ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY

Size: px
Start display at page:

Download "ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY"

Transcription

1 Assoiation for Information Systems AIS Eletroni Library (AISeL) AMCIS 00 Proeedings Amerias Conferene on Information Systems (AMCIS) Deember 00 ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY Huseyin Cavusoglu The Univesity of Texas at Dallas Birendra Mishra The Univesity of Texas at Dallas Srinivasan Raghunathan The Univesity of Texas at Dallas Follow this and additional works at: Reommended Citation Cavusoglu, Huseyin; Mishra, Birendra; and Raghunathan, Srinivasan, "ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY" (00). AMCIS 00 Proeedings This material is brought to you by the Amerias Conferene on Information Systems (AMCIS) at AIS Eletroni Library (AISeL). It has been aepted for inlusion in AMCIS 00 Proeedings by an authorized administrator of AIS Eletroni Library (AISeL). For more information, please ontat

2 ASSESSING THE VALUE OF DETECTIVE CONTROL IN IT SECURITY Huseyin Cavusoglu, Birendra Mishra, and Srinivasan Raghunathan The Univesity of Texas at Dallas Abstrat Reently, IT Seurity has beome a salient issue for many organizations. The ost of a single seurity breah an be enormous in terms of monetary damage, orporate liability and redibility. Firms inreasingly deploy firewalls as a preventive ontrol and Intrusion Detetion Systems (IDS) as a detetive ontrol to protet IT assets. The IDS has been among the fastest growing IT seurity produts for the last few years. While the literature on the tehnial aspets of IDS is proliferating, it is not lear how one an quantify the magnitude as well as identify the drivers of IDS benefits. In this paper we seek to assess the value of employing an IDS within an organization s IT seurity arhiteture. We analyze the issue from a strategi perspetive using a game-theoreti approah and derive the value of IDS by omparing the organizational payoffs with and without IDS. Our analysis reveals the value of IDS omes not only from improved detetion of intrusions but also from inreased deterrene to hakers. The effets of model parameters, related to firm, haker, and IDS design, on the value of IDS offer valuable guidane to firms that deploy this tehnology and those that develop them. Keywords: IT seurity, seurity arhiteture, detetive ontrol, preventive ontrol, intrusion detetion systems (IDS), game theory Introdution Inreased interonnetivity among omputers enabled by networking tehnologies, in partiular the Internet, has boosted the sale and sope of information tehnology (IT) related rimes. As the E-Commere ontinues to grow, so does the yber rime. The DOJ aseload itself reflets the growth of yber rime. The number of omputer intrusion ases jumped from 547 in year 998 to 54 in 999. The losses from omputer rime inidents are also rising. Computer Seurity Institute and FBI 00 survey found that firms lost $456 million in 00 in ontrast to $378 million in 00, $66 million in 000 and $4 million in 999 (Power 00). IT seurity management seeks to establish internal ontrols to minimize the risk of loss of information and system resoures, orruption of data, disruption of aess to the data, and unauthorized dislosure of information. Internal mehanisms fall into two major ategories: preventive ontrol and detetive ontrol. Preventive ontrol mehanisms, e.g. firewalls, aim to develop a defensive shield around IT systems to seure them. The detetive ontrol mehanisms try to detet the intrusions when they our. Although preventive ontrol onstitutes an important aspet of IT seurity arhiteture, it is extremely diffiult to build an IT system that is absolutely seure. Detetion-based seurity has beome an important element in overall seurity arhiteture beause IT systems are unproteted without detetive ontrols one intruders manage to break the firewall. Thus, detetion based systems omplement the perimeter seurity by identifying intrusions from both insiders and outsiders. Intrusion Detetion Systems (IDS) are one of the most ommon detetion approahes used by firms. The goal of these systems is to identify, in real time, unauthorized use, misuse, or abuse of omputer systems. They give warning signals when they detet something suspiious, anomalous, or illegal. Sine the signal is not perfet, manual monitoring of log files and audit trails is required to distinguish true alarms from false ones. In addition, manual monitoring is neessary to identify the type of attak the system is under, thereby making it possible to take ations to minimize the damage that ould be inflited on systems Eighth Amerias Conferene on Information Systems

3 Cavusoglu et al./assessing the Value of Detetive Control in IT Seurity Despite the eonomi importane of IT seurity to organizations, very little aademi researh has been devoted to analyze the issue from an eonomi perspetive. Most of the aademi researh on IT seurity has foused on seurity tehnology, suh as the development of algorithms for use in the IDS. An assessment of the value of the IT seurity tehnology is ritial to both firms employing this tehnology as well as firms that develop the tehnology. We seek to understand the eonomi value of different omponents of IT seurity arhiteture and the drivers of the value in order to provide normative guidelines to deision makers in the IT seurity domain. To that end, we first investigate the value of IDS within an IT arhiteture that has firewalls on one side and manual monitoring on the other side surrounding the IDS. We believe that ours is the first study that investigates the IT seurity arhiteture from an eonomi standpoint. We derive the value of IDS by omparing two ases. In the first ase, we fous on an arhiteture that doesn t employ IDS to detet intrusions. Manual monitoring of the system log files and audit trials is the only way to detet intrusions in this senario. In the seond ase, we examine the situation in whih an IDS assists in the detetion of intrusions. The firm that employs the IDS also uses manual monitoring beause the signals from the IDS are imperfet. The objetive in both ases is to minimize total organizational loss, whih inludes the ost of intrusions, both undeteted and deteted, and the ost of manual monitoring. In addition to proposing normative guidelines to the firms, suh as the frequeny of monitoring, we are able to haraterize onditions where the use of the IDS is benefiial to the firm in terms of reduing the total organizational loss. We find that the value of the IDS depends ritially on (i) benefit to ost ratio of intrusion for the haker, (ii) ost to benefit ratio of monitoring for the firm, and (iii) the false-positive and false-negative rates of the IDS. The positive value of IDS is the result of better detetion of intrusions and inreased deterrene to hakers by IDS. A surprising result of our analysis is that in some regions of the parameter spae, IDS inreases the haking ativity, and onsequently, the firm loated in those regions is better off not employing IDS. We also derive valuable insights about the impat of IDS design parameters for IDS developers. Intrusion Detetion Systems An intrusion in the IT seurity ontext an be defined as any set of ations that attempts to ompromise the onfidentiality, integrity and availability of a resoure (Lodin 999). Intrusion detetion systems are software and/or hardware systems that automate the proess of monitoring the events ourring in omputer systems or network segments, and analyze them for signs of intrusions. In reent years, IDS have been aepted as the major tool for the detetion of attaks when the perimeter seurity is breahed or when an internal user initiates the attaks. Aording to International Data Corp. (IDC), the market for the IDS has grown from about $0 million in 997 to $00 million in 999 and is projeted to reah $58 million by 005 (Messmer 999). An IDS uses audit trails and network pakets to detet intrusions. Audit trails store patterns of aess to individual objets and histories of events and individuals (National Computer Seurity Center 988). Audit trails store information suh as date and time of the event, type of the event, origin of the request, and objets aessed, modified or deleted. IDS are lassified as network-based or host-based depending on where they are utilized (Mukherjee et al. 994). There are two primary approahes that IDS use to analyze events in order to detet attaks: Signature-based detetion and anomaly detetion (MHugh et al. 000). Signature-based detetion looks for events that math a predefined pattern of events, alled as signatures, assoiated with a known attak. Anomaly detetion tehniques use a normal ativity profile for a system and flag all system states varying from the established profile in a statistially signifiant manner. IDS are typially deployed within a system proteted by firewalls and other aess ontrol mehanisms at the periphery. Firewalls attempt to prevent intrusions from external hakers. IDS attempt to detet intrusions from internal users as well as external hakers who have suessfully raked the firewalls. An IDS runs ontinually in the bakground, and only notifies when it detets something it onsiders suspiious, anomalous, or illegal. Following a signal from the IDS, a seurity analyst examines audit trails and log files of system resoures to determine the type and the extent of the attak. If an intrusion is onfirmed by the manual investigation, appropriate orretive measures are undertaken to limit further damage and reover, if possible, the damage already inurred. Like other seurity mehanisms, IDS are not perfet. The likelihood of giving a warning signal upon an intrusion and being silent in ase of no intrusion depends on various fators. The design of IDS, that inludes the tehnology used (signature-based versus anomaly-based), and design parameters (for example, the aeptable noise level in an anomaly-based system) and the onfiguration (strit versus loose) plays a signifiant role. The quality of an IDS an be measured using its false positive and false negative rates. A false positive ours when the system lassifies an ation as a possible intrusion when it is a legitimate ation. A false negative ours when an atual intrusion has ourred but the system doesn t lassify it as an intrusion. 00 Eighth Amerias Conferene on Information Systems 9

