DDoS attacks defence strategies based on nonparametric CUSUM algorithm
|
|
|
- Dominick Stevens
- 10 years ago
- Views:
Transcription
1 Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg, Chia 2 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg, Chia 3 YaCheg juior high school, No.199 The liberatio of south Road, Yacheg, Chia Received 1 September 2014, I the Iteret etwork attacks, distributed deial of service (DDoS) has aroused world attetio because of its destructive power. It seems particularly difficult to defed agaist DDoS attacks for they have characteristics such as abrupt attacks, attackig host computer i a very wide distributio, ad so o. To guard agaist etwork security ad defed distributed deial of service attacks (DDoS), research should begi from the detectio of DDos attacks. O the basis of deep research of DDoS attacks, the thesis summarizes ad aalyses the mechaism ad priciples of itrusio detectio firstly. This paper starts with the aalysis of the priciple of DDoS attacks. Followed by iquiry ad aalysis of data packet of DDoS attacks detectio, the thesis gives out the computatio method for detectig DDos attacks based o Flow Coectio desity ad presets a defedig model agaist DDos attacks based o the temporal series of Flow Coectio Codesity (Desity). With the defedig module based o the temporal series of Flow Coectio Codesity (Desity), data packet ca be effectively filtered so that DDos attacks ca be effectively defeded ad preveted. Fially, experimets prove that the module ca effectively filter data packet from etwork. Keywords: etwork security, distributed deial of service, flow coectio desity, time series, defece strategies 1 Itroductio With the etwork comig ito the Iteret era, etwork security problems appear, of which distributed deial of service attack has great impact o the etwork security. Distributed Deial of Service, referred to as DDoS, is a kid of deial of service attacks which is offesive ad destructive. At preset, the Iteret is everywhere, ad DDoS attacks lauched by hackers are everywhere uless we discoect the etwork. Distributed deial of service maily target host ode, switch, routers ad other etwork equipmet. Tools used by hackers for distributed deial of service are easy to develop. Hackers coduct diversified attacks secretly ad the attackig techiques improve day after day which ca cause devastatig damage eve immeasurable losses. DDoS is widely applied by hackers because it is easy to implemet, difficult to prevet ad of great harm. I February 2000, uidetified hackers lauched a huge-scale distributed deial of service, attackig a series of worldreowed sites such as ebay, yahoo, Microsoft, MSN, Amazo, ad so o, ad causig umerous system paralyses for several days ad sigificat social ecoomy loss which mouted to billios of dollars. I early 2003, hackers, who will do whatever they ca to cause damage, used a ew techology of distributed deial of service attacks to damage the Iteret i a wide rage icludig North America, Europe ad Asia. This ot oly caused hudreds of thousads of computers early paralyzed ad early oe hudred thousad etwork servers uable to ru, but also resulted i icalculable ecoomic losses ad adverse social impact. As for Chia, o May 19, 2009, DNS resolutio system of Chia Telecom was attacked by a large flow of DDoS, causig a massive etwork paralysis i telecommuicatios etwork of six souther provices ad thousads of web services termiatio [1]. Distributed deial of service, referred to as DDos, is of destructive power. For a aalogy, how ca you get through whe people call you at the same time? Ad DDos attacks are like that. DDos maily take advatage of the loopholes ad shortcomigs of etwork trasport protocol - TCP/IP protocol. It chooses computers with scattered etwork locatios as its attackig host to sed large amouts of data to the target host. This will ot oly cause the resources or etwork badwidth of attacked hosts cosume a lot, but also that the attacked host is so overloaded ad paralyzed that it will stop providig ormal etwork services. As a result, legitimate users caot get access to or use the resources, or ca the attacked host provide ay services. Schematic diagram for DDos attackig priciple is show i Figure 1. * Correspodig author [email protected] 121
