An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism

Size: px
Start display at page:

Download "An Efficient Network Traffic Classification Based on Unknown and Anomaly Flow Detection Mechanism"

Transcription

1 An Effiient Network Traffi Classifiation Based on Unknown and Anomaly Flow Detetion Mehanism G.Suganya.M.s.,B.Ed 1 1 Mphil.Sholar, Department of Computer Siene, KG College of Arts and Siene,Coimbatore. Tamil nadu, India. Abstrat Traffi tehnique is an important tool for network and system seurity in the environments suh as loud omputing based environment. Modern methods plans to take the gain of flow statistial features and mahine learning methods, but the performane is affeted by redued supervised information, and unfamiliar appliations. In addition detetion of anomalies in the flow level is not onsidered in earlier approahes. Current work proposes Flow-level anomaly detetion with the framework of Unknown Flow Detetion approahes. Flow-level anomaly an be deteted by using Syntheti flow-level trae generation approah(sg FLT). The two major hallenges with suh an approah are to haraterize normal and anomalous network behavior, and to disover realisti models defining normal and anomalous at the flow level. Unknown flow detetion approah has been performed by Flow level propagation and finding the orrelated flows to boost the auray. Performane evaluation is onduted on real-world network datasets whih demonstrates that the proposed sheme provides effiient performane than existing methods in the omplex network environment. Keywords Traffi, unknown flow detetion, anomaly flow detetion, ompound I. INTRODUCTION Traffi system plays asignifiantpart in and management arhitetures [1] and modern network seurity. For example, is normally an important omponent in the produts forintrusion detetion [2] and QoS ontrol [3]. With the advent of loud omputing the aggregate of appliations organized on the Internet is rapidly inreasing and several appliations implement the enryption tehniques. This ondition makes it firmer to lassify flows onsistent with their generation appliations. Conventional systemsdepend on on heking the exat port numbers used by dissimilar appliations, or examining the appliations signature strings in the payload of IP pakets. These methods enounter several problems in the urrent network suh as user privay protetion, dynami port numbers and data enryption. Presently, the methods inline to ondut by examining flow level statistial properties [4]. Considerabledevotion has been paid on the appliation of mahine learning systems to flow statistial features based. Still, the performane of the existing flow statistial feature based isunonvined in real world settings. Severalunsupervised lustering algorithms and supervised algorithms have been applied to network. From the labelled training samples of eah predefined lass,the flow model is learned in supervised [4]. This method lassifieseveryflow into predefined lasses;onsequently they annot agree with indefinite flows produed by unknown appliations. Furthermore, to attain high auray, the supervised methods wantenough labelled training data. In ontrast, the lusteringbased methods [5] an repeatedly group a set of unlabelled training samples and apply the lustering results to build a lassifier. In these methods, yet, the number of lusters has to be set huge enough to attain high-purity lusters. It is a hard problem of plotting from a huge number of lusters to a small number of real appliations without supervised information. The existing methods suffer from poor performane in the ritial situation where supervised information is inadequate and substantial unknown flows with anomalies are present. Reently benign and maliious anomaliessuh asnetwork outages, worms,denial of-servie attaks and flash rowds have the prospetive to disturb ritial serviesand infrastrutures. Inspired by the remark thatdetetion at the network edge is not ompatible for omprisingsuh largesale attaks, numerous anomaly detetion systemsfor bakbone networks have been developed. These systemswork on data olleted at the flow level, meanwhile inspeting single pakets is not possibleon high-speed bakbone links. Sine annotation, anonymization, and modifiation of real traes fail in produingstandard evaluation traes,there is a strong need for another approah. We trustthat syntheti generation of standard traes has the possibleto report the three reognized problems. We visualize a synthetitrae generation sheme that yields normal flow rendering a baseline model, and anomalous flow onstruted on a diversity of anomaly models. Still, the hallengewith generating syntheti flow-level traes is twofold: Initially,we need to desribe what is onsidered normal and anomalousnetwork behavior, and then we need to find the suitablenormal and anomalous models. We propose an eventdrivenmethod for defining normal and anomalous networkbehavior, and require the outline for anoriginal flow-basednetwork model diretedat anomaly detetion. ISSN: Page187

