Combining Moving Target Defense with Autonomic Systems. Warren Connell 7 Dec 15

Size: px
Start display at page:

Download "Combining Moving Target Defense with Autonomic Systems. Warren Connell 7 Dec 15"

Transcription

1 Combining Moving Target Defense with Autonomic Systems Warren Connell 7 Dec 15

2 Problem / Motivation Related to area of Moving Target Defense (MTD) Few research papers devoted to effectiveness Few devoted to cost/overhead of MTD Still fewer related to both Security must be balanced with Quality of Service Possible with autonomous systems Metrics may be too coarse-grained / subjective Marry MTD technique with known performance with autonomic techniques for better overall utility Practice selection and design of utility functions

3 Background / Related Work One MTD technique: Randomly reassign roles, VM, hosts, and IP addresses Zhuang, Rui, et al. "Simulation-based approaches to studying effectiveness of movingtarget network defense." National Symposium on Moving Target Research. 212.

4 Background / Related Work Another MTD technique: protect against DDoS attacks by utilizing a rotating layer of secret proxies QuanJia; Kun Sun; Stavrou, A., "MOTAG: Moving Target Defense against Internet Denial of Service Attacks," incomputer Communications and Networks (ICCCN), nd International Conference on, pp.1-9, July Aug

5 Background / Related Work Combining QoSand Security in a streaming media application for various user preferences: MouradAlia, Marc Lacoste, RuanHe, and Frank Eliassen. 21. Putting together QoSand security in autonomic pervasive systems. InProceedings of the 6th ACM workshop on QoSand security for wireless and mobile networks(q2swinet '1). ACM, New York, NY, USA,

6 Approach Multiple utility functions: Security utility from detection rates of database IDPS (use exponential average if multiple IDPSs): Response time utility from sigmoid based on SLO and parameters from linear queuing model: Global utility: Alomari, F.; Menasce, D., "An Autonomic Framework for Integrating Security and Quality of Service Support in Databases," insoftware Security and Reliability (SERE), 212 IEEE Sixth International Conference on, pp.51-6, 2-22 June 212.

7 Approach Another MTD technique: dynamically re-map association between addresses and systems Uses probabilistic models Static case: Probability of successful probe given k draws, v vulnerable machines out of n machines: Dynamic case: perfect shuffling (1 / probe attempt) Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214

8 Approach Chances of finding 1 vulnerable computer as network size increases using perfect shuffling 1/e =.63 Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214

9 Approach Experimentally determine failure rate as a function of shuffle rate Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214

10 Preliminary Results 1 Leave U(security) = 1 (attacker success rate) Choose sigmoid parameters for connection loss: U(loss) = δ =.95 (SLO) σ= -1 (steepness) ( ) Initially choose α = β =.5 for relative weights U(g) = α*u(security) + β*u(loss)

11 Preliminary Results 1 Utility α = β =.5 α =.75; β =.25 Utility vs. Shuffle Rate Shuffle Rate α =.9; β = Utility Utility Shuffle Rate Utility vs. Shuffle Rate Shuffle Rate U(Loss) U(Security)

12 Preliminary Results 2 Introduce additional 5% packet loss (α = β =.5) Utility function compensates by reducing shuffle rate Utility Utility vs. Shuffle Rate Shuffle Rate Utility Utility vs. Shuffle Rate Shuffle Rate U(Loss) U(Security)

13 Conclusion Can combine measures of security effectiveness with QoSin a utility function Need objective measure for security effectiveness QoS easily measured (connection loss, response time) Proper choices of utility function and parameters still require input from domain experts Sigmoidsmay not be required in all cases

14 Sources Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214. QuanJia; Kun Sun; Stavrou, A., "MOTAG: Moving Target Defense against Internet Denial of Service Attacks," incomputer Communications and Networks (ICCCN), nd International Conference on, pp.1-9, July Aug Zhuang, Rui, et al. "Simulation-based approaches to studying effectiveness of movingtarget network defense." National Symposium on Moving Target Research RuiZhuang; Su Zhang; Bardas, A.; DeLoach, S.A.; XinmingOu; Singhal, A., "Investigating the application of moving target defenses to network security," inresilient Control Systems (ISRCS), 213 6th International Symposium on, pp , Aug Alomari, F.; Menasce, D., "An Autonomic Framework for Integrating Security and Quality of Service Support in Databases," insoftware Security and Reliability (SERE), 212 IEEE Sixth International Conference on, pp.51-6, 2-22 June 212. MouradAlia, Marc Lacoste, RuanHe, and Frank Eliassen. 21. Putting together QoSand security in autonomic pervasive systems. In Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks(q2swinet '1). ACM, New York, NY, USA,

