Figure 1. Time-based operation of AIDP.

Size: px
Start display at page:

Download "Figure 1. Time-based operation of AIDP."

Transcription

1 Adaptve Intruson Detecton & Preventon of Denal of Servce attacs n MANETs Adnan Nadeem Centre for Communcaton Systems Research Unversty of Surrey, UK [email protected] ABSTRACT Moble ad-hoc networs (MANETs) are well nown to be vulnerable to varous attacs, due to features such as lac of centralzed control, dynamc topology, lmted physcal securty and energy constraned operatons. In ths paper we focus on preventng denal-of-servce (DoS) attacs. As an example, we consder ntruders that can cause DoS by explotng the route dscovery procedure of reactve routng protocols. We show the unsutablty of tools such as control chart, used n statstcal process control (SPC), to detect DoS and propose an anomaly-based ntruson detecton system that uses a combnaton of ch-square test & control chart to frst detect ntruson and then dentfy an ntruder. When the ntruder s solated from the networ we show reduced overhead and ncreased throughput. Smulaton results show that AIDP performs well at an affordable processng overhead over the range of scenaros tested. Categores and Subject Descrptors D. [Computer-Communcaton Networs]: Wreless communcaton, Securty and protecton. General Terms Securty, Algorthms. Keywords Ad-hoc networ securty, ntruson detecton & preventon.. INTRODUCTION MANETs have a decentralzed archtecture and lac of centralzed control; consequently, mechansms that enforce securty present a partcular challenge. In fxed networs, ntruson detecton and preventon (IDP) [] acts as a second layer of defence beyond a frewall; whereas n MANETs IDP becomes the front lne of defence to protect nodes from attacs. There are two ID technques nown as msuse-based ntruson detecton (MBID) and anomaly-based ntruson detecton (ABID). MBID mantans a nowledge base contanng sgnatures or patterns of nown attacs and loos for these patterns n an attempt to detect them. MBID has a potentally low false detecton rate but t can only detect attacs whose sgnatures are n the database. On the other hand ABID can flag observed actvtes that devate sgnfcantly from the establshed normal profle. ABID not only provdes early warnngs of potental ntrusons but also can detect attempts to explot new and unforeseen vulnerabltes; however t s more prone to generate false postves than MBID. Routng protocols n MANETs are generally classfed as ether proactve or reactve. Proactve routng protocols such as DSDV and Mchael Howarth Centre for Communcaton Systems Research Unversty of Surrey, UK [email protected] WRP are not effcent because of ther routng traffc overhead and therefore reactve routng protocols such as AODV and DSR are most frequently used n MANETs. However, both AODV and DSR operate on the assumpton that all nodes n the networ can trust each other and there are no malcous ntruder nodes. Ths s not true n all cases, and therefore we beleve that there s a need to use an IDP system to provde secure routng n MANETs. In ths paper we llustrate how ntruders can explot the route dscovery procedure of reactve routng protocol to cause certan DoS attacs n MANET. We then loo at the detecton of DoS; we assess control chart, a tool used n statstcal process control (SPC)[] and show that t generate low detecton & hgh false alarm rates. We therefore consder a two stage process: we employ the ch-square goodness of ft test [3] as an ABID mechansm to ntally chec the overall behavour of the networ and ndcate ntruson; n the event of a postve result we then use control chart to dentfy ntrudng nodes. Fnally we solate the nodes from the networ to prevent ntruson. We call our algorthm Adaptve Intruson Detecton & Preventon (AIDP). Secton of ths paper descrbes related research & challenges n ID and securng MANETs. Secton 3 descrbes DoS attacs and ndcates how an ntruder can cause DoS n MANETs. Secton 4 presents our proposed algorthm. Smulatons and ther result are llustrated n Secton 5. We summarze our results and future wor n Secton 6.. RELATED RESEARCH & CHALLENGES. Securng MANETs SEAD was proposed n [4] as a secure routng protocol that uses a one-way hash functon to provde authentcaton for the proactve routng protocol DSDV. The secure routng mechansm ARAN was proposed n [5]. A smlar approach Aradne [6] has been proposed for end-to-end authentcaton based on shared ey pars. These methods provde authentcated routng & ensure ntegrty of routng nformaton manly to prevent routng attacs caused by modfcaton of control pacets or forged routng nformaton. However, a MANET node can, wthout modfyng any control pacets explot the route dscovery procedure of reactve routng protocols to cause DoS attacs as we descrbe below n secton 3. Wang, Lu and Bhargava [7] performed a vulnerablty analyss of AODV n whch they observed that on-demand route queres enable real tme attacs. Some researchers have proposed methods to detect ths: for example Png and Zhang [8] consdered a route request (RREQ) floodng attac n MANETs. They proposed a RREQ floodng preventon mechansm based on neghbour s supervson that mantans a prorty queue of the ncomng RREQs. Ths mechansm reduces the prorty of RREQ generated by a specfc node f a hgher rate of ncomng queres from that partcular node s observed. However n some applcatons of MANETs there can be specfc nodes that generate more traffc; for example, n on-the-fly networs formed for a semnar and yet Png & Zhang s method wll remove requests from the queue above a certan ncomng request rate