2 misjudgemet rate of packet icrease, resultig i a loss of legitimate data iformatio. Curretly, the most typical source-side defece strategy is D-WARD model proposed by Jelea Mirkovic ad others [3]. 2.2 THE NETWORK DEFENCE IN THE MIDDLE LAYER FIGURE1 DDoS attack priciple 2 Commo DDoS defece strategies aalysis The DDoS attacks o the Iteret are becomig icreasigly fierce ad will cotiually itesify. Oly i 2013, DDoS attacks have emerged i a edless stream i the world, ad it seems difficult to measure the amout ad size by usig statistics. A ew IDC study foud that prevetio solutio market for DDoS attacks ad DoS attacks is expected to grow 18.2 percet from 2012 to 2017 ad related spedig will reach $870 millio [2]. The substatial harm of DDOS attacks is forcig people to defed agaist DDOS attacks to miimize the loss. To defed agaist DDOS attacks, people have explored a variety of DDOS defece strategies from various prospective based o the priciple of DDoS attacks. From the DDoS attack priciple i Figure1, we ca see that core router of the attacked host is the proxy host ad it forwards data through the itermediate etwork routers. Thus, whe aalysig distributed deial of service, we ca divide the whole etwork ito three parts, ivolvig the attackig ed of the etwork, the middle layer ad the attacked ed. Correspodigly, DDoS attack defece strategies are also divided ito the attackig ed defece, the middle layer defece ad the attacked ed defece. 2.1 THE NET WORK DEFENCE IN THE ATTACKING END I this process, defece ode is deployed o the igress router of the etwork, the the ode couts ad aalyses the flow based o packet iformatio, which is moitored by the igress router. Fially, through repeated comparisos betwee statistics ad the ormal flow model, dagerous abormal packets will be filtered out. I this way, we caot oly track iformatio about the attackig ed, but also to avoid further damage from outside to the etwork. There are of course some shortcomigs i the attackig ed, for istace, if the attackig flow i the attackig ed does ot coverge, it will be difficult to establish ormal flow model, which will cause Curretly, the etwork defece i the middle layer maily depeds o itrusio detectio systems o the etwork. Itrusio detectio systems detect attacks by capturig ad aalysig etwork packets. If the etwork is attacked, it will take measures to correspodigly limit the rate of the attackig data flow. The beefit of this defece strategy is that oce a attack is detected, you ca quickly suppress the traffic, thus greatly reducig the harm to the attacked ed. Disadvatage of etwork defece strategies i the middle layer is that the data flow o the middle tier etwork router is large which will ot oly cosume more resources, but also make it difficult to decide whether the data flow is legitimate, ultimately causig damage to legitimate etwork traffic, ad eve to the performace of the whole etwork. 2.3 THE NETWORK DEFENCE IN THE ATTACKED END The attacked ed is direct victim of the DDoS attacks, ad it is most immediate, most accurate ad most effective to deploy defece system i the attacked ed. Thus, it is effective to deploy defece system i the attacked ed to defed agaist DDoS attacks, which is the outstadig advatage of attack ed defece. Of course, there are some shortcomigs i the attacked ed defece strategy. For example, the attacked ed is the mai attackig target. If the attack is fierce, resultig i paralysis i storage ad processig system o the defece ode, it may ot be able to respod to the defece system deploymet to locate the positio of the fiercest attack, which will lead to limited respose to attacks. To balace its advatages ad disadvatages, it is a good choice to deploy the defece system i the ed etwork. The challege is to fid a good defece strategy, makig the DDoS attacks dysfuctioal so as to defed agaist DDoS attacks ad to secure the attacked host. 3 DDoS attacks defece module ad strategies based o oparametric CUSUM algorithm To desig DDoS defece module based o oparametric CUSUM algorithm ad the make a better defesive strategies to effectively defed agaist DDoS attacks o the victim port. It is more timely ad accurate to detect DDoS attacks by coutig ad testig traffic of attacked port, so as to defed agaist DDoS attacks. 122
3 3.1 THE DEFENCE BASIS OF NETWORK TRANSMISSION The data trasmissio is carried out i the form of data packets o the etwork. I the Iteret, i order to overcome the heterogeeity of the etwork, ad to esure the correct data trasmissio, IP protocol defies a uified packet format, which is called a IP datagram. The structure is show i Figure 2. FIGURE 2 IP datagram structure TABLE 1 Iformatio collectio of IP data packets withi a uit time o a certai etwork Data packets Source IP address Destiatio IP address Destiatio port umber P0 s1 D1 port1 P1 s1 D1 port1 P3 s3 D2 port1 A s3 D1 port1 P4 s2 D2 port2 C s2 D2 port2 B s3 D2 port2 R s3 D2 port1 Through aalysis, we coclude that by comparig the same set of IP packets withi this etwork flow per uit time, relevat set of data packets are {p 0, p 1}, {p 4, C}, {p 3, R}. Accordig to the defiitio, i a time uit, the flow coectio desity is 3, because there are 3 relevat data packets collectio withi the time uit of the etwork. The, we ca decide whether the etwork traffic is ormal based o the flow coectio desity, so as to determie whether there is distributed deial of service