DDoS Attack Detection and Attacker Identification
|
|
|
- Daniel Clarke
- 10 years ago
- Views:
Transcription
1 DDoS Attack Detectio ad Attacker Idetificatio Brajesh Kashyap Departmet of Computer Sciece ad Egieerig Natioal Istitute of Techology Rourkela S.K.Jea Departmet of Computer Sciece ad Egieerig Natioal Istitute of Techology Rourkela ABSTRACT DDoS attack is a form of DoS attack i which attacker uses authorized user IP address to attack o a particular victim. Of the two types of attack it falls i the active category. The mai aim of the attacker is to jam the resources i order to dey services to the recipiet. The attacker ca use several strategies to achieve this goal, oe of which is by floodig the etwork with bogus requests. The attack is distributed because the attacker is usig multiple computers to lauch the deial of service attack. I this paper we have first idetified the types of DoS ad DDoS attack. The we have provided the solutio for those attacks o the basis of attacker s idetificatio. Mai focus of this paper is to idetify the actual attacker, who has performed attack by sittig behid a forged System. For that purpose first we prevet IP forgery by usig seder autheticatio process, the calculate TCP flow rate ad from it we idetify whether packets are or- mal packet or malicious packet. We detect attack o receiver proxy server by usig etropy ad ormalize etropy calculatio o receiver proxy server. If attack is detected the we drop packets, get their mark value ad trace them back to the source. Fially we use the cocept of ISP ad IANA to idetify the actual attacker. NS2 has bee used to simulate the proposed methods. Geeral Terms Normal packet: packets that are sad by authetic user, Attack packet: packets that are sad by attacker to perform attack o particular victim. Keywords: Deial of Service (DoS), Distributed Deial of Service (DDoS), Iteret Assig Number Authority (IANA), Iteret Service Provider (ISP) INTRODUCTION The Iteret was iitially desiged for opeess ad scalability. The ifrastructure is certaily workig as evisioed by that yardstick. However, the price of this success has bee poor security. O the Iteret, ayoe ca sed ay packet to ayoe without beig autheticated, while the receiver has to process ay packet that arrives to a provided service. The lack of autheticatio meas that attackers ca create a fake idetity, ad sed malicious traffic with impuity. All systems coected to the Iter- et are potetial targets for attacks sice the opeess of the Iteret makes them accessible to attack traffic.[3] 1.1 Deial of service (DoS) attack: A Deial of Service (DoS) attack aims to stop the service provided by a target. It ca be lauched i two forms. The first form is to exploit software vulerabilities of a target by sedig malformed packets ad crash the system. The secod form is to use massive volumes of useless traffic to occupy all the resources that could service legitimate traffic. While it is possible to protect the first form of attack by patchig kow vulerabilities, the secod form of attack caot be so easily preveted. The targets ca be attacked simply because they are coected to the public Iteret.[3] A DoS attack is a malicious attempt by a sigle perso or a group of people to disrupt a olie service. DoS attacks ca be lauched agaist both services, e.g., a web server, ad etworks, e.g., the etwork coectio to a server.[3] Types of DoS attack: TCP Sy Flood Attack UDP flood attack Pig of death attack Teardrop attack 1.2 Distributed Deial of service (DDoS) attack: I the distributed form of DoS attacks (called DDoS), the attacker first takes cotrol of a large umber of vulerable hosts o the iteret, ad the uses them to simultaeously sed a huge flood of packets to the victim, exhaustig all of its resources. There are a large umber of exploitable machies o the iteret, which have weak security measures, for attackers to lauch DDoS at- tacks, so that such attacks ca be executed by a attacker with limited resources agaist the large, sophisticated sites.