LONG-MEMORY DEPENDENCE STATISTICAL MODELS FOR DDOS ATTACKS DETECTION

Size: px
Start display at page:

Download "LONG-MEMORY DEPENDENCE STATISTICAL MODELS FOR DDOS ATTACKS DETECTION"

Transcription

1 Image Processing & Communications, vol. 20, no. 4, pp DOI: /ipc LONG-MEMORY DEPENDENCE SAISICAL MODELS FOR DDOS AACKS DEECION OMASZ ANDRYSIAK ŁUKASZ SAGANOWSKI MIROSŁAW MASZEWSKI PIOR GRAD Institute of elecommunications, University of echnology & Life Sciences in Bydgoszcz ul. Kaliskiego 7, Bydgoszcz, Poland Abstract. DDoS attacks detection method based on modelling the variability with the use of conditional average and variance in examined time series is proposed in this article. Variability predictions of the analyzed network traffic are realized by estimated statistical models with long-memory dependence ARFIMA, Adaptive ARFIMA, FIGARCH and Adaptive FIGARCH. We propose simple parameter estimation models with the use of maximum likelihood function. Selection of sparingly parameterized form of the models is realized by means of information criteria representing a compromise between brevity of representation and the extent of the prediction error. In the described method we propose using statistical relations between the forecasted and analyzed network traffic in order to detect abnormal behavior possibly being a result of a network attack. Performed experiments confirmed effectiveness of the analyzed method and cogency of the statistical models. 1 Introduction Currently, DoS and DDoS attacks have become an important issue of broadly defined I infrastructure security. Victims of the attacks are often single personal computers as well as supercomputers and vast networks. he outcomes of such activities are experienced by regular Internet users, biggest companies dealing in new technologies that often provide mass services, and powerful governmental organizations of many countries. Despite of substantial effort and funds directed onto enhancing I security procedures, at present, we are not able to protect effectively against such attacks [24, 26]. Attacks such as Distributed Denial of Service (DDoS) use already known techniques of Denial of Service (DoS) realized with new technology. DoS attack has two crucial restrictions. Firstly, it is performed from a single computer whose Internet connection bandwidth is too low compared to the bandwidth of the victim. Secondly, while performing the attack from one computer the attacker may be subjected to a faster detection. herefore, DoS attack is often conducted on smaller servers containing WWW sites. Attacks on bigger objects, for instance a portal or

2 32. Andrysiak, Ł. Saganowski, M. Maszewski, P. Grad DNS server, require using a more sophisticated method - DDoS, i.e. Distributed Denial of Service, which was created as a response to DoS limitations [5]. he main difference between both methods concerns quantity factor. In DDoS an attack is performed not from a single computer, but simultaneously from numerous overtaken machines. he sole idea of DDoS attack is therefore simple. However, what constitutes a challenge is its preparation which sometimes lasts many months. he reason is obvious - it is necessary to take over so many computers that will make the attack successful. he period of preparations is the longer, the "more powerful" are the victim s system resources. here are a number of methods for conducting a DDoS attack. Firstly, free memory space is essential for every operational system to function. hus, successful allocation of the whole accessible memory by an attacker will, theoretically, either halt the system or significantly limit its performance. Due to such an attack even the most potent I systems functioning may be disturbed or stopped. he second method involves the knowledge and use of restrictions of file systems. he third means consists in using malfunctioning network applications or the kernel or errors in the operating system configuration. It is much easier to protect against the above mentioned kind of attack by proper configuration of such a system. Most of all, it is characteristic for DoS method, which in contrast with DDoS, usually is not based on sending a great number of requests. Errors in CP/IP stacks of different operational systems constitute an example here. In extreme cases, sending a few packages will be enough to remotely hang the server. he last method consists on creation of a network traffic that is too big for servers or routers to handle [12, 23]. Attacks of this kind are becoming a more and more serious problem. According to quarterly reports published by Prolexic company, within the last twelve months the number of DDoS attacks has risen by 22 per cent. Campaigns last longer-not 28.5 hours as previously, but 34.5 hours (a rise by 21 per cent) he average traffic generated during the attack is approximately 2 GB/s and is more or less 25 per cent greater than in he record so far was an attack on the Spamhaus, an organization dedicated to the fight against spam. In March 2013, a hostile network traffic was directed towards servers of that organization with the speed of 300 GB/s. However, according to Arbor company, most of attacks (over 60 per cent) still do not exceed 1 GB/s. Nevertheless, they still constitute a serious threat [23]. Currently, the DDos attacks cause numerous problems due to lack of effective protection mechanisms for I systems. he only method is a quick recognition of an attack in order to reduce the possible consequences. One of such means is identification of network traffic anomalies that result from a DDos attack. In this article we present the use of statistical estimation of ARFIMA, FIGARCH and their adaptive versions for the analyzed time series describing the given network traffic. Anomaly detection is realized on the basis of estimated models parameters and comparative analysis of network traffic profiles. his paper is organized as follows. After the introduction, in Section 2, the overview of DDoS attacks is presented. In Section 3 the definition of long-memory dependence and local Whittle s estimator for a test of long-memory dependence is shown. In Section 4 different statistical models for data traffic prediction are described in details. hen, in Section 5 the Anomaly Detection System based on ARFIMA and FIGARH models estimation is discussed. Experimental results and conclusion are given thereafter. 2 Overview of DDoS attacks Currently, DoS and DDoS attacks constitute an important issue of broadly defined I infrastructure security. Victims of the attacks are often single personal computers as well as supercomputers and vast networks. he outcomes of such activities are experienced by regular Inter-

3 Image Processing & Communications, vol. 20, no. 4, pp net users, biggest companies dealing in new technologies that often provide mass services, and powerful governmental organizations of many countries. Despite of substantial effort and funds directed onto enhancing I security procedures, at present, we are not able to protect effectively against such attacks. Attacks such as Distributed Denial of Service (DDoS) use already known techniques of Denial of Service (DoS) realized with new technology. DoS attack has two crucial restrictions. Firstly, it is performed from a single computer whose Internet connection bandwidth is too low compared to the bandwidth of the victim. Secondly, while performing the attack from one computer the attacker may be subjected to a faster detection. herefore, DoS attack is often conducted on smaller servers containing WWW sites. Attacks on bigger objects, for instance a portal or DNS server, require using a more sophisticated method - DDoS, i.e. Distributed Denial of Service, which was created as a response to DoS limitations. he main difference between both methods concerns quantity factor. In DDoS an attack is performed not from a single computer, but simultaneously from numerous overtaken machines. he sole idea of DDoS attack is therefore simple. However, what constitutes a challenge is its preparation, which sometimes lasts many months. he reason is obvious - it is necessary to take over so many computers that it will make the attack successful. he period of preparations is the longer, the "more powerful" are the victim s system resources [20, 28]. Why are the DDoS attacks so dangerous? Most of all, they are difficult to detect due to the fact that their source is greatly distributed. What is worse, the hosts administrators most often do not realize that they are actively participating in the attacks. he statistics are appalling - a survey carried out by University of California, San Diego, point that monthly there are performed approximately fifteen thousand DDoS attacks. here are a number of methods for conducting a DDoS attack. Firstly, free memory space is essential for every operational system. In case the whole available memory is allocated by the attacker, there is a theoretical possibility that the system will discontinue operating or its efficiency will substantially decrease. his kind of attack may hinder functioning of the best I systems. he second method depends on the use of limitations of file systems. he third means consists in using malfunctioning network applications or the kernel or errors in the operating system configuration. It is much easier to protect against the above mentioned kind of attack by proper configuration of such a system [23, 29]. Most of all, it is characteristic for DoS method, which in contrast with DDoS, usually is not based on sending a great number of requests. Errors in CP/IP stacks of different operational systems constitute an example here. In extreme cases sending a few packages will be enough to remotely hang the server. he last method involves creation of a sufficiently big network traffic for servers or routers to be unable to handle it [25, 2]. Attacks of this kind are becoming a more and more serious problem. According to quarterly reports published by Prolexic company, within the last twelve months, the number of DDoS attacks has risen by 22 per cent. Campaigns last longer - not 28.5 hours as previously, but 34.5 hours (a rise by 21 per cent). he average traffic generated during the attack is approximately 2 GB/s and is more or less 25 per cent greater than in he record so far was an attack on the Spamhaus, an organization dedicated to the fight against spam. In March 2013, a hostile network traffic was directed towards servers of that organization with the speed of 300 GB/s. However, according to Arbor company, most of attacks (over 60 per cent) still do not exceed 1 GB/s. Nevertheless, they still constitute a serious threat [21]. he reason for I systems being so vulnerable to DDoS attacks is that there is a lack of successful protection measures. he only possibility stays in rapid recognition of an attack and consequently easing the results of it. An example of such a method is identification of network traffic anomalies which are out-

