Zhiyong Huang* and Xiaoping Zeng

Size: px
Start display at page:

Download "Zhiyong Huang* and Xiaoping Zeng"

Transcription

1 44 Int. J. Internet Protocol Technology, Vol. 5, Nos. 1/2, 2010 Detectng and blockng P2P botnets through contact tracng chans Zhyong Huang* and Xaopng Zeng College of Communcaton Engneerng, Chongqng Unversty, Chongqng, , P.R. Chna E-mal: E-mal: *Correspondng author Yong Lu Department of Electrcal and Computer Engneerng, Polytechnc Insttute of NYU, 5 Metrotech Center, Brooklyn, NY 11201, USA E-mal: yonglu@poly.edu Abstract: Peer-to-peer (P2P) botnets have recently become serous securty threats on the nternet. It s dffcult to detect the propagaton of P2P botnets by solated montorng on ndvdual machnes due to ts decentralsed control structure. In ths paper, we propose a contact tracng chan-based framework to detect and block P2P botnets by tracng contact behavours among peers. In the proposed framework, the contacts of peers wth suspcous symptoms are traced and tracng chans are establshed to correlate contacts among peers wth ther abnormal symptoms. Peers are confrmed wth nfectons when the length of contact tracng chan that they belong to reaches a preset threshold. Under ths framework, we develop dfferent detecton, tracng and mmunsaton strateges. Through numercal smulatons, we demonstrate that the proposed contact tracng framework can quckly detect and block the propagaton of P2P botnets. Keywords: botnet; P2P; worm; contact tracng; transmsson chan; entropy; threshold; detecton; blockng; mmunsaton; smulaton; protocol. Reference to ths paper should be made as follows: Huang, Z., Zeng, X. and Lu, Y. (2010) Detectng and blockng P2P botnets through contact tracng chans, Int. J. Internet Protocol Technology, Vol. 5, Nos. 1/2, pp Bographcal notes: Zhyong Huang s currently a PhD canddate n the College of Communcaton Engneerng, Chongqng Unversty. He receved hs MS from Chongqng Unversty n In 2007, he was a Vstor Researcher at the Department of Electrcal and Computer Engneerng, Polytechnc Insttute of NYU. He currently works at the College of Communcaton Engneerng at Chongqng Unversty. Hs research nterests nclude network securty and network modellng, smulaton and analyss. Xaopng Zeng receved hs BS, MS and PhD from Chongqng Unversty n 1982, 1987 and 1996, respectvely. He s currently a Professor of College of Communcaton Engneerng at Chongqng Unversty. Hs research nterests nclude network securty, control and systems methods n communcaton networks. Untl now, he has publshed more than 70 techncal papers on relevant feld. Yong Lu has been an Assstant Professor at the Electrcal and Computer Engneerng Department of Polytechnc Insttute of NYU snce He receved hs PhD from Electrcal and Computer Engneerng Department at the Unversty of Massachusetts, Amherst n He receved hs Masters and Bachelors n the feld of Automatc Control from the Unversty of Scence and Technology of Chna n 1997 and 1994, respectvely. Hs general research nterests le n modellng, desgn and analyss of communcaton networks. Hs current research drectons nclude robust network routng, peer-to-peer IPTV systems, overlay networks and network measurement. He s a member of IEEE and ACM. Copyrght 2010 Inderscence Enterprses Ltd.

2 Detectng and blockng P2P botnets through contact tracng chans 45 1 Introducton In recent years, botnets have been frequently utlsed by attackers to launch malcous attacks on the nternet. A botnet s a network of compromsed peers (bots), whch are controlled by an attacker to launch DDOS attacks, dstrbute spam e-mals, etc. Usng botnets, attackers can launch attacks from thousands or even mllons of dstrbuted bots. Early botnets adopted the clent-server-based system archtecture. All bots n a botnet connect to some command and control (C&C) servers. Bots receve commands from C&C servers usng protocols lke Internet Relay Chat (IRC). One drawback of ths clent-server archtecture s that, due to the heavy traffc between servers and bots, the C&C servers can be easly detected by defenders. And the entre botnet wll be shut down once the C&C servers are blocked. More recent botnets employ the peer-to-peer (P2P) system archtecture. In a P2P archtecture, there s no fxed C&C servers. Every bot n the botnet acts as both clent and server. Bots communcate and exchange nformaton wth each other usng exstng or customsed P2P protocols. Attackers dsguse themselves as normal peers and dssemnate ther commands to all peers n the same P2P botnets. Due to the dstrbuted nature of P2P botnets, t s very challengng to detect and block them. In ths paper, we propose a novel contact tracng chan-based approach to the detecton and blockng of P2P botnets. The man challenges n botnet detecton are: 1 P2P botnet are now under wdespread development. Some P2P botnets use exstng P2P protocols, whle others develop customsed protocols (Grzzard et al., 2007). For example, Phatbot (Stewart, 2004) uses code from the WASTE project to mplement P2P, but Nugache (Lemos, 2006) and SpamThru (Stewart, 2004) use ther own P2P protocols for communcaton between peers. Most of the customsed protocols are encrypted. It s very dffcult to detect the sgnallng among bots n P2P botnets through protocol analyss. 2 To escape from traffc analyss-based detecton, some ntellgent P2P botnets delberately changed ther nfecton tactcs [e.g., reducng the sze of ther network (Hggns, 2007)]. It s hard to dstngush a P2P botnet from a normal P2P network by lookng nto the traffc volume and contacts between peers. 3 Snce there s no centralsed C&C servers, P2P botnets are very reslent. A bot can receve C&C sgnal from any of ts peerng neghbours. When the number of peerng contacts of each peer s reasonably large, the whole P2P botnet has very robust connectvty and can reman connected even after a large porton of bots are detected and removed from the botnet. To address the prevously descrbed challenges, we develop a contact tracng chan-based P2P botnet detecton and mmunsaton approach. Contact tracng has been successfully appled n dsease control (Huerta and Tsmrng, 2002; Hymana et al., 2003; Eames and Keelng, 2003). In our paper, we attempt to use contact tracng chans to detect bots. The contrbutons of our work are summarsed as follows: 1 We apply the concepts of contact tracng and transmsson chan to the detecton and mmunsaton of P2P botnets. We developed a tracng-chan-based framework that can effcently dentfy and block P2P botnets. 2 Smple threshold-based contact detecton scheme cannot detect ntellgent botnets. We develop a novel entropy-based detecton approach to dstngush botnets from normal P2P networks. 3 We propose several tracng-chan algorthms to strke the rght balance between the effcency and the accuracy of contact tracng. 4 We mplement a dscrete tme smulator and conduct extensve smulatons to study the effcency and robustness of the proposed contact tracng framework under dfferent network and system settngs. 2 Background and related works 2.1 P2P botnets P2P botnets are quckly becomng one of the most sgnfcant threats on the nternet today. P2P botnets are networks of compromsed peers controlled by attackers through P2P communcaton protocols. P2P botnets have robust network connectvty. They hde ther actvtes through sgnal encrypton and traffc dsperson. Consequently, t s very dffcult to trace and shut down P2P botnets. Grzzard et al. (2007) descrbed the development of P2P botnet and ntroduced several P2P control archtectures, such as Slapper, Snt, Phatbot and Nugache. Many P2P networks are becomng the favourte places for malware to spread (Dhungel et al., 2007; Lang et al., 2005). Worm s wdely adopted by P2P botnet n the wld due to ts automatc propagaton characterstcs. As an example, Storm Worm botnet s the frst major botnet to use P2P network for C&C (Porras et al., 2007). Smlar to other e-mal worms (e.g., Loveletter/ILOVEYOU and Bagle) (Holz et al., 2008), the e-mal body contans an embedded lnk or an attachment wth names such as FullVdeo.exe, Vdeo.exe and FullClp.exe. Attackers use socal engneerng technques to pretend to be a legtmate e-mal and trck the recpent nto openng the attachment or clckng on the embedded lnk. Once a vctm attempts to open the attached fle or clck the baleful lnk, t wll become an nfected peer. After the Trojan nstalls the ntal nfecton fles, the vctm wll attempt to connect peers n the Storm Worm botnet. Subsequently, t wll download the full payload and become a real bot under the control of the botmaster.

