Vulnerability Assessment of Cybersecurity for SCADA Systems Using Attack Trees
|
|
|
- Kristin Sanders
- 10 years ago
- Views:
Transcription
1 Vulnerablty Assessment of Cyberseurty for SCADA Systems Usng Attak Trees Chee-Woo Ten, Student Member, IEEE, Chen-Chng Lu, Fellow, IEEE, Manmaran ovndarasu, Member, IEEE Abstrat By penetratng the SCADA system, an ntruder may remotely operate a power system usng supervsory ontrol prvleges. Hene, yberseurty has been reognzed as a major threat due to the potental ntruson to the onlne system. Ths paper proposes a methodology to evaluate the yberseurty vulnerablty usng attak trees. The attak tree formulaton based on power system ontrol networks s used to evaluate the system, senaro, and leaf vulnerabltes. The measure of vulnerabltes n the power system ontrol framework s determned based on exstng yberseurty ondtons before the vulnerablty ndes are evaluated. After the ndes are evaluated, an upper bound s mposed on eah senaro vulnerablty n order to determne the pvotal attak leaves that requre ountermeasure mprovements. The proposed framework an be extended to seurty nvestment analyss. Index Terms-- Attak Tree, Cyberseurty, Defense Systems, ower System Control, Seurty Vulnerablty. S I. INTRODUCTION INCE the September, 200 terrorst attak, the level of vglane has been rased to prevent attaks on power grds. Conventonal desgn of power systems does not provde a power system wth the proteton aganst yber attaks. The threats nlude sendng ontrol ommands va the supervsory ontrol system. Effets of a yber attak nlude loss of produton, degradaton of the onlne ontrol performane, and nablty to take preventve and orretve atons n tme. Damages aused by yber attaks an be atastroph. The wdespread nteronnetvty of the power system ontrol network poses sgnfant rsks to the naton s rtal operatons. Wthout proper ontrol of these omputer systems, ndvduals or organzatons may dsrupt the operatons from remote loatons for malous purposes []. Reent fndngs nlude plans of terrorsm to dsrupt the U.S. power grd [2]. Reent NERC dretves make t mandatory to undertake yberseurty vulnerablty assessment at the operator loatons and to take orretve measures [3]. The NERC seurty doument and ISO/IEC7799 Standard spefy gudelnes for yberseurty n power systems [3-]. In addton, omputer rme and seurty survey onduted by the Computer Seurty Insttute (CSI) ndated nadequate nvestment to seurty awareness tranng n utltes [6]. The lak of seurty awareness s nreasngly problemat as the yber attaks beome more sophstated. There have been novel ontrbutons to dentfy vulnerablty of yberseurty for a power grd. A testbed has been set up n [7] wth C.-W. Ten, C.-C. Lu, M. ovndarasu are wth the Eletral and Computer Engneerng Department, Iowa State Unversty of Sene and Tehnology, Ames, IA, 000 USA (e-mals: [email protected], [email protected], [email protected]). possble ntruson senaros to reognze and mtgate the effet of attaks. In [], a new threat s assumed n generaton ontrol that hakers ould aess to tamper wth the generator ontrol loop parameters. Ths may lead to destablzaton and trppng of rtal unts on the power grd. The ontrbuton of ths paper s an analytal method to measure the vulnerabltes of a ontrol enter and ts related omputer systems. An attak tree model s used as a framework to derve the quanttatve vulnerablty measures. otental ntruson senaros an be determned wth dfferent ombnatons of seurty breahes n order to penetrate the system. The penetraton may allow an ntruder to use SCADA ontrol apabltes to take undesrable atons, ausng serous damages. Ths paper provdes a systemat proedure to evaluate vulnerablty ndes. The remanng of ths paper s organzed as follows. Seton II provdes an overvew of attak tree modelng and ontrol enter networks. The attak tree modelng and methodology s desrbed n Seton III. Seton IV analyzes ntruson senaros n ase studes and provdes examples of a quanttatve vulnerablty analyss. votal attak leaves are determned by mposng an upper bound on the senaro vulnerablty. Seton VII s the onluson and future researh. II. ATTACK TREE MODELIN An attak tree s a graph that onnets more than one attak leaf from eah node [9-0]. An attak tree may onsst of a mult-level herarhy n a predeessor-suessor struture that aptures the possble ways to aheve sub-goals. The top node of an attak tree s the ultmate goal wth ombnatons of subgoals. Eah attak leaf may nlude one or more defense nodes that are dret suessors of the attak leaf. Defense nodes provde ountermeasures. In Fg. (a), the box labeled s a ountermeasure for attak leaf on the left sde. An attak leaf an be an element of dfferent ntruson senaros, dependng on the node onnetvty assoated wth t. The predeessors of eah attak leaf are nodes that are attrbuted wth log operators AND or OR. Eah predeessor node s spef for the gven leaf node. Fg. shows attak trees wth AND and OR onfguratons. All leaves lead to an AND box wll have to be penetrated n order to move up the attak tree,.e., a subsystem has been penetrated. On the other hand, n Fgure (b), f one of the attak leaves s penetrated, t s suffent to move up the attak tree. AND... 2 OR... (a) An attak leaf wth log operator "AND" (b) An attak leaf wth log operator "OR" Fg.. Attak Leaves wth AND or OR /07/$ IEEE.