A Quantitative Framework for Cyber Moving Target Defenses

A Quantitative Framework for Cyber Moving Target Defenses A Quantitative Framework for Cyber Moving Target Defenses Warren Connell 29 Aug 17 Massimiliano Albanese, co-director Daniel Menascé, co-director Sushil Jajodia Rajesh Ganesan 7/6/2017 1 Outline Introduction

More information

A Survey of Self-Protecting Computing Systems

A Survey of Self-Protecting Computing Systems A Survey of Self-Protecting Computing Systems Essien Ayanam The Volgenau School of Engineering George Mason University Fairfax, Virginia, 22030, USA Email: eayanam@gmu.edu Outline Introduction Overview

More information

Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses

Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses Michael Crouse, Bryan Prosser and Errin W. Fulp WAKE FOREST U N I V E R S I T Y Department of Computer Science

More information

An Autonomic Framework for Integrating Security and Quality of Service Support in Databases

An Autonomic Framework for Integrating Security and Quality of Service Support in Databases An Autonomic Framework for Integrating Security and Quality of Service Support in Databases Firas Alomari The Volgenau School of Engineering George Mason University Daniel A. Menasce Department of Computer

More information

Advanced Security Solution in IPv6

Advanced Security Solution in IPv6 Advanced Security Solution in IPv6 Vahid Heydari University of Alabama in Huntsville vahid.heydari@uah.edu Outline IPv6, IPsec, and VPN Remote attacks and zero-day vulnerability Moving target defense Related

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

An Introduction to Network Address Shuffling

An Introduction to Network Address Shuffling An Introduction to Network Address Shuffling Guilin Cai, Baosheng Wang, Xiaofeng Wang, Yulei Yuan, Sudan Li College of Computer, National University of Defense Technology, Changsha, China cc_cai@163.com,

More information

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks

Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department

More information

Whack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environments

Whack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environments Whack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environments Minh Nguyen, Amitangshu Pal, Saptarshi Debroy Computer Science, City University of New York, New York, NY

More information

A Framework for Moving Target Defense Quantification

A Framework for Moving Target Defense Quantification A Framework for Moving Target Defense Quantification Warren Connell, Massimiliano Albanese (B), and Sridhar Venkatesan George Mason University, Fairfax, VA 22030, USA {wconnel2,malbanes,svenkate}@gmu.edu

More information

On the Use of Performance Models in Autonomic Computing

On the Use of Performance Models in Autonomic Computing On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle

More information

Analysis of Concurrent Moving Target Defenses

Analysis of Concurrent Moving Target Defenses Analysis of Concurrent Moving Target Defenses Warren Connell George Mason University Fairfax, Virginia wconnel2@gmu.edu Luan Huy Pham George Mason University Fairfax, Virginia lpham6@gmu.edu Samuel Philip

More information

Leveraging SDN & NFV to Achieve Software-Defined Security

Leveraging SDN & NFV to Achieve Software-Defined Security Leveraging SDN & NFV to Achieve Software-Defined Security Zonghua Zhang @imt-lille-douai.fr NEPS: NEtwork Performance and Security Group 2 Topics Anomaly detection, root cause analysis Security evaluation

More information

Handling DDoS attacks in Cloud

Handling DDoS attacks in Cloud Handling DDoS attacks in Cloud Yesu Jeya Bensh P, Murugan K College of Engineering, Anna University, Chennai, India Abstract Cloud is the fastest growing computing platform. Researches have demonstrated

More information

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Pedro B. Velloso 1, Rafael P. Laufer 2, Otto Carlos M. B. Duarte 3, and Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6 (LIP6) 2 Computer

More information

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection

Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum Paul Syverson (U.S. Naval Research Laboratory) (U.S. Naval

More information

International Journal of Advance Research in Computer Science and Management Studies

International Journal of Advance Research in Computer Science and Management Studies Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online

More information

On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS)

On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS) On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS) Outline 1. Introduction to Wireless Mesh Networks 2. Multicast and its

