To detect internet worm, many academic approaches have been proposed. In this paper, we provide a new approach to detect internet worm. We consider behaviors of internet worm that is different from the normal pattern ...
详细信息
ISBN:
(纸本)9788988678206
To detect internet worm, many academic approaches have been proposed. In this paper, we provide a new approach to detect internet worm. We consider behaviors of internet worm that is different from the normal pattern of internet activities. We consider all network packets before they reach to the end-user by extracting a certain number of features of internet worm from these packets. Our network features mainly consist of characteristics of IP address, port, protocol and some flags of packet header. These features are used to detect and classify behavior of internet worm by using 3 different data mining algorithms which are Bayesian network, Decision Tree and Random Forest. In addition, our approach not only can classify internet worm apart from the normal data, but also can classify network attacks that have similar behaviors to the internet worm behaviors. Our approach provides good results with detection rate over 99.6 percent and false alarm rate is close to zero with Random forest algorithm. In addition, our model can classify behaviors of DoS and Port Scan attacks with detection rate higher than 98 percent and false alarm rate equal to zero.
The purpose of this paper is to show the influence of coronary heart failure (CHF) on heart by using different entropies to apply on the group of patients with CHF and normal group. Three different entropies are used:...
详细信息
The purpose of this paper is to show the influence of coronary heart failure (CHF) on heart by using different entropies to apply on the group of patients with CHF and normal group. Three different entropies are used: approximate entropy (ApEn), multiscale entropy (MSE), and base-scale entropy (BsEn). We use these three entropies to measure the complexity of the heart rate variability (HRV), and also use analysis of variance (ANOVA) to analyze the result of entropies to discuss the feasibility of recognizing CHF patients by utilizing entropies. With the analysis results of different entropies, the influence of CHF on heart has also been clearly demonstrated.
By reducing the data amount to graph pipeline, the rendering efficiency can be improved significantly. We present a novel frustum culling approach (2D frustum culling) for the scene that has only one layer of objects,...
详细信息
We describe a method to determine the optimum signal constellation diagram of arbitrary fiber-optic channel. The numerical results indicate that the optimized signal constellation has discrete amplitude and non-circul...
详细信息
Carrier sensing mechanism has been adopted in IEEE 802.11 MAC for collision avoidance under single channel based wireless ad hoc networks. However, due to the hardware limitation, the carrier sensing mechanism can not...
详细信息
ISBN:
(纸本)9781424467013
Carrier sensing mechanism has been adopted in IEEE 802.11 MAC for collision avoidance under single channel based wireless ad hoc networks. However, due to the hardware limitation, the carrier sensing mechanism can not help much in single transceiver and multi-channel scenarios. In this paper, we propose a pipelining multi-channel (pi-Mc) MAC protocol for multi-channel ad hoc networks. The core idea of pi-Mc is similar to the pipeline technique. Without collecting each channel usage information, pi-Mc not only uses overall channel resources for transmission, but also can prevent DATA collisions. The performance of pi-Mc is compared with two well-known multi-channel MAC protocols and IEEE 802.11 DCF. Simulation results show that pi-Mc is able to achieve 2.50 times the throughput of IEEE 802.11 DCF, as well as respectively outperform DCA and MMAC with a factor of up to 1.43 and 1.32 under three available channels.
In wireless sensor networks (WSNs);routing protocols are one of the main issues in existing research. These protocols make the best use of limited resources, particularly the energy efficiency and effectiveness of dat...
