Detecting App-DDoS Attacks Based on Marking Access and d-svdd

Size: px
Start display at page:

Download "Detecting App-DDoS Attacks Based on Marking Access and d-svdd"

Transcription

1 Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 Detecting App-DDoS Attack Baed on Marking Acce and d-svdd LI Jin-ing, WANG Bin-qiang Nationa Digita Switching Sytem Engineering & Technoogica R&D Center Zhengzhou, China Abtract---In order to enhance the extenibiity of current attack feature extracted and detection mean for App-DDoS(Appication Layer Ditributed Denia of Service, App-DDoSattack, a nove feature extracted method baed on marking acce and a new detection agorithm named d-svdd are propoed. After expreing kind of App-DDoS attack a characteritic vector by acce marked trategy and feature extracted trategy, d-svdd agorithm i ued for econdary caification and detection of pre-et area around deciion boundary baed on SVDD. It i proved by experiment that the propoed feature extracted and detection mean can reaize effective detection for kind of App-DDoS attack, both have atifying time, pace and extenibiity performance. Keyword-App-DDoS attack Marking acce d-svdd Anomay detection I. INTRODUCTION Being different ony in purpoe from norma behavior, App-DDoS attack can eaiy cro the ow-eve defene ytem for traditiona DDoS attack, aong with the fact that deaing with a high-eve appication requet i much more compex, finding out effective detection and defene mean for App-DDoS attack become more and more important []. Currenty, mot detection method for App-DDoS attack are mainy baed on behavior anayi [] and og anayi [3]. One typica detection method baed on uer browing information detect HTTP fooding attack according to uer browing order and the reationhip between view time and page information [4]. Another detection method propoed by Xie Yi and Yu Shunzheng introduce HMM mode to detection agorithm [5][6]. In iterature [7], App-DDoS attack are divided into three categorie by eion parameter: requet fooding attack, aymmetric workoad attack and repeated one-hot attack. According to thi caification, a eion upiciou degree mode i propoed for anomay detection and fitering. After anayzing the detection method above, we can concude: App-DDoS attack have ot of different type becaue of the difference among appication ayer ervice and protoco, whie mean baed on behavior anayi and og anayi ony conider Web erver moty, the extracted character have poor extenibiity Anomay detection method deepy depend on extracted character, o the poor extenibiity of character directy affect the extenibiity of detection method. In order to enhance the extenibiity of extracted character and correponding detection agorithm, achieve effective detection for variou attack, a nove feature extracted method baed on marking acce and a new detection agorithm named d-svdd are propoed in thi paper. The fow chart of uch detection agorithm i hown in Figure. di < R Figure. The fow chart of detection agorithm The detection agorithm i divided into training and detection phae in detai. In training phae, mark norma uer acce behavior with no marking trategy firty, and then et marking period and average interva between conecutive acce tamp t d according to the initia marked reut. After that proce the initia acce tamp with marking trategy. When a of thee are competed, feature extracted method i appied to obtain effective detection character, and SVDD agorithm i ued to get norma uer SVDD hyperphere. A of the reut wi be aved in training databae and get fuy prepared for the next detection phae. II. FEATURE EXTRACTED METHOD BASED ON MARKING ACCESS In detection phae, every uer acceing to the erver wi be marked with marking trategy, incuding marking acce time and acce page. According to different erver, different requet wi be eected to mark. For exampe, HTTP GET requet wi be marked in attack againt Web erver, whie DNS requet wi be marked during attack againt DNS erver. Take attack againt Web erver for exampe, acce time marked method adopt trategy a foow: if the currentamp interva t ' i e than d t d, wi be aigned to currentamp, otherwie 0 wi be aigned. Acce page i marked uing the foowing trategy: if the page requeted by current uer doen t exit in protected Web Pubihed by Atanti Pre, Pari, France. the author,