attack. I the Iteret etwork, ay packet trasmissio, icludig that is attacked by DDoS, must be orgaized i the form of IP datagrams. IP datagram must idicate the specified data to be trasmitted, the IP address of the computer that seds datagrams ad that receives the datagram. Accordig to the priciple of DDoS attacks, DDoS attacks are carried out by a large umber of hosts that are geographically dispersed o the etwork, which sed plety of packets to attack the victim host. Therefore, we ca aalyse the source IP address, destiatio IP addresses ad port umbers of IP datagram that reaches computers. If large amouts of datagram are from several hosts that are i geographically dispersed etwork, the it is DDoS attack, which we should guard agaist. 3.2 FLOW CONNECTION DENSITY Firstly, i a certai time period, we itercept a collectio of idetical etwork data package that cotais the same port umber of the source address, destiatio port, ad destiatio port umber, ad this is called a flow coectio, ad the amout of the flow coectio i this period is called flow coectio desity. It ca be showed i the followig form. We assume that i uit time, the collectio of data packets withi etwork traffic is R = {p 1,, p i,,p M}, of which, collectio of related data packets is {R 1,R 2,,R N}, the we defie that i this etwork traffic, the flow coectio desity is the amout of related data packets collectio, that is N [4-5]. The we take the followig table as a example. Table 1 idicates the obtaied IP data packets collectio withi a uit of time o a certai etwork. 3.3 CALCULATION FOR IMPROVING FLOW CONNECTION DENSITY BASED ON NON- PARAMETRIC CUSUM ALGORITHM Through the study of o-parametric CUSUM algorithm [6-8], we ca better improve the calculatio method of flow coectio desity. We o loger cout the collectio of idetical etwork data packages i the uit time, but we calculate the added source IP address i a Δt time to get flow coectio desity. The we get a time series {Z}, which cosists of flow coectio desity sequeces withi multiple Δt time. The basic idea based o oparametric CUSUM algorithm to improve flow coectio desity ca be showed by the followig Equatios (1)-(3): Y 0, 0 Y ( Y Z ), 1 x (1) 0, x 0, (2) x, x 0 Y is the cumulatively positive value of Z, ad the decisio fuctios are: d N Y 1, 0, Y M, (3) Y M where the costat value of detectio threshold of DDoS is M, the fuctio d N(Y ) represets the judgmet result for M i a certai geeratig time. Through the judgmet result, we defie that, whe the result of fuctio d N(Y ) is 1, there are a large umber DDoS attacks; whe the result is 0, there are o DDoS attacks ad the etwork is ormal. 123
4 3.4 CALCULATION DDoS ATTACKS DEFENCE MODEL BASED ON NON-PARAMETRIC CUSUM ALGORITHM TO IMPROVE FLOW CONNECTION DENSITY The DDoS attacks defece model based o oparametric CUSUM algorithm to improve flow coectio desity cosists of three modules, respectively are acquisitio module, time series module ad filter module. Acquisitio module: I this module, IP data packets received by the host are collected i every certai time of t, the it comes to data format coversio accordig to required data format i time series module ad filter module ad the the data is trasmitted to the time series module ad filter module i differet levels. Time series module: I this module, we use the additioal received IP data packets withi a certai time of t to calculate the abstract flow coectio desity. The sed the fial judgmet result of fuctio d N(Y ), which is based o the judgmet result of Equatios (1), (2) ad (3) to the filter module by combiig with the time series of {Z} composed of flow coectio desity data received i previous time periods of (-1) t. Filter module: whether to receive or discard the data packets based o the data iformatio results from processig a data packet ad judgmet results of fuctio d N(Y ) passed from time series module. DDoS attacks defece model based o oparametric CUSUM algorithm to improve flow coectio desity is show as follows (Figure 3): levels. We use the data i time series module ad additioal received IP data packets to calculate the specific flow coectio desity. The we use the additioal collected source IP data packets withi a certai time of t i time series module to calculate the abstract flow coectio desity, ad calculate its cumulative positive value by combiig with the time series of {Z } composed of flow coectio desity data received i previous time periods of ( 1) Δt. The it will sed the fial judgmet result of fuctio d N(Y ), which is based o the judgmet result of Equatios (1)-(3) to the filter module. The filter module will compare the cumulative positive value with the threshold value, if the cumulative positive value is greater tha the threshold value, the it will decide to receive or discard the data packets based o the data packets iformatio i