The Center for Education and Research in Information Assurance and Security (CERIAS)

The Center for Education and Research in
Information Assurance and Security (CERIAS)

Reports and Papers Archive


Browse All Papers »       Submit A Paper »

Internet Law Journal

Jin Nyum et al.
Added 2009-04-15



Implementation Challenges in Spatio-temporal Multigranularity

CERIAS TR 2009-04
Elena Camossi, Michela Bertollo
Download: PDF

Multiple granularities are essential to extract significant knowledge from spatiotemporal datasets at different levels of detail. They enable to zoom-in and zoom-out spatio-temporal datasets, thus enhancing the data modelling flexibility and improving the analysis of information. In this paper we discuss effective solutions to implementation issues arising when a data model and a query language are enriched with spatio-temporal multigranularity. We propose appropriate representations for space and time dimensions, granularities, granules, and multi-granular values. In particular the design of granularities and their relationships is illustrated with respect to the application of multigranular conversions for data access. Finally, we describe how multigranular spatio-temporal conversions affect data usability and how such important property may be guaranteed. In our discussion, we refer to an existing multigranular spatio-temporal model, whose design was previously proposed as extension of the ODMG data model.

Added 2009-04-08

Adaptive Management of Multigranular Spatio-Temporal Object Attributes

CERIAS TR 2009-05
Elena Camossi, Elisa Bertino, Giovanna Guerrini, Michela Bertolotto
Download: PDF

In applications involving spatio-temporal modelling, granularities of data may have to adapt according to the evolving semantics and significance of data. To address such a problem, in this paper we define ST2_ODMGe, a multigranular spatio-temporal model supporting evolutions, which encompass the dynamic adaptation of attribute granularities, and the deletion of attribute values. Evolutions are specified as Event - Condition - Action rules and are performed at run-time. The event, the condition and the action may refer to a period of time and a geographical area. Periodic evolutions may be specified, referring to both transaction and valid time dimensions. The evolution may also be constrained by the attribute values. Evolutions greatly enhance exibility in multigranular spatio-temporal data handling but require revisiting the notion of object consistency with respect to class definitions and access to multigranular object values.

Added 2009-04-08

Attribute Refinement in a Multigranular Temporal Object Data Model

CERIAS TR 2009-06
Elisa Bertino, Elena Camossi, Giovanna Guerrini
Download: PDF

Temporal granularities are the unit of measure for temporal data, thus a multigranular temporal object model allows to store temporal data at different levels of detail, according to the needs of the application domain. In this paper we investigate how the integration of multiple temporal granularities in an object-oriented data model impacts on the inheritance hierarchy. In the paper we specifically address issues related to attribute refinement, and the consequences on object substitutability. This entails the development of suitable instruments for converting temporal values from a granularity to another.

Added 2009-04-08

Spam Detection in Voice-over-IP Calls through Semi-Supervised Clustering

CERIAS TR 2009-03
Yu-Sung Wu, Saurabh Bagchi, Navjot Singh, Ratsameetip Wita
Download: PDF

In this paper, we present an approach for detection of spam calls over IP telephony called SPIT in Voice-over-IP (VoIP) systems. SPIT detection is different from spam detection in email in that the process has to be soft real-time, fewer features are available for examination due to the difficulty of mining voice traffic at runtime, and similarity in signaling traffic between legitimate and malicious callers. Our approach differs from existing work in its adaptability to new environments without the need for laborious and error-prone manual parameter configuration. We use clustering based on the call parameters leveraging optional user feedback for some calls, which they mark as SPIT or non-SPIT. We improve on a popular algorithm for semi-supervised learning, called MPCK-Means, to make it scalable to a large number of calls. Our evaluation on captured call traces shows a fifteen fold reduction in computation time, with improvement in detection accuracy.

Added 2009-04-06

Memory Balancing for Large-scale Network Simulation in Power-law Networks

CERIAS TR 2008-30
Hyojeong Kim
Download: PDF

Large-scale network simulation has grown in importance due to a rapid increase in Internet size and the availability of Internet measurement topologies with applications to computer networks and network security. A key obstacle to large-scale network simulation over PC clusters is the memory balancing problem, where a memory-overloaded machine can slow down a distributed simulation due to disk I/O overhead. Network partitioning methods for parallel and distributed simulation are insufficiently equipped to handle new challenges brought on by memory balancing due to their focus on CPU and communication balancing.