4 Network and Internet Seurity Model Desription Our goal is to analyze the value of IDS for IT seurity using a simple model that aptures the essene of a typial IT seurity environment disussed in the previous setion. To that goal we make ertain simplifying assumptions. In most IT environments there are two general ategories of assets relevant to the assessments of seurity risk: tangible assets and intangible assets. Tangible assets inlude hardware. Intangible assets, whih might be better haraterized as information assets, are omprised of data and software. Our model is most relevant for risks assoiated with intangible assets suh as illegal aess of information. We assume that when an intrusion ours, the amount of damage is distributed with probability density f(.) with mean d and a finite variane known to both the firm and the intruder with support on (0,d max ). Most ompanies estimate these possible damages along with their likelihoods in the IT seurity risk assessment phase (Tudor 00). A fration 8 of the user traffi (both internal and external) that reahes the IDS is assumed to be dishonest. It is assumed that external intruders login to the system as authorized users, and hene, the IDS annot distinguish between external intruders and dishonest internal users. Previous studies have shown that inentives for intruders are usually not related to a finanial gain. Hakers tend to be motivated by uriosity, self-esteem, vandalism, peer approval, publi attention, tehnial prowess, and politis (Shaw et al. 999; Koerner 999; Rothke 000). Thus, we assume that when the haker breaks into the system he gets a fixed utility of ì. The dominant strategy of the honest users is not to misuse the system. If an intrusion is disovered, the haker inurs a penalty. The penalty is omposed of two omponents: A fixed penalty $ and a variable penalty proportional to the expeted amount of damage, (d. The fixed penalty an be onsidered as the ost of legal proseution and soial humiliation. The variable penalty term reflets the fat that the legal system awards punishments to fit the rime (Niholson et al. 000). Hene, a larger damage results in a larger penalty. Most organizations detet intrusion through some form of monitoring and analysis of audit trails (h8 pg 3 NIST 800-). Manual monitoring takes the form of a seurity team thoroughly investigating or randomly heking system log files and audit trials for possible intrusions. In general, manual monitoring is too ostly to be done all the time and is done intermittently. The firm inurs a ost of eah time it performs a manual monitoring of the audit trail of a user for a possible intrusion. Manual monitoring done by the firm does not detet intrusion with ertainty. This imperfetion of monitoring is aptured by an effetiveness parameter ", the probability with whih monitoring detets a true intrusion. 3 If manual monitoring detets the intrusion, the firm reovers a fration of the damage by the intruder without any additional ost. This fration is aptured by the parameter, N. Sine manual monitoring is quite labor intensive and too ostly to be done all the time, ompanies supplement manual monitoring with the IDS to redue the ost of monitoring and inrease the effetiveness of intrusion detetion. As disussed before (IDS setion), IDS use the audit trails and send a warning signal for further investigation by seurity investigation team. Sine IDS are not perfet and produe both false positive and false negative errors, we model the effetiveness of IDS through two parameters q and q. The parameter q denotes the probability that the IDS gives a warning signal whenever an intrusion ours. We assume that the IDS performs better than random guessing, and so q lies between 0.5 and. That is, ( q ) represents the probability of false negative. Sometimes the system lassifies an ation as a legitimate ation (false positive). The omplement of q, ( q ), reflets the probability of a false positive signal. Thus q represents the probability that there is no signal when there is no intrusion. It is also assumed to be between 0.5 and for the same reason as q. We onsider two different senarios based on whether the firm has employed the IDS or not. In Senario (baseline senario), the firm does not have the IDS in its seurity arhiteture. The firm solely relies on manual monitoring of system log files and audit trials to detet intrusive ativity. In Senario the firm uses the IDS in the seurity arhiteture to omplement the manual monitoring. We assume 8 to be exogenous in our model. Theoretially, 8 an be ontrolled by appropriately onfiguring the firewalls to limit entry by outsiders, and by hiring ethial employees to limit the proportion of insider hakers. Although there are some minor differenes between the terms haker, raker and intruder, these terms will be used interhangeably in this paper to desribe people who intentionally ompromise omputer systems. 3 We assume that the use of IDS does not alter either the ost or the effetiveness of manual monitoring beause urrent IDS do not provide omprehensive information about the intrusion to hange the parameters (pg. 4 Bae 000). In Setion 6, we disuss the impliations of a potential redution in and/or an inrease in " that may be realized if the tehnology underlying IDS improves in the future Eighth Amerias Conferene on Information Systems

5 Cavusoglu et al./assessing the Value of Detetive Control in IT Seurity Model Analysis No IDS Case (Baseline Senario) In this setion we analyze the baseline senario in whih IDS is not used in the seurity arhiteture of the firm. This will allow us to establish a benhmark result that an be ompared with a senario in whih the firm uses an IDS. We depit the baseline senario in figure. honest (-? ) 4 monitor (? ) no hak (-? ) not monitor (-? ) dishonest (? ) hak (? ) 3 monitor (? ) not monitor (-? ) Figure. The Game Tree for Intrusion Detetion Game without the IDS In the game above the ation set of the dishonest user is speified by S th 0 {no intrusion, intrusion}, where intrusion denotes to break into a system to ause an expeted damage d. The pure strategy of the dishonest user is to selet intrusion or no intrusion with probability one. The mixed strategy spae for the dishonest user is a probability distribution R {intrusion, no intrusion} [0,] where R denotes the probability of intrusion. Similarly the mixed strategy spae for the firm an be defined likewise. We denote the probability of monitoring in any mixed strategy by D. When implementing pure strategies, the firm either always inspets log files or ignores them ompletely. In mixed strategies, the firm hooses to inspet randomly with probability p. Analysis and Results of Case The objetive of the haker is to maximize his expeted payoff while the firm tries to minimize the total organizational losses due to haking. The payoff funtion for the firm is F ( ρψ, ) = ρ λψ( ρ) d λψρ( α) d + λψρα ( φ ) d () The first term in () is the expeted monitoring ost. The seond term is the ost of not inspeting intrusions. The third term orresponds to the ost of ineffetive monitoring (monitoring that is not able to ath haking). The fourth term denotes the expeted un-reovered loss from deteted intrusions. A haker s expeted payoff is H ( ρ, ψ ) = ψ ψρα( β + γd ) () The first term in () is the expeted utility of the haker from intrusions. The seond term is the expeted ost to the haker if intrusions are deteted. Next we summarize the equilibrium strategies for the firm and the intruder in the following proposition. 00 Eighth Amerias Conferene on Information Systems 93