2 Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 erver, wi be aigned, otherwie no-treatment wi be taken. Acce marked trategy for attack againt DNS erver i ony ighty different from Web erver in acce page marked trategy: if the domain name requeted doen t exit in currenerver cache, and no anwer received after a recurive query, mark current page a, otherwie, do nothing. Obviouy, the marked reut can not be ued a detection character, it neceary to obtain effective character by uitabe feature extracted trategy. The effective character houd meet the foowing condition: the extracted character can fuy refect the time and pace ditribution of uer acce behavior the character wi change obviouy when attack occur. Take attack againt Web erver for exampe, the character extracted trategy i decribed a foowing: Input: uer marked reut during Output: the character vector of uer i Method: For uer i during : Count the tota number of tamp and 0, expreed a ic Count the maxima number of continuou tamp, expreed a i 3 Count the maxima number of continuou tamp 0, expreed a i0 4 Count the tota number of tamp, expreed a i 5 Cacuate the ratio of i to ic, expreed a p i = i / ic For a the uer during : 6 Cacuate the entropy of a the requeted page, expreed a H Then uer i can be expreed a character vector Ci =< ic, i, i0, pi, H >, where ic expree the tota requet of uer i during, i and i0 expre the view time of uer i. Under norma behavior, i and ic are maer whie i0 i arger than attack time. pi expree the frequency of forged requet aunched by uer i. which i very effective for detecting Forged-URL Food attack. H expree the ditribution of uer interet, which i arger under attack time. Acce marked and feature extracted mean are not imited to pecific erver, which can ao be uefu for detecting attack againt other erver via ighty modifying correponding trategie. Take attack againt DNS erver for exampe, acce uer can be expreed a character vector Ci =< ic, i, i0, pi >.In ummary, for differenerver, athough there exit difference between acce marked trategie and character extracted trategie, undeniaby the imiarity between them bring u more urprie, which enhance the extenibiity of extracted character perfecty. III. d-svdd SECONDARY CLASSIFICATION AND DETECTION ALGORITHM A. SVDD caification agorithm Conidering the workoad and purity of obtaining kind of App-DDoS attack ampe in training phae, our paper adopt a caification agorithm named Support Vector Data Decription, SVDD for hort [8], in which ony norma ampe wi be needed. In SVDD, norma d ampe ci R ( i =,,, wi be mapped to high -dimeniona pace by Φ (where Kc ( i, cj =Φ( ci Φ ( cj,k i the kerne function eected, then a minimum hyperphere a deciion boundary wi be obtained, containing norma ampe a many a poibe. The center and radiu of the phere are denoted a C 0 and R. The agorithm SVDD i tranformed into oving optimization probem tated a: min R + ξi v i=.t Φ( ci C0 R ξi, ξi 0, i =,,, ( where ack variabe ξ i repreent the penaty aociated with the deviation of the ith training ampe outide the phere, and /v ( v [0,], i the number of ampei a trade-off contant controing the reative importance of each ampe. The dua probem of equation i: max W( α = αα K( c, c α K( c, c i j i j i i i i, j= i=.t αi =, αi [0, ], i =,, ( i= v Soving the dua probem above, a ma amount of ampe with zero vaue of αi are taken a upport vector, the center of hyperphere can be expreed a C0 = αiφ( ci (3 i= and radiu R can be computed by utiizing the ditance between C 0 and any upport vector: i j α j i j α j= R ( K( c, c K( c, c + = 0 (4 The fina form of deciion function i f ( c = R [ Kcc (, α Kc (, c+ αα Kc (, c] i i i j i j i= i, j= (5 In order to find optima number of upport vector, et -ting trade-off contant/v and eecting kerne function K pay an important roe. The maer the parameter v i, the more the ampe contained in hyperphere. We ue the popuar Gauian radia bai function (RBF a the kerne function, defined a x x kx (, x = exp[ ] (6 σ RBF kerne function [9] can map noninear ampe to unimited high-dimeniona pace with etting ony one parameter σ, where σ determine the compexity of deciion boundary. Pubihed by Atanti Pre, Pari, France. the author,

3 Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 B. d-svdd econdary caification agorithm Fae aarm rate and detection rate are taken to judge the performance of SVDD caification agorithm. In order to repone norma uer requet a many a poibe, good agorithm extenibiity and ow fae aarm rate houd be conidered during getting SVDD hyperphere, which wi ead to ome decine in detection rate. In order to achieve a better baance between the fae aarm rate and detection rate, guaranteeing high detection rate whie enuring reaonabe extenibiity, a new caification agorithm named diviion of Support Vector Data Decription, hort for d-svdd i propoed. Baed on SVDD, the interna and externa pace of hyperphere near the deciion boundary wi be caified econdariy, that i caed econdariy caified area. K-mean cutering agorithm wi be ued to reaize ub-region egmentation of econdariy caified area and the abnorma degree of each ub-region wi be cacuated. For character vector in econdariy caified area, abnorma degree wi be aigned according to pecific ub-region, and the correponding uer requet behavior wi be tracked for imited integer mutipe of. Finay, we can reaize econdary detection for upiciou uer by average abnorma degree during the tracking time. The d-svdd agorithm i decribed a foowing: Input: the phere of SVDD, ampe for detection Output: anomay detection reut Method: During, ditance between C i and C 0 can be of jth ub-region can be cacuated according to the equation f j = nj / n, where 0<j<m, the abnorma degree of bank area i defined a. 4 If ditance d i between C i and C0 i maer than R, and the ampe i out of econdariy caified area, it wi be treated a norma uer denoted a C ii, the abnormay degree i et a 0. If d i > R, and the ampe i out of econdariy caified area, it wi be treated a attack uer denoted a C io, the abnorma degree i et a. 5 If the currenampe ie in the jth ub-region, it wi be denoted a C i with the correponding abnorma degree et a f. 6 Track C i j for imited integer mutipe of, and cacuate it average abnorma degree during tracking time. If the reut i higher than threhod, the ampe wi be treated a attacker, otherwie it wi be treated a norma. Becaue of the fact that d-svdd further caifie the upiciou ampe in econdariy caified area, a good baance i obtained between agorithm extenibiity and detection rate, which improve the detection performance greaty than SVDD agorithm and i more uitabe for App-DDoS attack detection. According to tep 4, we can fiter the obviou attacker whie anomay detection, and mitigate the preure of the protected erver to be attacked. IV. SIMULATION cacuated through di = K( ci, cj α jk( ci, cj + α.after In order to verify the effectivene of character j = extracted method baed on marking acce and the etting the factor of econdariy caified area λ detection agorithm d-svdd, thi paper buid Web ( 0< λ <,the econdariy caified area can be erver, DNS erver tet network environment expreed a ( λ R di ( + λ R. repectivey according to reference [] and []. Acce data from 700 t During training phae, ampe in econdariy to 00 before the attack are taken for caified area wi be cutered by K-mean cutering training, whie the foowing 00 norma data before agorithm [0]. The ub-region of ioated ampe i a attack are taken for teting. Simuate 0 CC attack phere with the ampe itef a center, and foowing the againt Web erver and 60 attack againt DNS erver principe that there are no overap with any other by CC attack oftware and DNS Abuer v.0 repectivey. exiting ub-region. Take the repace of econdariy Attack data are randomy injected into tet data, and caified area that doen t beong to any exiting detected by the propoed method. The detection reut ub-region a the at region named bank region. We are hown in tabe. uppoe there are m ub-region after econdary partition. 3 If there are n ampe in econdariy caified area and n j ampe in the jth ub-region, the abnorma degree TABLE I. The detection reut of CC attack and DNS Attack attack type judge tandard SVDD d-svdd CC attack (Attack (Norma detection rate t /Tota fae aarm rate /Tota t 78.% (0/30 6.8% (00/30 8.3% (60/00 5.6% (40/00 97.% (0/30.0% (00/ % (60/00 0.9% (40/00 DNS rebounding attack (Attack detection rate /Tota 80.8% (60/ % (30/00 97.% (60/ % (30/00 Pubihed by Atanti Pre, Pari, France. the author,