2 II. RELATED WORK Several supervised algorithms have been applied to by taking into aount various network appliations and situations. In [4]Moore and Zuevpresented a Naive Bayes estimator to lassify by appliation. Individually, urrent work apitalizes on hand-lassified network data, utilizing it as input to a supervised Naive Bayes estimator.theahievable of highlevel aurayis illustrated with the Naive Bayes estimator. In[6] Kim et al.presented ports-based Corel Reef method whih host seven ommon statistial feature based methods and behaviour-based BLINC method using supervised algorithms on seven dissimilar traes.this studygenerated several insights: (a) Theeffiieny of portbased in reognizing legay appliations is quiet impressive, moresupported by the use of paket size and TCP flag evidene. This detaillarifies why researh onsideration has shifted to notiing and lassifying new appliations that use port amouflaged and enryption, i.e., intentionally trying to avoid. Inappropriately, growing attention to lassifying for determinations not essentiallyaepted by originator of the is likely to inrease this group of, persuading an arms rae between those demanding to lassify, and those demanding to avoid having their lassified. In [7]Lorieret al. presented grouping of flows into a lesser number of lusters using the expetation maximization (EM) algorithm and physially label eah luster to an laim. The lusters are funtionaland the lustering and algorithms speify that a worthyfit has been attained to the data. Firstexaminationspeifies that the lusters are steady over a variety of different data with the similar overall features. The prevailing lusters offeranother way to disaggregate a paket header stream and assume it to demonstrate useful in analysis those emphases on a speifi type. For instane, simulation of TCP optimisations for high performane bulk transfer. But, additional work is essential to entirely meet our originalobjetive of lustering into groups that a network manager would distinguish as related to the speifi appliation types on their network. In [8] Bernaille et al.presented thek-means algorithm to lustering of s and labelledthe lusters to appliations by means of a payload analysis tool. The early results deteted with the method on a small trae are promising. The method is apable as it letsprimary of appliations and is fairlymodest. Still, the method has ertainlimitations that have been disussed below. Most of these limitations are easy to overwhelmed, while others are more important and affet most methods to date. In Multi-homed networks, large networks frequently have numerous onnetions to the Internet. In this ase, this approahan be extended todisplay all aess links and aggregate information on a mahine where the will our. In [9] Ermanet al.presented unidiretional statistial features to simplify in the network ore. In this the problem of is onsidered in the network ore. Classifiation at the ore is provoking beause only inompleteinformation about the flows and their ontributors is available. This problem an be addressed by developing aoutline that an lassify a flow using only unidiretional flow information. This approah ould be evaluated using latest paket traes that olleted and prelassified to establish a base truth. III. PROPOSED WORK In proposed system, Flow-level anomaly detetion method an be used with the framework of Unknown Flow Detetion approahes. The method of syntheti generation of flow-level traes (SG FLT) has been disussed for detetion of Flow level anomaly in network. In this method, normal and anomaly models of flows an be examined. In order to find the normal and anomaly flow, an event driven approah has been defined. A. SYSTEM ARCHITECTURE Initially a system model in figure 1 has been developed for finding the unknown flow in a network based on flow orrelation. The anomaly detetion of the flows an be deteted using syntheti generation of flow-level traes whih is based on event driven approah. Then the deteted unknown and anomaly flows an be lustered by means of k- means algorithm. At the training phase, less number of labelled flows and a large number of unlabelled flows are united to omprise an unsupervised training data set for lustering. The haraterized flows are utilized to train a lassifier namely nearest neighbour. In the testing stage, a ompound on the orrelated flows has been performed in preferene to lassifying individual flows. Comparative analysis an be done for the proposed system by using real time datasets. Flow-label propagation Labelled Unlabelled Anomaly flow Training Testing Syntheti generation of flow-level traes Clustering and Compound Analysis Figure 1: Proposed system ahiteture ISSN: Page188

3 IV. METHODOLOGY A. FLOW LABEL PROPAGATION The proposed method aims to lassify flows based on the flow level statistial properties. A flow onsists of suessive IP pakets having the same 5-tuple: {soure ip, soure port, destination ip, destination port, transport protool}. Traffi flows are onstruted by inspeting the headers of IP pakets aptured by the system on a omputer network. We start with a small set of pre-labelled flows to reate a supervised data set for luster-appliation mapping and a training set for lustering. Suppose the labelled flow set is A = {xa1, xa2,...} with the labels La = {ya1, ya2,...}, where eah flow is a real vetor in the statistial feature spae and the dimension of the vetor is determined by the number of flow statistial properties a large set of unlabelled flows = {xb1, xb2,...}, in the target network. Then anomaly flow an be defined as C ={ x1,x2, } in the target network.. By merging the labelled, unlabelled flow sets and anomaly flows the training set T for lustering an be obtained as follows T= A B C Moreover, an automati proess is applied to extend the labelled flow set by searhing the orrelated flows between A,B and C For eah flow xa in A, the automati proess searhes for its orrelated flows in B and C with the same 3-tuple: {destination ip, destination port, transport protool. The following algorithm provides the propagation of flows based on 3-tuple based heuristi as follows Input: Small flow set A and its orresponding label set La; large unlabelled flow set B; anomaly flow set C Output: extended set of labeled flows E and its orresponding label set Le 1. Create output flow set E A 2. Create output label set L L 3. for i 1 to A do 4 for j 1 to B && C do 5. Chek and ompare 3-tuple of x,x and x 6. if x ai, x bj and x share same 3-tuple then 7. Put x bj and x into E; 8. Put y ai into L e // y ai is determined as the label of x bj 9. End 10. End 11. End B. SYNTHETIC GENERATION OF FLOW-LEVEL TRAFFIC TRACES(SG FLT) A normal and anomalous network behavior is defined; the subsequently step is to loate appropriate models that give a realisti report of normal and anomalous. General parameter in modeling defines that eah model should be planned for a speifi idea; in present ase of work this is generating standard traes for flow-level anomaly detetion. Traffi Model Timesale: Anomaly detetion systems of Timesale works at ranges from more than a few days to minutes. Therefore, the present model must be aomplished of relating the long-timesale behavior in addition to the short-timesale behavior of network. Modelling Charateristis of Flows: Flow traes generation involves modeling of diverse flow parameters whih are regularly used for detetion of anomaly: Parameters used by volume metris suh as pakets and bytes, and Parameters used by spatial metris namely soure and destination addresses and ports. Versatile and Realisti anomaly models: In order to generate benhmark traes, the model must be able to generating anomalies of hanging intensities, and it needs to onsider the ollision of an anomaly on network in normal ondition. C. NEAREST CLUSTER BASED CLASSIFIER Another In this k-means lustering has been used to onstrut nearest luster based lassifier. The aim of K-means lustering is to partition the flows into k-lusters in order to redue the luster- sum as follows: argmin x m (1) where m i denotes the entroid of C i and it is the mean of flows in C i. Consider a initial set of k entroids whih are seleted randomly {m, m,. m }.The lustering algorithm an be done by alternating the assigning and updating stages. During assigning phase, eah luster is assigned to the losest mean of luster. C ={x : x m x m for all l=1, k} (2) While in update stage, the entroid of the flows in the luster an be hosen by alulating the new means as follows: m = x (3) The output of the luster-lass mapping is utilized to build a lassifier for eah testing flows. Consider the lasses formed by the luster-lass mapping are denoted by ψ = {ω 1... ω q }. The lasses are presented by using the results of k-means lustering and the flow statistial features. For lass ω i, it an be illustrated by a set of luster entroids, M ={m :C εω } The rule for individual flow is as follows: y= argmin min j x m (4) D. COMPOUND CLASSIFICATION In the phase, the ompound is applied on the orrelated flows modelled instead of lassifying individual flows. Consider the flows are X={x,. x }.In order to improve the auray,the orrelated information an be used. The ompound has been developed by aggregation of flow preditions of the lassifier with the weighted measures. For a given flows X={x,. x }, g flow preditions arey, y The flow preditions an be straightforwardly transformed into weighted measures ISSN: Page189

