AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING

Size: px
Start display at page:

Download "AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING"

Transcription

1 AN ANOMALY DETECTION SYSTEM FOR DDOS ATTACK IN GRID COMPUTING 1 Sumit kar, 2 Bibhudatta sahoo 1,2 NIT Rourkela/CSE, Rourkela, Idia sumitk-cs209@itrkl.ac.i, bdsahu@itrkl.ac.i ABSTRACT: Grid computig is rapidly emergig as a domiat field of wide area distributed computig. Grid computig is a collectio of heterogeeous computers ad resources across multiple orgaizatios ad delivers computig ad resources as services to its users. The heterogeeity ad scalability characteristics of Grid itroduce potetial security challeges. Distributed Deial of Service attack (DDoS) is oe of the major threats to grid computig services. The perfect secure system for DDoS attack is based o the 3 steps: (i) Attack prevetio, (ii) attack detectio ad recovery, ad (iii) attack idetificatio. This paper presets vulerability of Grid computig i presece of DDoS attack. Our proposed method is based upo attack detectio ad recovery, ad uses a Etropy based aomaly detectio system to detect DDoS attack. A grid topology model is used to describe how to implemet the etropy based aomaly detectio system i grid eviromet. Keywords: Grid computig, aomaly detectio, etropy 1. INTRODUCTION The Grid techology has emerged as a high throughput wide area distributed computig. Grid computig [1] [2] provides a ifrastructure that supports the sharig ad coordiated use of heterogeeous computers ad resources spread across multiple admiistrative domais. Due to the dyamic ad multi-orgaizatioal ature of grid, the issue of maagig security of both users ad resources are the most challegig. First geeratio grid was deployed i research labs, academic istitutios ad for military use. But ow a day may eterprises are begiig to use grid techologies commercially as well [20], so maitaiig the QoS ad security are importat to meet user s demad. Grid uses iteret as a ifrastructure to build commuicatio ad middleware like Globus are used that eable resource providers to make available their services for users. The fusio of web services ad grid techologies further icreases the cocers about security problem for their complex ature [17]. A good classificatio of possible threats i grid computig ca be foud i [6], which is based o threats o differet users associated with Grid. From which Distributed Deial of Service attack (DDoS) is a immese threat to grid computig. For example Su s ew o-demad grid computig service becomes a victim with a deial-ofservice (DOS) attack o its first day of operatio [20]. The remider of the paper is orgaized as follows sectio 2 discusses related work. sectio 3 presets vulerability of DDoS attack i Grid computig ad describe the 3 steps used i our proposed defese system to secure Grid. Sectio 4 outlies the eed of a aomaly detectio system i Grid ad discussed how etropy based approach ca be suitable for it. I sectio 5 we describe etropy based aomaly detectio approach ad our detectio algorithm. I sectio 6 we have described usig a grid topology model how it ca implemeted i Grid ad coclusio i sectio RELATED WORK The vulerabilities of grid eviromet i the presece of DDoS have bee preseted i [10] ad they have proposed a distributed defese system for Grid. Authors of [11] discussed the eed for a itrusio detectio system i grid eviromet. They have classified grid itrusios i to 4 types i.e. 1) Uauthorized access 2) Misuse 3) Grid exploit 4)Host or Network-specific attacks. They have proposed a model that is composed of high-level GIDS that utilizes fuctioality of lower-level HIDS (host itrusio detectio system) ad NIDS (etwork itrusio detectio system) provided through stadard iter-ids commuicatio. Differet techiques ad challeges ivolved i aomaly detectio system ca be foud i [14]. May articles like [13] use traffic volume [flow, packet, byte cout] as the metric for aomaly detectio system. Volume based detectio scheme were proved as a good metrics, But like small DoS attacks that do ot cause much chages i traffic ca ot be detected perfectly. Recetly there has bee use of etropy ad traffic distributio for detectig DDoS attack aomalies. Author [3] uses etropy of distributio of source address for DDoS detectio. I [4] icluded PCA framework with etropy based metrics ad show that it ca detect aomalies more efficietly tha before. I [5] suggested use of differet iformatio measures for detectig malicious activities. The authors of [7] use etropy rate to discrimiate the DDoS attack from legitimate traffic. Our objective i this paper is to desig a ISSN: April 09 September 09 Volume 1 : Issue 2 Page: 553

2 aomaly detectio system based o etropy ad etropy rate to detect DDoS attack i Grid eviromet. We use ormalized etropy which calculates the over all probability distributio i the captured flow i our algorithm to get more accurate result. 3. DoS ATTACK IN GRID DoS ad DDoS attacks [9] are the most commo ad deadly attack today. A DoS attack ivolves sedig large umber of packets to a destiatio to prevet legitimate users from accessig iformatio or services. DDoS use the computig power of thousads of compromised machies kow as zombies to a target a victim. Zombies are gathered to sed useless service requests, packets at the same time. DDoS attacks are ot targeted at stealig, modifyig or destroyig iformatio, but its aim is to prevet legitimate users from usig a service. It is very difficult to detect a DoS attacker because they geerally use spoofed IP address ad it becomes more complicated i large distributed system like grid. Although Grid Security Ifrastructure (GSI) of grid middleware provides several security features that required o grid eviromet; iclude X.509 certificates, autheticatio algorithm usig Secure Socket Layer (SSL) protocol, authorizatio, delegatio, auditig ad sigle sig o [17]. Due to the scalability ad dyamic ature of grid some security flaws are there ad the huge resource capacity like computatioal ad storage of grid computig may become a ext platform for the attackers [10]. If a itruder got uauthorized access to grid, the the grid resources ca misused i differet ways; like the huge computatioal power ca be used for breakig passwords or security systems ad the large storage capacity ca be used to store illegal software ad data, ad the huge badwidth ca be used for luchig DDoS attack. To secure grid from DDoS attack the defese system ca be divided i to 3 steps. (i) Attack prevetio (before attack), (ii) attack detectio ad recovery (durig the attack), (iii) attack idetificatio (after attack) DDoS Attack prevetio The aim of attack prevetio mechaisms is to take prevetive measures which ca ot provide 100% security, but it will decrease the stregth of DDoS attack. Based o the target of implemetatio of the mechaisms it ca divide them i to system security ad protocol security mechaisms. [9] System security mechaisms System security deals with those mechaisms which are implemeted o the ed host. I DDoS attack it is required thousads of compromised machies to target a victim, but if we will stregthe the overall security of each host of grid the it will difficult for a attacker to luch a attack. Examples of system security mechaisms are firewall ad micro firewall systems, ati virus systems, access cotrol, packet filter ad authorizatio systems. Protocol security mechaisms Protocol mechaisms icrease the security by desigig a safe protocol so that oly resources are allocated to the cliets after sufficiet autheticatio ad authorizatio are completed. For which resources will ot waste time i attack like TCP SYN attack. Use of proxy sever has bee proposed by authors [18] Attack detectio ad recovery The aim of attack detectio ad recovery is to detect DDoS attack before it affects the ed user.itrusio detectio systems [11] are widely used for DDoS detectio. A Itrusio detectio system (IDS) is software ad/or hardware which will moitor the etwork or a computer system for suspicious activity ad alerts the system maager or etwork admiistrator. We ca classify the IDS based the target of implemetatio as host based ad etwork based. The techique adopted by IDS for itrusio detectio classifies IDS i to two types sigature based ad aomaly based. Sigature based IDS A sigature based IDS will moitor packets o the etwork ad compare them agaist a database maitaied with kow threats. If the sigature of packets match with those kow attacks it will marked as malicious. The advatage with sigature based IDS is sigatures are easy to develop. The disadvatage of is that they ca oly detect kow attacks, for which a large up-to-date database of sigature for every attack must be created, Aomaly-based IDS Aomaly-based IDS [14] creates the ormal behavior of the users usig the system or etwork to detect itrusios. If the deviatio of user activity is outside a certai threshold value, it marked as malicious ad a respose is triggered. Aomaly detectio has a advatage over sigature-based i that a ew attack ca be detected if it falls out of the ormal traffic patters. Disadvatage of aomaly-detectio system is the difficultly of defiig rules. Settig of a perfect threshold is also very challegig because settig of a small threshold creates may false positives ad settig of high threshold reduces the effectiveess of the IDS [14]. After detectio of itrusio it s the work of respose system to take actio so that attack traffics will damaged with out affectig legitimate user. There are popularly two respose mechaisms filterig ad rate limitig algorithms are used agaist DoS attack. 3.3 Attack source idetificatio Aother difficulty i defedig to DDoS attack is to trace the source of the attacks, because the attackers are geerally uses spoofed IP addresses i the IP packets. For which the attack idetificatio mechaism should be flexible eough so that it ca ISSN: April 09 September 09 Volume 1 : Issue 2 Page: 554

