Adjusted Probabilistic Packet Marking for IP Traceback

Size: px
Start display at page:

Download "Adjusted Probabilistic Packet Marking for IP Traceback"

Transcription

1 Ajuste Probabilistic Packet Marking for IP Traceback Tao Peng, Christopher Leckie, an Kotagiri Ramamohanarao 2 ARC Special Research Center for Ultra-Broaban Information Networks Department of Electrical an Electronic Engineering The University of Melbourne Victoria 300, Australia {t.peng,c.leckie}@ee.mu.oz.au 2 Department of Computer Science an Software Engineering The University of Melbourne Victoria 300, Australia rao@cs.mu.oz.au Abstract. Distribute enial-of-service attack is one of the greatest threats to the Internet toay. One of the biggest ifficulties in efening against this attack is that attackers always use incorrect, or spoofe IP source aresses to isguise their true origin. In this paper, we present a packet marking algorithm which allows the victim to traceback the approximate origin of spoofe IP packets. The ifference between this proposal an previous proposals lies in two points. First, we evelop three techniques to ajust the packet marking probability, which significantly reuces the number of packets neee by the victim to reconstruct the attack path. Secon, we give a etaile analysis of the vulnerabilities of probabilistic packet marking, an escribe a version of our ajuste probabilistic packet marking scheme whose performance is not affecte by spoofe marking fiels. Introuction Distribute enial-of-service (DDoS)attacks have become a major threat to the Internet [0]. At the same time, DDoS is extremely ifficult to efen [6]. The reason lies in the fact that the attackers use incorrect ( spoofe )IP aresses in the attacking packets an therefore isguise the real origin of the attacks. This has mae it very ifficult or impossible to traceback the source of attacking IP packets. A number of recent stuies have approache the problem of IP packet traceback by Probabilistic Packet Marking (PPM)[5] [7]. It is assume that the attacking packets are much more frequent than the normal packets. The main iea is to let every router mark packets probabilistically an let the victim reconstruct the attack path from the marke packet. All of the probabilistic marking algorithms try to overloa the marking information into the 6 bit ientification fiel in the IP packet heaer, which is selom use [5] [8]. A major issue with E. Gregori et al. (Es.): NETWORKING 2002, LNCS 2345, pp , c Springer-Verlag Berlin Heielberg 2002

2 698 T. Peng, C. Leckie, an K. Ramamohanarao existing probabilistic marking schemes is that they use a fixe marking probability, which means that there is a greatly reuce probability of getting packets from routers which are far away from the victim. Consequently the number of packets neee to reconstruct the attack path epens on the number of packets which are marke by the furthest router in the attack path. If we can increase the marking probability for the routers which are far away from the victim, then we nee less packets to reconstruct the attack path. A potential problem with packet marking is that the attacker can forge the marking fiel. The authenticity of the marking fiel is the biggest challenge for Probabilistic Packet Marking, which is iscusse in [3]. Although Song an Perrig [7] have propose a scheme for router authentication, it is still har to implement an there are still some chances for the attacker to spoof the marking fiel. However, if we can let the routers mark all the packets when they first enter the network, then there is no way for the attacker to use the spoofe marking fiel to ecoy the victim. In this paper, we make two contributions to the technique of Probabilistic Packet Marking. First, we have evelope three techniques for ajusting the probability use by routers to mark packets, in orer to reuce the number of packets neee by the victim to reconstruct the attack path. Secon, we give a etaile analysis of the vulnerabilities of PPM, an escribe a version of our ajuste probabilistic packet marking scheme whose performance is not affecte by spoofe marking fiels. We emonstrate the benefits of our approach with an analytical moel as well as proviing an experimental evaluation using simulate packet traces. The paper is organize as follows. We present a brief backgroun to this problem an highlight the main challenges of IP marking in Section 2. Section 3 introuces our Ajuste Probabilistic Marking Algorithm an shows a theoretical analysis. Simulation results of all these three techniques are provie in Section 4. From the analysis an simulation results, we can see that our Ajuste Probabilistic Marking Algorithm is more efficient an secure than the previous marking schemes. We iscuss some practical issues in Section 5 an the relate work is given in Section 6. Finally we conclue in Section 7. 2 Backgroun on Probabilistic Packet Marking (PPM) Once an attack has been etecte, an ieal response woul be to block the attack traffic at its source. Unfortunately, there is no easy way to track IP traffic to its source. This is ue to two features of the IP protocol. The first feature is the ease with which IP source aresses can be forge. The secon feature is the stateless nature of IP routing, where routers normally know only the next hop for forwaring a packet, rather than the complete en-to-en route taken by each packet. This esign ecision has given the Internet enormous efficiency an scalability, albeit at the cost of traceability. In orer to aress this limitation, Probabilistic Packet Marking (PPM)has been propose to support IP traceability.

3 Ajuste Probabilistic Packet Marking for IP Traceback Definitions The main iea of PPM is to let routers mark the packets with path information probabilistically an let the victim reconstruct the attack path using the marke packets. Denial-of-service attacks are only effective so long as they occupy the resources of the victim. As a result, most enial-of-service attacks are comprise of thousans or millions of packets. PPM is base on the assumption that when we mark each packet with only a small probability then the victim will receive sufficient packets to reconstruct the attack path. The network can be viewe as a irecte graph G =(V,E)where V is the set of noes an E is the set of eges. V can be further partitione into en systems (leaf noes)an routers (internal noes). The eges enote physical links between elements in V. Let S V enote the set of attackers an let t V/S enote the victim. We will first consier the case when S = (single-source attack)an treat the istribute DoS attack case separately. We assume that routes are fixe, an that the attack path A = (s, v,v 2,..., v,t)is comprise of routers (or hops)an has path length [3]. Let N enote the number of packets sent from s to t. A packet x is assume to have a marking fiel where the ientity of a link (v, v ) E traverse can be inscribe. A packet travels on the attack path sequentially. At a hop v i {v,..., v }, packet x is marke with the ege value (v i,v i ),i =,...,,with probability p. As we seen in Fig., packet is marke with ege value (v,v 2 ) an istance 2; packet 2 is marke with ege value (v 2,v 3 )an istance. When t receives two packets it can reconstruct the attack path (v,v 2,v 3 ). Each router marks a packet with probability p. When the router ecies to mark a packet, it writes its own IP aress into the ege fiel an zero into the istance fiel. Otherwise, if the istance fiel is alreay zero, which means this packet has been marke by the previous router, it processes the packet as follows: ()It combines its IP aress an the existing value in the ege fiel an writes the combine value into the ege fiel. (2)It increases the istance value by. Thus, the ege value contains both information from the previous router an the current router. Finally if the router oes not mark the packet, then it always increments the istance fiel. This istance fiel inicates the number of hops between the victim an the router that has marke the packet. The istance fiel shoul be upate using saturating aition, meaning the istance fiel is not allowe to wrap. When using this scheme, any packet written by the attacker will have a istance fiel greater than or equal to the real attack path. In contrast, a packet which is marke by the router shoul have a istance fiel which is less than the length of the path traverse from that router. Savage et al. propose a metho calle Fragment Marking Scheme (FMS)[5] to compress the IP aresses an recontruct the attack path. It is later improve by Song an Perrig[7]. Unless otherwise state, when we talk about PPM in the rest of this paper, we are referring to Song an Perrig s version of PPM.

