Data Mining and Machine Learning for Analysis of Network Traffic

Size: px
Start display at page:

Download "Data Mining and Machine Learning for Analysis of Network Traffic"

Transcription

1 Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković Commuicatio Networks Laboratory School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada

2 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 2

3 lhr: 535,102 odes ad 601,678 liks December 27, 2017 City Uiversity of Hog Kog, Hog Kog 3

4 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 4

5 Measuremets of etwork traffic Traffic measuremets: help uderstad characteristics of etwork traffic are basis for developig traffic models are used to evaluate performace of protocols ad applicatios Traffic aalysis: provides iformatio about the etwork usage helps uderstad the behavior of etwork users Traffic predictio: importat to assess future etwork capacity requiremets used to pla future etwork developmets December 27, 2017 City Uiversity of Hog Kog, Hog Kog 5

6 Traffic modelig: self-similarity Self-similarity implies a fractal-like behavior Data o various time scales have similar patters Implicatios: o atural legth of bursts bursts exist across may time scales traffic does ot become smoother whe aggregated (ulike Poisso traffic) it is ulike Poisso traffic used to model traffic i telephoe etworks as the traffic volume icreases, the traffic becomes more bursty ad more self-similar December 27, 2017 City Uiversity of Hog Kog, Hog Kog 6

7 Self-similarity Self-similarity implies a fractal-like behavior: data o various time scales have similar patters A wide-sese statioary process X() is called (exactly secod order) self-similar if its autocorrelatio fuctio satisfies: r (m) (k) = r(k), k 0, m = 1, 2,,, where m is the level of aggregatio December 27, 2017 City Uiversity of Hog Kog, Hog Kog 7

8 Self-similar processes Properties: slowly decayig variace log-rage depedece Hurst parameter (H) Processes with oly short-rage depedece (Poisso): H = 0.5 Self-similar processes: 0.5 < H < 1.0 As the traffic volume icreases, the traffic becomes more bursty, more self-similar, ad the Hurst parameter icreases December 27, 2017 City Uiversity of Hog Kog, Hog Kog 8

9 Self-similarity: ifluece of time-scales Geuie MPEG traffic trace E+06 5.E E+05 4.E+06 bits/time uit bits/time uit 6.E+05 4.E+05 bits/time uit 3.E+06 2.E E+05 1.E time uit = 160 ms (4 frames) 0.E time uit = 640 ms (16 frames) 0.E time uit = 2560 ms (64 frames) W. E. Lelad, M. S. Taqqu, W. Williger, ad D. V. Wilso, O the self-similar ature of Etheret traffic (exteded versio), IEEE/ACM Tras. Netw., vol. 2, o 1, pp. 1-15, Feb December 27, 2017 City Uiversity of Hog Kog, Hog Kog 9

10 Self-similarity: ifluece of time-scales Sythetically geerated Poisso model E+06 5.E E+05 4.E+06 bits/time uit bits/time uit 6.E+05 4.E+05 bits/time uit 3.E+06 2.E E+05 1.E time uit = 160 ms (4 frames) 0.E time uit = 640 ms (16 frames) 0.E time uit = 2560 ms (64 frames) W. E. Lelad, M. S. Taqqu, W. Williger, ad D. V. Wilso, O the self-similar ature of Etheret traffic (exteded versio), IEEE/ACM Tras. Netw., vol. 2, o 1, pp. 1-15, Feb December 27, 2017 City Uiversity of Hog Kog, Hog Kog 10

11 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 11

12 Case study: BCNET BCNET is the hub of advaced telecommuicatio etwork i British Columbia, Caada that offers services to research ad higher educatio istitutios The BCNET etwork is high-speed fiber optic research etwork British Columbia's etwork exteds to 1,400 km ad coects Kamloops, Kelowa, Price George, Vacouver, ad Victoria December 27, 2017 City Uiversity of Hog Kog, Hog Kog 12

13 BCNET packet capture December 27, 2017 City Uiversity of Hog Kog, Hog Kog 13

14 BCNET packet capture BCNET trasits have two service providers with 10 Gbps etwork liks ad oe service provider with 1 Gbps etwork lik Optical Test Access Poit (TAP) splits the sigal ito two distict paths The sigal splittig ratio from TAP may be modified The Data Capture Device (NijaBox 5000) collects the real-time data (packets) from the traffic filterig device December 27, 2017 City Uiversity of Hog Kog, Hog Kog 14

15 Net Optics Director 7400: applicatio diagram Net Optics Director 7400 is used for BCNET traffic filterig It directs traffic to moitorig tools such as NijaBox 5000 ad FlowMo December 27, 2017 City Uiversity of Hog Kog, Hog Kog 15

16 Network moitorig ad aalyzig: Edace card Edace Data Acquisitio ad Geeratio (DAG) 5.2X card resides iside the NijaBox 5000 It captures ad trasmits traffic ad has time-stampig capability DAG 5.2X is a sigle port Peripheral Compoet Itercoect Exteded (PCIx) card ad is capable of capturig o average Etheret traffic of 6.9 Gbps December 27, 2017 City Uiversity of Hog Kog, Hog Kog 16

17 Real time etwork usage by BCNET members December 27, 2017 City Uiversity of Hog Kog, Hog Kog 17

18 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 18

19 Case study: E-Comm etwork E-Comm etwork: a operatioal truked radio system servig as a regioal emergecy commuicatio system The E-Comm etwork is capable of both voice ad data trasmissios Voice traffic accouts for over 99% of etwork traffic A group call is a stadard call made i a truked radio system More tha 85% of calls are group calls A distributed evet log database records every evet occurrig i the etwork: call establishmet, chael assigmet, call drop, ad emergecy call December 27, 2017 City Uiversity of Hog Kog, Hog Kog 19

20 E-Comm etwork December 27, 2017 City Uiversity of Hog Kog, Hog Kog 20

21 E-Comm etwork architecture Users Trasmitters/Repeaters PSTN PBX Dispatch cosole * 8 # Vacouver I B M Network switch Other EDACS systems Buraby Database server Data gateway Maagemet cosole December 27, 2017 City Uiversity of Hog Kog, Hog Kog 21

22 Traffic data 2001 data set: 2 days of traffic data to (110,348 calls) 2002 data set: 28 days of cotiuous traffic data to (1,916,943 calls) 2003 data set: 92 days of cotiuous traffic data to (8,756,930 calls) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 22

23 Observatios Presece of daily cycles: miimum utilizatio: ~ 2 PM maximum utilizatio: 9 PM to 3 AM 2002 sample data: cell 5 is the busiest others seldom reach their capacities 2003 sample data: several cells (2, 4, 7, ad 9) have all chaels occupied durig busy hours December 27, 2017 City Uiversity of Hog Kog, Hog Kog 23

24 Call arrival rate i 2002 ad 2003: cyclic patters Number of calls Time (hours) 2002 Data 2003 Data the busiest hour is aroud midight the busiest day is Thursday Number of calls 12 x 104 Sat. Su. Mo. Tue. Wed. Thu. Fri. Time (days) useful for schedulig periodical maiteace tasks Data 2003 Data December 27, 2017 City Uiversity of Hog Kog, Hog Kog 24

25 Modelig ad characterizatio of traffic We aalyzed voice traffic from a public safety wireless etwork i Vacouver, BC call iter-arrival ad call holdig times durig five busy hours from each year (2001, 2002, 2003) Statistical distributio ad the autocorrelatio fuctio of the traffic traces: Kolmogorov-Smirov goodess-of-fit test autocorrelatio fuctios wavelet-based estimatio of the Hurst parameter B. Vujičić, N. Cackov, S. Vujičić, ad Lj. Trajković, Modelig ad characterizatio of traffic i public safety wireless etworks, i Proc. SPECTS 2005, Philadelphia, PA, July 2005, pp December 27, 2017 City Uiversity of Hog Kog, Hog Kog 25

