Botnet Detection by Monitoring Group Activities in DNS Traffic
|
|
|
- Alexina Harmon
- 9 years ago
- Views:
Transcription
1 Bone Deecion by Monioring Group Aciviies in DNS Traffic Hyunsang Choi, Hanwoo Lee, Heejo Lee, Hyogon Kim Korea Universiy {realchs, hanwoo, heejo, Absrac Recen malicious aemps are inended o ge financial benefis hrough a large pool of compromised hoss, which are called sofware robos or simply bos. A group of bos, referred o as a bone, is remoely conrollable by a server and can be used for sending spam mails, sealing personal informaion, and launching DDoS aacs. Growing populariy of bones compels o find proper counermeasures bu exising defense mechanisms hardly cach up wih he speed of bone echnologies. In his paper, we propose a bone deecion mechanism by monioring DNS raffic o deec bones, which form a group aciviy in DNS queries simulaneously sen by disribued bos. A few wors have been proposed based on paricular DNS informaion generaed by a bone, bu hey are easily evaded by changing bo programs. Our anomaly-based bone deecion mechanism is more robus han he previous approaches so ha he varians of bos can be deecable by looing a heir group aciviies in DNS raffic. From he experimens on a campus newor, i is shown ha he proposed mechanism can deec bones effecively while bos are connecing o heir server or migraing o anoher server. I. INTRODUCTION Explosive growh of he Inerne provides much improved accessibiliy o huge amoun of valuable daa. However, numerous vulnerabiliies are exposed and he number of incidens is increasing over ime. Especially, recen malicious aemps are differen from old-fashioned hreas, inended o ge financial benefis hrough a large pool of compromised hoss. This horrifying new ype of hreas ha endanger millions of people and newor infrasrucure around he world. For example, hey seals personal informaion which can lead o significan financial losses and simulaneously, used for delivering spam mails, and launching DDoS (Disribued Denial of Service) aacs. A large pool of compromised hoss, called bos, communicae wih a bo conroller o coordinae he newor of bos. Such a newor is commonly referred o as a bone. An aacer, called a bomaser, conrols a bone o perform various malicious aciviies. Recen aacs show ha heir inenions are o gain financial benefis from he aacs. Mos bos can perform a hybrid of previous hreas engaged wih a communicaion sysem. They can propagae lie Inerne worms, hide hemselves from deecion sysems, and launch DDoS aac lie DDoS aac oolis. These This wor was suppored in par by he ITRC program of he Korea Minisry of Informaion, and Basic Research Program of he Korea Science & Engineering Foundaion. This wor was parially suppored by Defense Acquisiion Program Adminisraion and Agency for Defense Developmen under he conrac(ud060048ad). crossbreed echniques mae he bone inelligen and hard o be handled hrough a securiy mechanism. One prominen characerisic of bones is he use of command and conrol (C&C) channels. The main purpose of he channels is o deliver he commands of a bomaser. And oday s bones use he Inerne Relay Cha (IRC) proocol [1], which is mainly designed for group communicaion in discussion forum called channels. Bu he channels are now used for he communicaion of a bone among disribued bos and heir conroller. Defending agains bones is a pressing problem ha is sill no well comprehended, hough bones firs appeared several years ago. Former defense mechanisms focused on a paricular sympom of bos or a signaure of bo programs. Even hough he sudies were meaningful o develop beer defense mechanisms, heir approaches have inrinsic limis such as he ineffeciveness for deecing unnown bo programs which are a sligh modificaion of an exising bo program or newly generaed bo programs. Recen sudies such as [2] on bone measuremens and heir deecion also have he same weaness for he varians of bo programs. The main conribuion of his sudy is he developmen of an anomaly-based bone deecion mechanism by monioring group aciviies in DNS raffic. Bomaser consrucs and manages his bone in several seps and bos rally o (C&C) server a an early sage. Mos of bos use DNS in rallying process and he DNS raffic have unique feaures which we define as group aciviy. The DNS raffic also appeared in oher sages herefore, by using he group aciviy propery of bone DNS raffic, we can deec bone. There are a few sudy which use DNS o deec he bone and some of hem used DNS redirecion o monior bones. However, hey are easily evaded when a bomaser nows hem. Noneheless, our approach does no need any DNS redirecion and communicaion wih any componen of bone. We have developed he bone deecion mechanism wih he following four seps. Firs, we found several feaures of bone DNS raffic ha is disinguishable from legiimae DNS raffic. Second, we defined he ey feaure of DNS raffic called group aciviy. Third, we developed an algorihm ha differeniae bone DNS query by using group aciviy feaure. Las, we analyzed he algorihm o prove feasibiliy of our mechanism. The mechanism are an anomaly-based deecion mechanism, so ha we can deec bone regardless of he ype of bo and bone. The mechanism uses he informaion of IP headers and ha enables o deec bone, even hough
2 hey uses SSH(Secure Shell) or any oher channel encrypion mehods. Moreover, mechanism can deec bone irrespecive of proocol which hey use. We also developed a mechanism ha enable o deec C&C server migraion. Bone frequenly change is C&C server by migraing o candidae C&C server. Our algorihm can find he bone even hough bos are migraing o oher candidae C&C server. Secion 2 shows he relaed wors of bones. Secion 3 describes main feaures of bones, including he unique paern of bone DNS raffic, rallying problem and migraion of bone. Then, we will inroduce a bone deecion mechanism in Secion 4 and evaluae he feasibiliy and effeciveness of he mechanism in Secion 5. II. RELATED WORK The exisence of bones was recognized several years ago, bu he sudies for defending bones are sill in an early sage. Some securiy companies and insiuions have analyzed he bone raffic, he mehod of propagaion and furhermore proposed he bone deecion and response mechanisms. However, heir defense mechanisms are focused on he sympoms of abnormal newor raffic and bo binary deecions by maching wih he signaures of nown bo codes. Even hough hese are useful for many cases, hey have ineviable limiaions such ha hey are unable o deec new or modified bos. There have been a few researches on he mehodological analysis abou he bo and bone such as heir behaviors, saisics, and raffic measuremens. Jones [3] provided bone bacground and recommendaions so ha newor and sysem