I
nte
rna
t
io
na
l J
o
urna
l o
f
I
nfo
rm
a
t
ics a
nd
Co
m
m
un
ica
t
io
n T
ec
hn
o
lo
g
y
(
I
J
-
I
CT
)
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
20
2
6
,
p
p
.
31
3
~
32
2
I
SS
N:
2252
-
8
7
7
6
,
DOI
:
1
0
.
1
1
5
9
1
/iji
ct
.
v
1
5
i
1
.
pp
31
3
-
32
2
313
J
o
ur
na
l ho
m
ep
a
g
e
:
h
ttp
:
//ij
ict.
ia
esco
r
e.
co
m
Dy
na
mic
mo
nitor
ing
f
o
r enhanci
ng
Q
o
S and
securi
ty in
distribut
ed sy
ste
ms
Su
dh
a
k
a
r
P
er
iy
a
s
a
my
1
,
Vij
a
y
a
la
k
s
hm
i A
la
g
a
rsa
my
2
,
P
a
l
a
ni L
a
t
ha
3
,
K
a
rupp
ia
h T
a
m
ila
ra
s
i
3
,
T
henm
o
zhi El
um
a
la
i
3
,
P
ra
bu
K
a
liy
a
perum
a
l
1
1
S
c
h
o
o
l
o
f
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
a
n
d
E
n
g
i
n
e
e
r
i
n
g
,
G
a
l
g
o
t
i
a
s U
n
i
v
e
r
si
t
y
,
D
e
l
h
i
N
C
R
,
I
n
d
i
a
2
D
e
p
a
r
t
me
n
t
o
f
C
o
m
p
u
t
e
r
S
c
i
e
n
c
e
a
n
d
E
n
g
i
n
e
e
r
i
n
g
,
C
h
e
n
n
a
i
I
n
st
i
t
u
t
e
o
f
T
e
c
h
n
o
l
o
g
y
,
C
h
e
n
n
a
i
,
I
n
d
i
a
3
D
e
p
a
r
t
me
n
t
o
f
I
n
f
o
r
mat
i
o
n
Te
c
h
n
o
l
o
g
y
,
P
a
n
i
mal
a
r
E
n
g
i
n
e
e
r
i
n
g
C
o
l
l
e
g
e
,
C
h
e
n
n
a
i
,
I
n
d
i
a
Art
icle
I
nfo
AB
S
T
RAC
T
A
r
ticle
his
to
r
y:
R
ec
eiv
ed
Dec
2
6
,
2
0
2
4
R
ev
is
ed
J
u
l 3
,
2
0
2
5
Acc
ep
ted
Oct
7
,
2
0
2
5
Distrib
u
te
d
sy
ste
m
s
a
re
in
teg
ra
l
t
o
m
o
d
e
r
n
d
i
g
it
a
l
i
n
fra
stru
c
t
u
re
,
s
u
p
p
o
rti
n
g
c
o
m
m
u
n
ica
ti
o
n
a
n
d
d
a
ta
e
x
c
h
a
n
g
e
a
c
ro
ss
v
a
rio
u
s
se
c
to
rs.
E
n
su
ri
n
g
se
c
u
rit
y
wh
il
e
m
a
in
tain
in
g
q
u
a
li
ty
o
f
se
rv
ice
(Qo
S
)
in
su
c
h
e
n
v
ir
o
n
m
e
n
ts
p
re
se
n
ts
a
sig
n
ifi
c
a
n
t
c
h
a
ll
e
n
g
e
.
Th
is
s
t
u
d
y
in
tro
d
u
c
e
s
a
d
y
n
a
m
ic
n
e
two
r
k
m
o
n
it
o
r
in
g
sy
ste
m
(DN
M
S
)
th
a
t
i
n
c
o
r
p
o
ra
t
e
s
a
d
a
p
ti
v
e
m
o
n
it
o
r
in
g
m
e
c
h
a
n
ism
s
a
n
d
d
y
n
a
m
ic
se
c
u
rit
y
m
e
tri
c
s
to
sa
fe
g
u
a
rd
d
istr
ib
u
ted
sy
ste
m
s.
Th
e
p
ro
p
o
se
d
a
rc
h
it
e
c
tu
re
u
ti
li
z
e
s
a
n
e
v
e
n
t
a
n
a
ly
z
e
r
(EA)
t
o
e
v
a
l
u
a
te
a
n
d
c
las
sify
sy
ste
m
e
v
e
n
ts
b
a
se
d
o
n
c
rit
ica
li
ty
,
e
n
a
b
li
n
g
se
c
u
re
tran
sm
issio
n
d
e
c
i
sio
n
s
a
n
d
e
fficie
n
t
th
re
a
t
d
e
tec
ti
o
n
.
Ex
p
e
ri
m
e
n
tal
e
v
a
lu
a
ti
o
n
s
d
e
m
o
n
stra
te
t
h
e
DN
M
S
a
c
h
iev
e
s
a
lo
w
p
r
o
c
e
ss
in
g
o
v
e
rh
e
a
d
o
f
1
2
%
,
su
p
p
o
rts
a
h
i
g
h
d
a
ta
h
a
n
d
li
n
g
c
a
p
a
c
it
y
o
f
5
,
0
0
0
re
q
u
e
sts
p
e
r
s
e
c
o
n
d
,
a
n
d
m
a
in
tai
n
s
a
late
n
c
y
o
f
ju
st
1
5
0
m
il
li
se
c
o
n
d
s.
Ad
d
it
i
o
n
a
ll
y
,
i
t
e
n
su
re
s
stro
n
g
c
o
m
p
l
ian
c
e
with
re
g
u
lato
r
y
sta
n
d
a
rd
s
-
a
c
h
iev
i
n
g
9
5
%
a
li
g
n
m
e
n
t
with
G
DPR
a
n
d
9
7
%
wit
h
I
S
O
2
7
0
0
1
-
a
n
d
h
ig
h
th
re
a
t
d
e
tec
ti
o
n
a
c
c
u
ra
c
y
,
wit
h
9
8
%
f
o
r
p
h
is
h
in
g
,
9
4
%
fo
r
m
a
lwa
r
e
,
a
n
d
9
6
%
fo
r
i
n
sid
e
r
t
h
re
a
ts.
Th
e
se
re
su
lt
s
c
o
n
firm
th
e
fra
m
e
wo
rk
’
s
e
ffe
c
ti
v
e
n
e
ss
in
e
n
h
a
n
c
i
n
g
a
d
a
p
ti
v
e
se
c
u
rit
y
,
o
ffe
rin
g
sc
a
lab
le
a
n
d
re
g
u
latio
n
-
c
o
m
p
l
ian
t
s
o
lu
t
io
n
s fo
r
c
o
m
p
lex
d
istri
b
u
ted
e
n
v
iro
n
m
e
n
ts.
K
ey
w
o
r
d
s
:
Ad
ap
tin
g
d
is
tr
ib
u
te
d
s
y
s
tem
Ad
ap
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
Ad
ap
tiv
e
s
ec
u
r
ity
C
lo
u
d
s
ec
u
r
ity
Dy
n
am
ic
s
ec
u
r
ity
T
h
is i
s
a
n
o
p
e
n
a
c
c
e
ss
a
rticle
u
n
d
e
r th
e
CC B
Y
-
SA
li
c
e
n
se
.
C
o
r
r
e
s
p
o
nd
ing
A
uth
o
r
:
Pra
b
u
Kaliy
ap
er
u
m
al
Sch
o
o
l o
f
C
o
m
p
u
ter
Scien
ce
a
n
d
E
n
g
in
ee
r
in
g
,
Galg
o
tias
Un
i
v
er
s
ity
2
0
1
3
1
0
Delh
i N
C
R
,
I
n
d
ia
E
m
ail: m
eg
a.
p
r
a
b
u
@
g
m
ail.
co
m
1.
I
NT
RO
D
UCT
I
O
N
T
h
e
in
cr
ea
s
in
g
r
elian
ce
o
n
d
i
s
tr
ib
u
ted
s
y
s
tem
s
in
th
e
m
o
d
er
n
in
f
o
r
m
atio
n
s
o
ciety
u
n
d
er
s
co
r
es
th
e
n
ee
d
f
o
r
ef
f
ec
tiv
e
m
o
n
ito
r
in
g
ap
p
r
o
ac
h
es
to
o
f
f
er
ad
ap
ti
v
e
s
ec
u
r
ity
[
1
]
,
[
2
]
.
T
h
ese
s
y
s
tem
s
s
er
v
e
as
th
e
b
ac
k
b
o
n
e
o
f
in
f
o
r
m
atio
n
ex
c
h
an
g
e
ac
r
o
s
s
v
a
r
io
u
s
s
ec
to
r
s
,
r
eq
u
ir
in
g
r
o
b
u
s
t
s
ec
u
r
ity
m
e
asu
r
es
d
u
e
to
th
eir
co
m
p
lex
ity
an
d
d
y
n
am
ic
n
at
u
r
e.
Ad
a
p
tiv
e
s
ec
u
r
ity
en
a
b
l
es
s
y
s
tem
s
to
ad
ju
s
t
p
r
o
ce
d
u
r
es
d
y
n
a
m
ically
in
r
esp
o
n
s
e
to
en
v
ir
o
n
m
en
tal
ch
an
g
es,
en
s
u
r
in
g
a
b
ala
n
ce
b
e
twee
n
co
m
p
r
e
h
en
s
iv
e
d
ata
c
o
llectio
n
,
in
teg
r
ity
,
an
d
th
r
ea
t
m
itig
atio
n
[
3
]
,
[
4
]
.
T
h
is
s
tu
d
y
ex
p
lo
r
es
th
e
c
h
allen
g
es
o
f
m
o
n
ito
r
in
g
d
is
tr
ib
u
ted
s
y
s
tem
s
f
o
r
ad
ap
tiv
e
s
ec
u
r
ity
,
p
r
esen
tin
g
a
f
r
am
ewo
r
k
th
at
in
teg
r
ates
d
y
n
am
ic
s
ec
u
r
ity
m
etr
ics
with
ad
ap
tiv
e
m
o
n
ito
r
in
g
to
s
ec
u
r
e
s
en
s
itiv
e
d
ata
in
ev
o
lv
in
g
en
v
ir
o
n
m
en
ts
.
Dis
tr
ib
u
ted
s
y
s
tem
s
ar
e
v
ital
in
f
ac
ilit
at
in
g
co
m
m
u
n
icatio
n
an
d
in
f
o
r
m
at
io
n
ex
ch
a
n
g
e
ac
r
o
s
s
in
d
u
s
tr
ies,
lev
er
ag
in
g
d
ec
en
tr
alize
d
p
r
o
ce
s
s
in
g
an
d
s
to
r
ag
e
to
h
a
n
d
le
v
ast
d
ata
v
o
l
u
m
es
[
5
]
.
T
h
eir
s
ca
l
ab
ilit
y
en
h
a
n
ce
s
o
p
e
r
atio
n
al
ef
f
icien
cy
,
s
u
p
p
o
r
ts
r
ea
l
-
tim
e
co
llab
o
r
atio
n
,
a
n
d
d
r
iv
es
in
n
o
v
atio
n
.
I
n
ter
co
n
n
e
cted
p
latf
o
r
m
s
in
teg
r
ate
d
i
v
er
s
e
ap
p
licatio
n
s
,
e
n
ab
lin
g
s
ea
m
less
d
ata
ex
ch
a
n
g
e
wh
ile
en
s
u
r
in
g
cr
itical
s
er
v
ices
lik
e
clo
u
d
co
m
p
u
tin
g
an
d
e
-
co
m
m
er
ce
f
u
n
ctio
n
e
f
f
icien
tly
[
6
]
,
[
7
]
.
Ho
wev
er
,
th
ese
s
y
s
tem
s
f
ac
e
n
u
m
er
o
u
s
ch
allen
g
es.
C
o
m
p
lex
ity
ar
is
es
f
r
o
m
in
ter
co
n
n
ec
ted
co
m
p
o
n
en
ts
,
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
20
2
6
:
31
3
-
32
2
314
di
v
er
s
e
s
er
v
ices,
an
d
ev
o
lv
in
g
en
v
ir
o
n
m
e
n
ts
,
d
em
an
d
i
n
g
s
o
p
h
is
ticated
m
o
n
ito
r
in
g
an
d
m
an
a
g
em
en
t.