4 700 T. Peng, C. Leckie, an K. Ramamohanarao v, v 2 2 packet S v v v 2 3 t v, v 2 3 packet 2 Fig.. Probabilistic Packet Marking 2.2 Limitation of Previous PPM Schemes Our aim is to minimize the time require to reconstruct the attack path. This epens on the time it takes to receive packets that have been marke by each router on the attack path. This in turn epens on the choice of the marking probability p. In this section, we moel the performance of PPM in terms of p, an highlight the limitation of using a fixe marking probability. Definition. Let α i enote the probability that packet arriving at the victim is lastly marke at noe v i but nowhere after v i. For a uniform marking probability, α i =Pr{x =(v i,v i )} = p( p) i (i =, 2,...,). Definition 2. Let α 0 enote the probability that a packet sent from the attacker reaches the victim without being marke at any of the routers. For a uniform marking probability, α 0 =( p). In orer to reconstruct the attack path as quickly as possible, the victim nees to receive a sample of packets marke by each router in the path. An unmarke packet provies no information to the victim. In fact, there is a risk that unmarke packets may contain misleaing information that has been spoofe by the attacker. Consequently, we want as many packets to be marke as possible. This implies that p shoul be large, so that α 0 is as small as possible. However, there is a penalty for making p too large. As p increases, there is a greater likelihoo that packets marke by routers close to the source will be overwritten by routers close to the victim. Note that α...α 2 α,soα is the smallest value. This is worst for packets marke by the first router after the source. So we nee to choose p such that α 0 is minimize an α is maximize. Accoring to the coupon collecting problem [8], for each attack path with routers (excluing the victim), an with marking probability p, the expecte number of packets neee to reconstruct the attack path is N() = ln()+o() p( p) [5]. We can show that N()is minimise when p =. Consequently, the number of packets neee to get one sample from each router is N f () ln()+o() ( ). This is the best result we can achieve for marking algorithms with a fixe probability. Our proposal is to reuce the total number of packets require N()by using a higher marking probability for routers close to the source. Ieally, we want to receive an equal number of packets marke by each router on the attack path, i.e. α i =/. In this case, the number of packets neee for reconstruction is N a () = ln(). The savings of this approach are N f () N a() =( ), which is greater than 2 for 2. Our aim has been to evelop a technique for ajusting the marking probability so that we can achieve the performance of N a ().

5 Ajuste Probabilistic Packet Marking for IP Traceback 70 3 Ajuste Probabilistic Packet Marking Schemes Accoring to the analysis in section 2, we propose that a router shoul ajust its packet marking probability base on its position in the attack path. However, the position of the router in the attack path is not known, since the position of the attacker is unknown. We nee to estimate this istance base on the available information. In this section, we propose 3 ifferent schemes for ajusting the marking probability base on the ifferent istance measures, 2 an 3. The efinition of these istances is shown in Fig. 2 s v v v t : istance from source to current router : istance from last router to mark packet to current router : istance from current router to estination Fig. 2. Definitions of ifferent istance measures 3. Number of Hops Traverse by Packet Let every router mark the packet with probability p ( )=/. The ieal case for packet marking is to receive packets marke by each router with equal probability α i =/, if the path length is. Let p ( )represent the marking probability of the router at istance from the source, where =, 2,...,. Then we obtain the following equations: α = p () =/ () α = p ( )[ p () ]=/ (2) α 2 = p ( 2)[ p ( )][ p () ]=/ (3) From equation we can get p () =/; from equation 2 we can get p ( )= /( ); from equation 3 we can get p ( 2)= /( 2). Accoringly, we can summarize the marking probability formula as p ( )=/. Then for the router at istance, α = ( ) ( + )... ( +2 ).... =. This means if each router marks the packet with the probability p ( )=/,we can receive the packets marke by each router with equal probability /, given the path length is. In orer to implement this marking scheme, we nee to know the istance measure. We propose to a an extra fiel in the IP option fiel. This fiel can be use to recor the number of hops ( )traverse by the packet. The efault value for this fiel is 0, an the router increases this value by every This equation can be simplifie as α =

6 702 T. Peng, C. Leckie, an K. Ramamohanarao time it forwars the packet. Every time the router gets the packet, it extracts the information from the option fiel an marks the packet with probability /. In orer to prevent the attacker from spoofing this fiel, we can use the encryption schemes which are iscusse in [7]. 3.2 Number of Hops Traverse Since the Packet Was Last Marke ( 2 ) In the original Probabilistic Packet Marking (PPM)scheme [5], there are three parts in the marking fiel. One part is calle the istance fiel ( 2 ), which is use to hol the istance information from last router to mark the packet to the current router. We enote 2 = 0 for routers next to each other. Let each router mark the packet accoring to the formula: 2( 2+). Since the larger the 2 value, the higher the likelihoo that it will be overwritten. Thus, we believe we shoul use a low marking probability for the packets with high 2 value. Let us now illustrate the erivation of this formula by consiering an example when the attack path length is 3. The router marks the packet which has a istance value 2 in the marking fiel with a probability p 2 ( 2 ). We assume the routers mark each packet when it first enters the network. So when the packet passes the first router, the 2 value will be set to 0. By analyzing all the possibilities of the 2 value when the packets traverse the attack path, we can erive expression for α i,i=, 2,...,. Using these equations, we can fin optimal marking probabilities for α,α 2,α 3. However, the equations become more complicate as the path length increases, we consequently propose that the general marking probability shoul be p 2 ( 2 )= 2( 2+), which has been shown through experiments to have the best performance. Since there are 5 bits in the marking fiel to hol the information in the existing probabilistic marking scheme [5] [7], we only nee to extract this information from the marking fiel an mark the packet accoring to the formula p 2 ( 2 )= 2(. 2+) 3.3 Number of Hops from Current Router to Destination ( 3 ) If we can get the istance of the current router to the estination ( 3 ), we can mark each packet with a probability p 3 ( 3 )=/(c+ 3 )where c is a constant, an then we can receive packets marke by each router with a probability of /c. Accoring to the marking scheme, we can have α 3 = c+ 3 ( c )...( 3+2 c )( c )=. In orer to make this scheme work, we have to make sure c + 3 > 0. Since most path lengths in the Internet are boune by 30 [4] [] [9], we can take c = 30 for safety. So if we mark with probability p 3 ( 3 )=/(3 3 ), we can make sure we can receive the packets marke by each router with probability /30. We rely on the routing protocol to provie us with the istance measure 3. Current Internet routing protocols are estination-base an every time the router forwars the packet, it will look at the routing table to fin the next c+ 3 c 3+ c 2 c c c c = c