securiy adminisraors can recognize and defend agains bone aciviy. Cooe e al. [4] oulined he origins and srucure of bos and bones, daa from he operaor communiy and sudy he effeciveness of deecing bones by direcly monioring IRC communicaion or oher command and conrol aciviy and show a more comprehensive approach is required. Barford e al. presened a perspecive based on an in-deph analysis of bo sofware source code and reveals he complexiy of bone sofware, discusses implicaions for defense sraegies based on he analysis [5]. Rajab e al. [2] consruced a mulifaceed infrasrucure o capure and concurrenly rac muliple bones in he wild, and achieved a comprehensive analysis of measuremens reflecing several imporan srucural and behavioral aspecs of bones. They sudied he bone behavior, bone prevalence on he Inerne, and modeling he bone life cycle. Recenly, a few aemps have been made o cope wih bone problems and mos of hem have come o focus on deecion of bone. Bos are sending DNS queries in order o access he C&C channel server. If we could now he name of domain name of C&C channel server hen we can blaclising he domain name for sinhole echniques o capure he bone raffic and measure he bone. Dagon e al. [6] idenified ey merics for measuring he uiliy of a bone, and describe various opological srucures bone may use o coordinae aacs. And using he performance merics, hey consider he abiliy of differen response echniques o degrade or disrup bones. Their sudy used DNS redirecion o monior bones. However our approach does no need any DNS redirecion and communicaion wih any componen of bone. Dagon also presen bone Deecion and response approach [7] wih analyzing peculiariy of bone rallying DNS raffic (paricularly, measuring canonical DNS reques rae and DNS densiy comparison). However he deecion echnique could easily be evaded when bomasers now he mechanism and poisoned by using faed DNS queries. Krisoff [8] also suggesed a similar approach, bu he mechanism has he same weaness. Binley [9] proposed an anomaly-based algorihm for deecing IRC-based bone meshes. The algorihm combines an IRC mesh deecion componen wih a TCP scan deecion heurisic called he TCP wor weigh. They can deec IRC channel wih high wor weigh hos bu some of hem could no be a member of bone (false posiive), addiional analysis for many borderline cases as hey menioned in he paper. Ramachandran [10] developed echniques and heurisics for deecing DNSBL reconnaissance aciviy, whereby bomasers perform looups agains he DNSBL o deermine wheher heir spamming bos have been blaclised. This approach of bone deecion is derived from novel idea ha deec DNSBL reconnaissance aciviy of bomaser bu also have false posiives and some defecs ha is referred in heir paper. Bones are consruced and managed in several sages such as bo infecion, C&C server rallying, and oher ypes of malicious aciviies. Defense agains bone aacs seems o be a very complicaed as. Only a few of wors have been done in his area, bu we need furher improvemens for he purpose of pracical use. Moreover, previous wors are difficul o be used for finding all ypes of bone because he bone have complex behavior paerns. A. Growh of Bone III. BOTNET A bone is a large pool of compromised hoss ha are conrolled by a bomaser. Recen bones use he Inerne Relay Cha (IRC) server as heir C&C server for conrolling he bone. Bomaser can disperse commands o his bone by he use of he IRC C&C channel. I was shown ha mos bones use he IRC for C&C process [11], however he raffic among bos, he C&C sever and he bomaser can be considered as legiimae raffic because i is hard o disinguish from normal raffic. The size and prevalence of he bone repored as many as 172,000 new bos recruied every day according o CipherTrus [12], which means abou 5 million new bos are appeared every monh. Symanec [13] recenly repored ha he number of bos observed in a day is 30,000 on average. The oal number of bo infeced sysems has been measured o be beween 800,000 o 900,000. A single bone comprised of more han 140,000 hoss was found in he wild and bone driven aacs have been responsible for single DDoS aacs of more han 10Gbps capaciy [14].
3 B. Rally Problem and IRC Server Since vulnerable hoss are infeced hrough self-propagaing worms, messages, messengers and oher random spreading processes, he ey problem of a bomaser is how o rally he infeced hoss. Bomaser wan heir bones o be invisible and porable and herefore, hey uses DNS for rallying. I is possible o use oher mehod for rallying he bos, however mos of hem canno provide boh mobiliy and invisibiliy a he same ime. For example, if bo binary has he IP address of C&C server as hard coded sring, hen he C&C server can be perilous o reverse engineering. Even hough he IP address of C&C server is obfuscaed o preven rivial reverse engineering analysis, he hard coded IP address is unchangeable, so i canno provide any mobiliy. If he C&C server is no secure or mobile, i is easy o cleaned and ineffecive. A single alarm or misuse repor can provoe he C&C server o be quaranined or he bone suspended. C. C&C Server Migraion If a bone uses only a single C&C server, he bone could easily be deeced and disarmed. Thus, a bomaser wans o arrange several C&C servers which can be lised in he bo binary for he sabiliy of he bone and uses a dynamic DNS (DDNS) [15] which is a resoluion service ha auomaically perceives he change of he IP address of a server and subsiues he DNS record by frequen updaes and changes, for eeping he bones porable. And even hough he roo C&C server canno operae well or lin failure occurred, candidae C&C servers can be a feasible subsiuion for he roo C&C server. I is observed ha bones were migrae heir C&C server frequenly [6], eiher by being insruced o move o a new IRC channel/server or o download a replacemen sofware which poined hem o a differen C&C server. There are some capured evidence of such migraion occurrence which is simulaneously paricipaing in wo separae bones. The bomaser move his bone by changing he C&C server for evading o be capured. In he wild, here observed mos of hem (65%) are moved only up for 1 day [16]. Even hough previous domain name of bone C&C server is bloced, bomaser can jus moves his bone o anoher candidae C&C server. D. Feaures of Bone DNS As menioned above, infeced hoss auomaically access he C&C server wih is domain name. Therefore, DNS RR (resource record) query is used and such a query also appears a oher siuaions. Following 5 cases show he siuaions of he DNS query used in bone. (1) A he rallying procedure: If he hos infecion success, he infeced hoss should be gahered and as referred in previous secion 3.B, DNS is used. (2) A