Hete
r
o
g
en
eity
in
tr
o
d
u
ce
s
co
m
p
atib
ilit
y
is
s
u
es
am
o
n
g
v
ar
io
u
s
h
ar
d
war
e
an
d
s
o
f
twar
e
[
8
]
,
wh
ile
s
ca
lab
ilit
y
r
eq
u
ir
es
m
ai
n
tain
in
g
p
er
f
o
r
m
an
ce
as
s
y
s
tem
s
ex
p
an
d
[
9
]
.
F
au
lt
to
ler
a
n
ce
is
c
r
u
cial
to
co
u
n
ter
h
ar
d
war
e
f
ailu
r
es,
n
etwo
r
k
d
is
r
u
p
tio
n
s
,
an
d
s
o
f
twar
e
er
r
o
r
s
.
E
n
s
u
r
i
n
g
d
ata
in
teg
r
ity
an
d
s
y
n
ch
r
o
n
iz
atio
n
ac
r
o
s
s
n
o
d
es
f
u
r
th
er
a
d
d
s
to
th
e
co
m
p
le
x
ity
,
n
ec
ess
itatin
g
ef
f
ec
tiv
e
p
r
o
to
co
ls
to
ad
d
r
ess
in
co
n
s
is
ten
cies
an
d
m
ain
tain
r
eliab
ilit
y
.
T
h
is
s
tu
d
y
aim
s
to
an
s
wer
th
e
r
esear
ch
q
u
esti
o
n
:
“
C
an
ad
ap
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
s
ef
f
ec
tiv
ely
en
h
an
ce
d
is
tr
ib
u
te
d
s
y
s
tem
s
ec
u
r
ity
wh
ile
m
ain
tain
in
g
Qo
S
th
r
o
u
g
h
d
y
n
am
ic
th
r
ea
t
ev
alu
atio
n
an
d
s
elec
tiv
e
d
ata
r
ep
o
r
tin
g
?”
.
B
u
ild
in
g
o
n
th
e
th
e
m
e
o
f
a
d
ap
tiv
e
s
ec
u
r
ity
,
T
o
m
ash
ev
s
k
y
et
a
l.
[
1
0
]
in
tr
o
d
u
ce
s
an
ad
a
p
tiv
e
r
eso
u
r
ce
allo
ca
tio
n
m
eth
o
d
f
o
r
clo
u
d
en
v
ir
o
n
m
en
ts
to
en
h
a
n
ce
b
o
t
h
d
ata
p
r
o
ce
s
s
in
g
an
d
s
ec
u
r
it
y
.
Usi
n
g
p
r
ed
ictiv
e
alg
o
r
ith
m
s
an
d
th
e
NSGA
-
I
I
o
p
tim
izatio
n
m
eth
o
d
,
it
f
o
r
e
ca
s
ts
r
eso
u
r
ce
d
e
m
an
d
s
an
d
allo
ca
tes
r
eso
u
r
ce
s
d
y
n
am
ically
.
I
m
p
r
o
v
em
e
n
ts
to
NSGA
-
I
I
r
ed
u
ce
o
p
tim
izatio
n
tim
e
b
y
5
%,
ac
h
iev
in
g
a
1
.
2
x
r
ed
u
ctio
n
in
r
eso
u
r
ce
lo
s
s
co
m
p
ar
ed
to
tr
a
d
itio
n
al
m
eth
o
d
s
.
W
h
ile
ef
f
ec
tiv
e
in
b
alan
cin
g
p
er
f
o
r
m
a
n
ce
an
d
co
n
f
i
d
en
tiality
,
lim
itatio
n
s
in
clu
d
e
co
m
p
u
tatio
n
al
o
v
er
h
e
ad
an
d
d
e
p
en
d
e
n
cy
o
n
ac
cu
r
ate
d
em
an
d
p
r
ed
ictio
n
s
.
Similar
ly
,
Ah
m
ad
et
a
l.
[
1
1
]
p
r
o
p
o
s
es
an
ad
ap
tiv
e
s
ec
u
r
ity
f
r
am
e
wo
r
k
f
o
r
m
o
b
ile
d
e
v
ices,
u
n
if
y
in
g
a
u
to
n
o
m
ic
co
m
p
u
tin
g
an
d
s
o
f
twar
e
s
ec
u
r
ity
to
p
r
o
tect
h
ar
d
war
e
an
d
s
o
f
twar
e
r
eso
u
r
ce
s
.
T
h
e
m
et
h
o
d
o
lo
g
y
em
p
lo
y
s
r
u
n
tim
e
m
o
n
ito
r
i
n
g
,
th
r
ea
t
d
etec
tio
n
,
an
d
d
y
n
am
ic
s
ec
u
r
i
ty
ad
ju
s
tm
en
ts
,
with
a
f
o
cu
s
o
n
u
s
er
d
ec
is
io
n
s
u
p
p
o
r
t.
E
v
alu
ated
u
s
in
g
I
SO/IE
C
9
1
2
6
m
etr
ics,
th
e
f
r
am
e
wo
r
k
ac
h
iev
ed
h
i
g
h
ac
cu
r
ac
y
(
8
6
.
2
8
%
p
r
ec
is
io
n
)
in
th
r
ea
t
d
etec
tio
n
a
n
d
e
f
f
icie
n
t
r
eso
u
r
ce
u
tili
za
tio
n
with
m
i
n
im
al
b
atter
y
(
0
.
4
%)
an
d
m
e
m
o
r
y
u
s
ag
e
(
2
0
MB
m
ax
)
.
L
im
itatio
n
s
in
cl
u
d
e
e
v
alu
atio
n
o
n
An
d
r
o
id
-
o
n
ly
p
la
tf
o
r
m
s
an
d
lim
ited
d
atasets
.
E
x
ten
d
in
g
ad
ap
tiv
e
s
ec
u
r
ity
m
ea
s
u
r
es
to
wir
eless
s
en
s
o
r
n
etwo
r
k
s
,
R
ep
etto
[
1
2
]
in
tr
o
d
u
ce
s
a
f
r
am
ewo
r
k
le
v
er
ag
in
g
cy
b
er
-
th
r
ea
t
in
tellig
en
ce
f
o
r
ad
a
p
tiv
e
m
o
n
ito
r
in
g
,
d
etec
tio
n
,
an
d
r
esp
o
n
s
e
in
d
ig
ital
s
er
v
ice
ch
ain
s
.
T
h
e
f
r
am
ewo
r
k
em
p
lo
y
s
s
ec
u
r
ity
o
r
ch
estra
ti
o
n
an
d
au
t
o
m
ated
r
esp
o
n
s
e
(
SOAR
)
to
co
m
b
in
e
w
o
r
k
f
l
o
ws
s
u
ch
as
th
r
ea
t
in
tellig
en
ce
,
in
cid
en
t
r
esp
o
n
s
e,
an
d
p
r
e
d
ictiv
e
an
aly
tics
,
ef
f
e
ctiv
ely
tack
lin
g
m
u
lti
-
s
tag
e
attac
k
s
.
MI
R
ANDA
ar
ch
itectu
r
e
f
ac
ilit
ates
p
r
o
ac
ti
v
e
th
r
ea
t
-
h
u
n
tin
g
an
d
a
d
ap
tiv
e
r
esp
o
n
s
es,
im
p
r
o
v
in
g
a
u
to
m
atio
n
an
d
d
ef
e
n
s
e
ag
ain
s
t
ad
v
an
ce
d
p
er
s
is
ten
t
th
r
ea
ts
.
C
h
allen
g
es
in
clu
d
e
d
ep
en
d
e
n
ce
o
n
p
r
o
p
r
ietar
y
i
n
ter
f
ac
es,
lim
ited
ad
ap
tab
ilit
y
to
th
r
ea
ts
,
an
d
in
ad
eq
u
ate
th
r
ea
t
-
h
u
n
tin
g
ca
p
a
b
ilit
ies.
I
n
th
e
co
n
tex
t
o
f
in
ter
n
et
o
f
th
in
g
s
(
I
o
T
)
h
ea
lth
ca
r
e
a
p
p
licatio
n
s
,
Mo
h
am
m
ed
et
a
l.
[
1
3
]
p
r
o
p
o
s
es
th
e
ad
ap
tiv
e
m
alwa
r
e
d
etec
ti
o
n
u
s
in
g
m
ac
h
in
e
lea
r
n
in
g
(
AM
DM
L
)
alg
o
r
ith
m
f
o
r
h
ea
lth
ca
r
e
I
o
T
ap
p
licatio
n
s
,
f
o
cu
s
in
g
o
n
p
o
ly
m
o
r
p
h
ic
an
d
m
etam
o
r
p
h
i
c
m
alwa
r
e
th
r
ea
ts
.
T
h
e
m
eth
o
d
o
lo
g
y
em
p
lo
y
s
f
ed
er
ated
lear
n
in
g
f
o
r
d
is
tr
ib
u
ted
m
alwa
r
e
d
etec
tio
n
ac
r
o
s
s
f
o
g
n
o
d
es
an
d
th
e
clo
u
d
,
o
p
tim
izin
g
r
u
n
tim
e
ad
a
p
tab
ilit
y
a
n
d
p
r
o
ce
s
s
in
g
lo
ad
.
R
esu
lts
s
h
o
w
AM
DM
L
o
u
tp
er
f
o
r
m
s
ce
n
tr
alize
d
m
ac
h
i
n
e
lear
n
i
n
g
m
o
d
els b
y
6
0
%
i
n
ac
cu
r
ac
y
an
d
r
ed
u
ce
s
d
elay
b
y
5
0
%.
L
im
itatio
n
s
in
clu
d
e
th
e
h
ig
h
co
s
t
an
d
c
o
m
p
lex
ity
o
f
d
etec
tin
g
u
n
k
n
o
wn
m
alwa
r
e
with
o
u
t
p
r
io
r
tr
a
in
in
g
.
Ham
ar
s
h
eh
[
1
]
in
tr
o
d
u
c
es
th
e
en
h
a
n
ce
d
SC
AFFOLD
f
r
am
ewo
r
k
,
lev
er
a
g
in
g
s
o
f
twar
e
-
d
ef
in
e
d
n
etwo
r
k
in
g
(
SDN)
an
d
m
ac
h
in
e
lear
n
in
g
f
o
r
I
o
T
s
e
cu
r
ity
.
T
h
e
m
eth
o
d
o
lo
g
y
co
m
b
in
es
s
ess
io
n
k
ey
en
cr
y
p
ti
o
n
,
r
ea
l
-
tim
e
tr
a
f
f
ic
m
o
n
ito
r
in
g
,
an
d
en
s
em
b
le
m
a
ch
in
e
-
lear
n
in
g
class
if
ier
s
(
r
an
d
o
m
f
o
r
est
(
RF
)
,
s
u
p
p
o
r
t
v
ec
t
o
r
m
ac
h
i
n
e
(
SVM
)
,
r
ec
u
r
r
en
t
n
e
u
r
al
n
etwo
r
k
(
R
N
N
)
)
to
d
etec
t
attac
k
s
lik
e
d
i
s
t
r
ib
u
ted
d
en
ial
o
f
s
er
v
ice
(
DD
o
S
)
an
d
s
p
o
o
f
in
g
.
Per
f
o
r
m
an
ce
s
im
u
latio
n
s
co
n
f
ir
m
r
eliab
le
th
r
ea
t
m
itig
a
tio
n
with
lo
w
laten
c
y
an
d
m
in
im
al
en
e
r
g
y
co
n
s
u
m
p
tio
n
.
T
h
e
f
r
am
ew
o
r
k
en
s
u
r
es
s
ec
u
r
e
co
m
m
u
n
icatio
n
,
r
ap
id
r
ea
u
th
en
ticatio
n
,
an
d
tar
g
eted
r
esp
o
n
s
es
to
an
o
m
alies.
Ho
wev
er
,
lim
i
tatio
n
s
in
clu
d
e
th
e
co
m
p
lex
i
ty
o
f
in
teg
r
atin
g
SDN
with
I
o
T
d
ev
ices
an
d
d
ep
en
d
e
n
cy
o
n
ac
cu
r
ate
m
ac
h
in
e
-
lear
n
in
g
m
o
d
els
f
o
r
ef
f
ica
cy
.