3 trace the source of attack packets without depedig o the source address field of the IP header. There are differet mechaisms proposed by differet authors like Advaced Markig Scheme ad the Autheticated Markig Scheme [19], Probabilistic Packet Markig (PPM), Determiistic Packet Markig (DPM), has bee proposed to trace back the source of spoofed IP packets. Also more efficiet method like flexible Determiistic Packet Markig (FDPM) ca be foud [8]. 4. ANOMALY DETECTION SYSTEM FOR GRID Previously, much work has bee doe i volume (o. of bytes, packets, flows) as a pricipal metric for aomaly detectio system [13]. Volume based detectio scheme method ca detect aomalies that causes large traffic chages,but aomalies like small DoS attacks which do ot cause much chages i traffic volume ca ot be detected well. The attack discussed above ca be better detected by aalyzig distributio of traffic features. A traffic feature is a field i the header of the packet. Oe of the properties of Grid Security Ifrastructure (GSI) [17] is cofidetiality of the data trasferred over the etwork. For which the data trasmitted over the grid must be ecrypted. So the system could ot see the data payload portio of the packet because of ecryptio. Aalysis would be based oly o the low level iformatio, which ca be extracted from the packet header. The Next problem is to fid a metric that ca extract distributio of traffic features that ca be used i aomaly detectio system. A umber of articles suggested etropy as a metrics to summarizig traffic distributio for aomaly detectio [3] [4] [5] [15]. The use of etropy for aalyze chages i traffic distributio has two beefit. i) Usig etropy for aomaly detectio icreases the detectio capability tha volume based methods. ii) It provides additioal iformatio to classify amog differet types aomaly (worms, DoS attack. Port scaig).we cosiders two classes of distributio i) flow header features (IP address, ports, ad flow sizes) ii) behavioral features (the umber of distict destiatio / source address that a host commuicates with) [15]. The aomaly detectio system discussed i this paper is based o by aalyzig the chage i etropy of above two traffic distributios. 5. ENTROPY BASED APPROACH Etropy [16] is a measure of the ucertaity or radomess associated with a radom variable or i this case data comig over the etwork. The more radom it is, the more etropy it cotais. The value of sample etropy lies i rage [0, log].the etropy shows its miimum value 0 whe all the items (IP address or port) are same ad its maximum value log whe all the items are differet. The etropy of a radom variable X with possible values {x 1, x 2, x } ca be calculated as H (X) = - i = 1 P (x i ) log P (x i ) (1) If we are iterested i measurig the etropy of packets over uique source or destiatio address the maximum value of is 2 32 for ipv4 address. If we wat to calculate etropy over various applicatios port the is the maximum umber of ports. Here p (x i ) where x i X is the probability that X takes the value x i. Suppose we radomly observe X for a fixed time widow w, the p (x i ) = m i /m, where m i is the frequecy or umber of times we observe X takig the value x i I.e. m = mi. i = 1 H (X) = - (m i /m) log (m i /m) (2) i= 1 H (X) = Etropy. If we wat calculate probability of ay source (destiatio) address the, m i = umber of packets with x i as source (Destiatio) address ad M = total umber of packets Number of packets with x i as source P (x i ) = (destiatio) address Total umber of packets Here total umber of packets is the umber of packets see for a time widow T. Similarly we ca calculate probability for each source (destiatio) port as Number of packets with x i as source P (x i ) = (destiatio) port Total umber of packets Normalized etropy calculates the over all probability distributio i the captured flow for the time widow T. Normalized etropy = (H / log 0 ) (3) Where 0 is the umber of distict x i values i the give time widow. I a DDoS attack from the captured traffic i time widow t, the attack flow domiates the whole traffic, as a result the over all etropy of the traffic decreased i a detectable maer. But it is also possible i a case of massive legitimate etwork accessig. To cofirm the attack we have to agai calculate the etropy rate. Here flow is packages which share the same destiatio address/port. I this mechaism we have take oe assumptio that the attacker uses same fuctio to geerate attack packets at zombies, ad it is a statioary stochastic process. Accordig to [16] for a stochastic processes the etropy rate H ( χ ) of two radom processes are same. H ( χ ) = lim 1 H (x1, x 2 x ) (4) The steps i DDoS detectio algorithm are described i figure 1. ISSN: April 09 September 09 Volume 1 : Issue 2 Page: 555