4 34. Andrysiak, Ł. Saganowski, M. Maszewski, P. Grad comes of DDoS attacks [11, 10]. 3 Long-Memory in ime Series he long memory property, otherwise called the attribute of long-term dependence is reflected in a time series composed of observations autocorrelated with high order. Autocorrelation of high order implies that observations are dependent with no regard to distance between them. he long memory property was introduced by Hurst [21]. he most significant features of time series are characterized by the autocorrelation function (ACF) and partial autocorrelation function (PACF). When the long memory feature is present, the autocorrelation function falls slowly, at hyperbolic pace [11]. he time series with the attribute of long memory are characterized by low frequency disintegration in their spectral domain. Short memory of time series, on the other hand, implies that when the observations are isolated even for a short period they are not correlated. Such property is called autocorrelation of low order. he above described time series are not difficult to acknowledge because they behave distinctly in different domains, i.e. in ACF time domain they quickly disappear, and in spectral domain they present high frequency disintegrations [10]. 3.1 Definition of Long-Memory Dependence he long memory question, otherwise known as the feature of the long-memory dependence, manifests itself in the existence of high-order autocorrelation between the specified elements constituting the time series. case there is a long-memory feature, the autocorrelation function ACF falls at a hyperbolic rate, and the series in its spectral domain has a low frequency distribution [8]. ime series with the property of short memory though present low order autocorrelations (ACF disappears rapidly), and high frequency distributions in the In spectral domain. hus, a stochastic process X is described as having a long memory property with parameter d when its spectral density function f x (λ) satisfies the condition f x (λ) λ 2d, (1) If the long-memory parameter (fractional integration) d is positive, then the above condition is equivalent to hyperbolic disappearance of the autocorrelation function ρ k (Granger i Joyeux [17], Hosking [19], Beran [8]), so consequently ρ k c p k 2d 1, (2) where k + and constant c ρ > 0. he process is presented by means of parameter d. When d > 0, is infinite in the neighbourhood of zero, and the process has long memory property.short memory, on the other hand, appears when d < 0 and the spectral density is finite in zero. In case d < 0, the process is referred to as antipersistent due to negative memory and its spectral density function f x (λ) = Whittle s Estimator In literature, there can be found numerous methods of estimation of the long-memory parameter d. he methods can be divided into two substantial groups: parametric and semiparametric. Parametric estimators most often utilize the maximum likelihood estimation - M LE. Semiparametric errors, however, use the information included in periodogram computed exclusively for very low frequencies. As a result, they become robust in terms of short period disturbances reflected in realizations of the examined process [8]. In order to estimate the parameter d, in our studies we used the semiparametric method proposed by Robinson [29]so called the local Whittle s method. he value of parameter d estimator is calculated on the basis of periodogram for m the lowest frequencies describing

5 Image Processing & Communications, vol. 20, no. 4, pp long-term behaviour of the process. In one-dimensional case, the Whittle s local estimator is defined as an argument maximizing the following likelihood function Q (g, d) = 1 m [ m ln ( gλ 2d j j=1 ] ) I (λ j ) +, (3) gλ 2d j where λ i = 2πj for j = 1, 2,..., m are frequencies, and I (λ) = 1 2π t=1 x te itλ 2 is periodogram calculated from the sample x 1, x 2,..., x. An adequate choice of parameter m releases estimator d from the influence of short-term disturbances of the examined process X. he values of parameter d, which have shown compliance and asymptotic normality, are identical as in the case of GP H estimator [16]. Nevertheless, Whittle s estimator is more effective hence asymptotically it presents lower variance ( ) 1 ˆd = N d,. (4) 4m 4 Network raffic Prediction Based on Models with Long-Memory he use of autoregression with a moving average for fractional diversification is a method as a result of which we achieve ARFIMA model (Fractional Differenced Noise and Auto Regressive Moving Average). It is a combination of ARMA and ARIMA models, and was introduced by Grange, Joyeux and Hosking [17, 19]. A different method of defining time series is the ARCH model (Autoregressive Conditional Heteroskedastic Model), introduced by Engel [14]. which makes the process s conditional variance reliant on the previous values. Baillie, Bollerslev and Mikkelsen [6] further developed the above model into FIGARCH (Fractionally Integrated GARCH). he autocorrelation function of residuum squares of the model is falling hyperbolically. hus, the decrease of the autocorrelation function is quicker for small time series than in exponential case. Consequently, the autocorrelation function falls very slowly for high series. As a result of the mentioned features, owing to the autocorrelation function of the residuum squares of the model, FIGARCH is a long memory model [30]. 4.1 he ARFIMA model ARF IM A(p, d, q) model was proposed by Grange, Joyeux [17] and Hosking [19]. (1981), in order to analyze the long-memory property. For time series y t the ARFIMA model is written as: Φ(L)(1 L) d y t = Θ(L)ε t, t = 1, 2,..., (5) time series: y t, ε t (0, σ 2 ), white noise σ 2, Φ(L) = 1 φ 1 L φ 2 L 2... φ p L p (6) is the autoregressive polynomial and Θ(L) = 1 + θ 1 L + θ 2 L θ p L q (7) where L, (1 L) d are: shift operator (backward) and fractional differencing operator respectively. Binomial expansion is presented as follows: and (1 L) d = ( d k ( d k k=0 ) ( 1) k L k (8) ) ( 1) k Γ(d + 1)( 1) k = Γ(d k + 1)Γ(k + 1) = = Γ( d + k) Γ( d)γ(k + 1), (9) Γ( ) denotes the gamma function, d is the number of necessary differences to give a stationary series, and (1 L) d is the d th power of the differencing operator. he ARF IMA(p, d, q) process is stationary when d ( 0.5, 0.5), while if d (0, 0.5) the process reflects long memory property. aking the appropriate k differences, one can bring many non-stationary processes to