4 v = 1 International Journal of Computer Trends and Tehnology (IJCTT) volume 10 number 4 Apr 2014 if y indiates the i th lass 0, Otherwise (5) The ompound deision rule using the weighted measures is as follows: Assign X ω if v =max v (6) It proves that all flows in X are lassified into ω l. V. EXPERIMENTAL RESULTS In this setion, a number of experiments have been arried out to study the impat of unknown appliations and anomaly flows to the supervised methods. Then, the proposed method is ompared with two methods suh as when unknown appliations are measured in the experiments and a using syntheti generation of flow-level traes (SG -FLT).` Two ommon metris are used to measure the performane in anomaly with un known appliation senario and unknown appliation framework. Overall auray is defined as the ratio of the amount of all orretly lassified flows to the sum of all testing flows Auray = F-measure is alulated by F-measure = Where preision is defined as the ratio of orretly lassified flows over all predited flows in a lass (unknown +anomaly flows) and reall is defined as the ratio of orretly lassified flows over all ground truth flows in a speified lass. The omparative graph for the of unknown flows and of anomaly with unknown lass is illustrated below: A u r a y Figure 2: Auray omparision graph with unknown appliation using SG -FLT Unlabelled and anomaly flow of training F m e a s u r e Methods Figure 3: F-measure omparision graph Thus the above graph in figure 2 and 3 shows that proposed system of using syntheti generation of flow-level traes (SG -FLT) provides higher auray and F-measure when ompared with existing method of private with unknown appliation. VI. CONCLUSION In the present work, in network has been done by based on detetion of flow-level anomaly detetion by using the syntheti trae generation approah. Syntheti trae generation approah has been proposed in whih it has the potential of making standard traes available to a broad ommunity. A referene model is reated whih allows defining the normal and anomalous network behavior. The present method introdued tehniques to adequately utilize flow orrelation information. Firstly flow label propagation is utilized whih an automatially aurately label more unlabelled flows with anomaly flows to enhane the ability of nearest luster based lassifier (NCC). Another method is ompound whih an unite a number of flow preditions to make more aurate of weighted flows. Experimental result in terms of auray and F-measure provides better result when ompare with the existing system. REFERENCES with unknown appliation using SG -FLT [1]. T. Karagiannis, K. Papagiannaki, and M. Faloutsos, BLINC: multilevel in the dark, SIGCOMM Comput. Commun. Rev.,vol. 35, pp , Aug [2]. Y. Xiang, W. Zhou, and M. Guo, Flexible deterministi paket marking:an IP traebak system to find the real soure of attaks, IEEE Trans.Parallel Distrib. Syst., vol. 20, no. 4, pp , Apr [3]. M. Roughan, S. Sen, O. Spatshek, and N. Duffield, Class-ofserviemapping for QoS: a statistial signature-based approah to IP, in Pro ACM SIGCOMM Conferene on InternetMeasurement, pp [4]. A. W. Moore and D. Zuev, Internet using Bayesiananalysis tehniques, SIGMETRICS Perform. Eval. Rev., vol. 33, pp , June 2005 ISSN: Page190

5 [5]. A. MGregor, M. Hall, P. Lorier, and J. Brunskill, Flow lusteringusing mahine learning tehniques, in Pro Passive and AtiveMeasurement Workshop, pp [6]. H. Kim, K. Claffy, M. Fomenkov, D. Barman, M. Faloutsos, and K. Lee, Internet demystified: myths, aveats, and the bestpraties, in Pro ACM CoNEXT Conferene, pp [7]. Lorier, MGregor, M. Hall, P., and J. Brunskill, Flow lusteringusing mahine learning tehniques, in Pro Passive and AtiveMeasurement Workshop, pp [8]. L. Bernaille, R. Teixeira, I. Akodkenou, A. Soule, and K. Salamatian, Traffi on the fly, SIGCOMM Comput. Commun. Rev.,vol. 36, pp , Apr [9]. J. Erman, A. Mahanti, M. Arlitt, and C. Williamson, Identifying anddisriminating between web and peer-to-peer in the network ore, in Pro International Conferene on World Wide Web, pp ISSN: Page191

Hierarchical Clustering and Sampling Techniques for Network Monitoring

Hierarchical Clustering and Sampling Techniques for Network Monitoring S. Sindhuja Hierarhial Clustering and Sampling Tehniques for etwork Monitoring S. Sindhuja ME ABSTRACT: etwork monitoring appliations are used to monitor network traffi flows. Clustering tehniques are

More information

A Holistic Method for Selecting Web Services in Design of Composite Applications

A Holistic Method for Selecting Web Services in Design of Composite Applications A Holisti Method for Seleting Web Servies in Design of Composite Appliations Mārtiņš Bonders, Jānis Grabis Institute of Information Tehnology, Riga Tehnial University, 1 Kalu Street, Riga, LV 1658, Latvia,