6 Network and Internet Seurity Proposition : The following Nash Equilibria obtains in Case. Equilibria < 8 dαφ α ( β + γ d ) > D =, R = < ρ =, ψ = α( β + γ d ) α( β + γ d ) dαφλ dαφ > 8 D =, R = 0 IDS Case This ase differs from the preeding ase in that an IDS is now a part of the seurity arhiteture. The game tree for this ase is depited in figure. The differene between the game trees of ases and is that in ase there is an additional level before the firm s deision to investigate manually where the IDS provides a signal about possible intrusive ativities. Analysis and Results of Case We define 0 # D # as the probability of monitoring given a signal and 0 # D # as the probability of monitoring given no signal. Thus, ( D ) denotes the probability of not monitoring given a signal, and ( D ) the probability of not monitoring given there is no signal. When D i = {0,} implies pure strategies, and 0 < D i < implies mixed strategies for i =,. When the firm observes a signal or no signal from the IDS, it updates its belief using Bayes rule. If the firm gets a signal from IDS, it determines the posterior probability of intrusion qψλ η=p(intrusion signal)= (3) qψλ + ( q )( ψλ) Similarly, when the firm does not get any signal from the IDS, it alulates the probability as ( q ) ψλ η = P(intrusion no-signal) = ( q ) + q ( ) ψλ ψλ (4) The payoff funtion for the firm depends on the state it is in. The payoff funtions for the signal and the no signal states respetively are as follows. F ( ρ, ψ) = ρ η ( ρ ) d η ρ (( α) d + α( φ) d) (5) S [ ] [ ] F ( ρ, ψ) = ρ η ( ρ ) d η ρ (( α) d + α( φ) d) N The probabilities of the firm being in the signal and no signal state are ( q ψλ( q + q )) respetively. Thus, the firm s expeted payoff at node is given by ( q + ψλ( q + q )) F( ρ, ρ, ψ) = ( q + ψλ( q + q )) F ( ρ, ψ) + ( q ψλ( q + q )) F ( ρ, ψ) S N The intruder s expeted payoff is H ( ρ, ρ, ψ) = ψ ψα( β + γd)( ρ q + ρ ( q )) (6) and (7) (8) Now we present the equilibria for the IDS ase Eighth Amerias Conferene on Information Systems

7 Cavusoglu et al./assessing the Value of Detetive Control in IT Seurity 4 no signal (q ) 8 monitor (? ) not monitor (-? ) honest (-? ) dishonest (λ) not hak (-? ) signal (-q ) no signal (-q ) 7 I 6 monitor (? ) not monitor (-? ) monitor (? ) hak (? ) 3 not monitor (-? ) signal (q ) 5 monitor (? ) I not monitor (-? ) Figure. The Game Tree for Intrusion Detetion Game with IDS Proposition. The following Nash equilibria obtains in ase Equilibria a dαφ < a < < a dαφ dαφ > a α β > ( + γ d ) R =, D =, D = R = D =, D =0 R =, D =0, D =0 q α( β + γd ) < < q ψ = q ( + q ) λ + ( q) dαφλ qα( β + γd) ρ = ( q ) α( β + γ d) < q α( β + γd ) ( q) ψ = qdαφλ ( q + q ) λ ρ =, q α( β + γ d) ρ = 0 00 Eighth Amerias Conferene on Information Systems 95

8 Network and Internet Seurity where, a ( q) λ = and ( q ) λ + q ( λ) a = q λ + qλ q )( λ) ( Value of the IDS Figure 3 illustrates the value of IDS graphially. It highlights some interesting results. In most of the parameter spae, IDS either dereases or doesn t affet the firm s loss. The positive value of IDS in several regions is intuitive. The regions where there is no hange to firm s loss when IDS is deployed orresponds to the extreme high monitoring ost and high haker utility ases in whih the firm s and haker s strategies are unaffeted by the presene of IDS. In region and some part of region 3 IDS has a detrimental effet on total organizational loss, that is, the use of the IDS inreases total loss. As q and q approah one, meaning that as the firm employs a more effetive IDS, regions and 3 shrink, and region fills up that spae. In regions, 5, 6, and 7, the use of the IDS ertainly redues the total organizational loss. In regions 4 and 8, sine equilibrium strategies for the firm and the intruder are the same under both ases, the total organizational loss is the same too, as expeted. Hene there is no additional value from signal from the IDS. However as q approahes one, a goes to zero, and region 5 expands to over region 4 while region 4 disappears. Similarly a approahes one as q approahes one. Hene, as the quality of IDS improves, the value assoiated with the IDS beomes positive for more firms as long as the ost of monitoring is lower than expeted benefit from it (i.e. < dαφ ). In all other ases the firm will never monitor, hene the value of employing the IDS as a seurity tool will be zero. αβγ () + d IDS dereases the organizational loss IDS has no effet on the organizational loss 3 IDS inreases the organizational loss q 7 λ a a 0 a dαφ Figure 3. The Value of IDS for Different Equilibria Regions Managerial Impliations In this setion, we disuss the impliations of our results for firms that seek to employ the IDS and those that develop IDS. We fous only on regions,, and 7 in disussing the impliations. Our hoie of these regions is motivated by the fat that only in these regions the more interesting mixed strategy equilibria our with the IDS. In other regions, either all users hak or no user haks. We assume that these senarios are uninteresting Eighth Amerias Conferene on Information Systems

9 Cavusoglu et al./assessing the Value of Detetive Control in IT Seurity Impliation for IDS Deployers A signifiant impliation of our results is that not all firms benefit by deploying IDS. The loation of the firm in the parameter spae determines whether it benefits from IDS and the extent of benefit. The loation of a firm in the parameter spae depends ritially on the expeted damage d, among other fators. A firm with a higher value of d is riskier in some sense beause it has more to lose from an intrusion. If d for a firm inreases, assuming all other parameters remain the same, the firm ultimately moves into region, in whih the firm realizes a positive value from the IDS. Thus, high-risk firms are more likely to benefit by employing IDS. We an also show that the value of the IDS is inreasing in d in regions and 7 implying that higher-risk firms benefit more from IDS than lower-risk firms. However, if the haker and firm profiles are suh that the firm is loated in region, employing IDS hurts the firm. Firms that have a higher d are hurt more when using IDS within this region. The value of the IDS is inreasing in q and q in regions and 7. Thus, a redution in the rates of false positives and/or false negatives (i.e., a higher quality IDS) helps the firms that find IDS to be benefiial. An inrease in q and q has the opposite effet in region similar to the effet of d disussed in the previous paragraph but redues the region itself. These results are onsistent with our intuition. We find that the proportion of hakers in the user population 8 doesn t affet the value of IDS within regions and. However, note that an inrease in 8 expands the total size of regions and 7, indiating an inrease in the likelihood of a firm being loated in these regions (and, hene realizing positive value from the IDS). The value of IDS is inreasing in 8 in region 7. This result also implies that if a firm loated in region 7 an redue 8 by employing a tighter firewall and by hiring honest employees, then the firm will find the IDS less valuable. This result is also intuitive. Preventive ontrol mehanisms derease the need for detetive ontrols suh as the IDS. Thus, the firewall an substitute the IDS to some extent in region 7. However, tighter firewalls also require substantial investment and may have negative onsequenes by preventing legitimate users from getting to systems. Thus, firms have to arefully analyze the relative ost of investments for firewall and the IDS mehanisms before deiding on seurity arhiteture. Probability of detetion either inreases or remains the same if the IDS has a positive effet on the firm. In region 7, use of the IDS inreases the detetion probability whereas it does not hange the detetion probability in region, meaning that the IDS not only redues total organizational loss but also improves detetion of intrusions in these regions. However, in region, in whih the value of the IDS is negative, when the IDS is employed, the probability of detetion inreases only if effetiveness of manual monitoring is higher than probability of signal when there is an intrusion, and dereases otherwise. Impliations for IDS Developers A signifiant insight from our analysis for the IDS developers relates to the priing of IDS. The prie of IDS, being information goods with negligible marginal prodution ost, is dependent primarily on their value to firms. Sine the value is higher for firms with higher d, IDS developers may realize substantial benefits by targeting higher-risk firms. Also, industries that attrat a high proportion of hakers (i.e., high 8), suh as defense and finanial institutions, are likely to have more firms loated in regions and 7. The IDS developers an realize substantial profits if they an design IDS speifially for these industries by analyzing the intrusion patterns and nature of information assets to be proteted. We noted earlier that the value of the IDS to firms that benefit from the IDS inreases with q and q. Thus, an IDS developer an potentially harge a higher prie for a higher quality produt. A higher quality IDS will also result in a larger market for the IDS beause we find that as q and/or q inreases, the size of regions in whih the IDS has positive value inreases. So, more firms would implement the IDS in their seurity arhiteture. A higher quality IDS inreases the prie as well as demand, and hene the revenue for IDS developers. Thus, our result suggests that the IDS developers should improve the quality of the IDS in both these dimensions. However, it should be noted that the tehnology employed by the IDS, that is, whether the detetion algorithm is based on signature analysis or anomaly detetion, affets the q and q values. Depending on the tehnology used, it may be diffiult to improve both q and q simultaneously. An inrease in q may derease q and vie versa. Researh on IDS algorithms suggests that there may indeed be a negative orrelation between q and q (Axelsson 000). An interesting issue that needs to be investigated is the design of the optimal IDS based on the value of the IDS derived in this paper and osts of improving q and q. Although both q and q have positive effets on the value of IDS to firms, it is important to note that the extents of their effets are not equal. We find that, for firms that find IDS to be benefiial, the marginal inrease in value from a unit inrease in q is 00 Eighth Amerias Conferene on Information Systems 97

