Combining Moving Target Defense with Autonomic Systems. Warren Connell 7 Dec 15
|
|
- Polly Carter
- 5 years ago
- Views:
Transcription
1 Combining Moving Target Defense with Autonomic Systems Warren Connell 7 Dec 15
2 Problem / Motivation Related to area of Moving Target Defense (MTD) Few research papers devoted to effectiveness Few devoted to cost/overhead of MTD Still fewer related to both Security must be balanced with Quality of Service Possible with autonomous systems Metrics may be too coarse-grained / subjective Marry MTD technique with known performance with autonomic techniques for better overall utility Practice selection and design of utility functions
3 Background / Related Work One MTD technique: Randomly reassign roles, VM, hosts, and IP addresses Zhuang, Rui, et al. "Simulation-based approaches to studying effectiveness of movingtarget network defense." National Symposium on Moving Target Research. 212.
4 Background / Related Work Another MTD technique: protect against DDoS attacks by utilizing a rotating layer of secret proxies QuanJia; Kun Sun; Stavrou, A., "MOTAG: Moving Target Defense against Internet Denial of Service Attacks," incomputer Communications and Networks (ICCCN), nd International Conference on, pp.1-9, July Aug
5 Background / Related Work Combining QoSand Security in a streaming media application for various user preferences: MouradAlia, Marc Lacoste, RuanHe, and Frank Eliassen. 21. Putting together QoSand security in autonomic pervasive systems. InProceedings of the 6th ACM workshop on QoSand security for wireless and mobile networks(q2swinet '1). ACM, New York, NY, USA,
6 Approach Multiple utility functions: Security utility from detection rates of database IDPS (use exponential average if multiple IDPSs): Response time utility from sigmoid based on SLO and parameters from linear queuing model: Global utility: Alomari, F.; Menasce, D., "An Autonomic Framework for Integrating Security and Quality of Service Support in Databases," insoftware Security and Reliability (SERE), 212 IEEE Sixth International Conference on, pp.51-6, 2-22 June 212.
7 Approach Another MTD technique: dynamically re-map association between addresses and systems Uses probabilistic models Static case: Probability of successful probe given k draws, v vulnerable machines out of n machines: Dynamic case: perfect shuffling (1 / probe attempt) Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214
8 Approach Chances of finding 1 vulnerable computer as network size increases using perfect shuffling 1/e =.63 Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214
9 Approach Experimentally determine failure rate as a function of shuffle rate Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214
10 Preliminary Results 1 Leave U(security) = 1 (attacker success rate) Choose sigmoid parameters for connection loss: U(loss) = δ =.95 (SLO) σ= -1 (steepness) ( ) Initially choose α = β =.5 for relative weights U(g) = α*u(security) + β*u(loss)
11 Preliminary Results 1 Utility α = β =.5 α =.75; β =.25 Utility vs. Shuffle Rate Shuffle Rate α =.9; β = Utility Utility Shuffle Rate Utility vs. Shuffle Rate Shuffle Rate U(Loss) U(Security)
12 Preliminary Results 2 Introduce additional 5% packet loss (α = β =.5) Utility function compensates by reducing shuffle rate Utility Utility vs. Shuffle Rate Shuffle Rate Utility Utility vs. Shuffle Rate Shuffle Rate U(Loss) U(Security)
13 Conclusion Can combine measures of security effectiveness with QoSin a utility function Need objective measure for security effectiveness QoS easily measured (connection loss, response time) Proper choices of utility function and parameters still require input from domain experts Sigmoidsmay not be required in all cases