More information

Distributed Energy-Aware Routing Protocol

Distributed Energy-Aware Routing Protocol Distributed Energy-Aware Routing Protocol Erol Gelenbe and Toktam Mahmoodi Intelligent Systems & Networks Group Department of Electrical & Electronic Engineering Imperial College, London SW7 2BT, UK {e.gelenbe,t.mahmoodi}@imperial.ac.uk

More information

Building a Self-Adaptive Content Distribution Network Gawesh Jawaheer Department of Computing, Imperial College London

Building a Self-Adaptive Content Distribution Network Gawesh Jawaheer Department of Computing, Imperial College London Building a Self-Adaptive Content Distribution Network Gawesh Jawaheer Department of Computing, Imperial College London gawesh@doc.ic.ac.uk Abstract In this paper, we propose a framework for building a

More information

Model-Based Load Testing for Performance and Security. Cornel Barna, Mark Shtern, Michael Smit, Marin Litoiu

Model-Based Load Testing for Performance and Security. Cornel Barna, Mark Shtern, Michael Smit, Marin Litoiu for Performance and Security Cornel Barna Mark Shtern Michael Smit Marin Litoiu Computer Science and Engineering York University April 17, 212 Performance Testing The Performance Stress Space The Framework

More information

Analysis of Network Address Shuffling as a Moving Target Defense

Analysis of Network Address Shuffling as a Moving Target Defense Analysis of Network Address Shuffling as a Moving Target Defense Thomas E. Carroll Pacific Northwest National Laboratory Richland, Washington 99352 Email: Thomas.Carroll@pnl.gov Michael Crouse Computer

More information

Alexandru G. Bardas. Curriculum Vitae (last update: January 2018) Education. Appointments

Alexandru G. Bardas. Curriculum Vitae (last update: January 2018) Education. Appointments Alexandru G. Bardas EECS Department ITTC 2040 Eaton Hall 238 Nichols Hall The University of Kansas, Lawrence, KS 66045 Curriculum Vitae (last update: January 2018) : 785 864 7390 (E) : 785 864 4421 (N)

More information

FRVM: Flexible Random Virtual IP Multiplexing in. software-defined networks

FRVM: Flexible Random Virtual IP Multiplexing in. software-defined networks FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks Dilli P. Sharma, Dong Seong Kim University of Canterbury Christchurch, New Zealand dilli.sharma@pg.canterbury.ac.nz dongseong.kim@canterbury.ac.nz

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

Inferring the Source of Encrypted HTTP Connections

Inferring the Source of Encrypted HTTP Connections Inferring the Source of Encrypted HTTP Connections Marc Liberatore Brian Neil Levine 1 Private Communications? Does link encryption provide privacy? VPNs, SSH tunnels, WEP/WPA, etc. 2 Anonymous Communication?

More information

Energy Efficient in Cloud Computing

Energy Efficient in Cloud Computing Energy Efficient in Cloud Computing Christoph Aschberger Franziska Halbrainer May 24, 2013 1 of 25 Introduction Energy consumption by Google 2011: 2,675,898 MWh. We found that we use roughly as much electricity

More information

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004

Specification-based Intrusion Detection. Michael May CIS-700 Fall 2004 Specification-based Intrusion Detection Michael May CIS-700 Fall 2004 Overview Mobile ad hoc networking (MANET) new area of protocols Some old networking solutions work (TCP/IP) but things change with

More information

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs

Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE

More information

A new method for VoIP Quality of Service control using combined adaptive sender rate and priority marking

A new method for VoIP Quality of Service control using combined adaptive sender rate and priority marking A new method for VoIP Quality of Service control using combined adaptive sender rate and priority Zizhi Qiao, Lingfen Sun, Nicolai Heilemann and Emmanuel Ifeachor Centre for Signal Processing & Multimedia

More information

Provision of Quality of Service with Router Support

Provision of Quality of Service with Router Support Provision of Quality of Service with Router Support Hongli Luo Department of Computer and Electrical Engineering Technology and Information System and Technology Indiana University Purdue University Fort

More information

Sprinkler: Distributed Content Storage for Just-in-Time Streaming. CellNet Taipei, Taiwan Presented By: Sourav Kumar Dandapat

Sprinkler: Distributed Content Storage for Just-in-Time Streaming. CellNet Taipei, Taiwan Presented By: Sourav Kumar Dandapat Sprinkler: Distributed Content Storage for Just-in-Time Streaming CellNet -2013 Taipei, Taiwan Presented By: Sourav Kumar Dandapat Background Mobile data traffic and its demand is increasing in exponential

More information

Can randomized mapping secure instruction caches from side-channel attacks?