More information

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection

Behavior Analysis-Based Learning Framework for Host Level Intrusion Detection Behavior Analysis-Based Learning Framework for Host Level Intrusion Detetion Haiyan Qiao, Jianfeng Peng, Chuan Feng, Jerzy W. Rozenblit Eletrial and Computer Engineering Department University of Arizona

More information

Pattern Recognition Techniques in Microarray Data Analysis

Pattern Recognition Techniques in Microarray Data Analysis Pattern Reognition Tehniques in Miroarray Data Analysis Miao Li, Biao Wang, Zohreh Momeni, and Faramarz Valafar Department of Computer Siene San Diego State University San Diego, California, USA [email protected]

More information

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds

Intelligent Measurement Processes in 3D Optical Metrology: Producing More Accurate Point Clouds Intelligent Measurement Proesses in 3D Optial Metrology: Produing More Aurate Point Clouds Charles Mony, Ph.D. 1 President Creaform in. [email protected] Daniel Brown, Eng. 1 Produt Manager Creaform in.

More information

Sebastián Bravo López

Sebastián Bravo López Transfinite Turing mahines Sebastián Bravo López 1 Introdution With the rise of omputers with high omputational power the idea of developing more powerful models of omputation has appeared. Suppose that

More information

Weighting Methods in Survey Sampling

Weighting Methods in Survey Sampling Setion on Survey Researh Methods JSM 01 Weighting Methods in Survey Sampling Chiao-hih Chang Ferry Butar Butar Abstrat It is said that a well-designed survey an best prevent nonresponse. However, no matter

More information

Computer Networks Framing

Computer Networks Framing Computer Networks Framing Saad Mneimneh Computer Siene Hunter College of CUNY New York Introdution Who framed Roger rabbit? A detetive, a woman, and a rabbit in a network of trouble We will skip the physial

More information

Open and Extensible Business Process Simulator

Open and Extensible Business Process Simulator UNIVERSITY OF TARTU FACULTY OF MATHEMATICS AND COMPUTER SCIENCE Institute of Computer Siene Karl Blum Open and Extensible Business Proess Simulator Master Thesis (30 EAP) Supervisors: Luiano Garía-Bañuelos,

More information

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator

Neural network-based Load Balancing and Reactive Power Control by Static VAR Compensator nternational Journal of Computer and Eletrial Engineering, Vol. 1, No. 1, April 2009 Neural network-based Load Balaning and Reative Power Control by Stati VAR Compensator smail K. Said and Marouf Pirouti

More information

Discovering Trends in Large Datasets Using Neural Networks

Discovering Trends in Large Datasets Using Neural Networks Disovering Trends in Large Datasets Using Neural Networks Khosrow Kaikhah, Ph.D. and Sandesh Doddameti Department of Computer Siene Texas State University San Maros, Texas 78666 Abstrat. A novel knowledge

More information

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero

FIRE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero FE DETECTION USING AUTONOMOUS AERIAL VEHICLES WITH INFRARED AND VISUAL CAMERAS. J. Ramiro Martínez-de Dios, Luis Merino and Aníbal Ollero Robotis, Computer Vision and Intelligent Control Group. University

More information

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks

Performance Analysis of IEEE 802.11 in Multi-hop Wireless Networks Performane Analysis of IEEE 80.11 in Multi-hop Wireless Networks Lan Tien Nguyen 1, Razvan Beuran,1, Yoihi Shinoda 1, 1 Japan Advaned Institute of Siene and Tehnology, 1-1 Asahidai, Nomi, Ishikawa, 93-19

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

Big Data Analysis and Reporting with Decision Tree Induction

Big Data Analysis and Reporting with Decision Tree Induction Big Data Analysis and Reporting with Deision Tree Indution PETRA PERNER Institute of Computer Vision and Applied Computer Sienes, IBaI Postbox 30 11 14, 04251 Leipzig GERMANY [email protected],

More information

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods

A Survey of Usability Evaluation in Virtual Environments: Classi cation and Comparison of Methods Doug A. Bowman [email protected] Department of Computer Siene Virginia Teh Joseph L. Gabbard Deborah Hix [ jgabbard, hix]@vt.edu Systems Researh Center Virginia Teh A Survey of Usability Evaluation in Virtual

More information

A Context-Aware Preference Database System

A Context-Aware Preference Database System J. PERVASIVE COMPUT. & COMM. (), MARCH 005. TROUBADOR PUBLISHING LTD) A Context-Aware Preferene Database System Kostas Stefanidis Department of Computer Siene, University of Ioannina,, [email protected] Evaggelia

More information

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera

The Application of Mamdani Fuzzy Model for Auto Zoom Function of a Digital Camera (IJCSIS) International Journal of Computer Siene and Information Seurity, Vol. 6, No. 3, 2009 The Appliation of Mamdani Fuzzy Model for Auto Funtion of a Digital Camera * I. Elamvazuthi, P. Vasant Universiti

More information

A Keyword Filters Method for Spam via Maximum Independent Sets

A Keyword Filters Method for Spam via Maximum Independent Sets Vol. 7, No. 3, May, 213 A Keyword Filters Method for Spam via Maximum Independent Sets HaiLong Wang 1, FanJun Meng 1, HaiPeng Jia 2, JinHong Cheng 3 and Jiong Xie 3 1 Inner Mongolia Normal University 2

More information

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA

arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrence Berkeley National Laboratory One Cyclotron Road Berkeley, CA 94720 USA LBNL-52402 Marh 2003 On the Speed of Gravity and the v/ Corretions to the Shapiro Time Delay Stuart Samuel 1 arxiv:astro-ph/0304006v2 10 Jun 2003 Theory Group, MS 50A-5101 Lawrene Berkeley National Laboratory