14 Sources Carroll, T.E.; Crouse, M.; Fulp, E.W.; Berenhaut, K.S., "Analysis of network address shuffling as a moving target defense," incommunications (ICC), 214 IEEE International Conference on, pp.71-76, 1-14 June 214. QuanJia; Kun Sun; Stavrou, A., "MOTAG: Moving Target Defense against Internet Denial of Service Attacks," incomputer Communications and Networks (ICCCN), nd International Conference on, pp.1-9, July Aug Zhuang, Rui, et al. "Simulation-based approaches to studying effectiveness of movingtarget network defense." National Symposium on Moving Target Research RuiZhuang; Su Zhang; Bardas, A.; DeLoach, S.A.; XinmingOu; Singhal, A., "Investigating the application of moving target defenses to network security," inresilient Control Systems (ISRCS), 213 6th International Symposium on, pp , Aug Alomari, F.; Menasce, D., "An Autonomic Framework for Integrating Security and Quality of Service Support in Databases," insoftware Security and Reliability (SERE), 212 IEEE Sixth International Conference on, pp.51-6, 2-22 June 212. MouradAlia, Marc Lacoste, RuanHe, and Frank Eliassen. 21. Putting together QoSand security in autonomic pervasive systems. In Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks(q2swinet '1). ACM, New York, NY, USA,
A Quantitative Framework for Cyber Moving Target Defenses
A Quantitative Framework for Cyber Moving Target Defenses Warren Connell 29 Aug 17 Massimiliano Albanese, co-director Daniel Menascé, co-director Sushil Jajodia Rajesh Ganesan 7/6/2017 1 Outline Introduction
More informationA Survey of Self-Protecting Computing Systems
A Survey of Self-Protecting Computing Systems Essien Ayanam The Volgenau School of Engineering George Mason University Fairfax, Virginia, 22030, USA Email: eayanam@gmu.edu Outline Introduction Overview
More informationProbabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses
Probabilistic Performance Analysis of Moving Target and Deception Reconnaissance Defenses Michael Crouse, Bryan Prosser and Errin W. Fulp WAKE FOREST U N I V E R S I T Y Department of Computer Science
More informationAn Autonomic Framework for Integrating Security and Quality of Service Support in Databases
An Autonomic Framework for Integrating Security and Quality of Service Support in Databases Firas Alomari The Volgenau School of Engineering George Mason University Daniel A. Menasce Department of Computer
More informationAdvanced Security Solution in IPv6
Advanced Security Solution in IPv6 Vahid Heydari University of Alabama in Huntsville vahid.heydari@uah.edu Outline IPv6, IPsec, and VPN Remote attacks and zero-day vulnerability Moving target defense Related
More informationComparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks
Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit
More informationAn Introduction to Network Address Shuffling
An Introduction to Network Address Shuffling Guilin Cai, Baosheng Wang, Xiaofeng Wang, Yulei Yuan, Sudan Li College of Computer, National University of Defense Technology, Changsha, China cc_cai@163.com,
More informationSecure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks
Journal of Computer Science 7 (12): 1813-1818, 2011 ISSN 1549-3636 2011 Science Publications Secure Enhanced Authenticated Routing Protocol for Mobile Ad Hoc Networks 1 M.Rajesh Babu and 2 S.Selvan 1 Department
More informationWhack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environments
Whack-a-Mole: Software-defined Networking driven Multi-level DDoS defense for Cloud environments Minh Nguyen, Amitangshu Pal, Saptarshi Debroy Computer Science, City University of New York, New York, NY
More informationA Framework for Moving Target Defense Quantification
A Framework for Moving Target Defense Quantification Warren Connell, Massimiliano Albanese (B), and Sridhar Venkatesan George Mason University, Fairfax, VA 22030, USA {wconnel2,malbanes,svenkate}@gmu.edu
More informationOn the Use of Performance Models in Autonomic Computing
On the Use of Performance Models in Autonomic Computing Daniel A. Menascé Department of Computer Science George Mason University 1 2012. D.A. Menasce. All Rights Reserved. 2 Motivation for AC main obstacle
More informationAnalysis of Concurrent Moving Target Defenses
Analysis of Concurrent Moving Target Defenses Warren Connell George Mason University Fairfax, Virginia wconnel2@gmu.edu Luan Huy Pham George Mason University Fairfax, Virginia lpham6@gmu.edu Samuel Philip