2 n all cases. In another example Yu and Ray [9] defned two types of njectng traffc attac n MANETs as query and data pacets floodng. They detect the attac f requests are made a certan number of tmes n t sec. These methods are based on statc thresholds to detect malcous RREQ floodng whch n our opnon does not cope well wth the dynamcally changng envronment of MANETs. In addton, there s also the need to address the ssue of solatng a node once t s detected as an attacer.. Intruson Detecton ID n MANETs s more challengng than n fxed networs because the former lac a concentraton pont where traffc can be analyzed, and because of ther dynamcally changng topology and lmted computatonal ablty of nodes. Zhang and Lee argue [] that many ID technques developed for fxed wred networs are not applcable n MANETs and they proposed an ID and response mechansm n whch an Intruson Detecton System (IDS) agent performs local data collecton and local detecton. They then trgger a cooperatve detecton and global response when a node reports an ntruson. Nguyen et al. [] proposed ID through a statstcal anomaly detecton approach called Prncpal Component Analyss (PCA) whch s used as an outler detector method for hgh speed fxed networs. Ye et al. [] used a probablstc technque for anomaly detecton n fxed networs. They nvestgated audt data by usng varous probablstc technques ncludng decson tree, Hotellng s T test, ch-square test and Marov chan for detectng ntruson nto the nformaton system on fxed networs and concluded that ch square test based on frequency property provdes good ID performance. Ye and Chen [3] also proposed an anomaly detector based on the ch-square test for detectng ntruson n fxed networs. They concluded that the results demonstrate promsng performance n terms of hgh detecton and low false alarm rate. The ch-square test has been successfully used for ABID n fxed networ but n a MANET where there s no exstng nowledge of normal behavour we have extra challenges to apply these ABID technques. 3. DENIAL OF SERVICE ATTACKS DoS s an attempt to mae resources or servces unavalable to ther ntended users. Dstrbuted DoS s a severe threat for MANETs because they can be crashed due to ther lmted battery power or ther networ can easly become congested due to ts relatvely lmted bandwdth compared to fxed networs. Some examples of DoS attac on reactve routng protocol such as AODV and DSR are as follows: Sleep Deprvaton: here [4] the attacer nteracts wth the node n a manner that appears to be legtmate; however the purpose of nteracton s to eep the vctm node out of ts power conservng sleep mode. An ntruder can cause sleep deprvaton by explotng the vulnerablty of the route dscovery process of protocols such as AODV and DSR, for example, by sendng a RREQ pacet perodcally so that the vctm node has to process these pacets causng exhauston of ts battery power. Rushng Attac: In order to lmt the control pacet overhead an on-demand protocol only requres nodes to forward the frst RREQ that arrves for each route dscovery. An ntruder can explot ths property by spreadng RREQ pacets qucly throughout the networ so as to suppress any later legtmate RREQ pacets [5]. In the wor descrbed n ths paper we have ntally consdered vulnerabltes n AODV but AIDP can be appled to other routng protocols. 3. Vulnerabltes n AODV AODV s desgned for use n networs where the nodes can all trust other nodes and can assume there s no malcous ntruder node. Consderng the operaton of AODV [6], specfcally ts route dscovery process, t s hghly vulnerable to DoS attacs such as sleep deprvaton and the rushng attac. In the route dscovery procedure of AODV when a node needs a route to a destnaton, t broadcasts a RREQ pacet contanng a broadcast d, source & destnaton addresses, hop count and destnaton sequence number. After broadcastng a node s requred to wat for a specfc tme for a RREP or other control pacet. The node may try agan once ths tme expres. The source node s expected to use an expandng rng search technque for controlled dssemnaton of RREQs n the networ. Ths means that after sendng a RREQ wth Tme to Lve (TTL) feld set to one the node can resend the RREQ wth an ncremented TTL value after watng for rng traversal tme. The node can repeat ths process untl ether a RREP or route error s receved or the TTL value reaches ts maxmum value. After that the node can retry the same path dscovery for a specfc destnaton up to some defned maxmum number of RREQ retres. 3. Malcous RREQ Floodng We ntally focus on malcous RREQ floodng (MRF) whch can cause DoS attacs such as sleep dervaton & rushng attac n MANETs. In MRF an ntruder explots the route dscovery process of a reactve routng protocol such as AODV to cause DoS n the networ. An ntruder can flood the networ wth malcous RREQs wthout beng detected by other nodes n the followng ways: Malcous RREQ Floodng : an ntruder broadcasts a RREQ wth a destnaton IP address that s wthn the doman but does not exst. Ths wll compel all nodes to forward ths RREQ because no-one wll have the route for ths destnaton IP address. Malcous RREQ Floodng : after broadcastng a RREQ an ntruder does not wat for the rng traversal tme and contnues resendng the RREQ for same destnaton wth hgher TTL value. 4. AIDP We now descrbe AIDP, whch uses ABID to detect DoS attacs caused by MRF n MANETs. AIDP conssts of two modules: a tranng and a testng module as explaned later n ths secton. 4. Model Assumptons & Termnologes We dsregard attacs amed at the physcal and ln layers. We consder applcatons of MANETs formed on-the-fly for group collaboraton such as rescue operatons or semnars. We note that an ABID requres data of only normal actvtes contanng audt traces and traffc patterns of normal events to buld a tranng profle. However, n contrast wth fxed networs, data resources such as [7] that reflect normal actvtes or events are not avalable for on-the-fly MANETs applcatons. In general the normal operaton of MANETs s not nown. Therefore we assume that the ntal behavour of the networ formed on-the-fly durng the tranng phase s free from anomales. To llustrate the mplementaton of AIDP we assume a clustered MANET organzaton. We select the most capable nodes n terms of ther processng abltes as cluster head (CH) and the others nodes becomes cluster nodes (CN). At present we assume secure communcaton between CH and CNs. The operaton of AIDP s llustrated n Fg.. When the networ s establshed, the CH contnuously gathers nformaton and apples the AIDP tranng module for N tme ntervals (TI), resultng n an ntal tranng profle (ITP). The ITP reflects the normal behavour of the nodes n the networ. In the testng phase the CH then apples the

3 Fgure. Tme-based operaton of AIDP. testng module after each TI. Ths test conssts of several tass, the frst of whch detects ntruson. If there s no ntruson then t updates the ITP n order to adapt the varaton n the networ behavour as tme progresses. If there s ntruson n the second tas the CH dentfes the ntrudng nodes. To optmse the probablty of dentfyng ntruders correctly wth a low level of false postves, t mantans a test sldng wndow (TSW), n whch d detectons of a node are requred n P tme ntervals (TI). If ths detecton threshold s passed then the CH wll Blaclst (BL) the node and solate the node by nformng all CNs. 4. AIDP Algorthm We now explan the tranng and testng module of AIDP. Tranng Module: Whle s less than equal to N.CH collects the number of RREQ receved X by CN from all other CNs tang nto account TTL values n TI.. Calculate the probablty dstrbuton P( X ) end whle.calculate mean X of P(X ) for = to N.Store results as ITF.. Ext Fgure. Pseudocode of tranng module. In Fg. X ={X, X, X3,,X M } s a set of random varables representng the number of RREQs receved by all CNs n the th TI, where M s the maxmum number of RREQs receved n a TI. Ths ncludes both the RREQ pacets generated by the source nodes and those RREQ pacets forwarded by ntermedate nodes. The probablty dstrbuton of X s calculated for the TI, and ths process s then repeated for the N tme ntervals n the tranng phase. We then calculate mean X of P(X ) for N ntervals, whch s stored as an ITP contanng the expected values for that partcular networ observed for the total tme of N * TI seconds. The tranng module pseudocode can of course be generalzed to collect other parameters. Testng Module: a) Detectng Intruson & Callng other Modules.CH sets TSW to P number of TI.CH Montor the networ for TI Do after each TI. CH collects number of RREQ receved X from all other CNs n TI.. Calculate the probablty dstrbuton P(X ).Calculate average of P(X ).Store X as Observed values.. End do.ch Apples the ch-square test by frst Calculatng Ch computed ( χ ).Hypothess Testng H o: Observed dstrbuton of X fts the expected H a: Observed dstrbuton of X does not ft expected.if (ch-computed (.d.f) > P-value (.d.f)) then Reject H o & call: LND= Intruder-Identfcaton(nodes V ) For all nodes V n LND (Lst of Nodes Detected). If ( V detectons n PIL > Detectons_To_ Accuse) CH: Blaclst V & Broadcast AccusatonPacet(AP) else : enter V n PIL endf. else : Update Expected values X (TP).Ext b).calculate RREQ generated by V for = to n (n=number of nodes).calculate standard devaton of V.set Contol Lne (CL).set Upper Control Lmt (UCL) & lower control lmt(lcl) For V = to n If (RREQ generated by V )> UCL add V to LND. endf.endfor.return (LND) & Ext c). each CN V mantan ts local BlaclstTable (BLT).f CN V receve an AP for CN V j.if CN V has node V j n ts BLT Ignore AP else CN add node V j to ts BLT & rebroadcast AP d).f node V receve pacet from node V j.if node V j s n node V BLT Ignore pacet & drop all pacet queued from V j Else : handle & process pacet Fgure 3. Pseudocode of testng module. Fg.3 shows the pseudocode of the testng module. After montorng the networ for one TI, the CH uses the ch-square test to dentfy any ntruson. Ths test determnes how well the observed model fts wth the expected. N ( X X ) χ = () = X Equaton s the specfc form of the test n whch X s the observed and X s the expected value of the th varable. After calculatng the ch-computed value the CH performs hypothess testng by settng the null hypothess H o and alternatve hypothess H a as shown n Fg.3a. The crtcal P-value s calculated at gven level of sgnfcance () and degree of freedom (d.f). To llustrate the operaton of the algorthm we have chosen the standard value of =5% (.e. a confdence nterval of 95%). The d.f s the number of classes of X (.e. the number of groups n whch the frequency of RREQ s dvded) beng tested whch s n our case s determned by the testng module of AIDP for each TI at run tme. If calculated ch-computed value s larger than the crtcal value then we reject H o,and assume ntruson n the TI. We then use ntruder-dentfcaton tas (Fg.3b) to dentfy the ndvdual ntrudng node. Ths uses varable control chart based on standard devaton. We calculate of RREQ generated by all nodes then set the CL=, UCL=CL + 3& LCL= mnmum [, CL - 3 ]. We choose 3 lmts because we now that for a normal dstrbuton 99.7% of the observaton les wthn + 3 lmts. We consder node to be a detected ntruder f t ntates more RREQs than the UCL, n whch case we add node to the potental ntruder lst (PIL) mantaned by CH. If any node s detected more than