he malicious behaviors of a bone: Several ypes of malicious aciviies such as DDoS aac and spam mailing are accompanied wih he DNS ransmi. (3) A C&C server lin failures: If he newor or lin of C&C server fails, bos canno access o he C&C server, afer a while (undergo failure of TCP 3-way handshaing), hey begin o send he DNS query o DNS server. (4) A C&C server migraion: As menioned Secion 3.C, he bone migrae one o anoher candidae C&C server. In ha momen, DNS query also used. (5) A C&C server IP address changes: If a C&C server uses dynamic allocaed IP (DHCP), he corresponding IP address can be changed a any ime and a bomaser also can change he IP address of he C&C server inenionally. If he IP address of he C&C server changed, he bos canno connec he old IP address of he server, so hey send he DNS query o access new C&C server. Bone DNS Legiimae DNS Fig. 1. Source IPs accessed o domain name Fixed size Group (Bone members) Anonymous (Legiimae users) Aciviy and Appearance Paerns Group aciviy Inermienly appeared (Specific siuaion) Non-group aciviy Randomly and coninuously appered (Usually) DNS Type Usually DDNS Usually DNS Differences beween Bone and Legiimae DNS DNS queries of bones can be disinguishable from legiimae DNS queries, by unique feaures of he bone DNS queries. Figure 1 shows some differences beween bone DNS queries and legiimae DNS queries. Firs, only bone members send queries o he domain name of C&C server(fixed size), legiimae user never queries o he C&C server domain name. Therefore, he number of differen IP address which queried bone domain is normally fixed. On he oher hand, he legiimae cies are queried from anonymous users (random) a usually. Second, he fixed members of bone ac and migrae ogeher a he same ime. The group aciviy of bone derived from his propery. DNS queries from bone occurr emporary and simulaneously. However, mos of legiimae DNS queries occur coninuously and do no occur simulaneously. The bone queries appears a specified siuaions which menioned above, so hey appeared inermienly. Third, he bone uses DDNS for C&C server usually, bu legiimae cies do no commonly use DDNS. IV. DNS-BASED BOTNET DETECTION MECHANISM A. Bone DNS Query Deecion Algorihm We developed a bone DNS query deecion algorihm by using he differen feaures of bone DNS and legiimae DNS which menioned in Secion 3.D. The algorihm separaed 3 differen pars which are (1) Inser-DNS-Query, (2) Delee- DNS-Query, (3) Deec-BoDNS-Query. Figure2 shows he Inser-DNS-Query sage of algorihm. There is a daabase for soring DNS query daa which include source IP address of he query, domain name of he query and imesamp of he query received. We grouping he DNS query daa by he domain name and imesamp. Fig 3, 4, 5 demonsrae he algorihm wih pseudo code. Firs, here is an array A prepared for soring
4 (D)DNS quer ies (D)DNS quer ies (D)DNS quer ies Daabase Sour ce IP addr ess Quer y domain name Ti m e s a m p Query w w w.xxx.ne 1 Query c c s.orea.ac.r Dom ain Nam e Name Source IP address IP address 1 IP address 2 IP address 3 IP address 4 IP address 5... Delee-DNS-Query ( A 1 FOR = 1 o n 2 W, T= Whielis, size hreshold ) 3 IF ( DN is in W) OR ( DN => cn< T) 4 delee( DN, A ) 5 6 ENDIF delee( IPLis ), delee( cn ) 6 ENDFOR End of Delee-DNS-Query Fig. 4. Delee-DNS-Query Fig. 2. IP address 6 G r ouping quer ies by quer y domain name and imesamp Inser-DNS-Query Inser-DNS-Query (Q ) Q = DNS queries beween ime -1 and 1 A =Array for DNS queries 2 DN = Reques domain name of Q 3 IF DN is no in A 4 inser( DN, A ) 5 6 IP, IPLis = IP address of Q, IP lis of DN inser( IP, IPLis ) 7 ELSE IF IP is no in IPLis 8 cn = size of IPLis 9 cn 10 inser( IP, IPLis ) 11 ENDIF 12 ENDFOR ++ End of Inser-DNS-Query Fig. 3. Inser-DNS-Query he DNS queries. We insered he domain name and source IP address of queries o A. If a new query comes in, checing i already exised in A. If i is a new domain name, inser daa. Oherwise, chec he IP address already exis in he IP lis of he domain name and inser he IP address if i is no exis in he IP lis. In his sep, he daa (domain name, source IP addresses and imesamps) of DNS queries are arranged by he requesed domain name. Second, excue he Delee-DNS- Query sep for removing redundan DNS query. If he size of IP lis do no exceed he size hreshold or he domain name is legiimae which already exis in a whielis, he domain name of queries do no have o be processed. Therefore, i should be removed from array A for reducing he processing overhead and saving he memory. Finally, we find he bone DNS queries in Deec-BoDNS-Query sep. We define and compue numerical value of group aciviy of bone DNS, called similariy. If here are wo IP liss which are requesed a ime 1 and 2 and have a same domain name query, assume ha each size of IP liss as A and B. And if here were same IP addresses beween wo IP liss, assume he size of duplicaed Deec-BoDNS-Query (A 1 FOR = 1 o n 2 IF ( A => DN ) is equal o ( A => DN ) 3 4 ) 1 2 similariy( A => IPLis, A => IPLis ) 1 2 S = compued similariy 5 IF S > a, a = Similariy hreshold = 6 DN is done domain name 7 ELSE IF S = - 1 THEN inser( BL, DN ) BL blaclis 8 ELSE inser( W, DN ) 9 ENDIF End of Deec-BoDNS-Query Fig. 5. Deec-BoDNS-Query IP addresses as C. We le S denoe he similariy such ha S = 1 2 (C A + C )(A 0, B 0). B If A = 0 or B = 0 hen we define he similariy as -1. If he similariy approximaed 0, whielising he domain name and delee he IP lis of he domain. Assume ha here is domain name DN which requesed by muliple source IP addresses in a cerain ime, we measure how many source IP addresses of hem reques DN afer in each ime slo. Due o he feaures of bone DNS which menioned in Secion 3.4 he similariy of bone DNS close o 1 differen from legiimae DNS. And he suspicious domain name ha occurred jus one ime and could be occurred laer, which have he value of similariy -1, inser he domain name o blaclis o be moniored afer ha ime. B. Migraing Bone Deecion Algorihm The algorihm of bone DNS query deecion enables us o disinguish he bone. However, he algorihm canno deec bones migraing o anoher C&C server. Therefore, we developed he migraing bone deecion algorihm wih modifying he bone DNS query deecion algorihm. The firs and second sage( Inser-DNS-Query and Delee-DNS-Query) are same bu hird sep of algorihm is differen. During he migraion of bone, bos use wo differen domain name of C&C server, herefore we compare he IP liss of differen domain name which have similar size of IP lis. Here, similar size deermined on basis of experimen. As we menioned