4 Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 fae aarm rate (Norma /Tota There can be concuded from experiment reut in tabe : Both CC and DNS rebounding attack have been detected effectivey, which expree reativey trong extenibiity of acce marked trategy and agorithm d-svdd Under the ame condition, the detection performance of d-svdd i obviouy better than SVDD, thi i becaue the deciion boundary of SVDD i et without attack information, whie the further detection for econdariy caified area by d-svdd compenate thi drawback we 3 Both two agorithm how better detection performance for DNS rebounding attack than CC attack, which i mainy due to the matching degree between attack and extracted character. V. PERFORMANCE ANALYSIS A. The pace compexity of character extracted trategy baed on marking acce There are ony two tate during marking acce time: or 0, o one bit i enough to expre. Simiary, one bit i ao enough to expre the two tate during marking acce page. Therefore, if the average tamp during are 0, the correponding pace occupied i 40 bit, and 80 Mbit(=0Mbyte are enough for marking 0 6 uer. Thu, even there are ot of acce uer, the pace occupied for marking i ti very ow. B. The time compexity of agorithm SVDD and d-svdd When SVDD i ued, there are two competey different procee in fact: training phae and detecting phae. For anomay detection in our paper, we mainy concern the accuracy and competene of training phae, the time compexity in acceptabe range ha itte affection on agorithm performance, o we ony concern the time compexity of detection phae. Mot of the time conumed during detection phae i pent on cacuating ditance d i and comparing it with R, becaue center C0 and radiu R are known, o the time compexity i O(. The time conumed during d-svdd detection phae i mainy pent on k-mean cutering and cacuating abnorma degree, the time compexity of them are O(knt and O( repectivey, where k i the number of cuter, t i the number of iteration, n i the number of vector for cutering, generay t<n, k<n. Becaue vector in econdariy caified area are a ma portion of the tota vector, o the time compexity of d-svdd i acceptabe. In ummary, the tota time compexity i O(knt. 7.9% (00/60 Detection rate Detecion rate 6.3% (70/ % (00/ % (70/00 d-svdd HMM Seion Fae aarm rate Figure. Comparion of ROC curve for DNS erver d-svdd HMM Seion Fae aarm rate Figure 3. Comparion of ROC curve for FTP erver C. Comparion with other agorithm Due to the reativey trong extenibiity of character extracted method baed on marking acce and the detection agorithm d-svdd, detection performance obviouy extend that of Seion mode and HMM mode when detecting attack againt FTP and DNS attack, hown in figure and 3. We can ee that d-svdd agorithm ha atifying performance for a kind of App-DDoS attack, whie Seion mode and HMM mode have poor detection performance for FTP and DNS attack. VI. CONCLUSION In order to enhance the extenibiity of extracted character and detection agorithm, achieve effective detection for variou App-DDoS attack, thi paper give a new character extracted method baed on marking acce and an improved detection agorithm d-svdd. Acce marked and feature extracted mean are not imited to pecific erver, which can ao be uitabe for detecting attack againt other erver baed on ighty improving correponding trategie. The agorithm d-svdd compenate SVDD drawback we through further detection for econdariy caified area, which greaty improve detection performance under the ame training and detecting condition. Due to the idea pace, time and detection performance of detection agorithm propoed in thi paper, it wi achieve atifying detection performance for kind of App-DDoS attack. Pubihed by Atanti Pre, Pari, France. the author,

5 Proceeding of the nd Internationa Sympoium on Computer, Communication, Contro and Automation (ISCCCA-3 ACKNOWLEDGMENT Thi work i upported by Nationa High-Tech Reearch & Deveopment Program of China (No. 0AA0A03. REFERENCES [] V Durcekova, L Schwartz, N Shahmehri. Sophiticated Denia of Service Attack Aimed at Appication Layer[C]. ELEKTRO, Rajeck Tepice, 0: [] Anuja. R. Zade, Suha. H. Pati. A Survey on Variou Defene Mechanim Againt Appication Layer Ditributed Denia Of Service Attack [J]. Internationa Journa on Computer Science and Engineering, 0, (3: [3] DUAN Jian-i, LIU Shu-xia. Reearch on Web Log Mining Anayi[C]. Internationa Sympoium on Intrumentation & Meaurement, Senor Network and Automation, 0: [4] Yatahai T,Iohara T,Saae I. Detection of HTTP-GET Food Attack Baed on Anayi of Page Acce Behavior[C]. Proceeding of the IEEE Pacific Rim Conference on Communication,Computer and Signa Proceing,007: [5] XIE Yi, YU Shun-zheng. Monitoring the Appication-Layer DDoS Attack for Popuar Webite[C]. IEEE/ACM Tranaction on Networking, 009, (7:5-5. [6] XIE Yi, YU Shun-zheng. A Large-Scae Hidden Semi-Markov Mode for Anomay Detection on Uer Browing Behavior[C]. IEEE/ACM Tranaction on Networking, 009, (7: [7] Ranjan S, Swaninathan R, Uya M, Knighty E. DDoS-Shied: DDoS-reiiencheduing to counter appication ayer attack[c]. IEEE/ACM Tranaction on Networking, 009, (7:6-39. [8] Agrawa, P.K, Gupta, B.B, Jain, S. SVM Baed Scheme for Predicting Number of Zombie in a DDoS Attack[C]. European Inteigence and Security Informatic Conference, Athen, 0:78-8. [9] ZHU Xiao-kai, YANG De-gui. Muti-Ca Support Vector Domain Decription for Pattern Recognition Baed on a Meaure of Expanibiity[J]. Chinee Journa of Eectronic. 009, 3(37: [0] Tapa kanungo, David M. Mount, Nathan S. Netanyahu. An Efficient k-mean Cutering Agorithm: Anayi and Impementation[J]. IEEE Tranaction on Pattern Anayi and Machine Inteigence, 00, 7(4: [] ZHI Jian. Reearch on DDoS Attack Baed on The Appication Layer. [Mater diertation], Daian Maritime Univerity, 0. [] OU Shuai. Reearch and Deign of Defene Sytem Againt DNS Ditributed Denia of Service Attack. [Mater diertation], Southwet Jiaotong Univerity, 009. Pubihed by Atanti Pre, Pari, France. the author,