2 2 A. Control enter ommunaton networks Fg. 2 shows the ommunaton paths wthn power system ontrol networks. Enttes n the ontrol enter, substaton automaton system, dstrbuton management system, Independent System Operator (ISO), and power plant proess ontrol system are nterlnked. The nterdependeny of the ommunaton and power system nfrastrutures plays an essental role to wde area montorng and ontrol. The ommunaton lnk s an optal fber network or a mrowave system. Bakup ontrol enters provde overage for dsaster senaros that may dsable the prmary ontrol enter, e.g., loss of data ommunaton, rtal montorng and ontrol faltes. In addton, Web-Based SCADA s the Internet-Based SCADA and applaton serves to utlty ndustry that provdes onvenent and low ost mantenane by out-sourng the mantenane serves. Ths s mplemented usng a lent-server arhteture though Internet. Web-Based SCADA ower lant roess Control System (enerators) Substaton Automaton System (Buses) Dstrbuton Management System (loads) rmary Control Center Bakup Control Center rmary ath of Communaton Seondary ath of Communaton rmary ISO Control Center Bakup ISO Control Center Fg. 2. Real-Tme Communaton wthn ower System Control Networks The overall ommunaton and omputer nfrastruture s omplex. Defenes of seurty gudelnes and poly enforements may result n penetraton to the networks. Vulnerablty assessment for eah entty s to dentfy the aess ponts to the network as well as yber assets. Ths nludes omprehensve password poly enforement and onstant audtng of unused default ports avalable. B. Introduton to the methodology A yberseurty vulnerablty ndex s a measure of the lkelhood that an attak tree or attak leaf wll be ompromsed by hakers []. Eah attak leaf may have weaknesses that are prone to attak. The vulnerablty ndex ranges from 0 to, from the most nvulnerable (0 value) to the most vulnerable ( value). There are separate vulnerablty ndes for eah attak leaf and eah ntruson senaro. There s also an overall system vulnerablty ndex. All ndes range from 0 to. A vulnerablty ndex s determned based on: () evdene of ed ntrusons; (2) exstng ountermeasures and mproved ountermeasures [2]; and (3) password poly enforement [3]. The vulnerablty ndex s evaluated wth the hypothess lsted n Table I [4]. Three ondtons are defned n Table I. Condton states that there s no evdene to suggest that there are ntruson s for the system. Condton s not met when there are redble evdenes of malous s based on eletron data. Condton 2 s met when there are one or more ountermeasures mplemented for an attak leaf. Any tehnology that s appled to defend the attak leaf would satsfy ondton 2. An example s a web server nstalled wth a frewall that montors the aess to prevent malous ntrusons through onlne traff. assword mplementaton for eah attak leaf s onsdered for assessment. oor password prates result n unauthorzed aess. A system an fae the rsks of unauthorzed aess, even though t may be password proteted. Condton 2 and ondton 3 may nfluene ondton. For nstane, mplementaton of the new tehnologal ountermeasures an redue the lkelhood of ntrusons. Applyng boundary proteton n a frewall wth a set of rules an also redue aess from anonymous users. Ths would redue ed ntrusons and enhane system seurty. The other example s that ondton 3, wth stronger password poles, would also protet the system from beng ompromsed. However, ths does not hange the number of s. TABLE I RULES FOR CONDITIONS,2, AND 3 Condtons Rules The system s free of ntruson Condton that s onluded from the eletron evdenes n the system. At least one or more ountermeasures are Condton 2 mplemented to protet an attak leaf. At least one or more password poles Condton 3 are enfored orrespondng to eah attak leaf. III. VULNERABILITY ASSESSMENT OF CYBERSECURITY The proedure to evaluate vulnerablty ndes s depted n Fg. 3. As shown n the fgure, the proedure starts wth an analyss of the attak objetves. Then the attak tree and ountermeasures are establshed. The system vulnerablty ndex s obtaned by evaluatng the senaro vulnerablty and the leaf vulnerablty for seleted senaros and the orrespondng attak leaves. Identfy possble seurty vulnerablty and formulate an attak tree Identfy ntruson senaros based on the attak tree Identfy adversary attak objetves Evaluate senaro vulnerablty Determne yberseurty ondtons on eah attak leaf Compute leaf vulnerablty Determne pvotal attak leaves by lmtng the upper bound of the senaro vulnerablty Deson-makng to mprove system vulnerablty Fg. 3. roedure to Evaluate Vulnerablty Indes
3 3 Ths seton desrbes the proedure to evaluate the vulnerablty ndes: (a) yberseurty ondtons, and (b) evaluaton of vulnerablty ndes. A. Cyberseurty ondtons Ths seton evaluates the yberseurty ondtons, ω, that s a prelmnary evaluaton before the spef vulnerablty ndes related to leaves and senaros are alulated. The yberseurty ondton assessment s based on tehnologal ountermeasures and enforement of the password poly. The yberseurty ondton s measured by a number ω, that assumes the values of 0. 0., or. The value 0 ndates that the system ondton s nvulnerable whle value ndates the system s vulnerable. )ω =0.00: If [(Condton ) AND (Condton 2) AND (Condton 3)], thenω =0.00 All ondtons n Table I are satsfed. Advaned ountermeasures are deployed and omprehensve password poles are enfored. There s no evdene that the system s subjet to malous s. 2)ω =0.0: If <[(Condton ) AND (Condton 2)] OR [(Condton ) AND (Condton 3)] OR [(Condton 2) AND (Condton 3)]>, thenω =0.0 Any two of the ondtons n Table I are satsfed. 3)ω =.00: If( [(Condton ) OR (Condton 2) OR (Condton 3)] OR (None of the ondton)], thenω =.00 Only one of the ondtons s met or, None of the ondtons are satsfed. B. Evaluaton of vulnerablty ndes Ths seton s onerned wth the yberseurty vulnerablty of an attak tree. There are four steps to assess the seurty vulnerablty: () Identfyng the ntruson senaros, (2) Evaluatng vulnerablty ndes for the system, ntruson senaros, and attak leaves, (3) Evaluatng seurty mprovements, and (4) Identfyng the pvotal leaves. ) Identfyng the ntruson senaros from the attak tree: Frst, the ntruson senaros from the attak tree are dentfed. Then, the possble ntruson senaros are enumerated. Eah of the ntruson senaros s the ombnaton of attak leaves that are formed wth AND or OR attrbutes onfgured n the attak tree. The leaf vulnerablty ndex v ( k ) of eah attak leaf s evaluated one all the ntruson senaros are determned. The senaro vulnerablty s the produt of the orrespondng attak leaf vulnerabltes. 