Two-Phase Traceback of DDoS Attacks with Overlay Network
|
|
|
- Brook Waters
- 9 years ago
- Views:
Transcription
1 4th Internatonal Conference on Sensors, Measureent and Intellgent Materals (ICSMIM 205) Two-Phase Traceback of DDoS Attacks wth Overlay Network Zahong Zhou, a, Jang Wang2, b and X Chen3, c -2 School of nforaton Engneerng, GuangDong Medcal Unversty, Dongguan , Chna 3 Kunng Unversty of Scence and Technology,Kunng , Chna a Correspondng author, eal: [email protected], beal: [email protected],ceal: [email protected] Keywords: Network Securty; DDoS Attacks; Oveylay Network; Adaptve CUSUM; Two-phase traceback. Abstract. An overlay network based traceback schee aganst DDoS attacks s proposed n ths paper. A CAT server s set n each ISP doan, and receves the alert packets fro routers n the doan. Accordng to the alert packets, the ntra-doan attack tree s constructed. An alert wll be sent to the vct once an ntra-doan attack tree s fored. The nter-doan attack tree s constructed at the CAT server of the vct end accordng to the receved alert packets fro upstrea doans. The traceback request s sent to each CAT server of the nter-doan attack tree once the DDoS attacks are detected. Havng receved the request, the CAT server wll fnd the attack source along the ntra-doan attack tree, and take easures to stop DDoS attacks. The proposed schee pleents two-phase traceback of DDoS attacks effectvely and fast. Introducton DDoS attacks are the crtcal threat to the nternet. However the dynac, stateless and anonyous nature of the nternet akes t extreely hard to trace back the source of these attacks. A nuber of traceback approaches are proposed, but ost of the adopt packet arkng and loggng or the hybrd of the two ethods. There are two ajor ethods for packet arkng, the probablstc packet arkng (PPM) and the deternstc packet arkng (DPM). Savage et al frst ntroduced the probablty-based packet arkng ethod and proposed the FMS schee []. It splts each router s IP address and redundancy nforaton nto eght fragents and probablstcally arks the IP packet wth one of the eght fragents. But t doesn t work well n case of DDoS attacks. Another shortcong of the FMS s that the packet arkng could be forged. To solve ths proble, Song et al proposed advanced and authentcated arkng schee-ams [2]. AMS authentcates the arkng nforaton wth essage authentcate code- MAC functon. But the dstrbuton of the secret key s dffcult. Goodrch uses the 25 bts of the IP header to store the arkng nforaton wth lnk essage. Only the fragents wth the sae lnk are reassebled nto the IP address [3]. It greatly reduces the nuber of cobnatons of the fragents and accelerates the path reconstructon. It also reduces the false postves resulted fro cobnatons of the fragents. But t does not ark the dstances fro the source to the current router. So t can not prevent the attackers fro njectng the spoofed nforaton. The nuber of packets requred for path reconstructon s large and the reconstructon te s long n PPM. Ang at the shortcong of PPM, Belenky et al proposed the deternstc packet arkng (DPM)[4]. It arks a packet at the edge ngress router. The IP address of each edge ngress router s dvded nto two fragents. The router wll select one of the fragents randoly and wrte nto a packet passng through t. But the false postves are very hgh n case of DDoS attacks. Ang at the shortcong n DPM, Lee et al proposed a deternstc packet arkng schee for tracng ultple nternet attackers- DPM-AD [5], but both DPM-AD and DPM ark each packet passng through the router whch akes the coputaton overhead very hgh when the DDoS attacks occur. Xang et al proposed flexble deternstc packet arkng-fdpm [6]. It can adjust the length of the arkng nforaton accordng to the network protocol and adjust the arkng speed accordng to the router s overload. Thus, t can pleent traceback n large-scale DDoS attacks The authors - Publshed by Atlants Press 49
