Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)

Size: px
Start display at page:

Download "Trace IP Packets by Flexible Deterministic Packet Marking (FDPM)"

Transcription

1 Trace P Packets by Flexible Deterministic Packet Marking (F) Yang Xiang an Wanlei Zhou School of nformation Technology Deakin University Melbourne, Australia {yxi, wanlei}@eakin.eu.au Abstract- Currently a large number of the notorious Distribute Denial of Service (DDoS) attack incients make people aware of the importance of the P traceback technique. P traceback is the ability to trace the P packets to their origins. t provies a security system with the capability of ientifying the true sources of the attacking P packets. P traceback mechanisms have been researche for years, aiming at fining the sources of P packets quickly an precisely. n this paper, an P traceback scheme, Flexible Deterministic Packet Marking (F), is propose. t provies more flexible features to trace the P packets an can obtain better tracing capability over other P traceback mechanisms, such as link testing, messaging, logging, Probabilistic Packet Marking (PPM), an Deterministic Packet Marking (). The implementation an evaluation emonstrates that the F nees moerately a small number of packets to complete the traceback process an requires little computation work; therefore this scheme is powerful to trace the P packets. t can be applie in many security systems, such as DDoS efense systems, ntrusion Detection Systems (DS), forensic systems, an so on. Keywors-P traceback; security; Flexible Deterministic Packet Marking; DDoS; hash function. NTRODUCTON P traceback is to trace the P packets to their origins []; it provies a system with the ability to ientify true sources of the P packets. n recently years, the notorious Distribute Denial of Service (DDoS) attacks [] make people aware of the importance of proviing available ata an services securely to the users. An it also makes the P traceback technique more an more important, because the P traceback is to construct the path traverse by the attack packets on their journey from source to the victim [9], which is beneficial to control an punish the attacks. A DDoS attack is an availability attack, for it is characterize by an explicit attempt from an attacker to prevent legitimate users from using the esire resource [7] [5]. With the P aress spoofmg techniques, the source aress in an P heaer can be manipulate an falsifie by the attackers. Then the source P aresses in the attack packets are usually counterfeite an look like having nothing to o with the attackers themselves. Therefore, these P aresses are of no use to ientify the attackers. We must rely on some specific P traceback mechanisms to fin the source of attacker. P traceback mechanisms have been researche for years, aiming at quickly an precisely fining the sources of P packets. n this paper, an P traceback scheme base on Deterministic Packet Marking () [], is propose. This scheme, name Flexible Deterministic Packet Marking (F), provies more flexible features to trace the P packets than, an can obtain better tracing capability. Compare with other P traceback mechanisms, such as link testing, messaging, logging, an Probabilistic Packet Marking (PPM), F nees moerately a small number of packets to complete the traceback process an requires low computation loa. The rest of this paper is organize as follows. n section, the relate work is introuce. Then the basic iea of an hash-base are presente. The shortcomings of are also analyze. n section, the etails of F are introuce. Theoretical analysis is given later, an the implementation an evaluation shows that F improves the ability of traceback greatly. The comparison between F an others mechanisms is also analyze. Finally challenges an conclusions are iscusse.. RELATED WORK Current P traceback mechanisms can be classifie into four main categories as following, link testing, messaging, logging, an packet marking. F falls into the packet marking category. Link testing methos inclue input ebugging [3] an controlle flooing methos [6]. The main iea of it is to start from the victim to fin the attack from upstream links by testing possible routes, an then etermine which one carries the attack traffic. Although link testing has some avantages such as compatibility with existing protocols, routers an network infrastructure, it also has many significant limitations. First, it consumes a great eal of time to establish the attack path that may inclue multiple branch points. However, the attack oes not often last for an enough long time for traceback. Secon, if the attack comes from within the backbone itself, or, a backbone router is a victim, it is not suitable for this metho to reconstruct the 'attack path. Moreover, if some attacks are only compose of a few packets, this metho becomes less effective //$. C EEE. 6

2 Another traceback technique is messaging. Bellovin propose an CMP message to fin the source of forge P packets [3]. Allison Mankin moifie this metho by proposing an intension-riven CMP traceback []. However, if the attacking packets contribute only a small amount of the total attack traffic, it's ifficult for this metho to rebuil the real path. Moreover, CMP packets are often treate or filtere by routers with a low priority, thus it also causes this metho less effective. CMP traceback is vulnerable to attackers with the falsifie CMP messages. n general, the messaging traceback introuces aitional network traffic, an cannot hanle the highly istribute attacks. Logging is to store the traffic ata for analysis. Although to store all the ata in the network is impossible, probabilistic sampling or storing transforme infonnation is still feasible. For example, trajectory sampling is use to measure the network traffic [9], Alex C. Snoreren [9] propose a hashbase logging traceback metho, T. Baba an S. Matsua [] propose a scheme that the tracing agents (tracers) are eploye in the network to log the attack packets, an are coorinate by the managing agents. The main avantage of this metho is that it can even fin the source of a single packet in some situations [9], however, it nees excessive processing an storage requirements, which makes it ifficult to be wiely eploye. The iea of packet marking is to insert traceback ata into the P packet on its way through the various routers from the attack source to the estination. Then the marks in the P packets can be use to euce the path of the malicious traffic. Probabilistic Packet Marking (PPM) [] is one of the packet marking methos. The assumption of PPM is that the attacking packets are much more frequent than the normal packets. t lets routers mark the packets with path information probabilistically an lets the victim reconstruct the attack path by using the marke packets. The PPM encoes the information in rarely use fiel within the P heaer. n orer to save storage in P heaer fiel, compresse ege fragment sampling metho is use. t requires less traffic volume than CMP traceback, but it encounters computational ifficulties as the numbers of attack sources increases. Because the number of packets neee to reconstruct the attack path epens on the number of packets which are marke by the further router in the attack path. n orer to reuce the number of packets neee to reconstruct the attack path, [3] propose an ajuste PPM. To some egree it solve the problem of vulnerabilities of PPM [], which is easy to be affecte by spoofe marking fiel. Another stream of packet marking methos, which is not using the probabilistic assumption above, is the Deterministic Packet Marking () []. This scheme has many avantages over others, such as simple implementation, no banwith requirement, less computation overhea, free from the falsifie marking, etc. However, to perform a successful traceback, enough packets also must be collecte to reconstruct the attack path. F, an optimize version of, is iscusse in the later section. Other practical issues, for example, the maximum number of sources can be trace, the implementation, effectiveness of hash fimction, an the reuction of P packets require are analyze in etail as well. Other packet marking schemes inclue the Avance an Authenticate Marking Scheme [], Path entifier (Pi) [6], an the polynomial path reconstruction [].. HASH-BASED DETERMNSTC PACKET MARKNG () Deterministic Packet Marking [] utilizes a fixe length mark that consists of the 6-bit D fiel an the -bit Reserve Flag (RF) in the P heaer. When the packet enters the protecte network, it will be marke by the interface close to the source of the packet on an ege ingress router. The mark will not be change when the packet traverses the network. The source P aresses are store in the marks. At any point within the network, the source P aresses can be assemble when they are necessary. Because all the packets will be marke by the very first router the packet passes, mark-spoofmg by the attackers is not effective. So this scheme is naturally free of mark-spoofmg. At least packets are neee to carry the 3-bit source P aress information, because totally 7 bits in the P heaer are use for marking. Each ata packet holing the mark will be use to reconstruct the source P aress at any victim en within the network. A segment number is also assigne to the mark, because when reconstructing the packet, the segment orer of the source P aress shoul be known. After all the segments corresponing to the same ingress aress have arrive to the estination, the source P aress of the packets can be recovere by the reconstruction process. n orer to keep a track on a set of P packets that are use for reconstruction, the ientities shown the packets come from the same source must be given. The source P aress fiel in the P heaer is completely unreliable, because it can be easily forge by the attackers. The reconstruction process coul mismatch the packets using ifferent spoofe source P aresses if only source P an the segment number are store in the mark information. Therefore, the scheme coul prouce a high false positive rate. The hash of the P aress is kept in the mark to ientify that the packets come from the same source. The hash-base scheme is propose to be more efficient an accurate for the path reconstruction uner attacks than other schemes. Then the mark in nees another fiel to store the hash of the P aress, the igest. This igest will always remain the same for a interface from which the packets enter the network. t provies the victim en the ability to recognize the packets being analyze are from a same source, although the igest itself cannot tell the real aress. Mark Recoring an ngress Aress Recovery are two separate processes at the victim en to reconstruct P aresses. The source P aress can be recovere by the marks that inclue three parts, aress information, ingress aress igest an segment number,. This is the basic iea of hash-base scheme for tracing P packets. n the following section, the moifie version of, Flexible Deterministic Packet Marking (F) is iscusse in etail. 7