7 Ajuste Probabilistic Packet Marking for IP Traceback 703 hop to the estination. Internet protocols provie us with a measure of the number of hops to each estination, which can be store in the routing table as a measure of istance 3. When the router starts to route the packet, it can extract the istance information 3 from the routing table an then mark the packet accoring to the formula p 3 ( 3 )=/(3 3 ). 3.4 Summary We can summarize each marking scheme in term of its performance an practicality. Marking scheme : p ( )=/ can achieve the ieal marking performance. With this marking scheme, we can receive the packets marke by each router with equal probability for path length. Furthermore, every packet is marke uner this scheme, an the attacker has no chance to spoof the marking fiel. However, this scheme requires a special hop count fiel an there is a risk that this fiel can be spoofe by the attacker. In orer to make this scheme work, we nee a strong authentication scheme which can stop the attacker from spoofing, e.g. [7]. Marking scheme 2: p 2 ( 2 )= 2( 2+) uses the istance fiel that is part of the packet marking scheme. This scheme can achieve a performance which is close to the optimal performance. In orer to make this scheme work, we nee to make sure the istance value in the marking fiel is trustable. One possibility is to let the routers mark all the packets when they first enter the network, then the attackers have no way to spoof the istance value. However, this is only practical if we control the ingress routers to our network, an thus is effectively the same as a technique calle ingress filtering [9]. Marking scheme 3: uses information from the routing protocol an can achieve better results than using the uniform marking probability. Since the information is from the routing protocol, it can not be manipulate by an attacker. So scheme 3 is the safest an most practical scheme. 4Evaluation Our aim is to compare the performance of each scheme to PPM. Our comparison is base on the number of packets neee to reconstruct an attack path for a range of simulate attacks. 4. Methoology We simulate attacks from ifferent istances using the methoology in [7]. The network topology is base on a real traceroute ataset obtaine from Lucent Bell Labs []. In our simulation, we vary the attack path from to 30 hops an conuct 000 ranom trials at each path length value. We measure the

8 704 T. Peng, C. Leckie, an K. Ramamohanarao number of packets require to reconstruct the attack path using our schemes, an compare this to the number of packets require by PPM [7], where our implementation of PPM use a threshol of M=5 as efine in [7]. We varie the uniform marking probability of PPM using the values p =0.0, 0.04, an 0.. Note that p =0.04 is recommene as the optimum choice for PPM [5]. 4.2 Results The performance of schemes to 3 are shown in Fig. 3. Schemes an 2 perform the best, outperforming PPM for all values of p teste. However, these results assume that the istance fiel has not been tampere with. Scheme 3 is the most practical, since its istance measure cannot be tampere with by the attacker. Scheme 3 outperforme PPM with p =0.0 an Although PPM with p =0. outperforms scheme 3 for small hop counts, scheme 3 performs far better when the attack path is large. Scheme 3 outperforms scheme 2 when path length is 20 or higher as shown in Fig. 3. This is because as the path length increases, scheme 3 approaches optimum performance while scheme 2 cannot achieve the optimum performance as we iscusse in Section 3.2. Furthermore, scheme an scheme 3 converge when the path length equals 30 because c equals the path length, which makes p 3 ( 3 )equivalent to p ( ) The number of packets neee for reconstruction Scheme Scheme 2 Scheme 3 p=0.0 p=0.04 p= Path Length Fig. 3. Scheme,2,3 compare with uniform marking probability

9 Ajuste Probabilistic Packet Marking for IP Traceback Discussion 5. Distribute Denial-of-Service Attacks During a istribute enial-of-service attack, there are many attacking sources. We have foun that the number of packets neee for reconstruction increases linearly with the number of attackers. So it will become very har to verify all the attacking sources uring a DDoS attack. Thus, our metho to reuce the number of packets neee for reconstruction becomes extremely important to improve the reconstruction efficiency. 5.2 Spoofing the Marking Fiel By spoofing the marking fiel, it is possible for attackers to make the attack appear as though it has come from a more istant source, e.g. a false source s f as shown in Fig. 4. However, the attacker cannot change the marking of routers between it an the victim, e.g., v to v 3. Consequently, we can always reconstruct the path to the attacker, although we may also reconstruct a false sub-path at the start of the true path, e.g., v f to v f3. s f s v f v f v f v v v t Fig. 4. Effect of Spoofing the Marking Fiel (Fake sub-path: v f to v f3,true path: v to v 3) If we are unable to authenticate the marking fiel, then this false sub-path can affect the performance of our first two schemes. This is because istance measures an 2 will be inflate by the false sub-path, thus ecreasing the packet marking probability of routers in the true attack path. However, our thir scheme is unaffecte by the actions of the attacker. This is because 3 is erive from information in the routing table of each router, an the estination fiel. The attacker cannot fake the estination fiel without efeating the purpose of the attack, an the attacker cannot manipulate the contents of the routing tables in the routers. Thus, the performance of our thir scheme is secure against manipulation by the attacker. 6 Relate Work Burch an Cheswick [3] propose a link-testing traceback technique. It infers the attack path by flooing the links with large bursts of traffic an observing how this perturbs the attack traffic. This scheme requires consierable knowlege of network topology an the ability to generate huge traffic in any network

10 706 T. Peng, C. Leckie, an K. Ramamohanarao links. Mahajan et al. [2] provie a scheme in which routers learn a congestion signature to tell goo traffic from ba traffic. The router then filters the ba traffic accoring to this signature. Furthermore, a pushback scheme is given to let the router ask its ajacent routers to filter the ba traffic at an earlier stage. This scheme is effective for some types of DDoS attacks but it nees a narrow an accurate congestion signature to make sure the ba traffic is filtere while the goo traffic is not affecte. Bellovin [2] propose an ICMP traceback scheme to let router generate ICMP packets to the estination containing the aress of the router with a low probability. For a significant traffic flow, the estination can graually reconstruct the route that was taken by the packets in the flow. ICMP packets are often treate with a low priority by routers to reuce the aitional traffic, which unermines the effectiveness of the scheme. This scheme is later extene by Wu et al. [20]. An alternative approach is to mark the packets themselves. Savage et al. [5] escribe a scheme for routers to probabilistically mark packets. They propose using the ientification fiel of the IP heaer, which is normally use to control fragmentation. They point out that IP fragmentation is selom use in practice. While their approach overcomes many of the limitations of the ICMP traceback proposal, there are some security problems when the attackers fake the marking fiel. Song et al. [7] propose an enhance scheme of probabilistic packet marking an also set up a scheme for router authentication. However, the authentication scheme is complex to implement. Dean et al. [7] propose an alternative marking scheme using noisy polynomial reconstruction. This scheme is backwars compatible, an incrementally eployable compare with the former proposals. Unfortunately their scheme is very vulnerable to fake markings put in the packets by the attackers. Furthermore, the number of packets neee to reconstruct the attack path is quaratic to the number of attackers. Snoeren et al. [6] propose a scheme to let routers store a recor of every packet passing through the router, so that the router can then trace back the origin of the packet by using the history in the router. Although they escribe a smart scheme to compress the storage, it is still a huge overhea for the router to implement this scheme, especially with the increasing network spee. Park an Lee [4] propose to put istribute filters in the routers an filter the packets accoring to the network topology. This scheme can stop the spoofe traffic at an early stage. However, in orer to place the filters effectively, it nees to know the topology of the Internet an routing policy between Autonomous Systems, which is har to achieve in the expaning Internet. In summary, every marking scheme uses a fixe marking probability which will result in a small number of packets marke by the more istant routers when all the packets arrive at the victim. In contrast, we have evelope several schemes that solve this problem by ajusting the marking probability in each router, which significantly reuces the number of packets require to reconstruct the attack path. Furthermore, no one has set up a scheme to completely solve the security problem that the attacker can fake the marking fiel. However, our thir marking scheme oes not use the contents of the marking fiel to ajust the marking probability, an thus cannot be manipulate by the attacker while at the same time requiring fewer packets to trace the packet.