2 PPM and DPM suffer a nuber of serous drawbacks: lack of scalablty; vulnerablty to packet polluton fro hackers and so on. Loggng s another approach to traceback even after the attack has copleted. Partal packet nforaton wll be stored n routers for the traversed packets and ths nforaton provdes a tral of the attack path. Full attack path can be reconstructed by applyng soe data extracton ethods. The advantage of ths approach s that t does not ncrease traffc flow, but t ncreases the storage requreent of the partcpatng routers. Ang at the drawbacks of the packet arkng and loggng ethods, a two- phase traceback schee wth overlay network s proposed. The Overlay Network Constructon The ISP doan s treated as the unt of traceback n our proposed schee. A change aggregaton tree (CAT) server s set n each ISP doan and t aggregates the attack nforaton fro the routers n the ISP doan. The overlay network s conssted of the CAT servers fro all ISP doans. Adaptve CUSUM algorth s adopted to detect abnorty at each router n the ISP doan. Once an abnorty s found, an alert packet wll be sent to the CAT server n the local ISP doan. Havng constructed the ntra-doan attack tree wth traffc weght accordng to the receved alert packets at the CAT servers, another alert packet carryng wth weght and doan nae s sent to the CAT server at the vct. Accordng to the receved alert packets, the CAT server at the vct constructs the nter-doan attack tree wth weght and coputes the weght of the constructed nter-doan attack tree. If the weght s greater than a detecton threshold, t s consdered that the DDoS attacks aroused. Two- phase traceback of DDoS Attacks The proposed traceback schee of DDoS attacks s based on the detecton of DDoS attacks. Havng detected DDoS attack at the vct, the vct CAT server wll send traceback request to each CAT server of the nter-doan attack tree. The CAT server traceback to the attack sources accordng to the constructed ntra-doan attack tree and take easures to stop the DDoS attacks. Adaptve CUSUM based Abnorty Detecton. We consder the traffc to port p of the router n the t th ontorng cycle as observaton sequence, and denote t as X(t, p ). In order to apply nonparaetrc CUSUM, a transforaton s ade to XT(t, p ) as follows. XT(t,p )= X(t,p )-XX p () To attan accurate XX p, we adopt estaton of ean and varance based adaptve CUSUM algorth to generate the paraeter.to the ean μ and varance σ, we adopt equaton (2) and equaton (3) to estate onlne durng each ontorng cycle to adjust the XXp adaptvely. X t, p = X t j, p j= = ( ) X t, p + X t, p (2) 2 2 σ t, p = X ( X t, j, ), (,, ) j p X t p = σ t p + X t p X t p j= (3) Accordng to the estaton value of ean and varance onlne, paraeter XXp can be adjusted adaptvely accordng to equaton (4). XXp = X t, p σ +2 t, p X (4) 492
3 We defne Z n (t,p ) as the accuulaton of stochastc varable XT(t,p ) Z n(t,p )=ax{0,z n (t -,p )+X(t,p )- XX p } (5) In order to reflect the change ore accurately, we defne RD n (t,p ) (Relatve Devaton) as an ndcator of attack. RD n (t,p )= Z n (t,p )/ X t, p (6) If RD n (t,p ) > β, here, β s the threshold of the router, then the DDoS attacks are declared at the router. Whether attack traffc s aggregatve or not, t can be deterned by the rato of the ncong traffc devaton and the outgong traffc devaton at the port p. We defne Y(t,p ) as the outgong traffc fro port p n the t th ontorng cycle and ake a transforaton to t as follows. YT(t,p )= Y(t,p )-YYp (7) YY p s a paraeter of the outgong traffc to port p of the router. To attan accurate YY p, we also adopt estaton of ean and varance based adaptve CUSUM algorth to generate the paraeter. We defne Z out (t,p ) as the accuulaton of stochastc varable YT(t,p ) Z out (t,p )=ax{0,z out(t -,p )+ Y(t,p )- YYp } (8) Then the rato DR of I/O traffc devaton s, DR= Z out (t,p )/Z n (t,p ) (9) If DR>=, then the