3 V. FLEXBLE DETERMNSTC PACKET MARKNG (F) A. P Heaer utilize fixe 7 bits in the P heaer to store the marking information. However, the length of the available fiels in P heaer still can be expane. Our thinking is to maximize the number of bits an at the same time to obtain goo backwars compatibility. The Type of Service (TOS) fiel is an -bit fiel that provies an inication of the abstract parameters of the quality of service esire []. The etails of hanling an specification of TOS values can be foun in [5]. The TOS parameters are to be use to guie the selection of the actual service parameters when transmitting a atagram through a particular network. However, this fiel has been rarely supporte by most routers in the past. Some propose stanars such as Differentiate Services in TOS [7] are still uner eveloping to inicate particular Quality of Service nees from the network. Therefore, in F scheme, the TOS fiel will be use to store the mark uner some circumstances. The other two fiels in the P heaer are also exploite, one is Fragment D, an the other is the Reserve Flag. An ientifying value is assigne to the D fiel by the sener to ai in assembling the fragments of a atagram. Because less than.5% of all nternet traffic is fragments [], this fiel coul be safely overloae without causing serious compatibility problems. An the packet coul be successfully transferre without regaring the value in the Reserve Flag fiel. As shown in figure, totally 5 bits are chosen to store the mark information in a maximum case. When consiering TOS fiel may be unavailable partly or totally, the minimum number of the bits in P heaer is 6. F scheme can ajust the length accoring to the protocols of the network in which F is eploye. Since in Pv6 [6] some of the fiels are not existe compare with the Pv, this selection may not suitable in an Pv6 network. However, F still can be eploye uner Pv6, only with some changes of marking fiel in the P heaer. n r 9 3t Verson TTL thl ags control purpose, which is introuce in the later part). After the mark is generate, it will be written to the ifferent fiels in the heaer ofthe P packet. The ingress P aress is ivie into k segments, which means these k parts are store into the marks to reconstruct one source P aress. The segment number keeps the orer of the aress bits. An the aress igest enables the reconstruction process to recognize the packets being analyze are from a same source. Without this part, the reconstruction process cannot trace multiple P packets, because it cannot ientify the packets come from ifferent sources. 3-bit ingress P aress Decie the mark length by ifferent protocols eploye in the network mpunbte igest by a hasl function H(x) Paing to aapt the length a-bit a-bit... a-bit a-bit -bit igest Aress bits l -, ~...L. K- Ranomselector nm k Segment number ~~~~F mark, flexible length Figure. F encoing. The pseuo coe of encoing is shown below. n the F scheme, before the encoing process begins, the length of the mark shoul be calculate. f the network oes not utilize the TOS fiel in P packet, the -bit Reserve Flag in the heaer is set to, an the length of mark is set to. Uner other situations the length of mark will be 9 or 6, with relevant bit in TOS marke. f the network supports TOS Preceence but not TOS Priority, th-6th bit of TOS is utilize for marking; an if the network supports TOS Priority but not TOS Preceence, st-3r bit of TOS is utilize for marking. Marking process at router R, ege interface A, in network N if N oes not utilize TOS Reserve Flag:=O 7th an %bit of TOS:= Lengthof Mark:= else Reserve Flag := if N utilizes Differentiate Services Fiel or N support Preceence an Priority 7fh an k" bit of TOS:= Lengthof Mark:=6 else if N support Preceence but not Priority 7.. bit of TOS:= h bit of TOS:= Lengthof Mark:=9 otl lengtth Fragment offset Heaer checksum Protocol Source P aress Destination F aress Options fiel (if any) P ate Figure. The P heaer fiels (arke) utilize in F. B. Encoing The main iea of F encoing of the mark is similar as the encoing of [], as it is shown in the following figure. However, before the F mark coul be generate, the length of mark shoul be ecie accoring to ifferent network protocols eploye within the protecte network. Accoring to the ifferent situations, the length of mark coul be bits long at most, 9 bits, an 6 bits at least (The -bit of the Reserve Flag is not inclue because this bit is use for