5 Secion 3.3, bomaser move heir bones frequenly o change he C&C server and mos of hem (65%) are only up for 1 day in he wild. Therefore, he deecion algorihm of migraion aciviy is significan par of he bone deecion sysem. C. Bone Deecion Sysem The bone deecion sysem ha combines boh of bone query deecion and migraing bone deecion, requires DNS raffic daa. And i can be ideal ha large scale of DNS raffic daa from deployed sensors is provided for he inpu daa because bones usually dispersed a differen newors. Therefore, if he deecion sysem applied for small newor, deecion accuracy can be decreased. Moreover, he sysem is sensiive o he hreshold values so, i mus be carefully decided. Disribuion (max) 1 disribuion of IP lis Size of IP lis Fig. 6. Disribuion of IP Lis Size V. EVALUATION In order o evaluae he effeciveness of he proposed mechanism, we have measured he deecion performance in our esbed newor. The proposed mechanism is implemened as a bone deecion sysem and he sysem is execued on a campus newor wih bones. We have creaed a Agobo code which is one of he mos famous bo and secured he IRC C&C server and is channels. Over 50 machines are used in he bone and he esbed newor is lined wih he campus newor, herefore we carefully made our bone invisible and secure o preven bone from being exposed. We made he scenario scrip for verifying he algorihms and he scenario includes bone consrucion, rally o he C&C server and command and conrol for spam mailing, DDoS aac, C&C server migraion, ec. The scenario conains he siuaion which menioned in Secion 3.4 for validaing bone DNS query deecion algorihm. We also migraes our bone from roo IRC C&C server o candidae IRC server for verifying he migraing bone deecion algorihm. We use Penium 4 processor PCs ha operae on Windows XP. Defaul values of parameers are as follows. A ime uni is 1 hour and a size hreshold for he deecion algorihm is 5(size of IP Lis) and similariy hreshold is 0.8, because i is he adequae value which is beween a similariy of bone domain and a maximum similariy of legiimae domains. We esed our bone for evaluaion, and capured he raffic for 10 hours. A. Bone DNS Query Deecion The bone in our esbed performs several inds of aciviies which include spam mailing, DDoS, C&C server migraion, ec. To be sure, some of hem provoe DNS raffic and consequenly, our algorihm can deec he bone nicely. The size of IP address lis are disribued as shown in Fig. 6. The size of IP lis means he differen number of source IP addresses which queried same domain name during 1 hour and he Fig. 6. shows ha over 80% of he IP lis size was 1. i means ha mos of he DNS queries are sen from only 1 hos during 1 hour. The size hreshold of IP lis is seled wih 5 and i resuls 92.5% of DNS queries eliminaed which gives grea efficiency of he bone DNS query deecion algorihm. Simliariy (a) pdbox (b) bone (c) idis (d) pruna Domain Name similariy (hreshold = 0.8) Fig. 7. (e) soribada Similariy of Each Domain Name In conclusion, our algorihm can deec he bone properly if over 5 members of bone are exised in he C class size of newor (he size of our experimen campus newor). The algorihm chec all domain names ha was no eliminaed from previous sep. The similariies in a cerain ime are shown in Fig. 7 and here are abou 2300 differen domain names which include bone domain name (if he domain name could affiliaed each oher we plo he highes value of similariy). Mos of similariies equal o 0 or -1 (90%). Suppose ha domain name DN is source IP lis A during ime and IP lis B during + 1 queried DN. In ha case, if a compued similariy of DN is equal o 0 and ha means he IP Lis A are oally differen from B. If he similariy of DN is -1, DN is jus only requesed jus once ( or + 1) and hey added in blaclis of he algorihm because hey are suspicious o be he domain of bone. Oher domain names mosly ranged from 0 o 0.2 (7.4%). I implies ha a cerain hos which queried a domain(ranged from 0 o 0.2) in imeslo 1, could send query o he same domain in 1+1 wih he probabiliy from 0% o 20%. Only he similariy of bone domain exceeds hreshold 0.8, so he bone domain name could be deeced. Some ineresing domain names which have a similariy larger han 0.2 are shown in Fig. 7 ((a) (e)) and all
6 of hem were idenified as P2P cies or a cie of enormous size of file ransferring. (a) is he domain name of pdbox [17] and (c) is he domain name of idis [18], boh cies provide he service of uploading and downloading large size of personal files which are movie, game, mp3, ec. (d) is he domain name of pruna [19] and (e) is he domain name of soribada [20], boh provide P2P service. We conjecure he reason ha he users who have accessed P2P or file ransferring cie end o eep up he connecion and more coninuously access he same cie more han oher cies. Therefore, he similariy of hese domains have higher similariy han oher domains. B. Migraing Bone Deecion We also run migraing bo deecion algorihm wih he scenario scrip. In he wors case, algorihm runs on O(n 2 ). Similariy (max) bo migraion (deeced) IP lis Size similariy (hreshold = 0.8) Fig. 8. Similariy of Each Size of IP Lis Neverheless, our algorihm operaes in a reasonable ime (abou 5 minue for 1 hour DNS race) because he algorihm remove he se of IP liss which do no exceed he size hreshold (92.5% of DNS queries removed). Here, he similar size are seled wihin 10% of he size of IP lis. For example if he size of IP lis is 100, hen we compare he IP lis wih all of oher IP lis ha has he size wihin 95 o 105. One of he resuls which include bone migraion is shown in Fig. 8 and he algorihm deec he migraing bo correcly. Mos of IP lis has he similariy ha geing lower as he size of IP lis increase, because if he size of IP lis geing larger, a probabiliy of which he source IP addresses beween wo similar size of IP lis duplicaes geing lower. VI. DISCUSSION Our algorihm wored properly in reasonable processing ime, bu if we assume he siuaion ha our sysem monior huge scale of newor hen he processing ime can be a big problem. Hash ables are a grea soluion for dealing he IP address looup and we consider i for our fuure wor. The bone can evade our algorihms when he bone uses DNS only a iniializing and never use i again (moreover, do no migrae he bone). If we could find IP group lis of IRC raffic in C&C process or aac raffic such as spam mailing or DDoS aac, we can compare each IP liss of hem. Here, he IP liss provider can be he IDS, IPS or oher aac deecion sysems. I is possible o paralyze our algorihm wih inenionally generaed DNS queries ha spoof heir sources. The fabricaed paces, our algorihm could be poisoned. In his research, we do no care abou he siuaion of poisoning, bu a simple preprocessing can be a soluion. If we chec he 3-way handshaing of TCP raffic and record he IP addresses o he lis which endures