Deception in Honeynets: A Game-Theoretic Analysis

Size: px
Start display at page:

Download "Deception in Honeynets: A Game-Theoretic Analysis"

Transcription

1 Poceedings of te 7 IEEE Woksop on Infomation Assuance United States Militay Academy, West Point, NY, - June 7 Deception in Honeynets: A Game-Teoetic Analysis Nandan Gag and Daniel Gosu Abstact Recently, oneynets became one of te main tools fo undestanding te caacteistics of malicious attacks and te beavio of te attackes. Howeve te attackes may identify te oneypots and avoid attacking tem. Tus te oneynet administatos must be able to deceive te attackes and induce tem to attack te oneypots. In tis pape we popose a game teoetic famewok fo modeling deception in oneynets. Te famewok is based on extensive games of impefect infomation. We study te equilibium solutions of tese games and sow ow tey ae used to detemine te stategies of te attacke and te oneynet system. Index Tems - deception, game teoy, oneynets, secuity I. Intoduction A oneypot as defined by te Honeynet Poject [] is an infomation system esouce wose value lies in unautoized access o illicit use of tat esouce. In tis pape we conside a oneypot to be a ost tat is left unpotected and available to te attackes. By extension we conside tat a oneynet is composed of a set of inteconnected oneypots. Tese systems ae caefully monitoed in ode to lean new vulneabilities, tools and tecniques used to gain access. Honeynets ae useful fo analyzing lage-scale attacks suc as woms, viuses and botnets and ave little value fo analyzing specialized attacks tageted to a paticula ost. Recently wit te incease in te fequency of Intenet attacks seveal eseac goups and oganizations developed and deployed oneynet systems. Te idea beind oneynets is te use of deception, a classical counte intelligence tecnique wic was and is still used extensively by te intelligence oganizations. Te compute secuity community began consideing tis idea only ecently, [] being te fist known efeence mentioning it. Depending on te level of inteactions between te attacke and te monitoed system, oneynets can be classified into two categoies: low-inteaction oneynets and ig-inteaction oneynets. Low-inteaction oneynets simulate a minimal set of system functionalities suc as te netwok stack. Te main advantage of low-inteaction Manuscipt eceived Januay, 7 Nandan Gag is wit te Dept. of Compute Science, Wayne State Univesity, Detoit, MI 48 USA ( nandang@wayne.edu) Daniel Gosu is wit te Dept. of Compute Science, Wayne State Univesity, Detoit, MI 48 USA (pone: ; fax: ; dgosu@cs.wayne.edu) oneynets is tei scalability, allowing te monitoing of undeds of tousand of IP addesses. Te majo disadvantage is tat tey cannot monito in detail te attacke s actions once te ost is compomised. Hig-inteaction oneynets simulate all te functionalities of a eal system tus allowing te gateing of muc ice infomation on te attacke s actions. Te disadvantage of using iginteaction oneynets is tei ig cost and difficult management. Wen te oneypot is a eal macine wit its own IP addess we call it a pysical oneypot. If te oneypot is a simulated ost ten we ave a vitual oneypot. Te pysical oneypots ae vey expensive to install and maintain and ae not scalable, wile te vitual oneypots ae scalable and inexpensive. Attackes ave cetain ways to pobe te netwok attempting to identify te oneypots []. Many cuent oneynet deployments do not use specific stategies to pevent te mapping of oneypots by te attackes. Wen a ost is pobed, it gives some esponse. Tis esponse is valuable to te attacke as se gains infomation about te oneynet. One way a defende can avoid te mapping of oneypots is to clevely manipulate te esponse to te pobe and deceive te attacke. Ou goal in tis pape is to povide a game teoetical famewok fo modeling and caacteizing deception in oneynets. A. Related Wok Low-inteaction oneypots usually monito a lage ange of IP addesses and tey ave been vey successful in identifying lage scale wom outbeaks [4], undestanding distibuted denial-of-sevice attacks [5] and ceating intusion detection signatues [6]. Netwok telescopes [7], [8], [9] ae examples of successful deployments tat passively monito inbound packets witout completing te TCP andsake. isink [9] is a measuement system deployed to monito backgound adiation wic employs active espondes wo emulate te eal netwok beavio an attacke expects. Honeyd [] is a low-inteaction system tat simulates te netwoking stack of diffeent compute systems. In ode to simulate eal netwoks it ceates vitual netwoks consisting of abitaily outing topologies. Te simplest way to implement ig-inteaction oneypots is to ave individual seves fo eac monitoed IP addess. Since tis appoac is vey expensive ecently seveal eseaces poposed te use of vitual macine ISBN /99/ $. c 7 IEEE

2 envionments to implement multiple oneypots on a single seve [], []. Tese systems ae easy to manage and ave a educed deployment cost wile tey povide all functionalities of a eal system. Vable et al. [] pesented Potemkin, a pototype oneynet tat uses te vitual macine appoac suppoting ove 64, oneypots using only few pysical seves. Deception tecniques fo defending infomation systems ave been investigated by seveal eseaces. Coen [] povides a compeensive discussion of deception issues fo infomation potection. Among te conclusions of te above study is tat deception is a valuable tool fo intusion detection and it as a positive effect on te defense and a negative effect on te attackes. Te auto stessed te need fo igoous matematical analysis of deception in infomation potection. Coen and Koike [4] sows ow deception can be used to contol te pat of a compute system attack. Deception Toolkit (DTK) [] is a collection of scipts tat allows te emulation of diffeent known vulneabilities in ode to deceive te attackes. Rowe et al. [5] suggested te use of fake oneypots to scae away possible attackes. Tey also discuss te escalation of oneypot anti-oneypot tecniques. Rowe [6] pesented seveal tools fo evaluating oneypot deceptions. B. Contibutions Te contibution of tis pape consists of a game teoetic famewok fo modeling and analyzing deception in oneynets. We popose and analyze a stategic game model fo te oneynet system. We detemine te equilibium solutions fo tis model and analyze te coesponding stategies of te attacke and te defende. We also popose te use of extensive games of impefect infomation to analyze deception stategies in oneynets. We sow ow te poposed game can be used to model te attacke-oneynet inteactions. We analyze te mixed stategy equilibium solutions of te poposed game and caacteize te deception moves of te defende and te coesponding attacke s actions. To ou knowledge, tis is te fist wok poposing a model of te attacke-oneynet inteactions based on an extensive game of impefect infomation. C. Oganization Te est of te pape is stuctued as follows. In Sect. II we descibe a pototype stategic fom game tat models te attacke and te oneynet system. In Sect. III we popose te oneynet deception games in extensive fom and discuss tei popeties. In Sect. IV we daw conclusions and pesent futue diections. II. A Pototype Honeynet Game in Stategic Fom We conside te attacke and te oneynet system as playes in a stategic noncoopeative game. We denote te attacke by A and te defende, wic is te oneynet system, by D. Te oneynet is assumed to be composed of k oneypot osts out of n possible osts witin a block of IP addesses. Te attacke must coose to attack one of tese osts. Te goal of te attacke is to attack a ost tat is not a oneypot wile te goal of te defende is to ave a oneypot attacked by te attacke. In tis initial model we assume tat te attacke and te defende make tei decisions independently and witout any knowledge of te opponent playe s moves. We call te game tat models tis situation a (n, k)-oneynet game, denoted as HG(n,k). Definition : A (n,k)-oneynet game consists of: (i) te set of playes N = {A,D}. (ii) te set of actions fo eac playe: (a) A D = {(x,x,...,x n ) k vecto components ae and n k components ae }. If x i = ten D places a oneypot at position (addess) i. If x i = ten D places a egula ost at position i. (b) A A = {j j =,...,n}. A cooses to attack ost j. (iii) te payoff functions of eac playe: { c if x j =, u A ((x,x,...,x n ),j) = () c if x j = u D ((x,x,...,x n ),j) = { c if x j =, c if x j = wee c i >, fo i {,}. Te paamete c epesents te payoff gained by te defende and also te loss incued by te attacke if te attacke attacks a oneypot. Te paamete c epesents te payoff gained by te attacke and also te loss incued by te defende if te attacke attacks a egula ost. As an example we conside a (, )-oneynet game, HG(,). Te payoff matix fo tis game is given below. In tis matix te ow playe is A and te column playe is D. Te fist component of te payoff pais given in te matix epesents te payoff to A wile te second component epesents te payoff to D. (, ) (, ) c, c c, c c, c c, c One solution concept fo stategic games is te Nas equilibium [7], [8]. An action pofile is a tuple wit an enty containing te action fo eac playe. An action pofile is a Nas equilibium wen no playe can do bette by alteing e action. Definition (Nas equilibium [9]) An action pofile a = (a,a,...,a n) is a Nas equilibium, if () u i (a ) u i (a i,a i) fo evey action a i of playe i, () ISBN /99/ $. c 7 IEEE

