P2P Botnet Detection Using Min-Vertex Cover

Size: px
Start display at page:

Download "P2P Botnet Detection Using Min-Vertex Cover"

Transcription

1 1176 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 2012 P2P Botnet Detection Using Min-Vertex Cover Lei Xu College of computer, Nanjing University of Posts and Telecommunications, Nanjing, China 1, 2 XiaoLong Xu and 1 Yue Zhuo 1 College of computer, Nanjing University of Posts and Telecommunications, Nanjing, China 2 State Key Laboratory of Information Security (Institute of Software, Chinese Academy of Sciences), Beijing , China xuxl@njupt.edu.cn, michellezhuo26@gmail.com Abstract P2P botnet is one of the most critical threats to the current Internet security. In this paper, we propose a session-based analysis and minimum vertex cover mining detecting model for core nodes of P2P botnets. This model is focused on solving the core nodes of botnet and has a good performance when the characteristics of botnet are changed to avoid detecting. The simulation experiments reveal that when the session detection rate is at 50% and session falsepositive rate is at 29%, the core node detection rate still remains 98.9%, and the false-positive rate of core node is only 4.87%. Index Terms Network security, Botnet detection, Session analysis, Minimum vertex cove, Core nodes I. INTRODUCTION Botnets are the networks that attacker, for malicious purposes, controls masses of hosts by spreading bots, and then takes use of the command and control channels to communicate[1]. Botnets are not analogous to worms and viruses that cause harm to the computers directly, but to provide a platform for the attacker, who can use this platform for DDOS, spam and some other attacks. Early botnets were mainly based on the IRC protocol and HTTP protocol. With the P2P technology extensively applied in the network, there appeared P2P-based botnets. P2P botnets have many merits compared to centralized botnets (Based on IRC or HTTP protocol), they no longer requires a specific central server, hence the botnets avoid the problem of single point failure and they behave more flexible due to their command and control channels, which make it difficult to track for the attacker. Currently, Researchers proposed several new P2P botnet models, which correct some shortcomings of early botnets and become more difficult to detect and defend. Zhang et al. summed up the shortcomings of of existing botnet models, and proposed some approaches to strengthen the botnet [2]. Wang et al. introduced a new hybrid P2P botnet, in which the bots are divided into two roles, Client bots and Server bots. Using data encryption and personalized service ports, the botnet has a strong robustness and invisibility [3]. Of course, there are many researches are focused on the detection and prevention of botnets. Against the early centralized botnet, many approaches have been proposed [4~8]. Wang et al. and Goebel et al. proposed detecting methods for IRC botnets by the use of similarity of nickname of bots. Gu et al. presented BotSniffer, which can capture spatial-temporal correlation in network traffic and utilize their statistical algorithms to detect botnets. In real-world experiments, BotSniffer shows a high accuracy and has a very low false-positive rate. These methods needn t priori knowledge, and meet the needs of real-time detection. But they aren t appropriate for P2P botnet detection. Recently, network traffic and behavior analysis are popular approaches for P2P botnet detection [9~12]. Liao et al. proposed a P2P botnet detection method based on traffic monitoring and data mining technology [9], and pointed out the difference between behaviors of botnet traffic and those of normal network traffic. Hossein et al. posed a general P2P botnet detection framework [10], which monitored a group of hosts to find out the malicious network traffic and behaviors. However, these methods have some defects. For example, if the characteristics of botnet change, the success rate of detection will sharply decline. Yun et al. put forward a detection measure based on hop distance [13], which compares the communication hop distance with the IP block detection threshold from start point to end point to judge whether they are botnets. This method is merely applied to detect P2P botnet which based on spam attack. As P2P botnet traffic shows a power-law distribution [19] feature, most of the traffic of botnets is passed though several important nodes, we call them core nodes. Hence, the core nodes can represent the entire botnet s behavior performance to a great extent. Additionally, the connectivity of a botnet bears so much on its core nodes that it becomes isolated parts with losing of core nodes. In this sense, if a defender of botnets can find out the core nodes of botnet and then monitor them, he can detect and defend botnets in effect. In this paper, we present a novel P2P botnet detection model that combines session-based analysis doi: /jnw

2 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST network traffic Session analysis module TCP process Induce character Core node calculation Construct undirected graph Calculate min vertex cover white list filter Analyze suspicious degree UDP process Induce character core nodes table white list filter Analyze suspicious degree session table Figure 1. Session-based analysis and minimum vertex cover mining P2P botnet detection model and minimum vertex cover theory, this model only analyzes network header information, regardless of extra network data load, and takes use of minimum vertex cover to probe the core nodes of botnet. In addition, it maintains a high success rate even if the attacker changes the features of botnets to counterattack. The rest of this paper is organized as follows. Section II describes our P2P botnet detection model including network session analysis and core nodes excavating. Section III gives simulation experiments about our algorithm to solve core nodes of botnet. In Section IV, we draw a conclusion about our paper. II. BOTNET DETECTION METHOD A. Detection and Defense Model We present a detection model with session-based analysis and the minimum vertex cover theory. In Fig. 1, the model can be run on the network gateway, utilize the SPAN technology[20] to gain network traffic, then network session analysis module conducts statistics and analysis of the traffic characteristics. The analysis results will be stored into the session table in the database. And then core node calculation module, via session table, structures a simple undirected graph which represents the botnet. Using the algorithm mentioned below, we calculate the core nodes of network, and save them into the core nodes table. Furthermore, the content of core nodes table will back feed to network session analysis module, in order to induct and adjust the attributes of botnets. B. Network Session Analysis 1) Session Table P2P botnet traffic has some different characters in comparison with normal Internet traffic [9][14]. Such as, packets of P2P botnets are mainly in small size (data portion less than 100 bytes). Accordingly, we structure a session table to count and analyze the properties of network communications. The following shows the process of establishing a session table. In a period of time, we regard 32-bits-integer IP address as the identifier and compile statistics for certain features of network traffic. Besides the IP addresses and characteristics parameters, the session table also has a suspicious degree attribute which describes the possibility of the session to be a bot-session. In Table I, we established a session table including two sessions with parameter of small packet rate. TABLE I. Address 1 Address 2 A SESSION TABLE WITH SMALL PACKET RATE Small packet rate Suspicious degree ) Suspicious Degree Analysis In a session table which includes X1, X 2,..., X n parameters, we analyze these parameters, then determine whether the session is a bot or not. Definition 1 Bot-Session Possibility: in session table, the probability that the current session is the bot session is Bot-Session Possibility, its mathematical expression is: Bot ( s) P( s is bot session X1 x1, X2 x 2,..., Xn xn ) (1) s represents current session, X1, X2,..., X n represents characteristic parameters, x1, x2,..., xn is the statistic of the characteristic parameters corresponding to current session. By the use of Bayes theorem, B ot(s) can be rewritten as: PX ( 1 x1, X2 x2,..., Xn xns is bot session) Ps ( is bot session ) Bot () s PX ( 1 x1, X2 x2,..., Xn xn ) (2)