handshaing. Then we could eliminaes he faed IP addresses of he DNS raffic ha do no endure he handshaing. VII. CONCLUSION I is necessary o provide appropriae counermeasure for bone which become a one of he bigges hrea of newor securiy and major conribuor o unwaned newor raffic. Therefore we researched a simple mechanism o deec a bone by using a DNS queries which used by bone. We found significan feaures of bone DNS queries which discriminae from legiimae DNS queries. The wo differen algorihm for bone deecion are proposed and boh can deec he specific aciviy of bone nicely. Wih our suggesed sysem newor adminisraor enable o deec bo agens and dispose hem. REFERENCES [1] J. Oiarinen and D. Reed, Inerne relay cha proocol. RFC 1459, [2] M. A. Rajab, J. Zarfoss, F. Monrose, and A. Terzis, A mulifaceed approach o undersanding he bone phenomenon, in Inerne Measuremens Conference (IMC 06), Oc [3] J. Jones, Bones: Deecion and miigaion, Feb FEDCIRC. [4] E. Cooe, F. Jahanian, and D. McPherson, The zombie roundup: Undersanding, deecing, and disurbing bones, in The 1s Worshop on Seps o Reducing Unwaned Traffic on he Inerne (SRUTI 05), July [5] P. Barford and V. Yegneswaran, An inside loo a bones, Special Worshop on Malware Deecion, Advances in Informaion Securiy, Springer Verlag. [6] D. Dagon, C. Zou, and W. Lee, Modeling bone propagaion using ime zones, in NDSS 2006, Feb [7] D. Dagon, Bone deecion and response, in OARC Worshop, 2005, [8] J. Krisoff, Bones, Oc nd Meeing of he Norh American Newor Operaors Group. [9] J. R. Binley and S. Singh, An algorihm for anomaly-based bone deecion, in The 2nd Worshop on Seps o Reducing Unwaned Traffic on he Inerne (SRUTI 06), [10] A. Ramachandran, N. Feamser, and D. Dagon, Revealing bone membership using dnsbl couner-inelligence, in The 2nd Worshop on Seps o Reducing Unwaned Traffic on he Inerne (SRUTI 06), [11] M. Overon, Bos and bones, in Virus Bullein 2005, Oc [12] Cipherrus, secure compuing. hp:// [13] Symanec Co., hp:// [14] D. McPherson, Fingerprin sharing: The need for auomaion of iner-domain informaion sharing, May hp:// [15] P. Vixie, S. Thomson, Y. Reher,, and J. Bound, Dynamic updaes in he domain name sysem (dns updae), hp:// [16] D. Song, personal communicaion, Oc Korea Universiy Securiy Seminar. [17] NOWCOM Co., pdbox, hp:// [18] KTH Co., idis, hp://idis.paran.com/. [19] MEDIAPORT Co., pruna P2P, hp:// [20] SORIBADA Inc., soribada P2P, hp://
DDoS Attacks Detection Model and its Application
DDoS Aacks Deecion Model and is Applicaion 1, MUHAI LI, 1 MING LI, XIUYING JIANG 1 School of Informaion Science & Technology Eas China Normal Universiy No. 500, Dong-Chuan Road, Shanghai 0041, PR. China
TSG-RAN Working Group 1 (Radio Layer 1) meeting #3 Nynashamn, Sweden 22 nd 26 th March 1999
TSG-RAN Working Group 1 (Radio Layer 1) meeing #3 Nynashamn, Sweden 22 nd 26 h March 1999 RAN TSGW1#3(99)196 Agenda Iem: 9.1 Source: Tile: Documen for: Moorola Macro-diversiy for he PRACH Discussion/Decision
Performance Center Overview. Performance Center Overview 1
Performance Cener Overview Performance Cener Overview 1 ODJFS Performance Cener ce Cener New Performance Cener Model Performance Cener Projec Meeings Performance Cener Execuive Meeings Performance Cener
The Application of Multi Shifts and Break Windows in Employees Scheduling
The Applicaion of Muli Shifs and Brea Windows in Employees Scheduling Evy Herowai Indusrial Engineering Deparmen, Universiy of Surabaya, Indonesia Absrac. One mehod for increasing company s performance
Automatic measurement and detection of GSM interferences
Auomaic measuremen and deecion of GSM inerferences Poor speech qualiy and dropped calls in GSM neworks may be caused by inerferences as a resul of high raffic load. The radio nework analyzers from Rohde
PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE
Profi Tes Modelling in Life Assurance Using Spreadshees PROFIT TEST MODELLING IN LIFE ASSURANCE USING SPREADSHEETS PART ONE Erik Alm Peer Millingon 2004 Profi Tes Modelling in Life Assurance Using Spreadshees
Secure Election Infrastructures Based on IPv6 Clouds
Secure Elecion Infrasrucures Based on IPv6 Clouds Firs IPv6-only OpenSack Cloud used o deliver producion services is de-ployed by Nephos6, Cikomm and SnT-Universiy of Luxembourg. Laif Ladid, Presiden,
SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS
SELF-EVALUATION FOR VIDEO TRACKING SYSTEMS Hao Wu and Qinfen Zheng Cenre for Auomaion Research Dep. of Elecrical and Compuer Engineering Universiy of Maryland, College Park, MD-20742 {wh2003, qinfen}@cfar.umd.edu
Trends in TCP/IP Retransmissions and Resets
Trends in TCP/IP Reransmissions and Reses Absrac Concordia Chen, Mrunal Mangrulkar, Naomi Ramos, and Mahaswea Sarkar {cychen, mkulkarn, msarkar,naramos}@cs.ucsd.edu As he Inerne grows larger, measuring
Detection of DDoS Attack in SIP Environment with Non-parametric CUSUM Sensor
Deecion of DDoS Aac in SIP Environmen wih Non-parameric CUSUM Sensor Luigi Alcuri Universiy of Palermo Deparmen of Elecrical, Elecronic and Telecommunicaion Engineering [email protected] Piero Cassarà
Chapter 1.6 Financial Management
Chaper 1.6 Financial Managemen Par I: Objecive ype quesions and answers 1. Simple pay back period is equal o: a) Raio of Firs cos/ne yearly savings b) Raio of Annual gross cash flow/capial cos n c) = (1
Chapter 8: Regression with Lagged Explanatory Variables
Chaper 8: Regression wih Lagged Explanaory Variables Time series daa: Y for =1,..,T End goal: Regression model relaing a dependen variable o explanaory variables. Wih ime series new issues arise: 1. One
Towards Intrusion Detection in Wireless Sensor Networks
Towards Inrusion Deecion in Wireless Sensor Neworks Kroniris Ioannis, Tassos Dimiriou and Felix C. Freiling Ahens Informaion Technology, 19002 Peania, Ahens, Greece Email: {ikro,dim}@ai.edu.gr Deparmen
Multiprocessor Systems-on-Chips
Par of: Muliprocessor Sysems-on-Chips Edied by: Ahmed Amine Jerraya and Wayne Wolf Morgan Kaufmann Publishers, 2005 2 Modeling Shared Resources Conex swiching implies overhead. On a processing elemen,
Model-Based Monitoring in Large-Scale Distributed Systems
Model-Based Monioring in Large-Scale Disribued Sysems Diploma Thesis Carsen Reimann Chemniz Universiy of Technology Faculy of Compuer Science Operaing Sysem Group Advisors: Prof. Dr. Winfried Kalfa Dr.
USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES
USE OF EDUCATION TECHNOLOGY IN ENGLISH CLASSES Mehme Nuri GÖMLEKSİZ Absrac Using educaion echnology in classes helps eachers realize a beer and more effecive learning. In his sudy 150 English eachers were
Impact of scripless trading on business practices of Sub-brokers.