11 7 Conclusion Ajuste Probabilistic Packet Marking for IP Traceback 707 In this paper, we make the following two contributions to Probabilistic Packet Marking (PPM). First, we evelope three techniques to ajust the marking probability use by each router so that the victim receives packets marke by each router with equal probability. Scheme is to let the IP packet carry a message to inform the router how far the packet has travele. Scheme 2 is to use the istance value of the marking fiel in the IP packet. Scheme 3 is to get the istance between the router an estination from the routing table. Both scheme an scheme 2 nee authentication to prevent the attacker from spoofing the require information. Scheme 3 is the most practical one an can improve the reconstruction efficiency compare with the optimal uniform marking probability (p = 0.04). By implementing this scheme, we can substantially reuce the number of packets neee to reconstruct the attack path in comparison to PPM. Our secon contribution is that we give a etaile analysis of the vulnerability of PPM, an escribe a version of our ajuste probabilistic packet marking scheme whose performance is not affecte by the vulnerability cause by spoofe marking fiels. Acknowlegment. We woul like to thank the AT&T Internet Mapping Project for making available their traceroute ata an the anonymous reviewers for their helpful comments. References. Skitter Analysis. Cooperative association for internet ata analysis, http: // 2. S. Bellovin. The icmp traceback message. Internet Draft,IETF, March raftbellovin-itrace-05.txt (work in progress). smb. 3. Hal Burch an Bill Cheswick. Tracing anonymous packets to their approximate source. In Proceeings of the 4th Systems Aministration Conference, New Orleans, Louisiana, U.S.A., December R.L. Carter an M.E. Crovella. Dynamic server selection using ynamic path characterization in wie-area networks. In Proceeings of the 997 IEEE INFOCOM Conference, Kobe,Japan, April K. Claffy an S. McCreary. Sample measurements from june 999 to ecember 999 at the ames inter-exchange point. Personal Communication, January Computer emergency response team. cert avisory ca : Denial-of-service evelopments, Drew Dean, Matt Franklin, an Aam Stubblefiel. An algebraic approach to ip traceback. In Network an Distribute System Security Symposium, NDSS 0, Feburary W. Feller. An Introuction to Probability Theory an Its Applications(2n eition), volume. Wiley an Sons, P. Ferguson an D. Senie. Network ingress filtering: Defeating enial of service attacks which employ IP source aress spoofing. RFC2267,IETF, January John D. Howar. An Analysis of Security Incients on the Internet. PhD thesis, Carnegie Mellon University, 998.

12 708 T. Peng, C. Leckie, an K. Ramamohanarao. Lucent Lab. Internet mapping, labs.com/who/ches/map/bs-/inex.html. 2. Ratul Mahajan, Steven M. Bellovin, Sally Floy, John Ioanniis, Vern Paxson, an Scott Shenker. Controlling high banwith aggregates in the network. Technical report, AT&T Center for Internet Research at ICSI (ACIRI) an AT&T Labs Research, February K. Park an H. Lee. On the effectiveness of probabilistic packet marking for ip traceback uner enial of service attack. In Proceeings of IEEE INFOCOM 200, Kihong Park an Heejo Lee. On the effectiveness of router-base packet filtering for istribute os attack prevention in power-law internets. In Proceeings of the 200 ACM SIGCOMM Conference, San Diego, California, U.S.A., August Stefan Savage, Davi Wetherall, Anna Karlin, an Tom Anerson. Practical network support for ip traceback. In Proceeings of the 2000 ACM SIGCOMM Conference, August Alex C. Snoeren, Craig Partrige, Luis A. Sanchez, Christine E. Jones, Fabrice Tchakountio, Stephen T. Kent, an W. Timothy Strayer. Hash-base ip traceback. In Proceeings of the 200 ACM SIGCOMM Conference, San Diego, California, U.S.A., August Dawn X. Song an Arian Perrig. Avance an authenticate marking schemes for ip traceback. In Proceeings of IEEE INFOCOM 200, perrig/projects/iptraceback/tr-iptrace.ps.gz. 8. I. Stoica an H. Zhang. Proviing guarantee services without per flow management. In Proceeings of the 999 ACM SIGCOMM Conference, Boston,MA, August W. Theilmann an K. Rothermel. Dynamic istance maps of the internet. In Proceeings of the 2000 IEEE INFOCOM Conference, Tel Aviv, Israel, March S. Felix Wu, Lixia Zhang, Dan Massey, an Allison Mankin. Intension-Driven ICMP Trace-Back. Interner Draft,IETF, February 200. raft-wu-itrace-intension- 00.txt(work in progress).

IP Traceback Based on Chinese Remainder Theorem

IP Traceback Based on Chinese Remainder Theorem IP Traceback Based on Chinese Remainder Theorem LIH-CHYAU WUU a, CHI-HSIANG HUNG b AND JYUN-YAN YANG a a Department of Computer Science and Information Engineering National Yunlin University of Science

More information

DoS Attacks. Network Traceback. The Ultimate Goal. The Ultimate Goal. Overview of Traceback Ideas. Easy to launch. Hard to trace.

DoS Attacks. Network Traceback. The Ultimate Goal. The Ultimate Goal. Overview of Traceback Ideas. Easy to launch. Hard to trace. DoS Attacks Network Traceback Eric Stone Easy to launch Hard to trace Zombie machines Fake header info The Ultimate Goal Stopping attacks at the source To stop an attack at its source, you need to know

More information

Markov Chain Modeling of the Probabilistic Packet Marking Algorithm

Markov Chain Modeling of the Probabilistic Packet Marking Algorithm Markov Chain Modeling of the Probabilistic Packet Marking Algorithm T.Y. Wong, John C.S. Lui, and M.H. Wong Department of Computer Science and Engineering The Chinese University of Hong Kong {tywong, cslui,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY Gayatri Chavan,, 2013; Volume 1(8): 832-841 T INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK RECTIFIED PROBABILISTIC PACKET MARKING

More information

UC Santa Cruz UC Santa Cruz Previously Published Works

UC Santa Cruz UC Santa Cruz Previously Published Works UC Santa Cruz UC Santa Cruz Previously Publishe Works Title Towars Loop-Free Forwaring of Anonymous Internet Datagrams that Enforce Provenance Permalink https://escholarship.org/uc/item/5376h1mm Author

More information

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots

Adaptive Load Balancing based on IP Fast Reroute to Avoid Congestion Hot-spots Aaptive Loa Balancing base on IP Fast Reroute to Avoi Congestion Hot-spots Masaki Hara an Takuya Yoshihiro Faculty of Systems Engineering, Wakayama University 930 Sakaeani, Wakayama, 640-8510, Japan Email:

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks TR-IIS-05-021 Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu, Pangfeng Liu, Da-Wei Wang, Jan-Jan Wu December 2005 Technical Report No. TR-IIS-05-021 http://www.iis.sinica.eu.tw/lib/techreport/tr2005/tr05.html

More information

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien

Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama and Hayato Ohwada Faculty of Sci. and Tech. Tokyo University of Scien Yet Another Parallel Hypothesis Search for Inverse Entailment Hiroyuki Nishiyama an Hayato Ohwaa Faculty of Sci. an Tech. Tokyo University of Science, 2641 Yamazaki, Noa-shi, CHIBA, 278-8510, Japan hiroyuki@rs.noa.tus.ac.jp,

More information

Analyze and Determine the IP Spoofing Attacks Using Stackpath Identification Marking and Filtering Mechanism

Analyze and Determine the IP Spoofing Attacks Using Stackpath Identification Marking and Filtering Mechanism Analyze and Determine the IP Spoofing Attacks Using Stackpath Identification Marking and Filtering Mechanism V. Shyamaladevi 1, Dr. R.S.D Wahidabanu 2 1 Research Scholar, K.S.Rangasamy College of Technology