10 Network and Internet Seurity greater than the marginal inrease in value from a unit inrease in q. This result suggests that IDS developers should try to improve q to generate additional revenue from IDS users. On the other hand, while an inrease in q doesn t inrease the market size (i.e., the number of firms that realize positive value from IDS), an inrease in q inreases the market size. Thus, IDS developers are faed with a tradeoff between inreasing q or q. An IDS developer should arefully weigh in the benefits of inreasing the market size vis-à-vis the benefits of inreasing the value to users who benefit from IDS when designing IDS. Many of the ommerial IDS are passive in the sense that their primary goal is to provide signals about possible intrusions. Only manual monitoring onfirms whether there is an intrusion. The IDS also do not provide omprehensive information that redues the effort needed in manual monitoring for onfirming or rejeting the intrusion. If IDS play a more ative role and thus redue the ost of subsequent monitoring or inrease the effetiveness of manual monitoring ", we an show that the value of IDS inreases substantially. A derease in not only inreases the value but also the market size for IDS. Thus, it is worthwhile for the IDS developers to embed intelligene into the IDS in order to provide more support in the subsequent manual monitoring proess. Conlusion IT seurity has beome a ritial issue for many firms. IDS play a signifiant role within a firm s seurity arhiteture. This paper investigated the value of IDS to firms. We derived the value of IDS by analyzing two ases. In the first ase, we foused on a firm that doesn t employ IDS. Manual monitoring of the system log files and audit trials is the only way to detet intrusions in this ase. In the seond ase, we analyzed a firm that uses IDS. The IDS omplement manual monitoring by giving signals about possible intrusions. We derived the value of the IDS by determining the savings realized by the firm when it employs the IDS ompared to the ase when no IDS is used. We determined the onditions when the use of the IDS is benefiial to firms and when it is not. We also provided several impliations of our results to the firms and to the IDS developers. We made ertain simplifying assumptions to model the role of IDS in an organization s IT arhiteture. Sine formal modeling relies on abstration to address some issues in a stylized setting, limitations are inherent to the modeling proess. However analysis of an abstrat model an help us understand, explain, and predit issues in realisti settings. Future researh may try to model a riher IT seurity arhiteture inluding simultaneous design of multiple levels of preventive and detetive ontrols. Other researh avenues exist in adapting this model to different ontexts, suh as investment in IDS tehnology to improve the effetiveness of IDS. Notwithstanding these potentially attrative avenues for further researh, the present study provides useful insights into how valuable IDS is in a firm s IT seurity arhiteture and impliations for better IDS design and onfiguration. Referenes Axelsson, S. The Base-Rate Falllay and the Diffiulty of Intrusion Detetion, ACM Transations on Information and System Seurity, 3, 3, August 000. Bae, R. G. Intrusion Detetion, Mamillan Tehnial Publishing, 000. Koerner, B. I., Who are hakers, anyway?, U.S News & World Report, 7,, 53, July 4, 999. Lodin S. Intrusion Detetion Produt Evaluation Criteria, Computer Seurity Journal, 5, -0, 999. MHugh, J., Christie A. C., and Allen J. Defending Yourself: The Role of Intrusion Detetion Systems, IEEE Software, September/Otober 000. Messmer, E. Network Intruders, Network World, 6, 67, Ot. 4, 999. Mukherjee, B., Heberlein L. T., and Levitt K. N. Network Intrusion Detetion, IEEE Network, May/June 994. National Computer Seurity Center, A guide to Understanding Audit in Trusted Systems, NCSC-TG-00, Version, June 988. Niholson, L. J., Shebar T. F., and Weinberg M. R. Computer Crimes, The Amerian Criminal Law Review, Chiago, Spring 000. NIST Publiation 800-, An Introdution to Computer Seurity, NIST, 996. Power, R. 00 CSI/FBI Computer Crime and Seurity Survey, Computer Seurity Issues and Trends, 8,, 00. Rothke, B. Hakers then and now: Answers to Some Perennial Questions, Computer Seurity Journal, 6, 3, -4, 000. Shaw, D. S., Post J. M., and Ruby K. G. Inside the Minds of the Insider, Seurity Management, 34-44, De Tudor, J. K., Information Seurity Arhiteture, Auerbah Publiations, 00. Verton, D., Attorneys Debate Making Cyberrime Laws Tougher, Computerworld, 6, Nov. 0, Eighth Amerias Conferene on Information Systems

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract

Learning Convention Propagation in BeerAdvocate Reviews from a etwork Perspective. Abstract CS 9 Projet Final Report: Learning Convention Propagation in BeerAdvoate Reviews from a etwork Perspetive Abstrat We look at the way onventions propagate between reviews on the BeerAdvoate dataset, and

More information

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1.

Abstract. Key Words: Image Filters, Fuzzy Filters, Order Statistics Filters, Rank Ordered Mean Filters, Channel Noise. 1. Fuzzy Weighted Rank Ordered Mean (FWROM) Filters for Mixed Noise Suppression from Images S. Meher, G. Panda, B. Majhi 3, M.R. Meher 4,,4 Department of Eletronis and I.E., National Institute of Tehnology,

More information

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2

On - Line Path Delay Fault Testing of Omega MINs M. Bellos 1, E. Kalligeros 1, D. Nikolos 1,2 & H. T. Vergos 1,2 On - Line Path Delay Fault Testing of Omega MINs M. Bellos, E. Kalligeros, D. Nikolos,2 & H. T. Vergos,2 Dept. of Computer Engineering and Informatis 2 Computer Tehnology Institute University of Patras,

More information

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization

Self-Adaptive Parent to Mean-Centric Recombination for Real-Parameter Optimization Self-Adaptive Parent to Mean-Centri Reombination for Real-Parameter Optimization Kalyanmoy Deb and Himanshu Jain Department of Mehanial Engineering Indian Institute of Tehnology Kanpur Kanpur, PIN 86 {deb,hjain}@iitk.a.in

More information

Pipelined Multipliers for Reconfigurable Hardware

Pipelined Multipliers for Reconfigurable Hardware Pipelined Multipliers for Reonfigurable Hardware Mithell J. Myjak and José G. Delgado-Frias Shool of Eletrial Engineering and Computer Siene, Washington State University Pullman, WA 99164-2752 USA {mmyjak,

More information

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger.

- 1 - S 21. Directory-based Administration of Virtual Private Networks: Policy & Configuration. Charles A Kunzinger. - 1 - S 21 Diretory-based Administration of Virtual Private Networks: Poliy & Configuration Charles A Kunzinger kunzinge@us.ibm.om - 2 - Clik here Agenda to type page title What is a VPN? What is VPN Poliy?