4 P ercen tag e o f D etecto n (% ) DoS attac through MRF & (5 nodes networ) MRF : Success Rate MRF : False Postve d tmes n P ntervals (the threshold for accusaton Detecton_to_Accuse) then the CH blaclsts the node and nform all other CNs by sendng an accusaton pacet (AP). When a CN receves an AP t frst checs the broadcast d & source address to avod processng a duplcate AP. If the accused node s already blaclsted the CN wll gnore & drop the AP to prevent unnecessary networ traffc. Otherwse, the CN wll blaclst the accused node and rebroadcast the AP. Fnally, to solate the ntruder form the networ all nodes wll not only drop the pacets from a blaclsted node but also mmedately gnore all pacets n ther queue from the blaclsted nodes as shown n Fg.3d. If no ntruson s detected by the ch-square test (Fg.3a) then we updates the tranng profle usng an exponentally weghted movng average (EWMA) as gven n equaton, X( J, I ) = α X + ( α) X ( ) ( J, I ) () ( J, I ) MRF : Success Rate MRF : False Postve Nodes Mean Speed (m/s) Fgure 4. Success and false alarm rate as a functon of node mean speed n a 5, 49 & 64 nodes networ. J, I () where X ( J, I ) and X represents the expected and observed value for update perod number (J) respectvely. The value of J s ncremented n the TI when no ntruson n the MANET s detected. I represent the random varable from to and α = s the weghtng factor. As J ncreases the ( J ) weghtng for older data ponts decreases exponentally gvng more mportance to the current observaton. The updated expected profle model reflects the current behavour of the networ. Ths s mportant for adaptve ID n MANET where overall behavour of the networ changes wth tme. 5. EVALUATION 5. Smulaton Envronment We use GloMoSm to assess the performance of AIDP. We buld the smulaton envronment by assumng that the MAC and Physcal layer are relable n ther operatons. Table shows the smulaton parameters for all scenaros. The nodes are ntally placed at the start of smulaton n a rectangular grd. The terran dmenson values n Table ensure node densty s constant between all three scenaros. We assume a sngle cluster n our smulatons, and we use the random way pont (RWP) as moblty model. 5. Assessment of control chart as an Intruson Detector In frst set of experments we use only control chart based on standard devaton to detect DoS. The CH montors the networ for a TI and then apples control chart based on on the number of Percentage of D etectons (% ) DoS attac through MRF & (49 nodes networ) MRF :Success Rate MRF :Fale Postve MRF : Success Rate MRF : False Postve Nodes mean speed(m/s) Table. Smulaton Parameters Number of nodes Terran dmensons 4*4 m 56*56 m 64*64 m Number of ntruders or Node placement Grd wth grd unt= metres Tme nterval TI Smulaton tme Routng protocol seconds Tranng + Testng =5+=5 seconds AODV MAC protocol IEEE 8. Moblty Pause tme Mean speed P ercen tag e o f D etecto n (% ) Random Way Pont Model (RWP) Vares from to 6 seconds Vares from to m/s RREQs generated by all nodes. The CH calculates the CL, UCL & LCL (Fg.3b). The CH wll detect as ntruder any node V that generates more RREQ than the UCL. Ths process s repeated by the CH for each TI. We perform runs frst wth normal traffc (.e. no ntruson n the networ) and then a further runs wth one ntruder pced randomly from the nodes. Ths ntruder launches MRF attacs n order to cause DoS by sleep deprvaton and rushng attac. Smulaton wth 5, 49 & 64 nodes results n an average successful dentfcaton rate of 7%, but also has a very hgh average false alarm rate (.e. detectng a node as an ntruder when there s no ntruson n the networ ) of 55%. 5.3 Evaluaton of AIDP DoS attac through MRF & (64 nodes networ) MRF : Success Rate MRF : False Postve MRF : Success Rate MRF : False Postve Node Mean speed (m/s) In ths secton we present the results from AIDP. We expermented wth all three scenaros (5, 49&64 nodes) usng the parameters of Table. By ntroducng the ch-square test n addton to control chart the ndvdual dentfcaton rate rses to 86% and the false alarm rate drops to 5% for a test n a sngle TI. Ths sgnfcantly mproves the detecton rate. In smulaton for AIDP the CH apples the tranng module (Fg.) for N=5 TI, and then apples the testng module (Fg.3) for TI each of seconds. We llustrate results here wth TSW=5 and Detecton_to_Accuse=3. We perform runs wth each scenaro (5, 49 & 64 nodes) wth normal traffc usng the smulaton parameters of Table and then wth ntruders pced randomly from the nodes. These ntruders launch MRF & attacs n order to cause DoS by sleep deprvaton and rushng attac. At each tested mean speed we perform runs wth no ntruders and runs wth one ntruder usng MRF and runs wth on ntruder usng MRF.