More information

AnyTraffic Labeled Routing

AnyTraffic Labeled Routing AnyTraffic Labele Routing Dimitri Papaimitriou 1, Pero Peroso 2, Davie Careglio 2 1 Alcatel-Lucent Bell, Antwerp, Belgium Email: imitri.papaimitriou@alcatel-lucent.com 2 Universitat Politècnica e Catalunya,

More information

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique

An Adaptive Routing Algorithm for Communication Networks using Back Pressure Technique International OPEN ACCESS Journal Of Moern Engineering Research (IJMER) An Aaptive Routing Algorithm for Communication Networks using Back Pressure Technique Khasimpeera Mohamme 1, K. Kalpana 2 1 M. Tech

More information

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET)

INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) INTERNATIONAL JOURNAL OF COMPUTER ENGINEERING & TECHNOLOGY (IJCET) Proceedings of the 2 nd International Conference on Current Trends in Engineering and Management ICCTEM -2014 ISSN 0976 6367(Print) ISSN

More information

Message Transport With The User Datagram Protocol

Message Transport With The User Datagram Protocol Message Transport With The User Datagram Protocol User Datagram Protocol (UDP) Use During startup For VoIP an some vieo applications Accounts for less than 10% of Internet traffic Blocke by some ISPs Computer

More information

Online Appendix to: Generalizing Database Forensics

Online Appendix to: Generalizing Database Forensics Online Appenix to: Generalizing Database Forensics KYRIACOS E. PAVLOU an RICHARD T. SNODGRASS, University of Arizona This appenix presents a step-by-step iscussion of the forensic analysis protocol that

More information

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem

Particle Swarm Optimization Based on Smoothing Approach for Solving a Class of Bi-Level Multiobjective Programming Problem BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 17, No 3 Sofia 017 Print ISSN: 1311-970; Online ISSN: 1314-4081 DOI: 10.1515/cait-017-0030 Particle Swarm Optimization Base

More information

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks

Robust PIM-SM Multicasting using Anycast RP in Wireless Ad Hoc Networks Robust PIM-SM Multicasting using Anycast RP in Wireless A Hoc Networks Jaewon Kang, John Sucec, Vikram Kaul, Sunil Samtani an Mariusz A. Fecko Applie Research, Telcoria Technologies One Telcoria Drive,

More information

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters

Cluster Center Initialization Method for K-means Algorithm Over Data Sets with Two Clusters Available online at www.scienceirect.com Proceia Engineering 4 (011 ) 34 38 011 International Conference on Avances in Engineering Cluster Center Initialization Metho for K-means Algorithm Over Data Sets

More information

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks

Queueing Model and Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Queueing Moel an Optimization of Packet Dropping in Real-Time Wireless Sensor Networks Marc Aoun, Antonios Argyriou, Philips Research, Einhoven, 66AE, The Netherlans Department of Computer an Communication

More information

Comparison of Methods for Increasing the Performance of a DUA Computation

Comparison of Methods for Increasing the Performance of a DUA Computation Comparison of Methos for Increasing the Performance of a DUA Computation Michael Behrisch, Daniel Krajzewicz, Peter Wagner an Yun-Pang Wang Institute of Transportation Systems, German Aerospace Center,

More information

Generalized Edge Coloring for Channel Assignment in Wireless Networks

Generalized Edge Coloring for Channel Assignment in Wireless Networks Generalize Ege Coloring for Channel Assignment in Wireless Networks Chun-Chen Hsu Institute of Information Science Acaemia Sinica Taipei, Taiwan Da-wei Wang Jan-Jan Wu Institute of Information Science

More information

Authenticated Autonomous System Traceback

Authenticated Autonomous System Traceback Authenticated Autonomous System Traceback Vamsi Paruchuri, Arjan Durresi, Rajgopal Kannan and S. Sitharama Iyengar Department of Computer Science Louisiana State University {vamsip, durresi, rkannan, iyengar}

More information

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means

Classifying Facial Expression with Radial Basis Function Networks, using Gradient Descent and K-means Classifying Facial Expression with Raial Basis Function Networks, using Graient Descent an K-means Neil Allrin Department of Computer Science University of California, San Diego La Jolla, CA 9237 nallrin@cs.ucs.eu

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks

MORA: a Movement-Based Routing Algorithm for Vehicle Ad Hoc Networks : a Movement-Base Routing Algorithm for Vehicle A Hoc Networks Fabrizio Granelli, Senior Member, Giulia Boato, Member, an Dzmitry Kliazovich, Stuent Member Abstract Recent interest in car-to-car communications

More information

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH

SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH SURVIVABLE IP OVER WDM: GUARANTEEEING MINIMUM NETWORK BANDWIDTH Galen H Sasaki Dept Elec Engg, U Hawaii 2540 Dole Street Honolul HI 96822 USA Ching-Fong Su Fuitsu Laboratories of America 595 Lawrence Expressway

More information

Improving Spatial Reuse of IEEE Based Ad Hoc Networks

Improving Spatial Reuse of IEEE Based Ad Hoc Networks mproving Spatial Reuse of EEE 82.11 Base A Hoc Networks Fengji Ye, Su Yi an Biplab Sikar ECSE Department, Rensselaer Polytechnic nstitute Troy, NY 1218 Abstract n this paper, we evaluate an suggest methos

More information

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method

Transient analysis of wave propagation in 3D soil by using the scaled boundary finite element method Southern Cross University epublications@scu 23r Australasian Conference on the Mechanics of Structures an Materials 214 Transient analysis of wave propagation in 3D soil by using the scale bounary finite

More information

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources

An Algorithm for Building an Enterprise Network Topology Using Widespread Data Sources An Algorithm for Builing an Enterprise Network Topology Using Wiesprea Data Sources Anton Anreev, Iurii Bogoiavlenskii Petrozavosk State University Petrozavosk, Russia {anreev, ybgv}@cs.petrsu.ru Abstract

More information

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network

An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network An Authentication Based Source Address Spoofing Prevention Method Deployed in IPv6 Edge Network Lizhong Xie, Jun Bi, and Jianpin Wu Network Research Center, Tsinghua University, Beijing, 100084, China

More information

Lecture 1 September 4, 2013

Lecture 1 September 4, 2013 CS 84r: Incentives an Information in Networks Fall 013 Prof. Yaron Singer Lecture 1 September 4, 013 Scribe: Bo Waggoner 1 Overview In this course we will try to evelop a mathematical unerstaning for the

More information

Single Packet IP Traceback in AS-level Partial Deployment Scenario

Single Packet IP Traceback in AS-level Partial Deployment Scenario Single Packet IP Traceback in AS-level Partial Deployment Scenario Chao Gong, Trinh Le, Turgay Korkmaz, Kamil Sarac Department of Computer Science, University of Texas at San Antonio 69 North Loop 64 West,

More information

Study of Network Optimization Method Based on ACL

Study of Network Optimization Method Based on ACL Available online at www.scienceirect.com Proceia Engineering 5 (20) 3959 3963 Avance in Control Engineering an Information Science Stuy of Network Optimization Metho Base on ACL Liu Zhian * Department

More information

Non-homogeneous Generalization in Privacy Preserving Data Publishing

Non-homogeneous Generalization in Privacy Preserving Data Publishing Non-homogeneous Generalization in Privacy Preserving Data Publishing W. K. Wong, Nios Mamoulis an Davi W. Cheung Department of Computer Science, The University of Hong Kong Pofulam Roa, Hong Kong {wwong2,nios,cheung}@cs.hu.h