More information

Video Data and Sonar Data: Real World Data Fusion Example

Video Data and Sonar Data: Real World Data Fusion Example 14th International Conferene on Information Fusion Chiago, Illinois, USA, July 5-8, 2011 Video Data and Sonar Data: Real World Data Fusion Example David W. Krout Applied Physis Lab dkrout@apl.washington.edu

More information

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY

COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY COST PERFORMANCE ASPECTS OF CCD FAST AUXILIARY MEMORY Dileep P, Bhondarkor Texas Instruments Inorporated Dallas, Texas ABSTRACT Charge oupled devies (CCD's) hove been mentioned as potential fast auxiliary

More information

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System

Algorithms, Mechanisms and Procedures for the Computer-aided Project Generation System Algorithms, Mehanisms and Proedures for the Computer-aided Projet Generation System Anton O. Butko 1*, Aleksandr P. Briukhovetskii 2, Dmitry E. Grigoriev 2# and Konstantin S. Kalashnikov 3 1 Department

More information

Approximate logic synthesis for error tolerant applications

Approximate logic synthesis for error tolerant applications Approximate logi synthesis for error tolerant appliations Doohul Shin and Sandeep K. Gupta Eletrial Engineering Department, University of Southern California, Los Angeles, CA 989 {doohuls, sandeep}@us.edu

More information

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR

A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Malaysian Journal of Computer Siene, Vol 10 No 1, June 1997, pp 36-41 A DYNAMIC ACCESS CONTROL WITH BINARY KEY-PAIR Md Rafiqul Islam, Harihodin Selamat and Mohd Noor Md Sap Faulty of Computer Siene and

More information

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating

Capturing Large Intra-class Variations of Biometric Data by Template Co-updating Capturing Large Intra-lass Variations of Biometri Data by Template Co-updating Ajita Rattani University of Cagliari Piazza d'armi, Cagliari, Italy ajita.rattani@diee.unia.it Gian Lua Marialis University

More information

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks

Uplink Channel Allocation Scheme and QoS Management Mechanism for Cognitive Cellular- Femtocell Networks 62 Uplink Channel Alloation Sheme and QoS Management Mehanism for Cognitive Cellular- Femtoell Networks Kien Du Nguyen 1, Hoang Nam Nguyen 1, Hiroaki Morino 2 and Iwao Sasase 3 1 University of Engineering

More information

Multi-Channel Wireless Networks: Capacity and Protocols

Multi-Channel Wireless Networks: Capacity and Protocols Multi-Channel Wireless Networks: Capaity and Protools Tehnial Report April 2005 Pradeep Kyasanur Dept. of Computer Siene, and Coordinated Siene Laboratory, University of Illinois at Urbana-Champaign Email:

More information

A {k, n}-secret Sharing Scheme for Color Images

A {k, n}-secret Sharing Scheme for Color Images A {k, n}-seret Sharing Sheme for Color Images Rastislav Luka, Konstantinos N. Plataniotis, and Anastasios N. Venetsanopoulos The Edward S. Rogers Sr. Dept. of Eletrial and Computer Engineering, University

More information

Extracting Partition Statistics from Semistructured Data

Extracting Partition Statistics from Semistructured Data Extrating Partition Statistis from Semistrutured Data John N. Wilson Rihard Gourlay Robert Japp Mathias Neumüller Department of Computer and Information Sienes University of Strathlyde, Glasgow, UK {jnw,rsg,rpj,mathias}@is.strath.a.uk

More information

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines

The Minimum Redundancy Maximum Relevance Approach to Building Sparse Support Vector Machines The Minimum Redundany Maximum Relevane Approah to Building Sparse Support Vetor Mahines Xiaoxing Yang, Ke Tang, and Xin Yao, Nature Inspired Computation and Appliations Laboratory (NICAL), Shool of Computer

More information

A radiometric analysis of projected sinusoidal illumination for opaque surfaces

A radiometric analysis of projected sinusoidal illumination for opaque surfaces University of Virginia tehnial report CS-21-7 aompanying A Coaxial Optial Sanner for Synhronous Aquisition of 3D Geometry and Surfae Refletane A radiometri analysis of projeted sinusoidal illumination

More information

Partial Character Decoding for Improved Regular Expression Matching in FPGAs

Partial Character Decoding for Improved Regular Expression Matching in FPGAs Partial Charater Deoding for Improved Regular Expression Mathing in FPGAs Peter Sutton Shool of Information Tehnology and Eletrial Engineering The University of Queensland Brisbane, Queensland, 4072, Australia

More information

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425)

Automatic Physical Design Tuning: Workload as a Sequence Sanjay Agrawal Microsoft Research One Microsoft Way Redmond, WA, USA +1-(425) Automati Physial Design Tuning: Workload as a Sequene Sanjay Agrawal Mirosoft Researh One Mirosoft Way Redmond, WA, USA +1-(425) 75-357 sagrawal@mirosoft.om Eri Chu * Computer Sienes Department University

More information

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations

Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations Fine-Grained Capabilities for Flooding DDoS Defense Using Client Reputations ABSTRACT Maitreya Natu University of Delaware 103 Smith Hall Newark, DE 19716, USA natu@is.udel.edu Reently proposed apability

More information

Defect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing

Defect Detection and Classification in Ceramic Plates Using Machine Vision and Naïve Bayes Classifier for Computer Aided Manufacturing Defet Detetion and Classifiation in Cerami Plates Using Mahine Vision and Naïve Bayes Classifier for Computer Aided Manufaturing 1 Harpreet Singh, 2 Kulwinderpal Singh, 1 Researh Student, 2 Assistant Professor,

More information

A Novel Validity Index for Determination of the Optimal Number of Clusters

A Novel Validity Index for Determination of the Optimal Number of Clusters IEICE TRANS. INF. & SYST., VOL.E84 D, NO.2 FEBRUARY 2001 281 LETTER A Novel Validity Index for Determination of the Optimal Number of Clusters Do-Jong KIM, Yong-Woon PARK, and Dong-Jo PARK, Nonmembers

More information

Introduction to Seismology Spring 2008

Introduction to Seismology Spring 2008 MIT OpenCourseWare http://ow.mit.edu 1.510 Introdution to Seismology Spring 008 For information about iting these materials or our Terms of Use, visit: http://ow.mit.edu/terms. 1.510 Leture Notes 3.3.007

More information

Acoustic Links. Maximizing Channel Utilization for Underwater

Acoustic Links. Maximizing Channel Utilization for Underwater Maximizing Channel Utilization for Underwater Aousti Links Albert F Hairris III Davide G. B. Meneghetti Adihele Zorzi Department of Information Engineering University of Padova, Italy Email: {harris,davide.meneghetti,zorzi}@dei.unipd.it

More information

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments

RAC 2 E: Novel Rendezvous Protocol for Asynchronous Cognitive Radios in Cooperative Environments 21st Annual IEEE International Symposium on Personal, Indoor and Mobile Radio Communiations 1 RAC 2 E: Novel Rendezvous Protool for Asynhronous Cognitive Radios in Cooperative Environments Valentina Pavlovska,

More information

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5

CA Privileged Identity Manager r12.x (CA ControlMinder) Implementation Proven Professional Exam (CAT-480) Study Guide Version 1.5 Proven Professional Exam (CAT-480) Study Guide Version 1.5 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer

More information

Gray Codes for Reflectable Languages

Gray Codes for Reflectable Languages Gray Codes for Refletable Languages Yue Li Joe Sawada Marh 8, 2008 Abstrat We lassify a type of language alled a refletable language. We then develop a generi algorithm that an be used to list all strings

More information

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT

DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT DETECTION METHOD FOR NETWORK PENETRATING BEHAVIOR BASED ON COMMUNICATION FINGERPRINT 1 ZHANGGUO TANG, 2 HUANZHOU LI, 3 MINGQUAN ZHONG, 4 JIAN ZHANG 1 Institute of Computer Network and Communiation Tehnology,

More information

CleanUp: Improving Quadrilateral Finite Element Meshes

CleanUp: Improving Quadrilateral Finite Element Meshes CleanUp: Improving Quadrilateral Finite Element Meshes Paul Kinney MD-10 ECC P.O. Box 203 Ford Motor Company Dearborn, MI. 8121 (313) 28-1228 pkinney@ford.om Abstrat: Unless an all quadrilateral (quad)

More information

with respect to the normal in each medium, respectively. The question is: How are θ

with respect to the normal in each medium, respectively. The question is: How are θ Prof. Raghuveer Parthasarathy University of Oregon Physis 35 Winter 8 3 R EFRACTION When light travels from one medium to another, it may hange diretion. This phenomenon familiar whenever we see the bent