4 Algorithm 1 : DDoS detectio algorithm 1. Collect sample flows for a time widow T o the edge routers P (x i ) log 2. Calculate router etropy H(x) = - i= 1 P (x i ) 3. Calculate NE = (H / log 0 ) where, NE = ormalized Router etropy 4. If NE < threshold (δ 1 ), idetify the suspected attack flow 5. Calculate the etropy rate H ( χ ) = lim 1 H (x 1, x 2 x ) of the suspected flow i that router ad the routers i dow stream 6. Compare H i ( χ ) iε etropy rates o routers 8. If H i ( χ ) threshold (δ 2 ), it is a DDoS attack Else legitimate traffics 9. Discard the attack flow. Figure 1: DDoS detectio algorithm Defiitio 1: A stochastic process {X (t), t T} is a collectio of collectio of radom variables. For each t T, X (t) is a radom variable. We refer X (t) as the state of the process at time t. The set T is called the idex set of process. Defiitio 2: A stochastic process is said to be statioary if the joit distributio of ay subset of radom variables is ivariat with respect to shifts i the time idex i.e. Pr{X1 = x1, X2 = x2... X = x} = Pr{X1+l = x1, X2+l = x2... X+l = x} Defiitio 3: The etropy rate is the rate of growth of etropy of a radom process. If we have a sequece of radom variables, the the etropy rate of a stochastic process { x i } is defied by H ( χ ) = lim 1 H (x1, x 2 x ) 6. IMPLEMENTATION IN GRID C3 A3 A4 Site C C2 C4 Site A A2 A5 Router 1 C1 A1 Router 3 C5 SOURCE SOURCE Router 0 B2 D2 B3 D3 Site B D1 B1 B5 Router 2 Router 4 B4 victim D4 D5 Site D Figure 2. Grid topology Grid computig ca be thought as a virtual orgaizatio which is a collectio of some real orgaizatios or sites [12]. I the figure 2 we have show a Grid topology model which is a collectio of four sites i.e. site A, site B, site C ad site D ad they are coected by 5 routers. We employ our proposed aomaly detectio system i each router of the grid ifrastructure. Edge routers ear the source of traffic will capture flows for a predefied time widow T ad calculate the router etropy ad ormalized router etropy. If the ormalized router etropy is less tha certai threshold δ 1 idetify the suspected DDoS attack flow from the traffic. But it is also possible i a case of massive legitimate etwork accessig. To cofirm the attack the etropy rate of the suspected flow is calculated i that router accordig To Eq. (4). Based o the destiatio address o the IP header of the packets ad routig table it discovers the dowstream routers ad seds security alarm to those routers to calculate etropy rate of the suspected flow. As discussed above, the etropy rates of attack flows at differet routers i the etwork are same. If the calculated etropy rates o routers are same or very ear, the attack is cofirmed. No real Grid eviromet is available for testig the performace. So the real life experimets could ot be performed. We have cosidered two examples usig figure (2) how the detectio scheme works. Suppose From figure (2) ode A1 ad C4 are attack sources ad D1 is the victim. Based o the DDoS detectio algorithm flows comig A1 will first captured by router 1 ad flows comig from C4 will be captured by router 3. Suppose at router 1, router 2 ad router 3 we have captured flows as give i table 1, table 3 ad i table 2 respectively i a fixed time widow T. The etropy of the flows are calculated accordig to Eq. (2) ad Eq. (3).For easy uderstadig we have assiged IP addresses to each host. Source ode Table I. Data for router 1 Destiatio No of address packets etropy A1 D1[ ] A5 B5[ ] A2 B2[ ] Here Router etropy = = = 3 Normalized Router etropy NE = 1.42/ log 2 3 = 0.89 Table II. Data for router 3 Source Destiatio address No of etropy ode packets C1 B4[ ] C2 D3[ ] C4 D1[ ] Router etropy = = 1.43 Here 0 = 3 Normalized Router etropy NE = 1.43/ log 2 3 = 0.90 Table III. Data for router 2 ISSN: April 09 September 09 Volume 1 : Issue 2 Page: 556

5 Sour ce ode Destiatio address No of packets etropy B1 C2[ ] B2 C3[ ] B3 C1[ ] Router etropy= = = 3 Normalized Router etropy NE = 1.56/ log 2 3 = 0.98 Although the data are take maually we ca see that for router 1 ad router 3 the ormalized router etropy is less tha the router 2. I the first two cases oe flow domiates the whole traffic as a result the ormalized etropy decreases. If the threshold δ 1 is perfect, suppose 0.94 for the above example, it will treat flow comig from ode A1 ad C4 as suspected flows. After which the etropy rate is beig calculated. I figure 2, for router 1 the etropy rate of suspected flow is calculated ad compared i router1 ad router 0. Similarly for router 3 the etropy rate of those flows will be calculated ad compared both i router 3 ad router 0. While the etropy rates of differet routers are same or less tha δ 2, the attack is cofirmed ad attack flow is discarded. All the calculatios are based o log CONCLUSION A DDoS attack is a major ad complex threat for Grid computig. The aim of this study was to ivestigate how DDoS attack affects the grid performace ad desigig a aomaly detectio system. The attack must be detected ad blocked before reachig the victim ad with high detectio rate ad low false alarm rate. I this paper we have used iformatio theoretic parameters etropy ad etropy rate to model the aomaly detectio system for Grid. We have implemeted aomaly detectio system i each router of the grid eviromet ad the router will cooperate with each other to detect aomaly. The mai advatage of the above proposed method is the attack is detected ad blocked before reachig the victim ad with high detectio rate. But the challege lies i this approach if the attacker will use differet packet geeratio fuctios i a attack ad settig a good threshold. The effectiveess of the proposed method has bee proved theoretically. I the future work we will simulate the proposed algorithm ad aalyze the results ad we will provide a road map for further research i this area. 8. REFERENCES 1. I. Foster, C. Kesselma, The Grid: Blueprit for a ew computig ifrastructure.morga Kaufma publishers, R. Buyya, S. Veugopal, A Getle Itroductio to Grid computig ad Techologies, CSI Commuicatios, 19 July L. Feistei, D. Schackeberg, R. Balupari, ad D. Kidred. Statistical approaches to DDoS attack detectio ad respose. I Proc of DARPA Iformatio Survivability Coferece ad Expositio, [4] A. Lakhia, M. Crovella ad C. Diot, Miig aomalies usig traffic feature Distributios. I proc. of ACM SIGCOMM, W. Lee, D. Xiag, Iformatio-theoretic measures for aomaly Detectio, I Proc. of IEEE Symposium o Security ad Privacy, N. Jiacheg, L. Zhishu, G. Zhoghe,S. Jirog, Threat aalysis ad Prevetio for grid ad web security services, SNPD, pp , S. Yu, W.Zhou, Etropy-based Collaborative Detectio of DDoS attacks o Commuity Networks, I Proc. of IEEE iteratioal coferece o pervasive computig ad Commuicatios, Y. Xiag ad W. Zhou, A Defese System agaist DDoS Attacks by Large- Scale IP Traceback, I Proc. of Third Iteratioal Coferece o Iformatio Techology ad Applicatios (ICITA 05). 9. J. Mirkovic, J. Marti ad P. Reiher, A Taxoomy of DDoS Attacks ad DDoS Defese Mechaisms, ACM Computer Commuicatios Review, Vol.34, No. 2, April Y. Xiag, W. Zhou, Protect Grids from DDoS attack, I proc. of third Iteratioal coferece o grid ad cooperative computig, vol. 3251, pp , A. Schulter, J. A. Reis, F. Koch, C. B. Westphall A Grid-based Itrusio Detectio System, I Proc. of ICNICONSMCL T. Zati, J. Amadei, Daiel R. Pazehoski, S. Sweey Desig ad Aalysis of a Adaptive, Global Strategy for Detectig ad Mitigatig Distributed DoS Attacks i GRID Eviromets I Proc. of the 39th Aual Simulatio Symposium (ANSS 06), A. Lakhia, M. Crovella, ad C. Diot. Diagosig Network-Wide Traffic Aomalies. I ACM SIGCOMM, Portlad, August P. G. Teodoro, J. D.Verdejo, G. M.Feradez, E.Vazquez, Aomaly-based etwork itrusio detectio: Techiques, systems ad challeges, computer & security, G. Nychis, V. Sekar, D. G Aderse, H. Kim ad H.Zhag, A Empirical Evaluatio of Etropy-Based Traffic Aomaly Detectio. Tech. Rep. CMU- CS , Computer Sciece Departmet, Caregie Mello Uiversity, Thomas M. Cover ad Joy A. Thomas, Elemets of Iformatio Theory, secod editio, S. Shirasua, A. Slomiski L. Fag ad L. Gao, Performace compariso of security mechaisms for grid services, Proc. of the fifth IEEE/ACM Iteratioal Workshop o Grid Computig, pp , J. Wag, X. Liu ad A. Chie, Empirical Study of Toleratig Deial-of-Service Attacks with a Proxy Network, I Proc. Of the USENIX Security Symposium, D.Xiaodog Sog ad A. Perrig Advaced ad Autheticated Markig Schemes for IP Traceback IEEE INFOCOM, ISSN: April 09 September 09 Volume 1 : Issue 2 Page: 557