Impac of scripless rading on business pracices of Sub-brokers. For furher deails, please conac: Mr. T. Koshy Vice Presiden Naional Securiies Deposiory Ld. Tradeworld, 5 h Floor, Kamala Mills Compound,
Market Liquidity and the Impacts of the Computerized Trading System: Evidence from the Stock Exchange of Thailand
36 Invesmen Managemen and Financial Innovaions, 4/4 Marke Liquidiy and he Impacs of he Compuerized Trading Sysem: Evidence from he Sock Exchange of Thailand Sorasar Sukcharoensin 1, Pariyada Srisopisawa,
Mining Web User Behaviors to Detect Application Layer DDoS Attacks
JOURNAL OF SOFWARE, VOL. 9, NO. 4, APRIL 24 985 Mining Web User Behaviors o Deec Applicaion Layer DDoS Aacks Chuibi Huang Deparmen of Auomaion, USC Key laboraory of nework communicaion sysem and conrol
Journal Of Business & Economics Research September 2005 Volume 3, Number 9
Opion Pricing And Mone Carlo Simulaions George M. Jabbour, (Email: [email protected]), George Washingon Universiy Yi-Kang Liu, ([email protected]), George Washingon Universiy ABSTRACT The advanage of Mone Carlo
Single-machine Scheduling with Periodic Maintenance and both Preemptive and. Non-preemptive jobs in Remanufacturing System 1
Absrac number: 05-0407 Single-machine Scheduling wih Periodic Mainenance and boh Preempive and Non-preempive jobs in Remanufacuring Sysem Liu Biyu hen Weida (School of Economics and Managemen Souheas Universiy
Morningstar Investor Return
Morningsar Invesor Reurn Morningsar Mehodology Paper Augus 31, 2010 2010 Morningsar, Inc. All righs reserved. The informaion in his documen is he propery of Morningsar, Inc. Reproducion or ranscripion
The Grantor Retained Annuity Trust (GRAT)
WEALTH ADVISORY Esae Planning Sraegies for closely-held, family businesses The Granor Reained Annuiy Trus (GRAT) An efficien wealh ransfer sraegy, paricularly in a low ineres rae environmen Family business
The Real Business Cycle paradigm. The RBC model emphasizes supply (technology) disturbances as the main source of
Prof. Harris Dellas Advanced Macroeconomics Winer 2001/01 The Real Business Cycle paradigm The RBC model emphasizes supply (echnology) disurbances as he main source of macroeconomic flucuaions in a world
TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS
TEMPORAL PATTERN IDENTIFICATION OF TIME SERIES DATA USING PATTERN WAVELETS AND GENETIC ALGORITHMS RICHARD J. POVINELLI AND XIN FENG Deparmen of Elecrical and Compuer Engineering Marquee Universiy, P.O.
Efficient One-time Signature Schemes for Stream Authentication *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 611-64 (006) Efficien One-ime Signaure Schemes for Sream Auhenicaion * YONGSU PARK AND YOOKUN CHO + College of Informaion and Communicaions Hanyang Universiy
MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR
MACROECONOMIC FORECASTS AT THE MOF A LOOK INTO THE REAR VIEW MIRROR The firs experimenal publicaion, which summarised pas and expeced fuure developmen of basic economic indicaors, was published by he Minisry
BOTNET Detection Approach by DNS Behavior and Clustering Analysis
BOTNET Detection Approach by DNS Behavior and Clustering Analysis Vartika Srivastava, Ashish Sharma Dept of Computer science and Information security, JIIT Noida, India Abstract -Botnets are one of the
Analysis of Pricing and Efficiency Control Strategy between Internet Retailer and Conventional Retailer
Recen Advances in Business Managemen and Markeing Analysis of Pricing and Efficiency Conrol Sraegy beween Inerne Reailer and Convenional Reailer HYUG RAE CHO 1, SUG MOO BAE and JOG HU PARK 3 Deparmen of
Individual Health Insurance April 30, 2008 Pages 167-170
Individual Healh Insurance April 30, 2008 Pages 167-170 We have received feedback ha his secion of he e is confusing because some of he defined noaion is inconsisen wih comparable life insurance reserve
Making a Faster Cryptanalytic Time-Memory Trade-Off
Making a Faser Crypanalyic Time-Memory Trade-Off Philippe Oechslin Laboraoire de Securié e de Crypographie (LASEC) Ecole Polyechnique Fédérale de Lausanne Faculé I&C, 1015 Lausanne, Swizerland [email protected]
Distributing Human Resources among Software Development Projects 1
Disribuing Human Resources among Sofware Developmen Proecs Macario Polo, María Dolores Maeos, Mario Piaini and rancisco Ruiz Summary This paper presens a mehod for esimaing he disribuion of human resources
Task is a schedulable entity, i.e., a thread
Real-Time Scheduling Sysem Model Task is a schedulable eniy, i.e., a hread Time consrains of periodic ask T: - s: saring poin - e: processing ime of T - d: deadline of T - p: period of T Periodic ask T
Real-time Particle Filters
Real-ime Paricle Filers Cody Kwok Dieer Fox Marina Meilă Dep. of Compuer Science & Engineering, Dep. of Saisics Universiy of Washingon Seale, WA 9895 ckwok,fox @cs.washingon.edu, [email protected] Absrac
How To Calculate Price Elasiciy Per Capia Per Capi
Price elasiciy of demand for crude oil: esimaes for 23 counries John C.B. Cooper Absrac This paper uses a muliple regression model derived from an adapaion of Nerlove s parial adjusmen model o esimae boh
Duration and Convexity ( ) 20 = Bond B has a maturity of 5 years and also has a required rate of return of 10%. Its price is $613.
Graduae School of Business Adminisraion Universiy of Virginia UVA-F-38 Duraion and Convexiy he price of a bond is a funcion of he promised paymens and he marke required rae of reurn. Since he promised
Impact of Human Mobility on Opportunistic Forwarding Algorithms
Impac of Human Mobiliy on Opporunisic Forwarding Algorihms Augusin Chainreau, Pan Hui, Jon Crowcrof, Chrisophe Dio, Richard Gass, and James Sco *, Universiy of Cambridge Microsof Research Thomson Research
Research on Inventory Sharing and Pricing Strategy of Multichannel Retailer with Channel Preference in Internet Environment
Vol. 7, No. 6 (04), pp. 365-374 hp://dx.doi.org/0.457/ijhi.04.7.6.3 Research on Invenory Sharing and Pricing Sraegy of Mulichannel Reailer wih Channel Preference in Inerne Environmen Hanzong Li College
A Scalable and Lightweight QoS Monitoring Technique Combining Passive and Active Approaches
A Scalable and Lighweigh QoS Monioring Technique Combining Passive and Acive Approaches On he Mahemaical Formulaion of CoMPACT Monior Masai Aida, Naoo Miyoshi and Keisue Ishibashi NTT Informaion Sharing
The Transport Equation
The Transpor Equaion Consider a fluid, flowing wih velociy, V, in a hin sraigh ube whose cross secion will be denoed by A. Suppose he fluid conains a conaminan whose concenraion a posiion a ime will be
Measuring macroeconomic volatility Applications to export revenue data, 1970-2005
FONDATION POUR LES ETUDES ET RERS LE DEVELOPPEMENT INTERNATIONAL Measuring macroeconomic volailiy Applicaions o expor revenue daa, 1970-005 by Joël Cariolle Policy brief no. 47 March 01 The FERDI is a
ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS
ANALYSIS AND COMPARISONS OF SOME SOLUTION CONCEPTS FOR STOCHASTIC PROGRAMMING PROBLEMS R. Caballero, E. Cerdá, M. M. Muñoz and L. Rey () Deparmen of Applied Economics (Mahemaics), Universiy of Málaga,
Small and Large Trades Around Earnings Announcements: Does Trading Behavior Explain Post-Earnings-Announcement Drift?