3 wee ( a i is an action pofile ) witout playe i, i.e., a i = a,...,a i,a i+,...,a n. Any cange of action by playe i will educe e payoff and consequently se will coose not to alte e action. As can be seen fom te payoff matix above, HG(,) does not ave a Nas equilibium in pue stategies. Tus we need to conside mixed stategies since fo a finite stategic game we will always be able to find a Nas equilibium in mixed stategies [9]. A mixed stategy of a playe is a pobability distibution ove te playe s pue stategies. In te following we fomally define te concept of Nas equilibium in mixed stategies. Definition (Mixed stategy Nas equilibium [9]) Te mixed stategy pofile α is a mixed stategy Nas equilibium if u i (α ) u i (α i,α i ), fo evey mixed stategy α i of playe i, wee α i is te action pofile witout playe i, i.e., α i = ( α,...,α i,α i+,...,α n). A pue stategy is a mixed stategy wit an action tat as pobability. In te case of HG(,) we denote by a i, i {,} te pue stategy of A in wic A attacks ost i, and by d i, i {,} te pue stategy of D in wic D places a oneypot at ost i (i.e., d = (,) and d = (,)). We denote by α A (a i ) te pobability assigned by te mixed stategy α A of te attacke to its stategy a i ; and by α D (d i ) te pobability assigned by te mixed stategy α D of te attacke to its stategy d i. It can be sown tat te Nas equilibium in mixed stategies is given by (((α A (a ),α A (a )),(α D (d ),α D (d ))) = ((, ),(, )). Te Nas equilibium in mixed stategies of HG(, ) coesponds to te intuitive solution in wic te attacke is attacking ost and ost wit equal pobability and te defende is placing te oneypot at ost o ost wit equal pobability. Te equilibium analysis of te geneal game HG(n, k) is as follows. A as n pue stategies {a,...,a n }, wee stategy a i means A attacks ost i. D as m = ( n k) ways to place k oneypots at n osts, wee {x,x,...,x n } is te vecto denoting te placement of oneypots. We denote te pue stategies of D by d j,j = {,...,m}. Using te payoff function in Definition we see tat tee is no Nas equilibium in pue stategies. Intuitively wen A attacks node j, D would obtain a ige payoff if se cooses a stategy d i, in wic x j =. Howeve in tat case A is bette off attacking some ote node l j. Tus tee is no pue stategy equilibium fo HG(n, k). To calculate te mixed stategy equilibia of HG(n,k), we conside te pobabilities assigned to eac pue stategy by te playes (as mentioned above in HG(,) example). Let c D ij denote te payoff of D wen A selects stategy a j and D selects stategy d i. Te expected payoff Ei D eceived by D wen playing d i is Ei D = n j= α A(a j )c D ij Te total expected payoff of D will be: E D = m α D (d i )Ei D (4) i= It can be seen tat to maximize E D, D as to play all α D (d i ) equally, because of te symmetical payoffs. Tis means tat at te equilibium in mixed stategies te pobability α D (d i ) wit wic D selects stategy d i is equal to /m, i.e., α D (d i ) = /m, i =,...,m. Intuitively, we can see tat if D can incease its payoff by inceasing te pobability of playing stategy d i and deceasing te pobability of playing stategies d i ten, it will be able to maximize its payoff by setting d i = and d i =, wic will be a pue stategy. Howeve, we ave aleady seen tat tee is no pue stategy equilibium fo tis game. Tus te mixed stategy Nas equilibium fo tis game is wen bot playes, te attacke and te defende, play all tei stategies wit equal pobabilities. Since tis is a one-sot game te attacke and te defende coose tei stategies independently and so te defende cannot influence te stategies of te attacke. Te games poposed in tis section do not conside deception stategies, but tey ae te pototype games tat will be extended in te next section into games tat take into account deception moves. III. Honeynet Deception Games We extend te games studied in te pevious section to allow deception moves by te defende (oneynet). Examples of deception moves ae: make it evident to te attacke tat te system is a oneypot but in fact it is a egula ost (we call tese fake oneypots ), o ide te oneypot suc tat te attacke believes it is a egula ost. Tese can be acieved by diffeent tecniques some of tem being descibed in [5], [6]. In tis section we popose a game teoetic model consideing two playes, te Attacke and te Defende (oneynet). As in te pevious section we assume tat te oneynet is composed of k oneypots out of n possible osts witin a block of IP addesses. As mentioned ealie, te attacke pobes te osts and analyzes tei esponses to identify oneypots. A cleve defende will espond to te pobes in a way tat te attacke does not gain infomation on wete te ost is a egula one o a oneypot. Te esponse of te ost depends on wete te ost is a oneypot (diffeent esponses by low-inteaction and ig-inteaction oneypots) o a egula ost. Te esponse of te oneypot may be geneated suc tat to conceal te identity of te oneypot. Howeve, it is safe to assume tat afte a few pobes an attacke can successfully identify tat a ost is a oneypot, i.e., te defende cannot infinitely deceive te attacke in believing a ost to be egula ost, wen in fact it is a oneypot. Te goal of te attacke is to identify and attack a ost tat is not a oneypot wile te goal of te defende is to conceal te oneypot (make it appea as a egula ost) and ISBN /99/ $. c 7 IEEE

4 ave te oneypot attacked by te attacke. Even if te attacke does not attack te oneypot, te defende gates cucial infomation if it can make te attacke pobe te oneypot as muc as possible. In te poposed model te attacke and te defende make tei decisions sequentially by consideing te opponent playe s moves. We model tis scenaio as a game wit sequential moves. Te fist move is made by te defende, in wic se decides ow to place te k oneypots among te n possible osts. Tee ae ( n k) diffeent ways in wic k oneypots can be placed into n positions. Next te attacke decides wat ost to pobe out of te n possible osts. Te next move is by te defende, wo esponds to te pobe of te attacke. In ou model te defende as two types of esponses, and wee esponse means tat te ost being pobed is a egula ost and te esponse means te ost being pobed is a oneypot. It sould be noted tat tese esponses may not epesent te actual state of te ost, i.e., te defende may lie to deceive te attacke. Depending on te esponse of te defende, se may coose to pobe te same ost again o pobe some ote ost. Te game continues wit altenative moves by te attacke and te defende in te fom of pobes and esponses, until te attacke pobes and te defende poduces esponses γ times. Afte γ stages (pobe-esponse) te attacke makes te final move in wic se cooses to eite attack a ost o not attack any ost. In te intemediate stages of te game te payoffs ae computed based on wete te attacke pobes a oneypot o a egula ost. Te payoff of te attacke and te defende in te final move (by te attacke) ae based on wete te attacke attacks a oneypot o a egula ost o cooses not to attack. Te total payoff is te sum of te payoffs of intemediate moves and te final move. In te above game te final move by te attacke is made afte γ pobes to te osts, independent of te ost being pobed. Anote scenaio wic can be consideed is te one in wic te attacke makes te final move afte se as pobed a ost at least γ times. In tat case te total numbe of pobes made by te attacke will be geate tan o equal to γ. In te following, we conside only te fist scenaio, in wic te attacke makes te final move afte γ pobes, iespective of te ost pobed. We call te game tat models tis situation a (n, k, γ)-oneynet deception game, denoted as HDG(n,k,γ). Since a stategic fom game model does not captue te sequential natue of te decision making pocess, we will model te inteactions between te attacke and te system as an extensive fom game. An extensive fom game is a dynamic model tat expesses te sequential stuctue of decision making. In ode to ave a clea and manageable way to explain te concepts used in ou game teoetic modeling we fist pesent a paticula vesion of te geneal game, HDG(,,), in wic afte one pobe te attacke D : A : A : D : D : D :4 D :5 : : : : :4 :4 :5 :5 Fig.. HDG(,,) game,,,,,,,,,,,, decides to attack one of te osts o not. Late on we will descibe te geneal game. Fig. depicts a HDG(,,) game in extensive fom. In tis figue te moves ae indicated above te oizontal lines. Te game as fou stages: (i) D - Te defende (D) decides te position of te oneypot to be at ost o ost (denoted by actions and, espectively). Tis infomation is not known to te attacke, tus HDG(,,) is a game of impefect infomation. (ii) A - Te attacke (A) pobes one of te osts ( o ). (iii) D - Te defende poduces a esponse to te pobe of te attacke ( =egula ost, o =oneypot). (iv) - Te attacke eite attacks one of te osts ( o ) o does not attack at all (). Te stategies of te defende ae as follows: (i) Deception stategies: Wen a ost is pobed, espond wit wen te ost is an actual oneypot (i.e., conceal te oneypot), o espond wit wen te ost is an actual egula ost (i.e., sow a fake oneypot). An example of suc stategy is wen D places a oneypot at ost i.e., cooses move (), A pobes ost and D esponds wit. ISBN /99/ $. c 7 IEEE 4