attack s aggregatve at the router. So, an alert packet s sent to the local CAT server. The Intra-Doan Attack Tree Constructon.The ntra-doan attack tree s constructed accordng to the antaned network topology and the alert packets fro all routers at the local CAT server n a ontorng cycle. Denote G as the copy of the local network topology. The router s the node n G. It contans the followng essages :{ R_ID, Weght, UP_NUM, UP_R, UP_R 2,, UP_R up_nu, DN_R}, where R_ID s the router ID. Weght s the edge weght between current router and downstrea router, UP_NUM s the nuber of upstrea routers, UP_R up_nu s the address of upstrea routers, and DN_R s the address of downstrea routers respectvely. The alert packet contans {R_ID, FLOW_ID, AttackTraffc}. They are the router ID - R_ID, flow ID - FLOW_ID, the attack traffc respectvely. Denote the address of the root n G as R 0, the beng processed node as R, the next beng processed node as Q, alert packet as P. CAT server starts the process fro the root R 0 n G. If current node s not a leaf, the chldren s essage s saved. A scannng for the alert packets s done to get whether any alert packets are fro the current router. If not found, the current node wll be reoved. Otherwse, the AttackTraffc n the alert packet s assgned to the feld Weght of current router. Repeatng the process to all the chldren nodes of R 0 tll the chld s leaf. The Inter-Doan Attack Tree Constructon. Havng constructed the ntra-doan attack tree at the CAT server of the nteredate network, the weght W of each ntra-doan attack tree s calculated at the CAT server to reduce the storage and coputaton overhead at the vct end, here, w( R, Rj) W=. An alert packet s sent to the CAT server at the vct end. The alert packet s a 4-tuple {AS_ID,UP_AS_ID,DN_AS_ID,W}, where AS_ID s the ID of current AS, UP_AS_ID s the 493
4 ID of upstrea AS, DN_AS_ID s the ID of downstrea AS, and W s the weght of ntra-doan attack tree. The nter-doan attack tree s constructed accordng to the alert packets fro upstrea CAT server of the vct end. Startng fro the AS of the vct end, f an AS s DN_AS_ID s equal to the vct s ID, the AS s added to the vct s chld. Then, startng fro the chld, all ASs wll be the chld s chldren f DN_AS_ID s equal to the chld s ID, and so on, tll all ASs nodes are dsposed. The weght W (AS, AS j ) of the edge between doan nodes AS and AS j s the weght of ntra-doan attack tree n AS doan. Havng constructed nter-doan attack tree at the vct end, the weght of the doan tree s calculated, whch s the su of the weght W of all edges. The su of weght W ndcates the attack traffc fro all routers. If W > γ, t s deterned that the vct end s suffered fro DDoS attacks. Then the vct end wll traceback dstrbutedly accordng to the nter-doan attack tree and the ntra-doan attack tree. Experental Results The proposed traceback schee s based on the detecton of DDoS attacks usng adaptve CUSUM at the router. Once the DDoS attacks are detected, the alert packet wll be sent, and then the attack tree s constructed, and the DDoS attacks source s found. An accurate coparson s done between the ID of current node and the DN_AS_ID of the chld node to deterne whether the current node adds nto the tree whle the nter-doan attack tree s constructed. So the constructon algorth wll not result n false postves. The constructon of the ntra-doan attack tree s based on the network topology. The router node wll be deleted f t ddn t send any alert packet. Whether the alert packet wll be arse at the router s deterned by the detecton rate of the adaptve CUSUM algorth and whether the false postves fro alert packet wll be arse s deterned by the false postves of the adaptve CUSUM algorth. So we test the detecton rate and false-postve rate of the adaptve CUSUM algorth at the router to evaluate the effectveness of the traceback schee. We use NS2 sulator and adopt real ISP topology