3 1178 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 2012 Because of Ps ( is bot session )and PX (1 x1, X2 x2,..., Xn xn)is constant value for a period of time, and assume that X 1, X 2,..., Xn parameters are independent random variables, then B ot(s) can be further adapted as : Bot ( s) C P( X x s is bot session )... P( X x 1 1 n n s is bot session) (3) In order to quantify the bot-like probability of current session, take the logarithmic processing for B ot(s) : n log( Bot ( s)) log( C) log( P( Xi xi s is bot session)) (4) i 1 If the bot-sessions confidence interval is Ai,then gives: 1, xi Ai log( PX ( i xi s is bot session)) (5) 0, xi Ai We provide the definition of Bot-Session Suspicious Degree: Definition 2 Bot-Session Suspicious Degree: in session table, a definite value that represents the session bot-like degree is Bot-Session Suspicious, its mathematical expression is: n EST() s log( P( Xi xi s is bot session)) (6) i 1 Set the threshold value m(1 m n 1), if EST ( s) m, then regard the session as normal, or as a bot-session. 3) Character Induction As P2P botnet traffic shows a power-law distribution feature, hence the core nodes can take the gauge of entire botnet s behavior performance. Taking into consideration the problem that interference of normal network traffic and changes of botnet characteristics will bring to the potential increase in false-positive rate of botnet detection, we apply botnet core nodes to estimate the botnet traffic characteristics for further induction and adjustment. We cam use some methods to get the interval for determining botnets. For example, if mean value of certain botnet traffic characteristic parameters Xi( i 1,2,..., n) which come from core nodes table approximately meet normal distribution, we can calculate the average value X and variance S 2 of Xi, and select (0 1), then confidence interval Ai is : S S ( X t ( m 1), X t ( m 1)) m 1 m 1 (7) 2 2 We use A i as the range during inducting characteristics parameter, when sessions carry on suspicious degree analysis, if the relevant statistical parameters falls within A i, the session s suspicious degree will correspondingly increase. C. Solve Core Nodes With Minimum Vertex Cover According to the session table, we create a simple undirected graph G. In the graph, both sides of session is transformed to vertex v, and session is converted to edge e, the weight of edge we ( ) represents the bot-session suspicious degree. Therefore the task of seeking for the core nodes can be converted to the problem of solving the minimum vertex cover of G. Definition 3 Minimum Vertex Cover: Give F V( G), if every edge of the graph G has at least one vertex that belongs to set F, then set F is one of the vertex covers of G. If F has min sum of vertex weight, then F is the minimum vertex cover of G. Solving minimum vertex cover [15] is a NP-complete problem, but scholars put forward many approximate algorithms [16~18]. Balaji et al. introduced SRA algorithm, its worst time complexity is Omn ( 2 ). We take advantage of SRA algorithm and put forward solving algorithm of botnet core nodes: Give that minimum vertex cover is Vc, core nodes set is Core, select rate is. Step1 Build simple undirected graph G ( V, E), set the value of edge weight we ( ) with session suspicious degree, and set Vc. Step2 Calculate each vertex s weight wv ( ), wv ( ) w(e), v0 V. ( vv, 0 ) E Step3 Calculate each vertex s support degree s( v ), s( v) w( v0), v0 v ( vv, 0 ) E. Step4 Calculate each vertex s sum degree sum( v ), sum( v) w( v) s( v). Step5 Traverse vertex set V,look for vertex v : sum( v) max{ sum( v1), sum( v2),..., sum( vn)}, vi V then add v to Vc and delete the edges relevant to v. Step6 Repeat Step 2 to Step 5, until E. Step7 Sort Vc according to the added time order, then the set of core nodes of botnet is: Core { vi vi Vc AND i Vc }. III. SIMULATION EXPERIMENTS AND RESULTS ANALYSIS A. Experiments Design Simulation on a PC implements 2000-nodes network, which contains 200 bots and randomly select 10% bots to be core nodes, the distribution of bots refer to the botnet model in [3]. Whereas some other P2P applications will disturb session analysis, we layout 5 P2P application networks that draw on the P2P application networks traffic traits in [21]. P2P botnet detection picks individual

4 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST Figure 2. the relationship between session detection rate and core nodes detection rate Figure 4. the distribution of false-positives in core nodes set Figure 3. the relationship between detection false -positive rate and core nodes false-positive rate Figure 5. the influence of select rate on core nodes detection feature parameter, and preset detection rate and falsepositive rate, and then we will test if the algorithm in section II is effective. B. Experiments Data Analysis In the case that session analysis detection rate and false-positive rate is known, the success rate of core nodes mining of proposed algorithm is in Fig. 2. We can see even though the session detection rate is not fine, the algorithm works well. However, Fig. 3 indicates that, since minimum vertex cover all edges of graph, including the edges belonged to mistake detection result and pseudo bot-like sessions have a lower connectivity than bot-sessions, the solved core nodes have a higher falsepositive. We found that, if core nodes are displayed by added time sort according to our algorithm, the top 20% nodes have a very low false-positive as shown in Fig. 4. Accordingly, we choose the session detection rate as 60% and session false-positive rate as 25%, then via change the minimum vertex cover select rate to observe the core nodes detection rate and false-positive rate in Fig. 5. It reveals that the detection rate of core nodes always Figure 6. core nodes detection under 20% select rate remain high and false-positive rate almost performs a liner growth with select rate when select rate is below 20%. Finally, balancing the relationship between detection rate and false-positive rate, we set the select rate as 20% and examine the detections of core nodes with various session detections in Fig. 6. The result shows that the false-positive is much lower than that of session detection

