Two-Phase Traceback of DDoS Attacks with Overlay Network

Size: px
Start display at page:

Download "Two-Phase Traceback of DDoS Attacks with Overlay Network"

Transcription

1 4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of nforaton Engneerng, GuangDong Medcal Unversty, Dongguan , Chna 3 Kunng Unversty of Scence and Technology,Kunng , Chna a Correspondng author, eal: [email protected], beal: [email protected],ceal: [email protected] Keywords: Network Securty; DDoS Attacks; Oveylay Network; Adaptve CUSUM; Two-phase traceback. Abstract. An overlay network based traceback schee aganst DDoS attacks s proposed n ths paper. A CAT server s set n each ISP doan, and receves the alert packets fro routers n the doan. Accordng to the alert packets, the ntra-doan attack tree s constructed. An alert wll be sent to the vct once an ntra-doan attack tree s fored. The nter-doan attack tree s constructed at the CAT server of the vct end accordng to the receved alert packets fro upstrea doans. The traceback request s sent to each CAT server of the nter-doan attack tree once the DDoS attacks are detected. Havng receved the request, the CAT server wll fnd the attack source along the ntra-doan attack tree, and take easures to stop DDoS attacks. The proposed schee pleents two-phase traceback of DDoS attacks effectvely and fast. Introducton DDoS attacks are the crtcal threat to the nternet. However the dynac, stateless and anonyous nature of the nternet akes t extreely hard to trace back the source of these attacks. A nuber of traceback approaches are proposed, but ost of the adopt packet arkng and loggng or the hybrd of the two ethods. There are two ajor ethods for packet arkng, the probablstc packet arkng (PPM) and the deternstc packet arkng (DPM). Savage et al frst ntroduced the probablty-based packet arkng ethod and proposed the FMS schee []. It splts each router s IP address and redundancy nforaton nto eght fragents and probablstcally arks the IP packet wth one of the eght fragents. But t doesn t work well n case of DDoS attacks. Another shortcong of the FMS s that the packet arkng could be forged. To solve ths proble, Song et al proposed advanced and authentcated arkng schee-ams [2]. AMS authentcates the arkng nforaton wth essage authentcate code- MAC functon. But the dstrbuton of the secret key s dffcult. Goodrch uses the 25 bts of the IP header to store the arkng nforaton wth lnk essage. Only the fragents wth the sae lnk are reassebled nto the IP address [3]. It greatly reduces the nuber of cobnatons of the fragents and accelerates the path reconstructon. It also reduces the false postves resulted fro cobnatons of the fragents. But t does not ark the dstances fro the source to the current router. So t can not prevent the attackers fro njectng the spoofed nforaton. The nuber of packets requred for path reconstructon s large and the reconstructon te s long n PPM. Ang at the shortcong of PPM, Belenky et al proposed the deternstc packet arkng (DPM)[4]. It arks a packet at the edge ngress router. The IP address of each edge ngress router s dvded nto two fragents. The router wll select one of the fragents randoly and wrte nto a packet passng through t. But the false postves are very hgh n case of DDoS attacks. Ang at the shortcong n DPM, Lee et al proposed a deternstc packet arkng schee for tracng ultple nternet attackers- DPM-AD [5], but both DPM-AD and DPM ark each packet passng through the router whch akes the coputaton overhead very hgh when the DDoS attacks occur. Xang et al proposed flexble deternstc packet arkng-fdpm [6]. It can adjust the length of the arkng nforaton accordng to the network protocol and adjust the arkng speed accordng to the router s overload. Thus, t can pleent traceback n large-scale DDoS attacks The authors - Publshed by Atlants Press 49