[2] Types of DDoS attack: A) Badwidth Attacks: The badwidth attack ca be defied as ay activity that aims to disable the services provided by the victim by sedig a excessive volume of useless traffic A.1) IP Spoofed Attack: I this type of attack The attackers i DDoS attacks always modify the source addresses i the attack packets to hide their idetity, ad makig it difficult to distiguish such pack- ets from those set by legitimate users.[2] A.2) Distributed Reflector Attacks: I these attacks, the attacker (also referred to as a slave from ow o; may slaves carry out a attack o behalf of the real attacker: a huma) does ot flood the victim directly, but uses iocet servers as reflectors to achieve its goal. A reflector may be ay IP host that will retur a reply packet whe set a request packet. For example, all web servers, DNS servers ad routers ca be reflectors sice they would reply with SYN ACK or RST packets i respose to SYN packets. A slave spoofs the source address of the request packets with the address of the victim ad seds them to the reflectors. The reflectors the sed reply packets to the victim (apparet source of the request packets). 27
2 A.3) Forged Source Attack: I this type of DDoS attack attacker first set the aget software ad gathers commad ad cotrol server ad with the help of commad ad cotrol server they have gather zombie pc s i the etwork ad perform DDoS attack with the help of that systems. Systems those perform DDoS attack i this type of attack are ot actual system these are the system that is cotrolled by the commad ad cotrol server ad perform attack. Fig 1: DDoS Attack Process 2. DDoS ATTACK DETECTION AND PREVENTION: To detect the DDoS attack o victim proxy server, we use the cocept of etropy calculatio o victim proxy server. As we kow that attacker does t play ay role i Network path determiatio it is totally doe by the router dyamically. To detect DDoS attack we use the cocept of symmetric shared key. We assume that each router is havig commo shared secret key. Router used that key to ecrypt ad decrypt markig value with the help of this shared symmetric key. Ma i middle attack performed by the attacker by treatig himself as a router because it is easy to forge router ip address i a etwork.this attack ca be very well removed by this 2.1 Etropy: Etropy is a importat cocept of iformatio theory, which is a measure of the ucertaity or radomess. associated with a radom variable or i this case data comig over the etwork. The more radom it is, the more etropy it cotais. The value of sample etropy lies i rage [0, log]. The etropy value is smaller whe the class distributio is pure i.e. belogs to oe class. The etropy value is larger whe the class distributio is impure i.e. class distributio is more eve. Hece comparig the value of etropy of some sample of packet header fields to that of aother sample of packet header fields provides a mechaism for detectig chages i the radomess. The etropy H (X) of a radom variable X with possible values x1, x2,..., x ad distributio of probabilities P = p 1, p 2,..., p with elemets, where 0 p i 1 ad pi = 1 ca be calculated as. H (X) = - P (x i ) log P (x i ) 2.2 Seder Autheticatio: With the help of give approach, we are able to protect IP Spoofed DDoS Attack. For that, we follow the followig steps: 1). Seder will sed Markig M to the receiver proxy server. Markig value M is a 24 bit Radom umber geerated by the source. Fig 2: Seder Autheticatio Process 2). Receiver Proxy server will receive that Markig value M ad sed Echo message to verify that markig value. 3). If markig value is correct ad if it is saded by a source the they will provide positive ackowledgemet else egative ackowledgemet. 28
3 4). If Receiver receive Positive ackowledgemet, the they will set ew markig digest to source associated with ew higher sequece umber (S,j+1,h(S j+1 M k(x))) to seder otherwise discard the request. 5). seder will put that 24 bit digest(h(s j+1 M k(x))) value to the optio field of the packet ad the sed packet. 2.3 Packet Trasmissio: 1). Suppose ay seder wats to sed a packet to a receiver firstly they will sed packet to edge Router without puttig ay markig value i a Idetificatio field. 