More informationLeveraging SDN & NFV to Achieve Software-Defined Security
Leveraging SDN & NFV to Achieve Software-Defined Security Zonghua Zhang @imt-lille-douai.fr NEPS: NEtwork Performance and Security Group 2 Topics Anomaly detection, root cause analysis Security evaluation
More informationHandling DDoS attacks in Cloud
Handling DDoS attacks in Cloud Yesu Jeya Bensh P, Murugan K College of Engineering, Anna University, Chennai, India Abstract Cloud is the fastest growing computing platform. Researches have demonstrated
More informationAnalyzing a Human-based Trust Model for Mobile Ad Hoc Networks
Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Pedro B. Velloso 1, Rafael P. Laufer 2, Otto Carlos M. B. Duarte 3, and Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6 (LIP6) 2 Computer
More informationAvoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection
Avoiding The Man on the Wire: Improving Tor s Security with Trust-Aware Path Selection Aaron Johnson Rob Jansen Aaron D. Jaggard Joan Feigenbaum Paul Syverson (U.S. Naval Research Laboratory) (U.S. Naval
More informationInternational Journal of Advance Research in Computer Science and Management Studies
Volume 2, Issue 10, October 2014 ISSN: 2321 7782 (Online) International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online
More informationOn the Design of QoS aware Multicast Algorithms for Wireless Mesh Network. By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS)
On the Design of QoS aware Multicast Algorithms for Wireless Mesh Network By Liang Zhao Director of Study: Dr. Ahmed Al-Dubai (CDCS) Outline 1. Introduction to Wireless Mesh Networks 2. Multicast and its
More informationDistributed Energy-Aware Routing Protocol
Distributed Energy-Aware Routing Protocol Erol Gelenbe and Toktam Mahmoodi Intelligent Systems & Networks Group Department of Electrical & Electronic Engineering Imperial College, London SW7 2BT, UK {e.gelenbe,t.mahmoodi}@imperial.ac.uk
More informationBuilding a Self-Adaptive Content Distribution Network Gawesh Jawaheer Department of Computing, Imperial College London
Building a Self-Adaptive Content Distribution Network Gawesh Jawaheer Department of Computing, Imperial College London gawesh@doc.ic.ac.uk Abstract In this paper, we propose a framework for building a
More informationModel-Based Load Testing for Performance and Security. Cornel Barna, Mark Shtern, Michael Smit, Marin Litoiu
for Performance and Security Cornel Barna Mark Shtern Michael Smit Marin Litoiu Computer Science and Engineering York University April 17, 212 Performance Testing The Performance Stress Space The Framework
More informationAnalysis of Network Address Shuffling as a Moving Target Defense
Analysis of Network Address Shuffling as a Moving Target Defense Thomas E. Carroll Pacific Northwest National Laboratory Richland, Washington 99352 Email: Thomas.Carroll@pnl.gov Michael Crouse Computer
More informationAlexandru G. Bardas. Curriculum Vitae (last update: January 2018) Education. Appointments
Alexandru G. Bardas EECS Department ITTC 2040 Eaton Hall 238 Nichols Hall The University of Kansas, Lawrence, KS 66045 Curriculum Vitae (last update: January 2018) : 785 864 7390 (E) : 785 864 4421 (N)
More informationFRVM: Flexible Random Virtual IP Multiplexing in. software-defined networks
FRVM: Flexible Random Virtual IP Multiplexing in Software-Defined Networks Dilli P. Sharma, Dong Seong Kim University of Canterbury Christchurch, New Zealand dilli.sharma@pg.canterbury.ac.nz dongseong.kim@canterbury.ac.nz
More informationANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS
ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,
More informationInferring the Source of Encrypted HTTP Connections
Inferring the Source of Encrypted HTTP Connections Marc Liberatore Brian Neil Levine 1 Private Communications? Does link encryption provide privacy? VPNs, SSH tunnels, WEP/WPA, etc. 2 Anonymous Communication?