6 36. Andrysiak, Ł. Saganowski, M. Maszewski, P. Grad stationary processes satisfying the condition (1), thereby extending the concept of long memory onto the nonstationary processes [15]. ɛ t = z t ht, ɛ t Θ t 1 N (0, h t ), (14) 4.2 he Adaptive ARFIMA model Gallant (1984) have introduced a new long memory volatility process known as Adaptive ARF IMA, or A ARF IM A.hemodel is basically a regression with the conditional mean equation specified as a finite sum of harmonics, with a stationary long memory process disturbance, which is modeled as ARF IMA(p, d, q). Hence, the observable variable y t is specified as y t = ω t + u t, (10) where the conditional mean is a trigonometric expansion or order k, k [ ( ) ( )] 2πjt 2πjt ω t = ω 0 + γ j sin + δ j cos (11) j=1 and the disturbance process is the ARF IMA(p, d, q) process Φ (L) (1 L) d u t = Θ (L) ε t. (12) herefore, the Adaptive ARF IMA is based on a regular ARF IMA model with a time dependent intercept ω t, which is represented by linear combination of harmonic terms [7]. 4.3 he FIGARCH model he model enabling description of long-memory in variance series is known as F IGARCH(p, d, q) (Fractionally Integrated GARCH), and was proposed in 1996 by Baillie, Bollerslev and Mikkelsen [6]. he F IGARCH(p, d, q) model for time series y t can be written as: y t = µ + ɛ t, t = 1, 2,...Ω, (13) h t = α 0 + β (L) h t + [ + 1 β (L) [1 φ (L)] (1 L) d] ɛ 2 t, (15) unit variance, zero-mean process: z t, conditional positive time dependent variance: h t = E ( ɛ 2 t Θ t 1 ) and Θt 1 is the information set up to time t 1. When applied to the squared innovations (18), the F IGARCH(p, d, q) model of the conditional variance can be motivated as ARF IMA ϕ (L) (1 L) d ɛ 2 t = α 0 + (1 β (L)) ϑ t, ϑ t = ɛ 2 t h t, (16) where ϕ (L) = ϕ 1 L ϕ 2 L 2... ϕ p L p and β (L) = β 1 L + β 2 L β q L q and (1 β (L)) have all their roots outside the unit circle, L is the lag operator and d is the fractional integration parameter (0 < d < 1) [4]. As far as the values of parameters are concerned, it must be noticed that when d = 0 the FIGARCH model reduces to GARCH; however, when d = 1 it changes into IGARCH model. Nevertheless, FIGARCH does not always turn into GARCH model. he listed processes differ in terms of the influence of current variance on the forecasting values, and it is as follows: for GARCH (when it is stationary in broader sense) it falls to zero in exponential case; for IGARCH it has indefinite impact on conditional variance; and for FIGARCH it decreases to zero as in hyperbolic function [4, 30], i.e. more slowly than in GARCH. 4.4 he Adaptive FIGARCH model Baillie and Morana (2009) have introduced a new long memory volatility process known as Adaptive FIGARCH,

7 Image Processing & Communications, vol. 20, no. 4, pp or A-FIGARCH [7]. his model is designed to account for both long-memory and structural changes in the volatility processes of time series. Hence, the A- FIGARCH has a stochastic long memory component and a deterministic break process component. he A- FIGARCH(p,d,q,k) process can be derived from the FI- GARCH(p,d,q) process by allowing the intercept in the conditional variance equation to be time varying. conditional variance equation is given by he (1 β (L)) (h t ω t ) = [ 1 β (L) ϕ (L) (1 L) d] ε 2 t, (17) ω t = ω 0 + k j=1 [ γ j sin ( 2πjt ) + δ j cos ( 2πjt )]. (18) his model has components with long memory effect and a time-varying intercept. It allows for breaks, cycles and changes in drift. Even though ω t is smooth, it is capable of approximating abrupt regime switching [30]. 5 Parameters estimation of statistical model In the process of searching for an optimal prognostic model our target is not utilizing the greatest possible number of parameters which would perfectly describe the variability of the tested time series. Obviously, too large match of the analyzed series may cover not only the signal, but also any accidental noise. herefore, the aim of the research is finding such a model which, with the use of a limited number of statistically important parameters, will describe essential features of the examined time series reflecting the analyzed network traffic [13]. he universally applied methods of parameter estimation of the described models are MLE (Maximum Likelihood Estimation) or QMLE (Quasi-Maximum Likelihood Estimation). It results from the fact that both methods are relatively simple. What seems to be the problematic issue of this method is the necessity to outline the whole model, and in consequence, the vulnerability of the achieved estimator to possible errors in description of polynomials responsible for the process s dynamics. Having very complex model specifications, parameter estimation may be difficult and time-consuming. A separate issue is establishing the length of the series used for parameter estimation. If the model structure is stable than the best solution is to use possibly the longest series we have at our disposal. In case of lack of stability of the model structure (e.g. variability of parameters in time) it is more advisable to use shorter series. he results of empirical studies are diverse and do not depict directly a priori any of the above mentioned approaches [8, 11]. A universal criterion for choosing the model does not exist. Usually, the more complex the model is, the greater is the value of the likelihood function. herefore, there is a searching for a compromise between the number of model s parameters and the likelihood function values. he choice of an economical model is often made upon such information criteria as Akaike s or Schwarz s. In our research, for parameter estimation and the choice of the form of the model we used MLE or QMLE method and information criteria. his selection was made with regard to their comparative simplicity of solution and computing capability [18, 22, 30]. 6 Experiments and results For the purpose of experimental results we used traffic from the network configuration formerly presented in [24]. We utilized the same subset of network traffic features (see ab. 6). Moreover, it includes SNOR IDS with anomaly detection preprocessor [3]. We used the same subset of network traffic features (see ab. 6). SNOR serves as a sensor that gathers the traffic features. In order to test the possible application of the sug-

8 38. Andrysiak, Ł. Saganowski, M. Maszewski, P. Grad ab. 1: Network traffic features used for experiments raffic Feature raffic feature description f 1 number of CP packets f 2 in CP packets f 3 out CP packets f 4 number of CP packets in LAN f 5 number of UDP datagrams f 6 number of UDP datagrams in LAN f 7 number of ICMP packets f 8 out ICMP packets f 9 number of ICMP packets in LAN f 10 number of CP packets with SYN and ACK flags f 11 out CP packets (port 80) f 12 in CP packets (port 80) gested anomaly detection models we simulated real attacks by means of distribution of Kali Linux [1] since it includes various tools enabling conducting an attack on any layer of CP/IP stack. he imitated attacks belong to subsequent groups: application of specific DDoS, various port scanning, Syn Flooding, DDoS, packet fragmentation, DoS, spoofing, reverse shell, and others. Network traffic is presented by means of a time series with regard to a particular traffic feature. o calculate models discussed in subsections it is necessary to inspect if the time series have long memory features. he Whittle s long-memory test (see subsection 3.2) was utilized for the chosen network traffic feature (see ab. 2). he outcomes of parameter d calculations prove that it is possible to use models with long memory property to describe the network traffic behavior. In order to detect anomalies we compared parameters calculated for a model traffic deprived of anomalies (it was assumed that there were no anomalies in the network traffic during model parameter calculation). o detect suspicious occurrence in the traffic of models based on ARFIMA we calculated prediction interval (30 samples horizon). ab. 3 and 4 present a comparison of DR and FP obtained for ARFIMA, FIGARH and their adaptive equivalents. he best outcomes, as regards DR and FP, were achieved for ARFIMA. DR and FP values are related to the given traffic properties. ab. 2: Whittle s Estimator of the long-memory parameter d for time series representing network traffic. Feature ( m = 0.4 ) Bandwidth ( m = 0.5) ( m = 0.65) f f f f f f f f f f f f ab. 3: Detection Rate DR [%] for a given network traffic features raffic Feature ARFIMA A-ARFIMA FIGARH A-FIGARCH f , f f f f f f f f f f f Conclusion Cybersecurity of information systems is contemporarily a key research factor. he growing number of DDoS attacks, their expanding reach and complexity stimulate the rapid advancement of network defensive systems. he techniques of statistical anomaly detections are recently the most commonly used for monitoring as well as detecting the attacks. his article presents statistical long memory models such as ARFIMA, FIGARCH and their