This dissertation studies memory balancing for large-scale network simulation in power-law networks over PC clusters. First, we design and implement a measurement subsystem for dynamically tracking memory consumption in DaSSFNet, a distributed network simulator. Accurate monitoring of memory consumption is difficult due to complex protocol interaction through which message related events are created and destroyed inside and outside a simulation kernel. Second, we achieve efficient memory cost monitoring by tackling the problem of estimating peak memory consumption of a group of simulated network nodes in power-law topologies during network partitioning. In contrast to CPU balancing where the processing cost of a group of nodes is proportional to their sum, in memory balancing this closure property need not hold. Power-law connectivity injects additional complications due to skews in resource consumption across network nodes. Third, we show that the maximum memory cost metric outperforms the total cost metric for memory balancing under multilevel recursive partitioning but the opposite holds for CPU balancing. We show that the trade-off can be overcome through joint memory-CPU balancing—-in general not feasible due to constraint conflicts—-which is enabled by network simulation having a tendency to induce correlation between memory and CPU costs. Fourth, we evaluate memory balancing in the presence of virtual memory (VM) management which admits larger problem instances to be run over limited physical memory. VM introduces complex memory management dependencies that make understanding and evaluating simulation performance difficult. We provide a performance evaluation framework wherein the impact of memory thrashing in distributed network simulation is incorporated which admits quantitative performance comparison and diagnosis. Fifth, we show that improved memory balancing under the maximum cost metric in the presence of VM manifests as faster completion time compared to the total cost metric despite the CPU balancing advantage of the latter. In the cases where the CPU balancing advantage of the total cost metric is strong, we show that joint memory-CPU balancing can achieve the best of both worlds.

We carry out performance evaluation using benchmark applications with varying traffic characteristics: BGP routing, worm propagation under local and global scanning, and distributed client/server system. We use a testbed of 32 Intel x86 machines running a measurement-enhanced DaSSFNet over Linux.

Added 2009-03-30


Privacy, Surveillance and the Real ID Act

CERIAS TR 2009-19
William F. Eyre
Download: PDF

American society in the present day is grappling with issues of privacy and surveillance. These issues, the technologies involved, and implications for the organization and function of American society are examined in this dissertation.

Public Law 109-13 contains the Real ID Act, and the implementation of this act has far-reaching ramifications for Americans’ privacy. The Real ID Act, an exemplar of recentlaws regarding privacy and surveillance, serves as a basis for discussing the development of a surveillance society and its potential harm to American citizens.

The dissertation begins by framing the evolution of the concept in American society, exploring anti-terror legislation as the latest assumption of extraordinary powers by the state in times of war and national emergency, and comparing previous abridgements of enumerated Constitutional rights in such times.

It next discusses the implication of the Real ID as an insecure collection of databases, and then it examines the effect of Real ID on American citizens’ privacy as a national identification card. States have resisted the implementation of the act on the bases that the act constitutes an unfunded mandate and damages privacy.

The new surveillance system erodes personal privacy and creates a threat to privacy and autonomy from both criminals and the government, or sometimes (due to insider abuse of data) both. The dissertation details the possibility of how Real ID information access can be used against people in ways both legal and illegal, with comparisons to Great Britain; it also questions whether the government is even capable of handling increased information resources or whether such resources only provide more opportunities for improper access and misuse of personal data.

For most people, the developing surveillance state may only pose potential danger until someone is identified as a target, but its potential chilling effect threatens participatory democracy and the expression of legitimate political dissent.

The goal of this dissertation is to increase awareness of the incremental erosion of privacy rights which, once surrendered, become increasingly difficult to regain. It also aims to question some of the security assumptions that justify this erosion.

Added 2009-03-13

Information Systems Security: Requirements and Practices

National Institute of Standards and Technology
Added 2009-03-05

Fixed Vs. Variable-Length Patterns for Detecting Suspicious Process Behavior

Andreas Wespi, Herve Debar, Marc Dacier, Mehdi Nassehi
Added 2009-03-05

Myths and Realities of Cyberterrorism

Peter Flemming and Michael Stohl
Added 2009-03-05


Rule Based Detection System

Johnny Wong, Les Miller, Vasant Honavar, Guy Helmer, Amit Lamba
Added 2009-03-05