More information

Detection of Spoofing Attacks Using Intrusive Filters For DDoS

Detection of Spoofing Attacks Using Intrusive Filters For DDoS IJCSNS International Journal of Computer Science and Network Security, VOL.8 No.10, October 2008 339 Detection of Spoofing Attacks Using Intrusive Filters For DDoS V.Shyamaladevi Asst.Prof.Dept of IT KSRCT

More information

Robust Camera Calibration for an Autonomous Underwater Vehicle

Robust Camera Calibration for an Autonomous Underwater Vehicle obust Camera Calibration for an Autonomous Unerwater Vehicle Matthew Bryant, Davi Wettergreen *, Samer Aballah, Alexaner Zelinsky obotic Systems Laboratory Department of Engineering, FEIT Department of

More information

Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering. Heejo Lee

Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering. Heejo Lee CERIAS Security Seminar Jan. 17, 2001 Distributed Denial-of-Service Attack Prevention using Route-Based Distributed Packet Filtering Heejo Lee heejo@cerias.purdue.edu Network Systems Lab and CERIAS This

More information

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation

Random Clustering for Multiple Sampling Units to Speed Up Run-time Sample Generation DEIM Forum 2018 I4-4 Abstract Ranom Clustering for Multiple Sampling Units to Spee Up Run-time Sample Generation uzuru OKAJIMA an Koichi MARUAMA NEC Solution Innovators, Lt. 1-18-7 Shinkiba, Koto-ku, Tokyo,

More information

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control

Almost Disjunct Codes in Large Scale Multihop Wireless Network Media Access Control Almost Disjunct Coes in Large Scale Multihop Wireless Network Meia Access Control D. Charles Engelhart Anan Sivasubramaniam Penn. State University University Park PA 682 engelhar,anan @cse.psu.eu Abstract

More information

A Novel Packet Marking Scheme for IP Traceback

A Novel Packet Marking Scheme for IP Traceback A Novel Packet Marking Scheme for IP Traceback Basheer Al-Duwairi and G. Manimaran Dependable Computing & Networking Laboratory Dept. of Electrical and Computer Engineering Iowa State University, Ames,

More information

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2

Intensive Hypercube Communication: Prearranged Communication in Link-Bound Machines 1 2 This paper appears in J. of Parallel an Distribute Computing 10 (1990), pp. 167 181. Intensive Hypercube Communication: Prearrange Communication in Link-Boun Machines 1 2 Quentin F. Stout an Bruce Wagar

More information

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL

IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 31, NO. 4, APRIL IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, VOL. 1, NO. 4, APRIL 01 74 Towar Efficient Distribute Algorithms for In-Network Binary Operator Tree Placement in Wireless Sensor Networks Zongqing Lu,

More information

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides

Threshold Based Data Aggregation Algorithm To Detect Rainfall Induced Landslides Threshol Base Data Aggregation Algorithm To Detect Rainfall Inuce Lanslies Maneesha V. Ramesh P. V. Ushakumari Department of Computer Science Department of Mathematics Amrita School of Engineering Amrita

More information

A Measurement Framework for Pin-Pointing Routing Changes

A Measurement Framework for Pin-Pointing Routing Changes A Measurement Framework for Pin-Pointing Routing Changes Renata Teixeira Univ. Calif. San Diego La Jolla, CA teixeira@cs.ucs.eu Jennifer Rexfor AT&T Labs Research Florham Park, NJ jrex@research.att.com

More information

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM

THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM International Journal of Physics an Mathematical Sciences ISSN: 2277-2111 (Online) 2016 Vol. 6 (1) January-March, pp. 24-6/Mao an Shi. THE APPLICATION OF ARTICLE k-th SHORTEST TIME PATH ALGORITHM Hua Mao

More information

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks

Provisioning Virtualized Cloud Services in IP/MPLS-over-EON Networks Provisioning Virtualize Clou Services in IP/MPLS-over-EON Networks Pan Yi an Byrav Ramamurthy Department of Computer Science an Engineering, University of Nebraska-Lincoln Lincoln, Nebraska 68588 USA Email:

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 01 01 01 01 01 00 01 01 Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University

More information

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees

Disjoint Multipath Routing in Dual Homing Networks using Colored Trees Disjoint Multipath Routing in Dual Homing Networks using Colore Trees Preetha Thulasiraman, Srinivasan Ramasubramanian, an Marwan Krunz Department of Electrical an Computer Engineering University of Arizona,

More information

Learning convex bodies is hard

Learning convex bodies is hard Learning convex boies is har Navin Goyal Microsoft Research Inia navingo@microsoftcom Luis Raemacher Georgia Tech lraemac@ccgatecheu Abstract We show that learning a convex boy in R, given ranom samples

More information

Markov Chain Modelling of the Probabilistic Packet Marking Algorithm

Markov Chain Modelling of the Probabilistic Packet Marking Algorithm International Journal of Network Security, Vol5, No1, PP32 40, July 2007 32 Markov Chain Modelling of the Probabilistic Packet Marking Algorithm Tsz-Yeung Wong, John Chi-Shing Lui, and Man-Hon Wong (Corresponding

More information

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization

Offloading Cellular Traffic through Opportunistic Communications: Analysis and Optimization 1 Offloaing Cellular Traffic through Opportunistic Communications: Analysis an Optimization Vincenzo Sciancalepore, Domenico Giustiniano, Albert Banchs, Anreea Picu arxiv:1405.3548v1 [cs.ni] 14 May 24

More information

Image Segmentation using K-means clustering and Thresholding

Image Segmentation using K-means clustering and Thresholding Image Segmentation using Kmeans clustering an Thresholing Preeti Panwar 1, Girhar Gopal 2, Rakesh Kumar 3 1M.Tech Stuent, Department of Computer Science & Applications, Kurukshetra University, Kurukshetra,

More information

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks

EDOVE: Energy and Depth Variance-Based Opportunistic Void Avoidance Scheme for Underwater Acoustic Sensor Networks sensors Article EDOVE: Energy an Depth Variance-Base Opportunistic Voi Avoiance Scheme for Unerwater Acoustic Sensor Networks Safar Hussain Bouk 1, *, Sye Hassan Ahme 2, Kyung-Joon Park 1 an Yongsoon Eun

More information

PAPER. 1. Introduction

PAPER. 1. Introduction IEICE TRANS. COMMUN., VOL. E9x-B, No.8 AUGUST 2010 PAPER Integrating Overlay Protocols for Proviing Autonomic Services in Mobile A-hoc Networks Panagiotis Gouvas, IEICE Stuent member, Anastasios Zafeiropoulos,,

More information

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help

Preamble. Singly linked lists. Collaboration policy and academic integrity. Getting help CS2110 Spring 2016 Assignment A. Linke Lists Due on the CMS by: See the CMS 1 Preamble Linke Lists This assignment begins our iscussions of structures. In this assignment, you will implement a structure

More information

Coupling the User Interfaces of a Multiuser Program

Coupling the User Interfaces of a Multiuser Program Coupling the User Interfaces of a Multiuser Program PRASUN DEWAN University of North Carolina at Chapel Hill RAJIV CHOUDHARY Intel Corporation We have evelope a new moel for coupling the user-interfaces

More information

Skyline Community Search in Multi-valued Networks

Skyline Community Search in Multi-valued Networks Syline Community Search in Multi-value Networs Rong-Hua Li Beijing Institute of Technology Beijing, China lironghuascut@gmail.com Jeffrey Xu Yu Chinese University of Hong Kong Hong Kong, China yu@se.cuh.eu.h

More information

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE

THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE БСУ Международна конференция - 2 THE BAYESIAN RECEIVER OPERATING CHARACTERISTIC CURVE AN EFFECTIVE APPROACH TO EVALUATE THE IDS PERFORMANCE Evgeniya Nikolova, Veselina Jecheva Burgas Free University Abstract:

More information

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2.

NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES WITH THE USE OF THE IPAN99 ALGORITHM 1. INTRODUCTION 2. JOURNAL OF MEDICAL INFORMATICS & TECHNOLOGIES Vol. 13/009, ISSN 164-6037 Krzysztof WRÓBEL, Rafał DOROZ * fingerprint, reference point, IPAN99 NEW METHOD FOR FINDING A REFERENCE POINT IN FINGERPRINT IMAGES

More information

Using Vector and Raster-Based Techniques in Categorical Map Generalization

Using Vector and Raster-Based Techniques in Categorical Map Generalization Thir ICA Workshop on Progress in Automate Map Generalization, Ottawa, 12-14 August 1999 1 Using Vector an Raster-Base Techniques in Categorical Map Generalization Beat Peter an Robert Weibel Department

More information

Loop Scheduling and Partitions for Hiding Memory Latencies

Loop Scheduling and Partitions for Hiding Memory Latencies Loop Scheuling an Partitions for Hiing Memory Latencies Fei Chen Ewin Hsing-Mean Sha Dept. of Computer Science an Engineering University of Notre Dame Notre Dame, IN 46556 Email: fchen,esha @cse.n.eu Tel:

More information

DDoS Attacks and Pushback

DDoS Attacks and Pushback Steven M. Bellovin December 5, 2 1 Florham Park, NJ 7932 AT&T Labs Research +1 973-36-8656 http://www.research.att.com/ smb Steven M. Bellovin DDoS Attacks and Joint Work Joint work with Ratul Mahajan

More information

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing

Indexing the Edges A simple and yet efficient approach to high-dimensional indexing Inexing the Eges A simple an yet efficient approach to high-imensional inexing Beng Chin Ooi Kian-Lee Tan Cui Yu Stephane Bressan Department of Computer Science National University of Singapore 3 Science

More information

Design and Simulation Implementation of an Improved PPM Approach

Design and Simulation Implementation of an Improved PPM Approach I.J. Wireless and Microwave Technologies, 2012, 6, 1-9 Published Online December 2012 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2012.06.01 Available online at http://www.mecs-press.net/ijwmt

More information

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS

TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS TRACEBACK OF DOS OVER AUTONOMOUS SYSTEMS Mohammed Alenezi 1 and Martin J Reed 2 1 School of Computer Science and Electronic Engineering, University of Essex, UK mnmale@essex.ac.uk 2 School of Computer

More information

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway

State Indexed Policy Search by Dynamic Programming. Abstract. 1. Introduction. 2. System parameterization. Charles DuHadway State Inexe Policy Search by Dynamic Programming Charles DuHaway Yi Gu 5435537 503372 December 4, 2007 Abstract We consier the reinforcement learning problem of simultaneous trajectory-following an obstacle

More information

On the Placement of Internet Taps in Wireless Neighborhood Networks

On the Placement of Internet Taps in Wireless Neighborhood Networks 1 On the Placement of Internet Taps in Wireless Neighborhoo Networks Lili Qiu, Ranveer Chanra, Kamal Jain, Mohamma Mahian Abstract Recently there has emerge a novel application of wireless technology that

More information

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs

Distributed Line Graphs: A Universal Technique for Designing DHTs Based on Arbitrary Regular Graphs IEEE TRANSACTIONS ON KNOWLEDE AND DATA ENINEERIN, MANUSCRIPT ID Distribute Line raphs: A Universal Technique for Designing DHTs Base on Arbitrary Regular raphs Yiming Zhang an Ling Liu, Senior Member,

More information

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition

A Neural Network Model Based on Graph Matching and Annealing :Application to Hand-Written Digits Recognition ITERATIOAL JOURAL OF MATHEMATICS AD COMPUTERS I SIMULATIO A eural etwork Moel Base on Graph Matching an Annealing :Application to Han-Written Digits Recognition Kyunghee Lee Abstract We present a neural

More information

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage

A hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,

More information

Considering bounds for approximation of 2 M to 3 N

Considering bounds for approximation of 2 M to 3 N Consiering bouns for approximation of to (version. Abstract: Estimating bouns of best approximations of to is iscusse. In the first part I evelop a powerseries, which shoul give practicable limits for

More information

SIMULATION OF THE COMBINED METHOD

SIMULATION OF THE COMBINED METHOD SIMULATION OF THE COMBINED METHOD Ilya Levin 1 and Victor Yakovlev 2 1 The Department of Information Security of Systems, State University of Telecommunication, St.Petersburg, Russia lyowin@gmail.com 2

More information

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways

Bends, Jogs, And Wiggles for Railroad Tracks and Vehicle Guide Ways Ben, Jogs, An Wiggles for Railroa Tracks an Vehicle Guie Ways Louis T. Klauer Jr., PhD, PE. Work Soft 833 Galer Dr. Newtown Square, PA 19073 lklauer@wsof.com Preprint, June 4, 00 Copyright 00 by Louis

More information

On Design and Evaluation of Intention-Driven ICMP Traceback

On Design and Evaluation of Intention-Driven ICMP Traceback On Design and Evaluation of Intention-Driven ICMP Traceback Allison Mankin, Dan Massey USC/ISI Chien-Lung Wu NCSU S. Felix Wu UCDavis Lixia Zhang UCLA (* alphabetic order of author s last names *) ABSTRACTION

More information

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil

A Survey on Different IP Traceback Techniques for finding The Location of Spoofers Amruta Kokate, Prof.Pramod Patil www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 4 Issue 12 Dec 2015, Page No. 15132-15135 A Survey on Different IP Traceback Techniques for finding The Location

More information

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems

On the Role of Multiply Sectioned Bayesian Networks to Cooperative Multiagent Systems On the Role of Multiply Sectione Bayesian Networks to Cooperative Multiagent Systems Y. Xiang University of Guelph, Canaa, yxiang@cis.uoguelph.ca V. Lesser University of Massachusetts at Amherst, USA,

More information

A Network Coding Approach to IP Traceback

A Network Coding Approach to IP Traceback A Network Coding Approach to IP Traceback Pegah Sattari, Minas Gjoka, Athina Markopoulou University of California, Irvine {psattari, mgjoka, athina}@uci.edu Abstract Traceback schemes aim at identifying

More information

Questions? Post on piazza, or Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)!