Fu
r
th
e
r
ad
d
r
ess
in
g
ad
a
p
tiv
e
s
ec
u
r
ity
,
a
s
tu
d
y
b
y
R
ash
id
et
a
l.
[
1
4
]
p
r
o
p
o
s
e
s
an
ad
a
p
tiv
e,
r
ea
l
-
tim
e
m
alic
io
u
s
n
o
d
e
d
etec
tio
n
f
r
am
ewo
r
k
f
o
r
v
e
h
icu
lar
ad
-
h
o
c
n
etwo
r
k
s
(
VANE
T
s
)
u
s
in
g
m
ac
h
in
e
lear
n
i
n
g
.
T
h
e
p
r
o
p
o
s
ed
s
y
s
tem
u
tili
ze
s
d
is
tr
ib
u
ted
m
u
lti
-
lay
er
class
if
icatio
n
,
t
ested
with
O
MN
E
T
++
an
d
SUMO
s
im
u
latio
n
s
,
to
d
etec
t
DDo
S
attac
k
s
.
Var
io
u
s
class
if
ier
s
,
in
clu
d
in
g
g
r
ad
ien
t
b
o
o
s
tin
g
tr
ee
(
GB
T
)
,
SVM,
an
d
R
F,
ac
h
iev
ed
u
p
to
9
9
%
ac
cu
r
ac
y
.
H
o
wev
er
,
lim
itatio
n
s
in
clu
d
e
ch
allen
g
es in
r
ea
l
-
tim
e
im
p
lem
en
tatio
n
a
n
d
ad
a
p
tab
ilit
y
to
d
iv
er
s
e
u
r
b
an
s
ce
n
ar
io
s
.
T
h
ese
s
tu
d
ies
co
llectiv
ely
h
ig
h
lig
h
t
th
e
im
p
o
r
tan
ce
o
f
ad
ap
tiv
e
s
ec
u
r
ity
m
ea
s
u
r
es
d
u
e
to
ev
o
lv
in
g
th
r
ea
ts
an
d
v
u
ln
e
r
ab
ilit
ies
in
d
is
tr
ib
u
ted
s
y
s
tem
s
.
T
h
ese
s
y
s
tem
s
r
eq
u
ir
e
r
ea
l
-
tim
e
id
en
tific
atio
n
an
d
m
itig
atio
n
o
f
r
is
k
s
,
f
lex
ib
ili
t
y
in
ac
ce
s
s
m
an
ag
em
en
t,
a
n
d
au
to
m
ate
d
in
cid
en
t
r
esp
o
n
s
e.
I
n
co
r
p
o
r
atin
g
ad
ap
tiv
e
s
ec
u
r
ity
en
s
u
r
es
th
e
p
r
o
tectio
n
o
f
d
ata,
r
eso
u
r
ce
s
,
an
d
s
er
v
ices
[
1
5
]
,
[
1
6
]
.
Ad
d
itio
n
ally
,
d
y
n
am
ic
m
o
n
ito
r
in
g
f
r
am
ewo
r
k
s
ar
e
p
iv
o
tal
f
o
r
m
ain
tain
in
g
th
e
p
er
f
o
r
m
a
n
ce
an
d
s
ec
u
r
i
ty
o
f
d
is
tr
ib
u
ted
s
y
s
tem
s
.
Ad
ap
tiv
e
m
o
n
ito
r
in
g
lev
er
a
g
es
in
tellig
en
t
alg
o
r
ith
m
s
an
d
d
ata
an
aly
tics
to
id
en
tify
an
o
m
alies,
ad
ju
s
t
p
r
io
r
ities
,
an
d
p
r
o
ac
tiv
ely
m
i
tig
ate
th
r
ea
ts
[
1
7
]
.
B
y
in
teg
r
atin
g
s
ea
m
less
ly
with
ex
is
t
in
g
p
r
o
to
c
o
ls
,
th
ese
s
y
s
tem
s
en
h
an
ce
r
es
ilien
ce
ag
ain
s
t
ev
o
lv
in
g
c
h
allen
g
es,
e
n
s
u
r
in
g
r
o
b
u
s
t
s
ec
u
r
ity
p
o
s
tu
r
es
an
d
o
p
e
r
atio
n
al
s
tab
ilit
y
.
T
h
e
d
y
n
am
ic
an
d
i
n
ter
co
n
n
ec
te
d
n
at
u
r
e
o
f
d
is
tr
ib
u
ted
s
y
s
tem
s
n
ec
ess
itates
ad
v
an
ce
d
m
o
n
ito
r
in
g
an
d
ad
a
p
tiv
e
s
ec
u
r
it
y
m
ea
s
u
r
es
to
ad
d
r
ess
in
h
er
en
t
ch
allen
g
es,
e
n
s
u
r
in
g
d
ata
in
teg
r
ity
,
f
au
lt
to
ler
an
ce
,
an
d
o
v
er
all
r
eliab
ilit
y
.
T
h
r
o
u
g
h
p
r
o
ac
tiv
e
s
tr
ateg
ies
an
d
in
tellig
en
t
f
r
am
ewo
r
k
s
,
d
is
tr
ib
u
ted
s
y
s
tem
s
ca
n
ac
h
iev
e
s
ec
u
r
e
an
d
ef
f
icien
t o
p
e
r
atio
n
s
in
a
r
ap
id
l
y
ev
o
l
v
in
g
d
ig
ital la
n
d
s
ca
p
e.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
Dyn
a
mic
mo
n
ito
r
in
g
fo
r
en
h
a
n
cin
g
Qo
S
a
n
d
s
ec
u
r
ity
in
d
is
tr
ib
u
ted
s
ystems
(
S
u
d
h
a
ka
r
P
e
r
iya
s
a
my
)
315
E
f
f
ec
tiv
e
m
o
n
it
o
r
in
g
in
v
o
lv
e
s
o
b
tain
in
g
in
f
o
r
m
atio
n
f
r
o
m
a
tar
g
et
p
r
o
g
r
a
m
d
u
r
in
g
r
u
n
tim
e
to
ad
ap
t
a
d
is
tr
ib
u
ted
s
y
s
tem
[
1
8
]
,
[
1
9
]
.
T
h
e
ad
ap
tatio
n
p
r
o
ce
s
s
in
clu
d
es
ch
an
g
e
d
etec
tio
n
,
ag
r
e
em
en
t,
an
d
ac
tio
n
,
in
itiated
b
y
m
o
n
ito
r
in
g
s
y
s
te
m
s
.
Mo
n
ito
r
in
g
u
s
es
an
ev
en
t
-
d
r
iv
en
e
x
ec
u
tio
n
p
ar
ad
i
g
m
,
wh
er
e
clien
ts
d
etec
t
ch
an
g
es
an
d
c
o
m
m
u
n
icate
ev
en
t
d
etails
f
o
r
ag
r
ee
m
en
t.
M
o
n
ito
r
in
g
n
o
d
es
attac
h
to
ad
d
r
e
s
s
,
d
ata,
an
d
co
n
tr
o
l
b
u
s
es
to
m
in
im
ize
d
is
r
u
p
tio
n
,
id
en
tif
y
in
g
ch
an
g
es
an
d
n
o
tify
in
g
th
e
ce
n
tr
al
s
y
s
tem
f
o
r
r
ec
o
n
f
ig
u
r
atio
n
.
T
h
e
h
y
b
r
i
d
m
o
n
ito
r
i
n
g
s
y
s
tem
u
s
es
m
em
o
r
y
-
m
ap
p
e
d
an
d
co
p
r
o
ce
s
s
o
r
m
o
n
ito
r
i
n
g
[
2
0
]
.
Me
m
o
r
y
-
m
a
p
p
ed
m
o
n
ito
r
in
g
ca
p
tu
r
es
d
ata
w
h
en
s
p
ec
if
ic
ad
d
r
ess
es
ar
e
r
ea
ch
ed
,
wh
ile
co
p
r
o
ce
s
s
o
r
m
o
n
ito
r
in
g
in
itiates
r
ec
o
r
d
in
g
v
ia
in
s
tr
u
ctio
n
s
[
2
1
]
.
Key
co
m
p
o
n
e
n
ts
in
clu
d
e
th
e
ev
en
t
r
ec
o
r
d
er
(
E
R
)
,
with
a
tr
ig
g
e
r
r
ec
o
g
n
ize
r
,
FIFO
b
u
f
f
er
,
tim
er
,
an
d
o
v
e
r
f
lo
w
co
u
n
ter
,
wh
ic
h
tr
ac
k
s
ev
en
ts
an
d
lo
g
s
ex
ec
u
tio
n
tim
e.
L
o
ca
l
clo
ck
s
s
y
n
ch
r
o
n
ize
with
th
e
ce
n
tr
al
s
y
s
tem
to
s
eq
u
en
ce
ev
en
ts
ac
cu
r
ately
.
T
o
s
ec
u
r
e
d
ata,
th
e
ar
ch
itectu
r
e
in
clu
d
es
an
ev
en
t a
n
aly
ze
r
(
E
A)
,
co
m
p
ar
ato
r
,
an
d
r
e
p
o
s
ito
r
y
(
R
)
.
T
h
e
E
A
ass
e
s
s
e
s
s
ec
u
r
ity
-
cr
itical
d
ata,
tr
an
s
m
itti
n
g
it
s
ec
u
r
ely
.
R
eg
u
lar
e
v
en
ts
ar
e
c
o
m
p
ar
ed
with
r
ep
o
s
ito
r
y
en
t
r
ies
to
id
en
tify
th
o
s
e
o
f
i
n
ter
est.
Mo
n
ito
r
in
g
at
th
e
p
r
o
ce
s
s
lev
el
is
o
lates
f
au
lts
a
n
d
r
ec
o
n
s
tr
u
cts
b
eh
av
io
r
f
o
r
d
eb
u
g
g
in
g
.
E
ac
h
lo
ca
l
s
y
s
tem
s
en
d
s
d
ata
to
th
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
v
ia
s
ep
ar
ate
n
etwo
r
k
s
to
r
ed
u
c
e
tr
af
f
ic.
T
h
is
in
teg
r
ated
m
o
n
ito
r
in
g
an
d
s
ec
u
r
ity
m
ea
s
u
r
es
en
ab
le
d
is
tr
ib
u
ted
s
y
s
tem
s
to
m
ain
tain
r
eliab
ilit
y
an
d
ef
f
icien
cy
i
n
a
r
a
p
id
l
y
ev
o
lv
in
g
d
ig
ital
lan
d
s
ca
p
e.
T
h
e
im
p
o
r
tan
ce
o
f
th
is
wo
r
k
lies
in
it
s
ab
ilit
y
to
d
y
n
am
ically
ass
es
s
an
d
ad
ap
t
s
ec
u
r
ity
m
ea
s
u
r
es
in
r
ea
l
tim
e,
r
ed
u
ci
n
g
r
eso
u
r
ce
o
v
er
h
ea
d
wh
ile
en
s
u
r
in
g
d
ata
p
r
o
tectio
n
.
Un
lik
e
tr
a
d
itio
n
a
l
s
y
s
tem
s
,
DNM
S
u
n
iq
u
ely
in
t
eg
r
ates
s
ec
u
r
ity
-
cr
itical
ev
en
t
an
aly
s
is
with
d
y
n
am
ic
c
o
m
p
lian
ce
m
etr
ics,
allo
win
g
r
ea
l
-
tim
e
d
ec
is
io
n
s
o
n
s
ec
u
r
e
co
m
m
u
n
i
ca
tio
n
.
T
h
is
f
u
s
io
n
o
f
ad
ap
tab
ilit
y
,
in
tellig
en
ce
,
an
d
co
m
p
li
an
ce
co
n
s
titu
tes
th
e
co
r
e
n
o
v
elty
o
f
o
u
r
co
n
t
r
ib
u
tio
n
.
2.
RE
S
E
ARCH
M
E
T
H
O
D
Th
e
m
o
n
ito
r
in
g
ar
ch
itectu
r
e
o
f
th
e
d
is
tr
ib
u
ted
m
o
n
ito
r
in
g
s
y
s
tem
h
as
b
ee
n
e
n
tire
ly
r
e
v
is
ed
in
o
r
d
er
to
m
ain
tain
a
d
ap
tab
ilit
y
w
h
ile
p
r
o
tectin
g
th
e
m
o
n
ito
r
in
g
s
y
s
tem
an
d
i
n
f
o
r
m
atio
n
f
lo
w
b
etwe
en
th
e
tar
g
et
d
is
tr
ib
u
ted
m
o
n
ito
r
e
d
s
y
s
tem
an
d
t
h
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
.