More information

MATE: MPLS Adaptive Traffic Engineering

MATE: MPLS Adaptive Traffic Engineering MATE: MPLS Adaptive Traffi Engineering Anwar Elwalid Cheng Jin Steven Low Indra Widjaja Bell Labs EECS Dept EE Dept Fujitsu Network Communiations Luent Tehnologies Univ. of Mihigan Calteh Pearl River,

More information

From a strategic view to an engineering view in a digital enterprise

From a strategic view to an engineering view in a digital enterprise Digital Enterprise Design & Management 2013 February 11-12, 2013 Paris From a strategi view to an engineering view in a digital enterprise The ase of a multi-ountry Telo Hervé Paault Orange Abstrat In

More information

How To Fator

How To Fator CHAPTER hapter 4 > Make the Connetion 4 INTRODUCTION Developing seret odes is big business beause of the widespread use of omputers and the Internet. Corporations all over the world sell enryption systems

More information

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments

SLA-based Resource Allocation for Software as a Service Provider (SaaS) in Cloud Computing Environments 2 th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing SLA-based Resoure Alloation for Software as a Servie Provider (SaaS) in Cloud Computing Environments Linlin Wu, Saurabh Kumar

More information

Capacity at Unsignalized Two-Stage Priority Intersections

Capacity at Unsignalized Two-Stage Priority Intersections Capaity at Unsignalized Two-Stage Priority Intersetions by Werner Brilon and Ning Wu Abstrat The subjet of this paper is the apaity of minor-street traffi movements aross major divided four-lane roadways

More information

Static Fairness Criteria in Telecommunications

Static Fairness Criteria in Telecommunications Teknillinen Korkeakoulu ERIKOISTYÖ Teknillisen fysiikan koulutusohjelma 92002 Mat-208 Sovelletun matematiikan erikoistyöt Stati Fairness Criteria in Teleommuniations Vesa Timonen, e-mail: vesatimonen@hutfi

More information

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms

Interpretable Fuzzy Modeling using Multi-Objective Immune- Inspired Optimization Algorithms Interpretable Fuzzy Modeling using Multi-Objetive Immune- Inspired Optimization Algorithms Jun Chen, Mahdi Mahfouf Abstrat In this paper, an immune inspired multi-objetive fuzzy modeling (IMOFM) mehanism

More information

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts

FOOD FOR THOUGHT Topical Insights from our Subject Matter Experts FOOD FOR THOUGHT Topial Insights from our Sujet Matter Experts DEGREE OF DIFFERENCE TESTING: AN ALTERNATIVE TO TRADITIONAL APPROACHES The NFL White Paper Series Volume 14, June 2014 Overview Differene

More information

An Enhanced Critical Path Method for Multiple Resource Constraints

An Enhanced Critical Path Method for Multiple Resource Constraints An Enhaned Critial Path Method for Multiple Resoure Constraints Chang-Pin Lin, Hung-Lin Tai, and Shih-Yan Hu Abstrat Traditional Critial Path Method onsiders only logial dependenies between related ativities

More information

Impedance Method for Leak Detection in Zigzag Pipelines

Impedance Method for Leak Detection in Zigzag Pipelines 10.478/v10048-010-0036-0 MEASUREMENT SCIENCE REVIEW, Volume 10, No. 6, 010 Impedane Method for Leak Detetion in igzag Pipelines A. Lay-Ekuakille 1, P. Vergallo 1, A. Trotta 1 Dipartimento d Ingegneria

More information

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems

A Three-Hybrid Treatment Method of the Compressor's Characteristic Line in Performance Prediction of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition of Power Systems A Three-Hybrid Treatment Method of the Compressor's Charateristi Line in Performane Predition

More information

Traffic Classification with Sampled NetFlow

Traffic Classification with Sampled NetFlow Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic

More information

Findings and Recommendations

Findings and Recommendations Contrating Methods and Administration Findings and Reommendations Finding 9-1 ESD did not utilize a formal written pre-qualifiations proess for seleting experiened design onsultants. ESD hose onsultants

More information

RISK-BASED IN SITU BIOREMEDIATION DESIGN JENNINGS BRYAN SMALLEY. A.B., Washington University, 1992 THESIS. Urbana, Illinois

RISK-BASED IN SITU BIOREMEDIATION DESIGN JENNINGS BRYAN SMALLEY. A.B., Washington University, 1992 THESIS. Urbana, Illinois RISK-BASED IN SITU BIOREMEDIATION DESIGN BY JENNINGS BRYAN SMALLEY A.B., Washington University, 1992 THESIS Submitted in partial fulfillment of the requirements for the degree of Master of Siene in Environmental

More information

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services

Learning Curves and Stochastic Models for Pricing and Provisioning Cloud Computing Services T Learning Curves and Stohasti Models for Priing and Provisioning Cloud Computing Servies Amit Gera, Cathy H. Xia Dept. of Integrated Systems Engineering Ohio State University, Columbus, OH 4310 {gera.,

More information

Deadline-based Escalation in Process-Aware Information Systems

Deadline-based Escalation in Process-Aware Information Systems Deadline-based Esalation in Proess-Aware Information Systems Wil M.P. van der Aalst 1,2, Mihael Rosemann 2, Marlon Dumas 2 1 Department of Tehnology Management Eindhoven University of Tehnology, The Netherlands

More information

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs)

Deduplication with Block-Level Content-Aware Chunking for Solid State Drives (SSDs) 23 IEEE International Conferene on High Performane Computing and Communiations & 23 IEEE International Conferene on Embedded and Ubiquitous Computing Dedupliation with Blok-Level Content-Aware Chunking

More information

Chapter 1 Microeconomics of Consumer Theory

Chapter 1 Microeconomics of Consumer Theory Chapter 1 Miroeonomis of Consumer Theory The two broad ategories of deision-makers in an eonomy are onsumers and firms. Eah individual in eah of these groups makes its deisions in order to ahieve some