9 Image Processing & Communications, vol. 20, no. 4, pp ab. 4: False Positive FP [%] for a given network traffic features raffic Feature ARFIMA A-ARFIMA FIGARH A-FIGARH f f f f f f f f f f f f adaptive versions. he mentioned models were utilized for estimation of the analyzed network traffic behavior. Another subject of research was the concept of time series, which reflect the parameters of the network traffic. Owing to the use of the local Whittle s estimator (a statistical test), it was established that time series evince the long-memory effect. Estimation of parameters and recognition of row of the models are performed as a compromise between the coherence of the model and size of its estimation error. Due to the use of the discussed models we achieved satisfying statistical estimations for the analyzed network traffic signals. he process of anomaly (attacks) detecting consist in comparison of estimated behavior parameters with real network traffic factors. he obtained results outstandingly signify that the anomalies found in the network traffic signals can be identified by the suggested methods. References [1] -, (2015). Kali Linux, (last access: Dec. 2015) [2] -, (2015). Prolexic Quarterly Global DDoS Attack Report 20Documents/Prolexic%20Quarterly%20Global% 20DDoS%20Attack%20Report.pdf (last access: Dec. 2015) [3] -, (2015). SNOR - Intrusion Detection System, (last access: Dec. 2015) [4] Andersen,.G., Bollerslev,. (1998). ARCH and GARCH models. Encyclopedia of Statistical Sciences [5] Axelsson, S. (2000). Intrusion detection systems: A survey and taxonomy (Vol. 99). Chalmers University of echnology, Goteborg, Sweden: echnical report [6] Baillie, R.., Bollerslev,., Mikkelsen, H. (1996). Fractionally Integrated Generalized Autoregressive Conditional Heteroscedasticity, Journal of Econometrics, 74(1), 3-30 [7] Baillie, R.., Morana, C. (2009). Modelling long memory and structural breaks in conditional variances: An adaptive FIGARCH approach. Journal of Economic Dynamics and Control, 33(8), [8] Beran, J. (1994). Statistics for long-memory processes (Vol. 61). CRC press [9] Bollerslev,. (1986). Generalized Autoregressive Conditional Heteroscedasticity, Journal of Econometrics, 31(3), [10] Box, G.E., Jenkins, G.M., Reinsel, G.C., Ljung, G.M. (2015). ime series analysis: forecasting and control. John Wiley & Sons [11] Brockwell, P.J., Davis, R.A. (2006). Introduction to time series and forecasting. Springer Science & Business Media [12] Chandola, V., Banerjee, A., Kumar, V. (2009). Anomaly detection: A survey. ACM computing surveys (CSUR), 41(3), 15

10 40. Andrysiak, Ł. Saganowski, M. Maszewski, P. Grad [13] Crato, N., Ray, B.K. (1996). Model selection and forecasting for long-range dependent processes. Journal of Forecasting, 15(2), [14] Engle, R. (1982). Autoregressive conditional heteroscedasticity with estimates of the variance of UK inflation. Econometrica, 50, [15] Gabriel, V.J., Martins, L.F. (2004). On the forecasting ability of ARFIMA models when infrequent breaks occur. Econometrics Journal, 7(2), [16] Geweke, J., Porter-Hudak, S. (1983). he estimation and application of long memory time series models. Journal of time series analysis, 4(4), [17] Granger, C.W., Joyeux, R. (1980). An introduction to long-memory time series models and fractional differencing. Journal of time series analysis, 1(1), [18] Haslett, J, Raftery, A.E. (1989). Space-time modelling with long-memory dependence: assessing Ireland s wind power resource. Applied Statistics, 38(1), 1-50 [19] Hosking, J.R. (1981). Fractional differencing. Biometrika, 68(1), [20] Hu, L., Bi, X. (2011, March). Research of DDoS attack mechanism and its defense frame. In rd International Conference on Computer Research and Development [21] Hurst, H. (1951). he long-term storage capacity of reservoirs ransactions of American Society Civil Engineer [22] Hyndman, R.J., Khandakar, Y. (2008). Automatic time series forecasting: the forecast Package for R. Journal of Statistical Software, 27(3), 1-22 [23] Jackson, K. A. (1999). Intrusion detection system (IDS) product survey. Los Alamos National Laboratory, Los Alamos, NM, LA-UR Ver, 2, [24] Kayacik, H G., Zincir-Heywood, A.N., Heywood, M.I. (2005, October). Selecting features for intrusion detection: A feature relevance analysis on KDD 99 intrusion detection datasets. In Proceedings of the third annual conference on privacy, security and trust [25] Kumarasamy, S. (2009). An effective defence mechanism for Distributed Denial-of-Service (DDoS) attacks using router-based techniques. International Journal of Critical Infrastructures, 6(1), [26] Lakhina, A., Crovella, M., Diot, C. (2004, October). Characterization of network-wide anomalies in traffic flows. In Proceedings of the 4th ACM SIG- COMM conference on Internet measurement (pp ). ACM [27] Lee, W., Stolfo, S.J. (2000). A framework for constructing features and models for intrusion detection systems. ACM transactions on Information and system security (issec), 3(4), [28] Mirković, J., Prier, G., Reiher, P. (2002, November). Attacking DDoS at the source. In Network Protocols, Proceedings. 10th IEEE International Conference on (pp ). IEEE [29] Robinson, P.M. (1995). Log-periodogram regression of time series with long range dependence. he annals of Statistics, [30] ayefi, M., Ramanathan,.V. (2012), An Overview of FIGARCH and Related ime Series Models, Austrian Journal of Statistics, 41(3),

On the Test and Estimation of Fractional Parameter. in ARFIMA Model: Bootstrap Approach

On the Test and Estimation of Fractional Parameter. in ARFIMA Model: Bootstrap Approach Applied Mathematical Sciences, Vol. 8, 2014, no. 96, 4783-4792 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ams.2014.46498 On the Test and Estimation of Fractional Parameter in ARFIMA Model:

More information

Aaron Daniel Chia Huang Licai Huang Medhavi Sikaria Signal Processing: Forecasting and Modeling

Aaron Daniel Chia Huang Licai Huang Medhavi Sikaria Signal Processing: Forecasting and Modeling Aaron Daniel Chia Huang Licai Huang Medhavi Sikaria Signal Processing: Forecasting and Modeling Abstract Forecasting future events and statistics is problematic because the data set is a stochastic, rather

More information

Detection of Syn Flooding Attacks Using Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Modeling Technique

Detection of Syn Flooding Attacks Using Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Modeling Technique Detection of Syn Flooding Attacks Using Generalized Autoregressive Conditional Heteroskedasticity (GARCH) Modeling Technique Nikhil Ranjan, Hema A. Murthy, Timothy A. Gonsalves Department of Computer Science