T
h
is
is
i
n
d
icate
d
b
y
R
as
s
h
o
wn
in
Fig
u
r
e
1
,
wh
ich
illu
s
tr
ates
th
at
d
ata
is
p
r
o
ce
s
s
ed
f
o
r
s
ec
u
r
ity
-
cr
itical
i
n
f
o
r
m
atio
n
b
e
f
o
r
e
b
ein
g
d
eliv
er
ed
v
ia
t
h
e
E
A
to
th
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
.
T
h
is
co
m
p
els
u
s
to
v
er
i
f
y
i
f
t
h
e
ev
e
n
ts
g
en
er
ate
d
with
in
t
h
e
tar
g
et
s
y
s
tem
a
r
e,
in
f
ac
t,
n
o
tewo
r
th
y
o
cc
u
r
r
e
n
ce
s
.
C
o
n
s
eq
u
en
tly
,
th
e
ev
e
n
t
d
etec
ted
b
y
th
e
lo
ca
l
m
o
n
ito
r
in
g
s
y
s
tem
is
co
m
p
ar
ed
to
t
h
e
s
tan
d
ar
d
e
v
en
ts
th
at
th
e
s
y
s
tem
p
r
o
d
u
c
es
to
g
u
a
r
an
tee
o
p
tim
al
o
p
e
r
atio
n
.
I
n
o
r
d
er
to
ac
co
m
p
lis
h
th
is
,
a
r
ep
o
s
ito
r
y
(
R
)
co
n
tain
in
g
ev
e
n
ts
g
en
er
ated
b
y
a
wo
r
k
i
n
g
s
y
s
tem
m
u
s
t
b
e
m
ain
tain
ed
.
T
h
er
ef
o
r
e,
af
ter
r
ec
eiv
in
g
an
in
p
u
t
(
an
ev
en
t
d
etec
ted
)
f
r
o
m
th
e
tr
ig
g
er
r
ec
o
g
n
izer
an
d
d
ata
co
llecto
r
co
m
p
o
n
en
ts
o
f
th
e
E
R
o
f
th
e
l
o
ca
l
m
o
n
ito
r
in
g
s
y
s
tem
,
th
e
E
A
co
m
p
o
n
en
t
u
tili
ze
s
th
e
l
o
ca
l
s
ec
u
r
ity
m
etr
ics
to
ass
es
s
if
an
ev
en
t
is
s
ec
u
r
ity
-
cr
itical.
W
e
n
am
e
th
is
m
o
d
el
af
ter
th
e
r
ec
en
tly
u
p
d
ated
d
is
tr
ib
u
ted
m
o
n
ito
r
in
g
ar
ch
itectu
r
e:
d
y
n
am
ic
n
etwo
r
k
m
o
n
ito
r
in
g
s
y
s
tem
(
DNM
S)
.
I
t
is
m
ad
e
u
p
o
f
th
e
f
o
llo
wi
n
g
p
ar
ts
:
an
ER
is
a
g
ad
g
et
th
at
in
te
r
ac
ts
with
a
d
is
p
er
s
ed
s
y
s
tem
an
d
ca
p
t
u
r
es
in
f
o
r
m
atio
n
g
e
n
er
ated
b
y
e
v
e
n
ts
th
at
ar
is
e
f
r
o
m
s
h
if
ts
in
th
e
s
u
r
r
o
u
n
d
i
n
g
e
n
v
ir
o
n
m
en
t.
Ad
d
itio
n
ally
,
th
is
E
R
is
m
ea
n
t
to
p
ass
th
e
ev
en
ts
o
f
in
ter
est
to
th
e
E
A
co
m
p
o
n
en
t
b
y
u
s
in
g
th
e
o
th
e
r
co
m
p
o
n
e
n
t,
th
e
co
m
p
ar
at
o
r
,
to
s
ep
ar
ate
th
em
f
r
o
m
th
e
ev
en
ts
cr
ea
ted
as
a
r
esu
lt
o
f
a
h
ea
lth
y
o
p
er
ati
o
n
.
T
h
e
s
ec
o
n
d
n
ewly
a
d
d
ed
co
m
p
o
n
en
t,
th
e
EA
,
is
r
esp
o
n
s
ib
le
f
o
r
d
o
in
g
an
al
y
s
is
o
n
th
e
o
b
s
er
v
ed
ch
an
g
es,
in
cl
u
d
in
g
cr
iticality
,
s
ize,
a
n
d
d
et
ail,
as
well
as
p
r
o
v
id
in
g
ass
is
tan
ce
f
o
r
in
f
er
r
in
g
co
n
clu
s
io
n
s
f
r
o
m
t
h
e
co
llecte
d
d
ata.
T
o
ascer
tain
if
t
h
e
d
at
a
ex
tr
ac
ted
f
r
o
m
th
e
tr
ig
g
e
r
ed
ev
en
t
is
c
r
u
cial
f
o
r
s
ec
u
r
ity
,
it
is
q
u
a
n
tifie
d
.
L
astl
y
,
d
ep
e
n
d
in
g
o
n
h
o
w
cr
itic
ally
s
ec
u
r
e
it
is
,
th
e
d
ata
is
s
en
t
to
th
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
eith
e
r
o
v
er
an
u
n
p
r
o
tecte
d
ch
a
n
n
el
in
a
d
if
f
er
en
t
co
m
m
u
n
icatio
n
lin
e
k
n
o
wn
as
th
e
m
o
n
ito
r
in
g
n
etwo
r
k
o
r
u
s
in
g
S
SL.
Fig
u
r
e
1
.
Ar
c
h
itectu
r
e
o
f
th
e
p
r
o
p
o
s
ed
DNM
S
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
20
2
6
:
31
3
-
32
2
316
Per
m
itti
n
g
th
e
m
o
n
ito
r
in
g
s
y
s
tem
to
co
llect
d
ata
in
o
r
d
er
to
m
ak
e
m
o
d
if
icatio
n
s
m
ig
h
t
r
esu
lt
in
s
ec
u
r
ity
is
s
u
es.
I
n
o
r
d
er
t
o
d
e
ter
m
in
e
h
o
w
r
is
k
y
it
is
t
o
s
en
d
o
v
er
a
n
u
n
s
ec
u
r
e
d
ch
a
n
n
el
b
ec
au
s
e
th
er
e
is
a
ch
an
ce
th
at
h
ac
k
er
s
will
in
te
r
ce
p
t
th
e
in
f
o
r
m
atio
n
as
it
is
b
ein
g
s
en
t
t
o
th
e
m
o
n
ito
r
in
g
s
y
s
tem
,
th
e
E
A
co
m
p
o
n
en
t
o
f
th
e
ad
a
p
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
m
u
s
t
a
n
aly
z
e
th
e
d
ata
b
ein
g
g
ath
er
ed
an
d
co
m
p
u
te
th
e
m
etr
ics
v
alu
e
as
s
h
o
wn
in
Fig
u
r
e
2
.
B
ased
o
n
th
e
an
aly
s
is
,
DNM
S
ass
i
s
ts
th
e
lo
ca
l
m
o
n
ito
r
in
g
s
y
s
tem
in
m
ak
in
g
a
d
ec
is
io
n
p
r
io
r
to
s
en
d
in
g
t
h
e
g
ath
er
ed
d
ata
to
t
h
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
.
A
s
ec
u
r
ed
r
o
u
t
e
o
r
en
cr
y
p
tio
n
will b
e
u
s
ed
wh
en
s
en
d
in
g
th
e
ac
q
u
ir
ed
d
ata
o
v
e
r
an
u
n
s
ec
u
r
ed
co
n
n
ec
tio
n
p
r
esen
ts
a
s
ig
n
if
ican
t d
an
g
e
r
.
Fig
u
r
e
2
.
Mo
d
el
o
f
th
e
ad
a
p
tiv
e
m
o
n
ito
r
in
g
m
ec
h
a
n
is
m
2
.
1
.
Scena
rio
s
o
f
a
pp
lica
t
io
n a
nd
t
heir
ra
m
if
ica
t
i
o
ns
Ad
ap
tiv
e
d
is
tr
ib
u
ted
s
y
s
tem
s
ar
e
ex
p
ec
ted
to
lis
ten
to
th
eir
in
ter
ac
tio
n
an
d
ex
ec
u
tio
n
c
o
n
tex
ts
to
lear
n
ab
o
u
t
m
o
d
if
icatio
n
s
to
th
eir
co
m
p
u
tin
g
en
v
ir
o
n
m
en
t
s
o
th
ey
ca
n
ad
ju
s
t.
A
s
y
s
te
m
lis
ten
s
to
ac
t
io
n
s
p
er
f
o
r
m
ed
at
t
h
e
p
r
o
ce
s
s
lev
e
l
s
in
ce
it
is
th
e
s
m
allest
p
r
o
g
r
am
u
n
it
t
h
at
is
r
ea
d
ily
h
an
d
l
ed
an
d
m
o
n
it
o
r
ed
.
Fu
r
th
er
m
o
r
e
,
f
r
o
m
id
e
n
tifie
d
e
v
en
ts
,
d
ata
r
elev
an
t
f
o
r
ad
a
p
ta
tio
n
is
g
ath
er
ed
b
y
ex
tr
ac
tin
g
k
ey
wo
r
d
s
f
r
o
m
th
e
m
em
o
r
y
lo
ca
tio
n
wh
er
e
th
e
tr
ig
g
er
ed
ev
e
n
ts
ar
e
s
to
r
ed
.
Af
ter
o
b
tain
in
g
th
e
n
ec
ess
ar
y
d
ata,
th
e
m
o
n
i
to
r
in
g
s
y
s
tem
q
u
an
tifie
s
th
e
in
f
o
r
m
atio
n
b
ased
o
n
p
r
e
d
ef
in
ed
cr
iter
i
a,
s
u
ch
as its
cr
iticality
in
th
e
co
n
tex
t o
f
s
ec
u
r
ity
.
L
astl
y
,
it
u
s
es
th
e
ad
ap
tiv
e
s
ec
u
r
ity
m
etr
ics
to
ca
lcu
late
th
e
r
is
k
an
d
s
ec
u
r
ity
h
az
a
r
d
t
h
at
m
o
n
ito
r
in
g
ca
n
im
p
o
s
e
in
th
e
e
v
en
t
t
h
at
th
e
c
o
llected
d
ata
is
ac
ce
s
s
ed
b
y
a
n
u
n
au
th
o
r
ized
a
g
en
t
af
ter
b
ei
n
g
tr
a
n
s
m
itted
to
th
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
.
T
h
e
tar
g
et
m
o
n
ito
r
in
g
s
y
s
tem
ch
o
o
s
es
h
o
w
t
o
co
n
v
ey
th
e
d
at
a
d
ep
en
d
in
g
o
n
its
cr
iticality
in
o
r
d
er
t
o
s
af
eg
u
a
r
d
th
e
co
llected
d
ata
th
r
o
u
g
h
o
u
t
c
o
m
m
u
n
icatio
n
with
th
e
ce
n
tr
al
m
o
n
ito
r
in
g
s
y
s
tem
an
d
d
u
r
i
n
g
tem
p
o
r
ar
y
l
o
ca
l sto
r
ag
e
at
th
e
tar
g
et
s
y
s
tem
.
W
h
en
im
p
lem
en
tin
g
t
h
e
r
ec
o
m
m
en
d
ed
s
ec
u
r
ity
m
ec
h
a
n
is
m
in
an
ad
a
p
tiv
e
d
is
tr
ib
u
ted
s
y
s
tem
,
it
is
cr
u
cial
to
ass
ess
s
p
ec
if
ic
cr
iter
ia
(
s
u
ch
cr
iticality
,
s
i
ze
,
d
etail,
an
d
s
u
p
p
o
r
t
f
o
r
in
f
er
e
n
ce
o
f
th
e
attr
ib
u
tes)
in
o
r
d
er
to
q
u
a
n
tify
th
e
i
n
f
o
r
m
atio
n
o
b
tain
e
d
f
o
r
th
e
p
u
r
p
o
s
e
o
f
ad
ap
tatio
n
.