Can randomized mapping secure instruction caches from side-channel attacks? Can randomized mapping secure instruction caches from side-channel attacks? Fangfei Liu, Hao Wu and Ruby B. Lee Princeton University June 14, 2015 Outline Motivation and Background Data cache attacks and

More information

An Overlay Architecture for End-to-End Internet Service Availability

An Overlay Architecture for End-to-End Internet Service Availability An Overlay Architecture for End-to-End Internet Service Availability Angelos Stavrou Network Security Lab Computer Science Department, Columbia University Overview of the talk Problem Motivation Summary

More information

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks

Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a

More information

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think

AutoLock: Why Cache Attacks on ARM Are Harder Than You Think AutoLock: Why Cache Attacks on ARM Are Harder Than You Think Marc Green W, Leandro Rodrigues-Lima F, Andreas Zankl F, Gorka Irazoqui W, Johann Heyszl F, and Thomas Eisenbarth W August 18 th 2017 USENIX

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Framework for Optimizing Cluster Selection using Geo-assisted Movement Prediction

Framework for Optimizing Cluster Selection using Geo-assisted Movement Prediction Downloaded from vbn.aau.dk on: marts 3, 219 Aalborg Universitet Framework for Optimizing Cluster Selection using Geo-assisted Movement Kristensen, Thomas Sander; Madsen, Jacob Theilgaard; Pedersen, Michael

More information

A Framework for Utility-Based Service Oriented Design in SASSY

A Framework for Utility-Based Service Oriented Design in SASSY A Framework for Utility-Based Service Oriented Design in SASSY The material in these slides comes from the paper A Framework for Utility-Based Service Oriented Design in SASSY, D.A. Menasce, J. Ewing,

More information

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance

More information

SARA: Segment Aware Rate Adaptation for DASH Video Services

SARA: Segment Aware Rate Adaptation for DASH Video Services SARA: Segment Aware Rate Adaptation for DASH Video Services, Venkatesh Tamarapalli*, Deep Medhi University of Missouri Kansas City * Indian Institute of Technology-Guwahati, India Overview Introduction

More information

Things We Have Learned From This Project

Things We Have Learned From This Project Introduction Ad-hoc Network & Blackhole Attack Implementation and Topology Network Simulator - 2.35 Result Analysis NS-2 Visual Trace Analyzer & Perl Scripts Conclusion Things We Have Learned From This

More information

Differential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017

Differential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017 Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of

More information

Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks

Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks Communication Networks Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks Michael Menth and Nikolas Zeitler http://kn.inf.uni-tuebingen.de Outline The problem Definition

More information

Key Grids: A Protocol Family for Assigning Symmetric Keys

Key Grids: A Protocol Family for Assigning Symmetric Keys Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed

More information

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 )

HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) Abstract Traditionally, Content Delivery Networks (CDNs)

More information

Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen

Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen Southeast University of China University of Florida Motivation for Persistent Stealthy Spreaders Imagine

More information

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,

More information

Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting

Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting Kevin Foltz Lihao Xu Jehoshua Bruck California Institute of Technology Department of Computer Science Department of Electrical Engineering

More information

Characterizing the Running Patterns of Moving Target Defense Mechanisms

Characterizing the Running Patterns of Moving Target Defense Mechanisms Characterizing the Running Perns of Moving Target Defense Mechanisms Guilin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang College of Computer, National University of Defense Technology, Changsha,

More information

Resource allocation for autonomic data centers using analytic performance models.