3 46 Z. Huang et al. Wthn the propagaton stage, the number of some net-packets (e.g., ICMP, UDP and SMTP) sharply ncreased (Kang et al., 2009), the hgh contact rate s the most mportant characterstc for worm detecton we consdered n ths paper; t wll be ntroduced n Secton 4. Some works have been done by researchers on P2P botnets defences. Zhou et al. (2005) gave a frst look at P2P worm defence. They proposed a framework where a small fracton of guardan nodes are employed to detect control flow hjacks of vulnerable programs usng schemes smlar to those n Crandall and Chong (2004), Newsome and Song (2005) and Suh et al. (2004), the approach whch deployed the same P2P network as P2P worm to propagate alerts s smlar to our strategy for buldng tracng chan. Gu et al. (2008) presented a general detecton framework (BotMner prototype system) that s ndependent of botnet C&C protocol and structure, and requres no a pror knowledge of botnets, the key of ths approach s focused on the net-behavour detecton; Holz et al. (2008) estmated the total number of the bots through nfltratng and analysng n-depth the Storm Worm botnet and mtgates ths botnet through dsruptng the communcaton channel, such as eclpsng content, pollutng; ths paper descrbed the typcal characterstc of Storm Worm. Our system adopted contact tracng scheme based on the net-behavour detecton of sngle node to dentfy the nfected nodes. 2.2 Contact tracng Contact tracng s a classc epdemc control method. It s frequently used to combat many nfectous dseases (such as TB and AIDS) and new nvadng pathogens (such as SARS). When an ndvdual s dentfed as havng a communcable dsease, any one has contacted wth the ndvdual has a hgh probablty to be nfected. Tracng based on contact hstory can quckly dentfy and block the propagaton of nfectons. Eames and Keelng (2003) used the parwse approach and full stochastc smulatons to nvestgate the effcency of contact tracng n dsease control. Hymana et al. (2003) used random screenng and contact tracng to reduce the spread of HIV. Huerta and Tsmrng (2002) developed the mean-feld model of contact tracng for the case of random graphs. The dea of contact tracng has recently been appled to network securty feld. Xong (2004) brought the concepts of contact tracng and transmsson chan nto e-mal network worm and vrus control. In our paper, ths approach s appled to detect and block P2P botnets. 3 Contact tracng framework In ths secton, we present the overall framework of contact tracng for P2P botnets detecton and control. Smlar to epdemc dsease control, we classfy peers nto dfferent states accordng to ther contact records and symptoms. In P2P botnets, a contact s defned as the establshment of a connecton between a par of peers. The nfectous symptom on a peer s defned as contacts at a rate hgher than a preset threshold. We classfy peers nto the followng fve possble states: 1 Normal: A peer that has no nfectous symptom s n the normal state. 2 Connected: A peer that has been contacted by a probable peer or a suspcous peer s n the connected state. 3 Suspcous: A peer that has nfectous symptom s n the suspcous state. 4 Probable: A suspcous peer s confrmed wth nfecton and declared as probable f t s on an establshed contact tracng chan (see detals below). 5 Immunsed: A probable peer that has been cleaned and patched wll change to the mmunsed state. Fgure 1 Dagram of peer state transtons Lnked Infectous symptom Chan s establshed Bot s mmunzed Fgure 1 shows the peer state transton: 1 Normal suspcous: A normal peer changes to a suspcous peer when t frst has the nfectous symptom. 2 Normal connected: A normal peer changes to a connected peer when t s frst contacted by a suspcous peer or a probable peer. 3 Connected suspcous: A connected peer changes to a suspcous peer when t has nfectous symptom.

4 Detectng and blockng P2P botnets through contact tracng chans 47 4 Suspcous probable: A suspcous peer changes to a probable peer when the tracng chan whch t belongs to s establshed. 5 Probable mmunsed: A probable peer changes to an mmunsed peer when t s cleaned and patched. The key of contact tracng-based detecton s to montor and control peer state transtons. It conssts of three components: detecton process, tracng process and mmunsaton process. The detecton process s to detect peer nfectous symptoms. The tracng process s to track the contact hstory of suspcous peers and establsh contact tracng chans to confrm peer nfectons. The mmunsaton process s to clean and patch the nfected peers. At frst, the detecton process montors the contact rate of peers. If a peer sends out more than a preset threshold M connectons wthn an nterval δ, t wll be dentfed as an abnormal peer and ts state wll be converted from normal to suspcous. Secondly, the tracng process tracks the contacts of all suspcous peers through recordng lnks between a suspcous peer and any peer that t contacts wth. If a normal peer s contacted by a suspcous peer, ts state wll be converted to connected. Consequently, f any of those contacted peers s detected wth nfectous symptom, that peer wll be also classfed as suspcous and the new contact lnks wll be recorded by the tracng process. If ndeed the nfecton propagates through peer contacts, the tracng process wll dentfy a chan of contact lnks. A complete tracng chan s establshed when the length of contact tracng chan reaches a preset threshold K and the tracng process can declare confrmed nfectons for all peers on the tracng chan. The peers on the chan wll convert ther state from suspcous to probable. Immunsaton wll then be appled to the newly dentfed probable peers. In the followng sectons, we present the detaled desgns of detecton, tracng and mmunsaton processes. 4 Symptom detecton process In the prevous secton, we talked about a smple threshold-based symptom detecton algorthm. However, the network condtons are so complex that we cannot always use a sngle fxed threshold to dstngush between legal traffc and llegal traffc. Many worms adopted new tactcs to escape from smple threshold-based detecton (e.g., low-rate contact strategy). It wll lead to a hgh false alarm rate n the detecton process (e.g., some peers runnng normal P2P software are mstakenly consdered as suspcous bots by the smple threshold-based detecton wth a low threshold, whereas some bots adopted low-rate contact strateges are mstakenly mssed by the smple threshold-based detecton wth a hgh threshold). Even though the transmsson chan approach can tolerate some false alarms on ndvdual contact tracng lnks 1, we stll want to mprove the detecton process to brng down the false alarm rate of the detecton process. In ths paper, we propose to dstngush P2P botnets from legtmate P2P systems by nvestgatng major contact-level characterstcs. If we have a long observaton perod of T, we dvde T nto n tme slots. V ( k ) denotes the number of connected peers n the tme slot k. We record p( k ), the rato of the number of newly connected peers wthn tme slot k to the total number of connected peers n the whole observaton perod T. For P2P botnets, pk ( ) takes large values only for the nfecton tme slots. For legtmate P2P system, pk ( ) s more unformly dstrbuted across all tme slots n the observaton perod. More specfcally, we can calculate the entropy (Shanon, 1948) of pk ( ): ( ) ( ) log ( ). n H p = n p k p k (1) k = 1 2 We can dstngush P2P bots from normal P2P systems by computng ther entropy values of pk ( ) n the observaton perod. Normal P2P systems have unformly low contact rate and thus they have a hgh entropy value. Bots usually have a smlar structure of worm propagaton. The entropy value of p( k ) s low. To further mprove the detecton accuracy, we augment the entropy-based detecton by nvestgatng addtonal peer nformaton, such as the contact ports, the arrval tme, the actve tme, the frequency and content length of contact (Husna et al., 2008). 5 Contact tracng chan establshment The core of the proposed contact tracng framework s to track the contactng behavours of suspcous peers and establsh contact tracng chans to confrm nfectons. The algorthms used to buld tracng chans determne the effcency and the accuracy of botnet detecton and blockng. On one hand, the algorthms should be effcent and can quckly dentfy and block ongong botnet propagaton. On the other hand, the algorthms should be accurate and rase as few false alarms as possble. In ths secton, we present three tracng chan algorthms to trade off the effcency and accuracy. 5.1 Basc chan algorthm We frst ntroduce a basc algorthm. In ths basc algorthm, each node s ntally assgned wth layer ID 0. For the frst tme a peer s contacted by a peer wth suspcous symptom, t changes ts layer ID from 0 to one plus the layer ID of the suspcous peer. A peer s layer ID wll not be changed for later contacts from other suspcous peers. A trace chan s establshed f some peer s layer ID reaches the chan length threshold K. Ths algorthm can be easly mplemented. However, t can only dentfy smple contact tracng chans consstng of contact lnks dscovered sequentally.

5 48 Z. Huang et al. For the network n Fgure 2, the contact threshold s M = 1 and the tracng chan threshold s K = 3. At tme 1, node B and C are contacted by node A, A s root node whose layer ID s 0. At tme 2, node B contacts node D, node B changes ts layer ID to 1. At tme 3, node B s contacted by node C, but B wll keep ts layer ID of 1. At tme 4, node E contacts node A. Node A wll not change ts ID and ths nfecton wll be gnored. No tracng chan s detected by ths algorthm wth threshold K = 3 even though we do have a chan of fve peers and four of them have suspcous symptoms. Ths wll largely slow down the botnet detecton speed. Fgure 2 Establshment of tracng chans n a smple network 5.2 Longest-chan algorthm To address ths problem, we present another algorthm that mproves the detecton speed by dentfyng the longest contact tracng chan for each peer. We buld the contact graph wth nodes beng peers and lnks beng contacts ntated by suspcous peers. A contact tracng chan then corresponds to a path n the contact graph. When a node s contacted by multple suspcous nodes, ths node s placed smultaneously on multple paths/chans n the contact graph. The longest-chan algorthm declares confrmed nfecton for a peer f the length of the longest contact path/chan that the peer s on reaches the chan length threshold K. To mplement ths algorthm usng peer layer ID, the layer ID of each peer s no longer fxed after the frst contact from a suspcous peer. When peer A s contacted by a suspcous peer B, peer layer IDs are updated as follows: f B s ID s larger than or equal to A s ID, set A s ID to one plus B s ID, also update the layer IDs of A s downstream peers n contact chans. More specfcally, each node has two state varables: ( P, L ), where P denotes the parent node of, n other words, P nfected, L s the layer of node. Intalsng L = 0 and P =. Assumng K s the preset chan length threshold, S s the set of nodes. When node m s contacted by a suspcous node n S, the longest-chan algorthm updates node states as n Table 1. Table 1 Algorthm Longest-chan tracng algorthm Node m s nfected by node n Procedure: Updatng the Tracng Chan f ( ) L L then n Pm m = n. L = L +1. m n Updatng the other nodes on ths chan. end f Procedure: Confrmng the Tracng Chan. for (all nodes r, r S) do f ( L ) r K then The suspcous nodes on ths chan are confrmed bots. end f end for Now we go back to the example n Fgure 2. The algorthm works the same as the basc algorthm up to tme 2. At tme 3, node B s nfected by node C, they all have layer ID 1, so node B s ID s changed to 2 accordng to our algorthm, node D s layer ID remans 0 because t has no suspcous symptom. At tme 4, root node A s nfected by node E, node E replaces node A to become the root node, correspondngly, node A s layer ID s set to 1, node C and B s layer IDs are set to 2 and 3, respectvely. The length of ths tracng chan reaches K = 3. Thus, a complete tracng chan s establshed and peer E, A, C and B are all confrmed wth nfectons. 5.3 Causal chan algorthm The longest-chan algorthm has a good tracng speed, but t has a weakness. It gnored the temporal order of contact lnks. As a result, the actual nfectons among peers do not necessarly follow the order that peers appear n a tracng chan. For the prevous example, E s the root node, but snce A, B and C all have symptom before E does. There s no causal relaton between E s symptom and symptoms on the other four nodes. Basc algorthm has consdered the causal relatons between nfectons. However, for each peer, t only consders ts frst nfecton lnk. Its detecton speed s too slow. To mprove the detecton effcency whle keep the causal relaton along tracng chans, we propose a causal chan algorthm that combnes the advantages of the basc algorthm and the longest-chan algorthm. Each node r S can potentally ntate the nfecton and be the root for a tracng chan. At the same tme, each