Modified Line Search Method for Global Optimization

Modified Line Search Method for Global Optimization Modified Lie Search Method for Global Optimizatio Cria Grosa ad Ajith Abraham Ceter of Excellece for Quatifiable Quality of Service Norwegia Uiversity of Sciece ad Techology Trodheim, Norway {cria, ajith}@q2s.tu.o

More information

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks

Security Functions and Purposes of Network Devices and Technologies (SY0-301) 1-800-418-6789. Firewalls. Audiobooks Maual Security+ Domai 1 Network Security Every etwork is uique, ad architecturally defied physically by its equipmet ad coectios, ad logically through the applicatios, services, ad idustries it serves.

More information

DDoS Attack Detection and Attacker Identification

DDoS Attack Detection and Attacker Identification DDoS Attack Detectio ad Attacker Idetificatio Brajesh Kashyap Departmet of Computer Sciece ad Egieerig Natioal Istitute of Techology Rourkela- 769008 S.K.Jea Departmet of Computer Sciece ad Egieerig Natioal

More information

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing

DDoS Verification and Attack Packet Dropping Algorithm in Cloud Computing World Applied Scieces Joural 23 (11): 1418-1424, 2013 ISSN 1818-4952 IDOSI Publicatios, 2013 DOI: 10.5829/idosi.wasj.2013.23.11.950 DDoS Verificatio ad Attack Packet Droppig Algorithm i Cloud Computig

More information

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out

Authentication - Access Control Default Security Active Directory Trusted Authentication Guest User or Anonymous (un-authenticated) Logging Out FME Server Security Table of Cotets FME Server Autheticatio - Access Cotrol Default Security Active Directory Trusted Autheticatio Guest User or Aoymous (u-autheticated) Loggig Out Authorizatio - Roles

More information

Configuring Additional Active Directory Server Roles

Configuring Additional Active Directory Server Roles Maual Upgradig your MCSE o Server 2003 to Server 2008 (70-649) 1-800-418-6789 Cofigurig Additioal Active Directory Server Roles Active Directory Lightweight Directory Services Backgroud ad Cofiguratio

More information

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1

Detecting Voice Mail Fraud. Detecting Voice Mail Fraud - 1 Detectig Voice Mail Fraud Detectig Voice Mail Fraud - 1 Issue 2 Detectig Voice Mail Fraud Detectig Voice Mail Fraud Several reportig mechaisms ca assist you i determiig voice mail fraud. Call Detail Recordig

More information

(VCP-310) 1-800-418-6789

(VCP-310) 1-800-418-6789 Maual VMware Lesso 1: Uderstadig the VMware Product Lie I this lesso, you will first lear what virtualizatio is. Next, you ll explore the products offered by VMware that provide virtualizatio services.

More information

Domain 1 Components of the Cisco Unified Communications Architecture

Domain 1 Components of the Cisco Unified Communications Architecture Maual CCNA Domai 1 Compoets of the Cisco Uified Commuicatios Architecture Uified Commuicatios (UC) Eviromet Cisco has itroduced what they call the Uified Commuicatios Eviromet which is used to separate

More information

LECTURE 13: Cross-validation

LECTURE 13: Cross-validation LECTURE 3: Cross-validatio Resampli methods Cross Validatio Bootstrap Bias ad variace estimatio with the Bootstrap Three-way data partitioi Itroductio to Patter Aalysis Ricardo Gutierrez-Osua Texas A&M

More information

ANALYTICS. Insights that drive your business

ANALYTICS. Insights that drive your business ANALYTICS Isights that drive your busiess Eterprises are trasformig their busiesses by supplemetig their databases with real ad up-to-date customer data. Aalytics, as a catalyst, refies raw data ad aligs

More information

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks

An Adaptive Method for Source-end Detection of Pulsing DoS Attacks , pp.279-288 http://dx.doi.org/10.14257/ijsia.2013.7.5.26 A Adaptive Method for Source-ed Detectio of Pulsig DoS Attacks Mig Yu School of Iformatio ad Commuicatio Egieerig, Dalia Uiversity of Techology,

More information

Domain 1: Designing a SQL Server Instance and a Database Solution

Domain 1: Designing a SQL Server Instance and a Database Solution Maual SQL Server 2008 Desig, Optimize ad Maitai (70-450) 1-800-418-6789 Domai 1: Desigig a SQL Server Istace ad a Database Solutio Desigig for CPU, Memory ad Storage Capacity Requiremets Whe desigig a

More information

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC

ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC 8 th Iteratioal Coferece o DEVELOPMENT AND APPLICATION SYSTEMS S u c e a v a, R o m a i a, M a y 25 27, 2 6 ADAPTIVE NETWORKS SAFETY CONTROL ON FUZZY LOGIC Vadim MUKHIN 1, Elea PAVLENKO 2 Natioal Techical

More information

Reliability Analysis in HPC clusters

Reliability Analysis in HPC clusters Reliability Aalysis i HPC clusters Narasimha Raju, Gottumukkala, Yuda Liu, Chokchai Box Leagsuksu 1, Raja Nassar, Stephe Scott 2 College of Egieerig & Sciece, Louisiaa ech Uiversity Oak Ridge Natioal Lab

More information

Professional Networking

Professional Networking Professioal Networkig 1. Lear from people who ve bee where you are. Oe of your best resources for etworkig is alumi from your school. They ve take the classes you have take, they have bee o the job market

More information

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal

Study on the application of the software phase-locked loop in tracking and filtering of pulse signal Advaced Sciece ad Techology Letters, pp.31-35 http://dx.doi.org/10.14257/astl.2014.78.06 Study o the applicatio of the software phase-locked loop i trackig ad filterig of pulse sigal Sog Wei Xia 1 (College