2). Whe edge router receive packet first they examie the packet ad the check the idetificatio field. If packets come without ay mark the they will calculate the mark: Mark calculatio is doe i followig way: Suppose IP is a ip of edge router The h(e)= H(16Sip) ʘ T(16Sip) ʘ H(16Dip) ʘ T(16Dip) M = E (h(e) K(x)) Put it to the digest table associated with source IP. Else if already Mark i a packet, the router first decrypt the packet usig formula: P = D (M K(x)) The router will calculate h(e) by usig the Ip of source where the packet was arrived h (e)= H(16Sip) ʘ T(16Sip) ʘ H(16Dip) ʘ T(16Dip) The Check if (P==h (e)) Calculate h(e)by usig their ow IP address ad their eighbor IP address through which they wat to sed packet to particular destiatio. Repeat above Steps util Fial Destiatio reach. We are able to solve the problem that whe attacker has already filled the mark value ad by usig above strategy if we decrypt it, we will ever get their eighbor IP addresses (those addresses attacker forged ad treat himself as a eighbor). Fig 3: IP Packet format Table 1: Digest Table S.No. Source IP Digest Timestamp 1 X.X.X.X Dig 1 1 mi Dig 2 1 mi Dig 3 1 mi Dig 4 1 mi Dig 5 1 mi Dig 6 1 mi Dig 7 1 mi Dig 8 1 mi Dig 9 1 mi Dig 10 1 mi 2.4 DDoS Detectio: Idetify the ormal packet ad attack packet. For the purpose of idetificatio, we calculate TCP flow rate for each packet. TCP Flow Rate Calculatio: We kow that ormal user sed either 3 or 4 packet successively. After that they wait for some time for receiver reply ad the start sedig packet. But attacker s behavior is differet ad they wo t wait for such amout of time. They sed packets cotiuously without ay delay because if they do t do so the are ot able to perform attack. If they wated to perform like ormal user the they eed to acquire lakh of systems which is very tough for attacker as most of the systems i a etwork are secure. Systems check aget software registratio iformatio ad easily kow that it is a attack. So o the basis of above assumptio, we derive the formula for tcp flow rate: Suppose t p is a propagatio time ad B is Chael Badwidth. Normal user set maximum 3 or 4 packet cosecutively. After that he waits for t p time to get the reply from receiver. So Normal flow rate= (t p + t p )/4 = t p /2. Ad we kow that total capacity of chael is = B*t p. So attacker try to sed this much of packet to utilize badwidth fully. If S1, S2, S3, S4... are successive packets cotaiig same markig value. Calculate time duratio (TD) betwee successive packets If ((t p /2)< TD) The packets are ormal packets: Else Packets are attack packets: Detectio Procedure: 1). Calculate etropy o receiver proxy server: H (X) = - Where P (x i ) log P (x i ) P (x i ) = (Number of attack or ormal packet)/ Total No of packet. 29
4 3) Normalized Etropy NE = H/log 0 Table 2. Traced Data Where 0 = o of source ode i particular Time Iterval 4) If NE < threshold ( ) idetify suspected attack. Time Iterval Normal Packet M1 M2 M3 Attack Packet M1 M2 M3 Normalize Etropy 2.5 Simulatio ad Results: The simulatio was doe usig NS-2 simulator to evaluate the performace of our DDoS detectio algorithm with results obtaied from the experimet. We tested our aomaly detectio algorithm i liux (Ubutu 10) eviromet. This sectio itroduces the experimetal setup ad reports performace results. 1) Experimetal setup: Our simulatio icludes 3 source, 2 itermediate routers ad 1 destiatio odes as show i figure. The badwidth of legitimate traffic is set costat ad the simulatio of attack traffic is achieved by radomly geeratig may pairs of Costat Bit Rate (CBR) UDP flows i NS2. The legitimate user sed packets i a iterval of 0.20 secod ad the attacker starts sedig attack traffic after 0.0 secod frequetly. The experimet lasts for 2 secods. We traced umber of packets received i every 0.5 secod iterval. The traced data is show below: ) Etropy: H (X) = - P (x i ) log P (x i ) Where P (xi) = (Number of attack or ormal packet)/ Total No of packet. Calculatio: 0-0.5: P (M1) = - = (25/116)log(25/116) + (91/116) log(91/116) Fig 4: Scree shot of Setup We assume here our threshold value 1.1 because if some packets are reachig destiatio slowly due to etwork delay the we are also able to idetify attacker. P(M2) = P(M3) = NE = ( )/log3 = : Performace Evaluatio: To evaluate the performace of our algorithm, we plot the evaluatio graph which cotais time value i X-axis ad ormalize etropy value i Y-axis. With the help of graph show below, we are easily able to coclude that if we take threshold value1.1, it ca easily detect the attack. P(M1) = P(M2) = P(M3) = NE =