acquisitio module. We have coducted a series of experimets ad obtaied evidece for DDoS attacks defece model based o oparametric CUSUM algorithm to improve flow coectio desity. Accordig to the aalysis of theoretical ad experimetal value ad compariso betwee them, the error rate of the experimetal values is oly 3.618%. It is foud out that the wrog results are maily caused by the exteral factors such as idetificatio delays ad etwork oise. Of course, these exteral factors ca be resolved by a series of measures. As for idetificatio delay, we ca take proper meas of improvig the sesitivity of the system to reduce recogitio delays, thereby reducig the risk of errors. To sum up the experimetal results, we ca see that DDoS attacks defece model, based o oparametric CUSUM algorithm to improve flow coectio desity, ca effectively detect DDoS attacks ad properly filter out malicious attackig data packets, securig the ormal operatio of the host or etwork. 4 Coclusios FIGURE 3 DDoS attacks defece model based o oparametric CUSUM algorithm to improve flow coectio desity The mechaism of DDoS attacks defece model based o oparametric CUSUM algorithm to improve flow coectio desity is that, the system firstly obtais data withi a specified time i the acquisitio module, the the data packets received is aalysed, icludig source address, destiatio address ad specific port umber of the data packets. The it comes to data format coversio accordig to required data format i time series module ad filter module, ad the the data is trasmitted to the time series module ad IP packets filter module i differet This paper gives a itesive study of the operatio mode ad priciple of DDoS attacks, discusses the simple defece strategies agaist DDoS attacks. It proposes algorithm to detect DDoS attacks based o flow coectio desity accordig to characteristics of etwork data trasmissio ad DDoS attackig priciple. Fially, it gives DDoS attacks defece strategy based o the time series aalysis of flow coectio desity. Based o oparametric CUSUM algorithm, modules are decided to prevet DDoS, which ca lead to good defece strategies, defedig agaist DDoS attacks to a great extet. Refereces [1] Xu C 2012 Research ad implemetatio of DDoS detectig algorithm i applicatio layer Master thesis Chogqig uiversity: Chogqig Chia (i Chiese) [2] Yag Y 2014 Worries of DDoS attacks Joural of Chia educatio etwork 2014(01) 21-2 (i Chiese) [3] Qi Y, Tag M, Zhag M 2014 Mass customizatio i flat orgaizatio: The mediatig role of supply chai plaig ad corporatio coordiatio Joural of Applied Research ad Techology 12(2) [4] Ya C 2009 Research ad implemetatio of DDoS attackig detectio ad defece strategies based o flow coectio desity Master thesis Suzhou Uiversity Suzhou Chia (i Chiese) 124
5 [5] Zhag C, Huag L, Zhao Z 2013 Research o combiatio forecast of port cargo throughput based o time series ad causality aalysis Joural of Idustrial Egieerig ad Maagemet 6(1) [6] Takada H, Hofma U 2004 Applicatio ad Aalyses of Cumulative Sum to Detect Highly Distributed Deial of Service Attacks usig Differet Attack Traffic Patters.Iter-domai QoS Newsletter 2004(7) [7] Xiog K, Zhag Y, Zhag Z, Wag S, Zhog Z 2014 PA-NEMO: Proxy mobile IPv6-aided etwork mobility maagemet scheme for 6LoWPAN Elektroika ir Elektrotechika 20(3) [8] Cai X 2006 Based o the etwork data acquisitio ad sequece aalysis of the eviromet of the DDoS attack Master thesis, Najig uiversity of posts ad telecommuicatios Naji Chia (i Chiese) Authors Chaghog Ya, bor i May, 1980, Yacheg, Jiagsu Provice, P.R. Chia Curret positio, grades: lecturer. Uiversity studies: MSc i Computer Sciece ad Techology at Suzhou Uiversity. Scietific iterests: itermediate lecturer, itelliget cotrol, etwork security, iformatio processig, remote sesig remote sesig. Publicatios: more tha 19 papers. Experiece: teachig experiece of 12 years, 3 scietific research projects. Qi Dog, bor i October, 1974, Yacheg, Jiagsu Provice, P.R. Chia Curret positio, grades: associate professor. Uiversity studies: MSc i Computer Sciece ad Techology at Najig Uiversity of Sciece ad Techology. Scietific iterests: itermediate lecturer, itelliget cotrol, etwork security, iformatio processig. Publicatios: more tha 20 papers. Experiece: teachig experiece of 18 years, 10 scietific research projects. Hog Wag, bor i October, 1979, Yacheg, Jiagsu Provice, P.R. Chia Curret positio, grades: lecturer at the School of Yacheg, Chia. Uiversity studies: BSc i Mathematics at Yua Uiversity i Chia. MSc at Qighai Normal Uiversity i Chia. Scietific iterests: educatio maagemet, mathematics educatio, etwork security, iformatio processig. Publicatios: 10 papers. Experiece: Teachig experiece of 14 years, 2 scietific research projects. 125
Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks
Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.