5 Num ber of Con trol per Data pacets Delvered Control Pacet Overhead 5 nodes networ No DoS attac DoS attac & no protecton DoS attac wth AIDP n place Nodes Mean Speed ( m/s ) N u m b er o f C o n tro l p e r Data pacet delvered Fg. 4 depct the success rate (SR) and false alarm (FA) rate of AIDP as a functon of the nodes mean speed n 5,49 & 64 node networs.by SR here we mean the rate of correctly ndcatng ntruson n the networ and then dentfyng & solatng the node whch s causng DoS. A false alarm (FA) means that a correctly behavng node has been ncorrectly dentfed and solated. When there s no ntruson n the networ the FA are zero n all three scenaros. The graphs show good performance of AIDP n terms of hgh SR and very low FA rate aganst DoS attacs through MRF &. The SR drops slghtly n the 64 node networ when the nodes are movng wth a hgher mean speed. Effects on networ performance To analyze the performance mpact of AIDP on the networ we montor control & data pacets durng our smulatons. Fg 5 depcts the control pacet overhead as functons of ncreasng mean node speed n 5, 49 & 64 nodes networ. By control pacet overhead we mean the rato of the number of control pacets to the delvered data pacets durng the smulatons. Each graph dsplays the control pacet overhead when there s a) no DoS attac n the networ b) ntruson n the networ (DoS attac) but no means of defendng these attacs, and c) ntruson (DoS attacs) wth AIDP n place to protect the networ. As can be seen from the graphs AIDP reduces the control pacet overhead & conversely ncreases the networ throughput when t s used n a networ under attac by ntruder causng DoS. However, the control pacet overhead s not as low as that of a networ when there s no ntruson because AIDP also needs control pacets for IDP n the networ. CONCLUSION & FUTURE WORK The on-demand nature of MANET routng protocols maes them susceptble to DoS attacs, such as sleep deprvaton and rushng attac. In ths paper we have llustrated how ntruders can cause DoS attacs n MANETs. We consder the sutablty of usng only control chart to protect aganst these attacs, and demonstrated that ths method based on statc threshold smlar that proposed n [8] & [9] s not sutable because t does not cope well wth the dynamcs of MANETs. We then proposed an adaptve ntruson detecton & preventon mechansm AIDP. It employs ABID whch frst use ch-square test to chec the overall behavour of the networ and ndcate ntruson, and then uses control chart to dentfy ntrudng nodes. Fnally we solate the ntrudng nodes. Smulaton results show that AIDP successfully detects dentfes & solates the ntrudng nodes attemptng to cause DoS attacs. AIDP exhbts a hgh success rate and very low false alarm rate wth an affordable processng overhead on the networ over a range of scenaros tested Control Pacet Overhead 49 nodes networ No DoS attac n the networ DoS attac & no protecton DoS attac wth AIDP n place Nodes mean speed(m/s) Fgure 5. Control pacet overhead Vs nodes mean speed n a 5, 49 & 64 nodes networ. N u mb e r o f C o n tro l p er Data pacets delvered Control Pacet Overhead 64 nodes No DoS attac n the networ DoS attac & no protecton DoS attac wth AIDP n place Nodes mean speed (m/s) In our ongong wor we are focusng on generalzng AIDP by ncludng other related parameters to cover all routng attacs n MANET. 6. REFERENCES [] Z.L, A.Das, and J.Zhou, Theoretcal Bass for Intruson Detecton, IEEE Proc, Informaton Assurance and Securty, pp 84-9, 5-7 June 5. [] Leonard.A.Doty, Statstcal Process Control, nd ed, 996. [3] H.O.Lancaster, The Ch-Squared Dstrbuton, Wlley Publcatons n Statstcs 969. [4] Y.Hu, B.Johnson and A.Perrg, SEAD: secure effcent dstance vector routng for moble wreless ad hoc networs, Ad hoc Networs, Vol., pp 75-9, 3. [5] K.Sanzgr and M.Beldng-Royer A Secure Routng Protocol for Ad Hoc networs, Proc, th IEEE ICNP,. [6] Y.Hu, A.Perrg and B.Johnson, A Secure On Demand Routng Protocol for Ad-Hoc networs,proc, MobCom, pp 3-8, September. [7] W.Wang, Y.Lu and K.Bhargava, On Vulnerablty and Protecton of Ad Hoc On Demand Dstance Vector Protocol, IEEE Proc, ICT, Vol., pp , 3. [8] P.Y, Z.Da and S.Zhang, Resstng Floodng Attac n Ad Hoc Networs,IEEE Conference on Codng & Computng, Aprl 5. [9] W.Yu and K.Ray, Defence aganst Injectng Traffc Attac n Cooperatve Ad Hoc networs, IEEE Global Telecommuncaton Conference,Globecom, 5. [] Y.Zhang and W.Lee, Intruson Detecton n Wreless Ad-Hoc Networs, Proc, 6 th, ACM MOBICOM,. [] D.Nguyen, Das, Mem and Choudhary, A Reconfgurable Archtecture for Networ Intruson Detecton Usng Prncpal Component Analyss, ACM Int Symposum on Feld Programmable Gate Arrays, 6. [] N.Ye, X.L,,M.Emran and M.Xu, Probablstc Technques for Intruson Detecton Based on Computer Audt Data, IEEE Transacton on Systems, Man & Cybernetcs,. [3] N.Ye and Q.Chen, An Anomaly Detecton Technques based on a CHI-SQUARE Statstcs for Detectng Intruson nto Informaton System Qualty and Relablty Engneerng Internatonal,. [4] M.Prrete and R.Broos, The Sleep Deprvaton Attac n Sensor Networs: Analyss and Methods of Defence, Int Journal of Dstrbuted Sensor Networs, Vol., No.3, pp 67-87, 6. [5] Y.Hu, A.Perrg and B.Johnson, Rushng Attac and Defence n Wreless Ad Hoc Networs Routng Protocol, nd ACM Worshop on Wreless Securty, pp 3-4, 3. [6] C.Perns, Ad Hoc On Demand Dstance Vector (AODV) Routng, RFC 356, July 3. [7] KDD data set, 999, can be accessed at

Network Security Situation Evaluation Method for Distributed Denial of Service

Network Security Situation Evaluation Method for Distributed Denial of Service Network Securty Stuaton Evaluaton Method for Dstrbuted Denal of Servce Jn Q,2, Cu YMn,2, Huang MnHuan,2, Kuang XaoHu,2, TangHong,2 ) Scence and Technology on Informaton System Securty Laboratory, Bejng,

More information

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification

A Hierarchical Anomaly Network Intrusion Detection System using Neural Network Classification IDC IDC A Herarchcal Anomaly Network Intruson Detecton System usng Neural Network Classfcaton ZHENG ZHANG, JUN LI, C. N. MANIKOPOULOS, JAY JORGENSON and JOSE UCLES ECE Department, New Jersey Inst. of Tech.,

More information

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign

PAS: A Packet Accounting System to Limit the Effects of DoS & DDoS. Debish Fesehaye & Klara Naherstedt University of Illinois-Urbana Champaign PAS: A Packet Accountng System to Lmt the Effects of DoS & DDoS Debsh Fesehaye & Klara Naherstedt Unversty of Illnos-Urbana Champagn DoS and DDoS DDoS attacks are ncreasng threats to our dgtal world. Exstng

More information

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis

The Development of Web Log Mining Based on Improve-K-Means Clustering Analysis The Development of Web Log Mnng Based on Improve-K-Means Clusterng Analyss TngZhong Wang * College of Informaton Technology, Luoyang Normal Unversty, Luoyang, 471022, Chna [email protected] Abstract.