5 Fig 5: Effect of DDoS Attack B. IP Trackback: 1) If attack is there the first idetify the packets, get there source IP address ad mark value ad cotact to that seder who is sedig those packets to receiver. 2) Itermediate router matches those digest value to their digest table eateries ad get the IP address of particular seder router. 3) These process will cotiue util we reach the source of attack. 3.2 Actual Attacker Idetificatio: The attackers that we have idetified earlier are ot actual attackers but they are simple hosts who are occupied by the attacker i distributed eviromet by sedig ad executig aget software o their systems: To idetify the actual attacker, we use the IANA ad ISP. IANA: The Iteret Assiged Numbers Authority (IANA) is a departmet of ICANN resposible for coordiatig some of the key elemets that keep the Iteret ruig smoothly. Whilst the Iteret is reowed for beig a worldwide etwork free from cetral coordiatio, there is a techical eed for some key parts of the Iteret to be globally coordiated - ad this coordiatio role is udertake by IANA.Specifically, IANA allocates ad maitais uique codes ad umberig systems that are used i the techical stadards ("protocols") that drive the Iteret. IANA s various activities ca be broadly grouped i to three categories: 1) Domai Names: IANA maages the DNS root, the.it ad.arpa domais, ad a IDN practices resource. 2) Number Recourses: IANA coordiates the global pool of IP ad AS umbers, providig them to Regioal Iteret Registries. 3) Protocol Assigmet: Iteret protocols umberig systems are maaged by IANA i cojuctio with stadards bodies.table 3. IANA Table ISP Domai Name Number Resources IP AS Protocol Fig 6: Scree shot of packet drop A x.x.x.x w S 2.5 DDoS prevetio: To prevet DDoS attack if NE value is less the threshold (1.1), the simply drops all packets cotaiig the same path for particular time iterval. 3. ATTACKER IDENTIFICATION: 3.1 Spoofed Attacker Idetificatio I our approach, there are two ways to idetify the attacker. A. Router Etropy: 1) If attack is there i receiver proxy server, it meas NE < threshold ( ) The calculate etropy for each dowstream router to idetify suspected attack flow. 2) Those routers whose NE rate is less tha threshold we suspect it as attack router. 3) Further, calculate the NE rate for each Neighbor router of that attack router util we reach the source of attack. ISP 1 B y.y.y.y l T C z.z.z.z t U.... ISP ISP
6 ISP: It refers to a compay that provides Iteret services, icludig persoal ad busiess access to the Iteret. For a mothly fee, the service provider usually provides a software package, userame, password ad access phoe umber. Equipped with a modem, you ca the log o to the Iteret ad browse the World Wide Web ad USENET, ad sed ad receive . For broadbad access you typically receive the broadbad modem hardware or pay a mothly fee for this equipmet that is added to your ISP accout billig. IP Address User ame Table 4. ISP Table pass Logi time/date Software package PAC IP To idetify the actual attacker, we follow the followig steps: 1). Get the Iformatio from spoofed attacker related to aget software such as that software s istallig date ad time. 2). Cotact to spoofed attacker s ISP ad ask him about that software s istallatio date ad time ad they will provide iformatio about who is sedig that software. 3). Also through spoofed attacker s ISP we go to the IANA ad equiry them about that particular attacker s IP address. 4). IANA provide Iformatio related o which ISP that IP belogs. 5). Fially we reach attacker s ISP ad idetify the origial attacker. X.X.X.X ABC 123 2:23AM/1/1/12 P1 X.Y.Z.A Y.Y.Y.Y DEF 321 5:22AM/2/1/12 P2 Y.X.Y.A Z.Z.Z.Z GHI 136 3:40PM/2/1/12 P3 X.Z.T.A Fig 7: DDoS Attacker Idetificatio Proces 32