More information

Granular Problem Solving and Software Engineering

Granular Problem Solving and Software Engineering Granular Problem Solving and Software Engineering Haibin Zhu, Senior Member, IEEE Department of Computer Siene and Mathematis, Nipissing University, 100 College Drive, North Bay, Ontario, P1B 8L7, Canada

More information

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS

AUTOMATED VISUAL TRAFFIC MONITORING AND SURVEILLANCE THROUGH A NETWORK OF DISTRIBUTED UNITS AUTOMATED VISUAL TRAFFIC MOITORIG AD SURVEILLACE THROUGH A ETWORK OF DISTRIBUTED UITS A. Koutsia a, T. Semertzidis a, K. Dimitropoulos a,. Grammalidis a and K. Georgouleas b a Informatis and Telematis

More information

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF

' R ATIONAL. :::~i:. :'.:::::: RETENTION ':: Compliance with the way you work PRODUCT BRIEF ' R :::i:. ATIONAL :'.:::::: RETENTION ':: Compliane with the way you work, PRODUCT BRIEF In-plae Management of Unstrutured Data The explosion of unstrutured data ombined with new laws and regulations

More information

Channel Assignment Strategies for Cellular Phone Systems

Channel Assignment Strategies for Cellular Phone Systems Channel Assignment Strategies for Cellular Phone Systems Wei Liu Yiping Han Hang Yu Zhejiang University Hangzhou, P. R. China Contat: [email protected] 000 Mathematial Contest in Modeling (MCM) Meritorious

More information

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains

Effects of Inter-Coaching Spacing on Aerodynamic Noise Generation Inside High-speed Trains Effets of Inter-Coahing Spaing on Aerodynami Noise Generation Inside High-speed Trains 1 J. Ryu, 1 J. Park*, 2 C. Choi, 1 S. Song Hanyang University, Seoul, South Korea 1 ; Korea Railroad Researh Institute,

More information

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System

Marker Tracking and HMD Calibration for a Video-based Augmented Reality Conferencing System Marker Traking and HMD Calibration for a Video-based Augmented Reality Conferening System Hirokazu Kato 1 and Mark Billinghurst 2 1 Faulty of Information Sienes, Hiroshima City University 2 Human Interfae

More information

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking

Customer Efficiency, Channel Usage and Firm Performance in Retail Banking Customer Effiieny, Channel Usage and Firm Performane in Retail Banking Mei Xue Operations and Strategi Management Department The Wallae E. Carroll Shool of Management Boston College 350 Fulton Hall, 140

More information

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty

An integrated optimization model of a Closed- Loop Supply Chain under uncertainty ISSN 1816-6075 (Print), 1818-0523 (Online) Journal of System and Management Sienes Vol. 2 (2012) No. 3, pp. 9-17 An integrated optimization model of a Closed- Loop Supply Chain under unertainty Xiaoxia

More information

Scalable Hierarchical Multitask Learning Algorithms for Conversion Optimization in Display Advertising

Scalable Hierarchical Multitask Learning Algorithms for Conversion Optimization in Display Advertising Salable Hierarhial Multitask Learning Algorithms for Conversion Optimization in Display Advertising Amr Ahmed Google [email protected] Abhimanyu Das Mirosoft Researh [email protected] Alexander J. Smola

More information

Parametric model of IP-networks in the form of colored Petri net

Parametric model of IP-networks in the form of colored Petri net Parametri model of IP-networks in the form of olored Petri net Shmeleva T.R. Abstrat A parametri model of IP-networks in the form of olored Petri net was developed; it onsists of a fixed number of Petri

More information

Chapter 5 Single Phase Systems

Chapter 5 Single Phase Systems Chapter 5 Single Phase Systems Chemial engineering alulations rely heavily on the availability of physial properties of materials. There are three ommon methods used to find these properties. These inlude

More information

Information Security 201

Information Security 201 FAS Information Seurity 201 Desktop Referene Guide Introdution Harvard University is ommitted to proteting information resoures that are ritial to its aademi and researh mission. Harvard is equally ommitted

More information

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES

THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES Proeedings of FEDSM 98 998 ASME Fluids Engineering Division Summer Meeting June 2-25, 998 Washington DC FEDSM98-529 THE PERFORMANCE OF TRANSIT TIME FLOWMETERS IN HEATED GAS MIXTURES John D. Wright Proess

More information

Srinivas Bollapragada GE Global Research Center. Abstract

Srinivas Bollapragada GE Global Research Center. Abstract Sheduling Commerial Videotapes in Broadast Television Srinivas Bollapragada GE Global Researh Center Mihael Bussiek GAMS Development Corporation Suman Mallik University of Illinois at Urbana Champaign

More information

Chapter 6 A N ovel Solution Of Linear Congruenes Proeedings NCUR IX. (1995), Vol. II, pp. 708{712 Jerey F. Gold Department of Mathematis, Department of Physis University of Utah Salt Lake City, Utah 84112

More information

On the Characteristics of Spectrum-Agile Communication Networks

On the Characteristics of Spectrum-Agile Communication Networks 1 On the Charateristis of Spetrum-Agile Communiation Networks Xin Liu Wei Wang Department of Computer Siene University of California, Davis, CA 95616 Email:{liu,wangw}@s.udavis.edu Abstrat Preliminary

More information

Supply chain coordination; A Game Theory approach

Supply chain coordination; A Game Theory approach aepted for publiation in the journal "Engineering Appliations of Artifiial Intelligene" 2008 upply hain oordination; A Game Theory approah Jean-Claude Hennet x and Yasemin Arda xx x LI CNR-UMR 668 Université