6 Detectng and blockng P2P botnets through contact tracng chans 49 node S, r can potentally be nfected by the nfecton orgnated at r and be placed on the tracng chan rooted at r. Therefore, each node should keep S layer IDs, one for each chan rooted at any r S. The state of each node can be descrbed by a tuple vector L r, P r, r S, L r denotes the layer of {( ( ) ( )) } where ( ) node relatve to root node r, and ( ) P r denotes the parent node of node relatve to root node r. The peer states are ntalsed as follows: 1 f r L ( r) = ; P ( r) = 0 f = r ( ) = 1 L r denotes node has not been nfected by any nodes on the tracng chan rooted at r. When = r, ( ) = 0 L r denotes every node s at layer 0 relatve to tself; and P ( r) = denotes node s the root node. Table 2 Algorthm Causal chan algorthm Node s nfected by node j Procedure: Updatng the Tracng Chan. ( ) =. P j j for (all nodes r, r S) do ( f Pj ( r) j and ( ) = 1) j ( ) = ( )( ) + 1. L r L r ( ) = j. P r Pj r L r then end f end for Procedure: Confrmng the Tracng Chan. f ( Lj ( r ) reaches the preset K ) then whle (j s not root node) do node j and Pj ( r ) are confrmed bots. node j state s ntalsed. j = P j ( r ). end f When node s nfected by node j, the algorthm can be descrbed as: 1 node obtans all the layer nformaton of node j and makes node j as ts parent node relatve to root node j 2 for any root node r that j connects to, f node has not been added to the tracng chan rooted at r( r j ), update the layer nformaton of node j and make node j as parent node relatve to root node r (2) 3 when L ( r ) reaches the preset threshold K, the nodes on the tracng chan rooted at node r are confrmed wth nfectons. Note the state of each confrmed node must be ntalsed mmedately because they have probablty to be contacted through another tracng chan rooted at the same node r. The detaled algorthm s descrbed n Table 2. Fgure 3 llustrates an example of the causal chan algorthm. In the example, there are seven nodes. The contact lnks between nodes are labelled wth the tme that contact happened, wth t 1 < t 2 < t 3 < t 4 < t 5 < t 6 < t 7. Each node s labelled wth non-trval state varables. Fgure 3 Causal chan nformaton passng among peers There are three potental tracng chans. Chan 1 conssts of nodes 1, 2, 3, 4 and 7. Chan 2 conssts of nodes 1, 2, 3, 6 and 4. Chan 3 conssts of nodes 5, 3, 6 and 4. If the chan length threshold s K = 3, chan 1 and chan 2 have reached the threshold. Thus, nodes 1, 2, 3, 4 and 6 are confrmed bots, note that because t 6 < t 7, there s no causal relaton between node 4 s symptom and node 6 s symptom, node 4 s confrmed through chan 1. Node 7 cannot be confrmed bot because t does not have nfectous symptom. It should be noted that node 6 was nfected by node 3 at t 5. Snce node 3 has been nfected twce by two dfferent nodes at t 2 and t 4, and t2 < t4 < t 5, thus, node 3 passes two sets of layer nformaton of chans 2 and 3 to node 6, and node 6 s confrmed wth nfecton through chan Dynamc chan length threshold In the tracng chan framework, the chan length threshold K s a very mportant parameter. To reduce false alarms, we should use a large K ; and to ncrease the dscovery speed, we can use a small K. In ths secton, we propose to dynamcally adjust K at dfferent stages of botnet propagaton to strke the rght balance between the detecton speed and false alarm rate. The typcal botnet propagaton perod can be dvded nto three stages: early, mddle and late. Let I be the number of already nfected nodes, Δ I be the new nfecton rate, whch s defned as the number of newly nfected peers wthn unt tme. Each perod can be charactersed as follows:

7 50 Z. Huang et al. 1 Early stage: The number of nfected peers I s small and the new nfecton rate Δ I s low. 2 Mddle stage: The number of nfected peers I s medum and the new nfecton rate Δ I s hgh. 3 Late stage: The number of nfected peers I s large and the new nfecton rate Δ I s low. Our strategy s to use dfferent K at dfferent stages. We use large K when the nfecton degree s low for accuracy. And we use small K when the nfecton degree s hgh for speed. 6 Immunsaton strateges Immunsaton s to use antvrus software to clean and patch the confrmed bots. Our focus s not on developng bot cleanng and patchng tools. Our goal s to nvestgate dfferent mmunsaton strateges and ther effectveness. We consder two mmunsaton strateges aganst P2P botnets. When bots are dscovered, the mmunsaton should be conducted as soon as possble. Due to resource constrants, not all bots can be mmunsed at the same tme. The order that bots are mmunsed affect the effectveness of the mmunsaton. The smplest strategy s random mmunsaton. All dscovered bots are treated equally and have the same probablty to be mmunsed. Each bot s selected at random to be mmunsed. Ths method does not dfferentated nodes and s easy to be mplemented. A more effectve strategy s preferental mmunsaton, whch ncludes two steps. At frst, the probable nodes confrmed by contact tracng chan are pcked out. Xong (2004) has ponted out the probable node has larger probablty to nfect other nodes. Secondly, we can choose the most-connected nodes from these dentfed probable nodes to mmunse. Ths s because nodes wth better network connectons are typcally connected to more nodes; they are more dangerous n nfectng other nodes. Ths method s dfferent from the random mmunsaton. It dfferentates bots based on ther nfecton potentals. We wll gve prorty to bots wth larger probablty and apply mmunsaton to them frst. Smlar preferental mmunsaton approach has been proposed by Wang et al. (2000) n the context of mmunsaton of computer vrus. They have shown that preferental mmunsaton can sgnfcantly slow down vrus propagaton. We wll study the performance of preferental mmunsaton of botnets usng smulatons n Secton 7. 7 Experments We developed a tme-stepped smulator to study the performance of contact chan tracng algorthm. It smulates botnet propagaton and the establshment of contact tracng chans by mplementng algorthms descrbed n the prevous sectons. To clearly montor the propagaton of botnet, we only consder one botnet n a smulated network wth S = 6,400 nodes. We defne P as the probablty that node s nfected by other nodes. We assume each node s behavour s ndependent of others. Smlar to Zou et al. (2007), when the peer populaton S s large, we can approxmate P by a 2 N μ, σ. In Gaussan random varable wth dstrbuton ( P P ) our experments, P N ( ) 0.07, For most smulaton experments, we perform 50 smulaton runs and report the average values. We gnore network delays and assume mmedate detecton of hgh rate contact symptom of an nfected node. Therefore, an nfected node wll be traced mmedately. Intally, the only nfected node s suspcous and all other nodes are n the normal state. At each consequent tme step, nfected nodes nfect other nodes wth probablty P. Once a node s contacted by a suspcous node, t wll be added to contact tracng chan accordng to the algorthms ntroduced n Secton 5. When a complete tracng chan s establshed, all nodes on the chan wll be confrmed wth nfecton. Then the mmunsaton strateges n Secton 6 wll be appled to clean and mmunse confrmed bots. 7.1 Tracng chan effcency We frst study the effcency of tracng chan algorthms usng smulatons. We compare the bot detecton speed of three chan algorthms ntroduced n Secton 5. We then study how the tracng chan effcency depends on three mportant factors n practce: chan length threshold K, node coverage rato of the tracng chan scheme and botnet node degree Comparson of chan algorthms Fgure 4 shows the performance comparson of three algorthms: basc algorthm, longest-chan algorthm and causal chan algorthm. The number of nfected nodes n the system and the numbers of bots detected by each algorthm are plotted as tme evolves. There s not much dfference among the three algorthms n the ntal stage of the botnet propagaton. Once the propagaton accelerates, t s found that the number of detected bots wth the longest-chan algorthm and causal chan algorthm are much more than the basc algorthm. Eventually, all bots can be detected by all three algorthms. Thus, the longest-chan algorthm and causal chan algorthm have much hgher bot detecton speed than the basc algorthm. Snce the causal chan algorthm consders the causal relatons between contacts and nfectons, ts accuracy s better than the longest-chan algorthm. From the smulaton results, we can conclude that causal chan algorthm has the best overall effcency and accuracy among the three algorthms; unless, all smulatons n the remanng of ths secton use the causal chan algorthm.