More information

Intro to ARMA models. FISH 507 Applied Time Series Analysis. Mark Scheuerell 15 Jan 2019

Intro to ARMA models. FISH 507 Applied Time Series Analysis. Mark Scheuerell 15 Jan 2019 Intro to ARMA models FISH 507 Applied Time Series Analysis Mark Scheuerell 15 Jan 2019 Topics for today Review White noise Random walks Autoregressive (AR) models Moving average (MA) models Autoregressive

More information

Modelling and simulation of seismic reflectivity

Modelling and simulation of seismic reflectivity Modelling reflectivity Modelling and simulation of seismic reflectivity Rita Aggarwala, Michael P. Lamoureux, and Gary F. Margrave ABSTRACT We decompose the reflectivity series obtained from a seismic

More information

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

ON SELECTION OF PERIODIC KERNELS PARAMETERS IN TIME SERIES PREDICTION

ON SELECTION OF PERIODIC KERNELS PARAMETERS IN TIME SERIES PREDICTION ON SELECTION OF PERIODIC KERNELS PARAMETERS IN TIME SERIES PREDICTION Marcin Michalak Institute of Informatics, Silesian University of Technology, ul. Akademicka 16, 44-100 Gliwice, Poland Marcin.Michalak@polsl.pl

More information

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric

Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric Discriminating DDoS Attacks from Flash Crowds in IPv6 networks using Entropy Variations and Sibson distance metric HeyShanthiniPandiyaKumari.S 1, Rajitha Nair.P 2 1 (Department of Computer Science &Engineering,

More information

Denial of Service, Traceback and Anonymity

Denial of Service, Traceback and Anonymity Purdue University Center for Education and Research in Information Assurance and Security Denial of Service, Traceback and Anonymity Clay Shields Assistant Professor of Computer Sciences CERIAS Network

More information

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS

EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS EXPERIMENTAL STUDY OF FLOOD TYPE DISTRIBUTED DENIAL-OF- SERVICE ATTACK IN SOFTWARE DEFINED NETWORKING (SDN) BASED ON FLOW BEHAVIORS Andry Putra Fajar and Tito Waluyo Purboyo Faculty of Electrical Engineering,

More information

ADAPTIVE NETWORK ANOMALY DETECTION USING BANDWIDTH UTILISATION DATA

ADAPTIVE NETWORK ANOMALY DETECTION USING BANDWIDTH UTILISATION DATA 1st International Conference on Experiments/Process/System Modeling/Simulation/Optimization 1st IC-EpsMsO Athens, 6-9 July, 2005 IC-EpsMsO ADAPTIVE NETWORK ANOMALY DETECTION USING BANDWIDTH UTILISATION

More information

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data

MINI-PAPER A Gentle Introduction to the Analysis of Sequential Data MINI-PAPER by Rong Pan, Ph.D., Assistant Professor of Industrial Engineering, Arizona State University We, applied statisticians and manufacturing engineers, often need to deal with sequential data, which

More information

SYS 6021 Linear Statistical Models

SYS 6021 Linear Statistical Models SYS 6021 Linear Statistical Models Project 2 Spam Filters Jinghe Zhang Summary The spambase data and time indexed counts of spams and hams are studied to develop accurate spam filters. Static models are

More information

Basic Concepts in Intrusion Detection

Basic Concepts in Intrusion Detection Technology Technical Information Services Security Engineering Roma, L Università Roma Tor Vergata, 23 Aprile 2007 Basic Concepts in Intrusion Detection JOVAN GOLIĆ Outline 2 Introduction Classification

More information

European Internet Situation Awareness The Global View

European Internet Situation Awareness The Global View European Internet Situation Awareness The Global View Prof. Dr. Norbert Pohlmann Institute for Internet Security - if(is) University of Applied Sciences Gelsenkirchen http://www.internet-sicherheit.de

More information

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT

DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT DDoS: STRATEGIES FOR DEALING WITH A GROWING THREAT 01. EXECUTIVE SUMMARY This report summarizes recent research on distributed denial of service (DDoS) attacks, which looks at data collated recently and

More information

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L.

Evidence Gathering for Network Security and Forensics DFRWS EU Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Evidence Gathering for Network Security and Forensics DFRWS EU 2017 Dinil Mon Divakaran, Fok Kar Wai, Ido Nevat, Vrizlynn L. L. Thing Talk outline Context and problem Objective Evidence gathering framework

More information

Network Bandwidth Utilization Prediction Based on Observed SNMP Data

Network Bandwidth Utilization Prediction Based on Observed SNMP Data 160 TUTA/IOE/PCU Journal of the Institute of Engineering, 2017, 13(1): 160-168 TUTA/IOE/PCU Printed in Nepal Network Bandwidth Utilization Prediction Based on Observed SNMP Data Nandalal Rana 1, Krishna

More information

Conditional Volatility Estimation by. Conditional Quantile Autoregression

Conditional Volatility Estimation by. Conditional Quantile Autoregression International Journal of Mathematical Analysis Vol. 8, 2014, no. 41, 2033-2046 HIKARI Ltd, www.m-hikari.com http://dx.doi.org/10.12988/ijma.2014.47210 Conditional Volatility Estimation by Conditional Quantile

More information

Real-Time, Automatic and Wireless Bridge Monitoring System Based on MEMS Technology

Real-Time, Automatic and Wireless Bridge Monitoring System Based on MEMS Technology Journal of Civil Engineering and Architecture 10 (2016) 1027-1031 doi: 10.17265/1934-7359/2016.09.006 D DAVID PUBLISHING Real-Time, Automatic and Wireless Bridge Monitoring System Based on MEMS Technology

More information

Network Traffic Anomaly Detection based on Ratio and Volume Analysis

Network Traffic Anomaly Detection based on Ratio and Volume Analysis 190 Network Traffic Anomaly Detection based on Ratio and Volume Analysis Hyun Joo Kim, Jung C. Na, Jong S. Jang Active Security Technology Research Team Network Security Department Information Security

More information

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper

Protecting DNS Critical Infrastructure Solution Overview. Radware Attack Mitigation System (AMS) - Whitepaper Protecting DNS Critical Infrastructure Solution Overview Radware Attack Mitigation System (AMS) - Whitepaper Table of Contents Introduction...3 DNS DDoS Attacks are Growing and Evolving...3 Challenges

More information

ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL

ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL ANOMALY DETECTION USING HOLT-WINTERS FORECAST MODEL Alex Soares de Moura RNP Rede Nacional de Ensino e Pesquisa Rua Lauro Müller, 116 sala 1103 Rio de Janeiro, Brazil alex@rnp.br Sidney Cunha de Lucena

More information

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing

A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing A proposal of a countermeasure method against DNS amplification attacks using distributed filtering by traffic route changing Yuki Katsurai *, Yoshitaka Nakamura **, and Osamu Takahashi ** * Graduate School

More information

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1

Table of Contents. 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 Table of Contents 1 Intrusion Detection Statistics 1-1 Overview 1-1 Displaying Intrusion Detection Statistics 1-1 i 1 Intrusion Detection Statistics Overview Intrusion detection is an important network

More information

A Study on Intrusion Detection Techniques in a TCP/IP Environment

A Study on Intrusion Detection Techniques in a TCP/IP Environment A Study on Intrusion Detection Techniques in a TCP/IP Environment C. A. Voglis and S. A. Paschos Department of Computer Science University of Ioannina GREECE Abstract: The TCP/IP protocol suite is the