26 Erlag traffic models Erlag B Erlag C N N A A N P N! B = P! N x C = N N A N 1 x N A A A N + x! x! N! N A x= 0 x= 0 P B : probability of rejectig a call P c : probability of delayig a call N : umber of chaels/lies A : total traffic volume December 27, 2017 City Uiversity of Hog Kog, Hog Kog 26

27 Hourly traces Call holdig ad call iter-arrival times from the five busiest hours i each dataset (2001, 2002, ad 2003) Day/hour No. Day/hour No. Day/hour No :00 16: :00 01: :00 17: :00 20: :00 21:00 3,718 3,707 3,492 3,312 3, :00 05: :00 23: :00 24: :00 01: :00 01:00 4,436 4,314 4,179 3,971 3, :00 23: :00 24: :00 24: :00 03: :00 02:00 4,919 4,249 4,222 4,150 4,097 December 27, 2017 City Uiversity of Hog Kog, Hog Kog 27

28 Statistical distributios Fourtee cadidate distributios: expoetial, Weibull, gamma, ormal, logormal, logistic, log-logistic, Nakagami, Rayleigh, Ricia, t-locatio scale, Birbaum-Sauders, extreme value, iverse Gaussia Parameters of the distributios: calculated by performig maximum likelihood estimatio Best fittig distributios are determied by: visual ispectio of the distributio of the trace ad the cadidate distributios Kolmogorov-Smirov test of potetial cadidates December 27, 2017 City Uiversity of Hog Kog, Hog Kog 28

29 Call iter-arrival times: pdf cadidates Probability desity Traffic data Expoetial model Logormal model Weibull model Gamma model Rayleigh model Normal model Call iter-arrival time (s) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 29

30 Call iter-arrival times: K-S test results (2003 data) Distributio Expoetial Weibull Gamma Logormal Parameter , 22:00 23: , 23:00 24: , 23:00 24: , 02:00 03: , 01:00 02:00 h p k h p k h p k h p 1.015E E E E E-21 k December 27, 2017 City Uiversity of Hog Kog, Hog Kog 30

31 Call iter-arrival times: estimates of H Traces pass the test for time costacy of a: estimates of H are reliable Day/hour H Day/hour H Day/hour H :00 16: :00 01: :00 17: :00 20: :00 21: :00 05: :00 23: :00 24: :00 01: :00 01: :00 23: :00 24: :00 24: :00 03: :00 02: December 27, 2017 City Uiversity of Hog Kog, Hog Kog 31

32 Call holdig times: pdf cadidates Probability desity Traffic data Logormal model Gamma model Weibull model Expoetial model Normal model Rayleigh model Call holdig time (s) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 32

33 Call holdig times: estimates of H All (except oe) traces pass the test for costacy of a oly oe ureliable estimate (*): cosistet value Day/hour H Day/hour H Day/hour H :00 16: :00 05: :00 23: :00 01: :00 23: :00 24: :00 17: :00 24: :00 24: * :00 20: :00 01: :00 03: :00 21: :00 01: :00 02: December 27, 2017 City Uiversity of Hog Kog, Hog Kog 33

34 Call iter-arrival ad call holdig times Day/hour Avg. (s) Day/hour Avg. (s) Day/hour Avg. (s) iter-arrival holdig 15:00 16: :00 05: :00 23: iter-arrival holdig 00:00 01: :00 23: :00 24: iter-arrival holdig 16:00 17: :00 24: :00 24: iter-arrival holdig 19:00 20: :00 01: :00 03: iter-arrival holdig 20:00 21: :00 01: :00 02: Avg. call iter-arrival times: 1.08 s (2001), 0.86 s (2002), 0.84 s (2003) Avg. call holdig times: 3.91 s (2001), 3.96 s (2002), 4.13 s (2003) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 34

35 Busy hour: best fittig distributios Distributio Busy hour Call iter-arrival times Call holdig times Weibull Gamma Logormal a b a b µ σ :00 16: :00 01: :00 17: :00 05: :00 23: :00 24: :00 23: :00 24: :00 24: December 27, 2017 City Uiversity of Hog Kog, Hog Kog 35

36 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 36

37 Case study: ChiaSat DirecPC system ChiaSat hybrid satellite etwork Employs geosychrous satellites deployed by Hughes Network Systems Ic. Provides data ad televisio services: DirecPC (Classic): uidirectioal satellite data service DirecTV: satellite televisio service DirecWay (Hughet): ew bi-directioal satellite data service that replaces DirecPC DirecPC trasmissio rates: 400 kb/s from satellite to user 33.6 kb/s from user to etwork operatios ceter (NOC) usig dial-up Improves performace usig TCP splittig with spoofig December 27, 2017 City Uiversity of Hog Kog, Hog Kog 37

38 ChiaSat DirecPC system December 27, 2017 City Uiversity of Hog Kog, Hog Kog 38

39 Network ad traffic data ChiaSat: etwork architecture ad TCP Aalysis of billig records: aggregated traffic user behavior Aalysis of tcpdump traces: geeral characteristics TCP optios ad operatig system (OS) figerpritig etwork aomalies December 27, 2017 City Uiversity of Hog Kog, Hog Kog 39

40 ChiaSat data: aalysis Traffic predictio: autoregressive itegrative movig average (ARIMA) was successfully used to predict uploaded traffic (but ot dowloaded traffic) wavelet + autoregressive model outperforms the ARIMA model Q. Shao ad Lj. Trajkovic, Measuremet ad aalysis of traffic i a hybrid satellite-terrestrial etwork, Proc. SPECTS 2004, Sa Jose, CA, July 2004, pp December 27, 2017 City Uiversity of Hog Kog, Hog Kog 40

41 Aalysis of collected data Aalysis of patters ad statistical properties of two sets of data from the ChiaSat DirecPC etwork: billig records tcpdump traces Billig records: daily ad weekly traffic patters user classificatio: sigle ad multi-variable k-meas clusterig based o average traffic hierarchical clusterig based o user activity December 27, 2017 City Uiversity of Hog Kog, Hog Kog 41

42 ChiaSat data: aalysis ChiaSat traffic is self-similar ad o-statioary Hurst parameter differs depedig o traffic load Modelig of TCP coectios: iter-arrival time is best modeled by the Weibull distributio umber of dowloaded bytes is best modeled by the logormal distributio The distributio of visited websites is best modeled by the discrete Gaussia expoetial (DGX) distributio December 27, 2017 City Uiversity of Hog Kog, Hog Kog 42

43 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 43

44 Iteret topology Iteret is a etwork of Autoomous Systems: groups of etworks sharig the same routig policy idetified with Autoomous System Numbers (ASN) Autoomous System Numbers: assigmets/as-umbers Iteret topology o AS-level: the arragemet of ASes ad their itercoectios Aalyzig the Iteret topology ad fidig properties of associated graphs rely o miig data ad capturig iformatio about Autoomous Systems (ASes) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 44

45 Variety of graphs Radom graphs: odes ad edges are geerated by a radom process Erdős ad Réyi model Small world graphs: odes ad edges are geerated so that most of the odes are coected by a small umber of odes i betwee Watts ad Strogatz model (1998) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 45

46 Scale-free graphs Scale-free graphs: graphs whose ode degree distributio follow power-law rich get richer Barabási ad Albert model (1999) Aalysis of complex etworks: discovery of spectral properties of graphs costructig matrices describig the etwork coectivity December 27, 2017 City Uiversity of Hog Kog, Hog Kog 46