downloaded fro the Rocketfuel project webste n Unversty of Washngton. Havng attaned and set all paraeters n our detecton schee A_CUSUM, we easure the detecton rate of UDP attacks and TCP attacks n, 2, 4,8,6 ISPs when the attack sources are dstrbuted randoly. We also study the trade-off between detecton rate and false-postve rate of UDP attacks. The detected results are shown as Fg., Fg. 2 and Fg. 3. Conclusons In ths paper, we proposed an overlay network based traceback schee aganst DDoS attacks. It doesn t need to probablstcally ark the packets or deternstcally ark the packets, so t avods the drawbacks: lack of scalablty; vulnerablty to packet polluton fro hackers and extraordnary challenge on storage space at vct or nteredate routers. Once the DDoS attacks are detected at the vct, the traceback request wll be sent to each CAT server of the nter-doan attack tree. Havng receved the traceback request, The CAT server begns to fnd the attack sources accordng to the ntra-doan attack tree and take easures to stop the DDoS attacks. Our schee pleents two-phase traceback aganst DDoS attacks. It s fast copared wth other schees whch traceback the attackers hop by hop. But the traceback te t costs needs to be easured further. In addton, our schee can not dstngush the DDoS attacks and flash crowds. These are needed to be solved n the future. 494
5 Fg. The Detecton Rate of UDP attacks Fg.2 The Detecton Rate of TCP attacks Fg.3 The Detecton Rate and False-Postve Rate of A_CUSUM Acknowledgeents Ths work was supported n part by the Doctoral Fund of Guangdong Medcal College wth Grant No. B and B202057, and the Zhanjang Muncpal Scence and Technology Bureau(Grant No.203B0089 and Grant No.203B0093)and by the Natonal Natural Scence Foundaton of chna under (Grant: ), the appled basc research projects of Yunnan Provnce under (Grant: KKSY , KKS ). References []Savage S, Wetherall D, Karln A, et al. Network Support for IP traceback. ACM/IEEE Transactons on Networkng, 9(3): (200) [2]Song D X, Perrg A. Advanced and Authentcated Markng Schees for IP Traceback. In: Proceedngs of 20th Annual Jont Conference on Coputer Councatons (INFOCOMM 200). Anchorage, Alaska,USA:IEEE Press, 2: (200) [3]Goodrch M T. Probablstc Packet Markng for Large-Scale IP Traceback. IEEE/ACM Transacton Network, 6(): 5-24.(2008) [4]Belenky A, Ansar N. IP Traceback wth Deternstc Packet Markng. IEEE Councatons Letters,7(4):62-64.(2003) [5]Lee T H, Huang T Y W, Ln I. A Deternstc Packet Markng Schee for Tracng Multple Internet Attackers IEEE Internatonal Conference on Councatons, 2005(ICC 2005). Seoul Korea:IEEE Press, (2005) [6] Xang Y, Zhou W L, Guo M Y. Flexble Deternstc Packet Markng: An IP Traceback Syste to Fnd the Real Source of Attacks. IEEE Transactons on Parallel and Dstrbuted Systes, 20(4): (2009) 495
Research Article Load Balancing for Future Internet: An Approach Based on Game Theory
Appled Matheatcs, Artcle ID 959782, 11 pages http://dx.do.org/10.1155/2014/959782 Research Artcle Load Balancng for Future Internet: An Approach Based on Gae Theory Shaoy Song, Tngje Lv, and Xa Chen School
An Electricity Trade Model for Microgrid Communities in Smart Grid
An Electrcty Trade Model for Mcrogrd Countes n Sart Grd Tansong Cu, Yanzh Wang, Shahn Nazaran and Massoud Pedra Unversty of Southern Calforna Departent of Electrcal Engneerng Los Angeles, CA, USA {tcu,
CONSTRUCTION OF A COLLABORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT
CONSTRUCTION OF A COLLAORATIVE VALUE CHAIN IN CLOUD COMPUTING ENVIRONMENT Png Wang, School of Econoy and Manageent, Jangsu Unversty of Scence and Technology, Zhenjang Jangsu Chna, [email protected] Zhyng
A Novel Dynamic Role-Based Access Control Scheme in User Hierarchy
Journal of Coputatonal Inforaton Systes 6:7(200) 2423-2430 Avalable at http://www.jofcs.co A Novel Dynac Role-Based Access Control Schee n User Herarchy Xuxa TIAN, Zhongqn BI, Janpng XU, Dang LIU School