More information

4.15 USING METEOSAT SECOND GENERATION HIGH RESOLUTION VISIBLE DATA FOR THE IMPOVEMENT OF THE RAPID DEVELOPPING THUNDERSTORM PRODUCT

4.15 USING METEOSAT SECOND GENERATION HIGH RESOLUTION VISIBLE DATA FOR THE IMPOVEMENT OF THE RAPID DEVELOPPING THUNDERSTORM PRODUCT 4.15 USNG METEOSAT SECOND GENEATON HGH ESOLUTON VSBLE DATA FO THE MPOVEMENT OF THE APD DEVELOPPNG THUNDESTOM PODUCT Oleksiy Kryvobok * Ukrainian HydroMeteorologial nstitute Kyiv, Ukraine Stephane Senesi

More information

Software Ecosystems: From Software Product Management to Software Platform Management

Software Ecosystems: From Software Product Management to Software Platform Management Software Eosystems: From Software Produt Management to Software Platform Management Slinger Jansen, Stef Peeters, and Sjaak Brinkkemper Department of Information and Computing Sienes Utreht University,

More information

Improved SOM-Based High-Dimensional Data Visualization Algorithm

Improved SOM-Based High-Dimensional Data Visualization Algorithm Computer and Information Siene; Vol. 5, No. 4; 2012 ISSN 1913-8989 E-ISSN 1913-8997 Published by Canadian Center of Siene and Eduation Improved SOM-Based High-Dimensional Data Visualization Algorithm Wang

More information

A novel active mass damper for vibration control of bridges

A novel active mass damper for vibration control of bridges IABMAS 08, International Conferene on Bridge Maintenane, Safety and Management, 3-7 July 008, Seoul, Korea A novel ative mass damper for vibration ontrol of bridges U. Starossek & J. Sheller Strutural

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers

To Coordinate Or Not To Coordinate? Wide-Area Traffic Management for Data Centers To Coordinate Or Not To Coordinate? Wide-Area Traffi Management for Data Centers Srinivas Narayana, Joe Wenjie Jiang, Jennifer Rexford, Mung Chiang Department of Computer Siene, and Department of Eletrial

More information

Ranking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning

Ranking Community Answers by Modeling Question-Answer Relationships via Analogical Reasoning Ranking Community Answers by Modeling Question-Answer Relationships via Analogial Reasoning Xin-Jing Wang Mirosoft Researh Asia 4F Sigma, 49 Zhihun Road Beijing, P.R.China [email protected] Xudong Tu,Dan

More information

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model

Trade Information, Not Spectrum: A Novel TV White Space Information Market Model Trade Information, Not Spetrum: A Novel TV White Spae Information Market Model Yuan Luo, Lin Gao, and Jianwei Huang 1 Abstrat In this paper, we propose a novel information market for TV white spae networks,

More information

Effectiveness of a law to reduce alcohol-impaired driving in Japan

Effectiveness of a law to reduce alcohol-impaired driving in Japan Effetiveness of a law to redue alohol-impaired driving in Japan T Nagata, 1,2 S Setoguhi, 3 D Hemenway, 4 M J Perry 5 Original artile 1 Takemi Program, Department of International Health, Harvard Shool

More information

Modeling and analyzing interference signal in a complex electromagnetic environment

Modeling and analyzing interference signal in a complex electromagnetic environment Liu et al. EURASIP Journal on Wireless Communiations and Networking (016) 016:1 DOI 10.1186/s13638-015-0498-8 RESEARCH Modeling and analyzing interferene signal in a omplex eletromagneti environment Chun-tong

More information

AUDITING COST OVERRUN CLAIMS *

AUDITING COST OVERRUN CLAIMS * AUDITING COST OVERRUN CLAIMS * David Pérez-Castrillo # University of Copenhagen & Universitat Autònoma de Barelona Niolas Riedinger ENSAE, Paris Abstrat: We onsider a ost-reimbursement or a ost-sharing

More information

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors

SUDOKU: Secure and Usable Deployment of Keys on Wireless Sensors SUDOKU: Seure and Usable Deployment of Keys on Wireless Sensors Matthias Wilhelm, Ivan Martinovi, Ersin Uzun, and Jens B. Shmitt diso Distributed Computer Systems Lab, TU Kaiserslautern, Germany {wilhelm,

More information

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data

Criminal Geographical Profiling: Using FCA for Visualization and Analysis of Crime Data Criminal Georaphial rofilin: Usin FCA for Visualization and Analysis of Crime Data Quist-Aphetsi Kester, MIEEE Leturer, Faulty of Informatis Ghana Tehnoloy University Collee Ara, Ghana Email: [email protected]

More information

Health Savings Account Application

Health Savings Account Application Health Savings Aount Appliation FOR BANK USE ONLY: ACCOUNT # CUSTOMER # Health Savings Aount (HSA) Appliation ALL FIELDS MUST BE COMPLETED. Missing fields may delay the aount opening proess and possibly

More information

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization

Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Soft-Edge Flip-flops for Improved Timing Yield: Design and Optimization Abstrat Parameter variations ause high yield losses due to their large impat on iruit delay. In this paper, we propose the use of

More information

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task

Context-Sensitive Adjustments of Cognitive Control: Conflict-Adaptation Effects Are Modulated by Processing Demands of the Ongoing Task Journal of Experimental Psyhology: Learning, Memory, and Cognition 2008, Vol. 34, No. 3, 712 718 Copyright 2008 by the Amerian Psyhologial Assoiation 0278-7393/08/$12.00 DOI: 10.1037/0278-7393.34.3.712

More information

Forensic Network Traffic Analysis

Forensic Network Traffic Analysis Forensic Network Traffic Analysis Noora Al Khater Department of Informatics King's College London London, United Kingdom [email protected] Richard E Overill Department of Informatics King's College