More information

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET)

Reinforcement Learning for Quality of Service in Mobile Ad Hoc Network (MANET) Renforcement Learnng for Qualty of Servce n Moble Ad Hoc Network (MANET) *T.KUMANAN AND **K.DURAISWAMY *Meenaksh College of Engneerng West K.K Nagar, Cheena-78 **Dean/academc,K.S.R College of Technology,Truchengode

More information

A Secure Password-Authenticated Key Agreement Using Smart Cards

A Secure Password-Authenticated Key Agreement Using Smart Cards A Secure Password-Authentcated Key Agreement Usng Smart Cards Ka Chan 1, Wen-Chung Kuo 2 and Jn-Chou Cheng 3 1 Department of Computer and Informaton Scence, R.O.C. Mltary Academy, Kaohsung 83059, Tawan,

More information

Project Networks With Mixed-Time Constraints

Project Networks With Mixed-Time Constraints Project Networs Wth Mxed-Tme Constrants L Caccetta and B Wattananon Western Australan Centre of Excellence n Industral Optmsaton (WACEIO) Curtn Unversty of Technology GPO Box U1987 Perth Western Australa

More information

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College

Feature selection for intrusion detection. Slobodan Petrović NISlab, Gjøvik University College Feature selecton for ntruson detecton Slobodan Petrovć NISlab, Gjøvk Unversty College Contents The feature selecton problem Intruson detecton Traffc features relevant for IDS The CFS measure The mrmr measure

More information

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node

denote the location of a node, and suppose node X . This transmission causes a successful reception by node X for any other node Fnal Report of EE359 Class Proect Throughput and Delay n Wreless Ad Hoc Networs Changhua He [email protected] Abstract: Networ throughput and pacet delay are the two most mportant parameters to evaluate

More information

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks

A Novel Adaptive Load Balancing Routing Algorithm in Ad hoc Networks Journal of Convergence Informaton Technology A Novel Adaptve Load Balancng Routng Algorthm n Ad hoc Networks Zhu Bn, Zeng Xao-png, Xong Xan-sheng, Chen Qan, Fan Wen-yan, We Geng College of Communcaton

More information

An Alternative Way to Measure Private Equity Performance

An Alternative Way to Measure Private Equity Performance An Alternatve Way to Measure Prvate Equty Performance Peter Todd Parlux Investment Technology LLC Summary Internal Rate of Return (IRR) s probably the most common way to measure the performance of prvate

More information

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ).

benefit is 2, paid if the policyholder dies within the year, and probability of death within the year is ). REVIEW OF RISK MANAGEMENT CONCEPTS LOSS DISTRIBUTIONS AND INSURANCE Loss and nsurance: When someone s subject to the rsk of ncurrng a fnancal loss, the loss s generally modeled usng a random varable or

More information

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints

Effective Network Defense Strategies against Malicious Attacks with Various Defense Mechanisms under Quality of Service Constraints Effectve Network Defense Strateges aganst Malcous Attacks wth Varous Defense Mechansms under Qualty of Servce Constrants Frank Yeong-Sung Ln Department of Informaton Natonal Tawan Unversty Tape, Tawan,

More information

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS

M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS M3S MULTIMEDIA MOBILITY MANAGEMENT AND LOAD BALANCING IN WIRELESS BROADCAST NETWORKS Bogdan Cubotaru, Gabrel-Mro Muntean Performance Engneerng Laboratory, RINCE School of Electronc Engneerng Dubln Cty

More information

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks

An Adaptive and Distributed Clustering Scheme for Wireless Sensor Networks 2007 Internatonal Conference on Convergence Informaton Technology An Adaptve and Dstrbuted Clusterng Scheme for Wreless Sensor Networs Xnguo Wang, Xnmng Zhang, Guolang Chen, Shuang Tan Department of Computer

More information

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing

A Replication-Based and Fault Tolerant Allocation Algorithm for Cloud Computing A Replcaton-Based and Fault Tolerant Allocaton Algorthm for Cloud Computng Tork Altameem Dept of Computer Scence, RCC, Kng Saud Unversty, PO Box: 28095 11437 Ryadh-Saud Araba Abstract The very large nfrastructure

More information

Multi-sensor Data Fusion for Cyber Security Situation Awareness

Multi-sensor Data Fusion for Cyber Security Situation Awareness Avalable onlne at www.scencedrect.com Proceda Envronmental Scences 0 (20 ) 029 034 20 3rd Internatonal Conference on Envronmental 3rd Internatonal Conference on Envronmental Scence and Informaton Applcaton

More information

Calculation of Sampling Weights

Calculation of Sampling Weights Perre Foy Statstcs Canada 4 Calculaton of Samplng Weghts 4.1 OVERVIEW The basc sample desgn used n TIMSS Populatons 1 and 2 was a two-stage stratfed cluster desgn. 1 The frst stage conssted of a sample

More information

An Interest-Oriented Network Evolution Mechanism for Online Communities

An Interest-Oriented Network Evolution Mechanism for Online Communities An Interest-Orented Network Evoluton Mechansm for Onlne Communtes Cahong Sun and Xaopng Yang School of Informaton, Renmn Unversty of Chna, Bejng 100872, P.R. Chna {chsun,yang}@ruc.edu.cn Abstract. Onlne

More information

Can Auto Liability Insurance Purchases Signal Risk Attitude?

Can Auto Liability Insurance Purchases Signal Risk Attitude? Internatonal Journal of Busness and Economcs, 2011, Vol. 10, No. 2, 159-164 Can Auto Lablty Insurance Purchases Sgnal Rsk Atttude? Chu-Shu L Department of Internatonal Busness, Asa Unversty, Tawan Sheng-Chang

More information

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks

A Parallel Architecture for Stateful Intrusion Detection in High Traffic Networks A Parallel Archtecture for Stateful Intruson Detecton n Hgh Traffc Networks Mchele Colajann Mrco Marchett Dpartmento d Ingegnera dell Informazone Unversty of Modena {colajann, marchett.mrco}@unmore.t Abstract

More information

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP)

1. Fundamentals of probability theory 2. Emergence of communication traffic 3. Stochastic & Markovian Processes (SP & MP) 6.3 / -- Communcaton Networks II (Görg) SS20 -- www.comnets.un-bremen.de Communcaton Networks II Contents. Fundamentals of probablty theory 2. Emergence of communcaton traffc 3. Stochastc & Markovan Processes

More information

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection

Stochastic Protocol Modeling for Anomaly Based Network Intrusion Detection Stochastc Protocol Modelng for Anomaly Based Network Intruson Detecton Juan M. Estevez-Tapador, Pedro Garca-Teodoro, and Jesus E. Daz-Verdejo Department of Electroncs and Computer Technology Unversty of

More information

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION

Vision Mouse. Saurabh Sarkar a* University of Cincinnati, Cincinnati, USA ABSTRACT 1. INTRODUCTION Vson Mouse Saurabh Sarkar a* a Unversty of Cncnnat, Cncnnat, USA ABSTRACT The report dscusses a vson based approach towards trackng of eyes and fngers. The report descrbes the process of locatng the possble

More information

How To Understand The Results Of The German Meris Cloud And Water Vapour Product

How To Understand The Results Of The German Meris Cloud And Water Vapour Product Ttel: Project: Doc. No.: MERIS level 3 cloud and water vapour products MAPP MAPP-ATBD-ClWVL3 Issue: 1 Revson: 0 Date: 9.12.1998 Functon Name Organsaton Sgnature Date Author: Bennartz FUB Preusker FUB Schüller

More information

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS

INVESTIGATION OF VEHICULAR USERS FAIRNESS IN CDMA-HDR NETWORKS 21 22 September 2007, BULGARIA 119 Proceedngs of the Internatonal Conference on Informaton Technologes (InfoTech-2007) 21 st 22 nd September 2007, Bulgara vol. 2 INVESTIGATION OF VEHICULAR USERS FAIRNESS