Resource allocation for autonomic data centers using analytic performance models. Bennani, Mohamed N., and Daniel A. Menasce. "Resource allocation for autonomic data centers using analytic performance models." Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Module 1 - Distributed System Architectures & Models

Module 1 - Distributed System Architectures & Models Module 1 - Distributed System Architectures & Models System Architecture Defines the structure of the system components identified functions of each component defined interrelationships and interactions

More information

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS

PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous

More information

New-fangled Method against Data Flooding Attacks in MANET

New-fangled Method against Data Flooding Attacks in MANET New-fangled Method against Data Flooding Attacks in MANET Kavuri Roshan 1, K.Reddi Prasad 2, Niraj Upadhayaya 3 & A.Govardhan 4 1, 2&3 Department of Computer Science & Information Technology, J.B. Institute

More information

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul

Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK

More information

Low Rate DOS Attack Prevention

Low Rate DOS Attack Prevention ISSN No: 2454-9614 Low Rate DOS Attack Prevention S. Kandasamy, N.P. Kaushik *, A. Karthikeyan, S. Aravindh Srira *Corresponding Author: S.Kandasamy E-mail: skandu23@gmail.com Department of Computer Science

More information

Malware models for network and service management

Malware models for network and service management Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.

More information

Mobility Control for Complete Coverage in Wireless Sensor Networks

Mobility Control for Complete Coverage in Wireless Sensor Networks Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida

More information

Summarizing and mining inverse distributions on data streams via dynamic inverse sampling

Summarizing and mining inverse distributions on data streams via dynamic inverse sampling Summarizing and mining inverse distributions on data streams via dynamic inverse sampling Presented by Graham Cormode cormode@bell-labs.com S. Muthukrishnan muthu@cs.rutgers.edu Irina Rozenbaum rozenbau@paul.rutgers.edu

More information

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems

Safely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance

More information

A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS

A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS Arshpreet Kaur 1, Simarjeet Kaur 2 1 MTech Scholar, 2 Assistant Professor, Department of Computer Science and Engineering Sri Guru Granth

More information

Provider-based deterministic packet marking against distributed DoS attacks

Provider-based deterministic packet marking against distributed DoS attacks Journal of Network and Computer Applications 3 (27) 858 876 www.elsevier.com/locate/jnca Provider-based deterministic packet marking against distributed DoS attacks Vasilios A. Siris,, Ilias Stavrakis

More information

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology

Prof. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advance Deterministic

More information

Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment

Mean Waiting Delay for Web Object Transfer in Wireless SCTP Environment This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 009 proceedings Mean aiting Delay for eb Object Transfer in

More information

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks

On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless

More information

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points

Defenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS

PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS Volume 2, Issue 7, PP:, SEPTEMBER 2014. PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS TALLURI BEENA JOSEPHINE 1*, K.RAVICHAND 2* 1. II.M.Tech, Dept of CSE, AM

More information

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS.

MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. Radhika R Dept. of Electrical Engineering, IISc, Bangalore. radhika@ee.iisc.ernet.in Lawrence Jenkins Dept. of Electrical Engineering, IISc, Bangalore.

More information

hash chains to provide efficient secure solutions for DSDV [7].

hash chains to provide efficient secure solutions for DSDV [7]. A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University

More information

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization

Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger, Geoffrey Xie Naval Postgraduate School MIT/Akamai February 9, 2011 CAIDA Workshop

More information

A Smart Card Based Authentication Protocol for Strong Passwords

A Smart Card Based Authentication Protocol for Strong Passwords A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Leveraging SDN for Collaborative DDoS Mitigation

Leveraging SDN for Collaborative DDoS Mitigation Leveraging SDN for Collaborative DDoS Mitigation Sufian Hameed, Hassan Ahmed Khan IT Security Labs National University of Computer and Emerging Sciences, Pakistan Introduction The legacy of DDoS continues

More information

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network. A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R

More information

Overlay Networks for Multimedia Contents Distribution

Overlay Networks for Multimedia Contents Distribution Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)

More information

Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding

Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding Yashu, Smita 2 M.Tech student, CSE Dept., PDM College of Engineering for Women 2 Assistant Professor, PDM College of Engineering

More information

A Study on Issues Associated with Mobile Network

A Study on Issues Associated with Mobile Network Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski

Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski Introduction Background In Mobile Cloud Gaming the game is rendered

More information

Linkability of Some Blind Signature Schemes

Linkability of Some Blind Signature Schemes Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 2, and Khoongming Khoo 3 1 Centre for Cryptography and Information Security (CCIS) Faculty of Information Science and Technology

More information

CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011

CONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011 CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying

More information

Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks

Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks applied sciences Article Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks Hyun Kwon 1, ID, Yongchul Kim 2, Hyunsoo Yoon 1 and Daeseon Choi 3, * 1 School of