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
Scan Detection in High-Speed Networks Based on Optimal Dynamic Bit Sharing
Scan Detecton n Hgh-Speed Networks Based on Optal Dynac Bt Sharng Tao L Shgang Chen Wen Luo Mng Zhang Departent of Coputer & Inforaton Scence & Engneerng, Unversty of Florda Abstract Scan detecton s one
An Analytical Model of Web Server Load Distribution by Applying a Minimum Entropy Strategy
Internatonal Journal of Coputer and Councaton Engneerng, Vol. 2, No. 4, July 203 An Analytcal odel of Web Server Load Dstrbuton by Applyng a nu Entropy Strategy Teeranan Nandhakwang, Settapong alsuwan,
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
II. THE QUALITY AND REGULATION OF THE DISTRIBUTION COMPANIES I. INTRODUCTION
Fronter Methodology to fx Qualty goals n Electrcal Energy Dstrbuton Copanes R. Rarez 1, A. Sudrà 2, A. Super 3, J.Bergas 4, R.Vllafáfla 5 1-2 -3-4-5 - CITCEA - UPC UPC., Unversdad Poltécnca de Cataluña,
Yixin Jiang and Chuang Lin. Minghui Shi and Xuemin Sherman Shen*
198 Int J Securty Networks Vol 1 Nos 3/4 2006 A self-encrypton authentcaton protocol for teleconference servces Yxn Jang huang Ln Departent of oputer Scence Technology Tsnghua Unversty Beng hna E-al: yxang@csnet1cstsnghuaeducn
A hybrid global optimization algorithm based on parallel chaos optimization and outlook algorithm
Avalable onlne www.ocpr.com Journal of Chemcal and Pharmaceutcal Research, 2014, 6(7):1884-1889 Research Artcle ISSN : 0975-7384 CODEN(USA) : JCPRC5 A hybrd global optmzaton algorthm based on parallel
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]
Least Squares Fitting of Data
Least Squares Fttng of Data Davd Eberly Geoetrc Tools, LLC http://www.geoetrctools.co/ Copyrght c 1998-2016. All Rghts Reserved. Created: July 15, 1999 Last Modfed: January 5, 2015 Contents 1 Lnear Fttng
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
01 Proceedngs IEEE INFOCOM Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva heja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected];
Stochastic Models of Load Balancing and Scheduling in Cloud Computing Clusters
Stochastc Models of Load Balancng and Schedulng n Cloud Coputng Clusters Sva Theja Magulur and R. Srkant Departent of ECE and CSL Unversty of Illnos at Urbana-Chapagn [email protected]; [email protected]
How Much to Bet on Video Poker
How Much to Bet on Vdeo Poker Trstan Barnett A queston that arses whenever a gae s favorable to the player s how uch to wager on each event? Whle conservatve play (or nu bet nzes large fluctuatons, t lacks
Forecasting the Demand of Emergency Supplies: Based on the CBR Theory and BP Neural Network
700 Proceedngs of the 8th Internatonal Conference on Innovaton & Management Forecastng the Demand of Emergency Supples: Based on the CBR Theory and BP Neural Network Fu Deqang, Lu Yun, L Changbng School
An Enhanced K-Anonymity Model against Homogeneity Attack
JOURNAL OF SOFTWARE, VOL. 6, NO. 10, OCTOBER 011 1945 An Enhanced K-Anont Model aganst Hoogenet Attack Qan Wang College of Coputer Scence of Chongqng Unverst, Chongqng, Chna Eal: [email protected] Zhwe
An Interest-Oriented Network Evolution Mechanism for Online Communities
An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Tourism Demand Forecasting by Improved SVR Model
Internatonal Journal of u- and e- Servce, Scence and Technology, pp403-4 http://dxdoorg/0457/junesst058538 Tours Deand Forecastng by Iproved SVR Model L Me Departent of Socal Servces,Zhengzhou Tours College,Henan,PRChna
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
Module 2 LOSSLESS IMAGE COMPRESSION SYSTEMS. Version 2 ECE IIT, Kharagpur
Module LOSSLESS IMAGE COMPRESSION SYSTEMS Lesson 3 Lossless Compresson: Huffman Codng Instructonal Objectves At the end of ths lesson, the students should be able to:. Defne and measure source entropy..