Modified Line Search Method for Global Optimization
Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o
Baan Service Master Data Management
Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :
June 3, 1999. Voice over IP
Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig
CHAPTER 3 THE TIME VALUE OF MONEY
CHAPTER 3 THE TIME VALUE OF MONEY OVERVIEW A dollar i the had today is worth more tha a dollar to be received i the future because, if you had it ow, you could ivest that dollar ad ear iterest. Of all
Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks
Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio
Evaluating Model for B2C E- commerce Enterprise Development Based on DEA
, pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of
Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval
1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca
Reliability Analysis in HPC clusters
Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab
Domain 1 Components of the Cisco Unified Communications Architecture
Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS
COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat
Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)
Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02
ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC
8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical
Domain 1: Designing a SQL Server Instance and a Database Solution
Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a
An Adaptive Method for Source-end Detection of Pulsing DoS Attacks
, pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,
Automatic Tuning for FOREX Trading System Using Fuzzy Time Series
utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which
Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:
Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network
Clustering Algorithm Analysis of Web Users with Dissimilarity and SOM Neural Networks
JONAL OF SOFTWARE, VOL. 7, NO., NOVEMBER 533 Clusterig Algorithm Aalysis of Web Users with Dissimilarity ad SOM Neal Networks Xiao Qiag School of Ecoomics ad maagemet, Lazhou Jiaotog Uiversity, Lazhou;
Research Article Sign Data Derivative Recovery
Iteratioal Scholarly Research Network ISRN Applied Mathematics Volume 0, Article ID 63070, 7 pages doi:0.540/0/63070 Research Article Sig Data Derivative Recovery L. M. Housto, G. A. Glass, ad A. D. Dymikov
Convention Paper 6764
Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or
Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out
FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles
Analyzing Longitudinal Data from Complex Surveys Using SUDAAN
Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical
AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING
AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia [email protected], [email protected] ABSTRACT: Grid computig is
Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites
Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a
France caters to innovative companies and offers the best research tax credit in Europe
1/5 The Frech Govermet has three objectives : > improve Frace s fiscal competitiveess > cosolidate R&D activities > make Frace a attractive coutry for iovatio Tax icetives have become a key elemet of public
Journal of Chemical and Pharmaceutical Research, 2015, 7(3):1184-1190. Research Article
Available olie www.ocpr.com Joural of Chemical ad Pharmaceutical Research, 15, 7(3):1184-119 Research Article ISSN : 975-7384 CODEN(USA) : JCPRC5 Iformatio systems' buildig of small ad medium eterprises
(VCP-310) 1-800-418-6789
Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.
LECTURE 13: Cross-validation
LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M
ODBC. Getting Started With Sage Timberline Office ODBC
ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.