Questions? Post on piazza, or  Radhika (radhika at eecs.berkeley) or Sameer (sa at berkeley)! EE122 Fall 2013 HW3 Instructions Recor your answers in a file calle hw3.pf. Make sure to write your name an SID at the top of your assignment. For each problem, clearly inicate your final answer, bol an

More information

Estimating Velocity Fields on a Freeway from Low Resolution Video

Estimating Velocity Fields on a Freeway from Low Resolution Video Estimating Velocity Fiels on a Freeway from Low Resolution Vieo Young Cho Department of Statistics University of California, Berkeley Berkeley, CA 94720-3860 Email: young@stat.berkeley.eu John Rice Department

More information

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications

Top-down Connectivity Policy Framework for Mobile Peer-to-Peer Applications Top-own Connectivity Policy Framework for Mobile Peer-to-Peer Applications Otso Kassinen Mika Ylianttila Junzhao Sun Jussi Ala-Kurikka MeiaTeam Department of Electrical an Information Engineering University

More information

MODULE VII. Emerging Technologies

MODULE VII. Emerging Technologies MODULE VII Emerging Technologies Computer Networks an Internets -- Moule 7 1 Spring, 2014 Copyright 2014. All rights reserve. Topics Software Define Networking The Internet Of Things Other trens in networking

More information

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation

On Effectively Determining the Downlink-to-uplink Sub-frame Width Ratio for Mobile WiMAX Networks Using Spline Extrapolation On Effectively Determining the Downlink-to-uplink Sub-frame With Ratio for Mobile WiMAX Networks Using Spline Extrapolation Panagiotis Sarigianniis, Member, IEEE, Member Malamati Louta, Member, IEEE, Member

More information

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach

Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Socially-optimal ISP-aware P2P Content Distribution via a Primal-Dual Approach Jian Zhao, Chuan Wu The University of Hong Kong {jzhao,cwu}@cs.hku.hk Abstract Peer-to-peer (P2P) technology is popularly

More information

A Lightweight IP Traceback Mechanism on IPv6

A Lightweight IP Traceback Mechanism on IPv6 A Lightweight IP Traceback Mechanism on IPv6 Syed Obaid Amin, Myung Soo Kang, and Choong Seon Hong School of Electronics and Information, Kyung Hee University, 1 Seocheon, Giheung, Yongin, Gyeonggi, 449-701

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Svärm, Linus; Stranmark, Petter Unpublishe: 2010-01-01 Link to publication Citation for publishe version (APA): Svärm, L., & Stranmark, P. (2010). Shift-map Image Registration.

More information

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times

Algorithm for Intermodal Optimal Multidestination Tour with Dynamic Travel Times Algorithm for Intermoal Optimal Multiestination Tour with Dynamic Travel Times Neema Nassir, Alireza Khani, Mark Hickman, an Hyunsoo Noh This paper presents an efficient algorithm that fins the intermoal

More information

A Hybrid Routing Algorithm for Delay Tolerant Networks

A Hybrid Routing Algorithm for Delay Tolerant Networks Sensors & Transucers 2013 by IFSA http://www.sensorsportal.com A Hybri Routing Algorithm for Delay Tolerant Networs Jianbo LI, Jixing XU, Lei YOU, Chenqu DAI, Jieheng WU Information Engineering College

More information

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks

Research Article REALFLOW: Reliable Real-Time Flooding-Based Routing Protocol for Industrial Wireless Sensor Networks Hinawi Publishing Corporation International Journal of Distribute Sensor Networks Volume 2014, Article ID 936379, 17 pages http://x.oi.org/10.1155/2014/936379 Research Article REALFLOW: Reliable Real-Time

More information

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis

MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis MIB-ITrace-CP: An Improvement of ICMP-Based Traceback Efficiency in Network Forensic Analysis Bo-Chao Cheng 1, Guo-Tan Liao 1, Ching-Kai Lin 1, Shih-Chun Hsu 1, Ping-Hai Hsu 2, and Jong Hyuk Park 3 1 Dept.

More information

Evolutionary Optimisation Methods for Template Based Image Registration

Evolutionary Optimisation Methods for Template Based Image Registration Evolutionary Optimisation Methos for Template Base Image Registration Lukasz A Machowski, Tshilizi Marwala School of Electrical an Information Engineering University of Witwatersran, Johannesburg, South

More information

Supporting Fully Adaptive Routing in InfiniBand Networks

Supporting Fully Adaptive Routing in InfiniBand Networks XIV JORNADAS DE PARALELISMO - LEGANES, SEPTIEMBRE 200 1 Supporting Fully Aaptive Routing in InfiniBan Networks J.C. Martínez, J. Flich, A. Robles, P. López an J. Duato Resumen InfiniBan is a new stanar

More information

A shortest path algorithm in multimodal networks: a case study with time varying costs

A shortest path algorithm in multimodal networks: a case study with time varying costs A shortest path algorithm in multimoal networks: a case stuy with time varying costs Daniela Ambrosino*, Anna Sciomachen* * Department of Economics an Quantitative Methos (DIEM), University of Genoa Via

More information

Shift-map Image Registration

Shift-map Image Registration Shift-map Image Registration Linus Svärm Petter Stranmark Centre for Mathematical Sciences, Lun University {linus,petter}@maths.lth.se Abstract Shift-map image processing is a new framework base on energy

More information

Experience with SPM in IPv6

Experience with SPM in IPv6 Experience with SPM in IPv6 Mingjiang Ye, Jianping Wu, and Miao Zhang Department of Computer Science, Tsinghua University, Beijing, 100084, P.R. China yemingjiang@csnet1.cs.tsinghua.edu.cn {zm,jianping}@cernet.edu.cn

More information

Modifying ROC Curves to Incorporate Predicted Probabilities

Modifying ROC Curves to Incorporate Predicted Probabilities Moifying ROC Curves to Incorporate Preicte Probabilities Cèsar Ferri DSIC, Universitat Politècnica e València Peter Flach Department of Computer Science, University of Bristol José Hernánez-Orallo DSIC,

More information

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks

Non-Uniform Sensor Deployment in Mobile Wireless Sensor Networks 0 0 0 0 0 0 0 0 on-uniform Sensor Deployment in Mobile Wireless Sensor etworks Mihaela Carei, Yinying Yang, an Jie Wu Department of Computer Science an Engineering Floria Atlantic University Boca Raton,

More information

THE increasingly digitized power system offers more data,

THE increasingly digitized power system offers more data, 1 Cyber Risk Analysis of Combine Data Attacks Against Power System State Estimation Kaikai Pan, Stuent Member, IEEE, Anré Teixeira, Member, IEEE, Milos Cvetkovic, Member, IEEE, an Peter Palensky, Senior

More information

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks

Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Trailing Mobile Sinks: A Proactive Data Reporting Protocol for Wireless Sensor Networks Xinxin Liu, Han Zhao, Xin Yang Computer & Information Science & Eng. University of Floria Email:{xinxin,han,xin}@cise.ufl.eu

More information

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment

Comparison of Wireless Network Simulators with Multihop Wireless Network Testbed in Corridor Environment Comparison of Wireless Network Simulators with Multihop Wireless Network Testbe in Corrior Environment Rabiullah Khattak, Anna Chaltseva, Laurynas Riliskis, Ulf Boin, an Evgeny Osipov Department of Computer

More information

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation

Solution Representation for Job Shop Scheduling Problems in Ant Colony Optimisation Solution Representation for Job Shop Scheuling Problems in Ant Colony Optimisation James Montgomery, Carole Faya 2, an Sana Petrovic 2 Faculty of Information & Communication Technologies, Swinburne University

More information

Lab work #8. Congestion control

Lab work #8. Congestion control TEORÍA DE REDES DE TELECOMUNICACIONES Grao en Ingeniería Telemática Grao en Ingeniería en Sistemas e Telecomunicación Curso 2015-2016 Lab work #8. Congestion control (1 session) Author: Pablo Pavón Mariño

More information