2) Evaluatng vulnerablty ndes: There are three seurty vulnerablty ndes: () system vulnerablty, () senaro vulnerablty, and () leaf vulnerablty. The system vulnerablty, V s, s the vulnerablty of an attak tree determned from the senaro vulnerablty, as shown n (). K s the total number of ntruson senaros. A vetor of senaro vulnerabltes s gven n (2) where I = {, 2, L, K} s a set of ntruson senaros. The Vs s determned from the maxmum value of the senaro vulnerablty set. Eah ntruson senaro s a possblty that leads to suessful penetraton of the system. The vulnerablty of a senaro s the produt of leaf vulnerabltes where eah senaro vulnerablty s formed wth a dfferent subset of S. Senaro vulnerablty ndes are gven n (3) where s, s 2, L, s K S and S = { 2,, L, n}. The symbol s represents an ndex subset of S that s the unversal ndex set of attak leaves and n s the total number of attak leaves. VS = max { V( ), V( 2), L, V( K) } = max( V ( I) ) () T V ( ) ( ) ( ) L ( ) (2) V I = V V 2 V K ( I ) ( ) = v( j ) V j s ( 2 ) = v( j ) V = j s2 M ( K) = v( j) V j sk A leaf vulnerablty s evaluated by (4). The yberseurty ondton number ω must be dentfed frst. The bass for evaluaton s to pre-determne the leaf vulnerablty ondton wth respet to the evdene of ed ntrusons, tehnologal ountermeasures, and password poly enforement, whh was dsussed n Seton III(A). To evaluate the strength of tehnologal ountermeasures, the total number of ountermeasure types s determned, whh s denoted by a onstant n (4). Then, the rato between the ountermeasures mplemented at the spef attak leaf to the total number of ountermeasure types s determned, where n s the number of ountermeasures types mplemented at T C an attak leaf [2]. The strength of the rato s deduted from to onvert t to the vulnerablty rato. max { ω ( ( n T )), ω max{ Θ( C C )} } (4), ω > 0 v ( k ) = max 0 ( n T ), max Θ C 3, ω = { ( C ) { ( )} } Seond, the weghtng fator of the password poly enforement s evaluated. Eah password poly should be assgned wth a value Θ ( C ) based on Table II. The weght assgnment of the password poly enforement ndates the level of dffulty to rak the password. In Table II, an nrement of (approxmately) 0.33 pont startng from the strong password poles of 0 value for Θ( C ) s used. The strongest password poles deter or prolong the rakng proess. Nether brute-fore trals nor soal engneerng tehnques an break through n a short perod of tme. (3)
4 4 The hghest weght assgnment of the password poly enforement s taken as the measure that would be the most vulnerable of the set. The notaton C represents the set of four levels of password poles as shown n Table II. If the password poly enforement has a password length of more than haraters long, then Θ ( ) = If the fatory Θ =.. The default password s not removed, then ( ) 067 overall value of ( C ) Θ s the maxmum among the password poly levels that are applable for the spef attak leaf,.e., max { Θ ( C )} = In (4), for ϖ > 0, the fnal evaluaton of leaf vulnerablty s based on the more vulnerable of the two measures, whh s T the hgher value among the two sets, C, C C where T T C C, andc C. On the other hand, for ϖ = 0, the more vulnerable of two ountermeasures s dvded to reflet the fat that 3 measures are used for yberseurty ondtons,.e., evdene of malous s, tehnology ountermeasures, and password poly enforement. 3) Evaluatng seurty mprovements Seurty mprovement an be aheved by a replaement or addtonal ountermeasures. The mprovements for an attak leaf and ntruson senaro an be measured wth the mplementaton of the defense nodes denoted as v ( ) and V () respetvely, for the leaf and senaro vulnerablty after an mprovement s mplemented. The degree of mprovement for a leaf vulnerablty s gven by v ( ) v( ) v( ) 00% and smlarly for senaro mprovement. 4) Determne the pvotal leaves The system vulnerablty s evaluated based on (2). Improvements of the leaf vulnerablty an lead to hgher system vulnerablty. To dentfy the pvotal leaves for system vulnerablty enhanement, an optmzaton problem s proposed: s.t. mn V S () ( I) ( I) ( ) ( ) V V (6) v v (7) 0 v,v I where ( ) ( ) The ombnaton of senaro vulnerablty s subjet to the onfguraton of an attak tree beause system vulnerablty s expressed as a funton of senaro vulnerablty. The objetve of ths formulaton s to mnmze system vulnerablty by lowerng the upper bound of the senaro vulnerablty, V ( I ). By dong so, the pvotal leaf ombnaton for system mprovement s determned. The mprovement s observed through hanges n V ( I ). A unform upper bound for all leaf nodes an be enfored, suh v s as 0. for all leaves. The vetor of upper bounds ( ) then a vetor wth all elements equal to 0.. Ths s to ensure the least seured leaf nodes are properly enfored. The pvotal leaves are the leaf nodes n ( ) v wth a redued value ompared to the orrespondng values before the upper bounds are redued. TABLE II WEIHT ASSINMENT FOR ASSWORD OLICY ENFORCEMENT Θ C Desrptons ( ) Absene of password poles No password exsts for a user aount Exstene of a guest aount that s known to many, e.g., the password s the same as username oor password poles Wth fatory default password Set wth ombnaton of username, ompany name, date of brth, that s possble to rak usng soal engneerng ood password poles assword length wth 7 haraters long Implement maxmum password age Comprehensve password poles The old passwords are not allowed for new password hange 4-harater ategores of ombnaton (A-Z, a-z, 0-9,!@# (non-alphabet haraters) ) assword length wth haraters or longer Enfore a password age to less than 3 months IV. CASE STUDIES The methodology proposed n the prevous seton s appled to study ases here. The purpose s to dentfy the aess ponts of power system ontrol networks and evaluate the network vulnerablty. The objetve of the proposed attak tree s foused on penetraton of the ontrol enter ntranet from others, e.g., substaton ntranet wth Vrtual rvate Network (VN) onneton. An attak tree based on Fg. 2 s onstruted; the ase studes are subjet to spef busness prates. The model norporates the exstene of fatory default password and nsuffent seurty mprovement [6]. The attak leaves nlude ountermeasures to mprove the system vulnerablty. An attak tree llustrated n Fg. 4 onssts of dsruptons through a power plant, substaton, or web-based SCADA. The dsruptons nlude sabotage on omputer systems and power systems. These ombnatons may result n an ntruson nto the ontrol enter. To derve the senaro ombnaton, groups of attak leaves are arranged as follows:
5 Remarks: AND Defense OR ountermeasure sets roup Dsrupt bakup ontrol enter 4 : Dsrupt ommunaton servers 9 : Dsrupt dstrbuted relatonal database Dsrupt power plant operatons Enterprse msson to dsrupt power system ontrol roup roup 2 Dsrupt ontrol enter roup d 6 : Dsrupt real-tme serves Dsrupt VN onneton to substatons roup a Attak the system by openng the swthng deves 7 : Explot the onlne vulnerablty Dsrupt substaton Dsrupt web-based SCADA system : Explot the web server vulnerablty roup b 9 : Inhbt the status of the swthng deves : Explot wreless onneton 2 3 Shut down the serves 2 : Searh for unt equpment management ontrol ommands 3 : Dsrupt unt loadng 0 ontrol serve 4: Dsrupt ommunaton servers :Explot remote termnal onneton 6 : Inhbt all the onlne status 7 :Explot ommunaton of substaton SCADA Dsrupt the substaton SCADA : Explot avalable ports : Explot relevant fles 0 2 0: Dsrupt relatonal database : Explot the VN onneton : Explot wreless onneton : Explot dal-up onneton Fg. 4. Attak Tree of ower System Control Framework roup a: roup : [ ] 4 roup 2: ; roup b: 7 ; roup d: [ ] ; 9 Eah group represents the seurty flaw of a sub-network from power plant, substaton networks, and web-based SCADA system. roups a and b represent a dsrupton of power plant operatons and substaton automaton. Seurty breahes n these groups may also result n penetraton to the ontrol enter. roups and d represent a dsrupton of the bakup ontrol enter and real-tme serves n the prmary ontrol enter. The mportane of a bakup ontrol enter s to take over funtons of the prmary ontrol enter under extreme rumstanes. Communaton, relatonal database, and realtme applaton serves n ontrol enters are rtal elements. roup 2 represents the dsrupton of Web Based SCADA system where seurty breahes n a web server may be exploted by ntruders. Eah ntruson senaro s derved from attak leaves, where, 2, L, 9 are attak leaves. Intruson senaros are expressed as follows: ; =,4,,6 =,4,,6 =,9,4,,6 = 2,4,,6 = 9 4 = 2,3,4,,6 = 6,4,,6 7 = 0,4,,6 2 = 4,4,,6 = 7,4,,6 6 3 =,4,,6 0 = 3,4,,6 = 7, () 3 where, 2,, 3 I These attak leaves nlude ountermeasures that an be tehnologal ountermeasures or password poly enforements. The desrpton of eah ountermeasure s C =,, and 9 2 L L lsted n the Appendx. The sets { 2, 7 } C T { } L =, 9 26 are ountermeasure sets for password and tehnologal ountermeasure, whle C =,, L, s the unversal ountermeasure set. { 2 26} v ( ) and v ( ) are omputed n aordane wth the onfguraton of the attak tree; the results are gven n the Appendx. The leaf vulnerablty and ts mprovement are depted n Fgs. (a) and (b). The vulnerablty mprovement for eah attak leaf s depted n Fg. (b). By elmnatng the fatory default password and enhanng seurty ountermeasures, the leaf vulnerablty has been mproved. Aordng to (4), the number of ountermeasures types mplemented at an attak leaf s essental beause t nfluenes the vulnerablty of a leaf. Attak leaves and 7 do not
6 6 mprove f the same tehnologal ountermeasure s mplemented on that attak leaf. (The mprovement s based on the same ountermeasure tehnology,.e., aess ontrol.) Attak leaf 3 has the greatest mprovement. Ths s due to the ombnaton of tehnologal ountermeasure types and elmnaton of the guest aount. Elmnatng the fatory default password and guest aount mproved the leaf vulnerablty. In the next step, V ( I ) and V ( I ) are evaluated usng (3). Eah ntruson senaro s the produt of attak leaves n (). The senaro vulnerablty s plotted n Fg. 6. Note that the logarthm sale s used n Fg. 6(a) to hghlght the dfferene between V ( I ) and V ( I ). As shown n Fg. 6(a), the frst ntruson senaros have a greater mprovement. However, ntruson senaros 2 and 3 do not show muh mprovement. Fg. 6(b) shows vulnerablty mprovement for eah ntruson senaro. Fnally, the system vulnerablty ndes before and after the mproved ountermeasures are mplemented, are determned from ( I ) vulnerablty ndes, respetvely. 0. V s and V and V ( ) Vs and V s, respetvely, I. The system V s, are 0.33 and 0.3, (a) vulnerablty Exstng ountermeasures Improved ountermeasures lmtng ( I ) V from to , t s seen that attak leaves 7,, 6, 7,, 9 are the pvotal leaves to mprove V I. the seurty measure n order to satsfy ( ) V. CONCLUSION AND FUTURE WORK The proposed methodology an be used to systematally evaluate the vulnerablty and mprovements based on yberseurty ondtons, tehnologal ountermeasures, and password poly enforement. Seurty mprovement of an attak tree depends on the total number of ountermeasure types and password poly enforement on eah attak leaf. Case studes of the power system ontrol networks have been performed to determne the vulnerablty ndes. To avod manual, exhaustve searh on eah attak leaf, an optmzaton problem s formulated that an be solved to determne pvotal leaves for seurty mprovements. The formulaton of attak trees does not apture the sequene n whh attak leaves are penetrated n a senaro, however, an attak tree an be used as the foundaton to emulate penetraton testng, onfrm the hypothess, and study seurty flaws. Besdes, attak trees an nlude budgetary onstrants to evaluate system vulnerablty that determnes the optmal seurty nvestment based on ths framework (a) Senaro vulnerablty Exstng ountermeasures Improved ountermeasures Vulnerablty Index Vulnerablty Index Attak, (b) Vulnerablty mprovement for eah attak leaf Intruson Senaros, I Vulnerablty Improvement, % Attak, Fg.. Vulnerablty wth Exstng and Improved Countermeasures Vulnerablty Improvement, % (b) Vulnerablty mprovement for eah ntruson senaro It s desrable to dentfy rtal attak leaves that are nfluental for the mprovement of system vulnerablty. Table III shows the numeral results based on ()-(7). The upper bound of the v ( ) s set to 0. whh represents an ntermedate level of vulnerablty. Table III shows the requred hanges for eah attak leaf wth a dfferent upper bound of senaro vulnerablty shown n eah olumn. The hghlghts are hanges from the output of optmzaton. By Intruson Senaros, I Fg. 6. Senaro Vulnerablty wth Exstng and Improved Countermeasures TABLE III FOUR UER BOUNDS ON SCENARIO VULNERABILITY FOR EACH LEAF ( ) V I v( ) v ( )
7 7 C v( 2 ) v ( 2 ) v( 3 ) v ( 3 ) v( 4 ) v ( 4 ) v( ) v ( ) v( 6 ) v ( 6 ) v( 7 ) v ( 7 ) v( ) v ( ) v( 9 ) v ( 9 ) v( 0 ) v ( 0 ) v( ) v ( ) v( 2 ) v ( 2 ) v( 3 ) v ( 3 ) v( 4 ) v ( 4 ) v( ) v ( ) v( 6 ) v ( 6 ) v( 7 ) v ( 7 ) v( ) v ( ) v( 9 ) v ( 9 ) VI. Appendx Desrptons Elmnate guest aount Elmnate fatory default password Implement password age 4-harater ategores of ombnaton password poly s enfored Enfore a password age less than 3 months Implement password length at least haraters Inrease password hange frequeny Install omputer forens tools Implement bometr for authentatons Install ntegrty hekers to montor alternatons to system fles Implement path management system to update seurty pathes avalable Install antvrus software Install ontent management to montor web and messagng applatons Set the rule of the I address that s allowed Implement dgtal ertfates Montor the seurty event logs to determne malous 6 operatons 7 Confgure dfferent port of the serves Doument and audt the use of eah stat I addresses Install ntruson deteton system to montor the traff wthn 9 the network 20 Enhane wth the poly of frewall n substaton LAN Elmnate admnstratve rght to lmted users lke vendors who 2 an hange the onfguraton 22 Install network