5 (ii) Disclosue stategies: Wen a ost is pobed, espond wit te actual status of te ost, i.e., wit wen te ost is an actual egula ost and wit wen te ost is an actual oneypot. An example of suc stategy is wen D places a oneypot at ost i.e., cooses move (), A pobes ost and D esponds wit. A seies of actions in an extensive game is called a sequence. Fomally B = (a...a n ) is a sequence if action a i was taken duing stage i. Te game in Fig. as 8 suc sequences: (), (), (,), (,), (,), (,), (,,), (,,),..., (,,,), (,,,). Te sequence (,,,) indicates tat D places a oneypot at ost, A pobes ost, D eplies tat ost is a egula ost and ten A does not attack any ost. A sequence as istoies. Te sequence (,,,) as five subistoies:, (), (, ), (,, ), and (,,, ). Te istoies, (), (,) and (,,) ae pope subistoies of (,,,); subistoy (,,,) is a teminal istoy. Te teminal istoies ae annotated wit pefeences. Te pefeence of teminal istoy l is a tuple of payoffs u i (l), one fo eac playe. Te pefeence tuple indicates te payoff of A and D. Te fist component of te tuple in Fig. is te payoff to A wile te second component is te payoff to D. Te payoff function u i (l), i {A,D} gives te pefeence of te playes given teminal istoy l. Playe i, i {A, D} pefes teminal istoy l to l, if u i (l ) > u i (l) and is indiffeent between istoies l and l if u i (l ) = u i (l). In te game epesented in Fig., D pefes istoy (,,,) to (,,,) as u D (,,,) > u D (,,,). HDG(n, k, γ) is a game wit impefect infomation since all te playes do not ave pecise infomation about te pevious actions of all te ote playes at all stages of te game. Specifically, te attacke does not know ow te defende as placed te oneypots in te fist stage of te game. To epesent tis lack of infomation in te model, te notion of infomation set is used. Let us denote by H i te set of istoies afte wic playe i moves. An infomation set is a patition of H i. Te collection of infomation sets is called te infomation patition of playe i. Wen making a move, playe i is infomed about te infomation set tat as occued but not about te exact istoy witin tat set. In Fig. te infomation set is given below te stage label in te fomat x : y wee x efes to te playe numbe (x = is te attacke and x = is te defende) and y denotes te numbe of te infomation set. In HDG(,, ) game, te attacke knows te infomation set : = {(),()} afte stage D, but not wic one of te two istoies, () and (), as occued. Fomally an extensive-fom game can be defined as follows: Definition 4: (Extensive-Fom Game wit impefect Infomation) [] An extensive-fom game wit impefect infomation consists of te following: Action A s payoff D s payoff A pobes a oneypot -5 5 A pobes a egula ost A attacks a oneypot - A attacks a egula ost - A cooses not to attack TABLE I Payoffs fo HDG(n, k, γ) game (i) Te set of playes; (ii) Te set of teminal istoies; (iii) A function P(l) tat assigns a playe to te move afte subistoy l; (iv) Fo eac playe, te infomation patition (a patition of te set of istoies assigned to tat playe) (v) Pefeences ove te set of lotteies (i.e., pobability distibutions) ove teminal istoies, fo eac playe. We fomally define te HDG(,,) game in extensive fom (Fig. ) as follows: (i) {A,D} is te set of playes; (ii) {(,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,), (,,,)} is te set of teminal istoies; (iii) Te function P() suc tat P(D) = D,P(A) = A, P(D) = D, and P() = A, wee D, A, D and ae te stages of te game as descibed ealie; (iv) Infomation patitions: All istoies afte wic te defende moves ae contained in individual infomation sets, wic means tat te defende obseves all actions of te attacke; te attacke s infomation patition afte stage D consists of te istoies {(),()} and afte stage D consists of {{(,,),(,,)}, {(,,),(,,)}, {(,,),(,,)} and {(,,),(,,)}}, wic means tat at any point in te game, te attacke cannot distinguis wic ost is a oneypot and wic one is a egula ost. (v) Te pefeences ove te teminal istoies ae calculated accoding to Table I. Wen te attacke pobes a oneypot, it povides some infomation to te defende so te payoff of te attacke in tis case is -5 and tat of te defende is 5. If te attacke pobes a egula ost se does not povide any infomation to te defende and te defende does not get any benefit, tus bot eceive a payoff of. Te payoffs fo all te actions of te attacke ae summaized in te table. Te final pefeences ae te sums of te intemediate payoffs afte stages A and. Fo ISBN /99/ $. c 7 IEEE 5

6 example, conside teminal istoy (,,,). Te defende places te oneypot at ost and te attacke pobes ost, tus te attacke obtains an intemediate payoff of 5 and te defende obtains an intemediate payoff of 5. Howeve, in te final move te attacke attacks ost and tus obtains a payoff of in tat stage, making e total payoff of 5 + = 5. Te defende obtains afte stage and e total payoff is 5 = 5. As we mentioned ealie, te objective of a playe is to maximize e payoff. Playes ae not isolated; te actions of te defende influence and ae influenced by te actions of te attacke. Let A(I i ) denote te actions available to playe i at infomation set I i. A function wic assigns an action a i A(I i ) to eac of i s infomation sets I i is called a pue stategy of playe i in an extensive game. A mixed stategy of a playe in an extensive game is a pobability distibution ove te playe s pue stategies. We denote te mixed stategy (α i ) of playe i = {A,D} at infomation set I i as a vecto of pobabilities, wee eac pobability coesponds to te available actions in te ode in wic te actions ae given in te game definition. Tus wen te defende as a mixed stategy of playing bot te moves ( and ) at infomation set : will be denoted by α D ( : ). Te solution concept fo extensive fom games tat we conside in tis study is te mixed stategy Nas equilibium. Tis equilibium is a steady state in wic no playe can unilateally incease e payoff. It is fomally defined as follows: Definition 5: (Nas equilibium of extensive game) [] Te mixed stategy pofile α in an extensive game is called a Nas equilibium in mixed stategies if, fo eac playe i and evey ote mixed stategy α i of playe i, playe i s expected payoff to α is at least as muc as is expected payoff to (α i,α i ) wee α i denotes te stategy pofile of all playes except playe i. Te Nas equilibia of an extensive game ae often computed by constucting te stategic fom of te game and analyzing it as a stategic game []. We used Gambit [], a softwae tool fo solving games, to compute te equilibia of HDG(,, ). Gambit computed seveal Nas equilibia in mixed stategies. We will pesent and discuss only one of tese equilibia of te HDG(,,) game wic is sown in Fig.. In te figue te pobability of an action being played in tis paticula mixed stategy equilibium is sown below te oizontal lines epesenting te actions of te playes. Te mixed stategy equilibium sown in te figue can be epesented as α D ( : ) = α D ( : ) = α D ( : ) = α D ( : 4) = α D ( : 5) = (,), α D ( : ) = (,), α D ( : ) = α D ( : ) = α D ( : 4) = (,,), α D ( : 5) = (,,). Tis stategy implies tat at stage D, te defende cooses one of te configuations wit equal pobability (bot ), because se as te same expected payoff fo bot actions. Te attacke pobes one of te two osts wit equal pobability, since se does not ave any infomation about te placement of te oneypots. At stage D, te defende plays te deception stategy wit pobability. Tis means tat wen a egula ost is pobed, te defende esponds wit alf of te time to deceive te attacke. Similaly wen a oneypot is pobed, it esponds wit alf of te time. Tis way te attacke can be deceived to attack a oneypot. Wen te attacke pobes ost, wateve esponse se gets, se attacks ost and ost wit equal pobability. Tis is safe fo te attacke because se does not know wic node is a oneypot. Wen te attacke pobes ost and eceives te esponse, te attacke cooses not to attack, to avoid te isk of attacking te oneypot. Howeve wen se eceives te esponse, se attacks ost and ost wit equal pobability. Tis paticula stategy is suitable fo an attacke wo wants to avoid te isk to a cetain degee. Te geneal HDG(n,k,γ) game can be fomally defined as follows: (i) {A,D} is te set of playes; (ii) Te set of teminal istoies is denoted by set of vectos {(x,x,...,x m ) m = γ+, wee x i is te action taken by te playe at stage i of te game }. Te actions available to te playes ae as follows: (a) x = {(y y...y n ) k vecto components ae and n k components ae }. If y i = ten D places a oneypot at position (addess) i and if y i = ten ( D places a egula ost at position i. Tee ae q = n ) k suc combinations possible. We call tis vecto a configuation and denote configuations by c t t = {,...,q} (b) x i = j,j {,...,n}, ae te actions available to A in intemediate stages (i is even, i m) wee A cooses to pobe ost j out of n osts. (c) x i = {,}, ae te actions available to D in diffeent stages (i is odd, i ) ( denotes D s esponse to te pobe tat x i is egula ost, denotes a oneypot (migt be a deception move)). (d) x m = j,j {,...,n + } in wic A cooses to attack ost j (j = n + means no attack). (iii) Te function P(l) suc tat P( ) = D, P(l) = A, if te last action in subistoy l was taken by D else P(l) = D. In ote wods, D and A play altenatively, stating wit D and te last action is taken by A. (iv) Te infomation sets in te infomation patition of D consists of individual istoies {{(x,x )}, {(x,x,x,x 4 )},...,{(x,x,...,x m )}}. Te infomation patition of A as all istoies wit diffeent values of x but same values of (x,...,x m ) gouped in te same infomation set. Fomally, te infomation patition of A is {{(c t )}, {(c t,,)}, {(c t,,)}, {(c t,,)},..., (c t,n,,...,) t = ISBN /99/ $. c 7 IEEE 6