Small and Large Trades Around Earnings Announcemens: Does Trading Behavior Explain Pos-Earnings-Announcemen Drif? Devin Shanhikumar * Firs Draf: Ocober, 2002 This Version: Augus 19, 2004 Absrac This paper
CRISES AND THE FLEXIBLE PRICE MONETARY MODEL. Sarantis Kalyvitis
CRISES AND THE FLEXIBLE PRICE MONETARY MODEL Saranis Kalyviis Currency Crises In fixed exchange rae regimes, counries rarely abandon he regime volunarily. In mos cases, raders (or speculaors) exchange
Heuristics for dimensioning large-scale MPLS networks
Heurisics for dimensioning large-scale MPLS newors Carlos Borges 1, Amaro de Sousa 1, Rui Valadas 1 Depar. of Elecronics and Telecommunicaions Universiy of Aveiro, Insiue of Telecommunicaions pole of Aveiro
CALCULATION OF OMX TALLINN
CALCULATION OF OMX TALLINN CALCULATION OF OMX TALLINN 1. OMX Tallinn index...3 2. Terms in use...3 3. Comuaion rules of OMX Tallinn...3 3.1. Oening, real-ime and closing value of he Index...3 3.2. Index
Chapter 7. Response of First-Order RL and RC Circuits
Chaper 7. esponse of Firs-Order L and C Circuis 7.1. The Naural esponse of an L Circui 7.2. The Naural esponse of an C Circui 7.3. The ep esponse of L and C Circuis 7.4. A General oluion for ep and Naural
GoRA. For more information on genetics and on Rheumatoid Arthritis: Genetics of Rheumatoid Arthritis. Published work referred to in the results:
For more informaion on geneics and on Rheumaoid Arhriis: Published work referred o in he resuls: The geneics revoluion and he assaul on rheumaoid arhriis. A review by Michael Seldin, Crisopher Amos, Ryk
LECTURE: SOCIAL SECURITY HILARY HOYNES UC DAVIS EC230 OUTLINE OF LECTURE:
LECTURE: SOCIAL SECURITY HILARY HOYNES UC DAVIS EC230 OUTLINE OF LECTURE: 1. Inroducion and definiions 2. Insiuional Deails in Social Securiy 3. Social Securiy and Redisribuion 4. Jusificaion for Governmen
Botnet Economics: Uncertainty Matters
Bone Economics: Uncerainy Maers Zhen Li Deparmen of Economics and Managemen Albion College Email:[email protected] Qi Liao, Aaron Sriegel Deparmen of Compuer Science and Engineering Universiy of Nore Dame
Information technology and economic growth in Canada and the U.S.
Canada U.S. Economic Growh Informaion echnology and economic growh in Canada and he U.S. Informaion and communicaion echnology was he larges conribuor o growh wihin capial services for boh Canada and he
Nowadays, almost all health organizations do not have
Original Aricle The Developmen of Nurse Residency Program OBJECTIVE: To sudy new graduae nurses work problems; o design raining program courses as well as he experimenal evaluaion of he effeciveness of
How To Optimize Time For A Service In 4G Nework
Process Opimizaion Time for a Service in 4G Nework by SNMP Monioring and IAAS Cloud Compuing Yassine El Mahoi Laboraory of Compuer Science, Operaions Research and Applied Saisics. Téouan, Morocco Souad
Towards a Generic Trust Model Comparison of Various Trust Update Algorithms
Towards a Generic Trus Model Comparison of Various Trus Updae Algorihms Michael Kinaeder, Erneso Baschny, and Kur Rohermel Insiue of Parallel and Disribued Sysems (IPVS) Universiä Sugar Universiässr. 38
µ r of the ferrite amounts to 1000...4000. It should be noted that the magnetic length of the + δ
Page 9 Design of Inducors and High Frequency Transformers Inducors sore energy, ransformers ransfer energy. This is he prime difference. The magneic cores are significanly differen for inducors and high
The Roos of Lisp paul graham Draf, January 18, 2002. In 1960, John McCarhy published a remarkable paper in which he did for programming somehing like wha Euclid did for geomery. 1 He showed how, given
Why Did the Demand for Cash Decrease Recently in Korea?