Study on the application of the software phase-locked loop in tracking and filtering of pulse signal
Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College
The analysis of the Cournot oligopoly model considering the subjective motive in the strategy selection
The aalysis of the Courot oligopoly model cosiderig the subjective motive i the strategy selectio Shigehito Furuyama Teruhisa Nakai Departmet of Systems Maagemet Egieerig Faculty of Egieerig Kasai Uiversity
Research Article An Approach to Evaluating Computer Network Security with Intuitionistic Trapezoidal Fuzzy Information
Joural of Cotrol Sciece ad Egieerig, Article ID 604920, 4 pages http://dx.doi.org/10.1155/2014/604920 Research Article A Approach to Evaluatig Computer Network Security with Ituitioistic Trapezoidal Fuzzy
Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation
Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur
Research Method (I) --Knowledge on Sampling (Simple Random Sampling)
Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact
DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2
Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,
INVESTMENT PERFORMANCE COUNCIL (IPC) Guidance Statement on Calculation Methodology
Adoptio Date: 4 March 2004 Effective Date: 1 Jue 2004 Retroactive Applicatio: No Public Commet Period: Aug Nov 2002 INVESTMENT PERFORMANCE COUNCIL (IPC) Preface Guidace Statemet o Calculatio Methodology
Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT
Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee
Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY
Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,
HCL Dynamic Spiking Protocol
ELI LILLY AND COMPANY TIPPECANOE LABORATORIES LAFAYETTE, IN Revisio 2.0 TABLE OF CONTENTS REVISION HISTORY... 2. REVISION.0... 2.2 REVISION 2.0... 2 2 OVERVIEW... 3 3 DEFINITIONS... 5 4 EQUIPMENT... 7
The Canadian Council of Professional Engineers
The Caadia Coucil of Professioal Egieers Providig leadership which advaces the quality of life through the creative, resposible ad progressive applicatio of egieerig priciples i a global cotext Egieerig
INVESTMENT PERFORMANCE COUNCIL (IPC)
INVESTMENT PEFOMANCE COUNCIL (IPC) INVITATION TO COMMENT: Global Ivestmet Performace Stadards (GIPS ) Guidace Statemet o Calculatio Methodology The Associatio for Ivestmet Maagemet ad esearch (AIM) seeks
A guide to School Employees' Well-Being
A guide to School Employees' Well-Beig Backgroud The public school systems i the Uited States employ more tha 6.7 millio people. This large workforce is charged with oe of the atio s critical tasks to
.04. This means $1000 is multiplied by 1.02 five times, once for each of the remaining sixmonth
Questio 1: What is a ordiary auity? Let s look at a ordiary auity that is certai ad simple. By this, we mea a auity over a fixed term whose paymet period matches the iterest coversio period. Additioally,
3G Security VoIP Wi-Fi IP Telephony Routing/Switching Unified Communications. NetVanta. Business Networking Solutions
3G Security VoIP Wi-Fi IP Telephoy Routig/Switchig Uified Commuicatios NetVata Busiess Networkig Solutios Opportuity to lower Total Cost of Owership ad improve Retur o Ivestmet The ADTRAN Advatage ADTRAN
Patentability of Computer Software and Business Methods
WIPO-MOST Itermediate Traiig Course o Practical Itellectual Property Issues i Busiess November 10 to 14, 2003 Patetability of Computer Software ad Busiess Methods Tomoko Miyamoto Patet Law Sectio Patet
Installment Joint Life Insurance Actuarial Models with the Stochastic Interest Rate
Iteratioal Coferece o Maagemet Sciece ad Maagemet Iovatio (MSMI 4) Istallmet Joit Life Isurace ctuarial Models with the Stochastic Iterest Rate Nia-Nia JI a,*, Yue LI, Dog-Hui WNG College of Sciece, Harbi
Non-life insurance mathematics. Nils F. Haavardsson, University of Oslo and DNB Skadeforsikring
No-life isurace mathematics Nils F. Haavardsso, Uiversity of Oslo ad DNB Skadeforsikrig Mai issues so far Why does isurace work? How is risk premium defied ad why is it importat? How ca claim frequecy
Valuing Firms in Distress
Valuig Firms i Distress Aswath Damodara http://www.damodara.com Aswath Damodara 1 The Goig Cocer Assumptio Traditioal valuatio techiques are built o the assumptio of a goig cocer, I.e., a firm that has
NATIONAL SENIOR CERTIFICATE GRADE 12
NATIONAL SENIOR CERTIFICATE GRADE MATHEMATICS P EXEMPLAR 04 MARKS: 50 TIME: 3 hours This questio paper cosists of 8 pages ad iformatio sheet. Please tur over Mathematics/P DBE/04 NSC Grade Eemplar INSTRUCTIONS
RISK TRANSFER FOR DESIGN-BUILD TEAMS
WILLIS CONSTRUCTION PRACTICE I-BEAM Jauary 2010 www.willis.com RISK TRANSFER FOR DESIGN-BUILD TEAMS Desig-builD work is icreasig each quarter. cosequetly, we are fieldig more iquiries from cliets regardig
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM
PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics
*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.
Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.
1. Introduction. Scheduling Theory
. Itroductio. Itroductio As a idepedet brach of Operatioal Research, Schedulig Theory appeared i the begiig of the 50s. I additio to computer systems ad maufacturig, schedulig theory ca be applied to may
Systems Design Project: Indoor Location of Wireless Devices
Systems Desig Project: Idoor Locatio of Wireless Devices Prepared By: Bria Murphy Seior Systems Sciece ad Egieerig Washigto Uiversity i St. Louis Phoe: (805) 698-5295 Email: [email protected] Supervised
Cantilever Beam Experiment
Mechaical Egieerig Departmet Uiversity of Massachusetts Lowell Catilever Beam Experimet Backgroud A disk drive maufacturer is redesigig several disk drive armature mechaisms. This is the result of evaluatio
Introducing Your New Wells Fargo Trust and Investment Statement. Your Account Information Simply Stated.