8 Detectng and blockng P2P botnets through contact tracng chans 51 Fgure Comparson of three tracng chan algorthms (see onlne verson for colours) degree s low, t has a lower tracng speed; when the nfecton degree s hgh, ts tracng speed accelerates dramatcally. Number of Bots Infected Bots Basc Algorthm Largest Chan Algorthm Causal Chan Algorthm Tme:t Chan length threshold The chan length threshold trade-offs the detecton speed and accuracy. We have ntroduced a dynamc chan length threshold algorthm n Secton 5.4. In our smulaton, as lsted n Table 3, the threshold K s dynamcally chosen from [3, 9] as a functon of the current nfecton degree Δ I. Table 3 Dynamc chan length table K = 3 K = 4 K = 5 K = 6 Δ I [50, ) [35, 50) [24, 35) [14, 24) K = 7 K = 8 K = 9 Δ I [9, 14) [4, 9) [0, 4) Fgure 5 Number of Bots Comparson of dscovery smulaton wth dfferent K (see onlne verson for colours) Infected Bots Dscovered Bots(K=4) Dscovered Bots(K=10) Dscovered Bots(Dynamc K) Tme:t Fgure 5 compares the performance of dynamc chan length threshold wth fxed length threshold at dfferent K = 4 and K = 10. Obvously, we see that the dynamc threshold has the best performance among three cases. When the nfecton Node coverage of tracng chan scheme As dscussed above, we assumed that every peer has nstalled the detecton software. In realty, only a subset of users wll nstall the detecton software. We call users who nstalled the software regstered peers and users who dd not nstall the software unregstered peers. Obvously, only the regstered peers can be detected and traced by our system. We must take nto account ths factor when usng tracng chan. It s clear that the number of regstered peers affects the effcency of bot detecton. The rato of regstered peers s a rato of the regstered peers to the total number of peers n the system: number of regstered peers q = total number of peers We defne the detecton rato as: number of detected bots R = (4) number of regstered bots We conduct smulatons usng the causal chan algorthm wth K = 4. Smulatons are conducted for q = 100%, q = 80%, q = 50% and q = 20%, respectvely. Fgure 6 shows that the number of regstered bots can affect the effcency of bots detecton. For the case of q = 100%, all the peers are regstered and all the bots can be detected by the tracng chan algorthm. For the case of q = 20%, there are about 60 regstered bots that cannot be detected because n ths case, there are about 80% peers are not regstered. Ths leads to the stuaton that a few nodes are solated and cannot be traced. But the number of solated nodes s nsgnfcant relatve to the detected bots. The detecton rato s stll hgh. In concluson, the tracng chan algorthm s pretty robust aganst low node coverage. Fgure 6 Number of Bots Effcency of dscovery smulaton wth dfferent rato of regster (see onlne verson for colours) Number of Regstered Bots(q=100%) Number of Recovered Bots(q=100%) Number of Regstered Bots(q=80%) Number of Recovered Bots(q=80%) Number of Regstered Bots(q=50%) Number of Recovered Bots(q=50%) Number of Regstered Bots(q=20%) Number of Recovered Bots(q=20%) (3) Tme:t

9 52 Z. Huang et al Node degree of bots The establshments of tracng chans are drven by contacts among peers. The node degree of bots n a botnet drectly affects the effcency of tracng chan algorthm. We generate random P2P botnets wth the average node degree of 100, 40, 30 and 10, respectvely. For each average node degree, we generate a group of 25 random network nstances and run the smulaton on each nstance. For each smulaton, we gradually vary the rato of regstered peer q from 1 to At each q value, we obtan the bots detecton rato R n each nstance. We then calculate the average detecton rato R for the group of botnets wth the same average node degree. Fgure 7 shows the average detecton rato at dfferent average degrees. Botnet group 1 has an average degree of E = 10, botnet group 2 has an average degree of E = 30, botnet group 3 has an average degree of E = 40 and botnet group 4 has an average degree of E = 100. For group 4, when q decreases gradually, the detecton rato stays at a hgh level ( R > 90% ) as long as q > 0.1. Botnet group 1 has a low average degree. The detecton rato s hgh ( R > 90% ) f q > 0.7. But the detecton rato decreases quckly when q gets smaller and reaches 0 when q > 0.2. The performance for groups 2 and 3 le n-between groups 1 and 4. We can see that the average node degree of botnet can affect the effcency of detecton. The hgher node degree, the hgher the detecton effcency. From the attacker pont of vew, hgher bot degree ncreases the reslence of botnets to the removals of ndvdual bots. However, our tracng chan algorthm can also explot hgh bot degree for effcent and robust detecton. Fgure 7 Detecton Rato:R Detecton effcency at dfferent node degrees (see onlne verson for colours) q Botnet 1(E=10) Botnet 2(E=30) Botnet 3(E=40) Botnet 4(E=100) Rato of Unregstered Peers:(1 q) 7.2 Immunsaton smulaton To study the performance of mmunsaton strateges, we smulate a statc botnet wth all nodes jon the system at tme 0 and only one node s nfected ntally. No node leaves the system durng the smulaton. We smulate two dfferent mmunsaton strateges: n the frst case, at each tme step, we randomly choose nfected nodes to mmunse wth a homogeneous probablty p ; n the second case, we use preferental strategy to mmunse the top p fracton of probable peers wth the hghest connectvty. Fgure 8 Number of Bots Comparson of mmunsaton strateges n statc botnets (see onlne verson for colours) p=0.1:random Immunzaton p=0.2:random Immunzaton p=0.2:preferental Immunzaton Tme:t Fgure 8 shows that both strateges can completely break the botnet. Comparng two strateges, the preferental mmunsaton s much more effectve than the random mmunsaton. It can always control the sze of botnet at a very low level. We vary p to smulate the effect of mmunsaton wth dfferent mmunsaton rato. The result s that, wth p = 0.1, the botnet reaches a larger sze than the botnet wth p = 0.2. Therefore, we can conclude that the hgh mmunsaton rato and good mmunsaton strategy lead to effcent mmunsaton. 8 Implementaton ssues A tracng chan mechansm ncludes three key steps: 1 dentfy the ndvdual peer wth symptoms 2 establsh the transmsson chan through contact tracng 3 mmunse the nfected peers. In ths secton, we dscuss the scheme to mplement those steps. ISPs are n a unque poston to montor and trace contact behavours of users n ther networks, on whch can nstall servers to detect abnormal traffc patterns of users and establsh tracng chans among users. The drawback of ths approach s that ISP servers have to montor a large number of users and the workload can be very hgh. In addton, to trace connecton traffc across dfferent ISPs, servers under dfferent admnstratons have to cooperate each other (Xong, 2004). In our paper, we adopt another archtecture called dstrbuted sensor archtecture. In ths archtecture, each computer s nstalled wth a symptom detecton software, called sensor. Dstrbuted

10 Detectng and blockng P2P botnets through contact tracng chans 53 sensors contnuously montor traffc on ther host computers and record connecton level nformaton (such as destnaton IP addresses and duratons of outgong connectons) n every tme nterval. When a peer behaves normally, the sensor only keeps the montored nformaton locally. Once a sensor detects suspcous actvtes, t wll fre and report the montored abnormal nformaton to a central server. The central server acts as a tracker whch can be confgured on the ISP servers. It collects abnormal nformaton from all sensors n the network and apples contact tracng algorthms to establsh nfecton chans. Once a chan s establshed, all the peers on the chan wll receve nfecton confrmaton messages from the server. Infected peers wll be cleaned and mmunsed by the mmunsaton software. Fgure 9 shows a dstrbuted sensors-based detecton system, whch conssts of a central server and dstrbuted sensors A, B,, F. Each sensor must nstall detecton software and become a regstered user. All regstered users communcate wth the central server. As shown n Fgure 9, when the contacts number of peer A and D reaches M = 4 n a tme nterval, sensors on A and D connect wth the server and the tracng process starts. Ths approach reduces the workload of central server because the server only needs to process a very lmted amount of data from dstrbuted sensors. Fgure 9 9 Conclusons Dstrbuted sensors archtecture (see onlne verson for colours) In ths paper, we proposed a novel contact tracng chan-based framework to detect and block the propagaton of P2P botnets. Our framework conssts of three components: detecton, tracng and mmunsaton. We developed new symptom detecton algorthms to dstngush P2P Bots from legtmate P2P systems and studed three contact tracng chan algorthms to trade off the tracng speed and false alarm rate. The performance of the proposed algorthms was evaluated usng dscrete-tme smulatons. We demonstrated that the proposed contact tracng framework can quckly detect and block the propagaton of bots n dynamc P2P network envronment. Of course, contact-tracng chan system s not perfect. As the bots are confrmed by establshng contact-tracng chan, once the tracng chan s attacked by botmasters, such as a DOS attack occurs n the mddle of a chan, the number of detected bots wll decrease greatly although our tracng algorthm can mantan a hgh bots detecton rato as dscussed n Secton 7. In our future work, we wll refne the proposed detecton and tracng algorthms to mprove the detecton effcency, and develop new chan length threshold adjustment rules to adaptvely acheve the balance between detecton speed and accuracy. The P2P contact tracng archtecture looks promsng, but t needs to be desgned robust aganst unexpected peer falures and reslent to malcous attacks by compromsed detecton and tracng agents on ndvdual peers. Acknowledgements Ths work s supported n part by CSTC Contract 2009AB2147 and by CSTC Contract 2009DA0001-A. References Crandall, J.R. and Chong, F.T. (2004) Mnos: control data attack preventon orthogonal to memory model, Proceedngs of the 37th Annual IEEE/ACM Internatonal Symposum on Mcroarchtecture, IEEE/ACM, December. Dhungel, P., He, X., Ross, K.W. and Saxena, N. (2007) The polluton attack n P2P lve vdeo streamng: measurement results and defenses, Proceedngs of the 2007 Workshop on Peer-to-Peer Streamng and IP-TV, Japan, August. Eames, K.T.D. and Keelng, M.J. (2003) Contact tracng and dsease control, Proceedngs of the Royal Socety, London, December. Grzzard, J. and Sharma, V., Nunnery, C. and Dagon, D. (2007) Peer-to-Peer botnets: overvew and case study, Proceedngs of the Frst Conference on Frst Workshop on Hot Topcs n Understandng Botnets, USA. Gu, G., Perdsc, R., Zhang, J. and Lee, W. (2008) BotMner: clusterng analyss of network traffc for protocol- and structure-ndependent botnet detecton, Proceedngs of the 17th USENIX Securty Symposum (Securty 08). Hggns, K.J. (2007) The world s bggest botnets, November, avalable at Holz, T., Stener, M., Dahl, F., Bersacky, E. and Frelng, F. (2008) Measurements and mtgaton of peer-to-peer-based botnets: a case study on Storm Worm, Frst USENIX Workshop on Large-Scale Explots and Emergent Threats. Huerta, R. and Tsmrng, L.S. (2002) Contact tracng and epdemcs control n socal networks, Physcal Revew E, November, Vol. 66. Husna, H., Phthakktnukoon, S. and Dantu, R. (2008) Traffc shapng of spam botnets, ICCNC th IEEE. Hymana, J.M., L, J. and Stanley, E.A. (2003) Modelng the mpact of random screenng and contact tracng n reducng the spread of HIV, Mathematcal Boscences, January, Vol. 181, pp.1 16.