More information

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues

Domain 1: Identifying Cause of and Resolving Desktop Application Issues Identifying and Resolving New Software Installation Issues Maual Widows 7 Eterprise Desktop Support Techicia (70-685) 1-800-418-6789 Domai 1: Idetifyig Cause of ad Resolvig Desktop Applicatio Issues Idetifyig ad Resolvig New Software Istallatio Issues This sectio

More information

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV)

Enhancing Oracle Business Intelligence with cubus EV How users of Oracle BI on Essbase cubes can benefit from cubus outperform EV Analytics (cubus EV) Ehacig Oracle Busiess Itelligece with cubus EV How users of Oracle BI o Essbase cubes ca beefit from cubus outperform EV Aalytics (cubus EV) CONTENT 01 cubus EV as a ehacemet to Oracle BI o Essbase 02

More information

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows:

Your organization has a Class B IP address of 166.144.0.0 Before you implement subnetting, the Network ID and Host ID are divided as follows: Subettig Subettig is used to subdivide a sigle class of etwork i to multiple smaller etworks. Example: Your orgaizatio has a Class B IP address of 166.144.0.0 Before you implemet subettig, the Network

More information

The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013

The Modern Malware Review. Analysis of New and Evasive Malware in Live Enterprise Networks 1st Edition, March 2013 The Moder Malware Review Aalysis of New ad Evasive Malware i Live Eterprise Networks 1st Editio, March 2013 THE MODERN MALWARE REVIEW MARCH 2013 TABLE OF CONTENTS Backgroud ad Goals 3 A Focus o Actioable

More information

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot

QUADRO tech. PST Flightdeck. Put your PST Migration on autopilot QUADRO tech PST Flightdeck Put your PST Migratio o autopilot Put your PST Migratio o Autopilot A moder aircraft hardly remids its pilots of the early days of air traffic. It is desiged to eable flyig as

More information

Determining the sample size

Determining the sample size Determiig the sample size Oe of the most commo questios ay statisticia gets asked is How large a sample size do I eed? Researchers are ofte surprised to fid out that the aswer depeds o a umber of factors

More information

A Secure Implementation of Java Inner Classes

A Secure Implementation of Java Inner Classes A Secure Implemetatio of Java Ier Classes By Aasua Bhowmik ad William Pugh Departmet of Computer Sciece Uiversity of Marylad More ifo at: http://www.cs.umd.edu/~pugh/java Motivatio ad Overview Preset implemetatio

More information

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS

COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S 2 CONTROL CHART FOR THE CHANGES IN A PROCESS COMPARISON OF THE EFFICIENCY OF S-CONTROL CHART AND EWMA-S CONTROL CHART FOR THE CHANGES IN A PROCESS Supraee Lisawadi Departmet of Mathematics ad Statistics, Faculty of Sciece ad Techoology, Thammasat

More information

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites

Digital Enterprise Unit. White Paper. Web Analytics Measurement for Responsive Websites Digital Eterprise Uit White Paper Web Aalytics Measuremet for Resposive Websites About the Authors Vishal Machewad Vishal Machewad has over 13 years of experiece i sales ad marketig, havig worked as a

More information

DDoS attacks defence strategies based on nonparametric CUSUM algorithm

DDoS attacks defence strategies based on nonparametric CUSUM algorithm Abstract DDoS attacks defece strategies based o oparametric CUSUM algorithm Chaghog Ya 1*, Qi Dog 2, Hog Wag 3 1 School of Iformatio Egieerig, Yacheg Istitute of Techology, No.9 XiWag Aveue Road, Yacheg,

More information

Protecting Content Distribution Networks from Denial of Service Attacks

Protecting Content Distribution Networks from Denial of Service Attacks Protectig Cotet Distributio Networks from Deial of Service Attacks Kag-Wo Lee, Suresh Chari, Aees Shaikh, Sambit Sahu, Pau-Che Cheg IBM T. J. Watso Research Ceter Hawthore, NY 10532 Abstract I this paper,

More information

Domain 1: Configuring Domain Name System (DNS) for Active Directory

Domain 1: Configuring Domain Name System (DNS) for Active Directory Maual Widows Domai 1: Cofigurig Domai Name System (DNS) for Active Directory Cofigure zoes I Domai Name System (DNS), a DNS amespace ca be divided ito zoes. The zoes store ame iformatio about oe or more

More information

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments

Project Deliverables. CS 361, Lecture 28. Outline. Project Deliverables. Administrative. Project Comments Project Deliverables CS 361, Lecture 28 Jared Saia Uiversity of New Mexico Each Group should tur i oe group project cosistig of: About 6-12 pages of text (ca be loger with appedix) 6-12 figures (please

More information

Hypergeometric Distributions

Hypergeometric Distributions 7.4 Hypergeometric Distributios Whe choosig the startig lie-up for a game, a coach obviously has to choose a differet player for each positio. Similarly, whe a uio elects delegates for a covetio or you

More information

BaanERP. BaanERP Windows Client Installation Guide

BaanERP. BaanERP Windows Client Installation Guide BaaERP A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject to

More information

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature.

*The most important feature of MRP as compared with ordinary inventory control analysis is its time phasing feature. Itegrated Productio ad Ivetory Cotrol System MRP ad MRP II Framework of Maufacturig System Ivetory cotrol, productio schedulig, capacity plaig ad fiacial ad busiess decisios i a productio system are iterrelated.

More information

ContactPro Desktop for Multi-Media Contact Center

ContactPro Desktop for Multi-Media Contact Center CotactPro Desktop for Multi-Media Cotact Ceter CCT CotactPro (CP) is the perfect solutio for the aget desktop i a Avaya multimedia call ceter eviromet. CotactPro empowers agets to efficietly serve customers

More information

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation

Malicious Node Detection in Wireless Sensor Networks using Weighted Trust Evaluation Malicious Node Detectio i Wireless Sesor Networks usig Weighted Trust Evaluatio Idris M. Atakli, Hogbig Hu, Yu Che* SUNY Bighamto Bighamto, NY 1392, USA {iatakli1, hhu1, yche}@bighamto.edu Wei-Shi Ku Aubur

More information

Hypothesis testing. Null and alternative hypotheses

Hypothesis testing. Null and alternative hypotheses Hypothesis testig Aother importat use of samplig distributios is to test hypotheses about populatio parameters, e.g. mea, proportio, regressio coefficiets, etc. For example, it is possible to stipulate

More information

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval

Optimal Adaptive Bandwidth Monitoring for QoS Based Retrieval 1 Optimal Adaptive Badwidth Moitorig for QoS Based Retrieval Yizhe Yu, Iree Cheg ad Aup Basu (Seior Member) Departmet of Computig Sciece Uiversity of Alberta Edmoto, AB, T6G E8, CAADA {yizhe, aup, li}@cs.ualberta.ca

More information

A Balanced Scorecard

A Balanced Scorecard A Balaced Scorecard with VISION A Visio Iteratioal White Paper Visio Iteratioal A/S Aarhusgade 88, DK-2100 Copehage, Demark Phoe +45 35430086 Fax +45 35434646 www.balaced-scorecard.com 1 1. Itroductio

More information

Lecture 2: Karger s Min Cut Algorithm

Lecture 2: Karger s Min Cut Algorithm priceto uiv. F 3 cos 5: Advaced Algorithm Desig Lecture : Karger s Mi Cut Algorithm Lecturer: Sajeev Arora Scribe:Sajeev Today s topic is simple but gorgeous: Karger s mi cut algorithm ad its extesio.