Institute of Informatics, Faculty of Business and Management, Brno University of Technology,Czech Republic
Lagrange Multplers as Quanttatve Indcators n Economcs Ivan Mezník Insttute of Informatcs, Faculty of Busness and Management, Brno Unversty of TechnologCzech Republc Abstract The quanttatve role of Lagrange
An Error Detecting and Tagging Framework for Reducing Data Entry Errors in Electronic Medical Records (EMR) System
201 IEEE Internatonal Conference on Bonforatcs and Boedcne An Error Detectng and Taggng Fraework for Reducng Data Entry Errors n Electronc Medcal Records (EMR Syste Yuan Lng, Yuan An College of Coputng
Network Security Situation Evaluation Method for Distributed Denial of Service
Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Basic Queueing Theory M/M/* Queues. Introduction
Basc Queueng Theory M/M/* Queues These sldes are created by Dr. Yh Huang of George Mason Unversty. Students regstered n Dr. Huang's courses at GMU can ake a sngle achne-readable copy and prnt a sngle copy
Proactive Secret Sharing Or: How to Cope With Perpetual Leakage
Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):
PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12
14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed
NPAR TESTS. One-Sample Chi-Square Test. Cell Specification. Observed Frequencies 1O i 6. Expected Frequencies 1EXP i 6
PAR TESTS If a WEIGHT varable s specfed, t s used to replcate a case as many tmes as ndcated by the weght value rounded to the nearest nteger. If the workspace requrements are exceeded and samplng has
BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET
Yugoslav Journal of Operatons Research (0), Nuber, 65-78 DOI: 0.98/YJOR0065Y BANDWIDTH ALLOCATION AND PRICING PROBLEM FOR A DUOPOLY MARKET Peng-Sheng YOU Graduate Insttute of Marketng and Logstcs/Transportaton,
A Statistical Model for Detecting Abnormality in Static-Priority Scheduling Networks with Differentiated Services
A Statstcal odel for Detectng Abnoralty n Statc-Prorty Schedulng Networks wth Dfferentated Servces ng L 1 and We Zhao 1 School of Inforaton Scence & Technology, East Chna Noral Unversty, Shangha 0006,
[email protected]@cityu.edu.hk [email protected], [email protected]
G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna [email protected]@ctyu.edu.hk 2 Khulna Unversty of Engneerng
Online Algorithms for Uploading Deferrable Big Data to The Cloud
Onlne lgorths for Uploadng Deferrable Bg Data to The Cloud Lnquan Zhang, Zongpeng L, Chuan Wu, Mnghua Chen Unversty of Calgary, {lnqzhan,zongpeng}@ucalgary.ca The Unversty of Hong Kong, [email protected] The
Secure Cloud Storage Service with An Efficient DOKS Protocol
Secure Cloud Storage Servce wth An Effcent DOKS Protocol ZhengTao Jang Councaton Unversty of Chna [email protected] Abstract Storage servces based on publc clouds provde custoers wth elastc storage and on-deand
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture
A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton
How To Calculate The Accountng Perod Of Nequalty
Inequalty and The Accountng Perod Quentn Wodon and Shlomo Ytzha World Ban and Hebrew Unversty September Abstract Income nequalty typcally declnes wth the length of tme taen nto account for measurement.
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
Power-of-Two Policies for Single- Warehouse Multi-Retailer Inventory Systems with Order Frequency Discounts
Power-of-wo Polces for Sngle- Warehouse Mult-Retaler Inventory Systems wth Order Frequency Dscounts José A. Ventura Pennsylvana State Unversty (USA) Yale. Herer echnon Israel Insttute of echnology (Israel)
Traffic-light a stress test for life insurance provisions
MEMORANDUM Date 006-09-7 Authors Bengt von Bahr, Göran Ronge Traffc-lght a stress test for lfe nsurance provsons Fnansnspetonen P.O. Box 6750 SE-113 85 Stocholm [Sveavägen 167] Tel +46 8 787 80 00 Fax
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
International Journal of Information Management
Internatonal Journal of Inforaton Manageent 32 (2012) 409 418 Contents lsts avalable at ScVerse ScenceDrect Internatonal Journal of Inforaton Manageent j our nal ho e p age: www.elsever.co/locate/jnfogt
An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks
2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer
Maximizing profit using recommender systems
Maxzng proft usng recoender systes Aparna Das Brown Unversty rovdence, RI [email protected] Clare Matheu Brown Unversty rovdence, RI [email protected] Danel Rcketts Brown Unversty rovdence, RI [email protected]
GPS Receiver Autonomous Integrity Monitoring Algorithm Based on Improved Particle Filter