11 54 Z. Huang et al. Kang, J., Zhang, J., L, Q. and L, Z. (2009) Detectng new P2P botnet wth mult-chart CUSUM, Internatonal Conference on Networks Securty, Wreless Communcatons and Trusted Computng. Lemos, R. (2006) Bot software looks to mprove peerage, avalable at Lang, J., Kumar, R., X, Y. and Ross, K.W. (2005) Polluton n P2P fle sharng systems, INFOCOM th Annual Jont Conference of the IEEE Computer and Communcatons Socetes. Proceedngs IEEE. Newsome, J. and Song, D. (2005) Dynamc tant analyss: automatc detecton and generaton of software explot attacks, Proceedngs of the 12th Annual Network and Dstrbuted System Securty Symposum (NDSS 2005), February. Porras, P., Sad, H. and Yegneswaran, V. (2007) A mult-perspectve analyss of the Storm (Peacomm) Worm, SRI Internatonal, October. Shanon, C.E. (1948) A mathematcal theory of communcaton, Bell System Techncal Journal, July, pp Stewart, J. (2004) Phatbot Trojan analyss, avalable at Stewart, J. (2004) Spamthru Trojan analyss, avalable at Suh, G.E., Lee, J. and Devadas, S. (2004) Secure program executon va dynamc nformaton flow trackng, Proceedngs of ASPLOS XI, October, pp Wang, C., Knght, J.C. and Elder, M.C. (2000) On computer vral nfecton and the effect of mmunzaton, 16th Annual Computer Securty Applcatons Conference (ACSAC 00), December. Xong, J. (2004) ACT: attachment chan tracng scheme for e-mal vrus detecton and control, Proceedngs of the 2004 ACM Workshop on Rapd Malcode, pp Zhou, L., Zhang, L., McSherry, F., Immorlca, N., Costa, M. and Chen, S. (2005) A frst look at peer-to-peer worms: threats and defenses, Proc. 4th Internatonal Workshop on Peer-to-Peer System. Zou, C.C., Towsley, D. and Gong, W. (2007) Modelng and smulaton study of the propagaton and defense of nternet e-mal worm, IEEE Transactons on Dependable and Secure Computng, Aprl, pp Notes 1 A complete tracng chan wll be establshed mstakenly only f all lnks along the chan are detected mstakenly.

Cluster Analysis of Electrical Behavior

Cluster Analysis of Electrical Behavior Journal of Computer and Communcatons, 205, 3, 88-93 Publshed Onlne May 205 n ScRes. http://www.scrp.org/ournal/cc http://dx.do.org/0.4236/cc.205.350 Cluster Analyss of Electrcal Behavor Ln Lu Ln Lu, School

More information

Load Balancing for Hex-Cell Interconnection Network

Load Balancing for Hex-Cell Interconnection Network Int. J. Communcatons, Network and System Scences,,, - Publshed Onlne Aprl n ScRes. http://www.scrp.org/journal/jcns http://dx.do.org/./jcns.. Load Balancng for Hex-Cell Interconnecton Network Saher Manaseer,

More information

Virtual Machine Migration based on Trust Measurement of Computer Node

Virtual Machine Migration based on Trust Measurement of Computer Node Appled Mechancs and Materals Onlne: 2014-04-04 ISSN: 1662-7482, Vols. 536-537, pp 678-682 do:10.4028/www.scentfc.net/amm.536-537.678 2014 Trans Tech Publcatons, Swtzerland Vrtual Machne Mgraton based on

More information

An Optimal Algorithm for Prufer Codes *

An Optimal Algorithm for Prufer Codes * J. Software Engneerng & Applcatons, 2009, 2: 111-115 do:10.4236/jsea.2009.22016 Publshed Onlne July 2009 (www.scrp.org/journal/jsea) An Optmal Algorthm for Prufer Codes * Xaodong Wang 1, 2, Le Wang 3,

More information

Parallelism for Nested Loops with Non-uniform and Flow Dependences

Parallelism for Nested Loops with Non-uniform and Flow Dependences Parallelsm for Nested Loops wth Non-unform and Flow Dependences Sam-Jn Jeong Dept. of Informaton & Communcaton Engneerng, Cheonan Unversty, 5, Anseo-dong, Cheonan, Chungnam, 330-80, Korea. seong@cheonan.ac.kr

More information

Simulation Based Analysis of FAST TCP using OMNET++

Simulation Based Analysis of FAST TCP using OMNET++ Smulaton Based Analyss of FAST TCP usng OMNET++ Umar ul Hassan 04030038@lums.edu.pk Md Term Report CS678 Topcs n Internet Research Sprng, 2006 Introducton Internet traffc s doublng roughly every 3 months

More information

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS

A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Proceedngs of the Wnter Smulaton Conference M E Kuhl, N M Steger, F B Armstrong, and J A Jones, eds A MOVING MESH APPROACH FOR SIMULATION BUDGET ALLOCATION ON CONTINUOUS DOMAINS Mark W Brantley Chun-Hung

More information

Concurrent Apriori Data Mining Algorithms

Concurrent Apriori Data Mining Algorithms Concurrent Apror Data Mnng Algorthms Vassl Halatchev Department of Electrcal Engneerng and Computer Scence York Unversty, Toronto October 8, 2015 Outlne Why t s mportant Introducton to Assocaton Rule Mnng

More information

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration

Improvement of Spatial Resolution Using BlockMatching Based Motion Estimation and Frame. Integration Improvement of Spatal Resoluton Usng BlockMatchng Based Moton Estmaton and Frame Integraton Danya Suga and Takayuk Hamamoto Graduate School of Engneerng, Tokyo Unversty of Scence, 6-3-1, Nuku, Katsuska-ku,

More information

Wishing you all a Total Quality New Year!

Wishing you all a Total Quality New Year! Total Qualty Management and Sx Sgma Post Graduate Program 214-15 Sesson 4 Vnay Kumar Kalakband Assstant Professor Operatons & Systems Area 1 Wshng you all a Total Qualty New Year! Hope you acheve Sx sgma

More information

Efficient Distributed File System (EDFS)

Efficient Distributed File System (EDFS) Effcent Dstrbuted Fle System (EDFS) (Sem-Centralzed) Debessay(Debsh) Fesehaye, Rahul Malk & Klara Naherstedt Unversty of Illnos-Urbana Champagn Contents Problem Statement, Related Work, EDFS Desgn Rate

More information

Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation

Heterogeneity in Vulnerable Hosts Slows Down Worm Propagation Heterogenety n Vulnerable Hosts Slows Down Worm Propagaton Zesheng Chen and Chao Chen Department of Engneerng Indana Unversty - Purdue Unversty Fort Wayne, Indana 4685 Emal: {zchen, chen}@engr.pfw.edu

More information

Load-Balanced Anycast Routing

Load-Balanced Anycast Routing Load-Balanced Anycast Routng Chng-Yu Ln, Jung-Hua Lo, and Sy-Yen Kuo Department of Electrcal Engneerng atonal Tawan Unversty, Tape, Tawan sykuo@cc.ee.ntu.edu.tw Abstract For fault-tolerance and load-balance

More information

Video Proxy System for a Large-scale VOD System (DINA)

Video Proxy System for a Large-scale VOD System (DINA) Vdeo Proxy System for a Large-scale VOD System (DINA) KWUN-CHUNG CHAN #, KWOK-WAI CHEUNG *# #Department of Informaton Engneerng *Centre of Innovaton and Technology The Chnese Unversty of Hong Kong SHATIN,

More information

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task

Term Weighting Classification System Using the Chi-square Statistic for the Classification Subtask at NTCIR-6 Patent Retrieval Task Proceedngs of NTCIR-6 Workshop Meetng, May 15-18, 2007, Tokyo, Japan Term Weghtng Classfcaton System Usng the Ch-square Statstc for the Classfcaton Subtask at NTCIR-6 Patent Retreval Task Kotaro Hashmoto

More information

User Authentication Based On Behavioral Mouse Dynamics Biometrics

User Authentication Based On Behavioral Mouse Dynamics Biometrics User Authentcaton Based On Behavoral Mouse Dynamcs Bometrcs Chee-Hyung Yoon Danel Donghyun Km Department of Computer Scence Department of Computer Scence Stanford Unversty Stanford Unversty Stanford, CA

More information

A Binarization Algorithm specialized on Document Images and Photos

A Binarization Algorithm specialized on Document Images and Photos A Bnarzaton Algorthm specalzed on Document mages and Photos Ergna Kavalleratou Dept. of nformaton and Communcaton Systems Engneerng Unversty of the Aegean kavalleratou@aegean.gr Abstract n ths paper, a

More information

Related-Mode Attacks on CTR Encryption Mode

Related-Mode Attacks on CTR Encryption Mode Internatonal Journal of Network Securty, Vol.4, No.3, PP.282 287, May 2007 282 Related-Mode Attacks on CTR Encrypton Mode Dayn Wang, Dongda Ln, and Wenlng Wu (Correspondng author: Dayn Wang) Key Laboratory

More information

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS

NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS ARPN Journal of Engneerng and Appled Scences 006-017 Asan Research Publshng Network (ARPN). All rghts reserved. NUMERICAL SOLVING OPTIMAL CONTROL PROBLEMS BY THE METHOD OF VARIATIONS Igor Grgoryev, Svetlana

More information

Private Information Retrieval (PIR)

Private Information Retrieval (PIR) 2 Levente Buttyán Problem formulaton Alce wants to obtan nformaton from a database, but she does not want the database to learn whch nformaton she wanted e.g., Alce s an nvestor queryng a stock-market

More information

The Codesign Challenge

The Codesign Challenge ECE 4530 Codesgn Challenge Fall 2007 Hardware/Software Codesgn The Codesgn Challenge Objectves In the codesgn challenge, your task s to accelerate a gven software reference mplementaton as fast as possble.