analyzer to montor malous traff 23 Install a redundant system n ase of urgent need to swth 24 Install a sanner to dentfy malous traff of the network 2 Install smart tokens to establsh strong authentaton Audt the user rghts that ontan prvleges aessng rtal 26 ommands Improved Countermeasures Set Used for Eah Attak and Desrptons Attak Evdene of Attempted Intruson Malous deteted Absene of malous Malous deteted Absene of malous Malous deteted Absene of malous Malous deteted Absene of malous Absene of malous Absene of malous Absene of malous Malous deteted n the logs of substaton LAN Tehnologal Countermeasures Frewall Antvrus Authentaton Frewall User rghts and prvleges are set ersonal frewall Antvrus User rghts and prvleges are set Frewall User rghts and prvleges are set User rghts and prvleges are set Frewall Frewall User rghts and prvleges are set Frewall Frewall Frewall Ant-vrus assword oly Enforement Fatory default password remans uest aount Fatory default password remans Fatory default password remans Implemented password age assword length wth at least haraters Implemented password age assword length wth at least haraters No password uest aount uest aount Fatory default password remans assword length wth at least haraters Implemented password age Fatory default password remans assword length wth at least haraters User rghts and Fatory default password Malous prvleges are set remans Intruson deteton assword length wth at deteted system least haraters Malous User rghts and assword length wth at prvleges are set least haraters deteted Dgtal ertfates 4-harater ategores of
8 6 7 9 Malous deteted Absene of malous Absene of malous Attempted logon wth more than 3 tme Malous deteted User rghts and prvleges are set Fle ntegrty hekers User rghts and prvleges are set Antvrus Frewall Frewall Antvrus User rghts and prvleges are set Frewall Authentaton User rghts and prvleges are set Dgtal ertfates ombnaton Fatory default password remans assword length wth at least haraters Fatory default password remans 4-harater ategores of ombnaton Old passwords are not allowed to replae as new 4-harater ategores of ombnaton assword length wth at least haraters 4-harater ategores of ombnaton assword length wth at least haraters assword length wth at least haraters uest aount 4-harater ategores of ombnaton Implemented Countermeasures for Eah Attak VII. ACKNOWLEDMENT The authors gratefully aknowledge the ontrbutons of Srdjan udar, Mohammad Frawan, and the support of Eletr ower Researh Center (ERC) at Iowa State Unversty. VIII. REFERENCES [] J. Esenhauer,. Donnelly, M. Ells, and M. O Bren, Roadmap to seure ontrol systems n the energy setor, Energets of Columba, MD, January [2] overnment Aountablty Offe (AO) Report to Congressonal Requesters, Crtal Infrastruture roteton: Department of Homeland Seurty Faes Challenges n Fulfllng Cyberseurty Responsblty, AO-0-434, May 200. [3] NERC yberseurty standards (fnal verson), [4]. N. Ersson and A. Torklseng, Management of nformaton seurty for an eletr power utlty on seurty domans and use of ISO/IEC 7799 standard, IEEE Transatons on ower Delvery, Vol. 20, No. 2, Aprl 200, pp [] E. oetz, Cyber seurty of the eletr power ndustry, Insttute for Seurty Tehnology Studes at Dartmouth College, Deember [6] L. A. ordon, M.. Loeb, W. Luyshyn, and R. Rhardson, CSI/FBI omputer rme and seurty survey, Computer Seurty Insttute, 200. [7] J. Tang, R. Hovsapan, M. Sloderbek, J. Langston, R. Meeker,..MLaren, D. Beker, B. Rhardson, M. Baa, J. Trent, Z. Hartley, R. arks, and S. Smth, The CAS-SNL power system seurty testbed, ro. CRIS, Thrd Internatonal Conferene on Crtal Infrastrutures, Alexandra, VA, September [] C. L. DeMaro and Y. Braden, Threats to eletr power grd seurty through hakng of networked generaton ontrol, ro. CRIS, Thrd Internatonal Conferene on Crtal Infrastrutures, Alexandra, VA, September [9] B A.. Moore, R. J. Ellson, and R. C. Lnger, Attak modelng for nformaton seurty and survvablty, CMU/SEI-200-TN-00, Marh 200. [0] B. Shneer, Attak trees: modelng seurty threats, Dr. Dobb s Journal, Deember 999. [] Vulnerablty assessment methodology for eletr power nfrastruture, US Department of Energy, Offe of Energy Assurane, September 30, [2] overnment Aountablty Offe (AO) Report to Congressonal Requesters, Informaton seurty: tehnologes to seure federal systems, AO , Marh [3] C. E. Landwehr, Computer seurty, Sprnger-Verlag, July 200. [4] M. Amn, North Amera s eletrty nfrastruture: are we ready for more perfet storms? IEEE Computer Soety: Seurty & rvay, 2003, pp [] J. Jung, C. C. Lu, M. Hong, M. allant, and. Tornell, Multple hypotheses and ther redblty n on-lne fault dagnoss, IEEE Transatons on ower Delvery, Vol. 6, No. 2, Aprl 200, pp [6] Cyberseurty standards workshop, user manual for the workshop, North Ameran Eletr Relablty Counl, September 2-29, Mnneapols, MN. IX. BIORAHIES Chee-Woo Ten (S 00) reeved hs BSEE and MSEE at Iowa State Unversty, Ames, n 999 and 200 respetvely. He s urrently a h.d. student at Iowa State Unversty. In 2000, he was a summer ntern wth Md-Ameran Energy Control Center n Des Mones. Mr. Ten was an applaton engneer wth Semens Energy Management and Informaton System (SEMIS) n Sngapore from January 2002 to July 200. Hs area of nterest nludes Cyberseurty Modelng for Energy Infrastruture, Applatons for ower System Control, and Eonom Optmzaton. Chen-Chng Lu (F 94) reeved hs h.d. degree from the Unversty of Calforna, Berkeley. He s urrently almer Char rofessor of Eletral and Computer Engneerng at Iowa State Unversty. Durng , he was a rofessor of Eletral Engneerng at the Unversty of Washngton, where he also served as an Assoate Dean of Engneerng from Dr. Lu reeved an IEEE Thrd Mllennum Medal n 2000 and the IEEE ower Engneerng Soety Outstandng ower Engneerng Eduator Award n He s servng as Char of the Tehnal Commttee on ower System Analyss, Computng and Eonoms (SACE), IEEE ower Engneerng Soety. rofessor Lu s a Fellow of the IEEE. Manmaran ovndarasu (M 99) s urrently an Assoate rofessor n the Department of Eletral and Computer Engneerng at Iowa State Unversty (ISU). He reeved hs h.d. n Computer Sene and Engneerng from Indan Insttute of Tehnology (IIT) Madras, Inda n 99. He reeved Young Engneerng Researh Faulty Award at ISU n Hs researh expertse s n the areas of resoure management n real-tme systems and networks, overlay networks, network seurty, and ther applatons to rtal nfrastrutures suh as eletr grd. Dr. ovndarasu has publshed over 00 peer-revewed researh publatons. He s o-author of the text Resoure Management n Real-Tme Systems and Networks, MIT ress, 200. He has gven tutorals on Internet nfrastruture seurty n onferenes, suh as IEEE Infoom 2004 and IEEE ComSo TutoralsNow (2004), and served as workshops o-har, symposum o-har, and sesson har on many oasons.