5 1180 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST 2012 and core nodes detection rate decrease slightly compared to that of 100% select rate. Particularly, when the session was at 50% detection rate and 29% false-positive rate, the core nodes detection rate reached 98.9%, while the falsepositive rate was 4.87%. IV. CONCLUSION As core nodes play a significant role in botnets running and current P2P botnet detection methods still remain some deficiencies, we presents a detection model based on session analysis and minimum vertex cover theory. The system can excavate the core nodes of botnet while there is no guarantee on detection rate and false-positive rate of bots. Furthermore it can use the core nodes to induce the features of botnet, which are feedback to system to increase detection efficiency at next time. The algorithm for solving the core nodes in the simulation results shows a finer performance in face of poor session detection rate and false-positive rate. ACKNOWLEDGEMENT The subject is sponsored by the National Key Basic Research Program (973 Program) of China (No. 2011CB302903), the National Natural Science Foundation of China (No ), the Specialized Research Fund for the Doctoral Program of Higher Education (No , No ), the China Postdoctoral Science Foundation Funded Project (No.2011M500095), the Natural Science Foundation of Jiangsu Province (No. BK , No. BK ), the Jiangsu Postdoctoral Science Foundation Funded Project (No C), the Science and Technology Support Program of Jiangsu Province (No. BE )and the Project Funded by the Priority Academic Program Development of Jiangsu Higher Education Institutions(No.yx002001). REFERENCES [1] Jianwei Zhuge, Xinhui Han, Yinglin Zhou, Zhuyuan Ye and Wei Zou, Research and development of botnets, Journal of Software, vol. 19, Mar. 2008, pp [2] Zonghu Zhang, Ando Ruo and Kadobayashi Youki, Hardening botnet by a rational botmaster, 4 th International Conference on Information Security and Cryptology, [3] Ping Wang, Sherri Sparks and Cliff C. Zou, An advanced hybrid peer-to-peer botnet, IEEE Transactions on Dependable and Secure Computing, vol. 7, 2010, pp [4] Wei Wang, Binxing Fang and Cui Xiang, IRC botnet detection based on host behavior, Chinese Journal of Computers, vol. 32, Oct. 2009, pp [5] Guofei Gu, Junjie Zhang and Wenke Lee, BotSniffer:Detecting Botnet Command and Control Channels innetwork Traffic, 15 th Annual Network and Distributed System Security Symposium (NDSS 2008), [6] Wei Wang, Binxing Fang, Zhaoxin Zhang and Chao Li, A novel approach to detect IRC-based botnets, International Conference on Networks Security, Wireless Communications and Trusted Computing (NSWCTC 2009), Apr [7] Jan Goebel and Thorsten Holz, Rishi: Identify Bot Contaminated Hosts by IRC Nickname Evaluation, 1 st Conference on Hot Topics in Understanding Botnets(HotBots 2007),CA USA, [8] Wei Lu and A A. Ghorbani, Botnets Detection Based on IRC-Community, IEEE Global Telecommunications Conference (GLOBECOM 2008), [9] Wenhwa Liao and Chiaching Chang, Peer to Peer detection data mining scheme, International Conference on Internet Technology and Applications (ITAP 2010), Agu [10] Zeidanloo Hossein Rouhani, Manaf Azizah Bt, Vahdani Payam, Tabatabaei Farzaneh and Zamani Mazdak, Botnet detection based on traffic monitoring, International Conference on Networking and Information Technology (ICNIT 2010), June [11] Dan Liu, Yichao Li, Yue Hu and Zongwen Liang, A P2Pbotnet detection model and algorithms based on network streams analysis, 2010 International Conference on Future Information Technology and Management Engineering (FITME 2010), Oct [12] Chang Su and Thomas E. Daniels, P2P botnet detection using behavio clustering & statistical tests, ACM Conference on Computer and Communications Security (AISec 09), Nov [13] Sanqki Yun, Byunqseung Kim, Saewoong Bahk and Hyoqon Kim, Identifying IP blocks with spamming bots by spatial distribution, IEICE Transactions on Communications, vol. E93-B, Aug. 2010, pp [14] Alexander K. Seewald and Wilfried N. Gansterer, On the detection and identification of botnets, Computers and Security, vol. 29, Feb. 2010, pp [15] M. R. Garey, D. S. Johnson and L. Stockmeyer, Some simplified NP-complete problems, 6 th annual ACM symposium on Theory of computing(stoc 74), New York, USA, [16] S. Balaji, V. Swaminathan and K. Kannan, An effective algorithm for minimum weighted vertex cover problem, International Journal of Computational and Mathematical Sciences, vol. 4, Winter 2010, pp [17] Mingyu Xiao, Jianer Chen and Xuli Han, Improvement on vertex cover and independent set problem for low-degree graphs, Chinese Journal of Computers, vol. 28, Feb. 2005, pp [18] Mingyu Xiao, A note on vertex cover in graphs with maximum degree 3, Lecture Notes in Computer Science, vol. 6196, 2010, pp [19] Duanbin Chen, Ying Wan, Junwei Tian and Yan Fu, A P2P botnet control strategy based on social network analysis, Jisuanji Kexue, vol.6, 2009, pp [20] SPAN, lyst6500/ios/12.2sxf/native/configuration/guide/span.html #wp [21] Marios Iliofotou, Hyunchul Kim, Michalis Faloutsos, Michael Mitzenmacher, Prashanth Pappu and George Varghese, Graption: A graph-based P2P traffic classification framework for the internet backbone, Computer Networks, vol. 55, June. 2011, pp

6 JOURNAL OF NETWORKS, VOL. 7, NO. 8, AUGUST Lei Xu is an undergraduate in the college of computer at Nanjing University of Posts and Telecommunications. His research interests include computer nework and information security. Xiaolong Xu graduated from Nanjing University of Posts and Telecommunications (NUPT), China, in He received the M.E. degree from NUPT in 2002 and the ph.d degree from NUPT, China, in He is currently an asociate profesor at College of Computer, NUPT. His research interests include computer software, distributed computing, senor networks and information security. Yue Zhuo is an undergraduate in the college of computer at Nanjing University of Posts and Telecommunications. His research interest is information security.

Multi-phase IRC Botnet & Botnet Behavior Detection Model

Multi-phase IRC Botnet & Botnet Behavior Detection Model Software Verification and Validation Multi-phase IRC Botnet & Botnet Behavior Detection Model Aymen AlAwadi aymen@tmit.bme.hu Budapest university of technology and economics Department of Telecommunications

More information

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran

Botnets: A Survey. Rangadurai Karthick R [CS10S009] Guide: Dr. B Ravindran 08-08-2011 Guide: Dr. B Ravindran Outline 1 Introduction 2 3 4 5 6 2 Big Picture Recent Incidents Reasons for Study Internet Scenario Major Threats Flooding attacks Spamming Phishing Identity theft, etc.