More information

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision

SLAM Summer School 2006 Practical 2: SLAM using Monocular Vision SLAM Summer School 2006 Practcal 2: SLAM usng Monocular Vson Javer Cvera, Unversty of Zaragoza Andrew J. Davson, Imperal College London J.M.M Montel, Unversty of Zaragoza. josemar@unzar.es, jcvera@unzar.es,

More information

Module Management Tool in Software Development Organizations

Module Management Tool in Software Development Organizations Journal of Computer Scence (5): 8-, 7 ISSN 59-66 7 Scence Publcatons Management Tool n Software Development Organzatons Ahmad A. Al-Rababah and Mohammad A. Al-Rababah Faculty of IT, Al-Ahlyyah Amman Unversty,

More information

IP Camera Configuration Software Instruction Manual

IP Camera Configuration Software Instruction Manual IP Camera 9483 - Confguraton Software Instructon Manual VBD 612-4 (10.14) Dear Customer, Wth your purchase of ths IP Camera, you have chosen a qualty product manufactured by RADEMACHER. Thank you for the

More information

A Topology-aware Random Walk

A Topology-aware Random Walk A Topology-aware Random Walk Inkwan Yu, Rchard Newman Dept. of CISE, Unversty of Florda, Ganesvlle, Florda, USA Abstract When a graph can be decomposed nto clusters of well connected subgraphs, t s possble

More information

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD

Analysis on the Workspace of Six-degrees-of-freedom Industrial Robot Based on AutoCAD Analyss on the Workspace of Sx-degrees-of-freedom Industral Robot Based on AutoCAD Jn-quan L 1, Ru Zhang 1,a, Fang Cu 1, Q Guan 1 and Yang Zhang 1 1 School of Automaton, Bejng Unversty of Posts and Telecommuncatons,

More information

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz

Compiler Design. Spring Register Allocation. Sample Exercises and Solutions. Prof. Pedro C. Diniz Compler Desgn Sprng 2014 Regster Allocaton Sample Exercses and Solutons Prof. Pedro C. Dnz USC / Informaton Scences Insttute 4676 Admralty Way, Sute 1001 Marna del Rey, Calforna 90292 pedro@s.edu Regster

More information

AADL : about scheduling analysis

AADL : about scheduling analysis AADL : about schedulng analyss Schedulng analyss, what s t? Embedded real-tme crtcal systems have temporal constrants to meet (e.g. deadlne). Many systems are bult wth operatng systems provdng multtaskng

More information

Mathematics 256 a course in differential equations for engineering students

Mathematics 256 a course in differential equations for engineering students Mathematcs 56 a course n dfferental equatons for engneerng students Chapter 5. More effcent methods of numercal soluton Euler s method s qute neffcent. Because the error s essentally proportonal to the

More information

Constructing Minimum Connected Dominating Set: Algorithmic approach

Constructing Minimum Connected Dominating Set: Algorithmic approach Constructng Mnmum Connected Domnatng Set: Algorthmc approach G.N. Puroht and Usha Sharma Centre for Mathematcal Scences, Banasthal Unversty, Rajasthan 304022 usha.sharma94@yahoo.com Abstract: Connected

More information

An Entropy-Based Approach to Integrated Information Needs Assessment

An Entropy-Based Approach to Integrated Information Needs Assessment Dstrbuton Statement A: Approved for publc release; dstrbuton s unlmted. An Entropy-Based Approach to ntegrated nformaton Needs Assessment June 8, 2004 Wllam J. Farrell Lockheed Martn Advanced Technology

More information

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization

Problem Definitions and Evaluation Criteria for Computational Expensive Optimization Problem efntons and Evaluaton Crtera for Computatonal Expensve Optmzaton B. Lu 1, Q. Chen and Q. Zhang 3, J. J. Lang 4, P. N. Suganthan, B. Y. Qu 6 1 epartment of Computng, Glyndwr Unversty, UK Faclty

More information

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated.

Some Advanced SPC Tools 1. Cumulative Sum Control (Cusum) Chart For the data shown in Table 9-1, the x chart can be generated. Some Advanced SP Tools 1. umulatve Sum ontrol (usum) hart For the data shown n Table 9-1, the x chart can be generated. However, the shft taken place at sample #21 s not apparent. 92 For ths set samples,

More information

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE

A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE A KIND OF ROUTING MODEL IN PEER-TO-PEER NETWORK BASED ON SUCCESSFUL ACCESSING RATE 1 TAO LIU, 2 JI-JUN XU 1 College of Informaton Scence and Technology, Zhengzhou Normal Unversty, Chna 2 School of Mathematcs

More information

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data

A Fast Content-Based Multimedia Retrieval Technique Using Compressed Data A Fast Content-Based Multmeda Retreval Technque Usng Compressed Data Borko Furht and Pornvt Saksobhavvat NSF Multmeda Laboratory Florda Atlantc Unversty, Boca Raton, Florda 3343 ABSTRACT In ths paper,

More information

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers

Content Based Image Retrieval Using 2-D Discrete Wavelet with Texture Feature with Different Classifiers IOSR Journal of Electroncs and Communcaton Engneerng (IOSR-JECE) e-issn: 78-834,p- ISSN: 78-8735.Volume 9, Issue, Ver. IV (Mar - Apr. 04), PP 0-07 Content Based Image Retreval Usng -D Dscrete Wavelet wth

More information

Shared Running Buffer Based Proxy Caching of Streaming Sessions

Shared Running Buffer Based Proxy Caching of Streaming Sessions Shared Runnng Buffer Based Proxy Cachng of Streamng Sessons Songqng Chen, Bo Shen, Yong Yan, Sujoy Basu Moble and Meda Systems Laboratory HP Laboratores Palo Alto HPL-23-47 March th, 23* E-mal: sqchen@cs.wm.edu,

More information

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility

Evaluation of an Enhanced Scheme for High-level Nested Network Mobility IJCSNS Internatonal Journal of Computer Scence and Network Securty, VOL.15 No.10, October 2015 1 Evaluaton of an Enhanced Scheme for Hgh-level Nested Network Moblty Mohammed Babker Al Mohammed, Asha Hassan.

More information

Solution Brief: Creating a Secure Base in a Virtual World

Solution Brief: Creating a Secure Base in a Virtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Soluton Bref: Creatng a Secure Base n a Vrtual World Abstract The adopton rate of Vrtual Machnes has exploded at most organzatons, drven by the mproved

More information

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory

Virtual Memory. Background. No. 10. Virtual Memory: concept. Logical Memory Space (review) Demand Paging(1) Virtual Memory Background EECS. Operatng System Fundamentals No. Vrtual Memory Prof. Hu Jang Department of Electrcal Engneerng and Computer Scence, York Unversty Memory-management methods normally requres the entre process

More information

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION

Overview. Basic Setup [9] Motivation and Tasks. Modularization 2008/2/20 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Overvew 2 IMPROVED COVERAGE CONTROL USING ONLY LOCAL INFORMATION Introducton Mult- Smulator MASIM Theoretcal Work and Smulaton Results Concluson Jay Wagenpfel, Adran Trachte Motvaton and Tasks Basc Setup

More information

Analysis of Collaborative Distributed Admission Control in x Networks

Analysis of Collaborative Distributed Admission Control in x Networks 1 Analyss of Collaboratve Dstrbuted Admsson Control n 82.11x Networks Thnh Nguyen, Member, IEEE, Ken Nguyen, Member, IEEE, Lnha He, Member, IEEE, Abstract Wth the recent surge of wreless home networks,

More information

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI

A Model Based on Multi-agent for Dynamic Bandwidth Allocation in Networks Guang LU, Jian-Wen QI 216 Jont Internatonal Conference on Artfcal Intellgence and Computer Engneerng (AICE 216) and Internatonal Conference on etwork and Communcaton Securty (CS 216) ISB: 978-1-6595-362-5 A Model Based on Mult-agent

More information

Assembler. Building a Modern Computer From First Principles.

