanni,spreitz,steinder,sviri,tantawi}@us.ib.co
More informationDISTRIBUTED LOW-INTERACTION HONEYPOT SYSTEM TO DETECT BOTNETS
DISTRIBUTED LOW-INTERACTION HONEYPOT SYSTEM TO DETECT BOTNETS GONG JIAN 2 jgong@njnet.edu.cn Jiangsu Key Laboratory of Computer Networking Technology, China, Nanjing, Southeast University AHMAD JAKALAN
More informationBotnet Detection Based on Traffic Monitoring
201O International Conference on Networking and Information Technology Botnet Detection Based on Traffic Monitoring Hossein Rouhani Zeidanloo, Azizah Bt Manaf Centre for Advanced Software Engineering University
More informationPreference-based Search and Multi-criteria Optimization
Fro: AAAI-02 Proceedings. Copyright 2002, AAAI (www.aaai.org). All rights reserved. Preference-based Search and Multi-criteria Optiization Ulrich Junker ILOG 1681, route des Dolines F-06560 Valbonne ujunker@ilog.fr
More informationAUC Optimization vs. Error Rate Minimization
AUC Optiization vs. Error Rate Miniization Corinna Cortes and Mehryar Mohri AT&T Labs Research 180 Park Avenue, Florha Park, NJ 0793, USA {corinna, ohri}@research.att.co Abstract The area under an ROC
More informationREQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES
REQUIREMENTS FOR A COMPUTER SCIENCE CURRICULUM EMPHASIZING INFORMATION TECHNOLOGY SUBJECT AREA: CURRICULUM ISSUES Charles Reynolds Christopher Fox reynolds @cs.ju.edu fox@cs.ju.edu Departent of Coputer
More informationLeak detection in open water channels
Proceedings of the 17th World Congress The International Federation of Autoatic Control Seoul, Korea, July 6-11, 28 Leak detection in open water channels Erik Weyer Georges Bastin Departent of Electrical
More informationFuzzy Evaluation on Network Security Based on the New Algorithm of Membership Degree Transformation M(1,2,3)
324 JOURNAL OF NETWORKS, VOL. 4, NO. 5, JULY 29 Fuzzy Evaluation on Networ Security Based on the New Algorith of Mebership Degree Transforation M(,2,3) Hua Jiang School of Econoics and Manageent, Hebei
More informationAutoHelp. An 'Intelligent' Case-Based Help Desk Providing. Web-Based Support for EOSDIS Customers. A Concept and Proof-of-Concept Implementation
//j yd xd/_ ' Year One Report ":,/_i',:?,2... i" _.,.j- _,._".;-/._. ","/ AutoHelp An 'Intelligent' Case-Based Help Desk Providing Web-Based Support for EOSDIS Custoers A Concept and Proof-of-Concept Ipleentation
More informationCLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA
CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab
More informationEnergy Proportionality for Disk Storage Using Replication
Energy Proportionality for Disk Storage Using Replication Jinoh Ki and Doron Rote Lawrence Berkeley National Laboratory University of California, Berkeley, CA 94720 {jinohki,d rote}@lbl.gov Abstract Energy
More informationMachine Learning Applications in Grid Computing
Machine Learning Applications in Grid Coputing George Cybenko, Guofei Jiang and Daniel Bilar Thayer School of Engineering Dartouth College Hanover, NH 03755, USA gvc@dartouth.edu, guofei.jiang@dartouth.edu
More informationOnline Community Detection for Large Complex Networks
Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence Online Counity Detection for Large Coplex Networks Wangsheng Zhang, Gang Pan, Zhaohui Wu, Shijian Li Departent
More informationInternational Journal of Management & Information Systems First Quarter 2012 Volume 16, Number 1
International Journal of Manageent & Inforation Systes First Quarter 2012 Volue 16, Nuber 1 Proposal And Effectiveness Of A Highly Copelling Direct Mail Method - Establishent And Deployent Of PMOS-DM Hisatoshi