More information

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application

Performance Analysis of Energy Consumption of Smartphone Running Mobile Hotspot Application Internatonal Journal of mart Grd and lean Energy Performance Analyss of Energy onsumpton of martphone Runnng Moble Hotspot Applcaton Yun on hung a chool of Electronc Engneerng, oongsl Unversty, 511 angdo-dong,

More information

A graph-theoretic framework for isolating botnets in a network

A graph-theoretic framework for isolating botnets in a network SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks (212) Publshed onlne n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 SPECIAL ISSUE PAPER A graph-theoretc framework for solatng botnets n a network

More information

IMPACT ANALYSIS OF A CELLULAR PHONE

IMPACT ANALYSIS OF A CELLULAR PHONE 4 th ASA & μeta Internatonal Conference IMPACT AALYSIS OF A CELLULAR PHOE We Lu, 2 Hongy L Bejng FEAonlne Engneerng Co.,Ltd. Bejng, Chna ABSTRACT Drop test smulaton plays an mportant role n nvestgatng

More information

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays

VoIP Playout Buffer Adjustment using Adaptive Estimation of Network Delays VoIP Playout Buffer Adjustment usng Adaptve Estmaton of Network Delays Mroslaw Narbutt and Lam Murphy* Department of Computer Scence Unversty College Dubln, Belfeld, Dubln, IRELAND Abstract The poor qualty

More information

Forecasting the Direction and Strength of Stock Market Movement

Forecasting the Direction and Strength of Stock Market Movement Forecastng the Drecton and Strength of Stock Market Movement Jngwe Chen Mng Chen Nan Ye [email protected] [email protected] [email protected] Abstract - Stock market s one of the most complcated systems

More information

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection

Negative Selection and Niching by an Artificial Immune System for Network Intrusion Detection Negatve Selecton and Nchng by an Artfcal Immune System for Network Intruson Detecton Jungwon Km and Peter Bentley Department of omputer Scence, Unversty ollege London, Gower Street, London, W1E 6BT, U.K.

More information

A Performance Analysis of View Maintenance Techniques for Data Warehouses

A Performance Analysis of View Maintenance Techniques for Data Warehouses A Performance Analyss of Vew Mantenance Technques for Data Warehouses Xng Wang Dell Computer Corporaton Round Roc, Texas Le Gruenwald The nversty of Olahoma School of Computer Scence orman, OK 739 Guangtao

More information

An RFID Distance Bounding Protocol

An RFID Distance Bounding Protocol An RFID Dstance Boundng Protocol Gerhard P. Hancke and Markus G. Kuhn May 22, 2006 An RFID Dstance Boundng Protocol p. 1 Dstance boundng Verfer d Prover Places an upper bound on physcal dstance Does not

More information

Calculating the high frequency transmission line parameters of power cables

Calculating the high frequency transmission line parameters of power cables < ' Calculatng the hgh frequency transmsson lne parameters of power cables Authors: Dr. John Dcknson, Laboratory Servces Manager, N 0 RW E B Communcatons Mr. Peter J. Ncholson, Project Assgnment Manager,

More information

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol

CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK. Sample Stability Protocol CHOLESTEROL REFERENCE METHOD LABORATORY NETWORK Sample Stablty Protocol Background The Cholesterol Reference Method Laboratory Network (CRMLN) developed certfcaton protocols for total cholesterol, HDL

More information

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet

How To Detect An 802.11 Traffc From A Network With A Network Onlne Onlnet IEEE TRANSACTIONS ON MOBILE COMPUTING, VOL. X, NO. X, XXX 2008 1 Passve Onlne Detecton of 802.11 Traffc Usng Sequental Hypothess Testng wth TCP ACK-Pars We We, Member, IEEE, Kyoungwon Suh, Member, IEEE,

More information

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage

Proactive Secret Sharing Or: How to Cope With Perpetual Leakage Proactve Secret Sharng Or: How to Cope Wth Perpetual Leakage Paper by Amr Herzberg Stanslaw Jareck Hugo Krawczyk Mot Yung Presentaton by Davd Zage What s Secret Sharng Basc Idea ((2, 2)-threshold scheme):

More information

What is Candidate Sampling

What is Candidate Sampling What s Canddate Samplng Say we have a multclass or mult label problem where each tranng example ( x, T ) conssts of a context x a small (mult)set of target classes T out of a large unverse L of possble

More information

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek

THE DISTRIBUTION OF LOAN PORTFOLIO VALUE * Oldrich Alfons Vasicek HE DISRIBUION OF LOAN PORFOLIO VALUE * Oldrch Alfons Vascek he amount of captal necessary to support a portfolo of debt securtes depends on the probablty dstrbuton of the portfolo loss. Consder a portfolo

More information

A DATA MINING APPLICATION IN A STUDENT DATABASE

A DATA MINING APPLICATION IN A STUDENT DATABASE JOURNAL OF AERONAUTICS AND SPACE TECHNOLOGIES JULY 005 VOLUME NUMBER (53-57) A DATA MINING APPLICATION IN A STUDENT DATABASE Şenol Zafer ERDOĞAN Maltepe Ünversty Faculty of Engneerng Büyükbakkalköy-Istanbul

More information

Conferencing protocols and Petri net analysis

Conferencing protocols and Petri net analysis Conferencng protocols and Petr net analyss E. ANTONIDAKIS Department of Electroncs, Technologcal Educatonal Insttute of Crete, GREECE [email protected] Abstract: Durng a computer conference, users desre

More information

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing

Cooperative Load Balancing in IEEE 802.11 Networks with Cell Breathing Cooperatve Load Balancng n IEEE 82.11 Networks wth Cell Breathng Eduard Garca Rafael Vdal Josep Paradells Wreless Networks Group - Techncal Unversty of Catalona (UPC) {eduardg, rvdal, teljpa}@entel.upc.edu;

More information

A Dynamic Load Balancing for Massive Multiplayer Online Game Server

A Dynamic Load Balancing for Massive Multiplayer Online Game Server A Dynamc Load Balancng for Massve Multplayer Onlne Game Server Jungyoul Lm, Jaeyong Chung, Jnryong Km and Kwanghyun Shm Dgtal Content Research Dvson Electroncs and Telecommuncatons Research Insttute Daejeon,

More information

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems

Application of Multi-Agents for Fault Detection and Reconfiguration of Power Distribution Systems 1 Applcaton of Mult-Agents for Fault Detecton and Reconfguraton of Power Dstrbuton Systems K. Nareshkumar, Member, IEEE, M. A. Choudhry, Senor Member, IEEE, J. La, A. Felach, Senor Member, IEEE Abstract--The

More information

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy

Course outline. Financial Time Series Analysis. Overview. Data analysis. Predictive signal. Trading strategy Fnancal Tme Seres Analyss Patrck McSharry [email protected] www.mcsharry.net Trnty Term 2014 Mathematcal Insttute Unversty of Oxford Course outlne 1. Data analyss, probablty, correlatons, vsualsaton

More information

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks

Master s Thesis. Configuring robust virtual wireless sensor networks for Internet of Things inspired by brain functional networks Master s Thess Ttle Confgurng robust vrtual wreless sensor networks for Internet of Thngs nspred by bran functonal networks Supervsor Professor Masayuk Murata Author Shnya Toyonaga February 10th, 2014