7 {,...,q}} (v) Te pefeences ove te teminal istoies ae calculated by summing te intemediate payoffs (given in Table I) coesponding to te actions in te teminal istoy. Since te infomation sets in wic D moves contain individual istoies, te defende obseves all actions of te attacke. Howeve eac infomation set of te attacke contains q istoies, eac istoy coesponding to diffeent configuations. Fo example, if n =,k =,γ =, tee ae diffeent configuations, c =,c = and c =. Te infomation patition of te defende is as follows { {(φ)}, {(,)}, {(,)}, {(,)}, {(,)}, {(,)}, {(,)}, {(,)}, {(,)}, {(,)}} Eac infomation set of te attacke will contain istoies wit diffeent values of c t but te same values fo te ote actions, i.e. { {(),(),()}, {(,,), (,,), (,,)}, {(,,), (,,), (,,)}, {(,,), (,,), (,,)}, {(,,), (,,), (,,)}}. Tis means tat at any point in time, te attacke cannot identify te placement of oneypots and egula osts in te system. Tis geneal game model allows us to analyze te inteactions of te attacke and te defende. Since te equilibium solutions epesent accuate pedictions of ow te attacke and te defende beave in te oneynet system, tey ae used to detemine te best stategies of te attacke and te defende. IV. Conclusions We poposed a game teoetic famewok fo modeling deception in oneynets. Te famewok is based on extensive games of impefect infomation. We studied te equilibium solutions of tese games and sowed ow tey ae used to detemine te stategies of te oneynet system. Tee ae seveal ideas fo futue wok tat stem fom tis initial study of game teoetic models fo oneynets. We plan to investigate and caacteize into moe details te geneal deception game poposed in tis pape. We also plan to investigate ote types of games in wic te attacke as patial infomation on te oneypots placement. [6] C. Keibic and J. Cowcoft, Honeycomb - ceating intusion detection sugnatues using oneypots, ACM SIGCOMM Compute Communications Review, vol. 4, no., pp. 5 56, 4. [7] D. Mooe, C. Sannon, G. M. Voelke, and S. Savage, Netwok telescopes: Tecnical epot, Tecnical Repot CS4-795, UCSD, July 4. [8] R. Pang, V. Yegneswaan, P. Bafod, V. Paxson, and L. Peteson, Caacteistics of intenet backgound adiation, in Poc. of te Intenet Measuement Confeence, pp. 7 4, Octobe 4. [9] V. Yegneswaan, P. Bafod, and D. Plonka, On te design and use of intenet sinks fo netwok abuse monitoing, in Poc. of te Symposium on Recent Advances in Intusion Detection, Septembe 4. [] N. Povos, A vitual oneypot famewok, in Poc. of te t USENIX Secuity Symposium, pp. 8 84, August 4. [] M. Vable, J. Ma, J. Cen, D. Mooe, E. Vandekieft, A. C. Snoeen, G. M. Voelke, and S. Savage, Scalability, fidelity, and containment in te potemkin vitual oneyfam, in Poc. of te t ACM Symposium on Opeating Systems Pinciples, pp. 48 6, Octobe 5. [] L. K. Yan, Vitual oneynets evisited, in Poc. of te IEEE Woksop on Infomation Assuance, pp. 9, June 5. [] F. Coen, A note on te ole of deception in infomation potection, Computes and Secuity, vol. 7, no. 6, pp , 998. [4] F. Coen, Leading attackes toug attack gaps wit deceptions, Computes and Secuity, vol., no. 5, pp. 4 4,. [5] N. C. Rowe, B. T. Duong, and E. J. Custy, Fake oneypots: A defensive tactic fo cybespace, in Poc. of te IEEE Woksop on Infomation Assuance, pp., June 6. [6] N. C. Rowe, Measuing te effectiveness of oneypot countecountedeception, in Poc. of te 9t Hawaii Intenational Confeence on System Sciences, Januay 6. [7] J. F. Nas, Equilibium point in n-peson games, Poc. Nat l Academy of Sciences of te United States of Am., vol. 6, pp , Jan. 95. [8] J. F. Nas, Non-coopeative games, Annals of Mat., vol. 54, no., pp , 95. [9] M. Osbone and A. Rubinstein, A Couse in Game Teoy. Cambidge, Mass.: MIT Pess, 994. [] M. Osbone, An Intoduction to Game Teoy. New Yok, NY: Oxfod Univesity Pess, 4. [] R. D. McKelvey, A. McLennan, and T. Tuocy, Gambit: Softwae Tools fo Game Teoy. Vesion.7..: ttp://econweb.tamu.edu/gambit, 7. Refeences [] Honeynet Poject, Know You Enemy: Leaning about Secuity Teats. Boston, MA: Peason Education Inc., second ed., 4. [] B. Ceswick, An evening wit befed, in wic a acke is lued, endued, and studied, in Poc. of te Winte Usenix Confeence, Januay 99. [] J. Betencout, J. Fanklin, and M. Venon, Mapping intenet sensos wit pobe esponse attacks, in Poceedings of te USENIX Secuity Symposium, pp. 9 8, August 5. [4] D. Mooe, V. Paxson, S. Savage, C. Sannon, S. Stanifod, and N. Weave, Inside te slamme wom, IEEE Secuity and Pivacy, vol., pp. 9, July. [5] D. Mooe, C. Sannon, D. J. Bown, G. M. Voelke, and S. Savage, Infeing intenet denial-of-sevice activity, ACM Tans. Comput. Syst., vol. 4, no., pp. 5 9, 6. ISBN /99/ $. c 7 IEEE 7

ABriefIntroductiontotheBasicsof Game Theory

ABriefIntroductiontotheBasicsof Game Theory ABiefIntoductiontotheBasicsof Game Theoy Roy Smead Notheasten Univesity Septembe 18, 2013 Game theoy is a set of mathematical tools that ae used to epesent and study social inteactions. This is a vey bief

More information

10 Torque. Lab. What You Need To Know: Physics 211 Lab

10 Torque. Lab. What You Need To Know: Physics 211 Lab b Lab 10 Toque What You Need To Know: F (a) F F Angula Systems Evey lab up to this point has dealt with objects moving in the linea system. In othe wods, objects moving in a staight line. Now we ae going

More information

Matlab Simulink Implementation of Switched Reluctance Motor with Direct Torque Control Technique

Matlab Simulink Implementation of Switched Reluctance Motor with Direct Torque Control Technique Matlab Simulink Implementation of Switched Reluctance Moto with Diect Toque Contol Technique Vikamaajan Jambulingam Electical and Electonics Engineeing, VIT Univesity, India. Abstact - The switched eluctance

More information

Noncrossing Trees and Noncrossing Graphs

Noncrossing Trees and Noncrossing Graphs Noncossing Tees and Noncossing Gaphs William Y. C. Chen and Shey H. F. Yan Cente fo Combinatoics, LPMC, Nanai Univesity, 300071 Tianjin, P.R. China chen@nanai.edu.cn, huifangyan@eyou.com Submitted: Sep

More information

OPTIMAL SCHEDULING MODELS FOR FERRY COMPANIES UNDER ALLIANCES

OPTIMAL SCHEDULING MODELS FOR FERRY COMPANIES UNDER ALLIANCES Jounal of Maine Science and Technology, Vol. 15, No. 1, pp. 53-66 (2007) 53 OPTIMAL SCHEDULING MODELS FOR FERRY COMPANIES UNDER ALLIANCES Shangyao Yan*, Chia-Hung Chen**, Hsin-Yen Chen*** and Tze-Chiang

More information

An Auction Based Mechanism for On-Demand Transport Services

An Auction Based Mechanism for On-Demand Transport Services An Auction Based Mechanism fo On-Demand Tanspot Sevices Malcolm Egan, Ni Oen and Michal Jakob Abstact Recently, a new class of tanspot sevices, exemplified by Ube and Lyft has emeged. Such sevices use

More information

Design Engineering Challenge: The Big Dig Contest Platter Strategies: Ball Liberation

Design Engineering Challenge: The Big Dig Contest Platter Strategies: Ball Liberation Poblem Set 4: Unifom Cicula Motion Design Engineeing Challenge: The Big Dig.007 Contest Platte Stategies: Ball Libeation Oeall Notes: You ae not equied to pefom the actual analysis in this poblem set,

More information

CORESTA RECOMMENDED METHOD N 68

CORESTA RECOMMENDED METHOD N 68 COESTA ECOMMENDED METHOD N 68 DETEMINATION OF CABON MONOXIDE IN THE MAINSTEAM SMOKE OF CIGAS BY NON-DISPESIVE INFAED ANALYSIS (Januay 2010) 1. FIELD OF APPLICATION The method is applicable to the gas phase

More information

A Force Platform Free Gait Analysis

A Force Platform Free Gait Analysis Poceedings A Foce Platfom Fee Gait Analysis Tokio Maeda 1,2, *, Tatsuo Ishizuka 3, Sakua Yamaji 4 and Yuji Ohgi 3 1 Keio Reseach Institute at SFC, 5322 Endo, Fujisawa, Kanagawa 252-0882, Japan 2 Koseki

More information

The Study About Stopping Distance of Vehicles

The Study About Stopping Distance of Vehicles Intenational Jounal of Infomation Engineeing and Applications 018; 1(1): 18- http://www.aascit.og/jounal/infomation The Study About Stopping Distance of Vehicles Zhao Chun-xue School of Mathematics and

More information

Multiple Vehicle Driving Control for Traffic Flow Efficiency

Multiple Vehicle Driving Control for Traffic Flow Efficiency Multiple Vehicle Diving Contol fo Taffic Flow Efficiency Seong-Woo Kim, Gi-Poong Gwon, Seung-Tak Choi, Seung-am Kang, Myoung-Ok Shin, In-Sub oo, Eun-Dong Lee, and Seung-Woo Seo Abstact The dynamics of

More information

Cheat-Proof Playout for Centralized and Distributed Online Games

Cheat-Proof Playout for Centralized and Distributed Online Games Cheat-Poof Playout fo Centalized and Distibuted Online Games Nathaniel E. Baughman Bian Neil Levine baughman@cs.umass.edu bian@cs.umass.edu Depatment of Compute Science Univesity of Massachusetts Amhest,