More information

Accommodations of QoS DiffServ Over IP and MPLS Networks

Accommodations of QoS DiffServ Over IP and MPLS Networks Aommodations of QoS DiffServ Over IP and MPLS Networks Abdullah AlWehaibi, Anjali Agarwal, Mihael Kadoh and Ahmed ElHakeem Department of Eletrial and Computer Department de Genie Eletrique Engineering

More information

Cluster-Based Cumulative Ensembles

Cluster-Based Cumulative Ensembles Cluster-Based Cumulative Ensembles Hanan G. Ayad and Mohamed S. Kamel Pattern Analysis and Mahine Intelligene Lab, Eletrial and Computer Engineering, University of Waterloo, Waterloo, Ontario N2L 3G1,

More information

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3

CA Service Desk Manager 14.x Implementation Proven Professional Exam (CAT-181) Study Guide Version 1.3 Exam (CAT-181) Study Guide Version 1.3 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

CS269I: Incentives in Computer Science Lecture #19: Time-Inconsistent Planning

CS269I: Incentives in Computer Science Lecture #19: Time-Inconsistent Planning CS269I: Inentives in Computer Siene Leture #9: Time-Inonsistent Planning Tim Roughgarden Deember 5, 26 Utility Theory and Behavioral Eonomis In almost all of the models that we ve studied in this ourse,

More information

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study

What are Cycle-Stealing Systems Good For? A Detailed Performance Model Case Study What are Cyle-Stealing Systems Good For? A Detailed Performane Model Case Study Wayne Kelly and Jiro Sumitomo Queensland University of Tehnology, Australia {w.kelly, j.sumitomo}@qut.edu.au Abstrat The

More information

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller

Trajectory Tracking Control for A Wheeled Mobile Robot Using Fuzzy Logic Controller Trajetory Traking Control for A Wheeled Mobile Robot Using Fuzzy Logi Controller K N FARESS 1 M T EL HAGRY 1 A A EL KOSY 2 1 Eletronis researh institute, Cairo, Egypt 2 Faulty of Engineering, Cairo University,

More information

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method

Multiple-Criteria Decision Analysis: A Novel Rank Aggregation Method 3537 Multiple-Criteria Deision Analysis: A Novel Rank Aggregation Method Derya Yiltas-Kaplan Department of Computer Engineering, Istanbul University, 34320, Avilar, Istanbul, Turkey Email: dyiltas@ istanbul.edu.tr

More information

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays

Analysis of input and output configurations for use in four-valued CCD programmable logic arrays nalysis of input and output onfigurations for use in four-valued D programmable logi arrays J.T. utler H.G. Kerkhoff ndexing terms: Logi, iruit theory and design, harge-oupled devies bstrat: s in binary,

More information

Boosted Random Forest

Boosted Random Forest Boosted Random Forest Yohei Mishina, Masamitsu suhiya and Hironobu Fujiyoshi Department of Computer Siene, Chubu University, 1200 Matsumoto-ho, Kasugai, Aihi, Japan {mishi, mtdoll}@vision.s.hubu.a.jp,

More information

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis

Design Implications for Enterprise Storage Systems via Multi-Dimensional Trace Analysis Design Impliations for Enterprise Storage Systems via Multi-Dimensional Trae Analysis Yanpei Chen, Kiran Srinivasan, Garth Goodson, Randy Katz University of California, Berkeley, NetApp In. {yhen2, randy}@ees.berkeley.edu,

More information

The AMDREL Project in Retrospective

The AMDREL Project in Retrospective The AMDREL Projet in Retrospetive K. Siozios 1, G. Koutroumpezis 1, K. Tatas 1, N. Vassiliadis 2, V. Kalenteridis 2, H. Pournara 2, I. Pappas 2, D. Soudris 1, S. Nikolaidis 2, S. Siskos 2, and A. Thanailakis

More information

Dynamic Backlight Adaptation for Low Power Handheld Devices 1

Dynamic Backlight Adaptation for Low Power Handheld Devices 1 Dynami Baklight Adaptation for ow Power Handheld Devies 1 Sudeep Pasriha, Manev uthra, Shivajit Mohapatra, Nikil Dutt and Nalini Venkatasubramanian 444, Computer Siene Building, Shool of Information &

More information

Naïve Bayesian Rough Sets Under Fuzziness

Naïve Bayesian Rough Sets Under Fuzziness IJMSA: Vol. 6, No. 1-2, January-June 2012, pp. 19 25 Serials Publiations ISSN: 0973-6786 Naïve ayesian Rough Sets Under Fuzziness G. GANSAN 1,. KRISHNAVNI 2 T. HYMAVATHI 3 1,2,3 Department of Mathematis,

More information

Performance Benchmarks for an Interactive Video-on-Demand System

Performance Benchmarks for an Interactive Video-on-Demand System Performane Benhmarks for an Interative Video-on-Demand System. Guo,P.G.Taylor,E.W.M.Wong,S.Chan,M.Zukerman andk.s.tang ARC Speial Researh Centre for Ultra-Broadband Information Networks (CUBIN) Department

More information

Bayesian Belief Networks for Data Mining. Harald Steck and Volker Tresp. Siemens AG, Corporate Technology. Information and Communications

Bayesian Belief Networks for Data Mining. Harald Steck and Volker Tresp. Siemens AG, Corporate Technology. Information and Communications Bayesian Belief Networks for Data Mining Harald Stek and Volker Tresp Siemens AG, Corporate Tehnology Information and Communiations 81730 Munih, Germany fharald.stek, Volker.Trespg@mhp.siemens.de Abstrat

More information

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks

A Load-Balanced Clustering Protocol for Hierarchical Wireless Sensor Networks International Journal of Advanes in Computer Networks and Its Seurity IJCNS A Load-Balaned Clustering Protool for Hierarhial Wireless Sensor Networks Mehdi Tarhani, Yousef S. Kavian, Saman Siavoshi, Ali

More information

A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS

A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE CAMERAS INTERNATIONAL JOURNAL OF INFORMATION AND SYSTEMS SCIENCES Volume 1, 3, Number 1, 3, Pages 1-22 365-382 2007 Institute for Sientifi Computing and Information A PROTOTYPE OF INTELLIGENT VIDEO SURVEILLANCE

More information

A Multiagent Solution to Overcome Selfish Routing In Transportation Networks

A Multiagent Solution to Overcome Selfish Routing In Transportation Networks A Multiagent olution to Overome elfish Routing In Transportation Networks Mohammad Rashedul Hasan University of Nebraska-Linoln Linoln, NE 68588, UA Email: hasan@unl.edu Ana L. C. Bazzan PPGC / UFRG CP

More information

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications

System-Level Parallelism and Throughput Optimization in Designing Reconfigurable Computing Applications System-Level Parallelism and hroughput Optimization in Designing Reonfigurable Computing Appliations Esam El-Araby 1, Mohamed aher 1, Kris Gaj 2, arek El-Ghazawi 1, David Caliga 3, and Nikitas Alexandridis

More information

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules

Improved Vehicle Classification in Long Traffic Video by Cooperating Tracker and Classifier Modules Improved Vehile Classifiation in Long Traffi Video by Cooperating Traker and Classifier Modules Brendan Morris and Mohan Trivedi University of California, San Diego San Diego, CA 92093 {b1morris, trivedi}@usd.edu

More information

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay

DoS-Resistant Broadcast Authentication Protocol with Low End-to-end Delay DoS-Resistant Broadast Authentiation Protool with Low End-to-end Delay Ying Huang, Wenbo He and Klara Nahrstedt {huang, wenbohe, klara}@s.uiu.edu Department of Computer Siene University of Illinois at

More information

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming

On Dynamic Server Provisioning in Multi-channel P2P Live Streaming On Dynami Server Provisioning in Multi-hannel P2P Live Streaming Chuan Wu Baohun Li Shuqiao Zhao Department of Computer Siene Department of Eletrial Multimedia Development Group The University of Hong

More information

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1

CA Release Automation 5.x Implementation Proven Professional Exam (CAT-600) Study Guide Version 1.1 Exam (CAT-600) Study Guide Version 1.1 PROPRIETARY AND CONFIDENTIAL INFORMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

HEXA: Compact Data Structures for Faster Packet Processing

HEXA: Compact Data Structures for Faster Packet Processing Washington University in St. Louis Washington University Open Sholarship All Computer Siene and Engineering Researh Computer Siene and Engineering Report Number: 27-26 27 HEXA: Compat Data Strutures for

More information

Adobe Certified Associate

Adobe Certified Associate Adobe Certified Assoiate About the Adobe Certified Assoiate (ACA) Program The Adobe Certified Assoiate (ACA) program is for graphi designers, Web designers, video prodution designers, and digital professionals

More information

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs

Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Creating Adaptive Web Sites Through Usage-Based Clustering of URLs Bamshad Mobasher Dept. of Computer Siene, DePaul University, Chiago, IL mobasher@s.depaul.edu Robert Cooley, Jaideep Srivastava Dept.