Assembler. Building a Modern Computer From First Principles. Assembler Buldng a Modern Computer From Frst Prncples www.nand2tetrs.org Elements of Computng Systems, Nsan & Schocken, MIT Press, www.nand2tetrs.org, Chapter 6: Assembler slde Where we are at: Human Thought

More information

X- Chart Using ANOM Approach

X- Chart Using ANOM Approach ISSN 1684-8403 Journal of Statstcs Volume 17, 010, pp. 3-3 Abstract X- Chart Usng ANOM Approach Gullapall Chakravarth 1 and Chaluvad Venkateswara Rao Control lmts for ndvdual measurements (X) chart are

More information

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks

A Semi-Distributed Load Balancing Architecture and Algorithm for Heterogeneous Wireless Networks A Sem-Dstrbuted oad Balancng Archtecture and Algorthm for Heterogeneous reless Networks Md. Golam Rabul Ala Choong Seon Hong * Kyung Hee Unversty, Korea rob@networkng.khu.ac.kr, cshong@khu.ac.kr Abstract

More information

A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS

A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS A NEW LOCALIZED NETWORK BASED ROUTING MODEL IN COMPUTER AND COMMUNICATION NETWORKS Abdulbaset H. Mohammad School of Computng, Informatcs and Meda, Unversty of Bradford, Bradford, Unted Kngdom a.h.t.mohammad@bradford.ac.uk

More information

Control strategies for network efficiency and resilience with route choice

Control strategies for network efficiency and resilience with route choice Control strateges for networ effcency and reslence wth route choce Andy Chow Ru Sha Centre for Transport Studes Unversty College London, UK Centralsed strateges UK 1 Centralsed strateges Some effectve

More information

Solving two-person zero-sum game by Matlab

Solving two-person zero-sum game by Matlab Appled Mechancs and Materals Onlne: 2011-02-02 ISSN: 1662-7482, Vols. 50-51, pp 262-265 do:10.4028/www.scentfc.net/amm.50-51.262 2011 Trans Tech Publcatons, Swtzerland Solvng two-person zero-sum game by

More information

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems:

RAP. Speed/RAP/CODA. Real-time Systems. Modeling the sensor networks. Real-time Systems. Modeling the sensor networks. Real-time systems: Speed/RAP/CODA Presented by Octav Chpara Real-tme Systems Many wreless sensor network applcatons requre real-tme support Survellance and trackng Border patrol Fre fghtng Real-tme systems: Hard real-tme:

More information

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices

Steps for Computing the Dissimilarity, Entropy, Herfindahl-Hirschman and. Accessibility (Gravity with Competition) Indices Steps for Computng the Dssmlarty, Entropy, Herfndahl-Hrschman and Accessblty (Gravty wth Competton) Indces I. Dssmlarty Index Measurement: The followng formula can be used to measure the evenness between

More information

Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution

Dynamic Voltage Scaling of Supply and Body Bias Exploiting Software Runtime Distribution Dynamc Voltage Scalng of Supply and Body Bas Explotng Software Runtme Dstrbuton Sungpack Hong EE Department Stanford Unversty Sungjoo Yoo, Byeong Bn, Kyu-Myung Cho, Soo-Kwan Eo Samsung Electroncs Taehwan

More information

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks

Performance analysis of distributed cluster-based MAC protocol for multiuser MIMO wireless networks RESEARCH Open Access Performance analyss of dstrbuted cluster-based MAC protocol for multuser MIMO wreless networks Azadeh Ettefagh *, Marc Kuhn, Celal Eşl and Armn Wttneben Abstract It s known that multuser

More information

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur

FEATURE EXTRACTION. Dr. K.Vijayarekha. Associate Dean School of Electrical and Electronics Engineering SASTRA University, Thanjavur FEATURE EXTRACTION Dr. K.Vjayarekha Assocate Dean School of Electrcal and Electroncs Engneerng SASTRA Unversty, Thanjavur613 41 Jont Intatve of IITs and IISc Funded by MHRD Page 1 of 8 Table of Contents

More information

Effectiveness of Information Retraction

Effectiveness of Information Retraction Effectveness of Informaton on Cndy Hu, Malk Magdon-Ismal, Mark Goldberg and Wllam A. Wallace Department of Industral and Systems Engneerng Rensselaer Polytechnc Insttute Troy, New York Emal: huc@rp.edu,

More information

An IPv6-Oriented IDS Framework and Solutions of Two Problems

An IPv6-Oriented IDS Framework and Solutions of Two Problems An IPv6-Orented IDS Framework and Solutons of Two Problems We LI, Zhy FANG, Peng XU and ayang SI,2 School of Computer Scence and Technology, Jln Unversty Changchun, 3002, P.R.Chna 2 Graduate Unversty of

More information

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems

An Efficient Garbage Collection for Flash Memory-Based Virtual Memory Systems S. J and D. Shn: An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems 2355 An Effcent Garbage Collecton for Flash Memory-Based Vrtual Memory Systems Seunggu J and Dongkun Shn, Member,

More information

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields

A mathematical programming approach to the analysis, design and scheduling of offshore oilfields 17 th European Symposum on Computer Aded Process Engneerng ESCAPE17 V. Plesu and P.S. Agach (Edtors) 2007 Elsever B.V. All rghts reserved. 1 A mathematcal programmng approach to the analyss, desgn and

More information

SAO: A Stream Index for Answering Linear Optimization Queries

SAO: A Stream Index for Answering Linear Optimization Queries SAO: A Stream Index for Answerng near Optmzaton Queres Gang uo Kun-ung Wu Phlp S. Yu IBM T.J. Watson Research Center {luog, klwu, psyu}@us.bm.com Abstract near optmzaton queres retreve the top-k tuples

More information

A Semi-parametric Regression Model to Estimate Variability of NO 2

A Semi-parametric Regression Model to Estimate Variability of NO 2 Envronment and Polluton; Vol. 2, No. 1; 2013 ISSN 1927-0909 E-ISSN 1927-0917 Publshed by Canadan Center of Scence and Educaton A Sem-parametrc Regresson Model to Estmate Varablty of NO 2 Meczysław Szyszkowcz

More information

arxiv: v3 [cs.ds] 7 Feb 2017

arxiv: v3 [cs.ds] 7 Feb 2017 : A Two-stage Sketch for Data Streams Tong Yang 1, Lngtong Lu 2, Ybo Yan 1, Muhammad Shahzad 3, Yulong Shen 2 Xaomng L 1, Bn Cu 1, Gaogang Xe 4 1 Pekng Unversty, Chna. 2 Xdan Unversty, Chna. 3 North Carolna

More information

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks

FAHP and Modified GRA Based Network Selection in Heterogeneous Wireless Networks 2017 2nd Internatonal Semnar on Appled Physcs, Optoelectroncs and Photoncs (APOP 2017) ISBN: 978-1-60595-522-3 FAHP and Modfed GRA Based Network Selecton n Heterogeneous Wreless Networks Xaohan DU, Zhqng

More information

A graph-theoretic framework for isolating botnets in a network

A graph-theoretic framework for isolating botnets in a network SECURITY AND COMMUNICATION NETWORKS Securty Comm. Networks 215; 8:265 2623 Publshed onlne 28 February 212 n Wley Onlne Lbrary (wleyonlnelbrary.com)..5 RESEARCH ARTICLE A graph-theoretc framework for solatng

More information

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control

Quantifying Responsiveness of TCP Aggregates by Using Direct Sequence Spread Spectrum CDMA and Its Application in Congestion Control Quantfyng Responsveness of TCP Aggregates by Usng Drect Sequence Spread Spectrum CDMA and Its Applcaton n Congeston Control Mehd Kalantar Department of Electrcal and Computer Engneerng Unversty of Maryland,

More information

Adaptive Energy and Location Aware Routing in Wireless Sensor Network

Adaptive Energy and Location Aware Routing in Wireless Sensor Network Adaptve Energy and Locaton Aware Routng n Wreless Sensor Network Hong Fu 1,1, Xaomng Wang 1, Yngshu L 1 Department of Computer Scence, Shaanx Normal Unversty, X an, Chna, 71006 fuhong433@gmal.com {wangxmsnnu@hotmal.cn}

More information

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment

Improved Resource Allocation Algorithms for Practical Image Encoding in a Ubiquitous Computing Environment JOURNAL OF COMPUTERS, VOL. 4, NO. 9, SEPTEMBER 2009 873 Improved Resource Allocaton Algorthms for Practcal Image Encodng n a Ubqutous Computng Envronment Manxong Dong, Long Zheng, Kaoru Ota, Song Guo School

More information

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment

Resource and Virtual Function Status Monitoring in Network Function Virtualization Environment Journal of Physcs: Conference Seres PAPER OPEN ACCESS Resource and Vrtual Functon Status Montorng n Network Functon Vrtualzaton Envronment To cte ths artcle: MS Ha et al 2018 J. Phys.: Conf. Ser. 1087

More information

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions

SRB: Shared Running Buffers in Proxy to Exploit Memory Locality of Multiple Streaming Media Sessions SRB: Shared Runnng Buffers n Proxy to Explot Memory Localty of Multple Streamng Meda Sessons Songqng Chen,BoShen, Yong Yan, Sujoy Basu, and Xaodong Zhang Department of Computer Scence Moble and Meda System

More information

A NOTE ON FUZZY CLOSURE OF A FUZZY SET

A NOTE ON FUZZY CLOSURE OF A FUZZY SET (JPMNT) Journal of Process Management New Technologes, Internatonal A NOTE ON FUZZY CLOSURE OF A FUZZY SET Bhmraj Basumatary Department of Mathematcal Scences, Bodoland Unversty, Kokrajhar, Assam, Inda,

More information

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching

A Fast Visual Tracking Algorithm Based on Circle Pixels Matching A Fast Vsual Trackng Algorthm Based on Crcle Pxels Matchng Zhqang Hou hou_zhq@sohu.com Chongzhao Han czhan@mal.xjtu.edu.cn Ln Zheng Abstract: A fast vsual trackng algorthm based on crcle pxels matchng

More information

Fibre-Optic AWG-based Real-Time Networks

Fibre-Optic AWG-based Real-Time Networks Fbre-Optc AWG-based Real-Tme Networks Krstna Kunert, Annette Böhm, Magnus Jonsson, School of Informaton Scence, Computer and Electrcal Engneerng, Halmstad Unversty {Magnus.Jonsson, Krstna.Kunert}@de.hh.se

More information

ELEC 377 Operating Systems. Week 6 Class 3

ELEC 377 Operating Systems. Week 6 Class 3 ELEC 377 Operatng Systems Week 6 Class 3 Last Class Memory Management Memory Pagng Pagng Structure ELEC 377 Operatng Systems Today Pagng Szes Vrtual Memory Concept Demand Pagng ELEC 377 Operatng Systems