47 Aalyzed datasets Sample datasets: Route Views: TABLE_DUMP B / IGP : : : :3000 NAG RIPE: TABLE_DUMP B / IGP : :3010 NAG December 27, 2017 City Uiversity of Hog Kog, Hog Kog 47

48 Iteret topology at AS level Datasets collected from Border Gateway Protocols (BGP) routig tables are used to ifer the Iteret topology at AS-level December 27, 2017 City Uiversity of Hog Kog, Hog Kog 48

49 Iteret topology The Iteret topology is characterized by the presece of various power-laws: ode degree vs. ode rak eigevalues of the matrices describig Iteret graphs (adjacecy matrix ad ormalized Laplacia matrix) Power-laws expoets have ot sigificatly chaged over the years Spectral aalysis reveals ew historical treds ad otable chages i the coectivity ad clusterig of AS odes over the years December 27, 2017 City Uiversity of Hog Kog, Hog Kog 49

50 Traffic aomalies Slammer, Nimda, ad Code Red I aomalies affected performace of the Iteret Border Gateway Protocol (BGP) BGP aomalies also iclude: Iteret Protocol (IP) prefix hijacks, miss-cofiguratios, ad electrical failures Techiques for detectig BGP aomalies have recetly gaied visible attetio ad importace December 27, 2017 City Uiversity of Hog Kog, Hog Kog 50

51 Aomaly detectio techiques Classificatio problem: assigig a aomaly or regular label to a data poit Accuracy of a classifier depeds o: extracted features combiatio of selected features uderlyig model Goal: Detect Iteret routig aomalies usig the Border Gateway Protocol (BGP) update messages December 27, 2017 City Uiversity of Hog Kog, Hog Kog 51

52 BGP features Approach: Defie a set of 37 features based o BGP update messages Extract the features from available BGP update messages that are collected durig the time period whe the Iteret experieced aomalies: Slammer Nimda Code Red I December 27, 2017 City Uiversity of Hog Kog, Hog Kog 52

53 Feature selectio Select the most relevat features for classificatio usig: Fisher Miimum Redudacy Maximum Relevace (mrmr) Odds Ratio Decisio Tree Fuzzy Rough Sets December 27, 2017 City Uiversity of Hog Kog, Hog Kog 53

54 Aomaly classificatio Trai classifiers for BGP aomaly detectio usig: Support Vector Machies (SVM) Log Short-Term Memory (LSTM) Neural Network Hidde Markov Models (HMM) Naive Bayes (NB) Decisio Tree Extreme Learig Machie (ELM) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 54

55 Feature extractio: BGP messages Border Gateway Protocol (BGP) eables exchage of routig iformatio betwee gateway routers usig update messages BGP update message collectios: Réseaux IP Europées (RIPE) uder the Routig Iformatio Service (RIS) project Route Views Available i multi-threaded routig toolkit (MRT) biary format December 27, 2017 City Uiversity of Hog Kog, Hog Kog 55

56 BGP: kow aomalies Aomaly Date Duratio (mi) Slammer Jauary 25, Nimda September 18-20, ,521 Code Red I July 19, Evet Date Peers Moscow power blackout May 2005 AS 1853, AS 12793, AS AS 9121 routig table leak Dec AS 1853, AS 12793, AS AS 3561 improper filterig Apr AS 3257, AS 3333, AS 286 Paix domai hijack Ja AS 12956, AS 6762, AS 6939, AS 3549 As-path error Oct AS 3257, AS 3333, AS 6762, AS 9057 AS 3356/AS 714 de-peerig Oct AS 13237, AS 8342, AS 5511, AS December 27, 2017 City Uiversity of Hog Kog, Hog Kog 56

57 Traiig ad test datasets Dataset Traiig dataset Test dataset 1 Slammer ad Nimda Code Red I 2 Slammer ad Code Red I Nimda 3 Nimda ad Code Red I Slammer 4 Slammer Nimda ad Code Red I 5 Nimda Slammer ad Code Red I 6 Code Red I Slammer ad Nimda 7 Slammer, Nimda, ad Code Red I RIPE or BCNET December 27, 2017 City Uiversity of Hog Kog, Hog Kog 57

58 Slammer worm Seds its replica to radomly geerated IP addresses Destiatio IP address gets ifected if: or it is a Microsoft SQL server a persoal computer with the Microsoft SQL Server Data Egie (MSDE) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 58

59 Nimda worm Propagates through messages, web browsers, ad file systems Viewig the message triggers the worm payload The worm modifies the cotet of the web documet files i the ifected hosts ad copies itself i all local host directories December 27, 2017 City Uiversity of Hog Kog, Hog Kog 59

60 Code Red I worm Takes advatage of vulerability i the Microsoft Iteret Iformatio Services (IIS) idexig software It triggers a buffer overflow i the ifected hosts by writig to the buffers without checkig their limit December 27, 2017 City Uiversity of Hog Kog, Hog Kog 60

61 Feature extractio: BGP messages Defie 37 features Sample every miute durig a five-day period: the peak day of a aomaly two days prior ad two days after the peak day 7,200 samples for each aomalous evet: 5,760 regular samples (o-aomalous) 1,440 aomalous samples Imbalaced dataset December 27, 2017 City Uiversity of Hog Kog, Hog Kog 61

62 BGP features Feature Defiitio Category 1 Number of aoucemets Volume 2 Number of withdrawals Volume 3 Number of aouced NLRI prefixes Volume 4 Number of withdraw NLRI prefixes Volume 5 Average AS-PATH legth AS-path 6 Maximum AS-PATH legth AS-path 7 Average uique AS-PATH legth AS-path 8 Number of duplicate aoucemets Volume 9 Number of duplicate withdrawals Volume 10 Number of implicit withdrawals Volume December 27, 2017 City Uiversity of Hog Kog, Hog Kog 62

63 BGP features Feature Defiitio Category 11 Average edit distace AS-path 12 Maximum edit distace AS-path 13 Iter-arrival time Maximum edit distace =, where = (7,..., 17) Maximum AS-path legth =, where = (7,..., 15) Volume AS-path AS-path 34 Number of IGP packets Volume 35 Number of EGP packets Volume 36 Number of icomplete packets Volume 37 Packet size (B) Volume December 27, 2017 City Uiversity of Hog Kog, Hog Kog 63

64 Feature selectio algorithms Employed to select the most relevat features: Fisher Miimum Redudacy Maximum Relevace (mrmr) Odds Ratio Decisio Tree Fuzzy Rough Sets December 27, 2017 City Uiversity of Hog Kog, Hog Kog 64

65 Feature selectio: decisio tree Dataset Traiig data Selected Features Dataset 1 Slammer + Nimda 1 21, 23 29, Dataset 2 Slammer + Code Red I 1 22, 24 29, Dataset 3 Code Red I + Nimda 1 29, Either four (30, 31, 32, 33) or five (22, 30, 31, 32, 33) features are removed i the costructed trees maily because: features are umerical ad some are used repeatedly December 27, 2017 City Uiversity of Hog Kog, Hog Kog 65

66 Aomaly classificatio Trai classifiers for BGP aomaly detectio usig: Support Vector Machies (SVM) Log Short-Term Memory (LSTM) Neural Network Hidde Markov Models (HMM) Naive Bayes (NB) Decisio Tree Extreme Learig Machie (ELM) December 27, 2017 City Uiversity of Hog Kog, Hog Kog 66

67 Aomaly classifiers: LSTM Repeatig modules for the LSTM eural etwork: iput layer, LSTM layer with oe LSTM cell, ad output layer. December 27, 2017 City Uiversity of Hog Kog, Hog Kog 67