More informationAdaptive Modulation and Coding for Unmanned Aerial Vehicle (UAV) Radio Channel
Recent Advances in Counications Adaptive odulation and Coding for Unanned Aerial Vehicle (UAV) Radio Channel Airhossein Fereidountabar,Gian Carlo Cardarilli, Rocco Fazzolari,Luca Di Nunzio Abstract In
More informationAn apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
More informationBotnet Detection Based on Degree Distributions of Node Using Data Mining Scheme
, pp.81-90 http://dx.doi.org/10.14257/ijfgcn.2013.6.6.09 Botnet Detection Based on Degree Distributions of Node Using Data Mining Scheme Chunyong Yin 1, 2, Lei Yang 1 and Jin Wang 1 1 School of Computer
More informationAn analysis of network trac characteristics for Botnet detection
An analysis of network trac characteristics for Botnet detection Maria Jose Erquiaga 1, Carlos Catania 1 and Carlos García Garino 1,2 1 Instituto para las Tecnologías de la Información y las Comunicaciones
More informationEvaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects
Evaluating the Effectiveness of Task Overlapping as a Risk Response Strategy in Engineering Projects Lucas Grèze Robert Pellerin Nathalie Perrier Patrice Leclaire February 2011 CIRRELT-2011-11 Bureaux
More informationAlba A Cognitive Assistant for Network Administration
Alba A Cognitive Assistant for Network Adinistration Francisco J. Martin and Enric Plaza School of Electrical Engineering and Coputer Science Oregon State University, Corvallis, 97331 OR, USA IIIA - Artificial
More informationQuality evaluation of the model-based forecasts of implied volatility index
Quality evaluation of the odel-based forecasts of iplied volatility index Katarzyna Łęczycka 1 Abstract Influence of volatility on financial arket forecasts is very high. It appears as a specific factor
More informationMultifaceted Approach to Understanding the Botnet Phenomenon
Multifaceted Approach to Understanding the Botnet Phenomenon Christos P. Margiolas University of Crete A brief presentation for the paper: Multifaceted Approach to Understanding the Botnet Phenomenon Basic
More informationThis paper studies a rental firm that offers reusable products to price- and quality-of-service sensitive
MANUFACTURING & SERVICE OPERATIONS MANAGEMENT Vol., No. 3, Suer 28, pp. 429 447 issn 523-464 eissn 526-5498 8 3 429 infors doi.287/so.7.8 28 INFORMS INFORMS holds copyright to this article and distributed
More informationBotnet Detection by Abnormal IRC Traffic Analysis
Botnet Detection by Abnormal IRC Traffic Analysis Gu-Hsin Lai 1, Chia-Mei Chen 1, and Ray-Yu Tzeng 2, Chi-Sung Laih 2, Christos Faloutsos 3 1 National Sun Yat-Sen University Kaohsiung 804, Taiwan 2 National
More informationA Study on the Chain Restaurants Dynamic Negotiation Games of the Optimization of Joint Procurement of Food Materials
International Journal of Coputer Science & Inforation Technology (IJCSIT) Vol 6, No 1, February 2014 A Study on the Chain estaurants Dynaic Negotiation aes of the Optiization of Joint Procureent of Food
More informationTowards Change Management Capability Assessment Model for Contractors in Building Project
Middle-East Journal of Scientific Research 23 (7): 1327-1333, 2015 ISSN 1990-9233 IDOSI Publications, 2015 DOI: 10.5829/idosi.ejsr.2015.23.07.120 Towards Change Manageent Capability Assessent Model for
More informationA Scalable Application Placement Controller for Enterprise Data Centers
W WWW 7 / Track: Perforance and Scalability A Scalable Application Placeent Controller for Enterprise Data Centers Chunqiang Tang, Malgorzata Steinder, Michael Spreitzer, and Giovanni Pacifici IBM T.J.