7 4. CONCLUSION I this paper we have proposed ad simulated a ew Markig ad etropy based approach for seder autheticatio ad DDoS detectio. We have also used the cocept of IANA ad ISP to idetify the actual attacker who is sittig behid forged systems. I fact, all the metioed requiremets have to be developed ad applied to curret iformatio techology eviromet. Otherwise, DDoS attack will remai a pereial threat to iformatio techology. 5. REFERENCES [1] Yag-Seo Choi, Ji-Tae Oh, Jog-Soo Jag,Jae-Cheol Ryou. Itegrated DDoS Attack Defese Ifrastructure for Effective Attack Prevetio. Iformatio Techology Covergece ad Services (ITCS), d Iteratioal Coferece, pages 1-6, 23 September [2] Yao Che, Shatau Da, Pulak Dhar, Abdulmotaleb El Saddik, ad Amiya Nayak Detectig ad Prevetig IPspoofed Distributed DoS Attacks Iteratioal Joural of Network Security,Vol.7, No.1,, pages 70-81, July [3] Tao Peg, Defedig Agaist Distributed Deial of Service Attacks IEEE [4] Mopari, I.B. ; Pukale, S.G. ; Dhore, M.L.. Detectio ad defece agaist DDoS attack with IP spoofig. Computig, Commuicatio ad Networkig, ICCC Iteratioal Coferece, pages 1 5, 24 February [5] Wei-Tsug Su ; Tzu-Chieh Li ; Chu-Yi Wu ; Jag- Pog Hsu ; Yau-Hwag Kuo. A O-lie DDoS Attack Trace back ad Mitigatio System Based o Network Performace Moitorig. Advaced Commuicatio Techology, ICACT th Iteratioal Coferece, pages , 22 April [6] Aru Raj Kumar, P. ad S. Selvakumar Distributed Deial-of-Service (DDoS) Threat i Collaborative Eviromet - A Survey o DDoS Attack Tools ad Trace back Mechaisms 2009 IEEE Iteratioal Advace Computig Coferece (IACC 2009), pages ,Patiala, Idia, 6-7 March [7] Jie Wag ; Pha, R.C.-W. ; Whitley, J.N. ; Parish, D.J. DDoS attacks traffic ad Flash Crowds traffic simulatio with a hardware test ceter platform. Iteret Security (WorldCIS), 2011 World Cogress o, pages 15-20, Feb [8] Jiere Cheg; Jiapig Yi ; Yu Liu ; Zhipig Cai ; Chegku Wu. DDoS Attack Detectio Usig IP Address Feature Iteractio Iteratioal Coferece o Itelliget Networkig ad Collaborative Systems, pages ,4-6 Nov [9] El Defrawy, K. ; Markopoulou, A. ; Argyraki, K. Optimal Allocatio of Filters agaist DDoS Attacks. Iformatio Theory ad Applicatios Workshop, 2007, pages , Ja Feb [10] Xiag Yag ; Li, Zhogwe. A Aalytical Model for DDoS Attacks ad Defese. Iteratioal Multi- Coferece o Computig i the Global Iformatio Techology., page 66,Aug [11] Walei Zhou. Keyote III: Detectio ad Traceback of DDoS attacks. 8th IEEE Iteratioal Coferece o Computer ad Iformatio Techology, page 3,8-11 July [12] Thig, V. ; Sloma, M. ; Dulay, N. Network domai etry poit /path determiatio for DDoS attacks. Network Operatios ad Maagemet Symposium, NOMS IEEE, pages 57-64, 7-11 April [13] Shui Yu ad Walei Zhou. Etropy-Based Collaborative Detectio of DDOS Attacks o Commuity Networks Sixth Aual IEEE Iteratioal Coferece o Pervasive Computig ad Commuicatios, pages ,17-21 March ABOUT AUTHOR: S. K. Jea: was bor i 28April, He received his Ph.D. from Idia Istitute of Techology, Bombay ad M.tech from Idia Istitute of Techology, Kharagpur. He has joied Natioal Istitute of Techology as Professor i the Departmet of Computer Sciece ad Egieerig i 2002.He has more tha 70 publicatios i Iteratioal Jourals ad cofereces. His research areas of Iterest are Database Egieerig, Distributed Computig, Parallel algorithm, Iformatio Security ad Data Compressio. Brajesh Kashyap: was bor i 15 Ja He is pursuig his M. Tech i Iformatio Security(CSE) from Natioal Istitute of Techology, Rourkela ad B.E. i Computer Sciece & Egieerig from Govt Egg College Bilaspur i 2010.He is selected as a Software Egieer i IBM Pvt.Ltd. 33
AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING
AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia [email protected], [email protected] ABSTRACT: Grid computig is
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
Domain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues
Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio
Domain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
BaanERP. BaanERP Windows Client Installation Guide
BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
June 3, 1999. Voice over IP
Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig
Professional Networking
Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing
World Applied Scieces Joural 23 (11): 1418-1424, 2013 ISSN 1818-4952 IDOSI Publicatios, 2013 DOI: 10.5829/idosi.wasj.2013.23.11.950 DDoS Verificatio ad Attack Packet Droppig Algorithm i Cloud Computig
DDoS attacks defence strategies based on nonparametric CUSUM algorithm
Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,
In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008
I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces
Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu
Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio
An Adaptive Method for Source-end Detection of Pulsing DoS Attacks
, pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,
Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor
iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous
Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
ODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
Domain 1: Configuring Domain Name System (DNS) for Active Directory
Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more
The Canadian Council of Professional Engineers
The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig
INVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
Handling. Collection Calls
Hadlig the Collectio Calls We do everythig we ca to stop collectio calls; however, i the early part of our represetatio, you ca expect some of these calls to cotiue. We uderstad that the first few moths
DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur
Chapter 6: Variance, the law of large numbers and the Monte-Carlo method
Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value
Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot
QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as
ContactPro Desktop for Multi-Media Contact Center
CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers
Output Analysis (2, Chapters 10 &11 Law)
B. Maddah ENMG 6 Simulatio 05/0/07 Output Aalysis (, Chapters 10 &11 Law) Comparig alterative system cofiguratio Sice the output of a simulatio is radom, the comparig differet systems via simulatio should
Radio Dispatch Systems
Radio Dispatch Systems ZETRON DISPATCH SOLUTIONS: AT THE CENTER OF YOUR CRITICAL OPERATIONS Your dispatch system is the ceterpoit through which your key operatios are coordiated ad cotrolled. That s why
Determining the sample size
Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors
IT Support. 020 8269 6878 n www.premierchoiceinternet.com n [email protected]. 30 Day FREE Trial. IT Support from 8p/user
IT Support IT Support Premier Choice Iteret has bee providig reliable, proactive & affordable IT Support solutios to compaies based i Lodo ad the South East of Eglad sice 2002. Our goal is to provide our
Confidence Intervals for One Mean
Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a
Ethernet Option Board
Etheret Optio Board Assembly ad Iitializatio Guide for Addig Etheret Commuicatios to a ADP etime Timeclock Documet Part Number: 470552-00 Documet Revisio: B The iformatio i this documet is subject to chage
GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS
GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS I the sprig of 2008, Stadig Together agaist Domestic Violece carried out a piece of collaborative work o domestic violece
The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval
1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca
Measures of Spread and Boxplots Discrete Math, Section 9.4
Measures of Spread ad Boxplots Discrete Math, Sectio 9.4 We start with a example: Example 1: Comparig Mea ad Media Compute the mea ad media of each data set: S 1 = {4, 6, 8, 10, 1, 14, 16} S = {4, 7, 9,
FUEL / VEHICLE TRACKING UNIT GPS tracking and fuel monitoring solution providers
FUEL / VEHICLE TRACKING UNIT GPS trackig ad fuel moitorig solutio providers fuel moitorig ow olie.. Fu ckig el Tra ow o lie www.fueltracksidia.com 20 Chael GPS Receiver GSM/GPRS Commuicatio PRODUCT FEATURES
Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)
Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02
France caters to innovative companies and offers the best research tax credit in Europe
1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public
Vulnerability test system for SIP network elements
Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic
Protecting Content Distribution Networks from Denial of Service Attacks
Protectig Cotet Distributio Networks from Deial of Service Attacks Kag-Wo Lee, Suresh Chari, Aees Shaikh, Sambit Sahu, Pau-Che Cheg IBM T. J. Watso Research Ceter Hawthore, NY 10532 Abstract I this paper,
1 Computing the Standard Deviation of Sample Means
Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.
3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions
3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN
Information about Bankruptcy
Iformatio about Bakruptcy Isolvecy Service of Irelad Seirbhís Dócmhaieachta a héirea Isolvecy Service of Irelad Seirbhís Dócmhaieachta a héirea What is the? The Isolvecy Service of Irelad () is a idepedet
Advanced Protection for Web Services
RealSetry TM SSL overview Advaced Protectio for Web Services SSL Accelerator Itrusio Detectio System Reverse Proxy Applicatio-Firewall Web services deploymet The pricipal reasos which delay the deploymet
Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics
Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to
Hypothesis testing. Null and alternative hypotheses
Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate
Lecture 2: Karger s Min Cut Algorithm
priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.
Did you know that houses with CCTV are 90% less likely to be burgled? Yale now offer a range of Easy Fit CCTV systems
Easy Fit CCTV Rage Did you kow that houses with CCTV are 90% less likely to be burgled? Yale ow offer a rage of Easy Fit CCTV systems Protect your premises wherever you are with our ew rage of CCTV systems,
hp calculators HP 12C Statistics - average and standard deviation Average and standard deviation concepts HP12C average and standard deviation
HP 1C Statistics - average ad stadard deviatio Average ad stadard deviatio cocepts HP1C average ad stadard deviatio Practice calculatig averages ad stadard deviatios with oe or two variables HP 1C Statistics
QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy
QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES
SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,
.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1
Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig
Capacity of Wireless Networks with Heterogeneous Traffic
Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata
FortiGuard Fortinet s Global Security Research and Protection
SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft
How to set up your GMC Online account
How to set up your GMC Olie accout Mai title Itroductio GMC Olie is a secure part of our website that allows you to maage your registratio with us. Over 100,000 doctors already use GMC Olie. We wat every
Evaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
Consider these sobering statistics
Idetity Theft is a form of fraud or Idetity theft cotiues to icrease every year ad has impacted millios of Americas. cheatig of aother perso s idetity i which someoe preteds to be someoe else by assumig
Institute of Actuaries of India Subject CT1 Financial Mathematics
Istitute of Actuaries of Idia Subject CT1 Fiacial Mathematics For 2014 Examiatios Subject CT1 Fiacial Mathematics Core Techical Aim The aim of the Fiacial Mathematics subject is to provide a groudig i
E-Plex Enterprise Access Control System
Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet
HCL Dynamic Spiking Protocol
ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
15.075 Exam 3. Instructor: Cynthia Rudin TA: Dimitrios Bisias. November 22, 2011
15.075 Exam 3 Istructor: Cythia Rudi TA: Dimitrios Bisias November 22, 2011 Gradig is based o demostratio of coceptual uderstadig, so you eed to show all of your work. Problem 1 A compay makes high-defiitio
Engineering Data Management
BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package
Basic Current Account
Curret Accouts Basic Curret Accout Applicatio form Please fill i the form usig BLOCK CAPITALS ad black ik. Tick ay boxes which apply. Satader is able to provide literature i alterative formats. The formats
client communication
CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.