4 else if N support Priority but not Preceence 7t bit of TOS:= th bit of TOS:= Lengthof Mark:=9 en if en if Decie the lengths of each part in the mark Digest:=H(A) loop i=o to k- Mark[ij.Digest:=Digest Mark[iJ.Segment number:=i Mark ij.aress bit:=af[i en loop for each incoming packet p j:=ranom integer from to k- write Markfl] into w.mark C. Reconstruction The reconstruction process inclues two steps, one is mark recognition, an the other is aress recovery. Compare to, the reconstruction process is simpler an more flexible. When each packet that is use to reconstruct the source P aress arrives to the victim, it is put into a cache, because the in some cases the processing spee is lower than the arrival spee of the incoming packets. The cache can also output the packet infornation to another process unit, by this esign the ifferent reconstruction methos can be applie an compare with each other. By ifferentiating the fiels in the P heaer, the length of the mark an which fiels in the P heaer can be recognize. The secon step, the aress recovery, will analyze the mark an store the mark into a recovery table. The column of the table is k, which means how many segments are use to carry the source aress in the packets. Each column in the same row stores the bits in the same P aress which is carrie by ifferent coming packets. The row of the table means the entry; usually each igest owns one entry. However, the same igest may have several entries. Because the igest is the information of hashe source P aress, but is shorter than the P aress, ifferent source P aresses may have the same igest. When this collision occurs, more than one entry may be create in orer to keep as much as possible infornation, although many of the source P aresses reconstructe are invali. The reconstruction uses a fix size recovery table, which is unable to hanle the situation of igest collision. Figure 3 shows the reconstruction scheme. When all fiels in one entry are fille accoring the segment number, this source P aress is then recovere an the entry is elete. f still more fiels nee to be fille, next packet is processe. To simplify the problem, the serial process is shown in the figure, actually parallel processing is also achievable, an thus it saves computation time. The pseuo coe is shown below. - "] fiels are tiele,--all oring to seg nu Ot Output the P aressx renconstrute Figure 3. F reconstruction. Reconstruction at victim V, in network N for each attacking packet p mark recognition (length an fiels) if all fiels in one entry are fille output the source P elete the entry else exist if same igest an segment number them else en if 9 en ff create new entsy fil a the aress bits into ril the aress bits into entry

5 V. ANALYSS AND EVALUATON A. Theoretical Analysis One limitation of is the maximum number of the attacker sources is only. This means in the network, only ege routers are permitte in orer to trace the P aresses, otherwise the system cannot precisely reconstruct the source P aresses. Moreover, this number is obtaine without consiering other factors such as the igest collision, network traffic conition, P packet fragment, an so on. Because of the increase mark length, the F scheme offers a efense system much stronger capability to trace multiple attacker sources. The relationship between the number of packet(s) that carry one P aress k, the bit of fragment s, the aress bits a, the igest bits, maximum number of attacker source N uner ifferent situations of F, which coul be affecte by the igest bits, an the same relationship of the parameters in the, are shown in table. RELATONSHP BETWEEN THE PARAMETERS N F AND TABLE. k S a 6 N N N 7 -N F-6 F-9 F Number of attackers cot be trace F-6 * Cl F-9 * F- * Ln(N) Number of segments 3 Figure. Comparison of maximum number of sources can be trace uner ifferent situations. From this table we can see uner the optimal situation, the maximum number of sources which can be trace in by F is 6. Theoretically, it is times of that of, although in the worst case, the maximum number by F is / of that of. Figure shows the comparison of maximum number of sources can be trace uner ifferent situations by F an. The vertical axis is Ln(N) instea of N, for better illustration. B. mplementation an Evaluation To buil a real testing traceback network environment is expensive, since thousans of hosts cost much. So we i the simulation work by a network simulator, SSFNet, an gathere the experimental ata for analysis. The test results show F can efficiently trace P packets with better reliability than others. SSFNet (Scalable Simulation Framework) is a collection of Java components for moeling an simulation of ntemet protocols an networks at an above the P packet level of etail []. The SSFNet moels are self-configuring, that means by querying a configuration atabase, each SSFNet class instance can autonomously configure. The network configuration can be written in the Domain Moeling Language (DML) format. We can escribe a network environment by using a simple, stanarize syntax of all configuration files. The DML syntax specifies a hierarchy of lists of attributes (key-value pairs), that can be store as ASC files which are easy to rea an interpret. With this capability to buil large scale network environments, many experiments are one to test the F. Two Java packages embee into SSFNet are evelope, one is Encoing sub-system an the other is Reconstruction sub-system. The Encoing sub-systems are eploye at the ege of the protecte network, an the Reconstruction subsystem is eploye at the victim en that will analyze the sources of P packets. n the Encoing sub-system, Hash Function shoul be carefully selecte because we fin hash collision is one of the main factors affect the traceback performance. Hashing is useful to store a wie range of possible values in a small amount of space an be retrieve with simple, near-ranom access. Because all accesses in F must be one through the hash function, the function must fulfill two requirements: t must be fast an it must have a goo ability to istribute keys throughout the hash table. The latter requirement minimizes collisions an prevents ata items with similar values from hashing to just one part of the hash table. Two general-purpose hash functions are selecte to test the effectiveness of hashing in F. PJW Hash function [5] is base on work by Peter J. Weinberger of AT&T Bell Labs, an is in use wiely. Another hash function, BKDR Hash Function [] is also chosen. These algorithms are very popular because they can be implemente in any programming language an are quite fast. Figure 5 shows the average non-collision rate of the hashe igest in the traceback experiments. When the number of segments use increases, the non-collision rates are stable below.5. Uner the most circumstances tuning hash functions coul be ifficultly one because hash tuning requires consierable empirical testing, an it largely epens on what ata set is use. Unless the hash table is set up in a pre-set manner, the non-collision rate coul harly be improve. That means the possible hash value is subjectively chosen beforehan an cannot fit for the general network environments. 5

6 Non-collision rate F- F-9 F os Number of segments use (k) theoretical value. An this scheme is unable to hanle the fragmentation of the P packet, because it utilizes the 6-bit D fiel in the P heaer. n particular, on DDoS efense issue current research proves traceback is an effective countermeasure against the attacks. However, the prevalent traceback methos can only probabilistically trace every attack host, but not the real attacker. An if there are thousans of zombies launch a single attack, the traceback will become less effective. Therefore, at present it nees further research to provie a solution to traceback to the real attacker. Figure 5. Non-collision rate. TABLE. The average maximum numbers of sources can be trace uner ifferent situations are shown Figure 6. Although in the reconstruction process, all possible source aresses are recore by creating the new igest entries, it also brings the false positive. f the amenment for the collision of the igest is ignore, it brings the high missing probability. Compare with the theoretical analysis in the section before, although in the practical experiments the maximum source number is not as large as the theoretical value, in F with bits igest, it still can trace more than, ifferent sources. J Criterion Compatibility mplementation Scalability Computation loa Number of packets neee for traceback Logging PPM F Meium Thousan Sma Easy N/A Difficult High Easy High No comsume Huge Application DDoS DDoS, DDoS, DDoS DDoS, others Small others s others V. CONCLUSON n this paper, an P packet traceback scheme, Flexible Deterministic Packet Marking (F) is presente. t provies more flexible features to trace the sources of P packets an can obtain better tracing capability over other P traceback mechanisms. The implementation an evaluation emonstrates that the F nees moerately small number of packets to complete the traceback process an requires little computation work; therefore this scheme is powerful to trace the P packets. t can be applie in many security systems, such as DDoS efense systems, ntrusion Detection Systems (DS), an forensic systems, etc. F 6 Number of segments use (k) CMP traceba Huge Network onoe Huge Banwith Comparison of maximum number of sources trace (N) l--lfw E ~ l--~ } F-9 l lli COMPARSON WTH OTHER TRACEBACK MECHANSMS Controlle 3 Figure 6. Maximum number of sources trace in experiments. C. Comparison with other traceback mechanisms The analysis above shows F offers more flexibility an capability to trace the ifferent P sources than from the points of view of both theoretical an practical issues. n this section, F is compare with other categories of traceback schemes such as controlle flooing, CMP traceback, logging, an Probabilistic Packet Marking as the following table. The major avantages of F is that it can trace the P sources with low computation loa, while it nees a small number of packets to accomplish the traceback process, without knowing the topology of the protect network. Moreover, it can trace much more sources at a single traceback process than other schemes. ACKNOWLEDGMENT The authors woul like to thank the anonymous reviewers for their constructive suggestions that helpe improve the quality of this paper. REFERENCES [] H. Aljifri, "P Traceback: A New Denial-of-Service Deterrent?", EEE Security & Privacy, Vol., No.3, 3, pp.-3. [] T. Baba an S. Matsua, "Tracing Network Attacks to Their Sources", EEE nternet Computing, Vol.6, No.3,, pp.-6. [3] S. M. Bellovin, "CMP Traceback Messages", ntemet Draft, Network Working Group,. [] A. Belenky an N. Ansari, "Tracing Multiple Attackers with Deterministic Packet Marking ()", Proc. of EEE Pacific Rim Conference on Communications, Computers an Signal Processing, 3. [5] A. Binstock an J. Rex, Practical Algorithms for Programmers, Pearson Eucation, 995. D. Challenges Although the F provies many avantages to trace the sources of P packets, there are still many challenges. For example, the igest collision makes the practical number of maximum sources that can be trace is lower than the 5