More information

Rearranging trees for robust consensus

Rearranging trees for robust consensus Poceedings of the IEEE Conf. on Decision and Contol, Olando, FL, 011 Reaanging tees fo obust consensus Geoge Foest Young, Luca Scadovi and Naomi Ehich Leonad Abstact In this pape, we use the H nom associated

More information

Alternate stable states in coupled fishery-aquaculture systems. Melissa Orobko

Alternate stable states in coupled fishery-aquaculture systems. Melissa Orobko Altenate stable states in coupled fishey-aquacultue systems by Melissa Oobko A thesis submitted in confomity with the equiements fo the degee of Maste of Science Depatment of Ecology & Evolutionay Biology

More information

The Solution to the Bühlmann - Straub Model in the case of a Homogeneous Credibility Estimators

The Solution to the Bühlmann - Straub Model in the case of a Homogeneous Credibility Estimators 5 Economy Infomatics, -4/005 The Solution to the Bühlmann - Staub Model in the case of a Homogeneous Cedibility Estimatos Lect. Viginia ATANASIU Mathematics Depatment, Academy of Economic Studies Oiginal

More information

British Prime Minister Benjamin Disraeli once remarked that

British Prime Minister Benjamin Disraeli once remarked that GABREL COSTA, MCHAEL HUBER, & OHN SACCOMAN Cumulative Home Run Fequency and the Recent Home Run Explosion Bitish Pime Ministe Benjamin Disaeli once emaked that thee ae thee kinds of falsehoods: lies, damned

More information

EC-FRM: An Erasure Coding Framework to Speed up Reads for Erasure Coded Cloud Storage Systems

EC-FRM: An Erasure Coding Framework to Speed up Reads for Erasure Coded Cloud Storage Systems 215 44th Intenational Confeence on Paallel Pocessing EC-FRM: An Easue Coding Famewok to Speed up Reads fo Easue Coded Cloud Stoage Systems Yingxun Fu, Jiwu Shu *, and Zhiong Shen Tsinghua National Laboatoy

More information

A Deceleration Control Method of Automobile for Collision Avoidance based on Driver's Perceptual Risk

A Deceleration Control Method of Automobile for Collision Avoidance based on Driver's Perceptual Risk A Deceleation Contol Method of Automobile fo Collision Avoidance based on Dive's Peceptual Risk Takahio Wada, Shun ichi Doi, and Shoji Hiaoka Abstact To educe ea-end cash of automobiles, it is impotant

More information

Performance Characteristics of Parabolic Trough Solar Collector System for Hot Water Generation

Performance Characteristics of Parabolic Trough Solar Collector System for Hot Water Generation Intenational Enegy Jounal: Vol. 7, No. 2, June 2006 137 Pefomance Chaacteistics of Paabolic Tough Sola Collecto System fo Hot Wate Geneation www.sed.ait.ac.th/eic A. Valan Aasu and T. Sonakuma Faculty

More information

Color Encodings: srgb and Beyond

Color Encodings: srgb and Beyond IS&T's 2002 PICS Confeence Colo Encodings: srgb and Beyond Kevin E. Spaulding Eastman Kodak Company, Rocheste, New Yok Jack Holm Hewlett-Packad Company, Palo Alto, Califonia Abstact Most digital imaging

More information

UNIVERSITÀ DEGLI STUDI DI PADOVA. Dipartimento di Scienze Economiche Marco Fanno

UNIVERSITÀ DEGLI STUDI DI PADOVA. Dipartimento di Scienze Economiche Marco Fanno UNIVERSITÀ DEGLI STUDI DI PADOVA Dipatimento di Scienze Economiche Maco Fanno DUAL LICENSING IN OPEN SOURCE SOFTWARE MARKETS STEFANO COMINO Univesity of Udine FABIO M. MANENTI Univesity of Padova Januay

More information

A CONCEPTUAL WHEELED ROBOT FOR IN-PIPE INSPECTION Ioan Doroftei, Mihaita Horodinca, Emmanuel Mignon

A CONCEPTUAL WHEELED ROBOT FOR IN-PIPE INSPECTION Ioan Doroftei, Mihaita Horodinca, Emmanuel Mignon A CONCEPTUAL WHEELED ROBOT FOR IN-PIPE INSPECTION Ioan Dooftei, Mihaita Hoodinca, Emmanuel Mignon Univesité Libe de Buxelles Active Stuctues Laboatoy 50, Av. F.D.Roosevelt, B-1050, Bussels, Belgium. Email:

More information

EcoMobility World Festival 2013 Suwon: an analysis of changes in citizens awareness and satisfaction

EcoMobility World Festival 2013 Suwon: an analysis of changes in citizens awareness and satisfaction IOSR Jounal Engineeing (IOSRJEN) ISSN (e): 2250-3021, ISSN (p): 2278-8719 Vol. 07, Issue 03(Mach 2017), V1 PP 40-48 www.iosjen.og EcoMobility Wold Festival 2013 Suwon: an analysis changes in citizens awaeness

More information

Incorporating Location, Routing and Inventory Decisions in Dual Sales Channel - A Hybrid Genetic Approach

Incorporating Location, Routing and Inventory Decisions in Dual Sales Channel - A Hybrid Genetic Approach Incopoating Location, Routing and Inventoy Decisions in Dual Sales Channel - A Hybid Genetic Appoach Chia-lin Hsieh 1, Shu-hsien Liao 2, Wei-chung Ho 2 1 Depatment of Statistics and Actuaial Science, Aletheia

More information

Bubble clustering and trapping in large vortices. Part 1: Triggered bubbly jets investigated by phase-averaging

Bubble clustering and trapping in large vortices. Part 1: Triggered bubbly jets investigated by phase-averaging Intenational Jounal of Multiphase Flow 33 (2007) 1088 1110 www.elsevie.com/locate/ijmulflow Bubble clusteing and tapping in lage votices. Pat 1: Tiggeed bubbly jets investigated by phase-aveaging Rade

More information

Rotor Design and Analysis of Stall-regulated Horizontal Axis Wind Turbine

Rotor Design and Analysis of Stall-regulated Horizontal Axis Wind Turbine Roto Design and Analysis of Stall-egulated Hoizontal Axis Wind Tubine Xinzi Tang Univesity of Cental Lancashie, Peston, UK XTang4@uclan.ac.uk Xiongwei Liu Univesity of Cental Lancashie, Peston, UK XLiu9@uclan.ac.uk

More information

An integrated supply chain design model with random disruptions consideration

An integrated supply chain design model with random disruptions consideration Afican Jounal of Business Management Vol. 4(1), pp. 393-401, 18 Septembe, 010 Available online at http://www.academicounals.og/ajbm ISSN 1993-833 010 Academic Jounals Full Length Reseach Pape An integated

More information

A Machine Vision based Gestural Interface for People with Upper Extremity Physical Impairments

A Machine Vision based Gestural Interface for People with Upper Extremity Physical Impairments IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS-PART A: SYSTEMS AND HUMANS 1 A Machine Vision based Gestual Inteface fo People with Uppe Extemity Physical Impaiments Haiong Jiang, Badley S. Duestock,

More information

Multi-Robot Flooding Algorithm for the Exploration of Unknown Indoor Environments

Multi-Robot Flooding Algorithm for the Exploration of Unknown Indoor Environments 2010 IEEE Intenational Confeence on Robotics and Automation Anchoage Convention Distict May 3-8, 2010, Anchoage, Alaska, USA Multi-Robot Flooding Algoithm fo the Exploation of Unknown Indoo Envionments

More information

Design and Simulation Model for Compensated and Optimized T-junctions in Microstrip Line

Design and Simulation Model for Compensated and Optimized T-junctions in Microstrip Line Intenational Jounal of Advanced Reseach in Compute Engineeing & Technology (IJARCET) Volume 3 Issue, Decembe 4 Design and Simulation Model fo Compensated and Optimized T-junctions in Micostip Line Alok

More information

Wind and extremely long bridges a challenge for computer aided design

Wind and extremely long bridges a challenge for computer aided design Wind and extemely long bidges a challenge fo compute aided design oian JANJIC anaging iecto TV / entley Systems Gaz, Austia oian Janjic, bon 960, civil engineeing degee fom the Faculty of Civil Engineeing,

More information

A Collision Risk-Based Ship Domain Method Approach to Model the Virtual Force Field

A Collision Risk-Based Ship Domain Method Approach to Model the Virtual Force Field A Collision Risk-Based Ship Domain Method Appoach to Model the Vitual Foce Field Tengfei Wang a,b,c, Xinping Yan a,b *, Yang Wang a,b, and Qing Wu a,b,c a Intelligent Tanspotation System Reseach Cente,

More information

CS3350B Computer Architecture. Lecture 6.2: Instructional Level Parallelism: Hazards and Resolutions

CS3350B Computer Architecture. Lecture 6.2: Instructional Level Parallelism: Hazards and Resolutions CS3350B Compute Achitectue Winte 2015 Lectue 6.2: Instuctional Level Paallelism: Hazads and Resolutions Mac Moeno Maza www.csd.uwo.ca/couses/cs3350b [Adapted fom lectues on Compute Oganization and Design,

More information

Depth-first search and strong connectivity in Coq

Depth-first search and strong connectivity in Coq 1 Depth-fist seach and stong connectivity in Coq Januay 9, 2015 2 The poblem Finding the stongly connected components of a diected gaph. Pedagogical value: The fist nontivial gaph algoithm. Pactical value:

More information

MODELLING THE INTERACTION EFFECTS OF THE HIGH-SPEED TRAIN TRACK BRIDGE SYSTEM USING ADINA

MODELLING THE INTERACTION EFFECTS OF THE HIGH-SPEED TRAIN TRACK BRIDGE SYSTEM USING ADINA MODELLING THE INTERACTION EFFECTS OF THE HIGH-SPEED TRAIN TRACK BRIDGE SYSTEM USING ADINA ABSTRACT Constança Rigueio Depatment of Civil Engineeing, Polytechnic Institute of Castelo Banco Potugal Calos

More information

A Three-Axis Magnetic Sensor Array System for Permanent Magnet Tracking*

A Three-Axis Magnetic Sensor Array System for Permanent Magnet Tracking* 16 IEEE Intenational Confeence on Multisenso Fusion and Integation fo Intelligent Systems (MFI 16) Kongesshaus Baden-Baden, Gemany, Sep. 19-1, 16 A Thee-Axis Magnetic Senso Aay System fo Pemanent Magnet

More information

THE IMPACTS OF CONGESTION ON COMMERCIAL VEHICLE TOUR CHARACTERISTICS AND COSTS

THE IMPACTS OF CONGESTION ON COMMERCIAL VEHICLE TOUR CHARACTERISTICS AND COSTS Figliozzi 1 THE IMPACTS OF CONGESTION ON COMMERCIAL VEHICLE TOUR CHARACTERISTICS AND COSTS Miguel Andes Figliozzi Depatment of Civil and Envionmental Engineeing Maseeh College of Engineeing and Compute

More information

arxiv:cs/ v1 [cs.ds] 8 Dec 1998

arxiv:cs/ v1 [cs.ds] 8 Dec 1998 Minimum Cuts in Nea-Linea Time David R. Kage Febuay 1, 2008 axiv:cs/9812007v1 [cs.ds] 8 Dec 1998 Abstact We significantly impove known time bounds fo solving the minimum cut poblem on undiected gaphs.

More information

Lesson 33: Horizontal & Vertical Circular Problems

Lesson 33: Horizontal & Vertical Circular Problems Lesson 33: Hoizontal & Vetical Cicula Poblems Thee ae a wide vaiety of questions that you do if you apply you knowledge of cicula motion coectly. The tough pat is figuing out how to set them up. You need

More information

Lecture Topics. Overview ECE 486/586. Computer Architecture. Lecture # 9. Processor Organization. Basic Processor Hardware Pipelining

Lecture Topics. Overview ECE 486/586. Computer Architecture. Lecture # 9. Processor Organization. Basic Processor Hardware Pipelining EE 486/586 ompute chitectue Lectue # 9 asic Pocesso Hadwae Pipelining Refeence: ppendix : Section.1 Lectue Topics Sping 2015 Potland State Univesity Oveview Pocesso Oganization typical computing task consists

More information

PREDICTION OF THIRD PARTY DAMAGE FAILURE FREQUENCY FOR PIPELINES TRANSPORTING MIXTURES OF NATURAL GAS AND HYDROGEN Zhang, L. 1, Adey, R.A.

PREDICTION OF THIRD PARTY DAMAGE FAILURE FREQUENCY FOR PIPELINES TRANSPORTING MIXTURES OF NATURAL GAS AND HYDROGEN Zhang, L. 1, Adey, R.A. PREDICTION OF THIRD PARTY DAMAGE FAILURE FREQUENCY FOR PIPELINES TRANSPORTING MIXTURES OF NATURAL GAS AND HYDROGEN Zhang, L., Adey, R.A. 2 C M BEASY Ltd, Ashust Lodge, Southampton, SO4 7AA, UK, Lzhang@beasy.com

More information

Experimental and Numerical Studies on Fire Whirls

Experimental and Numerical Studies on Fire Whirls Expeimental and Numeical Studies on Fie Whils K. Matsuyama, N. Ishikawa 2, S. Tanaka 2, F. Tanaka, Y. Ohmiya 2, and Y. Hayashi 3 Cente fo Fie Science and Technology, Tokyo Univesity of Science, 264, Yamasaki,

More information

Complexity of Data Tree Patterns over XML Documents

Complexity of Data Tree Patterns over XML Documents Complexity of Data Tee Pattens ove XML Documents Claie David LIAFA, Univesity Pais 7 and CNRS, Fance cdavid@liafa.jussieu.f Abstact. We conside Boolean combinations of data tee pattens as a specification

More information

Follow this and additional works at:

Follow this and additional works at: Lehigh Univesity Lehigh Peseve Fitz Laboatoy Repots Civil and Envionmental Engineeing 1987 Weigh-in-motion and esponse study of fou insevice bidges, U.S. Depatment of Tanspotation, Fedeal Highway Administation

More information

Carnegie Mellon University Forbes Ave., Pittsburgh, PA command as a point on the road and pans the camera in

Carnegie Mellon University Forbes Ave., Pittsburgh, PA command as a point on the road and pans the camera in Panacea: An Active Senso Contolle fo the ALVINN Autonomous Diving System Rahul Sukthanka, Dean Pomeleau and Chales Thope Robotics Institute Canegie Mellon Univesity 5 Fobes Ave., Pittsbugh, PA 15213-3891

More information

Installation and Operation Instructions

Installation and Operation Instructions Smoke and Heat Ventilation Pneumatic - Electonic Contol Systems Installation and Opeation Instuctions Vesion / SHEVS Contol Cente RWZ c K + G Pneumatik GmbH In de Kause 8 9 Eschweile Deutschland / Gemany

More information

A Cache Model of the Block Correlations Directed Cache Replacement Algorithm

A Cache Model of the Block Correlations Directed Cache Replacement Algorithm Applied atematics & Information Sciences An International Journal 211 NSP 5 (2) (211),79S-88S A Cace odel of te Block Correlations Directed Cace Replacement Algoritm Zu Xudong Scool of Computer Science

More information

Target Allocation Study for Formation Ship-ToAir Missile System Based on the Missile Fire. Zone Division

Target Allocation Study for Formation Ship-ToAir Missile System Based on the Missile Fire. Zone Division Taget Aocation Study fo Fomation Ship-ToAi Missie System Based on the Missie Fie Zone Division Jihua Dou and Shouquan Dong 667#, Jiefang Road, Zhongshan Distict, Daian City, China Emai: doujihua@6com Abstact

More information

Multi-Robot Forest Coverage

Multi-Robot Forest Coverage Multi-Robot Foest Coveage Xiaoming Zheng Sonal Jain Sven Koenig David Kempe Depatment of Compute Science Univesity of Southen Califonia Los Angeles, CA 90089-0781, USA {xiaominz, sonaljai, skoenig, dkempe}@usc.edu

More information

Sight Distance. The availability of sufficient sight distance for the driver to see ahead is critical to the design of a safe highway.

Sight Distance. The availability of sufficient sight distance for the driver to see ahead is critical to the design of a safe highway. Sigt Distance Te availability of sufficient sigt distance for te driver to see aead is critical to te design of a safe igway. Wat is sigt distance? Sigt distance is te lengt of igway visible to a driver.

More information

SHRiMP: Accurate Mapping of Short Color-space Reads

SHRiMP: Accurate Mapping of Short Color-space Reads SHRiMP: Accuate Mapping of Shot Colo-space Reads Stephen M. Rumble 1,2, Phil Lacoute 3,4, Adian V. Dalca 1, Mac Fiume 1, Aend Sidow 3,4, Michael Budno 1,5 * 1 Depatment of Compute Science, Univesity of

More information

Quadratic Modeling Exercises

Quadratic Modeling Exercises Quadratic Modeling Exercises Pages 330 333 Problems 1,5-12,14,15,17,19,21 (for 19 and 21, you re only deciding between linear and quadratic; we ll get to exponential soon!) In class, we analyzed te function

More information

Efficient Algorithms for finding a Trunk on a Tree Network and its Applications

Efficient Algorithms for finding a Trunk on a Tree Network and its Applications Efficient Algoithms fo finding a Tunk on a Tee Netwok and its Applications Yamin Li, Shietung Peng Depatment of Compute Science Hosei Uniesity Tokyo 84-8584 Japan {yamin;speng}@k.hosei.ac.jp Wanming Chu

More information

Morrison Drive tel. Ottawa, ON, Canada K2H 8S fax. com

Morrison Drive tel. Ottawa, ON, Canada K2H 8S fax.   com acomaecom 302 1150 Moison Dive 613 820 8282 tel Ottawa, ON, Canada K2H 8S9 613 820 8338 fax www.aecom. com To Pat Seguin, P. Eng. Manage of Engineeing Page 1 CC Subject Valeie McGi, Ted Achuticz Pine Steet

More information

Numerical study of super-critical carbon dioxide flow in steppedstaggered

Numerical study of super-critical carbon dioxide flow in steppedstaggered The 6th Intenational Supecitical CO2 Powe Cycles Symposium Mach 27-29, 2018, Pittsbugh, Pennsylvania Numeical study of supe-citical cabon dioxide flow in steppedstaggeed labyinth seals Yuming Zhu a,b,

More information

FALL PROTECTION PROGRAM

FALL PROTECTION PROGRAM FALL PROTECTION PROGRAM 13255 South St. Ceitos, CA 90703 Telephone 562-924-3364 Fax 562-924-0521 Table of Contents Fall Potection... 3 Fall Potection Is Requied... 3 Fall Potection Types... 3 Standad Guadails,