Use of Multi-attribute Utility Functions in Evaluating Security Systems
LLNL-TR-405048 Use of Mult-attrbute Utlty Funtons n Evaluatng Seurty Systems C. Meyers, A. Lamont, A. Sherman June 30, 2008 Ths doument was prepared as an aount of work sponsored by an ageny of the Unted
DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING
DECOMPOSITION ALGORITHM FOR OPTIMAL SECURITY-CONSTRAINED POWER SCHEDULING Jorge Martínez-Crespo Julo Usaola José L. Fernández Unversdad Carlos III de Madrd Unversdad Carlos III de Madrd Red Elétra de Espana
When can bundling help adoption of network technologies or services?
When an bundlng help adopton of network tehnologes or serves? Steven Weber Dept. of ECE, Drexel U. [email protected] Roh Guérn Dept. of CSE, WUSTL [email protected] Jaudele C. de Olvera Dept. of ECE,
Peer-to-peer systems have attracted considerable attention
Reputaton Aggregaton n Peer-to-Peer etwork Usng Dfferental Gossp Algorthm Ruhr Gupta, Yatndra ath Sngh, Senor Member, IEEE, arxv:20.430v4 [s.i] 28 Jan 204 Abstrat Reputaton aggregaton n peer to peer networks
24. Impact of Piracy on Innovation at Software Firms and Implications for Piracy Policy
4. mpat of Pray on nnovaton at Software Frms and mplatons for Pray Poly Jeevan Jasngh Department of nformaton & Systems Management, HKUST Clear Water Bay, Kowloon Hong Kong [email protected] Abstrat A Busness
Cyber-Security Via Computing With Words
Cyber-Seurty Va Computng Wth Words John. Rkard Dstrbuted Infnty, In. 4637 Shoshone Drve Larkspur, CO 808 Emal: [email protected] ABSRAC Cyber-seurty systems must deal wth a hgh rate of observable
Modern Problem Solving Techniques in Engineering with POLYMATH, Excel and MATLAB. Introduction
Modern Problem Solvng Tehnques n Engneerng wth POLYMATH, Exel and MATLAB. Introduton Engneers are fundamentally problem solvers, seekng to aheve some objetve or desgn among tehnal, soal eonom, regulatory
North-South Trade-Related Technology Diffusion: Virtuous Growth Cycles in Latin America
DISCUSSION PAPER SERIES IZA DP No. 4943 North-South Trade-Related Tehnology Dffuson: Vrtuous Growth Cyles n Latn Amera Maure Shff Yanlng Wang May 2010 Forshungsnsttut zur Zukunft der Arbet Insttute for
Optimal Adaptive Voice Smoother with Lagrangian Multiplier Method for VoIP Service
Optmal Adaptve Voe Smoother wth Lagrangan Multpler Method for VoIP Serve Shyh-Fang HUANG, Er Hsao-uang WU and Pao-Ch CHANG Dept of Eletral Engneerng, Computer Sene and Informaton Engneerng and Communaton
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol
CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL
CONSIDER a connected network of n nodes that all wish
36 IEEE TRANSACTIONS ON INFORMATION THEORY, VOL. 60, NO. 2, FEBRUARY 204 Coded Cooperatve Data Exhange n Multhop Networks Thomas A. Courtade, Member, IEEE, and Rhard D. Wesel, Senor Member, IEEE Abstrat
The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis
The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.
Economy-based Content Replication for Peering Content Delivery Networks
Eonomy-based Content Replaton for Peerng Content Delvery Networs Al-Muaddm Khan Pathan 1 and Raumar Buyya Grd Computng and Dstrbuted Systems (GRIDS) Laboratory Department of Computer Sene and Software
Canon NTSC Help Desk Documentation
Canon NTSC Help Desk Documentaton READ THIS BEFORE PROCEEDING Before revewng ths documentaton, Canon Busness Solutons, Inc. ( CBS ) hereby refers you, the customer or customer s representatve or agent
Multi-settlement Systems for Electricity Markets: Zonal Aggregation under Network Uncertainty and Market Power 1
Proeedngs of the 35th Hawa Internatonal Conferene on System Senes - 2002 Mult-settlement Systems for Eletrty Markets: Zonal Aggregaton under Network Unertanty and Market Power 1 Ransh Kamat and Shmuel
Figure 1. Inventory Level vs. Time - EOQ Problem
IEOR 54 Sprng, 009 rof Leahman otes on Eonom Lot Shedulng and Eonom Rotaton Cyles he Eonom Order Quantty (EOQ) Consder an nventory tem n solaton wth demand rate, holdng ost h per unt per unt tme, and replenshment
Speech Quality Measurement Methods with Applying PLC Algorithms on Real-time Transmission Control Scheme for VoIP Service
46 JOURNAL OF MULTIMEDIA, VOL. 1, NO. 6, SEPTEMBER 2006 Seeh Qualty Measurement Methods wth Alyng PLC Algorthms on Real-tme Transmsson Control Sheme for VoIP Serve Jnsul Km Dgtal Meda Laboratory, Informaton
An Alternative Way to Measure Private Equity Performance
An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate
Lognormal random eld approxmatons to LIBOR market models O. Kurbanmuradov K. Sabelfeld y J. Shoenmakers z Mathemats Subet Classaton: 60H10,65C05,90A09 Keywords: LIBOR nterest rate models, random eld smulaton,
Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application
Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,
Capacity-building and training
92 Toolkt to Combat Traffckng n Persons Tool 2.14 Capacty-buldng and tranng Overvew Ths tool provdes references to tranng programmes and materals. For more tranng materals, refer also to Tool 9.18. Capacty-buldng
A GRID BASED VIRTUAL REACTOR: PARALLEL PERFORMANCE AND ADAPTIVE LOAD BALANCING
A GRID BASED VIRTUAL REACTOR: PARALLEL PERFORMANCE AND ADAPTIVE LOAD BALANCING Vladmr V. Korkhov 1,2, Valera V. Krzhzhanovskaya 1,2 and P.M.A. Sloot 1 {vkorkhov valera sloot}@sene.uva.nl 1 Unversty of
DEFINING %COMPLETE IN MICROSOFT PROJECT
CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,
INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS
21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS
Face Recognition in the Scrambled Domain via Salience-Aware Ensembles of Many Kernels
Fae Reognton n the Srambled Doman va Salene-Aware Ensembles of Many Kernels Jang, R., Al-Maadeed, S., Bourdane, A., Crooes, D., & Celeb, M. E. (2016). Fae Reognton n the Srambled Doman va Salene-Aware
The Current Employment Statistics (CES) survey,
Busness Brths and Deaths Impact of busness brths and deaths n the payroll survey The CES probablty-based sample redesgn accounts for most busness brth employment through the mputaton of busness deaths,
Cournot equilibria in two-settlement electricity markets with system contingencies. Jian Yao, Shmuel S. Oren* and Ilan Adler