5 Boolean Decision Trees (February 11)
5 Boolea Decisio Trees (February 11) 5.1 Graph Coectivity Suppose we are give a udirected graph G, represeted as a boolea adjacecy matrix = (a ij ), where a ij = 1 if ad oly if vertices i ad j are coected
Properties of MLE: consistency, asymptotic normality. Fisher information.
Lecture 3 Properties of MLE: cosistecy, asymptotic ormality. Fisher iformatio. I this sectio we will try to uderstad why MLEs are good. Let us recall two facts from probability that we be used ofte throughout
Center, Spread, and Shape in Inference: Claims, Caveats, and Insights
Ceter, Spread, ad Shape i Iferece: Claims, Caveats, ad Isights Dr. Nacy Pfeig (Uiversity of Pittsburgh) AMATYC November 2008 Prelimiary Activities 1. I would like to produce a iterval estimate for the
Analyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
CCH Accountants Starter Pack
CCH Accoutats Starter Pack We may be a bit smaller, but fudametally we re o differet to ay other accoutig practice. Util ow, smaller firms have faced a stark choice: Buy cheaply, kowig that the practice
I. Chi-squared Distributions
1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.
1. C. The formula for the confidence interval for a population mean is: x t, which was
s 1. C. The formula for the cofidece iterval for a populatio mea is: x t, which was based o the sample Mea. So, x is guarateed to be i the iterval you form.. D. Use the rule : p-value
Virtual Queuing: An Efficient Algorithm for Bandwidth Management in Resilient Packet Rings
Virtual Queuig: A Efficiet Algorithm for Badwidth Maagemet i Resiliet Packet Rigs Arash Shokrai, Siavash Khorsadi, Ioais Lambadaris, ad Lutful Kha Broadbad Network Laboratory Departmet of Systems ad Computer
Message Exchange in the Utility Market Using SAP for Utilities. Point of View by Marc Metz and Maarten Vriesema
Eergy, Utilities ad Chemicals the way we see it Message Exchage i the Utility Market Usig SAP for Utilities Poit of View by Marc Metz ad Maarte Vriesema Itroductio Liberalisatio of utility markets has
CS100: Introduction to Computer Science
Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of
ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS. Workshop Satellitenkommunikation in Deutschland DLR / Köln-Porz 27. - 28.
ORBCOMM - System Status, Evolutio ad Applicatios 1 ORBCOMM - SYSTEM STATUS, EVOLUTION AND APPLICATIONS M. Kassebom B. Peé C. Tobeh I. Kalis E. Pütz J.J. Stolte R.L. Burdett OHB-System AG Uiversitätsallee
Securing your business
Iteratioal Chamber of Commerce The world busiess orgaizatio Securig your busiess A compaio for small or etrepreeurial compaies to the 2002 OECD Guidelies for the security of etworks ad iformatio systems:
where: T = number of years of cash flow in investment's life n = the year in which the cash flow X n i = IRR = the internal rate of return
EVALUATING ALTERNATIVE CAPITAL INVESTMENT PROGRAMS By Ke D. Duft, Extesio Ecoomist I the March 98 issue of this publicatio we reviewed the procedure by which a capital ivestmet project was assessed. The
Amendments to employer debt Regulations
March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios
Pre-Suit Collection Strategies
Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process
Incremental calculation of weighted mean and variance
Icremetal calculatio of weighted mea ad variace Toy Fich [email protected] [email protected] Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically