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA

Avelino J. Gonzalez School of Electrical Engineering and Computer Science University of Central Florida Orlando, FL 32816-2450, USA From: FLAIRS-02 Proceeding. Copyright 2002, AAAI (www.aaai.org). A right reerved. Sytem Refinement in Practice Uing a Forma Method to Modify Rea Life Knowedge Rainer Knauf and Ika Phiippow Imenau Technica

More information

PREFACE. 44 p. PARB PIM LTD., PART. 296 Soi Jarunsanitwong 40. and to prepare for the external quality assessment.

PREFACE. 44 p. PARB PIM LTD., PART. 296 Soi Jarunsanitwong 40. and to prepare for the external quality assessment. ManuafortheInternaQuaityAuranceforHigherEducationIntitution : Commiion on Higher Education, Minitry of Education : Bangkok, Thaiand 2008 PREFACE 44 p. The Higher Education Interna Quaity Aurance Committee

More information

8 TWO-WAY SLABS. Figure 1: Two way slabs

8 TWO-WAY SLABS. Figure 1: Two way slabs 1 8 TWO-WAY SLABS To-ay Sab: When the ratio (L/ S) i e than 2.0, it i caed to-ay ab, hon in Figure 1. Bending i take pace in the to direction in a dih-ike form. Accordingy, main reinforcement i required

More information

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks

A Cross-Layer Optimization Framework for Multicast in Multi-hop Wireless Networks A Cro-Layer Optimization Framework for Muticat in Muti-hop Wiree Network Jun Yuan, Zongpeng Li, Wei Yu, Baochun Li Department of Eectrica and Computer Engineering Univerity of Toronto {teveyuan@comm, arcane@eecg,

More information

A Spam Message Filtering Method: focus on run time

A Spam Message Filtering Method: focus on run time , pp.29-33 http://dx.doi.org/10.14257/atl.2014.76.08 A Spam Meage Filtering Method: focu on run time Sin-Eon Kim 1, Jung-Tae Jo 2, Sang-Hyun Choi 3 1 Department of Information Security Management 2 Department

More information

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY

CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Annale Univeritati Apuleni Serie Oeconomica, 2(2), 200 CHARACTERISTICS OF WAITING LINE MODELS THE INDICATORS OF THE CUSTOMER FLOW MANAGEMENT SYSTEMS EFFICIENCY Sidonia Otilia Cernea Mihaela Jaradat 2 Mohammad

More information

SCM- integration: organiational, managerial and technological iue M. Caridi 1 and A. Sianei 2 Dipartimento di Economia e Produzione, Politecnico di Milano, Italy E-mail: [email protected] Itituto

More information

Mixed Method of Model Reduction for Uncertain Systems

Mixed Method of Model Reduction for Uncertain Systems SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol 4 No June Mixed Method of Model Reduction for Uncertain Sytem N Selvaganean Abtract: A mixed method for reducing a higher order uncertain ytem to a table reduced

More information

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management

Apigee Edge: Apigee Cloud vs. Private Cloud. Evaluating deployment models for API management Apigee Edge: Apigee Cloud v. Private Cloud Evaluating deployment model for API management Table of Content Introduction 1 Time to ucce 2 Total cot of ownerhip 2 Performance 3 Security 4 Data privacy 4

More information

Morningstar Fixed Income Style Box TM Methodology

Morningstar Fixed Income Style Box TM Methodology Morningtar Fixed Income Style Box TM Methodology Morningtar Methodology Paper Augut 3, 00 00 Morningtar, Inc. All right reerved. The information in thi document i the property of Morningtar, Inc. Reproduction

More information

Change Management Plan Blackboard Help Course 24/7

Change Management Plan Blackboard Help Course 24/7 MIT 530 Change Management Plan Help Coure 24/7 Submitted by: Sheri Anderon UNCW 4/20/2008 Introduction The Univerity of North Carolina Wilmington (UNCW) i a public comprehenive univerity, one of the ixteen

More information

Design of Channel Filter based on Asymmetric One-Dimensional Defective Photonic Crystal for Broadband Responses

Design of Channel Filter based on Asymmetric One-Dimensional Defective Photonic Crystal for Broadband Responses Proceeding of the Internationa uticonference of Engineer and Computer Scientit 25 Vo II, IECS 25, arch 8-2, 25, Hong Kong Deign of Channe Fiter baed on Aymmetric One-Dimeniona Defective Photonic Cryta

More information

FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS

FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS FAULT LOCATION AND SERVICE RESTORATION METHOD FOR LARGE-SCALE DISTRIBUTION NETWORKS A. Gonzáez, F. M. Echavarren, L. Rouco, T. Gómez Intituto de Invetigación Tecnoógica Univeridad Pontiicia Comia Madrid,