More informationEvaluating Inventory Management Performance: a Preliminary Desk-Simulation Study Based on IOC Model
Evaluating Inventory Manageent Perforance: a Preliinary Desk-Siulation Study Based on IOC Model Flora Bernardel, Roberto Panizzolo, and Davide Martinazzo Abstract The focus of this study is on preliinary
More informationBotnet Detection using NetFlow and Clustering
Botnet Detection using NetFlow and Clustering Pedram Amini1, Reza Azmi2 and MuhammadAmin Araghizadeh3 1 2 3 ICT Department, Malek-Ashtar University of Technology Tehran, Iran amini@mut.ac.ir Department
More informationStandards and Protocols for the Collection and Dissemination of Graduating Student Initial Career Outcomes Information For Undergraduates
National Association of Colleges and Eployers Standards and Protocols for the Collection and Disseination of Graduating Student Initial Career Outcoes Inforation For Undergraduates Developed by the NACE
More informationDesign of Model Reference Self Tuning Mechanism for PID like Fuzzy Controller
Research Article International Journal of Current Engineering and Technology EISSN 77 46, PISSN 347 56 4 INPRESSCO, All Rights Reserved Available at http://inpressco.co/category/ijcet Design of Model Reference
More informationHow To Balance Over Redundant Wireless Sensor Networks Based On Diffluent
Load balancing over redundant wireless sensor networks based on diffluent Abstract Xikui Gao Yan ai Yun Ju School of Control and Coputer Engineering North China Electric ower University 02206 China Received
More informationFactored Models for Probabilistic Modal Logic
Proceedings of the Twenty-Third AAAI Conference on Artificial Intelligence (2008 Factored Models for Probabilistic Modal Logic Afsaneh Shirazi and Eyal Air Coputer Science Departent, University of Illinois
More informationResource Allocation in Wireless Networks with Multiple Relays
Resource Allocation in Wireless Networks with Multiple Relays Kağan Bakanoğlu, Stefano Toasin, Elza Erkip Departent of Electrical and Coputer Engineering, Polytechnic Institute of NYU, Brooklyn, NY, 0
More informationOnline Classification of Network Flows
2009 Seventh Annual Communications Networks and Services Research Conference Online Classification of Network Flows Mahbod Tavallaee, Wei Lu and Ali A. Ghorbani Faculty of Computer Science, University
More informationEquivalent Tapped Delay Line Channel Responses with Reduced Taps
Equivalent Tapped Delay Line Channel Responses with Reduced Taps Shweta Sagari, Wade Trappe, Larry Greenstein {shsagari, trappe, ljg}@winlab.rutgers.edu WINLAB, Rutgers University, North Brunswick, NJ
More informationOptimal Resource-Constraint Project Scheduling with Overlapping Modes
Optial Resource-Constraint Proect Scheduling with Overlapping Modes François Berthaut Lucas Grèze Robert Pellerin Nathalie Perrier Adnène Hai February 20 CIRRELT-20-09 Bureaux de Montréal : Bureaux de
More informationAgenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
More informationRed Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure
Red Hat Enterprise Linux: Creating a Scalable Open Source Storage Infrastructure By Alan Radding and Nick Carr Abstract This paper discusses the issues related to storage design and anageent when an IT
More informationDetecting P2P-Controlled Bots on the Host
Detecting P2P-Controlled Bots on the Host Antti Nummipuro Helsinki University of Technology anummipu # cc.hut.fi Abstract Storm Worm is a trojan that uses a Peer-to-Peer (P2P) protocol as a command and
More informationAn Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
More informationA Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds
International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial
More informationThe individual neurons are complicated. They have a myriad of parts, subsystems and control mechanisms. They convey information via a host of
CHAPTER 4 ARTIFICIAL NEURAL NETWORKS 4. INTRODUCTION Artificial Neural Networks (ANNs) are relatively crude electronic odels based on the neural structure of the brain. The brain learns fro experience.
More informationA decision model for evaluating third-party logistics providers using fuzzy analytic hierarchy process
African Journal of Business Manageent Vol. 4(3), pp. 339-349, March 00 Available online at http://www.acadeicjournals.org/ajbm ISSN 993-833 00 Acadeic Journals Full Length Research Paper A decision odel
More informationEnergy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and migration algorithms
Energy Efficient VM Scheduling for Cloud Data Centers: Exact allocation and igration algoriths Chaia Ghribi, Makhlouf Hadji and Djaal Zeghlache Institut Mines-Téléco, Téléco SudParis UMR CNRS 5157 9, Rue
More informationAN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES
Int. J. Appl. Math. Coput. Sci., 2014, Vol. 24, No. 1, 133 149 DOI: 10.2478/acs-2014-0011 AN ALGORITHM FOR REDUCING THE DIMENSION AND SIZE OF A SAMPLE FOR DATA EXPLORATION PROCEDURES PIOTR KULCZYCKI,,
More informationThe Stock Market and the Financing of Corporate Growth in Africa: The Case of Ghana
WP/06/201 The Stock Market and the Financing of Corporate Growth in Africa: The Case of Ghana Charles Ao Yartey 2006 International Monetary Fund WP/06/201 IMF Working Paper Research Departent The Stock
More information