More information

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS

ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS ANALYSIS AND EVALUATION OF DISTRIBUTED DENIAL OF SERVICE ATTACKS IDENTIFICATION METHODS Saulius Grusnys, Ingrida Lagzdinyte Kaunas University of Technology, Department of Computer Networks, Studentu 50,

More information

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts

BotCatch: Botnet Detection Based on Coordinated Group Activities of Compromised Hosts 2014 7th International Symposium on Telecommunications (IST'2014) BotCatch: Botnet Based on Coordinated Group Activities of Compromised Hosts Mosa Yahyazadeh and Mahdi Abadi Faculty of Electrical and Computer

More information

Outline. Motivation. Our System. Conclusion

Outline. Motivation. Our System. Conclusion Outline Motivation Our System Evaluation Conclusion 1 Botnet A botnet is a collection of bots controlled by a botmaster via a command and control (C&C) channel Centralized C&C, P2P-based C&C Botnets serve

More information

P2P Botnet Detection Method Based on Data Flow. Wang Jiajia 1, a Chen Yu1,b

P2P Botnet Detection Method Based on Data Flow. Wang Jiajia 1, a Chen Yu1,b 2nd International Symposium on Advances in Electrical, Electronics and Computer Engineering (ISAEECE 2017) P2P Botnet Detection Method Based on Data Flow Wang Jiajia 1, a Chen Yu1,b 1 Taizhou Pylotechnic

More information

A method of three-dimensional subdivision of arbitrary polyhedron by. using pyramids

A method of three-dimensional subdivision of arbitrary polyhedron by. using pyramids 5th International Conference on Measurement, Instrumentation and Automation (ICMIA 2016) A method of three-dimensional subdivision of arbitrary polyhedron by using pyramids LIU Ji-bo1,a*, Wang Zhi-hong1,b,

More information

Multi-Stream Fused Model: A Novel Real-Time Botnet Detecting Model

Multi-Stream Fused Model: A Novel Real-Time Botnet Detecting Model Bonfring International Journal of Data Mining, Vol. 7, No. 2, May 2017 6 Multi-Stream Fused Model: A Novel Real-Time Botnet Detecting Model Jae Moon Lee and Thien Nguyen Phu Abstract--- In the current

More information

A Method and System for Thunder Traffic Online Identification

A Method and System for Thunder Traffic Online Identification 2016 3 rd International Conference on Engineering Technology and Application (ICETA 2016) ISBN: 978-1-60595-383-0 A Method and System for Thunder Traffic Online Identification Jinfu Chen Institute of Information

More information

Tree-Based Minimization of TCAM Entries for Packet Classification

Tree-Based Minimization of TCAM Entries for Packet Classification Tree-Based Minimization of TCAM Entries for Packet Classification YanSunandMinSikKim School of Electrical Engineering and Computer Science Washington State University Pullman, Washington 99164-2752, U.S.A.

More information

Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology

Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology , pp.49-54 http://dx.doi.org/10.14257/astl.2014.45.10 Organization and Retrieval Method of Multimodal Point of Interest Data Based on Geo-ontology Ying Xia, Shiyan Luo, Xu Zhang, Hae Yong Bae Research

More information

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs

An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs An Cross Layer Collaborating Cache Scheme to Improve Performance of HTTP Clients in MANETs Jin Liu 1, Hongmin Ren 1, Jun Wang 2, Jin Wang 2 1 College of Information Engineering, Shanghai Maritime University,

More information

An Improved Pre-classification Method for Offline Handwritten Chinese Character Using Four Corner Feature

An Improved Pre-classification Method for Offline Handwritten Chinese Character Using Four Corner Feature ISBN 978-952-5726-04-6 (Print), 978-952-5726-05-3 (CD-ROM) Proceedings of the International Symposium on Intelligent Information Systems and Applications (IISA 09) Qingdao, P. R. China, Oct. 28-30, 2009,

More information

A New Logging-based IP Traceback Approach using Data Mining Techniques

A New Logging-based IP Traceback Approach using Data Mining Techniques using Data Mining Techniques Internet & Multimedia Engineering, Konkuk University, Seoul, Republic of Korea hsriverv@gmail.com, kimsr@konuk.ac.kr Abstract IP Traceback is a way to search for sources of

More information

International Journal of Advance Engineering and Research Development

International Journal of Advance Engineering and Research Development Scientific Journal of Impact Factor (SJIF): 5.71 International Journal of Advance Engineering and Research Development Volume 5, Issue 03, March -2018 e-issn (O): 2348-4470 p-issn (P): 2348-6406 BATCH

More information

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo

A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Novel Intrusion Detection Method for WSN Sijia Wang a, Qi Li and Yanhui Guo Beijing University of

More information

The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus

The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based on CAN Bus Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1461-1465 1461 Open Access The Study of Intelligent Scheduling Algorithm in the Vehicle ECU based

More information

A reversible data hiding based on adaptive prediction technique and histogram shifting

A reversible data hiding based on adaptive prediction technique and histogram shifting A reversible data hiding based on adaptive prediction technique and histogram shifting Rui Liu, Rongrong Ni, Yao Zhao Institute of Information Science Beijing Jiaotong University E-mail: rrni@bjtu.edu.cn

More information

Clustering-Based Distributed Precomputation for Quality-of-Service Routing*

Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Clustering-Based Distributed Precomputation for Quality-of-Service Routing* Yong Cui and Jianping Wu Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 cy@csnet1.cs.tsinghua.edu.cn,

More information

An Improved DV-Hop Algorithm for Resisting Wormhole Attack

An Improved DV-Hop Algorithm for Resisting Wormhole Attack Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 2015, 9, 1443-1448 1443 Open Access An Improved DV-Hop Algorithm for Resisting Wormhole Attack Xiaoying

More information

An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c

An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1, a, Guoqiang LI 1, b Li LIU 1, c International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) An improved energy Minimum Connected Dominating Sets Construction Algorithm in MANET Zifen YANG 1,

More information

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix

Privacy-Preserving of Check-in Services in MSNS Based on a Bit Matrix BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 2 Sofia 2015 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2015-0032 Privacy-Preserving of Check-in

More information

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack

Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack Computer Based Image Algorithm For Wireless Sensor Networks To Prevent Hotspot Locating Attack J.Anbu selvan 1, P.Bharat 2, S.Mathiyalagan 3 J.Anand 4 1, 2, 3, 4 PG Scholar, BIT, Sathyamangalam ABSTRACT:

More information

Adaptive Doppler centroid estimation algorithm of airborne SAR

Adaptive Doppler centroid estimation algorithm of airborne SAR Adaptive Doppler centroid estimation algorithm of airborne SAR Jian Yang 1,2a), Chang Liu 1, and Yanfei Wang 1 1 Institute of Electronics, Chinese Academy of Sciences 19 North Sihuan Road, Haidian, Beijing

More information

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks*

Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Combining Cross-Correlation and Fuzzy Classification to Detect Distributed Denial-of-Service Attacks* Wei Wei 1, Yabo Dong 1, Dongming Lu 1, and Guang Jin 2 1 College of Compute Science and Technology,

More information

A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES

A REVIEW OF PEER-TO-PEER BOTNET DETECTION TECHNIQUES Journal of Computer Science 10 (1): 169-177, 2014 ISSN: 1549-3636 2014 doi:10.3844/jcssp.2014.169.177 Published Online 10 (1) 2014 (http://www.thescipub.com/jcs.toc) A REVIEW OF PEER-TO-PEER BOTNET DETECTION

More information

ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit

ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit ANN-Based Modeling for Load and Main Steam Pressure Characteristics of a 600MW Supercritical Power Generating Unit Liangyu Ma, Zhiyuan Gao Automation Department, School of Control and Computer Engineering

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

The Evaluation of Hash Algorithm based on Flows in the Network Equipment

The Evaluation of Hash Algorithm based on Flows in the Network Equipment The Evaluation of Hash Algorithm based on Flows in the Network Equipment Xin Zou 1, Li Zhou 1, Liangyi Gong 1 National Computer Network & Information Security Administrative Center, Beijing 10009, P.R.China

More information

Graph-based Detection of Anomalous Network Traffic

Graph-based Detection of Anomalous Network Traffic Graph-based Detection of Anomalous Network Traffic Do Quoc Le Supervisor: Prof. James Won-Ki Hong Distributed Processing & Network Management Lab Division of IT Convergence Engineering POSTECH, Korea lequocdo@postech.ac.kr

More information

REPORT DOCUMENTATION PAGE

REPORT DOCUMENTATION PAGE REPORT DOCUMENTATION PAGE Form Approved OMB NO. 0704-0188 The public reporting burden for this collection of information is estimated to average 1 hour per response, including the time for reviewing instructions,

More information

A New Method Of VPN Based On LSP Technology

A New Method Of VPN Based On LSP Technology 2nd Joint International Information Technology, Mechanical and Electronic Engineering Conference (JIMEC 2017) A New Method Of VPN Based On LSP Technology HaiJun Qing 1, 2 1, 2, ChaoXiang Liang, LiPing

More information

An Adaptive Threshold LBP Algorithm for Face Recognition

An Adaptive Threshold LBP Algorithm for Face Recognition An Adaptive Threshold LBP Algorithm for Face Recognition Xiaoping Jiang 1, Chuyu Guo 1,*, Hua Zhang 1, and Chenghua Li 1 1 College of Electronics and Information Engineering, Hubei Key Laboratory of Intelligent

More information

A Design of Remote Monitoring System based on 3G and Internet Technology

A Design of Remote Monitoring System based on 3G and Internet Technology National Conference on Information Technology and Computer Science (CITCS 2012) A Design of Remote Monitoring System based on 3G and Internet Technology Shouxian WEN Lei XU Xingguo SUN Xiaohui LI* Abstract

More information

Detecting Spam Zombies By Monitoring Outgoing Messages

Detecting Spam Zombies By Monitoring Outgoing Messages International Refereed Journal of Engineering and Science (IRJES) ISSN (Online) 2319-183X, (Print) 2319-1821 Volume 5, Issue 5 (May 2016), PP.71-75 Detecting Spam Zombies By Monitoring Outgoing Messages

More information

Journal of Chemical and Pharmaceutical Research, 2014, 6(7): Research Article

Journal of Chemical and Pharmaceutical Research, 2014, 6(7): Research Article Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2014, 6(7):1055-1063 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The novel approach of P2P Botnet Node-based detection

More information

Accuracy of Matching between Probe-Vehicle and GIS Map

Accuracy of Matching between Probe-Vehicle and GIS Map Proceedings of the 8th International Symposium on Spatial Accuracy Assessment in Natural Resources and Environmental Sciences Shanghai, P. R. China, June 25-27, 2008, pp. 59-64 Accuracy of Matching between

More information

The Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm

The Improved Embedded Zerotree Wavelet Coding (EZW) Algorithm 01 International Conference on Image, Vision and Computing (ICIVC 01) IPCSI vol. 50 (01) (01) IACSI Press, Singapore DOI: 10.7763/IPCSI.01.V50.56 he Improved Embedded Zerotree Wavelet Coding () Algorithm

More information

A Method of Identifying the P2P File Sharing

A Method of Identifying the P2P File Sharing IJCSNS International Journal of Computer Science and Network Security, VOL.10 No.11, November 2010 111 A Method of Identifying the P2P File Sharing Jian-Bo Chen Department of Information & Telecommunications

More information

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM

Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Performance Degradation Assessment and Fault Diagnosis of Bearing Based on EMD and PCA-SOM Lu Chen and Yuan Hang PERFORMANCE DEGRADATION ASSESSMENT AND FAULT DIAGNOSIS OF BEARING BASED ON EMD AND PCA-SOM.

More information

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm

Mitigating Hot Spot Problems in Wireless Sensor Networks Using Tier-Based Quantification Algorithm BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 16, No 1 Sofia 2016 Print ISSN: 1311-9702; Online ISSN: 1314-4081 DOI: 10.1515/cait-2016-0005 Mitigating Hot Spot Problems

More information

Real-time Aerial Targets Detection Algorithm Based Background Subtraction

Real-time Aerial Targets Detection Algorithm Based Background Subtraction Real-time Aerial Targets Detection Algorithm Based Background Subtraction Mao Zheng, Zhen-Rong Wu, Saidsho Bakhdavlatov, Jing-Song Qu, Hong-Yan Li, Jian -Jian Yuan (College of Electronic and control Engineering,

More information

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks

Energy Optimized Routing Algorithm in Multi-sink Wireless Sensor Networks Appl. Math. Inf. Sci. 8, No. 1L, 349-354 (2014) 349 Applied Mathematics & Information Sciences An International Journal http://dx.doi.org/10.12785/amis/081l44 Energy Optimized Routing Algorithm in Multi-sink

