Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled b...
详细信息
Among the diverse forms of malware, Botnet is the most widespread and serious threat which occurs commonly in today's cyber attacks. Botnets are collections of compromised computers which are remotely controlled by its originator (BotMaster) under a common Commond-and-Control (C&C) infrastructure. They provide a distributed platform for several illegal activities such as launching distributed denial of service (DDOS) attacks against critical targets, malware distribution, phishing, and click fraud. Most of the existing Botnet detection approaches concentrate only on particular Botnet command and control (C&C) protocols (e.g., IRC, HTTP) and structures (e.g., centralized), and can become ineffective as Botnets change their structure and C&C techniques. The detection of Botnet has been a major research topic in recent years. Different techniques and approaches have been proposed for detection and tracking of Botnet. This survey classifies Botnet detection techniques into two approaches. One approach is based on setting up honeynets and another approach is based on Intrusion Detection system( IDS) which has been categorized into signature-based and anomaly-based detection techniques.
The paper presents modern advanced development methods of control systems that minimizes the cost of development of applications which are widely applicable in industrial control of whole range of processes.
ISBN:
(纸本)9781424473359
The paper presents modern advanced development methods of control systems that minimizes the cost of development of applications which are widely applicable in industrial control of whole range of processes.
Cognitive radio is considered as the highly promising solution to the shortage problem of the frequency resource. In this report, we propose the dual-stage spectrum detection method for achieving the wideband, fast, a...
详细信息
ISBN:
(纸本)9781424447251
Cognitive radio is considered as the highly promising solution to the shortage problem of the frequency resource. In this report, we propose the dual-stage spectrum detection method for achieving the wideband, fast, and wide-dynamic-range spectrum detection. In addition, the success probability of detecting the vacant frequency spectrum and the detection time of it are evaluated by computer simulation. As a result, the simulation shows that the dual-stage spectrum detection method can achieve a highly successful probability of detecting vacant frequency spectrum as well as a small detection time. Therefore, the proposed detection method can be expected to establish high-speed spectrum detection in cognitive radio.
We have developed a practical urea monitor based on a chemiluminescent (CL) reaction of urea and hypobromous acid produced by electrolysis of sodium bromide (NaBr) for measuring urea concentration in spent dialysate a...
详细信息
This paper proposed an adaptive level set algorithm combining region statistical information for color image segmentation. In this model, we deduce image segmentation model with Maximum a posteriori according to Bayes...
详细信息
This paper proposed an adaptive level set algorithm combining region statistical information for color image segmentation. In this model, we deduce image segmentation model with Maximum a posteriori according to Bayesian theory, and combine it into GAC model. Firstly, construct a speed stop function based on region statistical information which combines region statistical character and Bayesian model. And apply it to image segmentation on color images. Secondly, construct alterable coefficient based on a posteriori of segmented image of inside and outside the curve. It aims to change evolution direction adaptively based on the information of image. Thirdly, eliminate the re-initialization procedure by introducing interior restrict energy term of the Li method. At the same time, simplify the definition of the initial level set function. Experimental results show that this method has the advantages of evolving adaptively and stable numerical solution, and can extract the real edge of object from color image efficiently, so that is an effective image segmentation method.
The design and deployment of efficient vehicle-to-vehicle (V2V) communications systems require the knowledge of the propagation channel in which it will operate. Due to the mobility of the transmitter/receiver termina...
详细信息
The design and deployment of efficient vehicle-to-vehicle (V2V) communications systems require the knowledge of the propagation channel in which it will operate. Due to the mobility of the transmitter/receiver terminals as well as the existence of dynamic scatterers, the V2V channel is nonstationary. To account for the nonstationarity, channel characterization methods that employs the non wide-sense stationary uncorrelated scattering (non-WSSUS) approach are often desired. More also the inadequacy of the Doppler shift operator to properly account for frequency variation effects by the wideband channel operator implies that the time-frequency characterization methods that employ the Doppler shift operator are not appropriate for wideband V2V channels. In this paper we present the time-scale domain characterization of the non-WSSUS channel which employs time scaling operator to account for frequency variation and also emphasizes on the non-stationary property of the channel. The non-WSSUS statistical property termed local sense stationary uncorrelated scattering (LSSUS) is employed. The effect of the channel nonstationarity on the channel capacity is also addressed. From the simulated example, it is inferred that the assumption of ergodic capacity depend on the number of available independent fades which invariably depend on the degree of the V2V channel nonstationarity.
We explore the use of a hybrid and networked system for medical applications. In particular we are interested in monitoring the physiological data of newborn babies. The key element in our design is the use of cell ph...
详细信息
We explore the use of a hybrid and networked system for medical applications. In particular we are interested in monitoring the physiological data of newborn babies. The key element in our design is the use of cell phones as aggregating devices for the sensor collected information. Cell phones in particular enable secure communications with medical wireless sensors. We discuss a key distribution scheme among mobile cell phones and stationary networks of medical sensors. Our goal is to isolate and limit the security damages when nodes of a given sensor network are compromised. We show with simulation results the offered tradeoffs among security, connectivity and node memory.
Grid and P2P systems have achieved a notable success in the domain of scientific and engineering applications, which commonly demand considerable amounts of computational resources. However, Grid and P2P systems remai...
详细信息
ISBN:
(纸本)9781424459179;9780769539676
Grid and P2P systems have achieved a notable success in the domain of scientific and engineering applications, which commonly demand considerable amounts of computational resources. However, Grid and P2P systems remain still difficult to be used by the domain scientists and engineers due to the inherent complexity of the corresponding middleware and the lack of adequate documentation. In this paper we survey recent developments of Grid and P2P middleware in the context of scientific computing systems. The differences on the approaches taken for Grid and P2P middleware as well as the common points of both paradigms are highlighted. In addition, we discuss the corresponding programming models, languages, and applications.
Localization and responded accordingly are the most challenging and important issues in reconfigurable microstrip antenna (RMA). Hence, the challenges of combining Radio Frequency Identification (RFID) technology into...
详细信息
Localization and responded accordingly are the most challenging and important issues in reconfigurable microstrip antenna (RMA). Hence, the challenges of combining Radio Frequency Identification (RFID) technology into the RMA are outlined. Integrating RFID into RMA is very important in wireless communicationsystems since the technologies have the ability to predict exact location of the users. In this paper, discussion and analyze approaches relying on the received signal strength indicator (RSSI) had been done intensively. The received signal strength was measured with respect to distance. From this aspect, RSSI is believed could be used for evaluating distance between base station or central and RFID tags. The RFID tag was used in the system is responsible for the central to facilitate location tracking of the user. RSSI will provide the distance estimation and yield the real time localization of users. Based on certain level of RSSI, RMA will respond accordingly by supplying coverage around the area. RMA with PIN diodes switches enabled altering the radiation pattern electronically by microcontroller development board (MDB) which is responding to the RFID tag. Indirectly, this system has the ability to control degree of radiation pattern (narrower or broader) adaptively to the distance between central and the tag. Through an outdoor testing and deep analysis of RFID and RMA, a form of new system architecture that combines the two technologies is proposed and its feasibility, technical challenges are discussed thoroughly. Finally, the measurement and calculation results had shown the combination between these two technologies in producing a new method of RMA had proven successfully.
An automated Intrusion Prevention Mechanism (AIPM) which comprises the functionalities of IDS,IPS,and auto configuring network devices is proposed to enhance network security. AIPM is a mechanism that includes automat...
详细信息
ISBN:
(纸本)9781424463473
An automated Intrusion Prevention Mechanism (AIPM) which comprises the functionalities of IDS,IPS,and auto configuring network devices is proposed to enhance network security. AIPM is a mechanism that includes automated intrusion prevention function and automated analysis of intrusion messages function. In addition,the ability of automatically detecting and analyzing network traffic allows AIPM to detect malicious attacks in almost real time. Likewise,the ability of automatically analyzing intrusion messages and network configuration enable AIPM to build a topological view and locate the source of a malicious attack. Results from the case studies show that AIPM imposes lower overhead than conventional method,which queries all pre-defined routers to block every interface irrespective of where the attack is launched. In summary,AIPM which incorporates the functionalities of IDS/IPS offers network protection against potential malicious acts without incurring additional overheads as compare to the conventional method.
暂无评论