7 [6] H. Burch an B. Cheswick, "Tracing Anonymous Packets to Their Approximate Source", Proc. of the th Systems Aministration Conference (LSA ). [7] Computer Emergency Response Team, CERT, [] D. Dean, M. Franklin, an A. Stubblefiel, "An Algebraic Approach to P Traceback", Proc. of Network an Distribute System Security Symposium (NDSS ), pp.3-. [9] N. G. Duffiel an M. Grossglauser, "Trajectory sampling for irect traffic observation", ACM SGCOMM, pp.7-. [] B. W. Kernighan an Dennis M. Ritchie, Language, Secon Eition, Prentice Hall, 9. The C Programming [] A. Mankin, D. Massey, C.-L. Wu, S. F. Wu an L. Zhang, "On Design an Evaluation of ntention-driven CMP Traceback", Proc. of Computer Communications an Networks,. [] K. Park an H. Lee, "On the Effectiveness of Probabilistic Packet Marking for P Traceback uner Denial of Service Attack", EEE NFOCOM, pp [3] T. Peng, C. Leckie, an R. Kotagiri, "Ajuste Probabilistic Marking for P Traceback", Networking. Packet [] RFC79, nternet Protocol, DARPA, 9. [5] RFC39, Type of Service Working Group, 99. in the nternet Protocol Suite, Network [6] RFC6, nternet Protocol, Version 6 (Pv6) Specification, Network Working Group, 99. [7] RFC7, Definition of the Differentiate Services Fiel (DS Fiel) in the Pv an Pv6 Heaers, Network Working Group, 99. [] S. Savage, D. Wetherall, A. Karlin an T. Anerson, "Network Support for P Traceback", ACM/EEE Transactions on Networking, Vol.9, No.3,, pp [9] A. C. Snoeren, C. Partrige, L. A. Sanchez, C. E. Jones, F. Tchakountio, B. Schwartz, S. T. Kent, an W. T. Strayer, "Single-Packet P Traceback", EEE/ACM Transactions on Networking, December,, pp [] D. Song an A. Perrig, "Avance an Authenticate Marking Schemes for P Traceback", EEE NFOCOM, pp.7-6. [] Scalable Simulation Framework, []. Stocia an H. Zhang, "Proviing Guarantee Services Without Per Flow Management", ACM SGCOMM99, 999, pp. -9. [3] R. Stone, "CenterTrack: An P Overlay Network for Tracking DoS Floos", 9th Usenix Security Symposium,, pp.99-. [] Y. Xiang, W. Zhou, an M. Chowhury, "A Survey of Active an Passive Defence Mechanisms against DDoS Attacks", Technical Report, TR C/, School of nformation Technology, Deakin University, Australia, March,. [5] Y. Xiang, an W. Zhou, "An Active Distribute Defense System to Protect Web Applications from DDoS Attacks", Proc. of the 6th nternational Conference on nformation ntegration an Web Base Application & Services (iiwas). [6] A. Yaar, A. Perrig, an D. Song, "Pi: A Path entification Mechanism to Defen against DDoS Attacks", 3 EEE Symposium on Security an Privacy. 5

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Packet-Marking Scheme for DDoS Attack Prevention

Packet-Marking Scheme for DDoS Attack Prevention Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking

Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking 1 T. Ravi Kumar, 2 T Padmaja, 3 P. Samba Siva Raju 1,3 Sri Venkateswara Institute

More information

A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks

A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks A Hybrid Approach for Detecting, Preventing, and Traceback DDoS Attacks ALI E. EL-DESOKY 1, MARWA F. AREAD 2, MAGDY M. FADEL 3 Department of Computer Engineering University of El-Mansoura El-Gomhoria St.,

More information

An IP Trace back System to Find the Real Source of Attacks

An IP Trace back System to Find the Real Source of Attacks An IP Trace back System to Find the Real Source of Attacks A.Parvathi and G.L.N.JayaPradha M.Tech Student,Narasaraopeta Engg College, Narasaraopeta,Guntur(Dt),A.P. Asso.Prof & HOD,Dept of I.T,,Narasaraopeta

More information

A Data Placement Strategy in Scientific Cloud Workflows

A Data Placement Strategy in Scientific Cloud Workflows A Data Placement Strategy in Scientific Clou Workflows Dong Yuan, Yun Yang, Xiao Liu, Jinjun Chen Faculty of Information an Communication Technologies, Swinburne University of Technology Hawthorn, Melbourne,

More information

Firewall Design: Consistency, Completeness, and Compactness

Firewall Design: Consistency, Completeness, and Compactness C IS COS YS TE MS Firewall Design: Consistency, Completeness, an Compactness Mohame G. Goua an Xiang-Yang Alex Liu Department of Computer Sciences The University of Texas at Austin Austin, Texas 78712-1188,

More information

State of Louisiana Office of Information Technology. Change Management Plan

State of Louisiana Office of Information Technology. Change Management Plan State of Louisiana Office of Information Technology Change Management Plan Table of Contents Change Management Overview Change Management Plan Key Consierations Organizational Transition Stages Change

More information

Finding the real source of Internet crimes

Finding the real source of Internet crimes Finding the real source of Internet crimes Professor Wanlei Zhou Chair of Information Technology and Head School of Information Technology, Deakin University, Melbourne campus at Burwood, Victoria, Australia