More informationEnergy Efficient in Cloud Computing
Energy Efficient in Cloud Computing Christoph Aschberger Franziska Halbrainer May 24, 2013 1 of 25 Introduction Energy consumption by Google 2011: 2,675,898 MWh. We found that we use roughly as much electricity
More informationSpecification-based Intrusion Detection. Michael May CIS-700 Fall 2004
Specification-based Intrusion Detection Michael May CIS-700 Fall 2004 Overview Mobile ad hoc networking (MANET) new area of protocols Some old networking solutions work (TCP/IP) but things change with
More informationAnalysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs
Analysis of Attacks and Defense Mechanisms for QoS Signaling Protocols in MANETs by Charikleia Zouridaki Charikleia Zouridaki 1, Marek Hejmo 1, Brian L. Mark 1, Roshan K. Thomas 2, and Kris Gaj 1 1 ECE
More informationA new method for VoIP Quality of Service control using combined adaptive sender rate and priority marking
A new method for VoIP Quality of Service control using combined adaptive sender rate and priority Zizhi Qiao, Lingfen Sun, Nicolai Heilemann and Emmanuel Ifeachor Centre for Signal Processing & Multimedia
More informationProvision of Quality of Service with Router Support
Provision of Quality of Service with Router Support Hongli Luo Department of Computer and Electrical Engineering Technology and Information System and Technology Indiana University Purdue University Fort
More informationSprinkler: Distributed Content Storage for Just-in-Time Streaming. CellNet Taipei, Taiwan Presented By: Sourav Kumar Dandapat
Sprinkler: Distributed Content Storage for Just-in-Time Streaming CellNet -2013 Taipei, Taiwan Presented By: Sourav Kumar Dandapat Background Mobile data traffic and its demand is increasing in exponential
More informationCan randomized mapping secure instruction caches from side-channel attacks?
Can randomized mapping secure instruction caches from side-channel attacks? Fangfei Liu, Hao Wu and Ruby B. Lee Princeton University June 14, 2015 Outline Motivation and Background Data cache attacks and
More informationAn Overlay Architecture for End-to-End Internet Service Availability
An Overlay Architecture for End-to-End Internet Service Availability Angelos Stavrou Network Security Lab Computer Science Department, Columbia University Overview of the talk Problem Motivation Summary
More informationFlow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks
Flow Control Packet Marking Scheme: to identify the sources of Distributed Denial of Service Attacks A.Chitkala, K.S. Vijaya Lakshmi VRSE College,India. ABSTRACT-Flow Control Packet Marking Scheme is a
More informationAutoLock: Why Cache Attacks on ARM Are Harder Than You Think
AutoLock: Why Cache Attacks on ARM Are Harder Than You Think Marc Green W, Leandro Rodrigues-Lima F, Andreas Zankl F, Gorka Irazoqui W, Johann Heyszl F, and Thomas Eisenbarth W August 18 th 2017 USENIX
More informationA Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence
2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da
More informationFramework for Optimizing Cluster Selection using Geo-assisted Movement Prediction
Downloaded from vbn.aau.dk on: marts 3, 219 Aalborg Universitet Framework for Optimizing Cluster Selection using Geo-assisted Movement Kristensen, Thomas Sander; Madsen, Jacob Theilgaard; Pedersen, Michael
More informationA Framework for Utility-Based Service Oriented Design in SASSY
A Framework for Utility-Based Service Oriented Design in SASSY The material in these slides comes from the paper A Framework for Utility-Based Service Oriented Design in SASSY, D.A. Menasce, J. Ewing,
More informationSafely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance
More informationSARA: Segment Aware Rate Adaptation for DASH Video Services
SARA: Segment Aware Rate Adaptation for DASH Video Services, Venkatesh Tamarapalli*, Deep Medhi University of Missouri Kansas City * Indian Institute of Technology-Guwahati, India Overview Introduction
More informationThings We Have Learned From This Project
Introduction Ad-hoc Network & Blackhole Attack Implementation and Topology Network Simulator - 2.35 Result Analysis NS-2 Visual Trace Analyzer & Perl Scripts Conclusion Things We Have Learned From This