Me
asu
r
in
g
is
th
e
p
r
o
ce
s
s
o
f
ch
ar
ac
ter
izin
g
r
ea
l
-
wo
r
ld
o
cc
u
r
r
en
ce
s
ac
co
r
d
in
g
to
ce
r
tain
,
well
-
d
ef
in
ed
s
tan
d
ar
d
s
a
n
d
th
en
g
i
v
in
g
th
em
n
u
m
b
er
s
o
r
s
y
m
b
o
ls
[
2
2
]
,
[
2
3
]
.
Pu
t
an
o
t
h
er
way
,
m
ea
s
u
r
em
en
t
en
ab
les
a
m
o
r
e
th
o
r
o
u
g
h
u
n
d
er
s
tan
d
in
g
o
f
th
e
p
r
o
p
er
ties
o
f
t
h
e
m
o
d
els
we
o
f
f
er
f
o
r
th
e
a
d
ap
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
.
Un
li
k
e
o
t
h
er
e
n
g
i
n
ee
r
in
g
d
is
cip
lin
es,
s
o
f
twar
e
en
g
i
n
ee
r
in
g
is
n
o
t
p
r
ed
i
ca
ted
o
n
t
h
e
f
u
n
d
a
m
en
tal
q
u
an
titativ
e
laws
o
f
p
h
y
s
ics
[
2
4
]
.
“
I
n
th
e
w
o
r
ld
o
f
s
o
f
twar
e,
d
ir
ec
t
m
ea
s
u
r
em
en
t
s
lik
e
v
o
ltag
e,
m
ass
,
an
d
ar
e
u
n
co
m
m
o
n
”.
As
a
r
esu
lt,
s
o
f
twar
e
m
etr
ics
an
d
m
ea
s
u
r
em
en
ts
ar
e
o
f
te
n
u
s
ed
in
an
o
b
liq
u
e
wa
y
to
g
u
id
e
i
m
p
o
r
tan
t
d
ec
is
io
n
s
.
Fig
u
r
e
3
p
r
esen
ts
th
e
ac
tiv
ity
d
iag
r
am
,
an
d
Alg
o
r
ith
m
1
o
u
tlin
es
th
e
ev
en
t
ass
e
s
s
m
en
t
lo
g
ic,
b
o
th
s
u
m
m
ar
izin
g
th
e
k
ey
f
ea
tu
r
es
o
f
th
e
ad
ap
tiv
e
d
is
tr
ib
u
ted
m
o
n
ito
r
in
g
s
y
s
tem
an
d
m
o
d
elin
g
its
f
u
n
ctio
n
ality
as a
h
ig
h
-
le
v
el
ab
s
tr
ac
tio
n
.
Fig
u
r
e
3
.
Activ
ity
d
iag
r
am
f
o
r
th
e
d
y
n
am
ic
n
etwo
r
k
m
o
n
ito
r
in
g
p
r
o
ce
s
s
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
Dyn
a
mic
mo
n
ito
r
in
g
fo
r
en
h
a
n
cin
g
Qo
S
a
n
d
s
ec
u
r
ity
in
d
is
tr
ib
u
ted
s
ystems
(
S
u
d
h
a
ka
r
P
e
r
iya
s
a
my
)
317
Alg
o
rit
h
m
1
.
Ev
e
n
t
c
rit
ica
li
t
y
a
ss
e
ss
m
e
n
t
Input: Triggered Event E
1. Retrieve baseline event set B from Repository R
2. If E
∉
B:
Compute Criticality Score (CS) using dynamic metrics
If CS > Threshold:
Route E via Secure Path
Else:
Route E via Regular Monitoring Network
End
2
.
2
.
Deplo
y
ing
t
he
pro
po
s
ed
s
ec
urit
y
m
ec
ha
nis
m
in
dis
t
r
ibu
t
ed
s
et
t
ing
s
A
co
m
p
r
e
h
en
s
iv
e
ap
p
r
o
ac
h
co
m
b
in
i
n
g
p
r
o
ac
tiv
e
s
ec
u
r
ity
m
ea
s
u
r
es,
d
ata
m
a
n
ag
e
m
en
t
r
u
les,
co
n
tin
u
o
u
s
m
o
n
ito
r
in
g
,
an
d
t
h
r
ea
t
d
etec
tio
n
is
ess
en
tial
to
b
alan
ce
in
f
o
r
m
ati
o
n
co
llectio
n
an
d
s
ec
u
r
ity
i
n
d
is
tr
ib
u
ted
s
y
s
tem
s
.
B
y
p
r
io
r
itizin
g
d
ata
p
r
o
tectio
n
alo
n
g
s
id
e
ac
ce
s
s
ib
ilit
y
an
d
f
lex
ib
ilit
y
,
o
r
g
an
izatio
n
s
ca
n
s
af
eg
u
ar
d
s
en
s
itiv
e
in
f
o
r
m
atio
n
,
m
itig
ate
r
is
k
s
,
an
d
ef
f
icien
tly
m
an
ag
e
d
is
tr
ib
u
ted
s
y
s
tem
s
[
2
5
]
.
I
m
p
lem
en
tin
g
th
e
p
r
o
p
o
s
ed
s
ec
u
r
ity
s
o
lu
tio
n
s
en
h
a
n
ce
s
d
a
ta
s
ec
u
r
ity
in
clo
u
d
e
n
v
ir
o
n
m
e
n
ts
,
en
s
u
r
in
g
th
e
in
teg
r
ity
o
f
v
i
r
tu
alize
d
r
eso
u
r
ce
s
an
d
s
er
v
ices.
Ad
a
p
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
s
en
ab
le
c
o
n
t
in
u
o
u
s
ass
ess
m
en
t
an
d
r
esp
o
n
s
e
to
ch
an
g
es
in
clo
u
d
en
v
ir
o
n
m
en
ts
,
im
p
r
o
v
i
n
g
th
r
ea
t
d
etec
tio
n
an
d
r
ed
u
cin
g
r
is
k
s
s
u
ch
as
u
n
au
th
o
r
ized
ac
ce
s
s
,
d
ata
b
r
ea
c
h
es,
o
r
s
er
v
ice
o
u
tag
es.
B
y
in
teg
r
atin
g
d
y
n
am
ic
s
ec
u
r
ity
m
etr
ics
in
to
s
ec
u
r
ity
p
o
licies,
clo
u
d
p
r
o
v
id
er
s
ca
n
cr
ea
te
an
ad
ap
tab
le
s
ec
u
r
ity
p
o
s
tu
r
e,
allo
win
g
b
u
s
in
ess
es
to
ad
ju
s
t
s
tr
ateg
ies
i
n
r
esp
o
n
s
e
to
ev
o
lv
in
g
t
h
r
ea
ts
a
n
d
u
s
er
n
ee
d
s
.
I
o
T
n
etwo
r
k
s
b
en
ef
it
f
r
o
m
th
is
ap
p
r
o
ac
h
b
y
m
an
ag
in
g
co
n
n
ec
ted
d
ev
ices
an
d
d
ata
s
tr
ea
m
s
s
e
cu
r
ely
.
A
d
ap
tiv
e
m
o
n
ito
r
i
n
g
id
en
tifie
s
an
o
m
alies
o
r
b
r
e
ac
h
es
b
y
t
r
ac
k
in
g
in
ter
ac
tio
n
s
an
d
d
ata
f
lo
ws,
wh
ile
d
y
n
am
ic
s
ec
u
r
ity
m
etr
i
cs
en
s
u
r
e
d
ata
in
teg
r
ity
,
p
r
iv
ac
y
,
an
d
r
esil
ien
ce
ac
r
o
s
s
th
e
I
o
T
ec
o
s
y
s
tem
.
I
n
n
etwo
r
k
ed
o
r
g
a
n
izatio
n
s
,
th
e
p
r
o
p
o
s
ed
m
ec
h
an
is
m
p
r
o
tects
cr
itical
co
m
m
u
n
icatio
n
s
an
d
o
p
er
atio
n
s
.
Ad
ap
tiv
e
m
o
n
ito
r
i
n
g
o
f
n
etwo
r
k
ac
tiv
ities
an
d
u
s
er
b
e
h
av
io
r
,
c
o
u
p
led
with
d
y
n
am
ic
m
etr
ics,
en
a
b
les
o
r
g
an
izatio
n
s
to
m
itig
ate
th
r
ea
ts
an
d
co
n
tin
u
o
u
s
ly
e
v
alu
ate
an
d
im
p
r
o
v
e
s
ec
u
r
ity
m
ea
s
u
r
es.
T
h
is
en
s
u
r
es th
e
p
r
o
tectio
n
an
d
r
esil
ien
ce
o
f
th
eir
d
ig
ital e
co
s
y
s
tem
s
.
3.
RE
SU
L
T
S AN
D
D
I
SCU
SS
I
O
N
Mo
n
ito
r
in
g
d
is
tr
ib
u
ted
s
y
s
tem
s
f
o
r
a
d
ap
tiv
e
s
ec
u
r
ity
aim
s
to
ass
ess
th
e
ef
f
ec
tiv
en
ess
o
f
th
e
p
r
o
p
o
s
ed
ad
ap
tiv
e
m
o
n
ito
r
i
n
g
s
y
s
tem
b
y
th
o
r
o
u
g
h
ly
ex
am
i
n
in
g
s
ev
er
al
im
p
o
r
ta
n
t
is
s
u
es,
wh
en
tak
e
n
in
to
ac
co
u
n
t
as
a
wh
o
le,
en
h
an
ce
th
e
s
y
s
tem
’
s
ab
ilit
y
to
s
u
p
p
o
r
t th
e
s
ec
u
r
ity
f
r
am
ewo
r
k
f
o
r
d
is
tr
ib
u
ted
s
y
s
tem
s
.
T
h
e
ev
alu
atio
n
o
f
th
e
p
r
o
p
o
s
ed
DNM
S
was
p
er
f
o
r
m
ed
th
r
o
u
g
h
s
ce
n
ar
i
o
-
b
ased
m
o
d
elin
g
an
d
a
n
aly
tical
p
er
f
o
r
m
an
ce
esti
m
atio
n
.
T
h
e
s
y
s
tem
’
s
d
e
s
ig
n
was
test
ed
ag
ain
s
t
cr
itical
p
ar
am
eter
s
,
in
cl
u
d
in
g
p
r
o
ce
s
s
in
g
o
v
er
h
ea
d
,
laten
cy
,
d
ata
h
an
d
lin
g
ca
p
ac
i
ty
,
C
PU
an
d
m
em
o
r
y
u
tili
za
tio
n
,
co
m
p
lian
ce
alig
n
m
en
t,
a
n
d
th
r
ea
t
d
etec
tio
n
ac
cu
r
ac
y
.
Per
f
o
r
m
an
ce
in
d
ic
ato
r
s
wer
e
d
er
iv
ed
b
y
m
o
d
e
lin
g
s
y
s
tem
b
e
h
av
io
r
s
u
n
d
er
v
ar
y
in
g
lo
ad
s
a
n
d
s
ec
u
r
ity
-
cr
itical
ev
en
t
f
lo
ws
in
a
d
is
tr
ib
u
ted
ar
ch
itectu
r
e.
C
o
m
p
lian
ce
m
etr
ics
wer
e
ass
es
s
ed
b
ased
o
n
alig
n
m
en
t
with
estab
lis
h
ed
f
r
am
ewo
r
k
s
s
u
ch
as
GDPR
,
I
SO
2
7
0
0
1
,
an
d
HI
PAA,
wh
ile
d
etec
tio
n
ac
cu
r
a
cy
was
ev
alu
ated
b
y
s
im
u
latin
g
th
r
ea
t
ca
teg
o
r
ies
in
clu
d
in
g
p
h
is
h
in
g
,
m
alwa
r
e,
an
d
in
s
id
er
th
r
ea
ts
.
T
h
ese
s
im
u
latio
n
s
wer
e
d
r
iv
e
n
b
y
r
u
le
-
b
ased
tr
af
f
ic
b
eh
a
v
io
r
,
m
im
ick
in
g
r
ea
l
-
tim
e
m
o
n
ito
r
in
g
a
n
d
d
ec
i
s
io
n
-
m
ak
in
g
co
n
d
itio
n
s
ac
r
o
s
s
ad
ap
tiv
e
en
v
ir
o
n
m
en
ts
.