More information

Enterprise Master Patient Index

Enterprise Master Patient Index Enterprse Master Patent Index Healthcare data are captured n many dfferent settngs such as hosptals, clncs, labs, and physcan offces. Accordng to a report by the CDC, patents n the Unted States made an

More information

RequIn, a tool for fast web traffic inference

RequIn, a tool for fast web traffic inference RequIn, a tool for fast web traffc nference Olver aul, Jean Etenne Kba GET/INT, LOR Department 9 rue Charles Fourer 90 Evry, France [email protected], [email protected] Abstract As networked

More information

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT

APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT APPLICATION OF PROBE DATA COLLECTED VIA INFRARED BEACONS TO TRAFFIC MANEGEMENT Toshhko Oda (1), Kochro Iwaoka (2) (1), (2) Infrastructure Systems Busness Unt, Panasonc System Networks Co., Ltd. Saedo-cho

More information

Understanding the physical and economic consequences of attacks on control systems

Understanding the physical and economic consequences of attacks on control systems I N T E R N A T I O N A L J O U R N A L O F C R I T I C A L I N F R A S T R U C T U R E P R O T E C T I O N 2 ( 2 0 0 9 ) 7 3 8 3 avalable at www.scencedrect.com journal homepage: www.elsever.com/locate/jcp

More information

Control Charts with Supplementary Runs Rules for Monitoring Bivariate Processes

Control Charts with Supplementary Runs Rules for Monitoring Bivariate Processes Control Charts wth Supplementary Runs Rules for Montorng varate Processes Marcela. G. Machado *, ntono F.. Costa * * Producton Department, Sao Paulo State Unversty, Campus of Guaratnguetá, 56-4 Guaratnguetá,

More information

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs

ivoip: an Intelligent Bandwidth Management Scheme for VoIP in WLANs VoIP: an Intellgent Bandwdth Management Scheme for VoIP n WLANs Zhenhu Yuan and Gabrel-Mro Muntean Abstract Voce over Internet Protocol (VoIP) has been wdely used by many moble consumer devces n IEEE 802.11

More information

Resource Scheduling in Desktop Grid by Grid-JQA

Resource Scheduling in Desktop Grid by Grid-JQA The 3rd Internatonal Conference on Grd and Pervasve Computng - Worshops esource Schedulng n Destop Grd by Grd-JQA L. Mohammad Khanl M. Analou Assstant professor Assstant professor C.S. Dept.Tabrz Unversty

More information

Relay Secrecy in Wireless Networks with Eavesdropper

Relay Secrecy in Wireless Networks with Eavesdropper Relay Secrecy n Wreless Networks wth Eavesdropper Parvathnathan Venktasubramanam, Tng He and Lang Tong School of Electrcal and Computer Engneerng Cornell Unversty, Ithaca, NY 14853 Emal : {pv45, th255,

More information

Computer-assisted Auditing for High- Volume Medical Coding

Computer-assisted Auditing for High- Volume Medical Coding Computer-asssted Audtng for Hgh-Volume Medcal Codng Computer-asssted Audtng for Hgh- Volume Medcal Codng by Danel T. Henze, PhD; Peter Feller, MS; Jerry McCorkle, BA; and Mark Morsch, MS Abstract The volume

More information

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña

A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION. Michael E. Kuhl Radhamés A. Tolentino-Peña Proceedngs of the 2008 Wnter Smulaton Conference S. J. Mason, R. R. Hll, L. Mönch, O. Rose, T. Jefferson, J. W. Fowler eds. A DYNAMIC CRASHING METHOD FOR PROJECT MANAGEMENT USING SIMULATION-BASED OPTIMIZATION

More information

[email protected]@cityu.edu.hk [email protected], [email protected]

taposh_kuet20@yahoo.comcsedchan@cityu.edu.hk rajib_csedept@yahoo.co.uk, alam_shihabul@yahoo.com G. G. Md. Nawaz Al 1,2, Rajb Chakraborty 2, Md. Shhabul Alam 2 and Edward Chan 1 1 Cty Unversty of Hong Kong, Hong Kong, Chna [email protected]@ctyu.edu.hk 2 Khulna Unversty of Engneerng

More information

A role based access in a hierarchical sensor network architecture to provide multilevel security

A role based access in a hierarchical sensor network architecture to provide multilevel security 1 A role based access n a herarchcal sensor network archtecture to provde multlevel securty Bswajt Panja a Sanjay Kumar Madra b and Bharat Bhargava c a Department of Computer Scenc Morehead State Unversty

More information

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks

Secure Walking GPS: A Secure Localization and Key Distribution Scheme for Wireless Sensor Networks Secure Walkng GPS: A Secure Localzaton and Key Dstrbuton Scheme for Wreless Sensor Networks Q M, John A. Stankovc, Radu Stoleru 2 Department of Computer Scence, Unversty of Vrgna, USA 2 Department of Computer

More information

A FEATURE SELECTION AGENT-BASED IDS

A FEATURE SELECTION AGENT-BASED IDS A FEATURE SELECTION AGENT-BASED IDS Emlo Corchado, Álvaro Herrero and José Manuel Sáz Department of Cvl Engneerng, Unversty of Burgos C/Francsco de Vtora s/n., 09006, Burgos, Span Phone: +34 947259395,

More information

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures

Minimal Coding Network With Combinatorial Structure For Instantaneous Recovery From Edge Failures Mnmal Codng Network Wth Combnatoral Structure For Instantaneous Recovery From Edge Falures Ashly Joseph 1, Mr.M.Sadsh Sendl 2, Dr.S.Karthk 3 1 Fnal Year ME CSE Student Department of Computer Scence Engneerng

More information

QoS-Aware Active Queue Management for Multimedia Services over the Internet

QoS-Aware Active Queue Management for Multimedia Services over the Internet QoS-Aware Actve Queue Management for Multmeda Servces over the Internet I-Shyan Hwang, *Bor-Junn Hwang, Pen-Mng Chang, Cheng-Yu Wang Abstract Recently, the multmeda servces such as IPTV, vdeo conference

More information

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks

SPEED: A Stateless Protocol for Real-Time Communication in Sensor Networks : A Stateless Protocol for Real-Tme Communcaton n Sensor Networks Tan He a John A Stankovc a Chenyang Lu b Tarek Abdelzaher a a Department of Computer Scence b Department of Computer Scence & Engneerng

More information

DEFINING %COMPLETE IN MICROSOFT PROJECT

DEFINING %COMPLETE IN MICROSOFT PROJECT CelersSystems DEFINING %COMPLETE IN MICROSOFT PROJECT PREPARED BY James E Aksel, PMP, PMI-SP, MVP For Addtonal Informaton about Earned Value Management Systems and reportng, please contact: CelersSystems,

More information

Multiple-Period Attribution: Residuals and Compounding

Multiple-Period Attribution: Residuals and Compounding Multple-Perod Attrbuton: Resduals and Compoundng Our revewer gave these authors full marks for dealng wth an ssue that performance measurers and vendors often regard as propretary nformaton. In 1994, Dens

More information

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, [email protected]

BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK. 0688, dskim@ssu.ac.kr Proceedngs of the 41st Internatonal Conference on Computers & Industral Engneerng BUSINESS PROCESS PERFORMANCE MANAGEMENT USING BAYESIAN BELIEF NETWORK Yeong-bn Mn 1, Yongwoo Shn 2, Km Jeehong 1, Dongsoo