2066 JOURL OF COMPUTERS, VOL. 9, O. 9, SEPTEMBER 204 GPS Recever utonoous Integrt Montorng lgorth Based on Iproved Partcle Flter Ershen Wang School of Electronc and Inforaton Engneerng, Shenang erospace
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
A Multi-mode Image Tracking System Based on Distributed Fusion
A Mult-mode Image Tracng System Based on Dstrbuted Fuson Ln zheng Chongzhao Han Dongguang Zuo Hongsen Yan School of Electroncs & nformaton engneerng, X an Jaotong Unversty X an, Shaanx, Chna [email protected]
What is Candidate Sampling
What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble
Packet-Marking Scheme for DDoS Attack Prevention
Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,
Level Annuities with Payments Less Frequent than Each Interest Period
Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Level Annutes wth Payments Less Frequent than Each Interest Perod 1 Annuty-mmedate 2 Annuty-due Symoblc approach
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
THE METHOD OF LEAST SQUARES THE METHOD OF LEAST SQUARES
The goal: to measure (determne) an unknown quantty x (the value of a RV X) Realsaton: n results: y 1, y 2,..., y j,..., y n, (the measured values of Y 1, Y 2,..., Y j,..., Y n ) every result s encumbered
Data Mining from the Information Systems: Performance Indicators at Masaryk University in Brno
Data Mnng from the Informaton Systems: Performance Indcators at Masaryk Unversty n Brno Mkuláš Bek EUA Workshop Strasbourg, 1-2 December 2006 1 Locaton of Brno Brno EUA Workshop Strasbourg, 1-2 December
Recurrence. 1 Definitions and main statements
Recurrence 1 Defntons and man statements Let X n, n = 0, 1, 2,... be a MC wth the state space S = (1, 2,...), transton probabltes p j = P {X n+1 = j X n = }, and the transton matrx P = (p j ),j S def.
A Multi Due Date Batch Scheduling Model. on Dynamic Flow Shop to Minimize. Total Production Cost
Conteporary Enneern Scences, Vol. 9, 2016, no. 7, 315-324 HIKARI Ltd, www.-hkar.co http://dx.do.or/10.12988/ces.2016.617 A Mult Due Date Batch Scheduln Model on Dynac Flow Shop to Mnze Total Producton
We assume your students are learning about self-regulation (how to change how alert they feel) through the Alert Program with its three stages:
Welcome to ALERT BINGO, a fun-flled and educatonal way to learn the fve ways to change engnes levels (Put somethng n your Mouth, Move, Touch, Look, and Lsten) as descrbed n the How Does Your Engne Run?
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
Research Article Enhanced Two-Step Method via Relaxed Order of α-satisfactory Degrees for Fuzzy Multiobjective Optimization
Hndaw Publshng Corporaton Mathematcal Problems n Engneerng Artcle ID 867836 pages http://dxdoorg/055/204/867836 Research Artcle Enhanced Two-Step Method va Relaxed Order of α-satsfactory Degrees for Fuzzy
8 Algorithm for Binary Searching in Trees
8 Algorthm for Bnary Searchng n Trees In ths secton we present our algorthm for bnary searchng n trees. A crucal observaton employed by the algorthm s that ths problem can be effcently solved when the
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
How Sets of Coherent Probabilities May Serve as Models for Degrees of Incoherence
1 st Internatonal Symposum on Imprecse Probabltes and Ther Applcatons, Ghent, Belgum, 29 June 2 July 1999 How Sets of Coherent Probabltes May Serve as Models for Degrees of Incoherence Mar J. Schervsh
Risk-based Fatigue Estimate of Deep Water Risers -- Course Project for EM388F: Fracture Mechanics, Spring 2008
Rsk-based Fatgue Estmate of Deep Water Rsers -- Course Project for EM388F: Fracture Mechancs, Sprng 2008 Chen Sh Department of Cvl, Archtectural, and Envronmental Engneerng The Unversty of Texas at Austn
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking
Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking 1 T. Ravi Kumar, 2 T Padmaja, 3 P. Samba Siva Raju 1,3 Sri Venkateswara Institute
International Journal of Industrial Engineering Computations
Internatonal Journal of Industral ngneerng Coputatons 3 (2012) 393 402 Contents lsts avalable at GrowngScence Internatonal Journal of Industral ngneerng Coputatons hoepage: www.growngscence.co/jec Suppler
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
A Multi-Camera System on PC-Cluster for Real-time 3-D Tracking
The 23 rd Conference of the Mechancal Engneerng Network of Thaland November 4 7, 2009, Chang Ma A Mult-Camera System on PC-Cluster for Real-tme 3-D Trackng Vboon Sangveraphunsr*, Krtsana Uttamang, and
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
Support Vector Machines
Support Vector Machnes Max Wellng Department of Computer Scence Unversty of Toronto 10 Kng s College Road Toronto, M5S 3G5 Canada [email protected] Abstract Ths s a note to explan support vector machnes.