More information

Adjacent Vertex Distinguishing Incidence Coloring of the Cartesian Product of Some Graphs

Adjacent Vertex Distinguishing Incidence Coloring of the Cartesian Product of Some Graphs Journal of Mathematical Research & Exposition Mar., 2011, Vol. 31, No. 2, pp. 366 370 DOI:10.3770/j.issn:1000-341X.2011.02.022 Http://jmre.dlut.edu.cn Adjacent Vertex Distinguishing Incidence Coloring

More information

BotDigger: A Fuzzy Inference System for Botnet Detection

BotDigger: A Fuzzy Inference System for Botnet Detection The Fifth International Conference on Internet Monitoring and Protection BotDigger: A Fuzzy Inference System for Botnet Detection Basheer Al-Duwairi Network Engineering and Security Department Jordan University

More information

Data Structure Optimization of AS_PATH in BGP

Data Structure Optimization of AS_PATH in BGP Data Structure Optimization of AS_PATH in BGP Weirong Jiang Research Institute of Information Technology, Tsinghua University, Beijing, 100084, P.R.China jwr2000@mails.tsinghua.edu.cn Abstract. With the

More information

A Static-Dynamic Conjunct Windows Process Integrity Detection Model

A Static-Dynamic Conjunct Windows Process Integrity Detection Model A Static-Dynamic Conjunct Windows Process Integrity Detection Model Fei Chen 1, Yi Li 1, Tong Zhang 1, Kehe Wu 1, 1 North China Electric Power University, Department of Control and Computer Engineering,

More information

ZigBee Routing Algorithm Based on Energy Optimization

ZigBee Routing Algorithm Based on Energy Optimization Sensors & Transducers 2013 by IFSA http://www.sensorsportal.com ZigBee Routing Algorithm Based on Energy Optimization Wangang Wang, Yong Peng, Yongyu Peng Chongqing City Management College, No. 151 Daxuecheng

More information

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3

Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Design and Implementation of an Anycast Efficient QoS Routing on OSPFv3 Han Zhi-nan Yan Wei Zhang Li Wang Yue Computer Network Laboratory Department of Computer Science & Technology, Peking University

More information

The Key Technology and Algorithm Design for the Development of Intelligent Examination System

The Key Technology and Algorithm Design for the Development of Intelligent Examination System 6th International Conference on Electronics, Mechanics, Culture and Medicine (EMCM 2015) The Key Technology and Algorithm Design for the Development of Intelligent Examination System Kai Lu1, a * and Mingrui

More information

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database

An Improved Frequent Pattern-growth Algorithm Based on Decomposition of the Transaction Database Algorithm Based on Decomposition of the Transaction Database 1 School of Management Science and Engineering, Shandong Normal University,Jinan, 250014,China E-mail:459132653@qq.com Fei Wei 2 School of Management

More information

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis

Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis Sensors & Transducers 2014 by IFSA Publishing, S. L. http://www.sensorsportal.com Improvement of SURF Feature Image Registration Algorithm Based on Cluster Analysis 1 Xulin LONG, 1,* Qiang CHEN, 2 Xiaoya

More information

Study on Simulated ZMW Attack. Xingman Chen, Yanhui Guo, Qi Li

Study on Simulated ZMW Attack. Xingman Chen, Yanhui Guo, Qi Li 5th International Conference on Education, Management, Information and Medicine (EMIM 2015) Study on Simulated ZMW Attack Xingman Chen, Yanhui Guo, Qi Li Beijing University of Post and Telecommunications,

More information

New-fangled Method against Data Flooding Attacks in MANET

New-fangled Method against Data Flooding Attacks in MANET New-fangled Method against Data Flooding Attacks in MANET Kavuri Roshan 1, K.Reddi Prasad 2, Niraj Upadhayaya 3 & A.Govardhan 4 1, 2&3 Department of Computer Science & Information Technology, J.B. Institute

More information

A multi-step attack-correlation method with privacy protection

A multi-step attack-correlation method with privacy protection A multi-step attack-correlation method with privacy protection Research paper A multi-step attack-correlation method with privacy protection ZHANG Yongtang 1, 2, LUO Xianlu 1, LUO Haibo 1 1. Department

More information

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India

@IJMTER-2016, All rights Reserved ,2 Department of Computer Science, G.H. Raisoni College of Engineering Nagpur, India Secure and Flexible Communication Technique: Implementation Using MAC Filter in WLAN and MANET for IP Spoofing Detection Ashwini R. Vaidya 1, Siddhant Jaiswal 2 1,2 Department of Computer Science, G.H.

More information

A Spherical Placement and Migration Scheme for a STT-RAM Based Hybrid Cache in 3D chip Multi-processors

A Spherical Placement and Migration Scheme for a STT-RAM Based Hybrid Cache in 3D chip Multi-processors , July 4-6, 2018, London, U.K. A Spherical Placement and Migration Scheme for a STT-RAM Based Hybrid in 3D chip Multi-processors Lei Wang, Fen Ge, Hao Lu, Ning Wu, Ying Zhang, and Fang Zhou Abstract As

More information

Video Inter-frame Forgery Identification Based on Optical Flow Consistency

Video Inter-frame Forgery Identification Based on Optical Flow Consistency Sensors & Transducers 24 by IFSA Publishing, S. L. http://www.sensorsportal.com Video Inter-frame Forgery Identification Based on Optical Flow Consistency Qi Wang, Zhaohong Li, Zhenzhen Zhang, Qinglong

More information

Detecting Botnets Using Cisco NetFlow Protocol

Detecting Botnets Using Cisco NetFlow Protocol Detecting Botnets Using Cisco NetFlow Protocol Royce Clarenz C. Ocampo 1, *, and Gregory G. Cu 2 1 Computer Technology Department, College of Computer Studies, De La Salle University, Manila 2 Software

More information

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua

Design of student information system based on association algorithm and data mining technology. CaiYan, ChenHua 5th International Conference on Mechatronics, Materials, Chemistry and Computer Engineering (ICMMCCE 2017) Design of student information system based on association algorithm and data mining technology

More information

A Game Map Complexity Measure Based on Hamming Distance Yan Li, Pan Su, and Wenliang Li

A Game Map Complexity Measure Based on Hamming Distance Yan Li, Pan Su, and Wenliang Li Physics Procedia 22 (2011) 634 640 2011 International Conference on Physics Science and Technology (ICPST 2011) A Game Map Complexity Measure Based on Hamming Distance Yan Li, Pan Su, and Wenliang Li Collage