详细信息
ISBN:
(纸本)9788988678251
In wireless sensor networks (WSNs);routing protocols are one of the main issues in existing research. These protocols make the best use of limited resources, particularly the energy efficiency and effectiveness of data dissemination. Few of them discuss security issues in homogenous sensor networks which consume much power, have poor performance limits and less scalability. In order to attain the high performance, we have chosen heterogeneous sensor networks (HSNs) model. In this paper, we are addressing secure data routing (SDR) scheme based on cryptography for heterogeneous sensor networks. We have incorporated following mechanism in SDR scheme: 1) symmetric-session based key system is proposed, which change session key after session expire;2) efficient secure data routing scheme is proposed;3) cluster-head selection technique is discussed. This is a novel scheme for non-secure sensor network application. In addition, we devote special attention to facilitate the secure routing against some popular attacks, such as: sinkhole, wormhole, sybil and selective forwarding attacks.
End users' experiences, which differ drastically from user to user, influence the perceived usability. Thus, to make software user friendly, it is important to support learning operation methods for end users. To ...
详细信息
ISBN:
(纸本)9788988678213
End users' experiences, which differ drastically from user to user, influence the perceived usability. Thus, to make software user friendly, it is important to support learning operation methods for end users. To this end, tutorial systems have been proposed. Although referring to the performance of various users has been effective in learning operation methods using tutorial systems, which operation sequences are more frequently performed must be analyzed. Herein we propose a method to generate a tutorial system by analyzing the operation logs of end users and by extracting window sequences from source programs within the software.
Unified Communication and Collaboration (UCC) system is the converging service of all communications. IMS (IP Multimedia Subsystem) is expected to be a core service for both Internet and mobile phones. Hence, UCC cert...
详细信息
ISBN:
(纸本)9781424463275;9780769539898
Unified Communication and Collaboration (UCC) system is the converging service of all communications. IMS (IP Multimedia Subsystem) is expected to be a core service for both Internet and mobile phones. Hence, UCC certainly involves with IMS to provide a future service to both world. Presence service is crucial component in UCC system. It provides notifications and presence information of users and any devices to a particular user who requires this service. However, a traditional presence service system is inadequate to satisfy rich features services of UCC. Since users have a large number of presence information sent by many services in system, how a system gives all presence information a user appropriately. This scenario is so called ` massive PI'. There are several challenging issues on this topic. In this paper, we have proposed `Unified Presence Service' (or UPS) to deliver a massive PI in UCC environment. A system framework and architecture of UPS is presented. In this design framework, all related signals and components are illustrated, its description and functions are presented. We have shown some sample scenarios to demonstrate its benefits and advantages which cannot be delivered by those previous works. We believe that this service framework is significant for future services in a convergence world like UCC.
Runtime characteristics of individual threads (such as IPC, cache usage, etc.) are a critical factor in making efficient scheduling decisions in modern chip-multiprocessor systems. They provide key insights into how t...
详细信息
ISBN:
(纸本)9781450301466
Runtime characteristics of individual threads (such as IPC, cache usage, etc.) are a critical factor in making efficient scheduling decisions in modern chip-multiprocessor systems. They provide key insights into how threads interact when they share processor resources, and affect the overall system power and performance efficiency. In this paper, we propose and implement mechanisms and policies for a commercial OS scheduler and load balancer which incorporates thread characteristics, and show that it results in improvements of up to 30% in performance per watt. Copyright 2010 ACM.
The process of compressing the high luminance values into the displayable range inevitably incurs the loss of image contrasts. Although the local adaptation process, such as the two-scale contrast reduction scheme, is...
详细信息
ISBN:
(纸本)9781424475421
The process of compressing the high luminance values into the displayable range inevitably incurs the loss of image contrasts. Although the local adaptation process, such as the two-scale contrast reduction scheme, is capable of preserving details during the HDR compression process, it cannot be used to enhance the local contrasts of image contents. Moreover, the effect of noise artifacts cannot be eliminated when the detail manipulation is subsequently performed. We propose a new tone reproduction scheme, which incorporates the local contrast enhancement and the noise suppression processes, for the display of HDR images. Our experimental results show that the proposed scheme is indeed effective in enhancing local contrasts of image contents and suppressing noise artifacts during the increase of the visibility of HDR scenes.
暂无评论