Itroducig Your New Wells Fargo Trust ad Ivestmet Statemet. Your Accout Iformatio Simply Stated. We are pleased to itroduce your ew easy-to-read statemet. It provides a overview of your accout ad a complete
Flood Emergency Response Plan
Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy
Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu
Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio
iprox sensors iprox inductive sensors iprox programming tools ProxView programming software iprox the world s most versatile proximity sensor
iprox sesors iprox iductive sesors iprox programmig tools ProxView programmig software iprox the world s most versatile proximity sesor The world s most versatile proximity sesor Eato s iproxe is syoymous
LEASE-PURCHASE DECISION
Public Procuremet Practice STANDARD The decisio to lease or purchase should be cosidered o a case-by case evaluatio of comparative costs ad other factors. 1 Procuremet should coduct a cost/ beefit aalysis
Agenda. Outsourcing and Globalization in Software Development. Outsourcing. Outsourcing here to stay. Outsourcing Alternatives
Outsourcig ad Globalizatio i Software Developmet Jacques Crocker UW CSE Alumi 2003 [email protected] Ageda Itroductio The Outsourcig Pheomeo Leadig Offshore Projects Maagig Customers Offshore Developmet
On the Capacity of Hybrid Wireless Networks
O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,
CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION
www.arpapress.com/volumes/vol8issue2/ijrras_8_2_04.pdf CONTROL CHART BASED ON A MULTIPLICATIVE-BINOMIAL DISTRIBUTION Elsayed A. E. Habib Departmet of Statistics ad Mathematics, Faculty of Commerce, Beha
Data Analysis and Statistical Behaviors of Stock Market Fluctuations
44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:
QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy
QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their
Subject CT5 Contingencies Core Technical Syllabus
Subject CT5 Cotigecies Core Techical Syllabus for the 2015 exams 1 Jue 2014 Aim The aim of the Cotigecies subject is to provide a groudig i the mathematical techiques which ca be used to model ad value
Infinite Sequences and Series
CHAPTER 4 Ifiite Sequeces ad Series 4.1. Sequeces A sequece is a ifiite ordered list of umbers, for example the sequece of odd positive itegers: 1, 3, 5, 7, 9, 11, 13, 15, 17, 19, 21, 23, 25, 27, 29...
Chatpun Khamyat Department of Industrial Engineering, Kasetsart University, Bangkok, Thailand [email protected]
SOLVING THE OIL DELIVERY TRUCKS ROUTING PROBLEM WITH MODIFY MULTI-TRAVELING SALESMAN PROBLEM APPROACH CASE STUDY: THE SME'S OIL LOGISTIC COMPANY IN BANGKOK THAILAND Chatpu Khamyat Departmet of Idustrial
SYSTEM INFO. MDK - Multifunctional Digital Communications System. Efficient Solutions for Information and Safety
Commuicatios Systems for Itercom, PA, Emergecy Call ad Telecommuicatios MDK - Multifuctioal Digital Commuicatios System SYSTEM INFO ms NEUMANN ELEKTRONIK GmbH Efficiet Solutios for Iformatio ad Safety
Open Access Non-operating Urban Infrastructure Project Management Maturity Model on Agent Construction Based on the Evolutionary Algorithm
Sed Orders for Reprits to [email protected] 112 The Ope Costructio ad Buildig Techology Joural, 2015, 9, 112-116 Ope Access No-operatig Urba Ifrastructure Project Maagemet Maturity Model o Aget Costructio
Comparative Analysis of Round Robin VM Load Balancing With Modified Round Robin VM Load Balancing Algorithms in Cloud Computing
Iteratioal Joural of Egieerig, Maagemet & Scieces (IJEMS) Comparative Aalysis of Roud Robi Balacig With Modified Roud Robi Balacig s i Cloud Computig Areeba Samee, D.K Budhwat Abstract Cloud computig is
Basic Measurement Issues. Sampling Theory and Analog-to-Digital Conversion
Theory ad Aalog-to-Digital Coversio Itroductio/Defiitios Aalog-to-digital coversio Rate Frequecy Aalysis Basic Measuremet Issues Reliability the extet to which a measuremet procedure yields the same results
Document Control Solutions
Documet Cotrol Solutios State of the art software The beefits of Assai Assai Software Services provides leadig edge Documet Cotrol ad Maagemet System software for oil ad gas, egieerig ad costructio. AssaiDCMS