Efficient Detection of Ddos Attacks by Entropy Variation
IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,
RELIABILITY, RISK AND AVAILABILITY ANLYSIS OF A CONTAINER GANTRY CRANE ABSTRACT
Kolowrock Krzysztof Joanna oszynska MODELLING ENVIRONMENT AND INFRATRUCTURE INFLUENCE ON RELIABILITY AND OPERATION RT&A # () (Vol.) March RELIABILITY RIK AND AVAILABILITY ANLYI OF A CONTAINER GANTRY CRANE
Network Aware Load-Balancing via Parallel VM Migration for Data Centers
Network Aware Load-Balancng va Parallel VM Mgraton for Data Centers Kun-Tng Chen 2, Chen Chen 12, Po-Hsang Wang 2 1 Informaton Technology Servce Center, 2 Department of Computer Scence Natonal Chao Tung
SIMPLE LINEAR CORRELATION
SIMPLE LINEAR CORRELATION Smple lnear correlaton s a measure of the degree to whch two varables vary together, or a measure of the ntensty of the assocaton between two varables. Correlaton often s abused.
the Manual on the global data processing and forecasting system (GDPFS) (WMO-No.485; available at http://www.wmo.int/pages/prog/www/manuals.
Gudelne on the exchange and use of EPS verfcaton results Update date: 30 November 202. Introducton World Meteorologcal Organzaton (WMO) CBS-XIII (2005) recommended that the general responsbltes for a Lead
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
A Load-Balancing Algorithm for Cluster-based Multi-core Web Servers
Journal of Computatonal Informaton Systems 7: 13 (2011) 4740-4747 Avalable at http://www.jofcs.com A Load-Balancng Algorthm for Cluster-based Mult-core Web Servers Guohua YOU, Yng ZHAO College of Informaton
Availability-Based Path Selection and Network Vulnerability Assessment
Avalablty-Based Path Selecton and Network Vulnerablty Assessment Song Yang, Stojan Trajanovsk and Fernando A. Kupers Delft Unversty of Technology, The Netherlands {S.Yang, S.Trajanovsk, F.A.Kupers}@tudelft.nl
Logical Development Of Vogel s Approximation Method (LD-VAM): An Approach To Find Basic Feasible Solution Of Transportation Problem
INTERNATIONAL JOURNAL OF SCIENTIFIC & TECHNOLOGY RESEARCH VOLUME, ISSUE, FEBRUARY ISSN 77-866 Logcal Development Of Vogel s Approxmaton Method (LD- An Approach To Fnd Basc Feasble Soluton Of Transportaton
SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME
August 7 - August 12, 2006 n Baden-Baden, Germany SPECIALIZED DAY TRADING - A NEW VIEW ON AN OLD GAME Vladmr Šmovć 1, and Vladmr Šmovć 2, PhD 1 Faculty of Electrcal Engneerng and Computng, Unska 3, 10000
AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT
1 AD-SHARE: AN ADVERTISING METHOD IN P2P SYSTEMS BASED ON REPUTATION MANAGEMENT Nkos Salamanos, Ev Alexogann, Mchals Vazrganns Department of Informatcs, Athens Unversty of Economcs and Busness [email protected],
Modeling and Assessment Performance of OpenFlow-Based Network Control Plane
ISSN (Onlne): 2319-7064 Index Coperncus Value (2013): 6.14 Ipact Factor (2013): 4.438 Modelng and Assessent Perforance of OpenFlo-Based Netork Control Plane Saer Salah Al_Yassn Assstant Teacher, Al_Maon