Why Did he Demand for Cash Decrease Recenly in Korea? Byoung Hark Yoo Bank of Korea 26. 5 Absrac We explores why cash demand have decreased recenly in Korea. The raio of cash o consumpion fell o 4.7% in
GUIDE GOVERNING SMI RISK CONTROL INDICES
GUIDE GOVERNING SMI RISK CONTROL IND ICES SIX Swiss Exchange Ld 04/2012 i C O N T E N T S 1. Index srucure... 1 1.1 Concep... 1 1.2 General principles... 1 1.3 Index Commission... 1 1.4 Review of index
Ecotopia: An Ecological Framework for Change Management in Distributed Systems
Ecoopia: An Ecological Framework for Change Managemen in Disribued Sysems Tudor Dumiraş 1, Daniela Roşu 2, Asi Dan 2, and Priya Narasimhan 1 1 ECE Deparmen, Carnegie Mellon Universiy, Pisburgh, PA 15213,
Task-Execution Scheduling Schemes for Network Measurement and Monitoring
Task-Execuion Scheduling Schemes for Nework Measuremen and Monioring Zhen Qin, Robero Rojas-Cessa, and Nirwan Ansari Deparmen of Elecrical and Compuer Engineering New Jersey Insiue of Technology Universiy
Contrarian insider trading and earnings management around seasoned equity offerings; SEOs
Journal of Finance and Accounancy Conrarian insider rading and earnings managemen around seasoned equiy offerings; SEOs ABSTRACT Lorea Baryeh Towson Universiy This sudy aemps o resolve he differences in
Improvement of a TCP Incast Avoidance Method for Data Center Networks
Improvemen of a Incas Avoidance Mehod for Daa Cener Neworks Kazuoshi Kajia, Shigeyuki Osada, Yukinobu Fukushima and Tokumi Yokohira The Graduae School of Naural Science and Technology, Okayama Universiy
Caring for trees and your service
Caring for rees and your service Line clearing helps preven ouages FPL is commied o delivering safe, reliable elecric service o our cusomers. Trees, especially palm rees, can inerfere wih power lines and
Exploring Imputation Techniques for Missing Data in Transportation Management Systems
Exploring Impuaion Techniques for Missing Daa in Transporaion Managemen Sysems Brian L. Smih Assisan Professor Universiy of Virginia Deparmen of Civil Engineering P. O. Box 400742 Charloesville, VA 22904-4742
A Resource Management Strategy to Support VoIP across Ad hoc IEEE 802.11 Networks
A Resource Managemen Sraegy o Suppor VoIP across Ad hoc IEEE 8.11 Neworks Janusz Romanik Radiocommunicaions Deparmen Miliary Communicaions Insiue Zegrze, Poland [email protected] Pior Gajewski, Jacek
Forecasting, Ordering and Stock- Holding for Erratic Demand
ISF 2002 23 rd o 26 h June 2002 Forecasing, Ordering and Sock- Holding for Erraic Demand Andrew Eaves Lancaser Universiy / Andalus Soluions Limied Inroducion Erraic and slow-moving demand Demand classificaion
A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT
A DISCRETE-TIME MODEL OF TCP WITH ACTIVE QUEUE MANAGEMENT by Hui Zhang B.Sc., Insiuion of Informaion and Communicaion, Dong Hua Universiy, P. R. China, 1 THESIS SUBMITTED IN PARTIAL FULFILLMENT OF THE
Predicting Stock Market Index Trading Signals Using Neural Networks
Predicing Sock Marke Index Trading Using Neural Neworks C. D. Tilakarane, S. A. Morris, M. A. Mammadov, C. P. Hurs Cenre for Informaics and Applied Opimizaion School of Informaion Technology and Mahemaical
Principal components of stock market dynamics. Methodology and applications in brief (to be updated ) Andrei Bouzaev, bouzaev@ya.
Principal componens of sock marke dynamics Mehodology and applicaions in brief o be updaed Andrei Bouzaev, [email protected] Why principal componens are needed Objecives undersand he evidence of more han one
Mobile Broadband Rollout Business Case: Risk Analyses of the Forecast Uncertainties
ISF 2009, Hong Kong, 2-24 June 2009 Mobile Broadband Rollou Business Case: Risk Analyses of he Forecas Uncerainies Nils Krisian Elnegaard, Telenor R&I Agenda Moivaion Modelling long erm forecass for MBB
Relationships between Stock Prices and Accounting Information: A Review of the Residual Income and Ohlson Models. Scott Pirie* and Malcolm Smith**
Relaionships beween Sock Prices and Accouning Informaion: A Review of he Residual Income and Ohlson Models Sco Pirie* and Malcolm Smih** * Inernaional Graduae School of Managemen, Universiy of Souh Ausralia
The Greek financial crisis: growing imbalances and sovereign spreads. Heather D. Gibson, Stephan G. Hall and George S. Tavlas
The Greek financial crisis: growing imbalances and sovereign spreads Heaher D. Gibson, Sephan G. Hall and George S. Tavlas The enry The enry of Greece ino he Eurozone in 2001 produced a dividend in he
WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS
WATER MIST FIRE PROTECTION RELIABILITY ANALYSIS Shuzhen Xu Research Risk and Reliabiliy Area FM Global Norwood, Massachuses 262, USA David Fuller Engineering Sandards FM Global Norwood, Massachuses 262,
Child Protective Services. A Guide To Investigative Procedures
Child Proecive Services A Guide To Invesigaive Procedures The purpose of his brochure is o help you undersand he Child Proecive Services (CPS) reporing and response process. Please conac your CPS worker
Forecasting and Information Sharing in Supply Chains Under Quasi-ARMA Demand
Forecasing and Informaion Sharing in Supply Chains Under Quasi-ARMA Demand Avi Giloni, Clifford Hurvich, Sridhar Seshadri July 9, 2009 Absrac In his paper, we revisi he problem of demand propagaion in
Idealistic characteristics of Islamic Azad University masters - Islamshahr Branch from Students Perspective
Available online a www.pelagiaresearchlibrary.com European Journal Experimenal Biology, 202, 2 (5):88789 ISSN: 2248 925 CODEN (USA): EJEBAU Idealisic characerisics Islamic Azad Universiy masers Islamshahr
Hedging with Forwards and Futures
Hedging wih orwards and uures Hedging in mos cases is sraighforward. You plan o buy 10,000 barrels of oil in six monhs and you wish o eliminae he price risk. If you ake he buy-side of a forward/fuures
Appendix A: Area. 1 Find the radius of a circle that has circumference 12 inches.
Appendi A: Area worked-ou s o Odd-Numbered Eercises Do no read hese worked-ou s before aemping o do he eercises ourself. Oherwise ou ma mimic he echniques shown here wihou undersanding he ideas. Bes wa
Smart Surveillance: Applications, Technologies and Implications
Smar Surveillance: Applicaions, Technoloes and Implicaions Arun Hampapur, Lisa Brown, Jonahan Connell, Shara Pankani, Andrew Senior and Yingli Tian. Absrac Smar surveillance, is he use of auomaic video
Chapter 4: Exponential and Logarithmic Functions
Chaper 4: Eponenial and Logarihmic Funcions Secion 4.1 Eponenial Funcions... 15 Secion 4. Graphs of Eponenial Funcions... 3 Secion 4.3 Logarihmic Funcions... 4 Secion 4.4 Logarihmic Properies... 53 Secion
CAREER MAP HOME HEALTH AIDE
CAREER MAP HOME HEALTH AIDE CAREER MAP HOME HEALTH AIDE Home healh aides are one of he fases growing jobs in New York Ciy. Wih more educaion, home healh aides can move ino many oher ypes of jobs in healh
Advise on the development of a Learning Technologies Strategy at the Leopold-Franzens-Universität Innsbruck
Advise on he developmen of a Learning Technologies Sraegy a he Leopold-Franzens-Universiä Innsbruck Prof. Dr. Rob Koper Open Universiy of he Neherlands Educaional Technology Experise Cener Conex - Period
Tax Externalities of Equity Mutual Funds
Tax Exernaliies of Equiy Muual Funds Joel M. Dickson The Vanguard Group, Inc. John B. Shoven Sanford Universiy and NBER Clemens Sialm Sanford Universiy December 1999 Absrac: Invesors holding muual funds
DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS
DYNAMIC MODELS FOR VALUATION OF WRONGFUL DEATH PAYMENTS Hong Mao, Shanghai Second Polyechnic Universiy Krzyszof M. Osaszewski, Illinois Sae Universiy Youyu Zhang, Fudan Universiy ABSTRACT Liigaion, exper