More information

Cyclostrophic Balance in Surface Gravity Waves: Essay on Coriolis Effects

Cyclostrophic Balance in Surface Gravity Waves: Essay on Coriolis Effects Jounal of Oceanogaphy, Vol. 53, pp. 311 to 315. 1997 Shot Contibution Cyclostophic Balance in Suface Gavity Waves: Essay on Coiolis Effects KERN E. KENYON 4632 Noth Lane Del Ma, CA 92014-4134, U.S.A. (Received

More information

Supply Chain Risk Exposure Evaluation Network

Supply Chain Risk Exposure Evaluation Network Supply Chain Risk Exposue Evaluation Netwok SCREEN United Kingdom Cago Theft Repot Q1 2018 Table of Contents Intoduction... 4 Nationwide Tends... 4 Nottinghamshie.... 8 Aeas of Concen... 8 Methods and

More information

POSSIBLE AND REAL POWERFLOWS IN CONNECTED DIFFERENTIAL GEAR DRIVES WITH η 0 <i pq <1/η 0 INNER RATIO

POSSIBLE AND REAL POWERFLOWS IN CONNECTED DIFFERENTIAL GEAR DRIVES WITH η 0 <i pq <1/η 0 INNER RATIO 5th INTERNATIONAL MEETING OF TE CARPATIAN REGION SPECIALISTS IN TE FIEL OF GEARS POSSIBLE AN REAL POWERFLOWS IN CONNECTE IFFERENTIAL GEAR RIVES WIT η 0

More information

READING AREA TRANSPORTATION STUDY BICYCLE AND PEDESTRIAN TRANSPORTATION PLAN ADOPTED NOVEMBER 18, 2010

READING AREA TRANSPORTATION STUDY BICYCLE AND PEDESTRIAN TRANSPORTATION PLAN ADOPTED NOVEMBER 18, 2010 READING AREA TRANSPORTATION STUDY BICYCLE AND PEDESTRIAN TRANSPORTATION PLAN ADOPTED NOVEMBER 18, 2010 READING AREA TRANSPORTATION STUDY C/o Beks County Planning Commission 633 Cout St. FL 14 Reading,

More information

Session 6. Global Imbalances. Growth. Macroeconomics in the Global Economy. Saving and Investment: The World Economy

Session 6. Global Imbalances. Growth. Macroeconomics in the Global Economy. Saving and Investment: The World Economy Session 6. Global Imbalances. Gowth. v, and the Real Inteest Rate v Global Imbalances v Gowth v Intoduction to exchange ates and : The Wold Economy The eal inteest ate is the pice that equilibates saving

More information

PlacesForBikes City Ratings Methodology. Overall City Rating

PlacesForBikes City Ratings Methodology. Overall City Rating 1 PlacesFoBikes City Ratings Methodology Oveall City Rating The PlacesFoBikes City Rating Scoe is based on five factos: Rideship, Safety, Netwok, Acceleation, and Reach. Each facto is scoed on a one to

More information

Range Extension Control System for Electric Vehicles Based on Front and Rear Driving Force Distribution Considering Load Transfer

Range Extension Control System for Electric Vehicles Based on Front and Rear Driving Force Distribution Considering Load Transfer Range Extension Contol System fo Electic Vehicles Based on and Diving Foce Distibution Consideing Load Tansfe Sho Egami and Hioshi Fujimoto The Univesity of Tokyo 5--5, Kashiwanoha, Kashiwa, Chiba, 227-856

More information

Data Sheet. Linear bearings

Data Sheet. Linear bearings Data Pack G Issued Septembe 1999 1502325042 Data Sheet Linea beaings Instument ball beaings and shafts The RS ange of instument quality ball bushing beaings ae fo 1 8in, 3 16in and 1 4in shafts. Each beaing

More information

f i r e - p a r t s. c o m

f i r e - p a r t s. c o m A M E R I C A N F L A M E A F AF-1000 Seies Manual Gas Contol Valve APPLICATION The AF-1000 Manual Gas Contol Valve is designed fo use in gas in heath poducts, wall mount funaces, and space heating appliances.

More information

High Axial Load Capacity, High speed, Long life. Spherical Roller Bearings

High Axial Load Capacity, High speed, Long life. Spherical Roller Bearings High Axial Load Capacity, High speed, Long life Spheical Rolle eaings Spheical Rolle eaings High axial esistance load pefomance Intenal specifications have been optimized to geatly impove axial esistance

More information

I. FORMULATION. Here, p i is the pressure in the bubble, assumed spatially uniform,

I. FORMULATION. Here, p i is the pressure in the bubble, assumed spatially uniform, The natual fequency of oscillation of gas bubbles in tubes H. N. Og uz and A. Pospeetti Depatment of Mechanical Engineeing, The Johns Hopkins Univesity, Baltimoe, Mayland 21218 Received 28 July 1997; accepted

More information

DETC A NEW MODEL FOR WIND FARM LAYOUT OPTIMIZATION WITH LANDOWNER DECISIONS

DETC A NEW MODEL FOR WIND FARM LAYOUT OPTIMIZATION WITH LANDOWNER DECISIONS Poceedings of the ASME Intenational Design Engineeing Technical Confeences& Computes and Infomation in Engineeing Confeence IDETC/CIE August 8-3,, Washington, DC, USA DETC-4777 A NEW MODEL FOR WIND FARM

More information

Trends in Cycling, Walking & Injury Rates in New Zealand

Trends in Cycling, Walking & Injury Rates in New Zealand Tends in Cycling, Walking & Injuy Rates in New Zealand Walking and cycling, minutes/week SUMMAR Estimates of walking and cycling fom 9 Household Tavel suveys in New Zealand, conducted etween 1989 and 2012,

More information

Faster Nearest Neighbors: Voronoi Diagrams and k-d Trees

Faster Nearest Neighbors: Voronoi Diagrams and k-d Trees 154 25 Jonathan Richad Shewchuk Faste Neaest Neighbos: Voonoi Diagams and k-d Tees SPEEDING UP NEAREST NEIGHBOR CLASSIFIERS Can we pepocess taining pts to obtain sublinea quey time? 2 5 dimensions: Voonoi

More information

VIBRATION INDUCED DROPLET GENERATION FROM A LIQUID LAYER FOR EVAPORATIVE COOLING IN A HEAT TRANSFER CELL. A Thesis Presented to The Academic Faculty

VIBRATION INDUCED DROPLET GENERATION FROM A LIQUID LAYER FOR EVAPORATIVE COOLING IN A HEAT TRANSFER CELL. A Thesis Presented to The Academic Faculty VIBRATION INDUCED DROPLET GENERATION FROM A LIQUID LAYER FOR EVAPORATIVE COOLING IN A HEAT TRANSFER CELL A Thesis Pesented to The Academic Faculty By Fank Pytle III. In Patial Fulfillment Of the Requiements

More information

Asteroid body-fixed hovering using nonideal solar sails

Asteroid body-fixed hovering using nonideal solar sails Reseach in Aston. Astophys. 4 Vol. X No. XX, http://www.aa-jounal.og http://www.iop.og/jounals/aa Reseach in Astonomy and Astophysics Asteoid body-fixed hoveing using nonideal sola sails Xiang-yuan Zeng,

More information

0ur Ref:CL/Mech/ Cal /BID-01(11-12) Date: 29 July 2011

0ur Ref:CL/Mech/ Cal /BID-01(11-12) Date: 29 July 2011 0u Ref:CL/Mech/ Cal /BID-01(11-12) Date: 29 July 2011 SUBJECT: PROCUREMENT OF CALIBRATION SERVICES FOR THE EQUIPMENTS IN Cental Laboatoy (Mechanical) Dea Sis, Technical & Commecial s ae invited fo the

More information

TLV493D-A1B6 3D Magnetic Sensor

TLV493D-A1B6 3D Magnetic Sensor Low Powe with I 2 C Inteface Use Manual Aout this document Scope and pupose This document povides poduct infomation and desciptions egading: Functional desciption Calculation of the magnetic flux and tempeatues

More information

PREDICTION OF ELECTRICAL PRODUCTION FROM WIND ENERGY IN THE MOROCCAN SOUTH

PREDICTION OF ELECTRICAL PRODUCTION FROM WIND ENERGY IN THE MOROCCAN SOUTH OL., NO., FEBRUARY 7 ISSN 89-668 REDICTION OF ELECTRICAL RODUCTION FROM WIND ENERGY IN THE MOROCCAN SOUTH Elyaqouti Mustapha, Ezzaidi Asma, Bouhouch Lahoussine and Ihlal Ahmed ERTAIER, ESTA, Univesity

More information

THE performance disparity between processor speed and the

THE performance disparity between processor speed and the This aticle has been accepted fo publication in a futue issue of this jounal, but has not been fully edited. Content may change pio to final publication., VOL. X, NO. X, MONTH X Matix Stipe Cache-Based

More information

A Method of Hand Contour Tracking based on GVF, Corner and Optical flow Ke Du1, a, Ying Shi1,b, Jie Chen2,c, MingJun Sun1, Jie Chen1, ShuHai Quan1