More information

Analysis of Automated Model against DDoS Attacks

Analysis of Automated Model against DDoS Attacks Analysis of Automated Model against DDoS Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of Information and Communication Sciences Macquarie

More information

Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks

Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks International Journal of Network Security, Vol.9, No.3, PP.204 213, Nov. 2009 204 Towards Improving an Algebraic Marking Scheme for Tracing DDoS Attacks Moon-Chuen Lee, Yi-Jun He, and Zhaole Chen (Corresponding

More information

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks

A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks A Survey of IP Traceback Mechanisms to overcome Denial-of-Service Attacks SHWETA VINCENT, J. IMMANUEL JOHN RAJA Department of Computer Science and Engineering, School of Computer Science and Technology

More information

Modelling and Resolving Software Dependencies

Modelling and Resolving Software Dependencies June 15, 2005 Abstract Many Linux istributions an other moern operating systems feature the explicit eclaration of (often complex) epenency relationships between the pieces of software

More information

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net

International Journal of Emerging Technologies in Computational and Applied Sciences (IJETCAS) www.iasir.net International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Emerging Technologies in Computational

More information

How To Mark A Packet With A Probability Of 1/D

How To Mark A Packet With A Probability Of 1/D TTL based Packet Marking for IP Traceback Vamsi Paruchuri, Aran Durresi and Sriram Chellappan* Abstract Distributed Denial of Service Attacks continue to pose maor threats to the Internet. In order to

More information

Analysis of Traceback Techniques

Analysis of Traceback Techniques Analysis of Traceback Techniques Udaya Kiran Tupakula Vijay Varadharajan Information and Networked Systems Security Research Division of ICS, Macquarie University North Ryde, NSW-2109, Australia {udaya,

More information

10.2 Systems of Linear Equations: Matrices

10.2 Systems of Linear Equations: Matrices SECTION 0.2 Systems of Linear Equations: Matrices 7 0.2 Systems of Linear Equations: Matrices OBJECTIVES Write the Augmente Matrix of a System of Linear Equations 2 Write the System from the Augmente Matrix

More information

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart

BOSCH. CAN Specification. Version 2.0. 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 30 02 40, D-70442 Stuttgart CAN Specification 2.0 page 1 Recital The acceptance an introuction of serial communication to more an more applications

More information

Analysis of IP Spoofed DDoS Attack by Cryptography

Analysis of IP Spoofed DDoS Attack by Cryptography www..org 13 Analysis of IP Spoofed DDoS Attack by Cryptography Dalip Kumar Research Scholar, Deptt. of Computer Science Engineering, Institute of Engineering and Technology, Alwar, India. Abstract Today,

More information

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements.

This post is not eligible for sponsorship and applicants must be eligible to work in the UK under present visa arrangements. WMG 7.60 per hour Ref: WMG005/15 Fixe Term Contract: 4 Weeks Full Time to be unertaken in summer 2015 (with the possibility of a further 4 weeks employment, applicants must therefore be available for the

More information

How To Understand The Structure Of A Can (Can)

How To Understand The Structure Of A Can (Can) Thi t t ith F M k 4 0 4 BOSCH CAN Specification Version 2.0 1991, Robert Bosch GmbH, Postfach 50, D-7000 Stuttgart 1 The ocument as a whole may be copie an istribute without restrictions. However, the

More information

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES

INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES 1 st Logistics International Conference Belgrae, Serbia 28-30 November 2013 INFLUENCE OF GPS TECHNOLOGY ON COST CONTROL AND MAINTENANCE OF VEHICLES Goran N. Raoičić * University of Niš, Faculty of Mechanical

More information

Tracing the Origins of Distributed Denial of Service Attacks

Tracing the Origins of Distributed Denial of Service Attacks Tracing the Origins of Distributed Denial of Service Attacks A.Peart Senior Lecturer amanda.peart@port.ac.uk University of Portsmouth, UK R.Raynsford. Student robert.raynsford@myport.ac.uk University of

More information

How To Connect Two Servers Together In A Data Center Network

How To Connect Two Servers Together In A Data Center Network DPillar: Scalable Dual-Port Server Interconnection for Data Center Networks Yong Liao ECE Department University of Massachusetts Amherst, MA 3, USA Dong Yin Automation Department Northwestern Polytech

More information

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud

Bellini: Ferrying Application Traffic Flows through Geo-distributed Datacenters in the Cloud Bellini: Ferrying Application Traffic Flows through Geo-istribute Datacenters in the Clou Zimu Liu, Yuan Feng, an Baochun Li Department of Electrical an Computer Engineering, University of Toronto Department

More information

The Internet provides a wealth of information,

The Internet provides a wealth of information, IP Traceback: A New Denial-of-Service Deterrent? The increasing frequency of malicious computer attacks on government agencies and Internet businesses has caused severe economic waste and unique social

More information

A Practical Method to Counteract Denial of Service Attacks

A Practical Method to Counteract Denial of Service Attacks A Practical Method to Counteract Denial of Service Attacks Udaya Kiran Tupakula Vijay Varadharajan Information and Networked System Security Research Division of Information and Communication Sciences

More information

A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet

A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet A Stateless Traceback Technique for Identifying the Origin of Attacks from a Single Packet Marcelo D. D. Moreira, Rafael P. Laufer, Natalia C. Fernandes, and Otto Carlos M. B. Duarte Universidade Federal

More information

Security Vulnerabilities and Solutions for Packet Sampling

Security Vulnerabilities and Solutions for Packet Sampling Security Vulnerabilities an Solutions for Packet Sampling Sharon Golberg an Jennifer Rexfor Princeton University, Princeton, NJ, USA 08544 {golbe, jrex}@princeton.eu Abstract Packet sampling supports a

More information

A New Evaluation Measure for Information Retrieval Systems

A New Evaluation Measure for Information Retrieval Systems A New Evaluation Measure for Information Retrieval Systems Martin Mehlitz martin.mehlitz@ai-labor.e Christian Bauckhage Deutsche Telekom Laboratories christian.bauckhage@telekom.e Jérôme Kunegis jerome.kunegis@ai-labor.e

More information

Improving Emulation Throughput for Multi-Project SoC Designs

Improving Emulation Throughput for Multi-Project SoC Designs Improving Emulation Throhput for Multi-Project SoC Designs By Frank Schirrmeister, Caence Design Systems As esign sizes grow, so, too, oes the verification effort. Inee, verification has become the biggest

More information

DDoS Attack Traceback

DDoS Attack Traceback DDoS Attack Traceback and Beyond Yongjin Kim Outline Existing DDoS attack traceback (or commonly called IP traceback) schemes * Probabilistic packet marking Logging-based scheme ICMP-based scheme Tweaking

