13,427 research outputs found

    Network anomaly detection: a survey and comparative analysis of stochastic and deterministic methods

    Get PDF
    7 pages. 1 more figure than final CDC 2013 versionWe present five methods to the problem of network anomaly detection. These methods cover most of the common techniques in the anomaly detection field, including Statistical Hypothesis Tests (SHT), Support Vector Machines (SVM) and clustering analysis. We evaluate all methods in a simulated network that consists of nominal data, three flow-level anomalies and one packet-level attack. Through analyzing the results, we point out the advantages and disadvantages of each method and conclude that combining the results of the individual methods can yield improved anomaly detection results

    Influencing interaction: Development of the design with intent method

    Get PDF
    Persuasive Technology has the potential to influence user behavior for social benefit, e.g. to reduce environmental impact, but designers are lacking guidance choosing among design techniques for influencing interaction. The Design with Intent Method, a ‘suggestion tool’ addressing this problem, is introduced in this paper, and applied to the briefs of reducing unnecessary household lighting use, and improving the efficiency of printing, primarily to evaluate the method’s usability and guide the direction of its development. The trial demonstrates that the DwI Method is quick to apply and leads to a range of relevant design concepts. With development, the DwI Method could be a useful tool for designers working on influencing user behavior

    Relieving the Wireless Infrastructure: When Opportunistic Networks Meet Guaranteed Delays

    Full text link
    Major wireless operators are nowadays facing network capacity issues in striving to meet the growing demands of mobile users. At the same time, 3G-enabled devices increasingly benefit from ad hoc radio connectivity (e.g., Wi-Fi). In this context of hybrid connectivity, we propose Push-and-track, a content dissemination framework that harnesses ad hoc communication opportunities to minimize the load on the wireless infrastructure while guaranteeing tight delivery delays. It achieves this through a control loop that collects user-sent acknowledgements to determine if new copies need to be reinjected into the network through the 3G interface. Push-and-Track includes multiple strategies to determine how many copies of the content should be injected, when, and to whom. The short delay-tolerance of common content, such as news or road traffic updates, make them suitable for such a system. Based on a realistic large-scale vehicular dataset from the city of Bologna composed of more than 10,000 vehicles, we demonstrate that Push-and-Track consistently meets its delivery objectives while reducing the use of the 3G network by over 90%.Comment: Accepted at IEEE WoWMoM 2011 conferenc

    The correlation of externalities in marginal cost pricing: lessons learned from a real-world case study

    Get PDF
    Negative externalities cause inefficiencies in the allocation of capacities and resources in a transport system. Marginal social cost pricing allows to correct for these inefficiencies in a simulation environment and to derive real-world policy recommendations. In this context, it has been shown for analytical models considering more than one externality, that the correlation between the externalities needs to be taken into account. Typically, in order to avoid overpricing, this is performed by introducing correction factors which capture the correlation effect. However, the correlation structure between, say, emission and congestion externalities changes for every congested facility over time of day. This makes it close to impossible to calculate the factors analytically for large-scale systems. Hence, this paper presents a simulation-based approach to calculate and internalize the correct dynamic price levels for both externalities simultaneously. For a real-world case study, it is shown that the iterative calculation of prices based on cost estimates from the literature allows to identify the amplitude of the correlation between the two externalities under consideration: for the urban travelers of the case study, emission toll levels—without pricing congestion—turn out to be 4.0% too high in peak hours and 2.8% too high in off-peak hours. In contrary, congestion toll levels—without pricing emissions—are overestimated by 3.0% in peak hours and by 7.2% in off-peak hours. With a joint pricing policy of both externalities, the paper shows that the approach is capable to determine the amplitude of the necessary correction factors for large-scale systems. It also provides the corrected average toll levels per vehicle kilometer for peak and off-peak hours for the case study under consideration: again, for urban travelers, the correct price level for emission and congestion externalities amounts approximately to 38 EURct/km in peak hours and to 30 EURct/km in off-peak hours. These toll levels can be used to derive real-world pricing schemes. Finally, the economic assessment indicators for the joint pricing policy provided in the paper allow to compare other policies to this benchmark state of the transport system
    • …
    corecore