2 PPM and DPM suffer a nuber of serous drawbacks: lack of scalablty; vulnerablty to packet polluton fro hackers and so on. Loggng s another approach to traceback even after the attack has copleted. Partal packet nforaton wll be stored n routers for the traversed packets and ths nforaton provdes a tral of the attack path. Full attack path can be reconstructed by applyng soe data extracton ethods. The advantage of ths approach s that t does not ncrease traffc flow, but t ncreases the storage requreent of the partcpatng routers. Ang at the drawbacks of the packet arkng and loggng ethods, a two- phase traceback schee wth overlay network s proposed. The Overlay Network Constructon The ISP doan s treated as the unt of traceback n our proposed schee. A change aggregaton tree (CAT) server s set n each ISP doan and t aggregates the attack nforaton fro the routers n the ISP doan. The overlay network s conssted of the CAT servers fro all ISP doans. Adaptve CUSUM algorth s adopted to detect abnorty at each router n the ISP doan. Once an abnorty s found, an alert packet wll be sent to the CAT server n the local ISP doan. Havng constructed the ntra-doan attack tree wth traffc weght accordng to the receved alert packets at the CAT servers, another alert packet carryng wth weght and doan nae s sent to the CAT server at the vct. Accordng to the receved alert packets, the CAT server at the vct constructs the nter-doan attack tree wth weght and coputes the weght of the constructed nter-doan attack tree. If the weght s greater than a detecton threshold, t s consdered that the DDoS attacks aroused. Two- phase traceback of DDoS Attacks The proposed traceback schee of DDoS attacks s based on the detecton of DDoS attacks. Havng detected DDoS attack at the vct, the vct CAT server wll send traceback request to each CAT server of the nter-doan attack tree. The CAT server traceback to the attack sources accordng to the constructed ntra-doan attack tree and take easures to stop the DDoS attacks. Adaptve CUSUM based Abnorty Detecton. We consder the traffc to port p of the router n the t th ontorng cycle as observaton sequence, and denote t as X(t, p ). In order to apply nonparaetrc CUSUM, a transforaton s ade to XT(t, p ) as follows. XT(t,p )= X(t,p )-XX p () To attan accurate XX p, we adopt estaton of ean and varance based adaptve CUSUM algorth to generate the paraeter.to the ean μ and varance σ, we adopt equaton (2) and equaton (3) to estate onlne durng each ontorng cycle to adjust the XXp adaptvely. X t, p = X t j, p j= = ( ) X t, p + X t, p (2) 2 2 σ t, p = X ( X t, j, ), (,, ) j p X t p = σ t p + X t p X t p j= (3) Accordng to the estaton value of ean and varance onlne, paraeter XXp can be adjusted adaptvely accordng to equaton (4). XXp = X t, p σ +2 t, p X (4) 492

3 We defne Z n (t,p ) as the accuulaton of stochastc varable XT(t,p ) Z n(t,p )=ax{0,z n (t -,p )+X(t,p )- XX p } (5) In order to reflect the change ore accurately, we defne RD n (t,p ) (Relatve Devaton) as an ndcator of attack. RD n (t,p )= Z n (t,p )/ X t, p (6) If RD n (t,p ) > β, here, β s the threshold of the router, then the DDoS attacks are declared at the router. Whether attack traffc s aggregatve or not, t can be deterned by the rato of the ncong traffc devaton and the outgong traffc devaton at the port p. We defne Y(t,p ) as the outgong traffc fro port p n the t th ontorng cycle and ake a transforaton to t as follows. YT(t,p )= Y(t,p )-YYp (7) YY p s a paraeter of the outgong traffc to port p of the router. To attan accurate YY p, we also adopt estaton of ean and varance based adaptve CUSUM algorth to generate the paraeter. We defne Z out (t,p ) as the accuulaton of stochastc varable YT(t,p ) Z out (t,p )=ax{0,z out(t -,p )+ Y(t,p )- YYp } (8) Then the rato DR of I/O traffc devaton s, DR= Z out (t,p )/Z n (t,p ) (9) If DR>=, then the attack s aggregatve at the router. So, an alert packet s sent to the local CAT server. The Intra-Doan Attack Tree Constructon.The ntra-doan attack tree s constructed accordng to the antaned network topology and the alert packets fro all routers at the local CAT server n a ontorng cycle. Denote G as the copy of the local network topology. The router s the node n G. It contans the followng essages :{ R_ID, Weght, UP_NUM, UP_R, UP_R 2,, UP_R up_nu, DN_R}, where R_ID s the router ID. Weght s the edge weght between current router and downstrea router, UP_NUM s the nuber of upstrea routers, UP_R up_nu s the address of upstrea routers, and DN_R s the address of downstrea routers respectvely. The alert packet contans {R_ID, FLOW_ID, AttackTraffc}. They are the router ID - R_ID, flow ID - FLOW_ID, the attack traffc respectvely. Denote the address of the root n G as R 0, the beng processed node as R, the next beng processed node as Q, alert packet as P. CAT server starts the process fro the root R 0 n G. If current node s not a leaf, the chldren s essage s saved. A scannng for the alert packets s done to get whether any alert packets are fro the current router. If not found, the current node wll be reoved. Otherwse, the AttackTraffc n the alert packet s assgned to the feld Weght of current router. Repeatng the process to all the chldren nodes of R 0 tll the chld s leaf. The Inter-Doan Attack Tree Constructon. Havng constructed the ntra-doan attack tree at the CAT server of the nteredate network, the weght W of each ntra-doan attack tree s calculated at the CAT server to reduce the storage and coputaton overhead at the vct end, here, w( R, Rj) W=. An alert packet s sent to the CAT server at the vct end. The alert packet s a 4-tuple {AS_ID,UP_AS_ID,DN_AS_ID,W}, where AS_ID s the ID of current AS, UP_AS_ID s the 493