More information

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines

Unsteady Flow Visualization by Animating Evenly-Spaced Streamlines EUROGRAPHICS 2000 / M. Gross an F.R.A. Hopgoo Volume 19, (2000), Number 3 (Guest Eitors) Unsteay Flow Visualization by Animating Evenly-Space Bruno Jobar an Wilfri Lefer Université u Littoral Côte Opale,

More information

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6

! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 ! # % & ( ) +,,),. / 0 1 2 % ( 345 6, & 7 8 4 8 & & &&3 6 9 Quality signposting : the role of online information prescription in proviing patient information Liz Brewster & Barbara Sen Information School,

More information

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters

ThroughputScheduler: Learning to Schedule on Heterogeneous Hadoop Clusters ThroughputScheuler: Learning to Scheule on Heterogeneous Haoop Clusters Shehar Gupta, Christian Fritz, Bob Price, Roger Hoover, an Johan e Kleer Palo Alto Research Center, Palo Alto, CA, USA {sgupta, cfritz,

More information

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa

How To Protect Your Network From A Ddos Attack On A Network With Pip (Ipo) And Pipi (Ipnet) From A Network Attack On An Ip Address Or Ip Address (Ipa) On A Router Or Ipa Defenses against Distributed Denial of Service Attacks Adrian Perrig, Dawn Song, Avi Yaar CMU Internet Threat: DDoS Attacks Denial of Service (DoS) attack: consumption (exhaustion) of resources to deny

More information

Proving Distributed Denial of Service Attacks in the Internet

Proving Distributed Denial of Service Attacks in the Internet Proving Distributed Denial of Service Attacks in the Internet Prashanth Radhakrishnan, Manu Awasthi, Chitra Aravamudhan {shanth, manua, caravamu}@cs.utah.edu Abstract In this course report, we present

More information

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism

Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Tackling Congestion to Address Distributed Denial of Service: A Push-Forward Mechanism Srinivasan Krishnamoorthy and Partha Dasgupta Computer Science and Engineering Department Arizona State University

More information

How To Mark A Packet For Ip Traceback

How To Mark A Packet For Ip Traceback DDPM: Dynamic Deterministic Packet Marking for IP Traceback Reza Shokri, Ali Varshovi, Hossein Mohammadi, Nasser Yazdani, Babak Sadeghian Router Laboratory, ECE Department, University of Tehran, Tehran,

More information

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis.

The higher education factor: The role of higher education in the hiring and promotion practices in the fire service. By Nick Geis. The higher eucation factor: The role of higher eucation in the hiring an promotion practices in the fire service. By Nick Geis Spring 2012 A paper submitte to the faculty of The University of North Carolina

More information

Analysis of Methods Organization of the Modelling of Protection of Systems Client-Server

Analysis of Methods Organization of the Modelling of Protection of Systems Client-Server Available online at www.globalilluminators.org GlobalIlluminators Full Paper Proceeding MI-BEST-2015, Vol. 1, 63-67 FULL PAPER PROCEEDING Multidisciplinary Studies ISBN: 978-969-9948-10-7 MI-BEST 2015

More information

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service

More information

Large-Scale IP Traceback in High-Speed Internet

Large-Scale IP Traceback in High-Speed Internet 2004 IEEE Symposium on Security and Privacy Large-Scale IP Traceback in High-Speed Internet Jun (Jim) Xu Networking & Telecommunications Group College of Computing Georgia Institute of Technology (Joint

More information

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT

JON HOLTAN. if P&C Insurance Ltd., Oslo, Norway ABSTRACT OPTIMAL INSURANCE COVERAGE UNDER BONUS-MALUS CONTRACTS BY JON HOLTAN if P&C Insurance Lt., Oslo, Norway ABSTRACT The paper analyses the questions: Shoul or shoul not an iniviual buy insurance? An if so,

More information

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks

Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)

More information

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY

FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY FAST JOINING AND REPAIRING OF SANDWICH MATERIALS WITH DETACHABLE MECHANICAL CONNECTION TECHNOLOGY Jörg Felhusen an Sivakumara K. Krishnamoorthy RWTH Aachen University, Chair an Insitute for Engineering

More information

View Synthesis by Image Mapping and Interpolation

View Synthesis by Image Mapping and Interpolation View Synthesis by Image Mapping an Interpolation Farris J. Halim Jesse S. Jin, School of Computer Science & Engineering, University of New South Wales Syney, NSW 05, Australia Basser epartment of Computer

More information

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market

Optimal Control Policy of a Production and Inventory System for multi-product in Segmented Market RATIO MATHEMATICA 25 (2013), 29 46 ISSN:1592-7415 Optimal Control Policy of a Prouction an Inventory System for multi-prouct in Segmente Market Kuleep Chauhary, Yogener Singh, P. C. Jha Department of Operational

More information

Chapter 9 AIRPORT SYSTEM PLANNING

Chapter 9 AIRPORT SYSTEM PLANNING Chapter 9 AIRPORT SYSTEM PLANNING. Photo creit Dorn McGrath, Jr Contents Page The Planning Process................................................... 189 Airport Master Planning..............................................

More information

A Novel Passive IP Approach for Path file sharing through BackScatter in Disclosing the Locations

A Novel Passive IP Approach for Path file sharing through BackScatter in Disclosing the Locations A Novel Passive IP Approach for Path file sharing through BackScatter in Disclosing the Locations K.Sudha Deepthi 1, A.Swapna 2, Y.Subba Rayudu 3 1 Assist.Prof of cse Department Institute of Aeronautical

More information

Cross-Over Analysis Using T-Tests

Cross-Over Analysis Using T-Tests Chapter 35 Cross-Over Analysis Using -ests Introuction his proceure analyzes ata from a two-treatment, two-perio (x) cross-over esign. he response is assume to be a continuous ranom variable that follows

More information

Enterprise Resource Planning

Enterprise Resource Planning Enterprise Resource Planning MPC 6 th Eition Chapter 1a McGraw-Hill/Irwin Copyright 2011 by The McGraw-Hill Companies, Inc. All rights reserve. Enterprise Resource Planning A comprehensive software approach

More information

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues

Minimum-Energy Broadcast in All-Wireless Networks: NP-Completeness and Distribution Issues Minimum-Energy Broacast in All-Wireless Networks: NP-Completeness an Distribution Issues Mario Čagal LCA-EPFL CH-05 Lausanne Switzerlan mario.cagal@epfl.ch Jean-Pierre Hubaux LCA-EPFL CH-05 Lausanne Switzerlan

More information

A Universal Sensor Control Architecture Considering Robot Dynamics

A Universal Sensor Control Architecture Considering Robot Dynamics International Conference on Multisensor Fusion an Integration for Intelligent Systems (MFI2001) Baen-Baen, Germany, August 2001 A Universal Sensor Control Architecture Consiering Robot Dynamics Frierich