68 Aomaly classifiers: LSTM Accuracy (%) F-Score (%) Test dataset RIPE BCNET Test dataset LSTMu 1 Code Red I LSTMu 2 Nimda LSTMu 3 Slammer Accuracy (%) F-Score (%) Test dataset RIPE BCNET Test dataset LSTMb 1 Code Red I LSTMb 2 Nimda LSTMb 3 Slammer December 27, 2017 City Uiversity of Hog Kog, Hog Kog 68

69 Aomaly classifiers: decisio tree Accuracy (%) F-Score (%) Traiig dataset Test dataset RIPE BCNET Test dataset Dataset 1 Code Red I Dataset 2 Nimda Dataset 3 Slammer Each path from the root ode to a leaf ode may be trasformed ito a decisio rule A set of rules that are obtaied from a traied decisio tree may be used for classifyig usee samples December 27, 2017 City Uiversity of Hog Kog, Hog Kog 69

70 Roadmap Itroductio Traffic collectio, characterizatio, ad modelig Case studies: telecommuicatio etwork: BCNET public safety wireless etwork: E-Comm satellite etwork: ChiaSat packet data etworks: Iteret Coclusios December 27, 2017 City Uiversity of Hog Kog, Hog Kog 70

71 Coclusios Data collected from deployed etworks are used to: evaluate etwork performace characterize ad model traffic (iter-arrival ad call holdig times) idetify treds i the evolutio of the Iteret topology classify traffic ad etwork aomalies December 27, 2017 City Uiversity of Hog Kog, Hog Kog 71

72 Refereces: sources of data RIPE RIS raw data [Olie]. Available: Uiversity of Orego Route Views project [Olie]. Available: CAIDA: Ceter for Applied Iteret Data Aalysis: [Olie]. Available: December 27, 2017 City Uiversity of Hog Kog, Hog Kog 72

73 Refereces: Q. Dig, Z. Li, S. Haeri, ad Lj. Trajkovic, Applicatio of machie learig techiques to detectig aomalies i commuicatio etworks: Datasets ad Feature Selectio Algorithms i Cyber Threat Itelligece, M. Coti, A. Dehghataha, ad T. Dargahi, Eds., Berli: Spriger, to appear. Q. Dig, Z. Li, S. Haeri, ad Lj. Trajkovic, Applicatio of machie learig techiques to detectig aomalies i commuicatio etworks: Classificatio Algorithms i Cyber Threat Itelligece, M. Coti, A. Dehghataha, ad T. Dargahi, Eds., Berli: Spriger, to appear. Q. Dig, Z. Li, P. Batta, ad Lj. Trajkovic, "Detectig BGP aomalies usig machie learig techiques," i Proc. IEEE Iteratioal Coferece o Systems, Ma, ad Cyberetics (SMC 2016), Budapest, Hugary, Oct. 2016, pp M. Cosovic, S. Obradovic, ad Lj. Trajkovic, "Classifyig aomalous evets i BGP datasets," i Proc. The 29th Aual IEEE Caadia Coferece o Electrical ad Computer Egieerig (CCECE 2016), Vacouver, Caada, May 2016, pp M. Cosovic, S. Obradovic, ad Lj. Trajković, Performace evaluatio of BGP aomaly classifiers, i Proc. The Third Iteratioal Coferece o Digital Iformatio, Networkig, ad Wireless Commuicatios, DINWC 2015, Moscow, Russia, Feb. 2015, pp December 27, 2017 City Uiversity of Hog Kog, Hog Kog 73

74 Refereces: Y. Li, H. J. Xig, Q. Hua, X.-Z. Wag, P. Batta, S. Haeri, ad Lj. Trajković, Classificatio of BGP aomalies usig decisio trees ad fuzzy rough sets, i Proc. IEEE Iteratioal Coferece o Systems, Ma, ad Cyberetics, SMC 2014, Sa Diego, CA, October 2014, pp T. Farah ad Lj. Trajkovic, "Aoym: a tool for aoymizatio of the Iteret traffic," i Proc IEEE Iteratioal Coferece o Cyberetics, CYBCONF 2013, Lausae, Switzerlad, Jue 2013, pp N. Al-Rousa, S. Haeri, ad Lj. Trajković, Feature selectio for classificatio of BGP aomalies usig Bayesia models," i Proc. Iteratioal Coferece o Machie Learig ad Cyberetics, ICMLC 2012, Xi'a, Chia, July 2012, pp N. Al-Rousa ad Lj. Trajković, Machie learig models for classificatio of BGP aomalies, i Proc. IEEE Cof. High Performace Switchig ad Routig, HPSR 2012, Belgrade, Serbia, Jue 2012, pp T. Farah, S. Lally, R. Gill, N. Al-Rousa, R. Paul, D. Xu, ad Lj. Trajković, Collectio of BCNET BGP traffic," i Proc. 23rd ITC, Sa Fracisco, CA, USA, Sept. 2011, pp S. Lally, T. Farah, R. Gill, R. Paul, N. Al-Rousa, ad Lj. Trajković, Collectio ad characterizatio of BCNET BGP traffic," i Proc IEEE Pacific Rim Cof. Commuicatios, Computers ad Sigal Processig, Victoria, BC, Caada, Aug. 2011, pp December 27, 2017 City Uiversity of Hog Kog, Hog Kog 74

75 lhr: 535,102 odes ad 601,678 liks December 27, 2017 City Uiversity of Hog Kog, Hog Kog 75

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Mining Network Traffic Data

Mining Network Traffic Data Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Mining Network Traffic Data

Mining Network Traffic Data Miig Network Traffic Data Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver, British Columbia Caada Natioal

More information

Data Mining and Machine Learning for Analysis of Network Traffic

Data Mining and Machine Learning for Analysis of Network Traffic Data Miig ad Machie Learig for Aalysis of Network Traffic Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser Uiversity, Vacouver,

More information

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies

Evaluation of Support Vector Machine Kernels for Detecting Network Anomalies Evaluatio of Support Vector Machie Kerels for Detectig Network Aomalies Prera Batta, Maider Sigh, Zhida Li, Qigye Dig, ad Ljiljaa Trajković Commuicatio Networks Laboratory http://www.esc.sfu.ca/~ljilja/cl/

More information

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies

Communication Networks: Traffic Data, Network Topologies, and Routing Anomalies Commuicatio Networks: Traffic Data, Network Topologies, ad Routig Aomalies Ljiljaa Trajković ljilja@cs.sfu.ca Commuicatio Networks Laboratory http://www.esc.sfu.ca/cl School of Egieerig Sciece Simo Fraser

More information

Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies

Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Complex Networks: Traffic Data, Network Topologies, and Routing Anomalies Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science

More information

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets

Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Classification of BGP Anomalies Using Decision Trees and Fuzzy Rough Sets Yan Li, Hong-Jie Xing, Qiang Hua, Xi-Zhao Wang, Prerna Batta, Soroush Haeri, and Ljiljana Trajković Hebei University, Baoding,

More information

Mining Network Traffic Data

Mining Network Traffic Data Mining Network Traffic Data Ljiljana Trajkovic ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl April 2008 BCNET 2008 Advanced Networks Conference Roadmap Introduction Traffic

More information

Resource Public Key Infrastructure for Secure Border Gateway Protocol

Resource Public Key Infrastructure for Secure Border Gateway Protocol Resource Public Key Ifrastructure for Secure Border Gateway Protocol George Chag, Majid Ariaezhad, ad Ljiljaa Trajković gkchag@sfu.ca, ariaezhad@live.com, ljilja@sfu.ca Commuicatio Networks Laboratory

More information

Improving Template Based Spike Detection

Improving Template Based Spike Detection Improvig Template Based Spike Detectio Kirk Smith, Member - IEEE Portlad State Uiversity petra@ee.pdx.edu Abstract Template matchig algorithms like SSE, Covolutio ad Maximum Likelihood are well kow for

More information

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components

Announcements. Reading. Project #4 is on the web. Homework #1. Midterm #2. Chapter 4 ( ) Note policy about project #3 missing components Aoucemets Readig Chapter 4 (4.1-4.2) Project #4 is o the web ote policy about project #3 missig compoets Homework #1 Due 11/6/01 Chapter 6: 4, 12, 24, 37 Midterm #2 11/8/01 i class 1 Project #4 otes IPv6Iit,

More information

3D Model Retrieval Method Based on Sample Prediction

3D Model Retrieval Method Based on Sample Prediction 20 Iteratioal Coferece o Computer Commuicatio ad Maagemet Proc.of CSIT vol.5 (20) (20) IACSIT Press, Sigapore 3D Model Retrieval Method Based o Sample Predictio Qigche Zhag, Ya Tag* School of Computer

More information

Collection and Characterization of BCNET BGP Traffic

Collection and Characterization of BCNET BGP Traffic Collection and Characterization of BCNET BGP Traffic Sukhchandan Lally, Tanjila Farah, Rajvir Gill, Ravinder Paul, Nabil Al-Rousan, and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia,

More information

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve

Analysis of Server Resource Consumption of Meteorological Satellite Application System Based on Contour Curve Advaces i Computer, Sigals ad Systems (2018) 2: 19-25 Clausius Scietific Press, Caada Aalysis of Server Resource Cosumptio of Meteorological Satellite Applicatio System Based o Cotour Curve Xiagag Zhao

More information

Image Segmentation EEE 508

Image Segmentation EEE 508 Image Segmetatio Objective: to determie (etract) object boudaries. It is a process of partitioig a image ito distict regios by groupig together eighborig piels based o some predefied similarity criterio.

More information

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process

Euclidean Distance Based Feature Selection for Fault Detection Prediction Model in Semiconductor Manufacturing Process Vol.133 (Iformatio Techology ad Computer Sciece 016), pp.85-89 http://dx.doi.org/10.1457/astl.016. Euclidea Distace Based Feature Selectio for Fault Detectio Predictio Model i Semicoductor Maufacturig

More information

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le

Fundamentals of Media Processing. Shin'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dinh Le Fudametals of Media Processig Shi'ichi Satoh Kazuya Kodama Hiroshi Mo Duy-Dih Le Today's topics Noparametric Methods Parze Widow k-nearest Neighbor Estimatio Clusterig Techiques k-meas Agglomerative Hierarchical

More information

1. SWITCHING FUNDAMENTALS

1. SWITCHING FUNDAMENTALS . SWITCING FUNDMENTLS Switchig is the provisio of a o-demad coectio betwee two ed poits. Two distict switchig techiques are employed i commuicatio etwors-- circuit switchig ad pacet switchig. Circuit switchig

More information

DATA MINING II - 1DL460

DATA MINING II - 1DL460 DATA MINING II - 1DL460 Sprig 2017 A secod course i data miig http://www.it.uu.se/edu/course/homepage/ifoutv2/vt17/ Kjell Orsbor Uppsala Database Laboratory Departmet of Iformatio Techology, Uppsala Uiversity,

More information

The Value of Peering

The Value of Peering The Value of Peerig ISP/IXP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 25 th

More information

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation

Improvement of the Orthogonal Code Convolution Capabilities Using FPGA Implementation Improvemet of the Orthogoal Code Covolutio Capabilities Usig FPGA Implemetatio Naima Kaabouch, Member, IEEE, Apara Dhirde, Member, IEEE, Saleh Faruque, Member, IEEE Departmet of Electrical Egieerig, Uiversity

More information

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON

A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON A SOFTWARE MODEL FOR THE MULTILAYER PERCEPTRON Roberto Lopez ad Eugeio Oñate Iteratioal Ceter for Numerical Methods i Egieerig (CIMNE) Edificio C1, Gra Capitá s/, 08034 Barceloa, Spai ABSTRACT I this work

More information

Transitioning to BGP

Transitioning to BGP Trasitioig to BGP ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 24 th April

More information

Designing a learning system

Designing a learning system CS 75 Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@cs.pitt.edu 539 Seott Square, x-5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please try

More information

Introduction to Network Technologies & Layered Architecture BUPT/QMUL

Introduction to Network Technologies & Layered Architecture BUPT/QMUL Itroductio to Network Techologies & Layered Architecture BUPT/QMUL 2018-3-12 Review What is the Iteret? How does it work? Whe & how did it come about? Who cotrols it? Where is it goig? 2 Ageda Basic Network

More information

Introduction to OSPF. ISP Training Workshops

Introduction to OSPF. ISP Training Workshops Itroductio to OSPF ISP Traiig Workshops 1 OSPF p Ope Shortest Path First p Lik state or SPF techology p Developed by OSPF workig group of IETF (RFC 1247) p OSPFv2 stadard described i RFC2328 p Desiged

More information

TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic

TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic TCP session analysis and modeling of hybrid satellite-terrestrial Internet traffic Savio Lau saviol@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science

More information

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work

Sectio 4, a prototype project of settig field weight with AHP method is developed ad the experimetal results are aalyzed. Fially, we coclude our work 200 2d Iteratioal Coferece o Iformatio ad Multimedia Techology (ICIMT 200) IPCSIT vol. 42 (202) (202) IACSIT Press, Sigapore DOI: 0.7763/IPCSIT.202.V42.0 Idex Weight Decisio Based o AHP for Iformatio Retrieval

More information

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network

Intrusion Detection using Fuzzy Clustering and Artificial Neural Network Itrusio Detectio usig Fuzzy Clusterig ad Artificial Neural Network Shraddha Suraa Research Scholar, Departmet of Computer Egieerig, Vishwakarma Istitute of Techology, Pue Idia shraddha.suraa@gmail.com

More information

Our Learning Problem, Again

Our Learning Problem, Again Noparametric Desity Estimatio Matthew Stoe CS 520, Sprig 2000 Lecture 6 Our Learig Problem, Agai Use traiig data to estimate ukow probabilities ad probability desity fuctios So far, we have depeded o describig

More information

Bayesian approach to reliability modelling for a probability of failure on demand parameter

Bayesian approach to reliability modelling for a probability of failure on demand parameter Bayesia approach to reliability modellig for a probability of failure o demad parameter BÖRCSÖK J., SCHAEFER S. Departmet of Computer Architecture ad System Programmig Uiversity Kassel, Wilhelmshöher Allee

More information

Feature Selection for Classification of BGP Anomalies using Bayesian Models

Feature Selection for Classification of BGP Anomalies using Bayesian Models July 17, 2012 11th International Conference on Machine Learning and Cybernetics, Xi an, China 1/ 32 Feature Selection for Classification of BGP Anomalies using Bayesian Models Nabil Al-Rousan, Soroush

More information

ANN WHICH COVERS MLP AND RBF

ANN WHICH COVERS MLP AND RBF ANN WHICH COVERS MLP AND RBF Josef Boští, Jaromír Kual Faculty of Nuclear Scieces ad Physical Egieerig, CTU i Prague Departmet of Software Egieerig Abstract Two basic types of artificial eural etwors Multi

More information

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network

Probabilistic Fuzzy Time Series Method Based on Artificial Neural Network America Joural of Itelliget Systems 206, 6(2): 42-47 DOI: 0.5923/j.ajis.2060602.02 Probabilistic Fuzzy Time Series Method Based o Artificial Neural Network Erol Egrioglu,*, Ere Bas, Cagdas Haka Aladag

More information

Collection and Characterization of BCNET BGP Traffic

Collection and Characterization of BCNET BGP Traffic Collection and Characterization of BCNET BGP Traffic Sukhchandan Lally lally@sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/research/cnl School of Engineering Science Simon Fraser University

More information

BGP Attributes and Path Selection. ISP Training Workshops

BGP Attributes and Path Selection. ISP Training Workshops BGP Attributes ad Path Selectio ISP Traiig Workshops 1 BGP Attributes The tools available for the job 2 What Is a Attribute?... Next Hop AS Path MED...... p Part of a BGP Update p Describes the characteristics

More information

Web OS Switch Software

Web OS Switch Software Web OS Switch Software BBI Quick Guide Nortel Networks Part Number: 213164, Revisio A, July 2000 50 Great Oaks Boulevard Sa Jose, Califoria 95119 408-360-5500 Mai 408-360-5501 Fax www.orteletworks.com

More information

performance to the performance they can experience when they use the services from a xed location.

performance to the performance they can experience when they use the services from a xed location. I the Proceedigs of The First Aual Iteratioal Coferece o Mobile Computig ad Networkig (MobiCom 9) November -, 99, Berkeley, Califoria USA Performace Compariso of Mobile Support Strategies Rieko Kadobayashi

More information

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c

Harris Corner Detection Algorithm at Sub-pixel Level and Its Application Yuanfeng Han a, Peijiang Chen b * and Tian Meng c Iteratioal Coferece o Computatioal Sciece ad Egieerig (ICCSE 015) Harris Corer Detectio Algorithm at Sub-pixel Level ad Its Applicatio Yuafeg Ha a, Peijiag Che b * ad Tia Meg c School of Automobile, Liyi

More information

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c

Global Support Guide. Verizon WIreless. For the BlackBerry 8830 World Edition Smartphone and the Motorola Z6c Verizo WIreless Global Support Guide For the BlackBerry 8830 World Editio Smartphoe ad the Motorola Z6c For complete iformatio o global services, please refer to verizowireless.com/vzglobal. Whether i

More information

Neuro Fuzzy Model for Human Face Expression Recognition

Neuro Fuzzy Model for Human Face Expression Recognition IOSR Joural of Computer Egieerig (IOSRJCE) ISSN : 2278-0661 Volume 1, Issue 2 (May-Jue 2012), PP 01-06 Neuro Fuzzy Model for Huma Face Expressio Recogitio Mr. Mayur S. Burage 1, Prof. S. V. Dhopte 2 1

More information

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1

Quality of Service. Spring 2018 CS 438 Staff - University of Illinois 1 Quality of Service Sprig 2018 CS 438 Staff - Uiversity of Illiois 1 Quality of Service How good are late data ad lowthroughput chaels? It depeds o the applicatio. Do you care if... Your e-mail takes 1/2

More information

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7)

THE WAY OF CALCULATING THE TRAFFIC AND SIGNALING NETWORK DIMENSION OF COMMON CHANNEL SIGNALING NO.7 (CCS7) The Way of Calculatig The Traffic... THE WAY OF CALCULATIG THE TRAFFIC AD SIGALIG ETWORK DIMESIO OF COMMO CHAEL SIGALIG O.7 (CCS7) Departeme Tekik Elektro, Fakultas Tekik, Uiversitas Sumatera Utara Abstract:

More information

Ones Assignment Method for Solving Traveling Salesman Problem

Ones Assignment Method for Solving Traveling Salesman Problem Joural of mathematics ad computer sciece 0 (0), 58-65 Oes Assigmet Method for Solvig Travelig Salesma Problem Hadi Basirzadeh Departmet of Mathematics, Shahid Chamra Uiversity, Ahvaz, Ira Article history:

More information

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved.

Chapter 1. Introduction to Computers and C++ Programming. Copyright 2015 Pearson Education, Ltd.. All rights reserved. Chapter 1 Itroductio to Computers ad C++ Programmig Copyright 2015 Pearso Educatio, Ltd.. All rights reserved. Overview 1.1 Computer Systems 1.2 Programmig ad Problem Solvig 1.3 Itroductio to C++ 1.4 Testig

More information

Study on effective detection method for specific data of large database LI Jin-feng

Study on effective detection method for specific data of large database LI Jin-feng Iteratioal Coferece o Automatio, Mechaical Cotrol ad Computatioal Egieerig (AMCCE 205) Study o effective detectio method for specific data of large database LI Ji-feg (Vocatioal College of DogYig, Shadog

More information

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory

Cluster Analysis. Andrew Kusiak Intelligent Systems Laboratory Cluster Aalysis Adrew Kusiak Itelliget Systems Laboratory 2139 Seamas Ceter The Uiversity of Iowa Iowa City, Iowa 52242-1527 adrew-kusiak@uiowa.edu http://www.icae.uiowa.edu/~akusiak Two geeric modes of

More information

Multiprocessors. HPC Prof. Robert van Engelen

Multiprocessors. HPC Prof. Robert van Engelen Multiprocessors Prof. Robert va Egele Overview The PMS model Shared memory multiprocessors Basic shared memory systems SMP, Multicore, ad COMA Distributed memory multicomputers MPP systems Network topologies

More information

BASED ON ITERATIVE ERROR-CORRECTION

BASED ON ITERATIVE ERROR-CORRECTION A COHPARISO OF CRYPTAALYTIC PRICIPLES BASED O ITERATIVE ERROR-CORRECTIO Miodrag J. MihaljeviC ad Jova Dj. GoliC Istitute of Applied Mathematics ad Electroics. Belgrade School of Electrical Egieerig. Uiversity

More information

Mining Network Traffic Data

Mining Network Traffic Data Mining Network Traffic Data Ljiljana Trajković ljilja@cs.sfu.ca Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British Columbia

More information

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees.

Our second algorithm. Comp 135 Machine Learning Computer Science Tufts University. Decision Trees. Decision Trees. Decision Trees. Comp 135 Machie Learig Computer Sciece Tufts Uiversity Fall 2017 Roi Khardo Some of these slides were adapted from previous slides by Carla Brodley Our secod algorithm Let s look at a simple dataset for

More information

New HSL Distance Based Colour Clustering Algorithm

New HSL Distance Based Colour Clustering Algorithm The 4th Midwest Artificial Itelligece ad Cogitive Scieces Coferece (MAICS 03 pp 85-9 New Albay Idiaa USA April 3-4 03 New HSL Distace Based Colour Clusterig Algorithm Vasile Patrascu Departemet of Iformatics

More information

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c

Pruning and Summarizing the Discovered Time Series Association Rules from Mechanical Sensor Data Qing YANG1,a,*, Shao-Yu WANG1,b, Ting-Ting ZHANG2,c Advaces i Egieerig Research (AER), volume 131 3rd Aual Iteratioal Coferece o Electroics, Electrical Egieerig ad Iformatio Sciece (EEEIS 2017) Pruig ad Summarizig the Discovered Time Series Associatio Rules

More information

Pattern Recognition Systems Lab 1 Least Mean Squares

Pattern Recognition Systems Lab 1 Least Mean Squares Patter Recogitio Systems Lab 1 Least Mea Squares 1. Objectives This laboratory work itroduces the OpeCV-based framework used throughout the course. I this assigmet a lie is fitted to a set of poits usig

More information

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui

Optimization for framework design of new product introduction management system Ma Ying, Wu Hongcui 2d Iteratioal Coferece o Electrical, Computer Egieerig ad Electroics (ICECEE 2015) Optimizatio for framework desig of ew product itroductio maagemet system Ma Yig, Wu Hogcui Tiaji Electroic Iformatio Vocatioal

More information

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences

Mining from Quantitative Data with Linguistic Minimum Supports and Confidences Miig from Quatitative Data with Liguistic Miimum Supports ad Cofideces Tzug-Pei Hog, Mig-Jer Chiag ad Shyue-Liag Wag Departmet of Electrical Egieerig Natioal Uiversity of Kaohsiug Kaohsiug, 8, Taiwa, R.O.C.

More information

arxiv: v2 [cs.lg] 12 Jan 2018

arxiv: v2 [cs.lg] 12 Jan 2018 HINET: HIERARCHICAL CLASSIFICATION WITH NEU- RAL NETWORK Zhezhou Wu SAP Iovatio Ceter, Sigapore Sigapore 119958 zhezhou.wu@sap.com Sea Saito Yale-NUS College Sigapore, 138533 sea.saito@u.yale-us.edu.sg

More information

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard

Using the Keyboard. Using the Wireless Keyboard. > Using the Keyboard 1 A wireless keyboard is supplied with your computer. The wireless keyboard uses a stadard key arragemet with additioal keys that perform specific fuctios. Usig the Wireless Keyboard Two AA alkalie batteries

More information

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method

A New Morphological 3D Shape Decomposition: Grayscale Interframe Interpolation Method A ew Morphological 3D Shape Decompositio: Grayscale Iterframe Iterpolatio Method D.. Vizireau Politehica Uiversity Bucharest, Romaia ae@comm.pub.ro R. M. Udrea Politehica Uiversity Bucharest, Romaia mihea@comm.pub.ro

More information

Bayesian Network Structure Learning from Attribute Uncertain Data

Bayesian Network Structure Learning from Attribute Uncertain Data Bayesia Network Structure Learig from Attribute Ucertai Data Wetig Sog 1,2, Jeffrey Xu Yu 3, Hog Cheg 3, Hogya Liu 4, Ju He 1,2,*, ad Xiaoyog Du 1,2 1 Key Labs of Data Egieerig ad Kowledge Egieerig, Miistry

More information

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System

Low Complexity H.265/HEVC Coding Unit Size Decision for a Videoconferencing System BULGARIAN ACADEMY OF SCIENCES CYBERNETICS AND INFORMATION TECHNOLOGIES Volume 15, No 6 Special Issue o Logistics, Iformatics ad Service Sciece Sofia 2015 Prit ISSN: 1311-9702; Olie ISSN: 1314-4081 DOI:

More information

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs

Outline. Research Definition. Motivation. Foundation of Reverse Engineering. Dynamic Analysis and Design Pattern Detection in Java Programs Dyamic Aalysis ad Desig Patter Detectio i Java Programs Outlie Lei Hu Kamra Sartipi {hul4, sartipi}@mcmasterca Departmet of Computig ad Software McMaster Uiversity Caada Motivatio Research Problem Defiitio

More information

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today

Administrative UNSUPERVISED LEARNING. Unsupervised learning. Supervised learning 11/25/13. Final project. No office hours today Admiistrative Fial project No office hours today UNSUPERVISED LEARNING David Kauchak CS 451 Fall 2013 Supervised learig Usupervised learig label label 1 label 3 model/ predictor label 4 label 5 Supervised

More information

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1

Media Access Protocols. Spring 2018 CS 438 Staff, University of Illinois 1 Media Access Protocols Sprig 2018 CS 438 Staff, Uiversity of Illiois 1 Where are We? you are here 00010001 11001001 00011101 A midterm is here Sprig 2018 CS 438 Staff, Uiversity of Illiois 2 Multiple Access

More information

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach

Performance Analysis of Multiclass FIFO: Motivation, Difficulty and a Network Calculus Approach Performace Aalysis of Multiclass FIFO: Motivatio, Difficulty ad a Network alculus Approach Yumig Jiag Norwegia Uiversity of Sciece ad Techology (NTNU) 1 19 March 2014, 2d Workshop o Network alculus, Bamberg,

More information

New Fuzzy Color Clustering Algorithm Based on hsl Similarity

New Fuzzy Color Clustering Algorithm Based on hsl Similarity IFSA-EUSFLAT 009 New Fuzzy Color Clusterig Algorithm Based o hsl Similarity Vasile Ptracu Departmet of Iformatics Techology Tarom Compay Bucharest Romaia Email: patrascu.v@gmail.com Abstract I this paper

More information

What are Information Systems?

What are Information Systems? Iformatio Systems Cocepts What are Iformatio Systems? Roma Kotchakov Birkbeck, Uiversity of Lodo Based o Chapter 1 of Beett, McRobb ad Farmer: Object Orieted Systems Aalysis ad Desig Usig UML, (4th Editio),

More information

Lecture 1: Introduction

Lecture 1: Introduction Lecture 1: Itroductio g Class orgaizatio Istructor cotact Course objectives ad outcomes Lectures outlie Laboratory outlie Gradig system Tetative schedule g Lab schedule g Itelliget sesor systems (ISS)

More information

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL Iteratioal Joural of Iformatio Techology ad Kowledge Maagemet July-December 2012, Volume 5, No. 2, pp. 371-375 EMPIRICAL ANALYSIS OF FAULT PREDICATION TECHNIQUES FOR IMPROVING SOFTWARE PROCESS CONTROL

More information

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article

Journal of Chemical and Pharmaceutical Research, 2013, 5(12): Research Article Available olie www.jocpr.com Joural of Chemical ad Pharmaceutical Research, 2013, 5(12):745-749 Research Article ISSN : 0975-7384 CODEN(USA) : JCPRC5 K-meas algorithm i the optimal iitial cetroids based

More information

Designing a learning system

Designing a learning system CS 75 Itro to Machie Learig Lecture Desigig a learig system Milos Hauskrecht milos@pitt.edu 539 Seott Square, -5 people.cs.pitt.edu/~milos/courses/cs75/ Admiistrivia No homework assigmet this week Please

More information

IS-IS in Detail. ISP Workshops

IS-IS in Detail. ISP Workshops IS-IS i Detail ISP Workshops These materials are licesed uder the Creative Commos Attributio-NoCommercial 4.0 Iteratioal licese (http://creativecommos.org/liceses/by-c/4.0/) Last updated 27 th November

More information

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects

Politecnico di Milano Advanced Network Technologies Laboratory. Internet of Things. Projects Politecico di Milao Advaced Network Techologies Laboratory Iteret of Thigs Projects 2016-2017 Politecico di Milao Advaced Network Techologies Laboratory Geeral Rules Geeral Rules o Gradig 26/30 are assiged

More information

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University

CSCI 5090/7090- Machine Learning. Spring Mehdi Allahyari Georgia Southern University CSCI 5090/7090- Machie Learig Sprig 018 Mehdi Allahyari Georgia Souther Uiversity Clusterig (slides borrowed from Tom Mitchell, Maria Floria Balca, Ali Borji, Ke Che) 1 Clusterig, Iformal Goals Goal: Automatically

More information

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS

FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS FREQUENCY ESTIMATION OF INTERNET PACKET STREAMS WITH LIMITED SPACE: UPPER AND LOWER BOUNDS Prosejit Bose Evagelos Kraakis Pat Mori Yihui Tag School of Computer Sciece, Carleto Uiversity {jit,kraakis,mori,y

More information

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1

Switching Hardware. Spring 2018 CS 438 Staff, University of Illinois 1 Switchig Hardware Sprig 208 CS 438 Staff, Uiversity of Illiois Where are we? Uderstad Differet ways to move through a etwork (forwardig) Read sigs at each switch (datagram) Follow a kow path (virtual circuit)

More information

Random Graphs and Complex Networks T

Random Graphs and Complex Networks T Radom Graphs ad Complex Networks T-79.7003 Charalampos E. Tsourakakis Aalto Uiversity Lecture 3 7 September 013 Aoucemet Homework 1 is out, due i two weeks from ow. Exercises: Probabilistic iequalities

More information

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem

An Improved Shuffled Frog-Leaping Algorithm for Knapsack Problem A Improved Shuffled Frog-Leapig Algorithm for Kapsack Problem Zhoufag Li, Ya Zhou, ad Peg Cheg School of Iformatio Sciece ad Egieerig Hea Uiversity of Techology ZhegZhou, Chia lzhf1978@126.com Abstract.

More information

Lecture 13: Validation

Lecture 13: Validation Lecture 3: Validatio Resampli methods Holdout Cross Validatio Radom Subsampli -Fold Cross-Validatio Leave-oe-out The Bootstrap Bias ad variace estimatio Three-way data partitioi Itroductio to Patter Recoitio

More information

Switch Construction CS

Switch Construction CS Switch Costructio CS 00 Workstatio-Based Aggregate badwidth /2 of the I/O bus badwidth capacity shared amog all hosts coected to switch example: Gbps bus ca support 5 x 00Mbps ports (i theory) I/O bus

More information

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING

HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Y.K. Patil* Iteratioal Joural of Advaced Research i ISSN: 2278-6244 IT ad Egieerig Impact Factor: 4.54 HADOOP: A NEW APPROACH FOR DOCUMENT CLUSTERING Prof. V.S. Nadedkar** Abstract: Documet clusterig is

More information

Detecting BGP Anomalies Using Machine Learning Techniques

Detecting BGP Anomalies Using Machine Learning Techniques Detecting BGP Anomalies Using Machine Learning Techniques Student: Zhida Li. Instructor: Steve Whitmore Simon Fraser University Vancouver, British Columbia, Canada Email: zhidal@sfu.ca Abstract Border

More information

Private Key Cryptography. TELE3119: Week2

Private Key Cryptography. TELE3119: Week2 Private Key Cryptography TELE3119: Week2 Private Key Ecryptio Also referred to as: covetioal ecryptio symmetric key ecryptio secret-key or sigle-key ecryptio Oly alterative before public-key ecryptio i

More information

150 Internet Exchange Points And Beyond!

150 Internet Exchange Points And Beyond! 150 Iteret Exchage Poits Ad Beyod! HKNOG 2018 Hog Kog Walt Wolly, Director Itercoectio Strategy Hurricae Electric AS6939 Who is Walt Wolly? Hurricae Electric AS6939 4 years Amazo AS16509 4 years Director

More information

Lecture 5. Counting Sort / Radix Sort

Lecture 5. Counting Sort / Radix Sort Lecture 5. Coutig Sort / Radix Sort T. H. Corme, C. E. Leiserso ad R. L. Rivest Itroductio to Algorithms, 3rd Editio, MIT Press, 2009 Sugkyukwa Uiversity Hyuseug Choo choo@skku.edu Copyright 2000-2018

More information

ECE4050 Data Structures and Algorithms. Lecture 6: Searching

ECE4050 Data Structures and Algorithms. Lecture 6: Searching ECE4050 Data Structures ad Algorithms Lecture 6: Searchig 1 Search Give: Distict keys k 1, k 2,, k ad collectio L of records of the form (k 1, I 1 ), (k 2, I 2 ),, (k, I ) where I j is the iformatio associated

More information

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe

Copyright 2016 Ramez Elmasri and Shamkant B. Navathe Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe CHAPTER 19 Query Optimizatio Copyright 2016 Ramez Elmasri ad Shamkat B. Navathe Itroductio Query optimizatio Coducted by a query optimizer i a DBMS Goal:

More information

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems

The Penta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems The Peta-S: A Scalable Crossbar Network for Distributed Shared Memory Multiprocessor Systems Abdulkarim Ayyad Departmet of Computer Egieerig, Al-Quds Uiversity, Jerusalem, P.O. Box 20002 Tel: 02-2797024,

More information

A new algorithm to build feed forward neural networks.

A new algorithm to build feed forward neural networks. A ew algorithm to build feed forward eural etworks. Amit Thombre Cetre of Excellece, Software Techologies ad Kowledge Maagemet, Tech Mahidra, Pue, Idia Abstract The paper presets a ew algorithm to build

More information

Lower Bounds for Sorting

Lower Bounds for Sorting Liear Sortig Topics Covered: Lower Bouds for Sortig Coutig Sort Radix Sort Bucket Sort Lower Bouds for Sortig Compariso vs. o-compariso sortig Decisio tree model Worst case lower boud Compariso Sortig

More information

Assignment Problems with fuzzy costs using Ones Assignment Method

Assignment Problems with fuzzy costs using Ones Assignment Method IOSR Joural of Mathematics (IOSR-JM) e-issn: 8-8, p-issn: 9-6. Volume, Issue Ver. V (Sep. - Oct.06), PP 8-89 www.iosrjourals.org Assigmet Problems with fuzzy costs usig Oes Assigmet Method S.Vimala, S.Krisha

More information

Algorithms for Disk Covering Problems with the Most Points

Algorithms for Disk Covering Problems with the Most Points Algorithms for Disk Coverig Problems with the Most Poits Bi Xiao Departmet of Computig Hog Kog Polytechic Uiversity Hug Hom, Kowloo, Hog Kog csbxiao@comp.polyu.edu.hk Qigfeg Zhuge, Yi He, Zili Shao, Edwi

More information

A Focused Crawler Based on Naive Bayes Classifier

A Focused Crawler Based on Naive Bayes Classifier Third Iteratioal Symposium o Itelliget Iformatio Techology ad Security Iformatics A Focused Crawler Based o Naive Bayes Classifier Wexia Wag, Xigshu Che*, Yogbi Zou Network ad Trusted Computig Istitute,

More information

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design

CSC 220: Computer Organization Unit 11 Basic Computer Organization and Design College of Computer ad Iformatio Scieces Departmet of Computer Sciece CSC 220: Computer Orgaizatio Uit 11 Basic Computer Orgaizatio ad Desig 1 For the rest of the semester, we ll focus o computer architecture:

More information

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets

Criterion in selecting the clustering algorithm in Radial Basis Functional Link Nets WSEAS TRANSACTIONS o SYSTEMS Ag Sau Loog, Og Hog Choo, Low Heg Chi Criterio i selectig the clusterig algorithm i Radial Basis Fuctioal Lik Nets ANG SAU LOONG 1, ONG HONG CHOON 2 & LOW HENG CHIN 3 Departmet

More information

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network

An Algorithm of Mobile Robot Node Location Based on Wireless Sensor Network A Algorithm of Mobile Robot Node Locatio Based o Wireless Sesor Network https://doi.org/0.399/ijoe.v3i05.7044 Peg A Nigbo Uiversity of Techology, Zhejiag, Chia eirxvrp2269@26.com Abstract I the wireless

More information

Panel for Adobe Premiere Pro CC Partner Solution

Panel for Adobe Premiere Pro CC Partner Solution Pael for Adobe Premiere Pro CC Itegratio for more efficiecy The makes video editig simple, fast ad coveiet. The itegrated pael gives users immediate access to all medialoopster features iside Adobe Premiere

More information