More information

Domain 1 - Describe Cisco VoIP Implementations

Domain 1 - Describe Cisco VoIP Implementations Maual ONT (642-8) 1-800-418-6789 Domai 1 - Describe Cisco VoIP Implemetatios Advatages of VoIP Over Traditioal Switches Voice over IP etworks have may advatages over traditioal circuit switched voice etworks.

More information

June 3, 1999. Voice over IP

June 3, 1999. Voice over IP Jue 3, 1999 Voice over IP This applicatio ote discusses the Hypercom solutio for providig ed-to-ed Iteret protocol (IP) coectivity i a ew or existig Hypercom Hybrid Trasport Mechaism (HTM) etwork, reducig

More information

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks

Recovery time guaranteed heuristic routing for improving computation complexity in survivable WDM networks Computer Commuicatios 30 (2007) 1331 1336 wwwelseviercom/locate/comcom Recovery time guarateed heuristic routig for improvig computatio complexity i survivable WDM etworks Lei Guo * College of Iformatio

More information

Baan Service Master Data Management

Baan Service Master Data Management Baa Service Master Data Maagemet Module Procedure UP069A US Documetiformatio Documet Documet code : UP069A US Documet group : User Documetatio Documet title : Master Data Maagemet Applicatio/Package :

More information

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM

PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM PROCEEDINGS OF THE YEREVAN STATE UNIVERSITY Physical ad Mathematical Scieces 2015, 1, p. 15 19 M a t h e m a t i c s AN ALTERNATIVE MODEL FOR BONUS-MALUS SYSTEM A. G. GULYAN Chair of Actuarial Mathematics

More information

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY

Optimize your Network. In the Courier, Express and Parcel market ADDING CREDIBILITY Optimize your Network I the Courier, Express ad Parcel market ADDING CREDIBILITY Meetig today s challeges ad tomorrow s demads Aswers to your key etwork challeges ORTEC kows the highly competitive Courier,

More information

Firewall Modules and Modular Firewalls

Firewall Modules and Modular Firewalls Firewall Modules ad Modular Firewalls H. B. Acharya Uiversity of Texas at Austi acharya@cs.utexas.edu Aditya Joshi Uiversity of Texas at Austi adityaj@cs.utexas.edu M. G. Gouda Natioal Sciece Foudatio

More information

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES

SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES SECTION 1.5 : SUMMATION NOTATION + WORK WITH SEQUENCES Read Sectio 1.5 (pages 5 9) Overview I Sectio 1.5 we lear to work with summatio otatio ad formulas. We will also itroduce a brief overview of sequeces,

More information

Confidence Intervals for One Mean

Confidence Intervals for One Mean Chapter 420 Cofidece Itervals for Oe Mea Itroductio This routie calculates the sample size ecessary to achieve a specified distace from the mea to the cofidece limit(s) at a stated cofidece level for a

More information

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu

Multi-server Optimal Bandwidth Monitoring for QoS based Multimedia Delivery Anup Basu, Irene Cheng and Yinzhe Yu Multi-server Optimal Badwidth Moitorig for QoS based Multimedia Delivery Aup Basu, Iree Cheg ad Yizhe Yu Departmet of Computig Sciece U. of Alberta Architecture Applicatio Layer Request receptio -coectio

More information

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS

GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS GOOD PRACTICE CHECKLIST FOR INTERPRETERS WORKING WITH DOMESTIC VIOLENCE SITUATIONS I the sprig of 2008, Stadig Together agaist Domestic Violece carried out a piece of collaborative work o domestic violece

More information

client communication

client communication CCH Portal cliet commuicatio facig today s challeges Like most accoutacy practices, we ow use email for most cliet commuicatio. It s quick ad easy, but we do worry about the security of sesitive data.

More information

Online Banking. Internet of Things

Online Banking. Internet of Things Olie Bakig & The Iteret of Thigs Our icreasigly iteretcoected future will mea better bakig ad added security resposibilities for all of us. FROM DESKTOPS TO SMARTWATCHS Just a few years ago, Americas coducted

More information

Designing Incentives for Online Question and Answer Forums

Designing Incentives for Online Question and Answer Forums Desigig Icetives for Olie Questio ad Aswer Forums Shaili Jai School of Egieerig ad Applied Scieces Harvard Uiversity Cambridge, MA 0238 USA shailij@eecs.harvard.edu Yilig Che School of Egieerig ad Applied

More information

A probabilistic proof of a binomial identity

A probabilistic proof of a binomial identity A probabilistic proof of a biomial idetity Joatho Peterso Abstract We give a elemetary probabilistic proof of a biomial idetity. The proof is obtaied by computig the probability of a certai evet i two

More information

Performance Analysis over Software Router vs. Hardware Router: A Practical Approach. Edward Guillen, Ana María Sossa and Edith Paola Estupiñán

Performance Analysis over Software Router vs. Hardware Router: A Practical Approach. Edward Guillen, Ana María Sossa and Edith Paola Estupiñán Proceedigs of the World Cogress o Egieerig ad Computer Sciece 0 Vol II WCECS 0, October 4-6, 0, Sa Fracisco, USA Performace Aalysis over Software Router vs. Hardware Router: A Practical Approach Edward

More information

Research Method (I) --Knowledge on Sampling (Simple Random Sampling)

Research Method (I) --Knowledge on Sampling (Simple Random Sampling) Research Method (I) --Kowledge o Samplig (Simple Radom Samplig) 1. Itroductio to samplig 1.1 Defiitio of samplig Samplig ca be defied as selectig part of the elemets i a populatio. It results i the fact

More information

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN

Analyzing Longitudinal Data from Complex Surveys Using SUDAAN Aalyzig Logitudial Data from Complex Surveys Usig SUDAAN Darryl Creel Statistics ad Epidemiology, RTI Iteratioal, 312 Trotter Farm Drive, Rockville, MD, 20850 Abstract SUDAAN: Software for the Statistical

More information

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics

Chair for Network Architectures and Services Institute of Informatics TU München Prof. Carle. Network Security. Chapter 2 Basics Chair for Network Architectures ad Services Istitute of Iformatics TU Müche Prof. Carle Network Security Chapter 2 Basics 2.4 Radom Number Geeratio for Cryptographic Protocols Motivatio It is crucial to

More information

On the Capacity of Hybrid Wireless Networks

On the Capacity of Hybrid Wireless Networks O the Capacity of Hybrid ireless Networks Beyua Liu,ZheLiu +,DoTowsley Departmet of Computer Sciece Uiversity of Massachusetts Amherst, MA 0002 + IBM T.J. atso Research Ceter P.O. Box 704 Yorktow Heights,