More informationDifferential Privacy. Seminar: Robust Data Mining Techniques. Thomas Edlich. July 16, 2017
Differential Privacy Seminar: Robust Techniques Thomas Edlich Technische Universität München Department of Informatics kdd.in.tum.de July 16, 2017 Outline 1. Introduction 2. Definition and Features of
More informationActivity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks
Communication Networks Activity-Based Congestion Management for Fair Bandwidth Sharing in Trusted Packet Networks Michael Menth and Nikolas Zeitler http://kn.inf.uni-tuebingen.de Outline The problem Definition
More informationKey Grids: A Protocol Family for Assigning Symmetric Keys
Key Grids: A Protocol Family for Assigning Symmetric Keys Amitanand S. Aiyer University of Texas at Austin anand@cs.utexas.edu Lorenzo Alvisi University of Texas at Austin lorenzo@cs.utexas.edu Mohamed
More informationHSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 )
HSM: A Hybrid Streaming Mechanism for Delay-tolerant Multimedia Applications Annanda Th. Rath 1 ), Saraswathi Krithivasan 2 ), Sridhar Iyer 3 ) Abstract Traditionally, Content Delivery Networks (CDNs)
More informationEstimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen
Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen Southeast University of China University of Florida Motivation for Persistent Stealthy Spreaders Imagine
More informationDiscriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric
Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,
More informationCoding and Scheduling for Efficient Loss-Resilient Data Broadcasting
Coding and Scheduling for Efficient Loss-Resilient Data Broadcasting Kevin Foltz Lihao Xu Jehoshua Bruck California Institute of Technology Department of Computer Science Department of Electrical Engineering
More informationCharacterizing the Running Patterns of Moving Target Defense Mechanisms
Characterizing the Running Perns of Moving Target Defense Mechanisms Guilin Cai, Baosheng Wang, Yuebin Luo, Sudan Li, Xiaofeng Wang College of Computer, National University of Defense Technology, Changsha,
More informationResource allocation for autonomic data centers using analytic performance models.
Bennani, Mohamed N., and Daniel A. Menasce. "Resource allocation for autonomic data centers using analytic performance models." Autonomic Computing, 2005. ICAC 2005. Proceedings. Second International Conference
More informationA Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks
5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile
More informationModule 1 - Distributed System Architectures & Models
Module 1 - Distributed System Architectures & Models System Architecture Defines the structure of the system components identified functions of each component defined interrelationships and interactions
More informationPERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS
PERFORMANCE COMPARISON OF TCP VARIANTS FOR WIRELESS SENSOR NETWORKS Nutan Bhati, Dr. Ashish Bansal Abstract: Mobile Ad hoc Networks (MANETs) are a collection of mobile nodes forming a dynamic autonomous
More informationNew-fangled Method against Data Flooding Attacks in MANET
New-fangled Method against Data Flooding Attacks in MANET Kavuri Roshan 1, K.Reddi Prasad 2, Niraj Upadhayaya 3 & A.Govardhan 4 1, 2&3 Department of Computer Science & Information Technology, J.B. Institute
More informationPower Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul
Power Aware Hierarchical Epidemics in P2P Systems Emrah Çem, Tuğba Koç, Öznur Özkasap Koç University, İstanbul COST Action IC0804 Workshop in Budapest - Working Group 3 May 19th 2011 supported by TUBITAK
More informationLow Rate DOS Attack Prevention
ISSN No: 2454-9614 Low Rate DOS Attack Prevention S. Kandasamy, N.P. Kaushik *, A. Karthikeyan, S. Aravindh Srira *Corresponding Author: S.Kandasamy E-mail: skandu23@gmail.com Department of Computer Science
More informationMalware models for network and service management
Malware models for network and service management Jérôme François, Radu State, Olivier Festor To cite this version: Jérôme François, Radu State, Olivier Festor. Malware models for network and service management.