More information

ForNet: A Distributed Forensic Network

ForNet: A Distributed Forensic Network ForNet: A Distributed Forensic Network Kulesh Shanmugasundaram Polytechnic University 1 Problem and Motivation Security fails. Thousands of reported security breaches, worms, and viruses attest to this

More information

Forensics Tracking for IP Spoofers Using Path Backscatter Messages

Forensics Tracking for IP Spoofers Using Path Backscatter Messages Forensics Tracking for IP Spoofers Using Path Backscatter Messages Mithun Dev P D 1, Anju Augustine 2 1, 2 Department of Computer Science and Engineering, KMP College of Engineering, Asamannoor P.O Poomala,

More information

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service

Using research evidence in mental health: user-rating and focus group study of clinicians preferences for a new clinical question-answering service DOI: 10.1111/j.1471-1842.2008.00833.x Using research evience in mental health: user-rating an focus group stuy of clinicians preferences for a new clinical question-answering service Elizabeth A. Barley*,

More information

Product Differentiation for Software-as-a-Service Providers

Product Differentiation for Software-as-a-Service Providers University of Augsburg Prof. Dr. Hans Ulrich Buhl Research Center Finance & Information Management Department of Information Systems Engineering & Financial Management Discussion Paper WI-99 Prouct Differentiation

More information

Tracers Placement for IP Traceback against DDoS Attacks

Tracers Placement for IP Traceback against DDoS Attacks Tracers Placement for IP Traceback against DDoS Attacks Chun-Hsin Wang, Chang-Wu Yu, Chiu-Kuo Liang, Kun-Min Yu, Wen Ouyang, Ching-Hsien Hsu, and Yu-Guang Chen Department of Computer Science and Information

More information

On Adaboost and Optimal Betting Strategies

On Adaboost and Optimal Betting Strategies On Aaboost an Optimal Betting Strategies Pasquale Malacaria 1 an Fabrizio Smerali 1 1 School of Electronic Engineering an Computer Science, Queen Mary University of Lonon, Lonon, UK Abstract We explore

More information

An Efficient Filter for Denial-of-Service Bandwidth Attacks

An Efficient Filter for Denial-of-Service Bandwidth Attacks An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special

More information

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems *

GPRS performance estimation in GSM circuit switched services and GPRS shared resource systems * GPRS performance estimation in GSM circuit switche serices an GPRS share resource systems * Shaoji i an Sen-Gusta Häggman Helsinki Uniersity of Technology, Institute of Raio ommunications, ommunications

More information

Ch 10. Arithmetic Average Options and Asian Opitons

Ch 10. Arithmetic Average Options and Asian Opitons Ch 10. Arithmetic Average Options an Asian Opitons I. Asian Option an the Analytic Pricing Formula II. Binomial Tree Moel to Price Average Options III. Combination of Arithmetic Average an Reset Options

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS

NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS Iustin PRIESCU, PhD Titu Maiorescu University, Bucharest Sebastian NICOLAESCU, PhD Verizon Business, New York, USA Rodica NEAGU, MBA Outpost24,

More information

Option Pricing for Inventory Management and Control

Option Pricing for Inventory Management and Control Option Pricing for Inventory Management an Control Bryant Angelos, McKay Heasley, an Jeffrey Humpherys Abstract We explore the use of option contracts as a means of managing an controlling inventories

More information

Achieving quality audio testing for mobile phones

Achieving quality audio testing for mobile phones Test & Measurement Achieving quality auio testing for mobile phones The auio capabilities of a cellular hanset provie the funamental interface between the user an the raio transceiver. Just as RF testing

More information

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING

Safety Management System. Initial Revision Date: Version Revision No. 02 MANUAL LIFTING Revision Preparation: Safety Mgr Authority: Presient Issuing Dept: Safety Page: Page 1 of 11 Purpose is committe to proviing a safe an healthy working environment for all employees. Musculoskeletal isorers

More information

SCADA (Supervisory Control and Data Acquisition) systems

SCADA (Supervisory Control and Data Acquisition) systems Proceeings of the 2013 Feerate Conference on Computer Science an Information Systems pp. 1423 1428 Improving security in SCADA systems through firewall policy analysis Onrej Rysavy Jaroslav Rab Miroslav

More information

Professional Level Options Module, Paper P4(SGP)

Professional Level Options Module, Paper P4(SGP) Answers Professional Level Options Moule, Paper P4(SGP) Avance Financial Management (Singapore) December 2007 Answers Tutorial note: These moel answers are consierably longer an more etaile than woul be

More information

ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS

ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS ATTACK PATTERNS FOR DETECTING AND PREVENTING DDOS AND REPLAY ATTACKS A.MADHURI Department of Computer Science Engineering, PVP Siddhartha Institute of Technology, Vijayawada, Andhra Pradesh, India. A.RAMANA

More information

RUNESTONE, an International Student Collaboration Project

RUNESTONE, an International Student Collaboration Project RUNESTONE, an International Stuent Collaboration Project Mats Daniels 1, Marian Petre 2, Vicki Almstrum 3, Lars Asplun 1, Christina Björkman 1, Carl Erickson 4, Bruce Klein 4, an Mary Last 4 1 Department

More information

You Can Run, But You Can t Hide: An Effective Methodology to Traceback DDoS Attackers

You Can Run, But You Can t Hide: An Effective Methodology to Traceback DDoS Attackers You Can Run, But You Can t Hide: An Effective Methodology to Traceback DDoS Attackers K.T. Law Department of Computer Science & Engineering The Chinese University of Hong Kong ktlaw@cse.cuhk.edu.hk John

More information

Pi: A Path Identification Mechanism to Defend against DDoS Attacks

Pi: A Path Identification Mechanism to Defend against DDoS Attacks Pi: A Path Identification Mechanism to Defend against DDoS Attacks Abraham Yaar Adrian Perrig Dawn Song Carnegie Mellon University {ayaar, perrig, dawnsong}@cmu.edu Abstract Distributed Denial of Service

More information

Data Center Power System Reliability Beyond the 9 s: A Practical Approach

Data Center Power System Reliability Beyond the 9 s: A Practical Approach Data Center Power System Reliability Beyon the 9 s: A Practical Approach Bill Brown, P.E., Square D Critical Power Competency Center. Abstract Reliability has always been the focus of mission-critical

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27 th March 2015

Proceedings of the UGC Sponsored National Conference on Advanced Networking and Applications, 27 th March 2015 A New Approach to Detect, Filter And Trace the DDoS Attack S.Gomathi, M.Phil Research scholar, Department of Computer Science, Government Arts College, Udumalpet-642126. E-mail id: gomathipriya1988@gmail.com

More information

Detecting and Preventing IP-spoofed Distributed DoS Attacks

Detecting and Preventing IP-spoofed Distributed DoS Attacks International Journal of Network Security, Vol.7, No.1, PP. 81, July 28 Detecting and Preventing IP-spoofed Distributed DoS Attacks Yao Chen 1, Shantanu Das 1, Pulak Dhar 2, Abdulmotaleb El Saddik 1, and

More information

N O T I C E O F E X A M I N A T I O N

N O T I C E O F E X A M I N A T I O N THE CITY OF NEW YORK DEPARTMENT OF CITYWIDE ADMINISTRATIVE SERVICES APPLICATIONS CENTER 18 WASHINGTON STREET NEW YORK, NY 10004 N O T I C E O F E X A M I N A T I O N ACTIVITY THERAPIST (HHC) Exam. No.