T
h
e
ad
ap
tiv
e
m
o
n
ito
r
in
g
s
y
s
te
m
’
s
r
ea
l
-
tim
e
th
r
ea
t
d
etec
tio
n
ca
p
ab
ilit
ies
m
u
s
t
b
e
ev
alu
ated
f
ir
s
t
an
d
f
o
r
em
o
s
t.
C
ar
ef
u
l
co
n
s
id
er
ati
o
n
m
u
s
t
b
e
g
iv
en
to
th
e
s
y
s
tem
’
s
ca
p
ac
ity
to
p
r
o
m
p
tly
id
en
tify
an
d
r
eso
lv
e
p
o
ten
tial
s
ec
u
r
ity
th
r
ea
ts
as
t
h
ey
m
ater
ialize
in
a
d
is
tr
ib
u
ted
en
v
ir
o
n
m
en
t.
B
y
en
s
u
r
in
g
th
at
an
y
s
ec
u
r
ity
v
u
ln
er
ab
ilit
ies
ar
e
p
r
o
m
p
tl
y
r
eso
lv
ed
,
th
is
co
m
p
o
n
e
n
t
is
es
s
en
tial
in
r
ed
u
cin
g
th
e
r
is
k
o
f
d
ata
b
r
ea
ch
es
an
d
u
n
au
th
o
r
ized
ac
ce
s
s
to
s
en
s
iti
v
e
in
f
o
r
m
atio
n
.
Fu
r
th
e
r
m
o
r
e,
a
cr
u
cial
f
ac
to
r
to
b
e
tak
e
n
in
to
ac
co
u
n
t
is
h
o
w
well
th
e
m
o
n
ito
r
in
g
s
y
s
tem
ca
n
ad
ju
s
t
to
ch
an
g
in
g
an
d
d
y
n
am
ic
s
u
r
r
o
u
n
d
in
g
s
.
T
h
is
en
tails
ev
alu
atin
g
h
o
w
well
th
e
s
y
s
tem
ad
ap
ts
to
m
o
d
if
icatio
n
s
in
th
e
n
etwo
r
k
tr
af
f
i
c
p
atter
n
s
,
u
s
er
b
eh
a
v
io
r
,
an
d
d
is
tr
ib
u
ted
s
y
s
tem
s
etu
p
,
g
u
a
r
an
teein
g
o
n
-
g
o
in
g
an
d
ef
f
icien
t
m
o
n
ito
r
in
g
with
o
u
t
s
ac
r
if
icin
g
th
e
s
y
s
tem
’
s
o
v
er
all
p
er
f
o
r
m
a
n
ce
.
Fu
r
th
er
m
o
r
e
,
a
d
etailed
an
aly
s
is
o
f
th
e
s
y
s
tem
’
s
p
r
ec
is
io
n
an
d
s
p
ec
if
icity
in
d
is
tin
g
u
is
h
in
g
b
etwe
en
ac
tu
al
s
ec
u
r
ity
r
i
s
k
s
an
d
r
eg
u
lar
s
y
s
tem
o
p
er
atio
n
s
is
r
eq
u
ir
e
d
.
I
n
o
r
d
er
to
m
i
n
im
ize
f
alse
p
o
s
itiv
es
an
d
m
ak
e
s
u
r
e
th
at
s
y
s
tem
r
eso
u
r
ce
s
ar
e
s
p
e
n
t
ef
f
ec
tiv
ely
to
ad
d
r
ess
ac
tu
al
s
ec
u
r
ity
is
s
u
es,
a
h
ig
h
d
eg
r
ee
o
f
ac
cu
r
ac
y
is
ess
en
tial.
T
h
r
o
u
g
h
o
u
t
th
e
ass
e
s
s
m
en
t,
th
e
s
y
s
tem
’
s
r
ea
ctio
n
tim
es
an
d
is
s
u
e
h
an
d
lin
g
s
h
o
u
ld
b
e
co
n
tin
u
o
u
s
ly
m
o
n
ito
r
ed
.
T
o
r
e
d
u
ce
an
y
p
o
s
s
ib
le
in
ter
r
u
p
tio
n
s
to
th
e
d
is
tr
ib
u
ted
s
y
s
tem
’
s
o
v
er
all
p
er
f
o
r
m
an
ce
,
th
is
en
tails
ass
es
s
in
g
th
e
s
y
s
tem
’
s
ca
p
ac
it
y
to
r
eg
u
late
an
y
b
r
ea
ch
es
an
d
its
r
ea
ctio
n
tim
e
t
o
s
ec
u
r
i
ty
in
cid
en
ts
.
A
n
o
th
e
r
im
p
o
r
tan
t
f
ac
to
r
to
m
ak
e
s
u
r
e
th
e
m
o
n
ito
r
i
n
g
s
y
s
tem
ca
n
a
d
ap
t
to
th
e
ch
a
n
g
in
g
d
em
an
d
s
o
f
th
e
d
is
tr
ib
u
ted
en
v
ir
o
n
m
en
t
is
s
ca
lab
ilit
y
.
T
h
is
is
esp
ec
ially
im
p
o
r
tan
t
in
ter
m
s
o
f
th
e
s
y
s
tem
’
s
ca
p
ac
ity
to
ef
f
ec
tiv
ely
u
s
e
co
m
p
u
ter
r
eso
u
r
ce
s
an
d
h
an
d
l
e
g
r
o
win
g
d
ata
lo
ad
s
.
An
ad
d
itio
n
al
cr
u
cial
co
m
p
o
n
en
t
o
f
t
h
e
ex
am
in
atio
n
is
ad
h
er
en
ce
to
co
m
p
lian
ce
s
tan
d
ar
d
s
an
d
r
eg
u
lato
r
y
o
b
lig
ati
o
n
s
.
T
h
e
ad
ap
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
m
u
s
t
ab
id
e
b
y
in
d
u
s
tr
y
-
s
p
ec
if
ic
r
u
les
an
d
g
u
id
elin
es
in
o
r
d
er
t
o
s
af
eg
u
a
r
d
s
en
s
itiv
e
in
f
o
r
m
ati
o
n
an
d
s
atis
f
y
th
e
leg
al
an
d
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
20
2
6
:
31
3
-
32
2
318
r
eg
u
lato
r
y
r
eq
u
ir
e
m
en
ts
o
f
th
e
co
m
p
an
y
.
I
n
th
e
en
d
,
cr
ea
tin
g
a
co
m
p
lete
an
d
co
h
esiv
e
s
ec
u
r
ity
ar
ch
itectu
r
e
r
eq
u
ir
es
a
s
m
o
o
th
in
ter
f
ac
e
w
ith
th
e
c
u
r
r
en
t
s
ec
u
r
ity
in
f
r
ast
r
u
ctu
r
e.
T
h
e
co
m
b
in
atio
n
o
f
i
n
tr
u
s
io
n
d
etec
tio
n
s
y
s
tem
s
,
f
ir
ewa
lls
,
an
d
e
n
cr
y
p
tio
n
p
r
o
to
c
o
ls
with
th
e
ad
a
p
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
g
u
ar
an
tees
th
e
d
is
tr
ib
u
te
d
s
y
s
tem
’
s
s
ec
u
r
ity
.
T
h
e
p
r
o
p
o
s
ed
m
eth
o
d
in
T
ab
le
1
,
d
em
o
n
s
tr
ates
s
u
p
er
io
r
p
er
f
o
r
m
an
ce
,
ac
h
iev
in
g
th
e
lo
west
p
r
o
ce
s
s
in
g
o
v
er
h
ea
d
at
1
2
%,
a
d
ata
h
an
d
lin
g
ca
p
ac
ity
o
f
5
,
0
0
0
r
eq
u
ests
p
er
s
ec
o
n
d
,
an
d
a
laten
c
y
o
f
o
n
ly
1
5
0
m
s
.
T
h
ese
m
etr
ics
h
ig
h
lig
h
t
its
ex
ce
p
tio
n
al
ef
f
icien
cy
,
s
ca
lab
ilit
y
,
an
d
r
esp
o
n
s
iv
en
ess
,
m
ak
in
g
it
a
s
tr
o
n
g
ca
n
d
id
ate
f
o
r
ad
a
p
tiv
e
s
ec
u
r
it
y
ap
p
licatio
n
s
.
T
ab
le
1
.
An
aly
s
is
o
f
r
eso
u
r
ce
u
tili
za
tio
n
Ex
i
s
t
i
n
g
m
e
t
h
o
d
s
C
P
U
u
s
a
g
e
(
%)
M
e
m
o
r
y
u
s
a
g
e
(
G
B
)
I
N
S
G
A
-
I
I
[
1
0
]
28
0
.
3
A
C
C
S
[
1
1
]
31
0
.
3
5
A
M
D
M
L
[
1
3
]
29
0
.
2
O
M
N
ET+
+
[
1
4
]
30
0
.
4
P
r
o
p
o
se
d
23
0
.
1
T
h
e
p
r
o
p
o
s
ed
m
et
h
o
d
i
n
T
ab
l
e
2
ex
h
ib
its
o
u
ts
tan
d
in
g
r
eso
u
r
ce
ef
f
icien
cy
,
r
eq
u
ir
in
g
o
n
ly
2
3
%
C
PU
u
s
ag
e
an
d
0
.
1
GB
o
f
m
em
o
r
y
,
wh
ich
a
r
e
th
e
lo
west
am
o
n
g
th
e
c
o
m
p
ar
e
d
m
eth
o
d
s
.
T
h
is
ef
f
icien
c
y
u
n
d
er
s
co
r
es
its
ca
p
ab
ilit
y
to
m
ain
tain
h
ig
h
p
er
f
o
r
m
an
ce
w
h
ile
co
n
s
u
m
in
g
m
i
n
im
al
r
eso
u
r
ce
s
,
m
ak
in
g
it
well
-
s
u
ited
f
o
r
en
v
ir
o
n
m
en
ts
with
lim
it
ed
co
m
p
u
tatio
n
al
ca
p
ac
ity
.
Tab
le 2
.
An
a
ly
sis
o
f
re
so
u
rc
e
u
ti
li
z
a
ti
o
n
Ex
i
s
t
i
n
g
m
e
t
h
o
d
s
C
P
U
u
s
a
g
e
(
%)
M
e
m
o
r
y
u
s
a
g
e
(
G
B
)
I
N
S
G
A
-
I
I
[
1
0
]
28
0
.
3
A
C
C
S
[
1
1
]
31
0
.
3
5
A
M
D
M
L
[
1
3
]
29
0
.
2
O
M
N
ET+
+
[
1
4
]
30
0
.
4
P
r
o
p
o
se
d
23
0
.
1
F
i
g
u
r
e
4
i
l
l
u
s
t
r
a
te
s
,
t
h
e
p
r
o
p
o
s
e
d
m
e
t
h
o
d
e
x
c
el
s
i
n
r
e
g
u
l
at
o
r
y
c
o
m
p
l
i
a
n
c
e
,
a
c
h
i
e
v
i
n
g
9
5
%
a
l
i
g
n
m
e
n
t
w
i
t
h
G
DP
R
,
9
7
%
w
it
h
I
SO
2
7
0
0
1
,
a
n
d
9
2
%
w
it
h
H
I
P
AA
s
t
a
n
d
a
r
d
s
.
T
h
e
s
e
r
es
u
l
ts
s
u
r
p
a
s
s
t
h
o
s
e
o
f
o
t
h
e
r
m
e
t
h
o
d
s
,
r
e
f
l
e
c
ti
n
g
i
ts
r
o
b
u
s
t
ad
h
e
r
e
n
c
e
t
o
r
e
g
u
l
a
t
o
r
y
f
r
a
m
e
wo
r
k
s
a
n
d
i
t
s
a
b
il
i
t
y
t
o
e
n
s
u
r
e
s
ec
u
r
e
a
n
d
c
o
m
p
l
i
a
n
t
d
a
t
a
h
a
n
d
l
i
n
g
.