More information

Model the P2P Attack in Computer Networks

Model the P2P Attack in Computer Networks International Conference on Logistics Engineering, Management and Computer Science (LEMCS 2015) Model the P2P Attack in Computer Networks Wei Wang * Science and Technology on Communication Information

More information

Research on QR Code Image Pre-processing Algorithm under Complex Background

Research on QR Code Image Pre-processing Algorithm under Complex Background Scientific Journal of Information Engineering May 207, Volume 7, Issue, PP.-7 Research on QR Code Image Pre-processing Algorithm under Complex Background Lei Liu, Lin-li Zhou, Huifang Bao. Institute of

More information

Integration of information security and network data mining technology in the era of big data

Integration of information security and network data mining technology in the era of big data Acta Technica 62 No. 1A/2017, 157 166 c 2017 Institute of Thermomechanics CAS, v.v.i. Integration of information security and network data mining technology in the era of big data Lu Li 1 Abstract. The

More information

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES

STUDYING OF CLASSIFYING CHINESE SMS MESSAGES STUDYING OF CLASSIFYING CHINESE SMS MESSAGES BASED ON BAYESIAN CLASSIFICATION 1 LI FENG, 2 LI JIGANG 1,2 Computer Science Department, DongHua University, Shanghai, China E-mail: 1 Lifeng@dhu.edu.cn, 2

More information

HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging

HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging 007 International Conference on Convergence Information Technology HFCT: A Hybrid Fuzzy Clustering Method for Collaborative Tagging Lixin Han,, Guihai Chen Department of Computer Science and Engineering,

More information

A Review- Botnet Detection and Suppression in Clouds Miss Namrata A. Sable #1, Prof. Dinesh S. Datar #2

A Review- Botnet Detection and Suppression in Clouds Miss Namrata A. Sable #1, Prof. Dinesh S. Datar #2 A Review- Botnet Detection and Suppression in Clouds Miss Namrata A. Sable #1, Prof. Dinesh S. Datar #2 #1 M.E.(Computer science & Engineering, #2 Assistant Professor # Department of Computer Science &

More information

High Capacity Reversible Watermarking Scheme for 2D Vector Maps

High Capacity Reversible Watermarking Scheme for 2D Vector Maps Scheme for 2D Vector Maps 1 Information Management Department, China National Petroleum Corporation, Beijing, 100007, China E-mail: jxw@petrochina.com.cn Mei Feng Research Institute of Petroleum Exploration

More information

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks

Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks IJCSNS International Journal of Computer Science and Network Security, VOL.17 No.9, September 2017 139 Nodes Energy Conserving Algorithms to prevent Partitioning in Wireless Sensor Networks MINA MAHDAVI

More information

The application of a kind of duplex layer KMP algorithm within flow filtering technology

The application of a kind of duplex layer KMP algorithm within flow filtering technology Available online www.jocpr.com Journal of Chemical and Pharmaceutical Research, 2013, 5(9):515-521 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 The application of a kind of duplex layer KMP algorithm

More information

Text Clustering Incremental Algorithm in Sensitive Topic Detection

Text Clustering Incremental Algorithm in Sensitive Topic Detection International Journal of Information and Communication Sciences 2018; 3(3): 88-95 http://www.sciencepublishinggroup.com/j/ijics doi: 10.11648/j.ijics.20180303.12 ISSN: 2575-1700 (Print); ISSN: 2575-1719

More information

Random Neural Networks for the Adaptive Control of Packet Networks

Random Neural Networks for the Adaptive Control of Packet Networks Random Neural Networks for the Adaptive Control of Packet Networks Michael Gellman and Peixiang Liu Dept. of Electrical & Electronic Eng., Imperial College London {m.gellman,p.liu}@imperial.ac.uk Abstract.

More information

arxiv: v1 [cs.cr] 31 Dec 2018

arxiv: v1 [cs.cr] 31 Dec 2018 Security analysis of a self-embedding fragile image watermark scheme Xinhui Gong, Feng Yu, Xiaohong Zhao, Shihong Wang School of Science, Beijing University of Posts and Telecommunications, Beijing 100876,

More information

A Review-Botnet Detection and Suppression in Clouds

A Review-Botnet Detection and Suppression in Clouds A Review-Botnet Detection and Suppression in Clouds Namrata A. sable M.E.(CSE) G. H. Raisoni College of Engineering & Management, Amravati SGBAU, Amravati University Amravati(MS), India E-mail: namratasable10@gmail.com

More information

Research on Mining Cloud Data Based on Correlation Dimension Feature

Research on Mining Cloud Data Based on Correlation Dimension Feature 2016 4 th International Conference on Advances in Social Science, Humanities, and Management (ASSHM 2016) ISBN: 978-1-60595-412-7 Research on Mining Cloud Data Based on Correlation Dimension Feature Jingwen

More information

A New Distance Independent Localization Algorithm in Wireless Sensor Network

A New Distance Independent Localization Algorithm in Wireless Sensor Network A New Distance Independent Localization Algorithm in Wireless Sensor Network Siwei Peng 1, Jihui Li 2, Hui Liu 3 1 School of Information Science and Engineering, Yanshan University, Qinhuangdao 2 The Key

More information

Design Universal Security Scheme for Broadband Router

Design Universal Security Scheme for Broadband Router International Journal of Security, Vol.10, No.2, PP.81 86, Mar. 2010 81 Design Universal Security Scheme for Broadband Router Xiaozhuo Gu 1,2 and Jianzu Yang 2 (Corresponding author: Xiaozhuo Gu) National

More information

IP Packet Filtering using Hash Table for Dedicated Real Time IP Filter

IP Packet Filtering using Hash Table for Dedicated Real Time IP Filter I.J. Wireless and Microwave Technologies, 2017, 1, 24-29 Published Online January 2017 in MECS(http://www.mecs-press.net) DOI: 10.5815/ijwmt.2017.01.03 Available online at http://www.mecs-press.net/ijwmt

More information

Open Access Research on the Prediction Model of Material Cost Based on Data Mining

Open Access Research on the Prediction Model of Material Cost Based on Data Mining Send Orders for Reprints to reprints@benthamscience.ae 1062 The Open Mechanical Engineering Journal, 2015, 9, 1062-1066 Open Access Research on the Prediction Model of Material Cost Based on Data Mining