More information

Detection and Recognition of Non-Occluded Objects using Signature Map

Detection and Recognition of Non-Occluded Objects using Signature Map 6th WSEAS International Conferene on CIRCUITS, SYSTEMS, ELECTRONICS,CONTROL & SIGNAL PROCESSING, Cairo, Egypt, De 9-31, 007 65 Detetion and Reognition of Non-Oluded Objets using Signature Map Sangbum Park,

More information

Exploring the Commonality in Feature Modeling Notations

Exploring the Commonality in Feature Modeling Notations Exploring the Commonality in Feature Modeling Notations Miloslav ŠÍPKA Slovak University of Tehnology Faulty of Informatis and Information Tehnologies Ilkovičova 3, 842 16 Bratislava, Slovakia miloslav.sipka@gmail.om

More information

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS

INTERPOLATED AND WARPED 2-D DIGITAL WAVEGUIDE MESH ALGORITHMS Proeedings of the COST G-6 Conferene on Digital Audio Effets (DAFX-), Verona, Italy, Deember 7-9, INTERPOLATED AND WARPED -D DIGITAL WAVEGUIDE MESH ALGORITHMS Vesa Välimäki Lab. of Aoustis and Audio Signal

More information

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes

Detecting Outliers in High-Dimensional Datasets with Mixed Attributes Deteting Outliers in High-Dimensional Datasets with Mixed Attributes A. Koufakou, M. Georgiopoulos, and G.C. Anagnostopoulos 2 Shool of EECS, University of Central Florida, Orlando, FL, USA 2 Dept. of

More information

Detection of RF interference to GPS using day-to-day C/No differences

Detection of RF interference to GPS using day-to-day C/No differences 1 International Symposium on GPS/GSS Otober 6-8, 1. Detetion of RF interferene to GPS using day-to-day /o differenes Ryan J. R. Thompson 1#, Jinghui Wu #, Asghar Tabatabaei Balaei 3^, and Andrew G. Dempster

More information

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar

Plot-to-track correlation in A-SMGCS using the target images from a Surface Movement Radar Plot-to-trak orrelation in A-SMGCS using the target images from a Surfae Movement Radar G. Golino Radar & ehnology Division AMS, Italy ggolino@amsjv.it Abstrat he main topi of this paper is the formulation

More information

Gradient based progressive probabilistic Hough transform

Gradient based progressive probabilistic Hough transform Gradient based progressive probabilisti Hough transform C.Galambos, J.Kittler and J.Matas Abstrat: The authors look at the benefits of exploiting gradient information to enhane the progressive probabilisti

More information

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction

A Hybrid Neuro-Genetic Approach to Short-Term Traffic Volume Prediction A Hybrid Neuro-Geneti Approah to Short-Term Traffi Volume Predition 1. Introdution Shahriar Afandizadeh 1,*, Jalil Kianfar 2 Reeived: January 2003, Revised: July 2008, Aepted: January 2009 Abstrat: This

More information

Discrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging

Discrete sequential models and CRFs. 1 Case Study: Supervised Part-of-Speech Tagging 0-708: Probabilisti Graphial Models 0-708, Spring 204 Disrete sequential models and CRFs Leturer: Eri P. Xing Sribes: Pankesh Bamotra, Xuanhong Li Case Study: Supervised Part-of-Speeh Tagging The supervised

More information

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks

Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Hoc Wireless Networks Using Game Theory and Bayesian Networks to Optimize Cooperation in Ad Ho Wireless Networks Giorgio Quer, Federio Librino, Lua Canzian, Leonardo Badia, Mihele Zorzi, University of California San Diego La

More information

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections

SVC-DASH-M: Scalable Video Coding Dynamic Adaptive Streaming Over HTTP Using Multiple Connections SVC-DASH-M: Salable Video Coding Dynami Adaptive Streaming Over HTTP Using Multiple Connetions Samar Ibrahim, Ahmed H. Zahran and Mahmoud H. Ismail Department of Eletronis and Eletrial Communiations, Faulty

More information

MATH STUDENT BOOK. 12th Grade Unit 6

MATH STUDENT BOOK. 12th Grade Unit 6 MATH STUDENT BOOK 12th Grade Unit 6 Unit 6 TRIGONOMETRIC APPLICATIONS MATH 1206 TRIGONOMETRIC APPLICATIONS INTRODUCTION 3 1. TRIGONOMETRY OF OBLIQUE TRIANGLES 5 LAW OF SINES 5 AMBIGUITY AND AREA OF A TRIANGLE

More information

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters

Distributed Resource Allocation Strategies for Achieving Quality of Service in Server Clusters Proeedings of the 45th IEEE Conferene on Deision & Control Manhester Grand Hyatt Hotel an Diego, CA, UA, Deember 13-15, 2006 Distributed Resoure Alloation trategies for Ahieving Quality of ervie in erver

More information

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks

Multi-hop Fast Conflict Resolution Algorithm for Ad Hoc Networks Multi-hop Fast Conflit Resolution Algorithm for Ad Ho Networks Shengwei Wang 1, Jun Liu 2,*, Wei Cai 2, Minghao Yin 2, Lingyun Zhou 2, and Hui Hao 3 1 Power Emergeny Center, Sihuan Eletri Power Corporation,

More information

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis

Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Journal of Computer Siene 4 (): 9-97, 008 ISSN 549-3636 008 Siene Publiations Fuzzy Meta Node Fuzzy Metagraph and its Cluster Analysis Deepti Gaur, Aditya Shastri and Ranjit Biswas Department of Computer

More information

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index

An Optimized Approach on Applying Genetic Algorithm to Adaptive Cluster Validity Index IJCSES International Journal of Computer Sienes and Engineering Systems, ol., No.4, Otober 2007 CSES International 2007 ISSN 0973-4406 253 An Optimized Approah on Applying Geneti Algorithm to Adaptive

More information

Outline: Software Design

Outline: Software Design Outline: Software Design. Goals History of software design ideas Design priniples Design methods Life belt or leg iron? (Budgen) Copyright Nany Leveson, Sept. 1999 A Little History... At first, struggling

More information

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2

CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 CA PPM 14.x Implementation Proven Professional Exam (CAT-222) Study Guide Version 1.2 PROPRIETARY AND CONFIDENTIAL INFMATION 2016 CA. All rights reserved. CA onfidential & proprietary information. For

More information

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0

CA Agile Requirements Designer 2.x Implementation Proven Professional Exam (CAT-720) Study Guide Version 1.0 Exam (CAT-720) Study Guide Version 1.0 PROPRIETARY AND CONFIDENTIAL INFORMATION 2017 CA. All rights reserved. CA onfidential & proprietary information. For CA, CA Partner and CA Customer use only. No unauthorized

More information

Make your process world

Make your process world Automation platforms Modion Quantum Safety System Make your proess world a safer plae You are faing omplex hallenges... Safety is at the heart of your proess In order to maintain and inrease your ompetitiveness,

More information

Tackling IPv6 Address Scalability from the Root

Tackling IPv6 Address Scalability from the Root Takling IPv6 Address Salability from the Root Mei Wang Ashish Goel Balaji Prabhakar Stanford University {wmei, ashishg, balaji}@stanford.edu ABSTRACT Internet address alloation shemes have a huge impat