More informationMobility Control for Complete Coverage in Wireless Sensor Networks
Mobility Control for Complete Coverage in Wireless Sensor Networks Zhen Jiang Computer Sci. Dept. West Chester University West Chester, PA 9383, USA zjiang@wcupa.edu Jie Wu Computer Sci. & Eng. Dept. Florida
More informationSummarizing and mining inverse distributions on data streams via dynamic inverse sampling
Summarizing and mining inverse distributions on data streams via dynamic inverse sampling Presented by Graham Cormode cormode@bell-labs.com S. Muthukrishnan muthu@cs.rutgers.edu Irina Rozenbaum rozenbau@paul.rutgers.edu
More informationSafely Measuring Tor. Rob Jansen U.S. Naval Research Laboratory Center for High Assurance Computer Systems
Safely Measuring Tor Safely Measuring Tor, Rob Jansen and Aaron Johnson, In the Proceedings of the 23rd ACM Conference on Computer and Communication Security (CCS 2016). Rob Jansen Center for High Assurance
More informationA REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS
A REVIEW ON DATA AGGREGATION TECHNIQUES IN WIRELESS SENSOR NETWORKS Arshpreet Kaur 1, Simarjeet Kaur 2 1 MTech Scholar, 2 Assistant Professor, Department of Computer Science and Engineering Sri Guru Granth
More informationProvider-based deterministic packet marking against distributed DoS attacks
Journal of Network and Computer Applications 3 (27) 858 876 www.elsevier.com/locate/jnca Provider-based deterministic packet marking against distributed DoS attacks Vasilios A. Siris,, Ilias Stavrakis
More informationProf. N. P. Karlekar Project Guide Dept. computer Sinhgad Institute of Technology
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advance Deterministic
More informationMean Waiting Delay for Web Object Transfer in Wireless SCTP Environment
This full text paper was peer reviewed at the direction of IEEE Communications Society subject matter experts for publication in the IEEE ICC 009 proceedings Mean aiting Delay for eb Object Transfer in
More informationOn Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks
On Distributed Algorithms for Maximizing the Network Lifetime in Wireless Sensor Networks Akshaye Dhawan Georgia State University Atlanta, Ga 30303 akshaye@cs.gsu.edu Abstract A key challenge in Wireless
More informationDefenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationRandom Neural Networks for the Adaptive Control of Packet Networks
Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.
More informationPEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS
Volume 2, Issue 7, PP:, SEPTEMBER 2014. PEERLESS JAMMING ATTACKS AND NETWORK FORTIFICATION POLICIES IN WIRELESS SENSOR NETWORKS TALLURI BEENA JOSEPHINE 1*, K.RAVICHAND 2* 1. II.M.Tech, Dept of CSE, AM
More informationMULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS.
MULTIMEDIA PROXY CACHING FOR VIDEO STREAMING APPLICATIONS. Radhika R Dept. of Electrical Engineering, IISc, Bangalore. radhika@ee.iisc.ernet.in Lawrence Jenkins Dept. of Electrical Engineering, IISc, Bangalore.
More informationhash chains to provide efficient secure solutions for DSDV [7].