More information

LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS

LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS Proceedngs of the Postgraduate Annual Research Semnar 2005 238 LATTICE-BASED FIREWALL FOR SAFETY INTERNET ACCESS Cahyo Crysdan and Abdul Hanan Abdullah The Faculty of Computer Scence and Informaton System

More information

A Potent Model for Unwanted Traffic Detection in QoS Network Domain

A Potent Model for Unwanted Traffic Detection in QoS Network Domain A Potent Model for Unwanted Traffc Detecton n QoS Network Doman Abdulghan Al Ahmed, Aman Jantan, Ghassan Ahmed Al A Potent Model for Unwanted Traffc Detecton n QoS Network Doman Abdulghan Al Ahmed, Aman

More information

Justifying Spam and E-mail Virus Security Investments: A Case Study. Hemantha Herath 1 and Tejaswini Herath 2

Justifying Spam and E-mail Virus Security Investments: A Case Study. Hemantha Herath 1 and Tejaswini Herath 2 Justfyng Spam and E-mal Vrus Securty Investments: A Case Study Hemantha Herath 1 and Tejaswn Herath 2 Abstract: Our paper nvestgates the problem of justfyng securty nvestments concernng spam and emal vrus

More information

Automated Network Performance Management and Monitoring via One-class Support Vector Machine

Automated Network Performance Management and Monitoring via One-class Support Vector Machine Automated Network Performance Management and Montorng va One-class Support Vector Machne R. Zhang, J. Jang, and S. Zhang Dgtal Meda & Systems Research Insttute, Unversty of Bradford, UK Abstract: In ths

More information

A probabilistic approach for predictive congestion control in wireless sensor networks

A probabilistic approach for predictive congestion control in wireless sensor networks Anne Uthra et al. / J Zhejang Unv-Sc C (Comput & Electron) 214 15(3):187-199 187 Journal of Zhejang Unversty-SCIENCE C (Computers & Electroncs) ISSN 1869-1951 (Prnt); ISSN 1869-196X (Onlne) www.zju.edu.cn/jzus;

More information

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS

A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Bamasak & Zhang: A Dstrbuted Reputaton Management Scheme for Moble Agent-Based Applcatons A DISTRIBUTED REPUTATION MANAGEMENT SCHEME FOR MOBILE AGENT- BASED APPLICATIONS Omama Bamasak School of Computer

More information

IT09 - Identity Management Policy

IT09 - Identity Management Policy IT09 - Identty Management Polcy Introducton 1 The Unersty needs to manage dentty accounts for all users of the Unersty s electronc systems and ensure that users hae an approprate leel of access to these

More information

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12

PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 12 14 The Ch-squared dstrbuton PSYCHOLOGICAL RESEARCH (PYC 304-C) Lecture 1 If a normal varable X, havng mean µ and varance σ, s standardsed, the new varable Z has a mean 0 and varance 1. When ths standardsed

More information

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture

A Design Method of High-availability and Low-optical-loss Optical Aggregation Network Architecture A Desgn Method of Hgh-avalablty and Low-optcal-loss Optcal Aggregaton Network Archtecture Takehro Sato, Kuntaka Ashzawa, Kazumasa Tokuhash, Dasuke Ish, Satoru Okamoto and Naoak Yamanaka Dept. of Informaton

More information

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network *

Data Broadcast on a Multi-System Heterogeneous Overlayed Wireless Network * JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 24, 819-840 (2008) Data Broadcast on a Mult-System Heterogeneous Overlayed Wreless Network * Department of Computer Scence Natonal Chao Tung Unversty Hsnchu,

More information

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS

QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS QOS DISTRIBUTION MONITORING FOR PERFORMANCE MANAGEMENT IN MULTIMEDIA NETWORKS Yumng Jang, Chen-Khong Tham, Ch-Chung Ko Department Electrcal Engneerng Natonal Unversty Sngapore 119260 Sngapore Emal: {engp7450,

More information

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing

Efficient Bandwidth Management in Broadband Wireless Access Systems Using CAC-based Dynamic Pricing Effcent Bandwdth Management n Broadband Wreless Access Systems Usng CAC-based Dynamc Prcng Bader Al-Manthar, Ndal Nasser 2, Najah Abu Al 3, Hossam Hassanen Telecommuncatons Research Laboratory School of

More information

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks

A 2 -MAC: An Adaptive, Anycast MAC Protocol for Wireless Sensor Networks : An Adaptve, Anycast MAC Protocol for Wreless Sensor Networks Hwee-Xan Tan and Mun Choon Chan Department of Computer Scence, School of Computng, Natonal Unversty of Sngapore {hweexan, chanmc}@comp.nus.edu.sg

More information

Detecting Credit Card Fraud using Periodic Features

Detecting Credit Card Fraud using Periodic Features Detectng Credt Card Fraud usng Perodc Features Alejandro Correa Bahnsen, Djamla Aouada, Aleksandar Stojanovc and Björn Ottersten Interdscplnary Centre for Securty, Relablty and Trust Unversty of Luxembourg,

More information

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks

Research Article QoS and Energy Aware Cooperative Routing Protocol for Wildfire Monitoring Wireless Sensor Networks The Scentfc World Journal Volume 3, Artcle ID 43796, pages http://dx.do.org/.55/3/43796 Research Artcle QoS and Energy Aware Cooperatve Routng Protocol for Wldfre Montorng Wreless Sensor Networks Mohamed

More information

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting

Properties of Indoor Received Signal Strength for WLAN Location Fingerprinting Propertes of Indoor Receved Sgnal Strength for WLAN Locaton Fngerprntng Kamol Kaemarungs and Prashant Krshnamurthy Telecommuncatons Program, School of Informaton Scences, Unversty of Pttsburgh E-mal: kakst2,[email protected]

More information

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1

Open Access A Load Balancing Strategy with Bandwidth Constraint in Cloud Computing. Jing Deng 1,*, Ping Guo 2, Qi Li 3, Haizhu Chen 1 Send Orders for Reprnts to [email protected] The Open Cybernetcs & Systemcs Journal, 2014, 8, 115-121 115 Open Access A Load Balancng Strategy wth Bandwdth Constrant n Cloud Computng Jng Deng 1,*,

More information

Reliable State Monitoring in Cloud Datacenters

Reliable State Monitoring in Cloud Datacenters Relable State Montorng n Cloud Datacenters Shcong Meng Arun K. Iyengar Isabelle M. Rouvellou Lng Lu Ksung Lee Balaj Palansamy Yuzhe Tang College of Computng, Georga Insttute of Technology, Atlanta, GA

More information

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications

Methodology to Determine Relationships between Performance Factors in Hadoop Cloud Computing Applications Methodology to Determne Relatonshps between Performance Factors n Hadoop Cloud Computng Applcatons Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng and

More information

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS

METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS METHODOLOGY TO DETERMINE RELATIONSHIPS BETWEEN PERFORMANCE FACTORS IN HADOOP CLOUD COMPUTING APPLICATIONS Lus Eduardo Bautsta Vllalpando 1,2, Alan Aprl 1 and Alan Abran 1 1 Department of Software Engneerng

More information