4 ID of upstrea AS, DN_AS_ID s the ID of downstrea AS, and W s the weght of ntra-doan attack tree. The nter-doan attack tree s constructed accordng to the alert packets fro upstrea CAT server of the vct end. Startng fro the AS of the vct end, f an AS s DN_AS_ID s equal to the vct s ID, the AS s added to the vct s chld. Then, startng fro the chld, all ASs wll be the chld s chldren f DN_AS_ID s equal to the chld s ID, and so on, tll all ASs nodes are dsposed. The weght W (AS, AS j ) of the edge between doan nodes AS and AS j s the weght of ntra-doan attack tree n AS doan. Havng constructed nter-doan attack tree at the vct end, the weght of the doan tree s calculated, whch s the su of the weght W of all edges. The su of weght W ndcates the attack traffc fro all routers. If W > γ, t s deterned that the vct end s suffered fro DDoS attacks. Then the vct end wll traceback dstrbutedly accordng to the nter-doan attack tree and the ntra-doan attack tree. Experental Results The proposed traceback schee s based on the detecton of DDoS attacks usng adaptve CUSUM at the router. Once the DDoS attacks are detected, the alert packet wll be sent, and then the attack tree s constructed, and the DDoS attacks source s found. An accurate coparson s done between the ID of current node and the DN_AS_ID of the chld node to deterne whether the current node adds nto the tree whle the nter-doan attack tree s constructed. So the constructon algorth wll not result n false postves. The constructon of the ntra-doan attack tree s based on the network topology. The router node wll be deleted f t ddn t send any alert packet. Whether the alert packet wll be arse at the router s deterned by the detecton rate of the adaptve CUSUM algorth and whether the false postves fro alert packet wll be arse s deterned by the false postves of the adaptve CUSUM algorth. So we test the detecton rate and false-postve rate of the adaptve CUSUM algorth at the router to evaluate the effectveness of the traceback schee. We use NS2 sulator and adopt real ISP topology downloaded fro the Rocketfuel project webste n Unversty of Washngton. Havng attaned and set all paraeters n our detecton schee A_CUSUM, we easure the detecton rate of UDP attacks and TCP attacks n, 2, 4,8,6 ISPs when the attack sources are dstrbuted randoly. We also study the trade-off between detecton rate and false-postve rate of UDP attacks. The detected results are shown as Fg., Fg. 2 and Fg. 3. Conclusons In ths paper, we proposed an overlay network based traceback schee aganst DDoS attacks. It doesn t need to probablstcally ark the packets or deternstcally ark the packets, so t avods the drawbacks: lack of scalablty; vulnerablty to packet polluton fro hackers and extraordnary challenge on storage space at vct or nteredate routers. Once the DDoS attacks are detected at the vct, the traceback request wll be sent to each CAT server of the nter-doan attack tree. Havng receved the traceback request, The CAT server begns to fnd the attack sources accordng to the ntra-doan attack tree and take easures to stop the DDoS attacks. Our schee pleents two-phase traceback aganst DDoS attacks. It s fast copared wth other schees whch traceback the attackers hop by hop. But the traceback te t costs needs to be easured further. In addton, our schee can not dstngush the DDoS attacks and flash crowds. These are needed to be solved n the future. 494