A Ferry-based Intrusion Detection Scheme for Sparsely Connected Ad Hoc Networks M. Chuah, P.Yang, J. Han {chuah, pey24, jih26}@cse.lehigh.edu Department of Computer Science & Engineering Lehigh University
More informationPrimitives for Active Internet Topology Mapping: Toward High-Frequency Characterization
Primitives for Active Internet Topology Mapping: Toward High-Frequency Characterization Robert Beverly, Arthur Berger, Geoffrey Xie Naval Postgraduate School MIT/Akamai February 9, 2011 CAIDA Workshop
More informationA Smart Card Based Authentication Protocol for Strong Passwords
A Smart Card Based Authentication Protocol for Strong Passwords Chin-Chen Chang 1,2 and Hao-Chuan Tsai 2 1 Department of Computer Science and Information Engineering, Feng Chia University, Taichung, Taiwan,
More informationINTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK
INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa
More informationLeveraging SDN for Collaborative DDoS Mitigation
Leveraging SDN for Collaborative DDoS Mitigation Sufian Hameed, Hassan Ahmed Khan IT Security Labs National University of Computer and Emerging Sciences, Pakistan Introduction The legacy of DDoS continues
More informationA Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.
A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R
More informationOverlay Networks for Multimedia Contents Distribution
Overlay Networks for Multimedia Contents Distribution Vittorio Palmisano vpalmisano@gmail.com 26 gennaio 2007 Outline 1 Mesh-based Multicast Networks 2 Tree-based Multicast Networks Overcast (Cisco, 2000)
More informationImproved QoS Optimization Approach in Sensor Network using Convolutional Encoding
Improved QoS Optimization Approach in Sensor Network using Convolutional Encoding Yashu, Smita 2 M.Tech student, CSE Dept., PDM College of Engineering for Women 2 Assistant Professor, PDM College of Engineering
More informationA Study on Issues Associated with Mobile Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,
More informationTowards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure. Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski
Towards Pervasive and Mobile Gaming with Distributed Cloud Infrastructure Teemu Kämäräinen, Matti Siekkinen, Yu Xiao, Antti Ylä-Jääski Introduction Background In Mobile Cloud Gaming the game is rendered
More informationLinkability of Some Blind Signature Schemes
Linkability of Some Blind Signature Schemes Swee-Huay Heng 1, Wun-She Yap 2, and Khoongming Khoo 3 1 Centre for Cryptography and Information Security (CCIS) Faculty of Information Science and Technology
More informationCONTENT DISTRIBUTION. Oliver Michel University of Illinois at Urbana-Champaign. October 25th, 2011
CONTENT DISTRIBUTION Oliver Michel University of Illinois at Urbana-Champaign October 25th, 2011 OVERVIEW 1. Why use advanced techniques for content distribution on the internet? 2. CoralCDN 3. Identifying
More informationOptimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks
applied sciences Article Optimal Cluster Expansion-Based Intrusion Tolerant System to Prevent Denial of Service Attacks Hyun Kwon 1, ID, Yongchul Kim 2, Hyunsoo Yoon 1 and Daeseon Choi 3, * 1 School of
More informationSmartGossip: : an improved randomized broadcast protocol for sensor networks
SmartGossip: : an improved randomized broadcast protocol for sensor networks Presented by Vilas Veeraraghavan Advisor Dr. Steven Weber Presented to the Center for Telecommunications and Information Networking
More informationNetwork Architectures for Emerging Services Riad Hartani & Joe Neil Caspian Networks
Architectures for Emerging Services Riad Hartani & Joe Neil Caspian s 2004 Caspian s, Inc. Convergence: Dimensions Revisited» Link Layer (ATM/FR/Ethernet over IP/MPLS Pseudo Wire)» Telecom / DataCom (
More informationIP Spoof Prevented Technique to Prevent IP Spoofed Attack
Available ONLINE www.visualsoftindia.com/vsrd/vsrdindex.html VSRD-TNTJ, Vol. I (3), 2010, 173-177 S H O R T C O M M U N I C A T I O N IP Spoof Prevented Technique to Prevent IP Spoofed Attack 1 Rajiv Ranjan*,