A Method of Hand Contour Tracking based on GVF, Corner and Optical flow Ke Du1, a, Ying Shi1,b, Jie Chen2,c, MingJun Sun1, Jie Chen1, ShuHai Quan1 2nd Intenational Confeence on Machiney, Mateials Engineeing, Chemical Engineeing and Biotechnology (MMECEB 2015) A Method of Hand Contou Tacking based on GVF, Cone and Optical flow Ke Du1, a, Ying Shi1,b,

More information

Electrical Equipment of Machine Tools

Electrical Equipment of Machine Tools Electical Equipment of achine Tools Electification in machine tools today is vey extensive because it helps to simplify thei constuction, educe thei weight, and develop automatic contol. any advanced tends

More information

Bicycle and Pedestrian Master Plan

Bicycle and Pedestrian Master Plan Falmouth, Maine Bicycle and Pedestian Maste Plan Januay, 2003 Pepaed by The Falmouth Tails Advisoy Committee Tom Williams, Chai Daeby Amble Elizabeth Ehenfeld John Locke William Lund William Robinson Robet

More information

RELATED RATE WORD PROBLEMS

RELATED RATE WORD PROBLEMS Mat RELATED RATE WORD PROBLEMS Sock. A stone town into a pon pouces a cicula ipple tat epans fom te point of impact. If te aius of te ipple inceases at a ate of.5 ft/sec ow fast is te aea gowing wen te

More information

ELECTRICAL INSTALLATION CERTIFICATE [BS 7671:2008 as amended] Details of of the the Installation. For Design. For Construction

ELECTRICAL INSTALLATION CERTIFICATE [BS 7671:2008 as amended] Details of of the the Installation. For Design. For Construction ELECTRICL INSTLLTION CERTIFICTE [BS 7671:008 as amended] Details of of the the Client Clien Client/ Details of of the the Installation : Extent of the stallation coveed by this cetificate The stallation

More information

RESOLUTION No A RESOLUTION OF THE CITY OF SALISBURY, MARYLAND AUTHORIZING THE MAYOR TO ENTER INTO AN AGREEMENT BETWEEN THE CITY OF

RESOLUTION No A RESOLUTION OF THE CITY OF SALISBURY, MARYLAND AUTHORIZING THE MAYOR TO ENTER INTO AN AGREEMENT BETWEEN THE CITY OF li RESOLUTION No. 2749 A RESOLUTION OF THE CITY OF SALISBURY, MARYLAND AUTHORIZING THE MAYOR TO ENTER INTO AN AGREEMENT BETWEEN THE CITY OF SALISBURY, MARYLAND AND WICOMICO COUNTY, MARYLAND FOR THE DELIVERY

More information

How can you compare lengths between the customary and metric systems? 6 ft. ACTIVITY: Customary Measure History

How can you compare lengths between the customary and metric systems? 6 ft. ACTIVITY: Customary Measure History 5.7 Converting Measures How can you compare lengts between te customary and metric systems? yd 6 ft ACTIVITY: Customary Measure History COMMON CORE Converting Measures In tis lesson, you will use conversion

More information

MODEL 1000S DIGITAL TANK GAUGE

MODEL 1000S DIGITAL TANK GAUGE MODEL 1000S DIGITAL TANK GAUGE Installation Guide and Manual REVISION 5.0.0 2016 Resouce Poduction Co. Inc. 700 South Tucke Avenue Famington, NM 87401 1.800.382.1482 www.advancedtelemetics.net Advanced

More information

Theoretical and Experimental Study of Gas Bubbles Behavior

Theoretical and Experimental Study of Gas Bubbles Behavior Theoetical and Expeimental Study of Gas Bubbles Behavio Lucian Mândea, Gabiela Opina, aeș-andei Chihaia, Lucia-Andeea El-Leathey, and adu Miea Abstact The pape pesents theoetical consideations on gas bubbles

More information

Torque. Physics 2. Prepared by Vince Zaccone For Campus Learning Assistance Services at UCSB

Torque. Physics 2. Prepared by Vince Zaccone For Campus Learning Assistance Services at UCSB Toque Physics Toque Toque is what causes angula acceleation (just like a foce causes linea acceleation) Toque Toque is what causes angula acceleation (just like a foce causes linea acceleation) Fo a toque

More information

APPLICATION TO HOST A TOURNAMENT OR GAMES

APPLICATION TO HOST A TOURNAMENT OR GAMES Please Type or Print Clearly - Do Not Staple A Proud Member of US Soccer Affiliated wit te Federation International de Football Association APPLICATION TO OST A TOURNAMENT OR GAMES Name of Tournament or

More information

Example. The information set is represented by the dashed line.

Example. The information set is represented by the dashed line. Ou ast equiibium concet The ast equiibium concet we study afte Nash eqm, Subgame Pefect Nash eqm, and Bayesian Nash eqm is Pefect Bayesian Equiibium. Pefect efes to the fact that the game wi be dynamic,

More information

North Tahoe Division Projects & Assessments AUGUST 2015

North Tahoe Division Projects & Assessments AUGUST 2015 1 Noth Tahoe Division Pojects & Assessments C A L I F O R N I A AUGUST 215 Noth tahoe DivisioN Pojects & assessments Page 2 Fie Adapted Community Assessment WhAT Is The FIRe ADAPTeD COmmuNITy Assessme

More information

Providing solutions for your most demanding applications

Providing solutions for your most demanding applications Aeoquip Hose Assembly Maste Catalog Poviding solutions fo you most demanding applications Teflon hose Eveflex smooth boe S-Seies... -3 SC-Seies.... -4 S-TW Seies.... -5 SC-TW Seies.... -6 HI-PSI Seies...

More information

Fundamental Algorithms for System Modeling, Analysis, and Optimization

Fundamental Algorithms for System Modeling, Analysis, and Optimization Fundamental Algoithms fo System Modeling, Analysis, and Optimization Edwad A. Lee, Jaijeet Roychowdhuy, Sanjit A. Seshia UC Bekeley EECS 44/44 Fall With thanks to R. K. Bayton, K. Keutze, N. Shenoy, and

More information

APPLICATION TO HOST A TOURNAMENT OR GAMES

APPLICATION TO HOST A TOURNAMENT OR GAMES Please Type or Print Clearly - Do Not Staple A Proud Member of US Soccer Affiliated wit te Federation International de Football Association APPLICATION TO OST A TOURNAMENT OR GAMES Name of Tournament or

More information

STUDY OF IRREGULAR WAVE-CURRENT-MUD INTERACTION

STUDY OF IRREGULAR WAVE-CURRENT-MUD INTERACTION STUDY OF IRREGULAR WAVE-CURRENT-MUD INTERACTION Mohsen Soltanpou, Fazin Samsami, Tomoya Shibayama 3 and Sho Yamao The dissipation of egula and iegula waves on a muddy bed with the existence of following

More information

Experiment #10 Bio-Physics Pre-lab Comments, Thoughts and Suggestions

Experiment #10 Bio-Physics Pre-lab Comments, Thoughts and Suggestions Expeient #10 Bio-Physics Pe-lab Coents, Thoughts and Suggestions The pupose of this pape is to povide you with soe infoation which ay be useful fo solving the pe-lab questions and pefoing the lab. I will

More information

DECO THEORY - BUBBLE MODELS

DECO THEORY - BUBBLE MODELS DECO THEORY - BUBBLE MODELS This page descibes pinciples and theoies about bubble geneation and bubble gowth in the scuba dives body and about the effect of bubble fomation on decompession and decompession

More information

APPLICATION TO HOST A TOURNAMENT OR GAMES

APPLICATION TO HOST A TOURNAMENT OR GAMES Please Type or Print Clearly - Do Not Staple A Proud Member of US Soccer Affiliated wit te Federation International de Football Association APPLICATION TO OST A TOURNAMENT OR GAMES Name of Tournament or

More information

DYNAMICS OF WATER WAVES OVER FRINGING CORAL REEFS

DYNAMICS OF WATER WAVES OVER FRINGING CORAL REEFS DYNAMICS OF WATER WAVES OVER FRINGING CORAL REEFS DYNAMICS OF WATER WAVES OVER FRINGING CORAL REEFS YAO YU 1 YAO YU SCHOOL OF CIVIL AND ENVIRONMENTAL ENGINEERING 1 Dynamics of Wate Waves ove Finging Coal

More information

Experiment #10 Bio-Physics Pre-lab Questions

Experiment #10 Bio-Physics Pre-lab Questions Expeient #10 Bio-Physics Pe-lab Questions ** Disclaie: This pe-lab is not to be copied, in whole o in pat, unless a pope efeence is ade as to the souce. (It is stongly ecoended that you use this docuent

More information

{Recall that 88 ft = 60 mi so 88 ft x h = 1 s h s 60 mi General Atomics Sciences Education Foundation All rights reserved.

{Recall that 88 ft = 60 mi so 88 ft x h = 1 s h s 60 mi General Atomics Sciences Education Foundation All rights reserved. Simulation Tool Development 1. a. Develop a scale model car tat sows te distance traveled in 1 s at speeds from 10 to 70 mp in increments of 10 mp. Use a scale of 1 in = 100 ft. Include a marker on eac

More information

A Physical Prototype of an Automotive Magnetorheological Differential

A Physical Prototype of an Automotive Magnetorheological Differential oceedings of the Wold Congess on Engineeing 013 ol III, WCE 013, July 3-5, 013, London, U.K. hysical ototype of an utomotive agnetoheological Diffeential. Lanzotti, F. Renno,. Russo, R. Russo,. ezo bstact

More information