More information

Solved Problems Chapter 3: Mechanical Systems

Solved Problems Chapter 3: Mechanical Systems ME 43: Sytem Dynamic and Contro Probem A-3-8- Soved Probem Chapter 3: Mechanica Sytem In Figure 3-3, the impe penduum hown conit of a phere of ma m upended by a tring of negigibe ma. Negecting the eongation

More information

Secure Network Coding with a Cost Criterion

Secure Network Coding with a Cost Criterion Secure Network Coding with a Cost Criterion Jianong Tan, Murie Médard Laboratory for Information and Decision Systems Massachusetts Institute of Technoogy Cambridge, MA 0239, USA E-mai: {jianong, medard}@mit.edu

More information

Return on Investment and Effort Expenditure in the Software Development Environment

Return on Investment and Effort Expenditure in the Software Development Environment International Journal of Applied Information ytem (IJAI) IN : 2249-0868 Return on Invetment and Effort Expenditure in the oftware Development Environment Dineh Kumar aini Faculty of Computing and IT, ohar

More information

License & SW Asset Management at CES Design Services

License & SW Asset Management at CES Design Services Licene & SW Aet Management at CES Deign Service [email protected] www.ces-deignservice.com 2003 Siemen AG Öterreich Overview 1. Introduction CES Deign Service 2. Objective and Motivation 3. What

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS Chritopher V. Kopek Department of Computer Science Wake Foret Univerity Winton-Salem, NC, 2709 Email: [email protected]

More information

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN

EVALUATING SERVICE QUALITY OF MOBILE APPLICATION STORES: A COMPARISON OF THREE TELECOMMUNICATION COMPANIES IN TAIWAN International Journal of Innovative Computing, Information and Control ICIC International c 2012 ISSN 1349-4198 Volume 8, Number 4, April 2012 pp. 2563 2581 EVALUATING SERVICE QUALITY OF MOBILE APPLICATION

More information

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle

DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS. G. Chapman J. Cleese E. Idle DISTRIBUTED DATA PARALLEL TECHNIQUES FOR CONTENT-MATCHING INTRUSION DETECTION SYSTEMS G. Chapman J. Cleee E. Idle ABSTRACT Content matching i a neceary component of any ignature-baed network Intruion Detection

More information

CASE STUDY BRIDGE. www.future-processing.com

CASE STUDY BRIDGE. www.future-processing.com CASE STUDY BRIDGE TABLE OF CONTENTS #1 ABOUT THE CLIENT 3 #2 ABOUT THE PROJECT 4 #3 OUR ROLE 5 #4 RESULT OF OUR COLLABORATION 6-7 #5 THE BUSINESS PROBLEM THAT WE SOLVED 8 #6 CHALLENGES 9 #7 VISUAL IDENTIFICATION

More information

A Review On Software Testing In SDlC And Testing Tools

A Review On Software Testing In SDlC And Testing Tools www.ijec.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Iue -9 September, 2014 Page No. 8188-8197 A Review On Software Teting In SDlC And Teting Tool T.Amruthavalli*,

More information

Project Management Basics

Project Management Basics Project Management Baic A Guide to undertanding the baic component of effective project management and the key to ucce 1 Content 1.0 Who hould read thi Guide... 3 1.1 Overview... 3 1.2 Project Management

More information

Independent Samples T- test

Independent Samples T- test Independent Sample T- tet With previou tet, we were intereted in comparing a ingle ample with a population With mot reearch, you do not have knowledge about the population -- you don t know the population

More information

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation

A Similarity Search Scheme over Encrypted Cloud Images based on Secure Transformation A Simiarity Search Scheme over Encrypted Coud Images based on Secure Transormation Zhihua Xia, Yi Zhu, Xingming Sun, and Jin Wang Jiangsu Engineering Center o Network Monitoring, Nanjing University o Inormation

More information

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL

Two Dimensional FEM Simulation of Ultrasonic Wave Propagation in Isotropic Solid Media using COMSOL Excerpt from the Proceeding of the COMSO Conference 0 India Two Dimenional FEM Simulation of Ultraonic Wave Propagation in Iotropic Solid Media uing COMSO Bikah Ghoe *, Krihnan Balaubramaniam *, C V Krihnamurthy

More information

CASE STUDY ALLOCATE SOFTWARE

CASE STUDY ALLOCATE SOFTWARE CASE STUDY ALLOCATE SOFTWARE allocate caetud y TABLE OF CONTENTS #1 ABOUT THE CLIENT #2 OUR ROLE #3 EFFECTS OF OUR COOPERATION #4 BUSINESS PROBLEM THAT WE SOLVED #5 CHALLENGES #6 WORKING IN SCRUM #7 WHAT

More information

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks

Simultaneous Routing and Power Allocation in CDMA Wireless Data Networks Simutaneous Routing and Power Aocation in CDMA Wireess Data Networks Mikae Johansson *,LinXiao and Stephen Boyd * Department of Signas, Sensors and Systems Roya Institute of Technoogy, SE 00 Stockhom,

More information

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1.

REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND TAGUCHI METHODOLOGY. Abstract. 1. International Journal of Advanced Technology & Engineering Reearch (IJATER) REDUCTION OF TOTAL SUPPLY CHAIN CYCLE TIME IN INTERNAL BUSINESS PROCESS OF REAMER USING DOE AND Abtract TAGUCHI METHODOLOGY Mr.