More information

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series

Automatic Tuning for FOREX Trading System Using Fuzzy Time Series utomatic Tuig for FOREX Tradig System Usig Fuzzy Time Series Kraimo Maeesilp ad Pitihate Soorasa bstract Efficiecy of the automatic currecy tradig system is time depedet due to usig fixed parameters which

More information

Neolane Leads. Neolane v6.1

Neolane Leads. Neolane v6.1 Neolae Leads Neolae v6.1 This documet, ad the software it describes, are provided subject to a Licese Agreemet ad may ot be used or copied outside of the provisios of the Licese Agreemet. No part of this

More information

Engineering Data Management

Engineering Data Management BaaERP 5.0c Maufacturig Egieerig Data Maagemet Module Procedure UP128A US Documetiformatio Documet Documet code : UP128A US Documet group : User Documetatio Documet title : Egieerig Data Maagemet Applicatio/Package

More information

BaanERP 5.0c. EDI User Guide

BaanERP 5.0c. EDI User Guide BaaERP 5.0c A publicatio of: Baa Developmet B.V. P.O.Box 143 3770 AC Bareveld The Netherlads Prited i the Netherlads Baa Developmet B.V. 1999. All rights reserved. The iformatio i this documet is subject

More information

A Method for Trust Quantificationin Cloud Computing Environments

A Method for Trust Quantificationin Cloud Computing Environments A Method for rust Quatificatioi Cloud Computig Eviromets Xiaohui Li,3, Jigsha He 2*,Bi Zhao 2, Jig Fag 2, Yixua Zhag 2, Hogxig Liag 4 College of Computer Sciece ad echology, Beiig Uiversity of echology

More information

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy

QUADRO tech. FSA Migrator 2.6. File Server Migrations - Made Easy QUADRO tech FSA Migrator 2.6 File Server Migratios - Made Easy FSA Migrator Cosolidate your archived ad o-archived File Server data - with ease! May orgaisatios struggle with the cotiuous growth of their

More information

Vulnerability test system for SIP network elements

Vulnerability test system for SIP network elements Vulerability test system for SIP etwork elemets Filip Rezac, Miroslav Vozak, Karel omala, Jiri Vychodil, Ja Rozho Departmet of elecommuicatios, VSB echical Uiversity of Ostrava Ostrava, Czech Republic

More information

Statistical and Fuzzy Approach for Database Security

Statistical and Fuzzy Approach for Database Security tatistical ad Fuzzy Approach for Database ecurity Gag Lu, Jukai Yi chool of Iformatio ciece ad Techology Beijig iversity of Chemical Techology Beijig 100029, Chia sizheg@126.com Kevi Lü Bruel iversity,

More information

ODBC. Getting Started With Sage Timberline Office ODBC

ODBC. Getting Started With Sage Timberline Office ODBC ODBC Gettig Started With Sage Timberlie Office ODBC NOTICE This documet ad the Sage Timberlie Office software may be used oly i accordace with the accompayig Sage Timberlie Office Ed User Licese Agreemet.

More information

Generalized Scheme For Fractal Based Digital Signature (GFDS)

Generalized Scheme For Fractal Based Digital Signature (GFDS) IJCSS Iteratioal Joural of Computer Sciece ad etwork Security, VOL.7 o.7, July 2007 99 Geeralized Scheme For Fractal Based Digital Sigature (GFDS) Mohammad Ahmad Alia ad Azma Bi Samsudi, School of Computer

More information

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method

Chapter 6: Variance, the law of large numbers and the Monte-Carlo method Chapter 6: Variace, the law of large umbers ad the Mote-Carlo method Expected value, variace, ad Chebyshev iequality. If X is a radom variable recall that the expected value of X, E[X] is the average value

More information

Data Analysis and Statistical Behaviors of Stock Market Fluctuations

Data Analysis and Statistical Behaviors of Stock Market Fluctuations 44 JOURNAL OF COMPUTERS, VOL. 3, NO. 0, OCTOBER 2008 Data Aalysis ad Statistical Behaviors of Stock Market Fluctuatios Ju Wag Departmet of Mathematics, Beijig Jiaotog Uiversity, Beijig 00044, Chia Email:

More information

FortiGuard Fortinet s Global Security Research and Protection

FortiGuard Fortinet s Global Security Research and Protection SOLUTION BRIEF FortiGuard Fortiet s Global Research ad Protectio itelligece represets kowledge of the idetity, capabilities, ad itetios of idividuals ad orgaizatios egaged i espioage, sabotage, or theft

More information

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008

In nite Sequences. Dr. Philippe B. Laval Kennesaw State University. October 9, 2008 I ite Sequeces Dr. Philippe B. Laval Keesaw State Uiversity October 9, 2008 Abstract This had out is a itroductio to i ite sequeces. mai de itios ad presets some elemetary results. It gives the I ite Sequeces

More information

Effective Hybrid Intrusion Detection System: A Layered Approach

Effective Hybrid Intrusion Detection System: A Layered Approach I. J. Computer Network ad Iformatio Security, 2015, 3, 35-41 Published Olie February 2015 i MECS (http://www.mecs-press.org/) DOI: 10.5815/ijcis.2015.03.05 Effective Hybrid Itrusio Detectio System: A Layered

More information

SIP Threats Detection System

SIP Threats Detection System SIP Threats Detectio System MIROSLAV VOZNAK, FILIP REZAC Departmet of Telecommuicatios VSB Techical Uiversity of Ostrava 17. listopadu 15, 708 33 Ostrava Poruba CZECH REPUBLIC miroslav.vozak@vsb.cz, filip.rezac@vsb.cz

More information

Capacity of Wireless Networks with Heterogeneous Traffic

Capacity of Wireless Networks with Heterogeneous Traffic Capacity of Wireless Networks with Heterogeeous Traffic Migyue Ji, Zheg Wag, Hamid R. Sadjadpour, J.J. Garcia-Lua-Aceves Departmet of Electrical Egieerig ad Computer Egieerig Uiversity of Califoria, Sata

More information

On the Periodicity of Time-series Network and Service Metrics

On the Periodicity of Time-series Network and Service Metrics O the Periodicity of Time-series Network ad Service Metrics Joseph T. Lizier ad Terry J. Dawso Telstra Research Laboratories Sydey, NSW, Australia {oseph.lizier, terry..dawso}@team.telstra.com Abstract

More information

AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT

AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT AN INTELLIGENT MODEL FOR SALES AND INVENTORY MANAGEMENT SYLVANUS O. ANIGBOGU, Ph.D. Associate Professor of Computer Sciece Departmet of Computer Sciece, Namdi Azikiwe Uiversity, Awka, Aambra State, 420001,

More information

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2

DAME - Microsoft Excel add-in for solving multicriteria decision problems with scenarios Radomir Perzina 1, Jaroslav Ramik 2 Itroductio DAME - Microsoft Excel add-i for solvig multicriteria decisio problems with scearios Radomir Perzia, Jaroslav Ramik 2 Abstract. The mai goal of every ecoomic aget is to make a good decisio,

More information

I. Chi-squared Distributions

I. Chi-squared Distributions 1 M 358K Supplemet to Chapter 23: CHI-SQUARED DISTRIBUTIONS, T-DISTRIBUTIONS, AND DEGREES OF FREEDOM To uderstad t-distributios, we first eed to look at aother family of distributios, the chi-squared distributios.