More information

SmartGossip: : an improved randomized broadcast protocol for sensor networks

SmartGossip: : an improved randomized broadcast protocol for sensor networks SmartGossip: : an improved randomized broadcast protocol for sensor networks Presented by Vilas Veeraraghavan Advisor Dr. Steven Weber Presented to the Center for Telecommunications and Information Networking

More information

Network Architectures for Emerging Services Riad Hartani & Joe Neil Caspian Networks

Network Architectures for Emerging Services Riad Hartani & Joe Neil Caspian Networks Architectures for Emerging Services Riad Hartani & Joe Neil Caspian s 2004 Caspian s, Inc. Convergence: Dimensions Revisited» Link Layer (ATM/FR/Ethernet over IP/MPLS Pseudo Wire)» Telecom / DataCom (

More information

IP Spoof Prevented Technique to Prevent IP Spoofed Attack

IP Spoof Prevented Technique to Prevent IP Spoofed Attack Available ONLINE www.visualsoftindia.com/vsrd/vsrdindex.html VSRD-TNTJ, Vol. I (3), 2010, 173-177 S H O R T C O M M U N I C A T I O N IP Spoof Prevented Technique to Prevent IP Spoofed Attack 1 Rajiv Ranjan*,

More information

Multi-Tier Mobile Ad Hoc Routing

Multi-Tier Mobile Ad Hoc Routing Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new

More information

Evolutionary Approaches for Resilient Surveillance Management. Ruidan Li and Errin W. Fulp. U N I V E R S I T Y Department of Computer Science

Evolutionary Approaches for Resilient Surveillance Management. Ruidan Li and Errin W. Fulp. U N I V E R S I T Y Department of Computer Science Evolutionary Approaches for Resilient Surveillance Management Ruidan Li and Errin W. Fulp WAKE FOREST U N I V E R S I T Y Department of Computer Science BioSTAR Workshop, 2017 Surveillance Systems Growing

More information

PhD Student E&CE Department University of Waterloo Spring 2005

PhD Student E&CE Department University of Waterloo Spring 2005 Dynamic Adaptation CBSS Course Presentation Instructor: Dr. Ladan Tahvildari Provided by: Mazeiar Salehie PhD Student E&CE Department University of Waterloo Spring 2005 References Main references M. Sadjadi,

More information

A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks

A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks Georg Wittenburg and Jochen Schiller Freie Universität Berlin Middleware Support for Pervasive Computing Workshop (PerWare

More information

The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP

The Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP The Impact of the DOCSIS 11/20 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 jimmartin@csclemsonedu Abstract-- The number of broadband cable access

More information

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks

Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com

More information

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack

Performance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 451-458 International Research Publications House http://www. irphouse.com /ijict.htm Performance

More information

An Efficient Load Balancing Strategy for Scalable WAP Gateways

An Efficient Load Balancing Strategy for Scalable WAP Gateways An Efficient Load Balancing Strategy for Scalable WAP Gateways Te-Hsin Lin and Kuochen Wang Department of Computer and Information Science ational Chiao Tung University Hsinchu,Taiwan 30050,R.O.C. kwang@cis.nctu.edu.tw

More information

PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks

PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks Chengchao Liang Supervisor: Prof. F. Richard Yu Department of Systems and Computer Engineering Carleton

More information

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN

Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing

More information

A Survey on Load Balancing Algorithms in Cloud Computing

A Survey on Load Balancing Algorithms in Cloud Computing A Survey on Load Balancing Algorithms in Cloud Computing N.Yugesh Kumar, K.Tulasi, R.Kavitha Siddhartha Institute of Engineering and Technology ABSTRACT As there is a rapid growth in internet usage by

More information

Comparative Study of blocking mechanisms for Packet Switched Omega Networks

Comparative Study of blocking mechanisms for Packet Switched Omega Networks Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet

More information

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions

Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig 1, Christian Steger 1, Reinhold Weiss 1, and Ernst Haselsteiner

More information

Data Security & Operating Environment

Data Security & Operating Environment Data Security & Operating Environment Version 1.0, Summer 2018 Last updated: June 21, 2018 https://www.kintone.com/contact/ Contents 1. Service Level Objective (SLO)... 1 2. Availability and Reliability...

More information