More information

A note on profit maximization and monotonicity for inbound call centers

A note on profit maximization and monotonicity for inbound call centers A note on profit maximization and monotonicity for inbound call center Ger Koole & Aue Pot Department of Mathematic, Vrije Univeriteit Amterdam, The Netherland 23rd December 2005 Abtract We conider an

More information

Warehouse Security System based on Embedded System

Warehouse Security System based on Embedded System International Conference on Logitic Engineering, Management and Computer Science (LEMCS 2015) Warehoue Security Sytem baed on Embedded Sytem Gen Li Department of Electronic Engineering, Tianjin Univerity

More information

Performance of Multiple TFRC in Heterogeneous Wireless Networks

Performance of Multiple TFRC in Heterogeneous Wireless Networks Performance of Multiple TFRC in Heterogeneou Wirele Network 1 Hyeon-Jin Jeong, 2 Seong-Sik Choi 1, Firt Author Computer Engineering Department, Incheon National Univerity, [email protected] *2,Correponding

More information

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE

BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE Progre In Electromagnetic Reearch Letter, Vol. 3, 51, 08 BUILT-IN DUAL FREQUENCY ANTENNA WITH AN EMBEDDED CAMERA AND A VERTICAL GROUND PLANE S. H. Zainud-Deen Faculty of Electronic Engineering Menoufia

More information

Bi-Objective Optimization for the Clinical Trial Supply Chain Management

Bi-Objective Optimization for the Clinical Trial Supply Chain Management Ian David Lockhart Bogle and Michael Fairweather (Editor), Proceeding of the 22nd European Sympoium on Computer Aided Proce Engineering, 17-20 June 2012, London. 2012 Elevier B.V. All right reerved. Bi-Objective

More information

A technical guide to 2014 key stage 2 to key stage 4 value added measures

A technical guide to 2014 key stage 2 to key stage 4 value added measures A technical guide to 2014 key tage 2 to key tage 4 value added meaure CONTENTS Introduction: PAGE NO. What i value added? 2 Change to value added methodology in 2014 4 Interpretation: Interpreting chool

More information

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique

Simulation of Sensorless Speed Control of Induction Motor Using APFO Technique International Journal of Computer and Electrical Engineering, Vol. 4, No. 4, Augut 2012 Simulation of Senorle Speed Control of Induction Motor Uing APFO Technique T. Raghu, J. Sriniva Rao, and S. Chandra

More information

Active Sway Control of a Single Pendulum Gantry Crane System using Output-Delayed Feedback Control Technique

Active Sway Control of a Single Pendulum Gantry Crane System using Output-Delayed Feedback Control Technique 21 11th. Int. Conf. Contro, Automation, Robotic and Viion Singapore, 5-8th December 21 Active Sway Contro of a Singe Penduum Gantry Crane Sytem uing Output-Deayed Feedback Contro echnique Rajeeb Dey, Nihant

More information

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations

Profitability of Loyalty Programs in the Presence of Uncertainty in Customers Valuations Proceeding of the 0 Indutrial Engineering Reearch Conference T. Doolen and E. Van Aken, ed. Profitability of Loyalty Program in the Preence of Uncertainty in Cutomer Valuation Amir Gandomi and Saeed Zolfaghari

More information

An Integrated Data Management Framework of Wireless Sensor Network

An Integrated Data Management Framework of Wireless Sensor Network An Integrated Data Management Framework of Wireess Sensor Network for Agricutura Appications 1,2 Zhao Liang, 2 He Liyuan, 1 Zheng Fang, 1 Jin Xing 1 Coege of Science, Huazhong Agricutura University, Wuhan

More information

A train dispatching model based on fuzzy passenger demand forecasting during holidays

A train dispatching model based on fuzzy passenger demand forecasting during holidays Journa of Industria Engineering and Management JIEM, 2013 6(1):320-335 Onine ISSN: 2013-0953 Print ISSN: 2013-8423 http://dx.doi.org/10.3926/jiem.699 A train dispatching mode based on fuzzy passenger demand

More information

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds

Acceleration-Displacement Crash Pulse Optimisation A New Methodology to Optimise Vehicle Response for Multiple Impact Speeds Acceleration-Diplacement Crah Pule Optimiation A New Methodology to Optimie Vehicle Repone for Multiple Impact Speed D. Gildfind 1 and D. Ree 2 1 RMIT Univerity, Department of Aeropace Engineering 2 Holden

More information

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing.

Fast Robust Hashing. ) [7] will be re-mapped (and therefore discarded), due to the load-balancing property of hashing. Fast Robust Hashing Manue Urueña, David Larrabeiti and Pabo Serrano Universidad Caros III de Madrid E-89 Leganés (Madrid), Spain Emai: {muruenya,darra,pabo}@it.uc3m.es Abstract As statefu fow-aware services

More information

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal

How Enterprises Can Build Integrated Digital Marketing Experiences Using Drupal How Enterprie Can Build Integrated Digital Marketing Experience Uing Drupal acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 How Enterprie Can Build Integrated Digital Marketing

More information

Bio-Plex Analysis Software

Bio-Plex Analysis Software Multiplex Supenion Array Bio-Plex Analyi Software The Leader in Multiplex Immunoaay Analyi Bio-Plex Analyi Software If making ene of your multiplex data i your challenge, then Bio-Plex data analyi oftware

More information

Cluster-Aware Cache for Network Attached Storage *

Cluster-Aware Cache for Network Attached Storage * Cluter-Aware Cache for Network Attached Storage * Bin Cai, Changheng Xie, and Qiang Cao National Storage Sytem Laboratory, Department of Computer Science, Huazhong Univerity of Science and Technology,

More information

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng

Optical Illusion. Sara Bolouki, Roger Grosse, Honglak Lee, Andrew Ng Optical Illuion Sara Bolouki, Roger Groe, Honglak Lee, Andrew Ng. Introduction The goal of thi proect i to explain ome of the illuory phenomena uing pare coding and whitening model. Intead of the pare

More information

Chapter 3 Torque Sensor

Chapter 3 Torque Sensor CHAPTER 3: TORQUE SESOR 13 Chapter 3 Torque Senor Thi chapter characterize the iue urrounding the development of the torque enor, pecifically addreing meaurement method, tranducer technology and converter

More information

Solutions to Sample Problems for Test 3

Solutions to Sample Problems for Test 3 22 Differential Equation Intructor: Petronela Radu November 8 25 Solution to Sample Problem for Tet 3 For each of the linear ytem below find an interval in which the general olution i defined (a) x = x

More information

Physics 100A Homework 11- Chapter 11 (part 1) The force passes through the point A, so there is no arm and the torque is zero.