More information

Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex

Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex Effects of PROC EXPAND Data Interpolation on Time Series Modeling When the Data are Volatile or Complex Keiko I. Powers, Ph.D., J. D. Power and Associates, Westlake Village, CA ABSTRACT Discrete time series

More information

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks

Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Comparing Chord, CAN, and Pastry Overlay Networks for Resistance to DoS Attacks Hakem Beitollahi Hakem.Beitollahi@esat.kuleuven.be Geert Deconinck Geert.Deconinck@esat.kuleuven.be Katholieke Universiteit

More information

Detecting Botnets Using Cisco NetFlow Protocol

Detecting Botnets Using Cisco NetFlow Protocol Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software

More information

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK

INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK INTRUSION DETECTION SYSTEM USING BIG DATA FRAMEWORK Abinesh Kamal K. U. and Shiju Sathyadevan Amrita Center for Cyber Security Systems and Networks, Amrita School of Engineering, Amritapuri, Amrita Vishwa

More information

Nonparametric and Semiparametric Econometrics Lecture Notes for Econ 221. Yixiao Sun Department of Economics, University of California, San Diego

Nonparametric and Semiparametric Econometrics Lecture Notes for Econ 221. Yixiao Sun Department of Economics, University of California, San Diego Nonparametric and Semiparametric Econometrics Lecture Notes for Econ 221 Yixiao Sun Department of Economics, University of California, San Diego Winter 2007 Contents Preface ix 1 Kernel Smoothing: Density

More information

DDOS-GUARD Q DDoS Attack Report

DDOS-GUARD Q DDoS Attack Report DDOS-GUARD Q4 2017 DDoS Attack Report 02 12,7% Number of attacks also dropped by 12,7% in comparison with same period in 2016 4613 Total number of DDoS attacks 36,8% Number of attacks dropped by 36.8%

More information

An Approach for Determining the Health of the DNS

An Approach for Determining the Health of the DNS Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 9, September 2014,

More information

Wireless Network Security Fundamentals and Technologies

Wireless Network Security Fundamentals and Technologies Wireless Network Security Fundamentals and Technologies Rakesh V S 1, Ganesh D R 2, Rajesh Kumar S 3, Puspanathan G 4 1,2,3,4 Department of Computer Science and Engineering, Cambridge Institute of Technology

More information

Indexing and Querying Constantly Evolving Data Using Time Series Analysis

Indexing and Querying Constantly Evolving Data Using Time Series Analysis Indexing and Querying Constantly Evolving Data Using Time Series Analysis Yuni Xia 1, Sunil Prabhakar 1, Jianzhong Sun 2, and Shan Lei 1 1 Computer Science Department, Purdue University 2 Mathematics Department,

More information

10-701/15-781, Fall 2006, Final

10-701/15-781, Fall 2006, Final -7/-78, Fall 6, Final Dec, :pm-8:pm There are 9 questions in this exam ( pages including this cover sheet). If you need more room to work out your answer to a question, use the back of the page and clearly

More information

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used.

4.12 Generalization. In back-propagation learning, as many training examples as possible are typically used. 1 4.12 Generalization In back-propagation learning, as many training examples as possible are typically used. It is hoped that the network so designed generalizes well. A network generalizes well when

More information

The Time Series Forecasting System Charles Hallahan, Economic Research Service/USDA, Washington, DC

The Time Series Forecasting System Charles Hallahan, Economic Research Service/USDA, Washington, DC The Time Series Forecasting System Charles Hallahan, Economic Research Service/USDA, Washington, DC INTRODUCTION The Time Series Forecasting System (TSFS) is a component of SAS/ETS that provides a menu-based

More information

A Study on Network Flow Security

A Study on Network Flow Security BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 8, No 3 Sofia 28 A Study on Network Flow Security Tsvetomir Tsvetanov, Stanislav Simeonov 2 Sofia University, Faculty of Mathematics

More information

Basic Concepts And Future Directions Of Road Network Reliability Analysis

Basic Concepts And Future Directions Of Road Network Reliability Analysis Journal of Advanced Transportarion, Vol. 33, No. 2, pp. 12.5-134 Basic Concepts And Future Directions Of Road Network Reliability Analysis Yasunori Iida Background The stability of road networks has become

More information

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks

Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks Optimal Routing and Scheduling in Multihop Wireless Renewable Energy Networks ITA 11, San Diego CA, February 2011 MHR. Khouzani, Saswati Sarkar, Koushik Kar UPenn, UPenn, RPI March 23, 2011 Khouzani, Sarkar,

More information

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a

Part I. Hierarchical clustering. Hierarchical Clustering. Hierarchical clustering. Produces a set of nested clusters organized as a Week 9 Based in part on slides from textbook, slides of Susan Holmes Part I December 2, 2012 Hierarchical Clustering 1 / 1 Produces a set of nested clusters organized as a Hierarchical hierarchical clustering

More information

Multivariate Correlation Analysis based detection of DOS with Tracebacking

Multivariate Correlation Analysis based detection of DOS with Tracebacking 1 Multivariate Correlation Analysis based detection of DOS with Tracebacking Jasheeda P Student Department of CSE Kathir College of Engineering Coimbatore jashi108@gmail.com T.K.P.Rajagopal Associate Professor

More information

Time Series Data Analysis on Agriculture Food Production

Time Series Data Analysis on Agriculture Food Production , pp.520-525 http://dx.doi.org/10.14257/astl.2017.147.73 Time Series Data Analysis on Agriculture Food Production A.V.S. Pavan Kumar 1 and R. Bhramaramba 2 1 Research Scholar, Department of Computer Science

More information

Search Costs vs. User Satisfaction on Mobile

Search Costs vs. User Satisfaction on Mobile Search Costs vs. User Satisfaction on Mobile Manisha Verma, Emine Yilmaz University College London mverma@cs.ucl.ac.uk, emine.yilmaz@ucl.ac.uk Abstract. Information seeking is an interactive process where

More information

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses

Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses Survey Imperva Incapsula Survey: What DDoS Attacks Really Cost Businesses BY: TIM MATTHEWS 2016, Imperva, Inc. All rights reserved. Imperva and the Imperva logo are trademarks of Imperva, Inc. Contents

More information

Cloudflare Advanced DDoS Protection

Cloudflare Advanced DDoS Protection Cloudflare Advanced DDoS Protection Denial-of-service (DoS) attacks are on the rise and have evolved into complex and overwhelming security challenges. 1 888 99 FLARE enterprise@cloudflare.com www.cloudflare.com

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2650 Software version: F1000-A-EI&F1000-S-EI: R3721 F5000: F3210 F1000-E: F3171 Firewall module: F3171 Document version: 6PW101-20120719

More information

Internet Threat Detection System Using Bayesian Estimation

Internet Threat Detection System Using Bayesian Estimation Internet Threat Detection System Using Bayesian Estimation Masaki Ishiguro 1 Hironobu Suzuki 2 Ichiro Murase 1 Hiroyuki Ohno 3 Abstract. We present an Internet security threat detection system 4 using

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl

More information

Multi-threaded, discrete event simulation of distributed computing systems

Multi-threaded, discrete event simulation of distributed computing systems Multi-threaded, discrete event simulation of distributed computing systems Iosif C. Legrand California Institute of Technology, Pasadena, CA, U.S.A Abstract The LHC experiments have envisaged computing