T
h
e
p
r
o
p
o
s
e
d
m
e
t
h
o
d
i
n
Fi
g
u
r
e
5
d
e
m
o
n
s
t
r
at
e
s
e
x
c
e
p
t
i
o
n
a
l
a
c
c
u
r
a
c
y
i
n
d
e
te
c
t
i
n
g
v
a
r
i
o
u
s
t
h
r
e
at
c
a
t
e
g
o
r
i
e
s
,
ac
h
i
e
v
i
n
g
9
8
%
f
o
r
p
h
i
s
h
i
n
g
a
t
t
a
c
k
s
,
9
4
%
f
o
r
m
a
l
w
a
r
e
t
h
r
e
a
ts
,
a
n
d
9
6
%
f
o
r
i
n
s
i
d
e
r
t
h
r
e
a
ts
.
T
h
ese
d
e
t
e
c
t
i
o
n
r
a
te
s
e
x
c
e
e
d
t
h
o
s
e
a
c
h
i
e
v
e
d
b
y
e
x
i
s
t
i
n
g
m
e
t
h
o
d
s
,
i
n
c
l
u
d
i
n
g
I
NS
GA
-
I
I
,
AC
C
S
,
A
M
DM
L
,
a
n
d
O
M
N
E
T
+
+
,
h
i
g
h
l
i
g
h
t
i
n
g
it
s
e
n
h
a
n
c
e
d
c
a
p
a
b
i
l
i
t
y
t
o
i
d
e
n
t
i
f
y
a
w
i
d
e
r
a
n
g
e
o
f
s
e
c
u
r
it
y
t
h
r
e
a
ts
ef
f
e
c
t
i
v
e
l
y
.
Fig
u
r
e
4
.
C
o
m
p
a
r
is
o
n
o
f
r
eg
u
lato
r
y
co
m
p
lian
ce
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
Dyn
a
mic
mo
n
ito
r
in
g
fo
r
en
h
a
n
cin
g
Qo
S
a
n
d
s
ec
u
r
ity
in
d
is
tr
ib
u
ted
s
ystems
(
S
u
d
h
a
ka
r
P
e
r
iya
s
a
my
)
319
Fig
u
r
e
5
.
C
o
m
p
a
r
is
o
n
o
f
th
r
ea
t d
etec
tio
n
ac
cu
r
ac
y
Ou
r
s
tu
d
y
h
as
y
ield
e
d
s
ig
n
if
ican
t
s
u
cc
ess
in
th
e
d
o
m
ain
o
f
ad
a
p
tiv
e
m
o
n
ito
r
in
g
f
o
r
d
is
tr
ib
u
ted
s
y
s
tem
s
,
p
r
im
ar
ily
attr
ib
u
ted
t
o
th
e
r
ig
o
r
o
u
s
im
p
lem
en
tatio
n
o
f
th
e
p
r
o
p
o
s
ed
f
r
am
ewo
r
k
a
n
d
th
e
u
tili
za
tio
n
o
f
d
y
n
am
ic
s
ec
u
r
ity
m
etr
ics.
B
y
ef
f
ec
tiv
ely
b
alan
cin
g
th
e
n
e
e
d
f
o
r
co
m
p
r
eh
e
n
s
iv
e
in
f
o
r
m
at
io
n
g
ath
er
in
g
with
r
o
b
u
s
t
s
ec
u
r
ity
m
ea
s
u
r
es,
o
u
r
ad
ap
tiv
e
m
o
n
ito
r
in
g
s
y
s
tem
h
as
d
em
o
n
s
tr
ated
u
n
p
ar
alleled
r
esil
ien
ce
in
d
y
n
am
ic
e
n
v
ir
o
n
m
en
ts
,
en
s
u
r
in
g
b
o
t
h
ad
a
p
tab
ilit
y
an
d
d
a
ta
s
ec
u
r
ity
.
C
o
m
p
ar
e
d
to
e
x
is
tin
g
s
tu
d
ies,
o
u
r
ap
p
r
o
ac
h
s
tan
d
s
o
u
t
d
u
e
to
its
n
u
an
ce
d
co
n
s
id
er
atio
n
o
f
th
e
v
ar
y
in
g
lev
els
o
f
in
f
o
r
m
atio
n
cr
iticality
an
d
t
h
e
ad
ap
tiv
e
n
atu
r
e
o
f
s
ec
u
r
ity
m
e
tr
ics.
Ad
d
itio
n
ally
,
th
e
ex
p
li
cit
in
teg
r
atio
n
o
f
a
c
o
m
p
r
e
h
en
s
iv
e
E
A
co
m
p
o
n
e
n
t
h
as
f
ac
ilit
ated
th
e
ac
c
u
r
ate
d
et
er
m
in
atio
n
o
f
s
ec
u
r
ity
-
cr
itical
in
f
o
r
m
atio
n
,
lead
i
n
g
t
o
in
f
o
r
m
ed
d
ec
is
io
n
s
a
b
o
u
t
th
e
tr
an
s
m
is
s
io
n
o
f
d
ata.
T
h
e
s
u
cc
ess
f
u
l
im
p
lem
en
tatio
n
o
f
o
u
r
p
r
o
p
o
s
ed
s
y
s
tem
h
as
th
u
s
h
ig
h
lig
h
ted
its
s
u
p
er
io
r
ef
f
icac
y
in
m
ai
n
tain
in
g
d
ata
in
teg
r
ity
an
d
s
y
s
tem
ad
ap
tab
ilit
y
,
s
ettin
g
a
n
ew
s
tan
d
ar
d
f
o
r
th
e
m
o
n
ito
r
in
g
an
d
s
ec
u
r
ity
o
f
d
is
tr
ib
u
ted
s
y
s
tem
s
.
4.
CO
NCLU
SI
O
N
T
h
is
s
tu
d
y
h
as
p
r
o
p
o
s
ed
a
r
o
b
u
s
t
f
r
a
m
ewo
r
k
f
o
r
a
d
ap
t
i
v
e
m
o
n
ito
r
in
g
i
n
d
is
tr
ib
u
ted
s
y
s
tem
s
,
em
p
h
asizin
g
th
e
in
te
g
r
atio
n
o
f
d
y
n
a
m
ic
s
ec
u
r
ity
m
etr
ics
with
in
tellig
en
t
ev
en
t
a
n
aly
s
is
.
T
h
e
DNM
S
en
ab
les
r
ea
l
-
tim
e
ev
alu
atio
n
o
f
s
y
s
tem
ev
en
ts
,
b
alan
cin
g
th
e
n
ee
d
f
o
r
co
n
tin
u
o
u
s
d
ata
co
llectio
n
with
th
e
im
p
er
ativ
e
o
f
s
ec
u
r
ity
.
T
h
r
o
u
g
h
co
m
p
r
eh
en
s
iv
e
ex
p
e
r
im
en
t
s
,
th
e
p
r
o
p
o
s
ed
s
y
s
tem
d
em
o
n
s
tr
ated
s
ig
n
if
ican
t
im
p
r
o
v
em
e
n
ts
in
th
r
ea
t
d
etec
tio
n
ac
cu
r
ac
y
,
r
e
g
u
lato
r
y
c
o
m
p
lian
ce
,
an
d
r
eso
u
r
ce
ef
f
ici
en
cy
.
T
h
ese
r
esu
lts
u
n
d
er
s
co
r
e
its
p
o
te
n
tial
to
e
n
h
an
ce
o
p
er
atio
n
al
r
esil
ien
ce
i
n
d
iv
e
r
s
e
d
is
tr
ib
u
ted
en
v
i
r
o
n
m
en
ts
.
Ho
wev
er
,
th
e
f
r
am
ewo
r
k
’
s
r
elian
ce
o
n
p
r
e
d
ef
in
ed
ev
en
t
p
r
o
f
iles
an
d
s
tatic
th
r
esh
o
ld
s
m
ay
lim
it
r
esp
o
n
s
iv
en
ess
to
n
o
v
el
o
r
ev
o
lv
in
g
th
r
ea
ts
.
Fu
tu
r
e
r
es
ea
r
ch
co
u
ld
ex
p
l
o
r
e
th
e
in
c
o
r
p
o
r
ati
o
n
o
f
m
ac
h
in
e
lear
n
in
g
alg
o
r
ith
m
s
f
o
r
p
r
ed
ictiv
e
th
r
ea
t
id
en
tific
atio
n
an
d
au
to
m
ate
d
th
r
esh
o
ld
a
d
ju
s
tm
en
t.
Mo
r
eo
v
er
,
ex
ten
d
in
g
th
e
f
r
am
ewo
r
k
to
s
u
p
p
o
r
t
lar
g
e
-
s
ca
le
r
ea
l
-
wo
r
l
d
d
ep
lo
y
m
en
ts
will
b
e
cr
u
cia
l
in
v
alid
atin
g
its
ad
ap
tab
ilit
y
an
d
p
e
r
f
o
r
m
an
ce
u
n
d
er
d
y
n
am
ic
c
o
n
d
itio
n
s
.
D
esp
ite
th
ese
lim
itatio
n
s
,
th
e
DNM
S
s
ets
a
s
tr
o
n
g
f
o
u
n
d
at
io
n
f
o
r
a
d
v
an
ci
n
g
s
ec
u
r
e,
s
ca
lab
le,
an
d
a
d
ap
tiv
e
m
o
n
ito
r
in
g
s
tr
ateg
ies in
m
o
d
e
r
n
d
is
tr
ib
u
ted
s
y
s
tem
s
.
F
UNDING
I
NF
O
R
M
A
T
I
O
N
Au
th
o
r
s
s
tate
n
o
f
u
n
d
in
g
in
v
o
lv
ed
.
AUTHO
R
CO
NT
RI
B
UT
I
O
NS ST
A
T
E
M
E
N
T
T
h
is
jo
u
r
n
al
u
s
es
th
e
C
o
n
t
r
ib
u
to
r
R
o
les
T
a
x
o
n
o
m
y
(
C
R
ed
iT)
to
r
ec
o
g
n
ize
in
d
iv
i
d
u
al
au
th
o
r
co
n
tr
ib
u
tio
n
s
,
r
ed
u
ce
au
th
o
r
s
h
ip
d
is
p
u
tes,
an
d
f
ac
ilit
ate
co
llab
o
r
atio
n
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
20
2
6
:
31
3
-
32
2
320
Na
m
e
o
f
Aut
ho
r
C
M
So
Va
Fo
I
R
D
O
E
Vi
Su
P
Fu
Su
d
h
ak
ar
Per
iy
asam
y
✓
✓
✓
✓
✓
✓
✓
Vijay
alak
s
h
m
i
Alag
ar
s
am
y
✓
✓
✓
✓
✓
✓
Palan
i
L
ath
a
✓
✓
✓
✓
✓
Kar
u
p
p
iah
T
am
ilar
asi
✓
✓
✓
✓
✓
✓
T
h
en
m
o
z
h
i E
lu
m
alai
✓
✓
✓
✓
✓
✓
Pra
b
u
Kaliy
ap
er
u
m
al
✓
✓
✓
✓
✓
✓
✓
✓
✓
C
:
C
o
n
c
e
p
t
u
a
l
i
z
a
t
i
o
n
M
:
M
e
t
h
o
d
o
l
o
g
y
So
:
So
f
t
w
a
r
e
Va
:
Va
l
i
d
a
t
i
o
n
Fo
:
Fo
r
mal
a
n
a
l
y
s
i
s
I
:
I
n
v
e
s
t
i
g
a
t
i
o
n
R
:
R
e
so
u
r
c
e
s
D
:
D
a
t
a
C
u
r
a
t
i
o
n
O
:
W
r
i
t
i
n
g
-
O
r
i
g
i
n
a
l
D
r
a
f
t
E
:
W
r
i
t
i
n
g
-
R
e
v
i
e
w
&
E
d
i
t
i
n
g
Vi
:
Vi
su
a
l
i
z
a
t
i
o
n
Su
:
Su
p
e
r
v
i
s
i
o
n
P
:
P
r
o
j
e
c
t
a
d
mi
n
i
st
r
a
t
i
o
n
Fu
:
Fu
n
d
i
n
g
a
c
q
u
i
si
t
i
o
n
CO
NF
L
I
C
T
O
F
I
N
T
E
R
E
S
T
ST
A
T
E
M
E
NT
Au
th
o
r
s
s
tate
n
o
co
n
f
lict o
f
in
t
er
est.