More information

The Research of Delay Characteristics in CAN Bus Networked Control System

The Research of Delay Characteristics in CAN Bus Networked Control System Journal of Computational Information Systems 9: 18 (2013) 7517 7523 Available at http://www.jofcis.com The Research of Delay Characteristics in CAN Bus Networked Control System Yi WANG 1, Liren HE 2, Ming

More information

A new improved ant colony algorithm with levy mutation 1

A new improved ant colony algorithm with levy mutation 1 Acta Technica 62, No. 3B/2017, 27 34 c 2017 Institute of Thermomechanics CAS, v.v.i. A new improved ant colony algorithm with levy mutation 1 Zhang Zhixin 2, Hu Deji 2, Jiang Shuhao 2, 3, Gao Linhua 2,

More information

DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM

DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM DESIGN AND IMPLEMENTATION OF VARIABLE RADIUS SPHERE DECODING ALGORITHM Wu Di, Li Dezhi and Wang Zhenyong School of Electronics and Information Engineering, Harbin Institute of Technology, Harbin, China

More information

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS

BioTechnology. An Indian Journal FULL PAPER. Trade Science Inc. Research on motion tracking and detection of computer vision ABSTRACT KEYWORDS [Type text] [Type text] [Type text] ISSN : 0974-7435 Volume 10 Issue 21 BioTechnology 2014 An Indian Journal FULL PAPER BTAIJ, 10(21), 2014 [12918-12922] Research on motion tracking and detection of computer

More information

Study on Image Position Algorithm of the PCB Detection

Study on Image Position Algorithm of the PCB Detection odern Applied cience; Vol. 6, No. 8; 01 IN 1913-1844 E-IN 1913-185 Published by Canadian Center of cience and Education tudy on Image Position Algorithm of the PCB Detection Zhou Lv 1, Deng heng 1, Yan

More information

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang

A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks. Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang A Low-Overhead Hybrid Routing Algorithm for ZigBee Networks Zhi Ren, Lihua Tian, Jianling Cao, Jibi Li, Zilong Zhang Chongqing Key Lab of Mobile Communications Technology, Chongqing University of Posts

More information

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks

An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks An Efficient Bandwidth Estimation Schemes used in Wireless Mesh Networks First Author A.Sandeep Kumar Narasaraopeta Engineering College, Andhra Pradesh, India. Second Author Dr S.N.Tirumala Rao (Ph.d)

More information

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory

Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Copyright 2018 Tech Science Press CMC, vol.57, no.2, pp.297-306, 2018 Multi-VMs Intrusion Detection for Cloud Security Using Dempster-shafer Theory Chak Fong Cheang 1, *, Yiqin Wang 1, Zhiping Cai 2 and

More information

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2

Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang Tang 1, Huichun Peng 2 International Conference on Automation, Mechanical Control and Computational Engineering (AMCCE 2015) Test Analysis of Serial Communication Extension in Mobile Nodes of Participatory Sensing System Xinqiang

More information

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015)

International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) International Conference on Advances in Mechanical Engineering and Industrial Informatics (AMEII 2015) A Cross Traffic Estimate Model for Optical Burst Switching Networks Yujue WANG 1, Dawei NIU 2, b,

More information

An Embedded Dynamic Security Networking Technology Based on Quick Jump and Trust

An Embedded Dynamic Security Networking Technology Based on Quick Jump and Trust Send Orders for Reprints to reprints@benthamscience.ae The Open Cybernetics & Systemics Journal, 014, 8, 579-585 579 Open Access An Embedded Dynamic Security Networking Technology Based on Quick Jump and

More information

Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen

Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen Estimating Persistent Spread in High-speed Networks Qingjun Xiao, Yan Qiao, Zhen Mo, Shigang Chen Southeast University of China University of Florida Motivation for Persistent Stealthy Spreaders Imagine

More information

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS

MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Science MODELING AND SIMULATION OF THRESHOLD ANALYSIS FOR PVFS IN WIRELESS SENSOR NETWORKS Tae Ho Cho *1, Su Man Nam 2 *1 College of Software, Sungkyunkwan University, KOREA 2 College of Information and

More information

Next Generation Campus Network Deployment Project Based on Softswitch

Next Generation Campus Network Deployment Project Based on Softswitch I.J. Wireless and Microwave Technologies, 2011, 4, 47-54 Published Online August 2011 in MECS (http://www.mecs-press.net) DOI: 10.5815/ijwmt.2011.04.07 Available online at http://www.mecs-press.net/ijwmt

More information

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2

A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang 2, a, Lu Wang 2 5th International Conference on Information Engineering for Mechanics and Materials (ICIMM 2015) A SDN-like Loss Recovery Solution in Application Layer Multicast Wenqing Lei 1, Cheng Ma 1, Xinchang Zhang

More information

Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice

Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice Design of Large-scale Wire-speed Multicast Switching Fabric Based on Distributive Lattice 1 CUI Kai, 2 LI Ke-dan, 1 CHEN Fu-xing, 1 ZHU Zhi-pu, 1 ZHU Yue-sheng 1. Shenzhen Eng. Lab of Converged Networks

More information

Distributed Pub/Sub Model in CoAP-based Internet-of-Things Networks

Distributed Pub/Sub Model in CoAP-based Internet-of-Things Networks Distributed Pub/Sub Model in CoAP-based Internet-of-Things Networks Joong-Hwa Jung School of Computer Science and Engineering, Kyungpook National University Daegu, Korea godopu16@gmail.com Dong-Kyu Choi

More information

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network.

A Feedback-based Multipath Approach for Secure Data Collection in. Wireless Sensor Network. A Feedback-based Multipath Approach for Secure Data Collection in Wireless Sensor Networks Yuxin Mao School of Computer and Information Engineering, Zhejiang Gongshang University, Hangzhou 310018, P.R

More information

Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML

Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML 2018 International Conference on Modeling, Simulation and Optimization (MSO 2018) ISBN: 978-1-60595-542-1 Modeling and Analysis of the Support System of Space-based Anti-missile Information Based on UML

More information

Mubug: a mobile service for rapid bug tracking

Mubug: a mobile service for rapid bug tracking . MOO PAPER. SCIENCE CHINA Information Sciences January 2016, Vol. 59 013101:1 013101:5 doi: 10.1007/s11432-015-5506-4 Mubug: a mobile service for rapid bug tracking Yang FENG, Qin LIU *,MengyuDOU,JiaLIU&ZhenyuCHEN

More information

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating

Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,

More information