More information

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap

Empirical Distributions of Parameter Estimates. in Binary Logistic Regression Using Bootstrap Int. Journal of Math. Analyss, Vol. 8, 4, no. 5, 7-7 HIKARI Ltd, www.m-hkar.com http://dx.do.org/.988/jma.4.494 Emprcal Dstrbutons of Parameter Estmates n Bnary Logstc Regresson Usng Bootstrap Anwar Ftranto*

More information

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK

FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK FINDING IMPORTANT NODES IN SOCIAL NETWORKS BASED ON MODIFIED PAGERANK L-qng Qu, Yong-quan Lang 2, Jng-Chen 3, 2 College of Informaton Scence and Technology, Shandong Unversty of Scence and Technology,

More information

Reliability and Performance Models for Grid Computing

Reliability and Performance Models for Grid Computing Relablty and Performance Models for Grd Computng Yuan-Shun Da,2, Jack Dongarra,3,4 Department of Electrcal Engneerng and Computer Scence, Unversty of Tennessee, Knoxvlle 2 Department of Industral and Informaton

More information

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network

Significance of Eigenvector Centrality for Routing in a Delay Tolerant Network Journal of Computatons & Modellng, vol.1, no.1, 2011, 91-100 ISSN: 1792-7625 (prnt), 1792-8850 (onlne) Internatonal Scentfc Press, 2011 Sgnfcance of Egenvector Centralty for Routng n a Delay Tolerant Network

More information

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks

Priority-Based Scheduling Algorithm for Downlink Traffics in IEEE Networks Prorty-Based Schedulng Algorthm for Downlnk Traffcs n IEEE 80.6 Networks Ja-Mng Lang, Jen-Jee Chen, You-Chun Wang, Yu-Chee Tseng, and Bao-Shuh P. Ln Department of Computer Scence Natonal Chao-Tung Unversty,

More information

Oracle Database: 12c Administrator

Oracle Database: 12c Administrator Oracle Database: 12c Admnstrator 1 Duraton: 5 Days (30 hours) What you wll learn: Ths Oracle Database: SQL and PL/SQL Fundamentals tranng delvers the fundamentals of SQL and PL/SQL along wth the benefts

More information

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach

Distributed Resource Scheduling in Grid Computing Using Fuzzy Approach Dstrbuted Resource Schedulng n Grd Computng Usng Fuzzy Approach Shahram Amn, Mohammad Ahmad Computer Engneerng Department Islamc Azad Unversty branch Mahallat, Iran Islamc Azad Unversty branch khomen,

More information

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network

A New Token Allocation Algorithm for TCP Traffic in Diffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network A New Token Allocaton Algorthm for TCP Traffc n Dffserv Network S. Sudha and N. Ammasagounden Natonal Insttute of Technology, Truchrappall,

More information

Reducing Frame Rate for Object Tracking

Reducing Frame Rate for Object Tracking Reducng Frame Rate for Object Trackng Pavel Korshunov 1 and We Tsang Oo 2 1 Natonal Unversty of Sngapore, Sngapore 11977, pavelkor@comp.nus.edu.sg 2 Natonal Unversty of Sngapore, Sngapore 11977, oowt@comp.nus.edu.sg

More information

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier

Some material adapted from Mohamed Younis, UMBC CMSC 611 Spr 2003 course slides Some material adapted from Hennessy & Patterson / 2003 Elsevier Some materal adapted from Mohamed Youns, UMBC CMSC 611 Spr 2003 course sldes Some materal adapted from Hennessy & Patterson / 2003 Elsever Scence Performance = 1 Executon tme Speedup = Performance (B)

More information

Maintaining temporal validity of real-time data on non-continuously executing resources

Maintaining temporal validity of real-time data on non-continuously executing resources Mantanng temporal valdty of real-tme data on non-contnuously executng resources Tan Ba, Hong Lu and Juan Yang Hunan Insttute of Scence and Technology, College of Computer Scence, 44, Yueyang, Chna Wuhan

More information

ARTICLE IN PRESS. Signal Processing: Image Communication

ARTICLE IN PRESS. Signal Processing: Image Communication Sgnal Processng: Image Communcaton 23 (2008) 754 768 Contents lsts avalable at ScenceDrect Sgnal Processng: Image Communcaton journal homepage: www.elsever.com/locate/mage Dstrbuted meda rate allocaton

More information

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication

Dynamic Bandwidth Provisioning with Fairness and Revenue Considerations for Broadband Wireless Communication Ths full text paper was peer revewed at the drecton of IEEE Communcatons Socety subject matter experts for publcaton n the ICC 008 proceedngs. Dynamc Bandwdth Provsonng wth Farness and Revenue Consderatons

More information

Learning-Based Top-N Selection Query Evaluation over Relational Databases

Learning-Based Top-N Selection Query Evaluation over Relational Databases Learnng-Based Top-N Selecton Query Evaluaton over Relatonal Databases Lang Zhu *, Wey Meng ** * School of Mathematcs and Computer Scence, Hebe Unversty, Baodng, Hebe 071002, Chna, zhu@mal.hbu.edu.cn **

More information

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments

Security Enhanced Dynamic ID based Remote User Authentication Scheme for Multi-Server Environments Internatonal Journal of u- and e- ervce, cence and Technology Vol8, o 7 0), pp7-6 http://dxdoorg/07/unesst087 ecurty Enhanced Dynamc ID based Remote ser Authentcaton cheme for ult-erver Envronments Jun-ub

More information

Fast Computation of Shortest Path for Visiting Segments in the Plane

Fast Computation of Shortest Path for Visiting Segments in the Plane Send Orders for Reprnts to reprnts@benthamscence.ae 4 The Open Cybernetcs & Systemcs Journal, 04, 8, 4-9 Open Access Fast Computaton of Shortest Path for Vstng Segments n the Plane Ljuan Wang,, Bo Jang

More information

11. HARMS How To: CSV Import

11. HARMS How To: CSV Import and Rsk System 11. How To: CSV Import Preparng the spreadsheet for CSV Import Refer to the spreadsheet template to ad algnng spreadsheet columns wth Data Felds. The spreadsheet s shown n the Appendx, an

More information

A SDN-based Sampling System for Cloud P2P Bots Detection

A SDN-based Sampling System for Cloud P2P Bots Detection JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 32, XXXX-XXXX (2016) A SDN-based Samplng System for Cloud P2P Bots Detecton JIANG-YONG SHI 1, JIE HE 2* AND YUE-XIANG YANG 1 1 School of Computer Natonal

More information

Learning the Kernel Parameters in Kernel Minimum Distance Classifier

Learning the Kernel Parameters in Kernel Minimum Distance Classifier Learnng the Kernel Parameters n Kernel Mnmum Dstance Classfer Daoqang Zhang 1,, Songcan Chen and Zh-Hua Zhou 1* 1 Natonal Laboratory for Novel Software Technology Nanjng Unversty, Nanjng 193, Chna Department

More information

Fusion Performance Model for Distributed Tracking and Classification

Fusion Performance Model for Distributed Tracking and Classification Fuson Performance Model for Dstrbuted rackng and Classfcaton K.C. Chang and Yng Song Dept. of SEOR, School of I&E George Mason Unversty FAIRFAX, VA kchang@gmu.edu Martn Lggns Verdan Systems Dvson, Inc.

More information

Advanced Computer Networks

Advanced Computer Networks Char of Network Archtectures and Servces Department of Informatcs Techncal Unversty of Munch Note: Durng the attendance check a stcker contanng a unque QR code wll be put on ths exam. Ths QR code contans

More information

Determining the Optimal Bandwidth Based on Multi-criterion Fusion

Determining the Optimal Bandwidth Based on Multi-criterion Fusion Proceedngs of 01 4th Internatonal Conference on Machne Learnng and Computng IPCSIT vol. 5 (01) (01) IACSIT Press, Sngapore Determnng the Optmal Bandwdth Based on Mult-crteron Fuson Ha-L Lang 1+, Xan-Mn

More information

Analysis of Continuous Beams in General

Analysis of Continuous Beams in General Analyss of Contnuous Beams n General Contnuous beams consdered here are prsmatc, rgdly connected to each beam segment and supported at varous ponts along the beam. onts are selected at ponts of support,

More information

Parallel matrix-vector multiplication

Parallel matrix-vector multiplication Appendx A Parallel matrx-vector multplcaton The reduced transton matrx of the three-dmensonal cage model for gel electrophoress, descrbed n secton 3.2, becomes excessvely large for polymer lengths more

More information

Network Coding as a Dynamical System

Network Coding as a Dynamical System Network Codng as a Dynamcal System Narayan B. Mandayam IEEE Dstngushed Lecture (jont work wth Dan Zhang and a Su) Department of Electrcal and Computer Engneerng Rutgers Unversty Outlne. Introducton 2.

More information

UB at GeoCLEF Department of Geography Abstract

UB at GeoCLEF Department of Geography   Abstract UB at GeoCLEF 2006 Mguel E. Ruz (1), Stuart Shapro (2), June Abbas (1), Slva B. Southwck (1) and Davd Mark (3) State Unversty of New York at Buffalo (1) Department of Lbrary and Informaton Studes (2) Department

More information

USING GRAPHING SKILLS

USING GRAPHING SKILLS Name: BOLOGY: Date: _ Class: USNG GRAPHNG SKLLS NTRODUCTON: Recorded data can be plotted on a graph. A graph s a pctoral representaton of nformaton recorded n a data table. t s used to show a relatonshp

More information

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks

MobileGrid: Capacity-aware Topology Control in Mobile Ad Hoc Networks MobleGrd: Capacty-aware Topology Control n Moble Ad Hoc Networks Jle Lu, Baochun L Department of Electrcal and Computer Engneerng Unversty of Toronto {jenne,bl}@eecg.toronto.edu Abstract Snce wreless moble

More information