More information

the data. Structured Principal Component Analysis (SPCA)

the data. Structured Principal Component Analysis (SPCA) Strutured Prinipal Component Analysis Kristin M. Branson and Sameer Agarwal Department of Computer Siene and Engineering University of California, San Diego La Jolla, CA 9193-114 Abstrat Many tasks involving

More information

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer

Cross-layer Resource Allocation on Broadband Power Line Based on Novel QoS-priority Scheduling Function in MAC Layer Communiations and Networ, 2013, 5, 69-73 http://dx.doi.org/10.4236/n.2013.53b2014 Published Online September 2013 (http://www.sirp.org/journal/n) Cross-layer Resoure Alloation on Broadband Power Line Based

More information

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering

Volume 3, Issue 9, September 2013 International Journal of Advanced Research in Computer Science and Software Engineering Volume 3, Issue 9, September 2013 ISSN: 2277 128X International Journal of Advaned Researh in Computer Siene and Software Engineering Researh Paper Available online at: www.ijarsse.om A New-Fangled Algorithm

More information

Batch Auditing for Multiclient Data in Multicloud Storage

Batch Auditing for Multiclient Data in Multicloud Storage Advaned Siene and Tehnology Letters, pp.67-73 http://dx.doi.org/0.4257/astl.204.50. Bath Auditing for Multilient Data in Multiloud Storage Zhihua Xia, Xinhui Wang, Xingming Sun, Yafeng Zhu, Peng Ji and

More information

Cluster Centric Fuzzy Modeling

Cluster Centric Fuzzy Modeling 10.1109/TFUZZ.014.300134, IEEE Transations on Fuzzy Systems TFS-013-0379.R1 1 Cluster Centri Fuzzy Modeling Witold Pedryz, Fellow, IEEE, and Hesam Izakian, Student Member, IEEE Abstrat In this study, we

More information

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry

Detecting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry Deteting Moving Targets in Clutter in Airborne SAR via Keystoning and Multiple Phase Center Interferometry D. M. Zasada, P. K. Sanyal The MITRE Corp., 6 Eletroni Parkway, Rome, NY 134 (dmzasada, psanyal)@mitre.org

More information

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks

Flow Demands Oriented Node Placement in Multi-Hop Wireless Networks Flow Demands Oriented Node Plaement in Multi-Hop Wireless Networks Zimu Yuan Institute of Computing Tehnology, CAS, China {zimu.yuan}@gmail.om arxiv:153.8396v1 [s.ni] 29 Mar 215 Abstrat In multi-hop wireless

More information

PROJECT PERIODIC REPORT

PROJECT PERIODIC REPORT FP7-ICT-2007-1 Contrat no.: 215040 www.ative-projet.eu PROJECT PERIODIC REPORT Publishable Summary Grant Agreement number: ICT-215040 Projet aronym: Projet title: Enabling the Knowledge Powered Enterprise

More information

Recommendation Subgraphs for Web Discovery

Recommendation Subgraphs for Web Discovery Reommation Subgraphs for Web Disovery Arda Antikaioglu Department of Mathematis Carnegie Mellon University aantika@andrew.mu.edu R. Ravi Tepper Shool of Business Carnegie Mellon University ravi@mu.edu

More information

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center

Constructing Transaction Serialization Order for Incremental. Data Warehouse Refresh. Ming-Ling Lo and Hui-I Hsiao. IBM T. J. Watson Research Center Construting Transation Serialization Order for Inremental Data Warehouse Refresh Ming-Ling Lo and Hui-I Hsiao IBM T. J. Watson Researh Center July 11, 1997 Abstrat In typial pratie of data warehouse, the

More information

Accepted Manuscript. Model-averaged confidence intervals for factorial experiments. David Fletcher, Peter Dillingham

Accepted Manuscript. Model-averaged confidence intervals for factorial experiments. David Fletcher, Peter Dillingham Aepted Manusript Model-averaged onfidene intervals for fatorial experiments David Flether, Peter Dillingham PII: S0167-9473(11)00180-0 DOI: 10.1016/j.sda.011.05.014 Referene: COMSTA 5011 To appear in:

More information

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application

Performance of Histogram-Based Skin Colour Segmentation for Arms Detection in Human Motion Analysis Application World Aademy of Siene, Engineering and Tehnology 8 009 Performane of Histogram-Based Skin Colour Segmentation for Arms Detetion in Human Motion Analysis Appliation Rosalyn R. Porle, Ali Chekima, Farrah

More information

FUZZY WATERSHED FOR IMAGE SEGMENTATION

FUZZY WATERSHED FOR IMAGE SEGMENTATION FUZZY WATERSHED FOR IMAGE SEGMENTATION Ramón Moreno, Manuel Graña Computational Intelligene Group, Universidad del País Vaso, Spain http://www.ehu.es/winto; {ramon.moreno,manuel.grana}@ehu.es Abstrat The

More information

Alleviating DFT cost using testability driven HLS

Alleviating DFT cost using testability driven HLS Alleviating DFT ost using testability driven HLS M.L.Flottes, R.Pires, B.Rouzeyre Laboratoire d Informatique, de Robotique et de Miroéletronique de Montpellier, U.M. CNRS 5506 6 rue Ada, 34392 Montpellier

More information

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8

Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introduction Information Retrieval... 8 Contents Contents...I List of Tables...VIII List of Figures...IX 1. Introdution... 1 1.1. Internet Information...2 1.2. Internet Information Retrieval...3 1.2.1. Doument Indexing...4 1.2.2. Doument Retrieval...4

More information

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects

Simulation of Crystallographic Texture and Anisotropie of Polycrystals during Metal Forming with Respect to Scaling Aspects Raabe, Roters, Wang Simulation of Crystallographi Texture and Anisotropie of Polyrystals during Metal Forming with Respet to Saling Aspets D. Raabe, F. Roters, Y. Wang Max-Plank-Institut für Eisenforshung,

More information

Relevance for Computer Vision

Relevance for Computer Vision The Geometry of ROC Spae: Understanding Mahine Learning Metris through ROC Isometris, by Peter A. Flah International Conferene on Mahine Learning (ICML-23) http://www.s.bris.a.uk/publiations/papers/74.pdf

More information

SINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs)

SINR-based Network Selection for Optimization in Heterogeneous Wireless Networks (HWNs) 48 J. ICT Res. Appl., Vol. 9, No., 5, 48-6 SINR-based Network Seletion for Optimization in Heterogeneous Wireless Networks (HWNs) Abubakar M. Miyim, Mahamod Ismail & Rosdiadee Nordin Department of Eletrial,

More information

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints

Optimization of Two-Stage Cylindrical Gear Reducer with Adaptive Boundary Constraints 5 JOURNAL OF SOFTWARE VOL. 8 NO. 8 AUGUST Optimization of Two-Stage Cylindrial Gear Reduer with Adaptive Boundary Constraints Xueyi Li College of Mehanial and Eletroni Engineering Shandong University of

More information

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors

Rotation Invariant Spherical Harmonic Representation of 3D Shape Descriptors Eurographis Symposium on Geometry Proessing (003) L. Kobbelt, P. Shröder, H. Hoppe (Editors) Rotation Invariant Spherial Harmoni Representation of 3D Shape Desriptors Mihael Kazhdan, Thomas Funkhouser,

More information

Adapting K-Medians to Generate Normalized Cluster Centers

Adapting K-Medians to Generate Normalized Cluster Centers Adapting -Medians to Generate Normalized Cluster Centers Benamin J. Anderson, Deborah S. Gross, David R. Musiant Anna M. Ritz, Thomas G. Smith, Leah E. Steinberg Carleton College andersbe@gmail.om, {dgross,

More information

Using Augmented Measurements to Improve the Convergence of ICP

Using Augmented Measurements to Improve the Convergence of ICP Using Augmented Measurements to Improve the onvergene of IP Jaopo Serafin, Giorgio Grisetti Dept. of omputer, ontrol and Management Engineering, Sapienza University of Rome, Via Ariosto 25, I-0085, Rome,

More information