Notes

Algorithm

AVL tree AVL tree of height h has at most (n = 2^h – 1) and at least (n = F_{h+2}\geq \Omega(\Phi^h)) where (F_i) is (i)-th Fibonacci number and (\Phi = \frac{1 + \sqrt{5}}{2}). Note that ((T_{h+1} + 1) = (T_{h} + 1) + (T_{h-1} + 1) = F_{h+3}). Algorithm Definition…

Internet security final

[Paper] Bot hunter 내부 네트웍의 모든 트래픽을 감시하는 IDS를 두고 아래와 같은 봇 모델에 맞는 behavior를 검색함 Scan을 찾는 모듈 (SCADE)로  e1과 e5를 찾음 Payload를 보는 모듈 (SLADE)로 e2를 찾음 Signature engine으로 e2, e3, e4를 찾음 [Paper] BotMiner Protocol- and structure-independent botnet detection Key idea: horizontal correlation C-plane clustering: BPS,…

ISS539 Midterm

  Worm Virus v.s. Worm (Self-spreading) Worm history Morris worm Infected 6000 computers, 90% of them are not connected to the internet Code Red worm Attack web servers (buffer overflow) Epidemic Model Basic model Susceptible –> Removed Kermack-McKendric model Susceptible –> Infectious –> Removed Network Intrusion Delivering malicious payload Buffer…

Mon 09/22 (week 4) Controller Scalability

SDN experiment는 mininet으로 할 수 있다.  참고: Mininet installation guide video Controller는 5가지 challenge를 가진다. generality, …(!!) 쪼끄만 네트웍에서는 centralized controller가 잘 먹히지만 커지면 문제가 생긴다. 와.. 상욱이형 슬라이드 잘 만들었다. Onix가 production quality로 implement 되어있었구나. evaluation controller capacity latency from dissemination mechanisms latency from ??? Onix can support 1M hosts…