Physics 100A Homework 11- Chapter 11 (part 1) The force passes through the point A, so there is no arm and the torque is zero. Physics A Homework - Chapter (part ) Finding Torque A orce F o magnitude F making an ange with the x axis is appied to a partice ocated aong axis o rotation A, at Cartesian coordinates (,) in the igure.

More information

Teamwork. Abstract. 2.1 Overview

Teamwork. Abstract. 2.1 Overview 2 Teamwork Abstract This chapter presents one of the basic eements of software projects teamwork. It addresses how to buid teams in a way that promotes team members accountabiity and responsibiity, and

More information

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger

Advanced ColdFusion 4.0 Application Development - 3 - Server Clustering Using Bright Tiger Advanced CodFusion 4.0 Appication Deveopment - CH 3 - Server Custering Using Bri.. Page 1 of 7 [Figures are not incuded in this sampe chapter] Advanced CodFusion 4.0 Appication Deveopment - 3 - Server

More information

A New Statistical Approach to Network Anomaly Detection

A New Statistical Approach to Network Anomaly Detection A New Statistica Approach to Network Anomay Detection Christian Caegari, Sandrine Vaton 2, and Michee Pagano Dept of Information Engineering, University of Pisa, ITALY E-mai: {christiancaegari,mpagano}@ietunipiit

More information

Performance of a Browser-Based JavaScript Bandwidth Test

Performance of a Browser-Based JavaScript Bandwidth Test Performance of a Brower-Baed JavaScript Bandwidth Tet David A. Cohen II May 7, 2013 CP SC 491/H495 Abtract An exiting brower-baed bandwidth tet written in JavaScript wa modified for the purpoe of further

More information

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER

CHAPTER 5 BROADBAND CLASS-E AMPLIFIER CHAPTER 5 BROADBAND CLASS-E AMPLIFIER 5.0 Introduction Cla-E amplifier wa firt preented by Sokal in 1975. The application of cla- E amplifier were limited to the VHF band. At thi range of frequency, cla-e

More information

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test

Report 4668-1b 30.10.2010. Measurement report. Sylomer - field test Report 4668-1b Meaurement report Sylomer - field tet Report 4668-1b 2(16) Contet 1 Introduction... 3 1.1 Cutomer... 3 1.2 The ite and purpoe of the meaurement... 3 2 Meaurement... 6 2.1 Attenuation of

More information

Face Hallucination and Recognition

Face Hallucination and Recognition Face Haucination and Recognition Xiaogang Wang and Xiaoou Tang Department of Information Engineering, The Chinese University of Hong Kong {xgwang1, xtang}@ie.cuhk.edu.hk http://mmab.ie.cuhk.edu.hk Abstract.

More information

Multi-Robot Task Scheduling

Multi-Robot Task Scheduling Proc of IEEE Internationa Conference on Robotics and Automation, Karsruhe, Germany, 013 Muti-Robot Tas Scheduing Yu Zhang and Lynne E Parer Abstract The scheduing probem has been studied extensivey in

More information

SNMP Reference Guide for Avaya Communication Manager

SNMP Reference Guide for Avaya Communication Manager SNMP Reference Guide for Avaya Communication Manager 03-602013 Issue 1.0 Feburary 2007 2006 Avaya Inc. A Rights Reserved. Notice Whie reasonabe efforts were made to ensure that the information in this

More information

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability

Control Theory based Approach for the Improvement of Integrated Business Process Interoperability www.ijcsi.org 201 Control Theory baed Approach for the Improvement of Integrated Buine Proce Interoperability Abderrahim Taoudi 1, Bouchaib Bounabat 2 and Badr Elmir 3 1 Al-Qualadi Reearch & Development

More information

Utility-Based Flow Control for Sequential Imagery over Wireless Networks

Utility-Based Flow Control for Sequential Imagery over Wireless Networks Utility-Baed Flow Control for Sequential Imagery over Wirele Networ Tomer Kihoni, Sara Callaway, and Mar Byer Abtract Wirele enor networ provide a unique et of characteritic that mae them uitable for building

More information

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations

Four Ways Companies Can Use Open Source Social Publishing Tools to Enhance Their Business Operations Four Way Companie Can Ue Open Source Social Publihing Tool to Enhance Their Buine Operation acquia.com 888.922.7842 1.781.238.8600 25 Corporate Drive, Burlington, MA 01803 Four Way Companie Can Ue Open

More information

AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE

AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE AFFORDABLE BUSINESS QUALITY PRINTING FOR YOUR OFFICE www.brother.eu INTRODUCING THE NEW COMPACT MONO LASER RANGE BUSINESS QUALITY PRINTING FOR YOUR OFFICE Brother undertand that your office run on information.

More information

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example.