More information

Configuring attack detection and prevention 1

Configuring attack detection and prevention 1 Contents Configuring attack detection and prevention 1 Overview 1 Attacks that the device can prevent 1 Single-packet attacks 1 Scanning attacks 2 Flood attacks 3 TCP fragment attack 4 Login DoS attack

More information

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots

DOMINO: A System to Detect Greedy Behavior in IEEE Hotspots DOMINO: A System to Detect Greedy Behavior in IEEE 802.11 Hotspots By Maxim Raya, Jean-Pierre Hubaux, Imad Aad Laboratory for computer Communications and Applications(LCA) School of Computer and Communication

More information

Ensemble of Specialized Neural Networks for Time Series Forecasting. Slawek Smyl ISF 2017

Ensemble of Specialized Neural Networks for Time Series Forecasting. Slawek Smyl ISF 2017 Ensemble of Specialized Neural Networks for Time Series Forecasting Slawek Smyl slawek@uber.com ISF 2017 Ensemble of Predictors Ensembling a group predictors (preferably diverse) or choosing one of them

More information

Using Statistical Techniques to Improve the QC Process of Swell Noise Filtering

Using Statistical Techniques to Improve the QC Process of Swell Noise Filtering Using Statistical Techniques to Improve the QC Process of Swell Noise Filtering A. Spanos* (Petroleum Geo-Services) & M. Bekara (PGS - Petroleum Geo- Services) SUMMARY The current approach for the quality

More information

Model Diagnostic tests

Model Diagnostic tests Model Diagnostic tests 1. Multicollinearity a) Pairwise correlation test Quick/Group stats/ correlations b) VIF Step 1. Open the EViews workfile named Fish8.wk1. (FROM DATA FILES- TSIME) Step 2. Select

More information

CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE

CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE IN THREE-DIMENSIONAL SPACE National Technical University of Athens School of Civil Engineering Department of Transportation Planning and Engineering Doctoral Dissertation CONTRIBUTION TO THE INVESTIGATION OF STOPPING SIGHT DISTANCE

More information

MATH 1A MIDTERM 1 (8 AM VERSION) SOLUTION. (Last edited October 18, 2013 at 5:06pm.) lim

MATH 1A MIDTERM 1 (8 AM VERSION) SOLUTION. (Last edited October 18, 2013 at 5:06pm.) lim MATH A MIDTERM (8 AM VERSION) SOLUTION (Last edited October 8, 03 at 5:06pm.) Problem. (i) State the Squeeze Theorem. (ii) Prove the Squeeze Theorem. (iii) Using a carefully justified application of the

More information

Automation the process of unifying the change in the firewall performance

Automation the process of unifying the change in the firewall performance Automation the process of unifying the change in the firewall performance 1 Kirandeep kaur, 1 Student - Department of Computer science and Engineering, Lovely professional university, Phagwara Abstract

More information

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content

Means for Intrusion Detection. Intrusion Detection. INFO404 - Lecture 13. Content Intrusion Detection INFO404 - Lecture 13 21.04.2009 nfoukia@infoscience.otago.ac.nz Content Definition Network vs. Host IDS Misuse vs. Behavior Based IDS Means for Intrusion Detection Definitions (1) Intrusion:

More information

Experience with SPM in IPv6

Experience with SPM in IPv6 Experience with SPM in IPv6 Mingjiang Ye, Jianping Wu, and Miao Zhang Department of Computer Science, Tsinghua University, Beijing, 100084, P.R. China yemingjiang@csnet1.cs.tsinghua.edu.cn {zm,jianping}@cernet.edu.cn

More information

Flooding Attacks by Exploiting Persistent Forwarding Loops

Flooding Attacks by Exploiting Persistent Forwarding Loops Flooding Attacks by Exploiting Persistent Forwarding Jianhong Xia, Lixin Gao, Teng Fei University of Massachusetts at Amherst {jxia, lgao, tfei}@ecs.umass.edu ABSTRACT In this paper, we present flooding

More information

PREEMPTIVE PREventivE Methodology and Tools to protect utilities

PREEMPTIVE PREventivE Methodology and Tools to protect utilities PREEMPTIVE PREventivE Methodology and Tools to protect utilities 2014 2017 1 With the financial support of FP7 Seventh Framework Programme Grant agreement no: 607093 Preemptive goal The main goal of PREEMPTIVE

More information

Multiple Model Estimation : The EM Algorithm & Applications

Multiple Model Estimation : The EM Algorithm & Applications Multiple Model Estimation : The EM Algorithm & Applications Princeton University COS 429 Lecture Dec. 4, 2008 Harpreet S. Sawhney hsawhney@sarnoff.com Plan IBR / Rendering applications of motion / pose

More information

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree

An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree An Anomaly-Based Intrusion Detection System for the Smart Grid Based on CART Decision Tree P. Radoglou-Grammatikis and P. Sarigiannidis* University of Western Macedonia Department of Informatics & Telecommunications

More information

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association

Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value Association Proceedings of Machine Learning Research 77:20 32, 2017 KDD 2017: Workshop on Anomaly Detection in Finance Analytical Techniques for Anomaly Detection Through Features, Signal-Noise Separation and Partial-Value

More information

Nonparametric Estimation of Distribution Function using Bezier Curve

Nonparametric Estimation of Distribution Function using Bezier Curve Communications for Statistical Applications and Methods 2014, Vol. 21, No. 1, 105 114 DOI: http://dx.doi.org/10.5351/csam.2014.21.1.105 ISSN 2287-7843 Nonparametric Estimation of Distribution Function

More information

Web Security Vulnerabilities: Challenges and Solutions

Web Security Vulnerabilities: Challenges and Solutions Web Security Vulnerabilities: Challenges and Solutions A Tutorial Proposal for ACM SAC 2018 by Dr. Hossain Shahriar Department of Information Technology Kennesaw State University Kennesaw, GA 30144, USA

More information

Optimization of Firewall Rules

Optimization of Firewall Rules Optimization of Firewall Rules Tihomir Katić Predrag Pale Faculty of Electrical Engineering and Computing University of Zagreb Unska 3, HR 10000 Zagreb, Croatia tihomir.katic@fer.hr predrag.pale@fer.hr

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

An Implementation of LoSS Detection with Second Order Statistical Model

An Implementation of LoSS Detection with Second Order Statistical Model Postgraduate Annual Research Seminar 007 (3-4 July 007) An Implementation of LoSS Detection with Second Order Statistical Model Mohd Fo ad Rohani *, Mohd Aizaini Maarof *, Ali Selamat * and Houssain ettani

More information

Hybrid Feature Selection for Modeling Intrusion Detection Systems

Hybrid Feature Selection for Modeling Intrusion Detection Systems Hybrid Feature Selection for Modeling Intrusion Detection Systems Srilatha Chebrolu, Ajith Abraham and Johnson P Thomas Department of Computer Science, Oklahoma State University, USA ajith.abraham@ieee.org,

More information

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74

A custom excerpt from Frost & Sullivan s Global DDoS Mitigation Market Research Report (NDD2-72) July, 2014 NDD2-74 Analysis of the Global Distributed Denial of Service (DDoS) Mitigation Market Abridged Version Rise of the DDoS Attack Spurs Demand for Comprehensive Solutions A custom excerpt from Frost & Sullivan s

More information

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network

Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Measurement and Analysis of Traffic in a Hybrid Satellite-Terrestrial Network Qing (Kenny) Shao and Ljiljana Trajkovic {qshao, ljilja}@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl

More information

HP High-End Firewalls

HP High-End Firewalls HP High-End Firewalls Attack Protection Configuration Guide Part number: 5998-2630 Software version: F1000-E/Firewall module: R3166 F5000-A5: R3206 Document version: 6PW101-20120706 Legal and notice information

More information

Anomaly Detection in Cyber Physical Systems

Anomaly Detection in Cyber Physical Systems Anomaly Detection in Cyber Physical Systems Maggie Cheng Illinois Institute of Technology December 11, 2018 IEEE Big Data Conference Seattle, WA Outline Introduction Outlier Detection Sequential Change

More information

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks

Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks Intrusion Detection System For Denial Of Service Flooding Attacks In Sip Communication Networks So we are proposing a network intrusion detection system (IDS) which uses a Keywords: DDoS (Distributed Denial

More information

Robust Signal-Structure Reconstruction

Robust Signal-Structure Reconstruction Robust Signal-Structure Reconstruction V. Chetty 1, D. Hayden 2, J. Gonçalves 2, and S. Warnick 1 1 Information and Decision Algorithms Laboratories, Brigham Young University 2 Control Group, Department

More information

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks

Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks Journal of Computer Science Original Research Paper Correlation Based Approach with a Sliding Window Model to Detect and Mitigate Ddos Attacks 1 Ayyamuthukumar, D. and 2 S. Karthik 1 Department of CSE,

More information

Modelling data networks research summary and modelling tools

Modelling data networks research summary and modelling tools Modelling data networks research summary and modelling tools a 1, 3 1, 2 2, 2 b 0, 3 2, 3 u 1, 3 α 1, 6 c 0, 3 v 2, 2 β 1, 1 Richard G. Clegg (richard@richardclegg.org) December 2011 Available online at

More information

MATH3016: OPTIMIZATION

MATH3016: OPTIMIZATION MATH3016: OPTIMIZATION Lecturer: Dr Huifu Xu School of Mathematics University of Southampton Highfield SO17 1BJ Southampton Email: h.xu@soton.ac.uk 1 Introduction What is optimization? Optimization is

More information

Robust color segmentation algorithms in illumination variation conditions

Robust color segmentation algorithms in illumination variation conditions 286 CHINESE OPTICS LETTERS / Vol. 8, No. / March 10, 2010 Robust color segmentation algorithms in illumination variation conditions Jinhui Lan ( ) and Kai Shen ( Department of Measurement and Control Technologies,

More information

Time Series Analysis by State Space Methods

Time Series Analysis by State Space Methods Time Series Analysis by State Space Methods Second Edition J. Durbin London School of Economics and Political Science and University College London S. J. Koopman Vrije Universiteit Amsterdam OXFORD UNIVERSITY

More information

Video shot segmentation using late fusion technique

Video shot segmentation using late fusion technique Video shot segmentation using late fusion technique by C. Krishna Mohan, N. Dhananjaya, B.Yegnanarayana in Proc. Seventh International Conference on Machine Learning and Applications, 2008, San Diego,

More information

Off-Line Multi-Script Writer Identification using AR Coefficients

Off-Line Multi-Script Writer Identification using AR Coefficients 2009 10th International Conference on Document Analysis and Recognition Off-Line Multi-Script Writer Identification using AR Coefficients Utpal Garain Indian Statistical Institute 203, B.. Road, Kolkata

More information

CPSC 340: Machine Learning and Data Mining. Feature Selection Fall 2017

CPSC 340: Machine Learning and Data Mining. Feature Selection Fall 2017 CPSC 340: Machine Learning and Data Mining Feature Selection Fall 2017 Assignment 2: Admin 1 late day to hand in tonight, 2 for Wednesday, answers posted Thursday. Extra office hours Thursday at 4pm (ICICS

More information

Delay Injection for. Service Dependency Detection

Delay Injection for. Service Dependency Detection Delay Injection for Service Dependency Detection Richard A. Kemmerer Computer Security Group Department of Computer Science University of California, Santa Barbara http://seclab.cs.ucsb.edu ARO/MURI Meeting

More information

Exploring Econometric Model Selection Using Sensitivity Analysis

Exploring Econometric Model Selection Using Sensitivity Analysis Exploring Econometric Model Selection Using Sensitivity Analysis William Becker Paolo Paruolo Andrea Saltelli Nice, 2 nd July 2013 Outline What is the problem we are addressing? Past approaches Hoover

More information

Second International Barometer of Security in SMBs

Second International Barometer of Security in SMBs 1 2 Contents 1. Introduction. 3 2. Methodology.... 5 3. Details of the companies surveyed 6 4. Companies with security systems 10 5. Companies without security systems. 15 6. Infections and Internet threats.

More information

Simulation Studies of the Basic Packet Routing Problem

Simulation Studies of the Basic Packet Routing Problem Simulation Studies of the Basic Packet Routing Problem Author: Elena Sirén 48314u Supervisor: Pasi Lassila February 6, 2001 1 Abstract In this paper the simulation of a basic packet routing problem using

More information

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks

An Abnormal Data Detection Method Based on the Temporal-spatial Correlation in Wireless Sensor Networks An Based on the Temporal-spatial Correlation in Wireless Sensor Networks 1 Department of Computer Science & Technology, Harbin Institute of Technology at Weihai,Weihai, 264209, China E-mail: Liuyang322@hit.edu.cn

More information

Hybrid Self Adaptive Learning Scheme for Simple and Multiple Drift-like Fault Diagnosis in Wind Turbine Pitch Sensors

Hybrid Self Adaptive Learning Scheme for Simple and Multiple Drift-like Fault Diagnosis in Wind Turbine Pitch Sensors Hybrid Self Adaptive Learning Scheme for Simple and Multiple Drift-like Fault Diagnosis in Wind Turbine Pitch Sensors Houari Toubakh and Moamar Sayed-Mouchaweh IMT Lille Douai, Univ. Lille, Unite de Recherche

More information

Scientific Computing: An Introductory Survey

Scientific Computing: An Introductory Survey Scientific Computing: An Introductory Survey Chapter 13 Random Numbers and Stochastic Simulation Prof. Michael T. Heath Department of Computer Science University of Illinois at Urbana-Champaign Copyright

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Marmagna Desai March 12, 2004 Abstract This report is meant to understand the need, architecture and approaches adopted for building Intrusion Detection System. In recent years

More information

Model Based Symbolic Description for Big Data Analysis

Model Based Symbolic Description for Big Data Analysis Model Based Symbolic Description for Big Data Analysis 1 Model Based Symbolic Description for Big Data Analysis *Carlo Drago, **Carlo Lauro and **Germana Scepi *University of Rome Niccolo Cusano, **University

More information

Application of Characteristic Function Method in Target Detection

Application of Characteristic Function Method in Target Detection Application of Characteristic Function Method in Target Detection Mohammad H Marhaban and Josef Kittler Centre for Vision, Speech and Signal Processing University of Surrey Surrey, GU2 7XH, UK eep5mm@ee.surrey.ac.uk

More information

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies

Cybersecurity. Anna Chan, Marketing Director, Akamai Technologies Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile Business devices and Continuity data collection. & Cybersecurity Anna Chan, Marketing Director,

More information

DDoS Attacks Detection Using GA based Optimized Traffic Matrix

DDoS Attacks Detection Using GA based Optimized Traffic Matrix 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing DDoS Attacks Detection Using GA based Optimized Traffic Matrix Je Hak Lee yitsup2u@gmail.com Dong

More information