142 Int. J. Crtal Infrastrutures, Vol. 3, Nos. 1/2, 2007 Cournot equlbra n two-settlement eletrty markets wth system ontngenes Jan Yao, Shmuel S. Oren* and Ilan Adler Department of Industral Engneerng
Forschung zur Entwicklungsökonomie und -politik Research in Development Economics and Policy
Dsusson Paper No. 01/2004 Comparatve advantage of Vetnam s re setor under dfferent lberalsaton senaros A Poly Analyss Matrx (PAM) study Nguyen Manh Ha and Franz Hedhues Department of Agrultural Development
Calculation of Sampling Weights
Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample
Study on Model of Risks Assessment of Standard Operation in Rural Power Network
Study on Model of Rsks Assessment of Standard Operaton n Rural Power Network Qngj L 1, Tao Yang 2 1 Qngj L, College of Informaton and Electrcal Engneerng, Shenyang Agrculture Unversty, Shenyang 110866,
Behavior Coordination in E-commerce Supply Chains
Assoaton for Informaton ystems AI Eletron Lbrary AIeL) WHICEB 25 Proeedngs Wuhan Internatonal Conferene on e-busness ummer 6-9-25 Behavor Coordnaton n E-ommere upply Chans Yanhong Zhang Insttute of system
Computer Administering of the Psychological Investigations: Set-Relational Representation
Open Journal of Appled Senes 2012 2 110-114 do:10.4236/ojapps.2012.22015 Publshed Onlne June 2012 (http://www.srp.org/journal/ojapps) Coputer Adnsterng of the Psyhologal Investgatons: Set-Relatonal Representaton
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING
ANALYZING THE RELATIONSHIPS BETWEEN QUALITY, TIME, AND COST IN PROJECT MANAGEMENT DECISION MAKING Matthew J. Lberatore, Department of Management and Operatons, Vllanova Unversty, Vllanova, PA 19085, 610-519-4390,
Multi-sensor Data Fusion for Cyber Security Situation Awareness
Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton
A Secure Password-Authenticated Key Agreement Using Smart Cards
A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,
The Greedy Method. Introduction. 0/1 Knapsack Problem
The Greedy Method Introducton We have completed data structures. We now are gong to look at algorthm desgn methods. Often we are lookng at optmzaton problems whose performance s exponental. For an optmzaton
Series Solutions of ODEs 2 the Frobenius method. The basic idea of the Frobenius method is to look for solutions of the form 3
Royal Holloway Unversty of London Department of Physs Seres Solutons of ODEs the Frobenus method Introduton to the Methodology The smple seres expanson method works for dfferental equatons whose solutons
Hollinger Canadian Publishing Holdings Co. ( HCPH ) proceeding under the Companies Creditors Arrangement Act ( CCAA )
February 17, 2011 Andrew J. Hatnay [email protected] Dear Sr/Madam: Re: Re: Hollnger Canadan Publshng Holdngs Co. ( HCPH ) proceedng under the Companes Credtors Arrangement Act ( CCAA ) Update on CCAA Proceedngs
On-Line Fault Detection in Wind Turbine Transmission System using Adaptive Filter and Robust Statistical Features
On-Lne Fault Detecton n Wnd Turbne Transmsson System usng Adaptve Flter and Robust Statstcal Features Ruoyu L Remote Dagnostcs Center SKF USA Inc. 3443 N. Sam Houston Pkwy., Houston TX 77086 Emal: [email protected]
Lecture 3: Force of Interest, Real Interest Rate, Annuity
Lecture 3: Force of Interest, Real Interest Rate, Annuty Goals: Study contnuous compoundng and force of nterest Dscuss real nterest rate Learn annuty-mmedate, and ts present value Study annuty-due, and
Forecasting the Direction and Strength of Stock Market Movement
Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems
Design and Development of a Security Evaluation Platform Based on International Standards
Internatonal Journal of Informatcs Socety, VOL.5, NO.2 (203) 7-80 7 Desgn and Development of a Securty Evaluaton Platform Based on Internatonal Standards Yuj Takahash and Yoshm Teshgawara Graduate School
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT
APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho
Optimal Health Insurance for Multiple Goods and Time Periods
04 R.P. Ells, S. Jang, and W.G. Mannng Optmal Health Insurane for Multple Goods and Tme Perods Randall P. Ells a,, Sheny Jang b, Wllard G. Mannng a Department of Eonoms, Boston Unversty, 70 Bay State Road,
Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *
JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,
Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications
Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and
Construction Rules for Morningstar Canada Target Dividend Index SM
Constructon Rules for Mornngstar Canada Target Dvdend Index SM Mornngstar Methodology Paper October 2014 Verson 1.2 2014 Mornngstar, Inc. All rghts reserved. The nformaton n ths document s the property
PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign
PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS
METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng
1.1 The University may award Higher Doctorate degrees as specified from time-to-time in UPR AS11 1.
HIGHER DOCTORATE DEGREES SUMMARY OF PRINCIPAL CHANGES General changes None Secton 3.2 Refer to text (Amendments to verson 03.0, UPR AS02 are shown n talcs.) 1 INTRODUCTION 1.1 The Unversty may award Hgher
Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints
Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,
Enabling P2P One-view Multi-party Video Conferencing
Enablng P2P One-vew Mult-party Vdeo Conferencng Yongxang Zhao, Yong Lu, Changja Chen, and JanYn Zhang Abstract Mult-Party Vdeo Conferencng (MPVC) facltates realtme group nteracton between users. Whle P2P
Applications of the Offset in Property-Casualty Predictive Modeling
Applatons of the Offset n Property-Casualty Predtve Modelng Jun Yan, Ph.D. James Guszza, FCAS, MAAA, Ph.D. Matthew Flynn, Ph.D. Cheng-Sheng Peter Wu, FCAS, ASA, MAAA Abstrat: Generalzed Lnear Model [GLM]
Dynamic Pricing for Smart Grid with Reinforcement Learning
Dynamc Prcng for Smart Grd wth Renforcement Learnng Byung-Gook Km, Yu Zhang, Mhaela van der Schaar, and Jang-Won Lee Samsung Electroncs, Suwon, Korea Department of Electrcal Engneerng, UCLA, Los Angeles,
Assessment of the legal framework
46 Toolkt to Combat Traffckng n Persons Tool 2.4 Assessment of the legal framework Overvew Ths tool offers gudelnes and resources for assessng a natonal legal framework. See also Tool 3.2 on crmnalzaton
Can Auto Liability Insurance Purchases Signal Risk Attitude?
Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang
IT09 - Identity Management Policy
IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these
Updating the E5810B firmware
Updatng the E5810B frmware NOTE Do not update your E5810B frmware unless you have a specfc need to do so, such as defect repar or nstrument enhancements. If the frmware update fals, the E5810B wll revert
CLASSIFYING FEATURE DESCRIPTION FOR SOFTWARE DEFECT PREDICTION
Proeengs of e 20 Internatonal Conferene on Wavelet Analyss an Pattern Reognton, Guln, 0-3 July, 20 CLASSIFYING FEAURE DESCRIPION FOR SOFWARE DEFEC PREDICION LING-FENG ZHANG, ZHAO-WEI SHANG College of Computer
Relay Secrecy in Wireless Networks with Eavesdropper
Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,
A Dynamic Load Balancing for Massive Multiplayer Online Game Server
A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,
Luby s Alg. for Maximal Independent Sets using Pairwise Independence
Lecture Notes for Randomzed Algorthms Luby s Alg. for Maxmal Independent Sets usng Parwse Independence Last Updated by Erc Vgoda on February, 006 8. Maxmal Independent Sets For a graph G = (V, E), an ndependent
An MILP model for planning of batch plants operating in a campaign-mode
An MILP model for plannng of batch plants operatng n a campagn-mode Yanna Fumero Insttuto de Desarrollo y Dseño CONICET UTN [email protected] Gabrela Corsano Insttuto de Desarrollo y Dseño
"Research Note" APPLICATION OF CHARGE SIMULATION METHOD TO ELECTRIC FIELD CALCULATION IN THE POWER CABLES *
Iranan Journal of Scence & Technology, Transacton B, Engneerng, ol. 30, No. B6, 789-794 rnted n The Islamc Republc of Iran, 006 Shraz Unversty "Research Note" ALICATION OF CHARGE SIMULATION METHOD TO ELECTRIC
BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, [email protected]
Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo
benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).
REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or
Chapter 6. Demand Relationships Among Goods
Chapter 6 Demand Relatonshps Among Goods Up to ths pont, we have held the pre of other goods onstant. Now we onsder how hanges n p affet n a two-good world. I p I p I p I p p p ( ) ( ) then I p then (
How To Understand The Results Of The German Meris Cloud And Water Vapour Product
Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller
IMPACT ANALYSIS OF A CELLULAR PHONE
4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng
On File Delay Minimization for Content Uploading to Media Cloud via Collaborative Wireless Network
On Fle Delay Mnmzaton for Content Uploadng to Meda Cloud va Collaboratve Wreless Network Ge Zhang and Yonggang Wen School of Computer Engneerng Nanyang Technologcal Unversty Sngapore Emal: {zh0001ge, ygwen}@ntu.edu.sg
The Application of Qubit Neural Networks for Time Series Forecasting with Automatic Phase Adjustment Mechanism
The Applaton of Qubt Neural Networks for Tme Seres Foreastng wth Automat Phase Adjustment Mehansm arlos R. B. Azevedo 1 and Tago. A. E. Ferrera 1 1 entro de ênas e Tenologa Unversdade atóla de Pernambuo
Section 5.3 Annuities, Future Value, and Sinking Funds
Secton 5.3 Annutes, Future Value, and Snkng Funds Ordnary Annutes A sequence of equal payments made at equal perods of tme s called an annuty. The tme between payments s the payment perod, and the tme
LAW ENFORCEMENT TRAINING TOOLS. Training tools for law enforcement officials and the judiciary
chapter 5 Law enforcement and prosecuton 261 LAW ENFORCEMENT TRAINING TOOLS Tool 5.20 Tranng tools for law enforcement offcals and the judcary Overvew Ths tool recommends resources for tranng law enforcement
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE
AN APPOINTMENT ORDER OUTPATIENT SCHEDULING SYSTEM THAT IMPROVES OUTPATIENT EXPERIENCE Yu-L Huang Industral Engneerng Department New Mexco State Unversty Las Cruces, New Mexco 88003, U.S.A. Abstract Patent
A Performance Analysis of View Maintenance Techniques for Data Warehouses
A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao
Feasibility of Using Discriminate Pricing Schemes for Energy Trading in Smart Grid
Feasblty of Usng Dscrmnate Prcng Schemes for Energy Tradng n Smart Grd Wayes Tushar, Chau Yuen, Bo Cha, Davd B. Smth, and H. Vncent Poor Sngapore Unversty of Technology and Desgn, Sngapore 138682. Emal:
A STUDY OF SOFTBALL PLAYER SWING SPEED *
A STUDY OF SOFTBALL PLAYER SWING SPEED * LLOYD SMITH Shool of Mehanal and Materals Engneerng Washngton State Unversty E-mal: [email protected] JEFF BROKER Department of Bology Unversty of Colorado, Colorado
A system for real-time calculation and monitoring of energy performance and carbon emissions of RET systems and buildings
A system for real-tme calculaton and montorng of energy performance and carbon emssons of RET systems and buldngs Dr PAAIOTIS PHILIMIS Dr ALESSADRO GIUSTI Dr STEPHE GARVI CE Technology Center Democratas
A High-confidence Cyber-Physical Alarm System: Design and Implementation
A Hgh-confdence Cyber-Physcal Alarm System: Desgn and Implementaton Longhua Ma 1,2, Tengka Yuan 1, Feng Xa 3, Mng Xu 1, Jun Yao 1, Meng Shao 4 1 Department of Control Scence and Engneerng, Zhejang Unversty,
iavenue iavenue i i i iavenue iavenue iavenue
Saratoga Systems' enterprse-wde Avenue CRM system s a comprehensve web-enabled software soluton. Ths next generaton system enables you to effectvely manage and enhance your customer relatonshps n both
Multi-class kernel logistic regression: a fixed-size implementation
Mult-lass kernel logst regresson: a fxed-sze mplementaton Peter Karsmakers,2, Krstaan Pelkmans 2, Johan AK Suykens 2 Abstrat Ths researh studes a pratal teratve algorthm for mult-lass kernel logst regresson
Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College
Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS
M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty
Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection
Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of
A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña
Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION
Industry-Specific Exchange Rates for the United States
Lnda S. Goldberg Industry-Spef Exhange Rates for the Unted States The effet of exhange rate movements on U.S. produers and U.S. eonom atvty has drawn renewed nterest lately followng the large delnes n
Return decomposing of absolute-performance multi-asset class portfolios. Working Paper - Nummer: 16
Return decomposng of absolute-performance mult-asset class portfolos Workng Paper - Nummer: 16 2007 by Dr. Stefan J. Illmer und Wolfgang Marty; n: Fnancal Markets and Portfolo Management; March 2007; Volume
DATA STRUCTURE DIAGRAMS
DATA STRUCTURE DAGRAMS By Charles W. Bachman Successful communcaton of deas has been and wll contnue to be a lmtng factor n man's endeavors to survve and to better hs lfe. The nventon of algebra, essentally
Tuition Fee Loan application notes
Tuton Fee Loan applcaton notes for new part-tme EU students 2012/13 About these notes These notes should be read along wth your Tuton Fee Loan applcaton form. The notes are splt nto three parts: Part 1