More information

Incremental calculation of weighted mean and variance

Incremental calculation of weighted mean and variance Icremetal calculatio of weighted mea ad variace Toy Fich faf@cam.ac.uk dot@dotat.at Uiversity of Cambridge Computig Service February 009 Abstract I these otes I eplai how to derive formulae for umerically

More information

1 Computing the Standard Deviation of Sample Means

1 Computing the Standard Deviation of Sample Means Computig the Stadard Deviatio of Sample Meas Quality cotrol charts are based o sample meas ot o idividual values withi a sample. A sample is a group of items, which are cosidered all together for our aalysis.

More information

Convention Paper 6764

Convention Paper 6764 Audio Egieerig Society Covetio Paper 6764 Preseted at the 10th Covetio 006 May 0 3 Paris, Frace This covetio paper has bee reproduced from the author's advace mauscript, without editig, correctios, or

More information

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT

Vladimir N. Burkov, Dmitri A. Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT Keywords: project maagemet, resource allocatio, etwork plaig Vladimir N Burkov, Dmitri A Novikov MODELS AND METHODS OF MULTIPROJECTS MANAGEMENT The paper deals with the problems of resource allocatio betwee

More information

E-Plex Enterprise Access Control System

E-Plex Enterprise Access Control System Eterprise Access Cotrol System Egieered for Flexibility Modular Solutio The Eterprise Access Cotrol System is a modular solutio for maagig access poits. Employig a variety of hardware optios, system maagemet

More information

Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security

Enterprise Security & Risk Management. White Paper. Securing the Future with Next-Generation Data Center Security Eterprise Security & Risk Maagemet White Paper Securig the Future with Next-Geeratio Data Ceter Security About the Author Prikshit Goel Prikshit Goel heads the Ceter of Excellece (CoE) for Maaged Security

More information

Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA

Telecom. White Paper. Actionable Intelligence in the SDN Ecosystem: Optimizing Network Traffic through FRSA Telecom White Paper Actioable Itelligece i the SDN Ecosystem: Optimizig Network Traffic through FRSA About the Authors Sumit Kapoor Sumit is a solutio architect i the telecom busiess uit at Tata Cosultacy

More information

Plug-in martingales for testing exchangeability on-line

Plug-in martingales for testing exchangeability on-line Plug-i martigales for testig exchageability o-lie Valetia Fedorova, Alex Gammerma, Ilia Nouretdiov, ad Vladimir Vovk Computer Learig Research Cetre Royal Holloway, Uiversity of Lodo, UK {valetia,ilia,alex,vovk}@cs.rhul.ac.uk

More information

The Forgotten Middle. research readiness results. Executive Summary

The Forgotten Middle. research readiness results. Executive Summary The Forgotte Middle Esurig that All Studets Are o Target for College ad Career Readiess before High School Executive Summary Today, college readiess also meas career readiess. While ot every high school

More information

The Stable Marriage Problem

The Stable Marriage Problem The Stable Marriage Problem William Hut Lae Departmet of Computer Sciece ad Electrical Egieerig, West Virgiia Uiversity, Morgatow, WV William.Hut@mail.wvu.edu 1 Itroductio Imagie you are a matchmaker,

More information

Soving Recurrence Relations

Soving Recurrence Relations Sovig Recurrece Relatios Part 1. Homogeeous liear 2d degree relatios with costat coefficiets. Cosider the recurrece relatio ( ) T () + at ( 1) + bt ( 2) = 0 This is called a homogeeous liear 2d degree

More information

SPC for Software Reliability: Imperfect Software Debugging Model

SPC for Software Reliability: Imperfect Software Debugging Model IJCSI Iteratioal Joural of Computer Sciece Issues, Vol. 8, Issue 3, o., May 0 ISS (Olie: 694-084 www.ijcsi.org 9 SPC for Software Reliability: Imperfect Software Debuggig Model Dr. Satya Prasad Ravi,.Supriya

More information

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL.

Annuities Under Random Rates of Interest II By Abraham Zaks. Technion I.I.T. Haifa ISRAEL and Haifa University Haifa ISRAEL. Auities Uder Radom Rates of Iterest II By Abraham Zas Techio I.I.T. Haifa ISRAEL ad Haifa Uiversity Haifa ISRAEL Departmet of Mathematics, Techio - Israel Istitute of Techology, 3000, Haifa, Israel I memory

More information

Ideate, Inc. Training Solutions to Give you the Leading Edge

Ideate, Inc. Training Solutions to Give you the Leading Edge Ideate, Ic. Traiig News 2014v1 Ideate, Ic. Traiig Solutios to Give you the Leadig Edge New Packages For All Your Traiig Needs! Bill Johso Seior MEP - Applicatio Specialist Revit MEP Fudametals Ad More!

More information

A Network Monitoring System with a Peer-to- Peer Architecture

A Network Monitoring System with a Peer-to- Peer Architecture A Network Moitorig System with a Peer-to- Peer Architecture Paulo Salvador ad Rui Valadas Uiversity of Aveiro Istitute of Telecommuicatios Summary Motivatio Peer-to-peer architecture System elemets Data

More information

Pre-Suit Collection Strategies

Pre-Suit Collection Strategies Pre-Suit Collectio Strategies Writte by Charles PT Phoeix How to Decide Whether to Pursue Collectio Calculatig the Value of Collectio As with ay busiess litigatio, all factors associated with the process

More information

PUBLIC RELATIONS PROJECT 2016

PUBLIC RELATIONS PROJECT 2016 PUBLIC RELATIONS PROJECT 2016 The purpose of the Public Relatios Project is to provide a opportuity for the chapter members to demostrate the kowledge ad skills eeded i plaig, orgaizig, implemetig ad evaluatig

More information

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA

Evaluating Model for B2C E- commerce Enterprise Development Based on DEA , pp.180-184 http://dx.doi.org/10.14257/astl.2014.53.39 Evaluatig Model for B2C E- commerce Eterprise Developmet Based o DEA Weli Geg, Jig Ta Computer ad iformatio egieerig Istitute, Harbi Uiversity of

More information

Flood Emergency Response Plan

Flood Emergency Response Plan Flood Emergecy Respose Pla This reprit is made available for iformatioal purposes oly i support of the isurace relatioship betwee FM Global ad its cliets. This iformatio does ot chage or supplemet policy

More information

CS100: Introduction to Computer Science

CS100: Introduction to Computer Science Review: History of Computers CS100: Itroductio to Computer Sciece Maiframes Miicomputers Lecture 2: Data Storage -- Bits, their storage ad mai memory Persoal Computers & Workstatios Review: The Role of

More information