More information

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach

Minimizing Makespan in Flow Shop Scheduling Using a Network Approach Minimizing Makespan in Flow Shop Scheuling Using a Network Approach Amin Sahraeian Department of Inustrial Engineering, Payame Noor University, Asaluyeh, Iran 1 Introuction Prouction systems can be ivie

More information

Calibration of the broad band UV Radiometer

Calibration of the broad band UV Radiometer Calibration of the broa ban UV Raiometer Marian Morys an Daniel Berger Solar Light Co., Philaelphia, PA 19126 ABSTRACT Mounting concern about the ozone layer epletion an the potential ultraviolet exposure

More information

zupdate: Updating Data Center Networks with Zero Loss

zupdate: Updating Data Center Networks with Zero Loss zupate: Upating Data Center Networks with Zero Loss Hongqiang Harry Liu Yale University hongqiang.liu@yale.eu Lihua Yuan Microsoft lyuan@microsoft.com Xin Wu Duke University xinwu@cs.uke.eu Roger Wattenhofer

More information

How To Segmentate An Insurance Customer In An Insurance Business

How To Segmentate An Insurance Customer In An Insurance Business International Journal of Database Theory an Application, pp.25-36 http://x.oi.org/10.14257/ijta.2014.7.1.03 A Case Stuy of Applying SOM in Market Segmentation of Automobile Insurance Customers Vahi Golmah

More information

Scalable live video streaming to cooperative clients using time shifting and video patching

Scalable live video streaming to cooperative clients using time shifting and video patching calable live vieo streaming to cooperative clients using time shifting an vieo patching Meng Guo, Mostafa H. Ammar {mguo, ammar}@cc.gatech.eu Networking an Telecommunication Group ollege of omputing, Georgia

More information

Tracing Network Attacks to Their Sources

Tracing Network Attacks to Their Sources Tracing Network s to Their Sources Security An IP traceback architecture in which routers log data about packets and adjacent forwarding nodes lets us trace s to their sources, even when the source IP

More information

Unbalanced Power Flow Analysis in a Micro Grid

Unbalanced Power Flow Analysis in a Micro Grid International Journal of Emerging Technology an Avance Engineering Unbalance Power Flow Analysis in a Micro Gri Thai Hau Vo 1, Mingyu Liao 2, Tianhui Liu 3, Anushree 4, Jayashri Ravishankar 5, Toan Phung

More information

Towards Stateless Single-Packet IP Traceback

Towards Stateless Single-Packet IP Traceback Towards Stateless Single-Packet IP Traceback Rafael P. Laufer, Pedro B. Velloso, Daniel de O. Cunha, Igor M. Moraes, Marco D. D. Bicudo, Marcelo D. D. Moreira, and Otto Carlos M. B. Duarte University of

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

The most common model to support workforce management of telephone call centers is

The most common model to support workforce management of telephone call centers is Designing a Call Center with Impatient Customers O. Garnett A. Manelbaum M. Reiman Davison Faculty of Inustrial Engineering an Management, Technion, Haifa 32000, Israel Davison Faculty of Inustrial Engineering

More information

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14.

Reading: Ryden chs. 3 & 4, Shu chs. 15 & 16. For the enthusiasts, Shu chs. 13 & 14. 7 Shocks Reaing: Ryen chs 3 & 4, Shu chs 5 & 6 For the enthusiasts, Shu chs 3 & 4 A goo article for further reaing: Shull & Draine, The physics of interstellar shock waves, in Interstellar processes; Proceeings

More information

Classification and State of Art of IP Traceback Techniques for DDoS Defense

Classification and State of Art of IP Traceback Techniques for DDoS Defense Classification and State of Art of IP Traceback Techniques for DDoS Defense Karanpreet Singh a, Krishan Kumar b, Abhinav Bhandari c,* a Computer Science & Engg.,Punjab Institute of Technology,Kapurthala,

More information

Manure Spreader Calibration

Manure Spreader Calibration Agronomy Facts 68 Manure Spreaer Calibration Manure spreaer calibration is an essential an valuable nutrient management tool for maximizing the efficient use of available manure nutrients. Planne manure

More information

The one-year non-life insurance risk

The one-year non-life insurance risk The one-year non-life insurance risk Ohlsson, Esbjörn & Lauzeningks, Jan Abstract With few exceptions, the literature on non-life insurance reserve risk has been evote to the ultimo risk, the risk in the

More information

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments

Game Theoretic Modeling of Cooperation among Service Providers in Mobile Cloud Computing Environments 2012 IEEE Wireless Communications an Networking Conference: Services, Applications, an Business Game Theoretic Moeling of Cooperation among Service Proviers in Mobile Clou Computing Environments Dusit

More information

Aon Retiree Health Exchange

Aon Retiree Health Exchange 2014 2015 Meicare Insurance Guie Aon Retiree Health Exchange Recommene by Why You Nee More Coverage I alreay have coverage. Aren t Meicare Parts A an B enough? For many people, Meicare alone oes not provie

More information

Sustainability Through the Market: Making Markets Work for Everyone q

Sustainability Through the Market: Making Markets Work for Everyone q www.corporate-env-strategy.com Sustainability an the Market Sustainability Through the Market: Making Markets Work for Everyone q Peter White Sustainable evelopment is about ensuring a better quality of

More information

Performance And Analysis Of Risk Assessment Methodologies In Information Security

Performance And Analysis Of Risk Assessment Methodologies In Information Security International Journal of Computer Trens an Technology (IJCTT) volume 4 Issue 10 October 2013 Performance An Analysis Of Risk Assessment ologies In Information Security K.V.D.Kiran #1, Saikrishna Mukkamala

More information

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis

How To Price Internet Access In A Broaban Service Charge On A Per Unit Basis iqui Pricing for Digital Infrastructure Services Subhajyoti Banyopahyay * an sing Kenneth Cheng Department of Decision an Information Sciences Warrington College of Business Aministration University of

More information

Rural Development Tools: What Are They and Where Do You Use Them?

Rural Development Tools: What Are They and Where Do You Use Them? Faculty Paper Series Faculty Paper 00-09 June, 2000 Rural Development Tools: What Are They an Where Do You Use Them? By Dennis U. Fisher Professor an Extension Economist -fisher@tamu.eu Juith I. Stallmann

More information