Agricultural & Agri-Business Grant Opportunities. Presented By: Connie Miner Grant Consultant
Agricultural & Agri-Busiess Grat Opportuities Preseted By: Coie Mier Grat Cosultat NYS Dept. of Agriculture & Markets: Overview of eligibility requiremets: Agricultural & Farmlad Protectio Boards Erie
Research Article Real-Time Detection of Application-Layer DDoS Attack Using Time Series Analysis
Cotrol Sciece ad Egieerig Volume 2013, Article ID 821315, 6 pages http://dx.doi.org/10.1155/2013/821315 Research Article Real-Time Detectio of Applicatio-Layer DDoS Attack Usig Time Series Aalysis Togguag
STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA. Maya Maria, Universitas Terbuka, Indonesia
STUDENTS PARTICIPATION IN ONLINE LEARNING IN BUSINESS COURSES AT UNIVERSITAS TERBUKA, INDONESIA Maya Maria, Uiversitas Terbuka, Idoesia Co-author: Amiuddi Zuhairi, Uiversitas Terbuka, Idoesia Kuria Edah
Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1
Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig
Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments
Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please
Locating Performance Monitoring Mobile Agents in Scalable Active Networks
Locatig Performace Moitorig Mobile Agets i Scalable Active Networks Amir Hossei Hadad, Mehdi Dehgha, ad Hossei Pedram Amirkabir Uiversity, Computer Sciece Faculty, Tehra, Ira [email protected], {dehgha,
Vulnerability test system for SIP network elements
Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic
One Goal. 18-Months. Unlimited Opportunities.
18 fast-track 18-Moth BACHELOR S DEGREE completio PROGRAMS Oe Goal. 18-Moths. Ulimited Opportuities. www.ortheaster.edu/cps Fast-Track Your Bachelor s Degree ad Career Goals Complete your bachelor s degree
Amendments to employer debt Regulations
March 2008 Pesios Legal Alert Amedmets to employer debt Regulatios The Govermet has at last issued Regulatios which will amed the law as to employer debts uder s75 Pesios Act 1995. The amedig Regulatios
Configuring Additional Active Directory Server Roles
Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio
Lesson 17 Pearson s Correlation Coefficient
Outlie Measures of Relatioships Pearso s Correlatio Coefficiet (r) -types of data -scatter plots -measure of directio -measure of stregth Computatio -covariatio of X ad Y -uique variatio i X ad Y -measurig
FortiGuard Fortinet s Global Security Research and Protection
SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft
1 Correlation and Regression Analysis
1 Correlatio ad Regressio Aalysis I this sectio we will be ivestigatig the relatioship betwee two cotiuous variable, such as height ad weight, the cocetratio of a ijected drug ad heart rate, or the cosumptio
C.Yaashuwanth Department of Electrical and Electronics Engineering, Anna University Chennai, Chennai 600 025, India..
(IJCSIS) Iteratioal Joural of Computer Sciece ad Iformatio Security, A New Schedulig Algorithms for Real Time Tasks C.Yaashuwath Departmet of Electrical ad Electroics Egieerig, Aa Uiversity Cheai, Cheai
5.4 Amortization. Question 1: How do you find the present value of an annuity? Question 2: How is a loan amortized?
5.4 Amortizatio Questio 1: How do you fid the preset value of a auity? Questio 2: How is a loa amortized? Questio 3: How do you make a amortizatio table? Oe of the most commo fiacial istrumets a perso
A Balanced Scorecard
A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio
Domain 1 - Describe Cisco VoIP Implementations
Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.
CREATIVE MARKETING PROJECT 2016
CREATIVE MARKETING PROJECT 2016 The Creative Marketig Project is a chapter project that develops i chapter members a aalytical ad creative approach to the marketig process, actively egages chapter members
Mobile Application Testing
White Paper Mobile Applicatio Testig Device ad platform diversity, short release cycles, lack of mature testig tools ad the variety of etwork coectivity optios result i frequet cost overrus ad missed deadlies
MTO-MTS Production Systems in Supply Chains
NSF GRANT #0092854 NSF PROGRAM NAME: MES/OR MTO-MTS Productio Systems i Supply Chais Philip M. Kamisky Uiversity of Califoria, Berkeley Our Kaya Uiversity of Califoria, Berkeley Abstract: Icreasig cost