More informationMulti-Tier Mobile Ad Hoc Routing
Multi-Tier Mobile Ad Hoc Routing Bo Ryu Tim Andersen Tamer Elbatt Network Analysis and Systems Dept. HRL Laboratories, LLC. Malibu, CA, USA. {ryu,cellotim,telbatt}@wins.hrl.com Abstract We present a new
More informationEvolutionary Approaches for Resilient Surveillance Management. Ruidan Li and Errin W. Fulp. U N I V E R S I T Y Department of Computer Science
Evolutionary Approaches for Resilient Surveillance Management Ruidan Li and Errin W. Fulp WAKE FOREST U N I V E R S I T Y Department of Computer Science BioSTAR Workshop, 2017 Surveillance Systems Growing
More informationPhD Student E&CE Department University of Waterloo Spring 2005
Dynamic Adaptation CBSS Course Presentation Instructor: Dr. Ladan Tahvildari Provided by: Mazeiar Salehie PhD Student E&CE Department University of Waterloo Spring 2005 References Main references M. Sadjadi,
More informationA Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks
A Survey of Current Directions in Service Placement in Mobile Ad-hoc Networks Georg Wittenburg and Jochen Schiller Freie Universität Berlin Middleware Support for Pervasive Computing Workshop (PerWare
More informationThe Impact of the DOCSIS 1.1/2.0 MAC Protocol on TCP
The Impact of the DOCSIS 11/20 MAC Protocol on TCP Jim Martin Department of Computer Science Clemson University Clemson, SC 29634-0974 jimmartin@csclemsonedu Abstract-- The number of broadband cable access
More informationEnergy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks
Energy-Efficient Cooperative Communication In Clustered Wireless Sensor Networks Reza Aminzadeh Electrical Engineering Department Khavaran Higher Education Institute Mashhad, Iran. reza.aminzadeh@ieee.com
More informationPerformance Analysis of Heterogeneous Wireless Sensor Network in Environmental Attack
International Journal of Information and Computation Technology. ISSN 0974-2239 Volume 3, Number 5 (2013), pp. 451-458 International Research Publications House http://www. irphouse.com /ijict.htm Performance
More informationAn Efficient Load Balancing Strategy for Scalable WAP Gateways
An Efficient Load Balancing Strategy for Scalable WAP Gateways Te-Hsin Lin and Kuochen Wang Department of Computer and Information Science ational Chiao Tung University Hsinchu,Taiwan 30050,R.O.C. kwang@cis.nctu.edu.tw
More informationPhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks
PhD Thesis Defense Performance Improvements in Software-defined and Virtualized Wireless Networks Chengchao Liang Supervisor: Prof. F. Richard Yu Department of Systems and Computer Engineering Carleton
More informationImpact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN
Impact of Black Hole and Sink Hole Attacks on Routing Protocols for WSN Padmalaya Nayak V. Bhavani B. Lavanya ABSTRACT With the drastic growth of Internet and VLSI design, applications of WSNs are increasing
More informationA Survey on Load Balancing Algorithms in Cloud Computing
A Survey on Load Balancing Algorithms in Cloud Computing N.Yugesh Kumar, K.Tulasi, R.Kavitha Siddhartha Institute of Engineering and Technology ABSTRACT As there is a rapid growth in internet usage by
More informationComparative Study of blocking mechanisms for Packet Switched Omega Networks
Proceedings of the 6th WSEAS Int. Conf. on Electronics, Hardware, Wireless and Optical Communications, Corfu Island, Greece, February 16-19, 2007 18 Comparative Study of blocking mechanisms for Packet
More informationIdentification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions
Identification and Verification of Security Relevant Functions in Embedded Systems Based on Source Code Annotations and Assertions Johannes Loinig 1, Christian Steger 1, Reinhold Weiss 1, and Ernst Haselsteiner
More informationData Security & Operating Environment
Data Security & Operating Environment Version 1.0, Summer 2018 Last updated: June 21, 2018 https://www.kintone.com/contact/ Contents 1. Service Level Objective (SLO)... 1 2. Availability and Reliability...
More information