5 Fg. The Detecton Rate of UDP attacks Fg.2 The Detecton Rate of TCP attacks Fg.3 The Detecton Rate and False-Postve Rate of A_CUSUM Acknowledgeents Ths work was supported n part by the Doctoral Fund of Guangdong Medcal College wth Grant No. B and B202057, and the Zhanjang Muncpal Scence and Technology Bureau(Grant No.203B0089 and Grant No.203B0093)and by the Natonal Natural Scence Foundaton of chna under (Grant: ), the appled basc research projects of Yunnan Provnce under (Grant: KKSY , KKS ). References []Savage S, Wetherall D, Karln A, et al. Network Support for IP traceback. ACM/IEEE Transactons on Networkng, 9(3): (200) [2]Song D X, Perrg A. Advanced and Authentcated Markng Schees for IP Traceback. In: Proceedngs of 20th Annual Jont Conference on Coputer Councatons (INFOCOMM 200). Anchorage, Alaska,USA:IEEE Press, 2: (200) [3]Goodrch M T. Probablstc Packet Markng for Large-Scale IP Traceback. IEEE/ACM Transacton Network, 6(): 5-24.(2008) [4]Belenky A, Ansar N. IP Traceback wth Deternstc Packet Markng. IEEE Councatons Letters,7(4):62-64.(2003) [5]Lee T H, Huang T Y W, Ln I. A Deternstc Packet Markng Schee for Tracng Multple Internet Attackers IEEE Internatonal Conference on Councatons, 2005(ICC 2005). Seoul Korea:IEEE Press, (2005) [6] Xang Y, Zhou W L, Guo M Y. Flexble Deternstc Packet Markng: An IP Traceback Syste to Fnd the Real Source of Attacks. IEEE Transactons on Parallel and Dstrbuted Systes, 20(4): (2009) 495

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory

Research Article Load Balancing for Future Internet: An Approach Based on Game Theory Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School

More information

An Electricity Trade Model for Microgrid Communities in Smart Grid

An Electricity Trade Model for Microgrid Communities in Smart Grid An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,

More information

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT

CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, [email protected] Zhyng

More information

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy

A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing

Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one

More information

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy

An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION

II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,

More information

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*

Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen* 198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn

More information

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm

A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]

More information

Least Squares Fitting of Data

Least Squares Fitting of Data Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters 01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected];

More information

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters

Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]

More information

How Much to Bet on Video Poker

How Much to Bet on Video Poker How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks

More information

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network

Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network 700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School

More information

An Enhanced K-Anonymity Model against Homogeneity Attack

An Enhanced K-Anonymity Model against Homogeneity Attack JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: [email protected] Zhwe

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Tourism Demand Forecasting by Improved SVR Model

Tourism Demand Forecasting by Improved SVR Model Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur

Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..

More information

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic

Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange

More information

An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System

An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System 201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng

More information

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Basic Queueing Theory M/M/* Queues. Introduction

Basic Queueing Theory M/M/* Queues. Introduction Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6

NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6 PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has

More information

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET

BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,

More information

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services

A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,

More information

[email protected]@cityu.edu.hk [email protected], [email protected]

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna [email protected]@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

Online Algorithms for Uploading Deferrable Big Data to The Cloud

Online Algorithms for Uploading Deferrable Big Data to The Cloud Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, [email protected] The

More information

Secure Cloud Storage Service with An Efficient DOKS Protocol

Secure Cloud Storage Service with An Efficient DOKS Protocol Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna [email protected] Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

How To Calculate The Accountng Perod Of Nequalty

How To Calculate The Accountng Perod Of Nequalty Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.