Brand Equity Net Promoter Scores Versus Mean Scores. Which Presents a Clearer Picture For Action? A Non-Elite Branded University Example. Brand Equity Net Promoter Score Veru Mean Score. Which Preent a Clearer Picture For Action? A Non-Elite Branded Univerity Example Ann Miti, Swinburne Univerity of Technology Patrick Foley, Victoria Univerity

More information

Scheduling of Jobs and Maintenance Activities on Parallel Machines

Scheduling of Jobs and Maintenance Activities on Parallel Machines Scheduling of Job and Maintenance Activitie on Parallel Machine Chung-Yee Lee* Department of Indutrial Engineering Texa A&M Univerity College Station, TX 77843-3131 [email protected] Zhi-Long Chen** Department

More information

SHARESYNC SECURITY FEATURES

SHARESYNC SECURITY FEATURES www.kyboxinnovation.com SHARESYNC SECURITY FEATURES ShareSync provide a high degree of ecurity and protection which allow adminitrator to: Aure compliance with ecurity bet practice Get full viibility over

More information

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks

A Resolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networks A Reolution Approach to a Hierarchical Multiobjective Routing Model for MPLS Networ Joé Craveirinha a,c, Rita Girão-Silva a,c, João Clímaco b,c, Lúcia Martin a,c a b c DEEC-FCTUC FEUC INESC-Coimbra International

More information

Software Engineering Management: strategic choices in a new decade

Software Engineering Management: strategic choices in a new decade Software Engineering : trategic choice in a new decade Barbara Farbey & Anthony Finkeltein Univerity College London, Department of Computer Science, Gower St. London WC1E 6BT, UK {b.farbey a.finkeltein}@ucl.ac.uk

More information

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T

Pekka Helkiö, 58490K Antti Seppälä, 63212W Ossi Syd, 63513T Pekka Helkiö, 58490K Antti Seppälä, 63212W Oi Syd, 63513T Table of Content 1. Abtract...1 2. Introduction...2 2.1 Background... 2 2.2 Objective and Reearch Problem... 2 2.3 Methodology... 2 2.4 Scoping

More information

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society

CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY. Course Offered By: Indian Environmental Society CERTIFICATE COURSE ON CLIMATE CHANGE AND SUSTAINABILITY Course Offered By: Indian Environmenta Society INTRODUCTION The Indian Environmenta Society (IES) a dynamic and fexibe organization with a goba vision

More information

Solution of the Heat Equation for transient conduction by LaPlace Transform

Solution of the Heat Equation for transient conduction by LaPlace Transform Solution of the Heat Equation for tranient conduction by LaPlace Tranform Thi notebook ha been written in Mathematica by Mark J. McCready Profeor and Chair of Chemical Engineering Univerity of Notre Dame

More information

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements

A Supplier Evaluation System for Automotive Industry According To Iso/Ts 16949 Requirements A Suppier Evauation System for Automotive Industry According To Iso/Ts 16949 Requirements DILEK PINAR ÖZTOP 1, ASLI AKSOY 2,*, NURSEL ÖZTÜRK 2 1 HONDA TR Purchasing Department, 41480, Çayırova - Gebze,

More information

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D

T-test for dependent Samples. Difference Scores. The t Test for Dependent Samples. The t Test for Dependent Samples. s D The t Tet for ependent Sample T-tet for dependent Sample (ak.a., Paired ample t-tet, Correlated Group eign, Within- Subject eign, Repeated Meaure,.. Repeated-Meaure eign When you have two et of core from

More information

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN

Mobile Network Configuration for Large-scale Multimedia Delivery on a Single WLAN Mobile Network Configuration for Large-cale Multimedia Delivery on a Single WLAN Huigwang Je, Dongwoo Kwon, Hyeonwoo Kim, and Hongtaek Ju Dept. of Computer Engineering Keimyung Univerity Daegu, Republic

More information

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method

ACO and SVM Selection Feature Weighting of Network Intrusion Detection Method , pp. 129-270 http://dx.doi.org/10.14257/ijsia.2015.9.4.24 ACO and SVM Seection Feature Weighting of Network Intrusion Detection Method Wang Xingzhu Furong Coege Hunan, University of Arts and Science,

More information

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK

CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK CLUSTBIGFIM-FREQUENT ITEMSET MINING OF BIG DATA USING PRE-PROCESSING BASED ON MAPREDUCE FRAMEWORK Sheela Gole 1 and Bharat Tidke 2 1 Department of Computer Engineering, Flora Intitute of Technology, Pune,

More information

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS

FEDERATION OF ARAB SCIENTIFIC RESEARCH COUNCILS Aignment Report RP/98-983/5/0./03 Etablihment of cientific and technological information ervice for economic and ocial development FOR INTERNAL UE NOT FOR GENERAL DITRIBUTION FEDERATION OF ARAB CIENTIFIC

More information

TRADING rules are widely used in financial market as

TRADING rules are widely used in financial market as Complex Stock Trading Strategy Baed on Particle Swarm Optimization Fei Wang, Philip L.H. Yu and David W. Cheung Abtract Trading rule have been utilized in the tock market to make profit for more than a

More information

ACTION: Breaking the Privacy Barrier for RFID Systems

ACTION: Breaking the Privacy Barrier for RFID Systems ACTION: Breaking the Privacy Barrier for RFID Sytem Li Lu, Jinong Han, Renyi Xiao, and Yunhao Liu Deartment of Comuter Science & Engineering, Hong Kong Univerity of Science & Technoogy, Hong Kong, China

More information

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures

Lecture 7 Datalink Ethernet, Home. Datalink Layer Architectures Lecture 7 Dataink Ethernet, Home Peter Steenkiste Schoo of Computer Science Department of Eectrica and Computer Engineering Carnegie Meon University 15-441 Networking, Spring 2004 http://www.cs.cmu.edu/~prs/15-441

More information