More information

A Comparison of Service Quality between Private and Public Hospitals in Thailand

A Comparison of Service Quality between Private and Public Hospitals in Thailand International Journal of Business and Soial Siene Vol. 4 No. 11; September 2013 A Comparison of Servie Quality between Private and Hospitals in Thailand Khanhitpol Yousapronpaiboon, D.B.A. Assistant Professor

More information

Wireless Networking Guide 2007 www.lexmark.com

Wireless Networking Guide 2007 www.lexmark.com Wireless Networking Guide 2007 www.lexmark.om P/N 13L0828 E.C. 3L0101 Contents Installing the printer on a wireless network...4 Wireless network ompatiility...4 Information you will need to set up the

More information

Green Cloud Computing

Green Cloud Computing International Journal of Information and Computation Tehnology. ISSN 0974-2239 Volume 4, Number 4 (2014), pp. 431-436 International Researh Publiations House http://www. irphouse.om /ijit.htm Green Cloud

More information

Social Network Analysis Based on BSP Clustering Algorithm

Social Network Analysis Based on BSP Clustering Algorithm Soial Network Analysis Based on BSP Clustering Algorithm ong Shool of Business Administration China University of Petroleum ABSRAC Soial network analysis is a new researh field in data mining. he lustering

More information

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes

Asymmetric Error Correction and Flash-Memory Rewriting using Polar Codes 1 Asymmetri Error Corretion and Flash-Memory Rewriting using Polar Codes Eyal En Gad, Yue Li, Joerg Kliewer, Mihael Langberg, Anxiao (Andrew) Jiang and Jehoshua Bruk Abstrat We propose effiient oding shemes

More information

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion

OpenSession: SDN-based Cross-layer Multi-stream Management Protocol for 3D Teleimmersion : SN-based ross-layer Multi-stream Management Protool for 3 Teleimmersion hsan refin Raoul Rivas Rehana Tabassum Klara Nahrstedt University of Illinois at Urbana-hampaign, Urbana, IL {marefin2, trivas,

More information

WORKFLOW CONTROL-FLOW PATTERNS A Revised View

WORKFLOW CONTROL-FLOW PATTERNS A Revised View WORKFLOW CONTROL-FLOW PATTERNS A Revised View Nik Russell 1, Arthur H.M. ter Hofstede 1, 1 BPM Group, Queensland University of Tehnology GPO Box 2434, Brisbane QLD 4001, Australia {n.russell,a.terhofstede}@qut.edu.au

More information

THE EFFECT OF WATER VAPOR ON COUNTERFLOW DIFFUSION FLAMES

THE EFFECT OF WATER VAPOR ON COUNTERFLOW DIFFUSION FLAMES THE EFFECT OF WATER VAPOR ON COUNTERFLOW DIFFUSION FLAMES by Jaeil Suh and Arvind Atreya Combustion and Heat Tkansfer Laboratory Department of Mehanial Engineering and Applied Mehanis The University of

More information

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings

Computational Analysis of Two Arrangements of a Central Ground-Source Heat Pump System for Residential Buildings Computational Analysis of Two Arrangements of a Central Ground-Soure Heat Pump System for Residential Buildings Abstrat Ehab Foda, Ala Hasan, Kai Sirén Helsinki University of Tehnology, HVAC Tehnology,

More information

Recovering Articulated Motion with a Hierarchical Factorization Method

Recovering Articulated Motion with a Hierarchical Factorization Method Reovering Artiulated Motion with a Hierarhial Fatorization Method Hanning Zhou and Thomas S Huang University of Illinois at Urbana-Champaign, 405 North Mathews Avenue, Urbana, IL 680, USA {hzhou, huang}@ifpuiuedu

More information

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 9, NO. 3, MAY/JUNE 2012 401 IEEE TRASACTIOS O DEPEDABLE AD SECURE COMPUTIG, VOL. 9, O. 3, MAY/JUE 2012 401 Mitigating Distributed Denial of Servie Attaks in Multiparty Appliations in the Presene of Clok Drifts Zhang Fu, Marina Papatriantafilou,

More information

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts

State of Maryland Participation Agreement for Pre-Tax and Roth Retirement Savings Accounts State of Maryland Partiipation Agreement for Pre-Tax and Roth Retirement Savings Aounts DC-4531 (08/2015) For help, please all 1-800-966-6355 www.marylandd.om 1 Things to Remember Complete all of the setions

More information

1.3 Complex Numbers; Quadratic Equations in the Complex Number System*

1.3 Complex Numbers; Quadratic Equations in the Complex Number System* 04 CHAPTER Equations and Inequalities Explaining Conepts: Disussion and Writing 7. Whih of the following pairs of equations are equivalent? Explain. x 2 9; x 3 (b) x 29; x 3 () x - 2x - 22 x - 2 2 ; x

More information

Solving the Game of Awari using Parallel Retrograde Analysis

Solving the Game of Awari using Parallel Retrograde Analysis Solving the Game of Awari using Parallel Retrograde Analysis John W. Romein and Henri E. Bal Vrije Universiteit, Faulty of Sienes, Department of Mathematis and Computer Siene, Amsterdam, The Netherlands

More information

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems

Bypassing Space Explosion in Regular Expression Matching for Network Intrusion Detection and Prevention Systems Bypassing Spae Explosion in Regular Expression Mathing for Network Intrusion Detetion and Prevention Systems Jignesh Patel Alex X. Liu Eri Torng Department of Computer Siene and Engineering Mihigan State

More information

IT Essentials II: Network Operating Systems

IT Essentials II: Network Operating Systems Unit 13: IT Essentials II: Network Operating Systems Learning Outomes: A andidate following a programme of learning leading to this unit will be able to: demonstrate understanding of network operating

More information