More information

Luby s Alg. for Maximal Independent Sets using Pairwise Independence

Luby s Alg. for Maximal Independent Sets using Pairwise Independence Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent

More information

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts

Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)

More information

Traffic-light a stress test for life insurance provisions

Traffic-light a stress test for life insurance provisions MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

International Journal of Information Management

International Journal of Information Management Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

Maximizing profit using recommender systems

Maximizing profit using recommender systems Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI [email protected] Clare Matheu Brown Unversty rovdence, RI [email protected] Danel Rcketts Brown Unversty rovdence, RI [email protected]

More information

GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter

GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter 2066 JOURL OF COMPUTERS, VOL. 9, O. 9, SEPTEMBER 204 GPS Recever utonoous Integrt Montorng lgorth Based on Iproved Partcle Flter Ershen Wang School of Electronc and Inforaton Engneerng, Shenang erospace

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

A Multi-mode Image Tracking System Based on Distributed Fusion

A Multi-mode Image Tracking System Based on Distributed Fusion A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna [email protected]

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

Packet-Marking Scheme for DDoS Attack Prevention

Packet-Marking Scheme for DDoS Attack Prevention Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,

More information

Level Annuities with Payments Less Frequent than Each Interest Period

Level Annuities with Payments Less Frequent than Each Interest Period Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]

More information

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES

THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered

More information

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno

Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December

More information

Recurrence. 1 Definitions and main statements

Recurrence. 1 Definitions and main statements Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.

More information

A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost

A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost Conteporary Enneern Scences, Vol. 9, 2016, no. 7, 315-324 HIKARI Ltd, www.-hkar.co http://dx.do.or/10.12988/ces.2016.617 A Mult Due Date Batch Scheduln Model on Dynac Flow Shop to Mnze Total Producton

More information

We assume your students are learning about self-regulation (how to change how alert they feel) through the Alert Program with its three stages:

We assume your students are learning about self-regulation (how to change how alert they feel) through the Alert Program with its three stages: Welcome to ALERT BINGO, a fun-flled and educatonal way to learn the fve ways to change engnes levels (Put somethng n your Mouth, Move, Touch, Look, and Lsten) as descrbed n the How Does Your Engne Run?

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization

Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy

More information

8 Algorithm for Binary Searching in Trees

8 Algorithm for Binary Searching in Trees 8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence

How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence 1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh

More information

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008

Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008 Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn

More information

"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *

Research Note APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES * Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC

More information

Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking

Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking 1 T. Ravi Kumar, 2 T Padmaja, 3 P. Samba Siva Raju 1,3 Sri Venkateswara Institute

More information

International Journal of Industrial Engineering Computations

International Journal of Industrial Engineering Computations Internatonal Journal of Industral ngneerng Coputatons 3 (2012) 393 402 Contents lsts avalable at GrowngScence Internatonal Journal of Industral ngneerng Coputatons hoepage: www.growngscence.co/jec Suppler

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking

A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and

More information

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks

Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,

More information

Support Vector Machines

Support Vector Machines Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT

RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE

More information

Network Aware Load-Balancing via Parallel VM Migration for Data Centers

Network Aware Load-Balancing via Parallel VM Migration for Data Centers Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung

More information

SIMPLE LINEAR CORRELATION

SIMPLE LINEAR CORRELATION SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.

More information

the Manual on the global data processing and forecasting system (GDPFS) (WMO-No.485; available at http://www.wmo.int/pages/prog/www/manuals.

the Manual on the global data processing and forecasting system (GDPFS) (WMO-No.485; available at http://www.wmo.int/pages/prog/www/manuals. Gudelne on the exchange and use of EPS verfcaton results Update date: 30 November 202. Introducton World Meteorologcal Organzaton (WMO) CBS-XIII (2005) recommended that the general responsbltes for a Lead

More information

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview

Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 durresi@csc.lsu.edu. DDoS and IP Traceback. Overview DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service

More information

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers

A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton

More information

Availability-Based Path Selection and Network Vulnerability Assessment

Availability-Based Path Selection and Network Vulnerability Assessment Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl

More information

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem

Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton

More information

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME

SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000

More information

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT

AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT 1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness [email protected],

More information

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane

Modeling and Assessment Performance of OpenFlow-Based Network Control Plane ISSN (Onlne): 2319-7064 Index Coperncus Value (2013): 6.14 Ipact Factor (2013): 4.438 Modelng and Assessent Perforance of OpenFlo-Based Netork Control Plane Saer Salah Al_Yassn Assstant Teacher, Al_Maon

More information