DATA AV
AI
L
AB
I
L
I
T
Y
T
h
e
d
ata
th
at
s
u
p
p
o
r
t
th
e
f
in
d
in
g
s
o
f
th
is
s
tu
d
y
ar
e
av
ailab
le
f
r
o
m
th
e
co
r
r
esp
o
n
d
i
n
g
au
t
h
o
r
,
[
P.K]
,
u
p
o
n
r
ea
s
o
n
ab
le
r
eq
u
est.
RE
F
E
R
E
NC
E
S
[
1
]
A
.
H
a
m
a
r
sh
e
h
,
“
A
n
a
d
a
p
t
i
v
e
s
e
c
u
r
i
t
y
f
r
a
mew
o
r
k
f
o
r
i
n
t
e
r
n
e
t
o
f
t
h
i
n
g
s
n
e
t
w
o
r
k
s
l
e
v
e
r
a
g
i
n
g
S
D
N
a
n
d
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
,
”
Ap
p
l
i
e
d
S
c
i
e
n
c
e
s
(
S
w
i
t
zer
l
a
n
d
)
,
v
o
l
.
1
4
,
n
o
.
1
1
,
p
.
4
5
3
0
,
M
a
y
2
0
2
4
,
d
o
i
:
1
0
.
3
3
9
0
/
a
p
p
1
4
1
1
4
5
3
0
.
[
2
]
P
.
B
a
n
e
r
j
e
e
e
t
a
l
.
,
“
M
TD
-
D
H
JS
:
mak
e
sp
a
n
-
o
p
t
i
mi
z
e
d
t
a
s
k
sc
h
e
d
u
l
i
n
g
a
l
g
o
r
i
t
h
m
f
o
r
c
l
o
u
d
c
o
m
p
u
t
i
n
g
w
i
t
h
d
y
n
a
m
i
c
c
o
m
p
u
t
a
t
i
o
n
a
l
t
i
me
p
r
e
d
i
c
t
i
o
n
,
”
I
EEE
Ac
c
e
ss
,
v
o
l
.
1
1
,
p
p
.
1
0
5
5
7
8
–
1
0
5
6
1
8
,
2
0
2
3
,
d
o
i
:
1
0
.
1
1
0
9
/
A
C
C
ESS
.
2
0
2
3
.
3
3
1
8
5
5
3
.
[
3
]
E.
S
e
i
d
,
O
.
P
o
p
o
v
,
a
n
d
F
.
B
l
i
x
,
“
X
A
4
A
S
:
a
d
a
p
t
i
v
e
se
c
u
r
i
t
y
f
o
r
mu
l
t
i
-
st
a
g
e
a
t
t
a
c
k
s,”
i
n
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
r
e
n
c
e
o
n
I
n
t
e
r
n
e
t
o
f
T
h
i
n
g
s
,
B
i
g
D
a
t
a
a
n
d
S
e
c
u
r
i
t
y
,
I
o
T
B
D
S
-
Pr
o
c
e
e
d
i
n
g
s
,
2
0
2
4
,
p
p
.
2
8
4
–
2
9
3
,
d
o
i
:
1
0
.
5
2
2
0
/
0
0
1
2
7
0
7
4
0
0
0
0
3
7
0
5
.
[
4
]
E.
M
.
T
i
mo
f
t
e
,
A
.
Li
g
i
a
B
a
l
a
n
,
a
n
d
T.
I
f
t
i
me
,
“
A
I
d
r
i
v
e
n
a
d
a
p
t
i
v
e
s
e
c
u
r
i
t
y
mes
h
:
c
l
o
u
d
c
o
n
t
a
i
n
e
r
p
r
o
t
e
c
t
i
o
n
f
o
r
d
y
n
a
m
i
c
t
h
r
e
a
t
l
a
n
d
s
c
a
p
e
s
,
”
i
n
2
0
2
4
I
n
t
e
r
n
a
t
i
o
n
a
l
C
o
n
f
e
re
n
c
e
o
n
D
e
v
e
l
o
p
m
e
n
t
a
n
d
Ap
p
l
i
c
a
t
i
o
n
S
y
s
t
e
m
s
(
D
A
S
)
,
M
a
y
2
0
2
4
,
p
p
.
7
1
–
7
7
,
d
o
i
:
1
0
.
1
1
0
9
/
D
A
S
6
1
9
4
4
.
2
0
2
4
.
1
0
5
4
1
1
4
8
.
[
5
]
K
.
S
a
m
u
n
n
i
sa,
G
.
S
.
V
.
K
u
mar
,
a
n
d
K
.
M
a
d
h
a
v
i
,
“
I
n
t
r
u
s
i
o
n
d
e
t
e
c
t
i
o
n
s
y
s
t
e
m
i
n
d
i
s
t
r
i
b
u
t
e
d
c
l
o
u
d
c
o
mp
u
t
i
n
g
:
h
y
b
r
i
d
c
l
u
st
e
r
i
n
g
a
n
d
c
l
a
ss
i
f
i
c
a
t
i
o
n
me
t
h
o
d
s,”
M
e
a
s
u
r
e
m
e
n
t
:
S
e
n
s
o
rs
,
v
o
l
.
2
5
,
p
.
1
0
0
6
1
2
,
F
e
b
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
me
a
se
n
.
2
0
2
2
.
1
0
0
6
1
2
.
[
6
]
Y
.
S
u
n
,
J
.
H
u
a
n
g
,
a
n
d
F
.
W
e
i
,
“
P
e
r
f
o
r
man
c
e
e
v
a
l
u
a
t
i
o
n
o
f
d
i
st
r
i
b
u
t
e
d
mu
l
t
i
-
a
g
e
n
t
I
o
T
m
o
n
i
t
o
r
i
n
g
b
a
s
e
d
o
n
i
n
t
e
l
l
i
g
e
n
t
r
e
f
l
e
c
t
i
n
g
su
r
f
a
c
e
,
”
E
u
ra
s
i
p
J
o
u
rn
a
l
o
n
Ad
v
a
n
c
e
s i
n
S
i
g
n
a
l
Pr
o
c
e
ssi
n
g
,
v
o
l
.
2
0
2
4
,
n
o
.
1
,
M
a
r
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
8
6
/
s1
3
6
3
4
-
024
-
0
1
1
3
2
-
4.
[
7
]
N
.
D
e
h
g
h
a
n
y
a
n
d
R
.
A
s
g
h
a
r
i
,
“
M
u
l
t
i
-
o
b
j
e
c
t
i
v
e
o
p
t
i
m
a
l
r
e
c
o
n
f
i
g
u
r
a
t
i
o
n
o
f
d
i
s
t
r
i
b
u
t
i
o
n
n
e
t
w
o
r
k
s
u
si
n
g
a
n
o
v
e
l
me
t
a
-
h
e
u
r
i
st
i
c
a
l
g
o
r
i
t
h
m,
”
I
n
t
e
rn
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
El
e
c
t
r
i
c
a
l
a
n
d
C
o
m
p
u
t
e
r
E
n
g
i
n
e
e
ri
n
g
(
I
J
EC
E)
,
v
o
l
.
1
4
,
n
o
.
4
,
p
p
.
3
5
5
7
–
3
5
6
9
,
A
u
g
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
e
c
e
.
v
1
4
i
4
.
p
p
3
5
5
7
-
3
5
6
9
.
[
8
]
N
.
M
o
u
st
a
f
a
,
“
A
n
e
w
d
i
s
t
r
i
b
u
t
e
d
a
r
c
h
i
t
e
c
t
u
r
e
f
o
r
e
v
a
l
u
a
t
i
n
g
A
I
-
b
a
se
d
s
e
c
u
r
i
t
y
s
y
s
t
e
ms
a
t
t
h
e
e
d
g
e
:
n
e
t
w
o
r
k
TO
N
_
I
o
T
d
a
t
a
se
t
s,
”
S
u
s
t
a
i
n
a
b
l
e
C
i
t
i
e
s
a
n
d
S
o
c
i
e
t
y
,
v
o
l
.
7
2
,
p
.
1
0
2
9
9
4
,
S
e
p
.
2
0
2
1
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
scs
.
2
0
2
1
.
1
0
2
9
9
4.
[
9
]
P
.
K
r
i
s
h
n
a
n
,
K
.
J
a
i
n
,
A
.
A
l
d
w
e
e
s
h
,
P
.
P
r
a
b
u
,
a
n
d
R
.
B
u
y
y
a
,
“
O
p
e
n
S
t
a
c
k
D
P
:
a
s
c
a
l
a
b
l
e
n
e
t
w
o
r
k
s
e
c
u
r
i
t
y
f
r
a
m
e
w
o
r
k
f
o
r
S
D
N
-
b
a
s
e
d
O
p
e
n
S
t
a
c
k
c
l
o
u
d
i
n
f
r
a
s
t
r
u
c
t
u
r
e
,
”
J
o
u
r
n
a
l
o
f
C
l
o
u
d
C
o
m
p
u
t
i
n
g
,
v
o
l
.
1
2
,
n
o
.
1
,
F
e
b
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
8
6
/
s
1
3
6
7
7
-
0
2
3
-
0
0
4
0
6
-
w.
[
1
0
]
B
.
To
mas
h
e
v
s
k
y
,
S
.
Y
e
v
se
i
e
v
,
S
.
P
o
h
a
s
i
i
,
a
n
d
S
.
M
i
l
e
v
s
k
y
i
,
“
M
e
c
h
a
n
i
sm
s
f
o
r
e
n
su
r
i
n
g
t
h
e
se
c
u
r
i
t
y
o
f
c
h
a
n
n
e
l
s
o
f
a
p
r
o
s
p
e
c
t
i
v
e
man
a
g
e
me
n
t
sy
s
t
e
m,”
A
d
v
a
n
c
e
d
I
n
f
o
r
m
a
t
i
o
n
S
y
s
t
e
m
s
,
v
o
l
.
6
,
n
o
.
3
,
p
p
.
6
6
–
8
2
,
S
e
p
.
2
0
2
2
,
d
o
i
:
1
0
.
2
0
9
9
8
/
2
5
2
2
-
9
0
5
2
.
2
0
2
2
.
3
.
1
0
.
[
1
1
]
A
.
A
h
ma
d
,
A
.
W
.
M
a
l
i
k
,
A
.
A
l
r
e
sh
i
d
i
,
W
.
K
h
a
n
,
a
n
d
M
.
S
a
j
j
a
d
,
“
A
d
a
p
t
i
v
e
se
c
u
r
i
t
y
f
o
r
s
e
l
f
-
p
r
o
t
e
c
t
i
o
n
o
f
m
o
b
i
l
e
c
o
m
p
u
t
i
n
g
d
e
v
i
c
e
s,
”
Mo
b
i
l
e
N
e
t
w
o
r
k
s
a
n
d
Ap
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
2
8
,
n
o
.
2
,
p
p
.
1
–
2
0
,
S
e
p
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
0
7
/
s1
1
0
3
6
-
0
1
9
-
0
1
3
5
5
-
y.
[
1
2
]
M
.
R
e
p
e
t
t
o
,
“
A
d
a
p
t
i
v
e
m
o
n
i
t
o
r
i
n
g
,
d
e
t
e
c
t
i
o
n
,
a
n
d
r
e
s
p
o
n
s
e
f
o
r
a
g
i
l
e
d
i
g
i
t
a
l
s
e
r
v
i
c
e
c
h
a
i
n
s,”
C
o
m
p
u
t
e
rs
a
n
d
S
e
c
u
ri
t
y
,
v
o
l
.
1
3
2
,
p
.
1
0
3
3
4
3
,
S
e
p
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
o
se.
2
0
2
3
.
1
0
3
3
4
3
.
[
1
3
]
M
.
A
.
M
o
h
a
m
me
d
e
t
a
l
.
,
“
A
d
a
p
t
i
v
e
s
e
c
u
r
e
m
a
l
w
a
r
e
e
f
f
i
c
i
e
n
t
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
a
l
g
o
r
i
t
h
m
f
o
r
h
e
a
l
t
h
c
a
r
e
d
a
t
a
,
”
C
AAI
T
ra
n
s
a
c
t
i
o
n
s
o
n
I
n
t
e
l
l
i
g
e
n
c
e
T
e
c
h
n
o
l
o
g
y
,
M
a
r
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
4
9
/
c
i
t
2
.
1
2
2
0
0
.
[
1
4
]
K
.
R
a
s
h
i
d
,
Y
.
S
a
e
e
d
,
A
.
A
l
i
,
F
.
Jam
i
l
,
R
.
A
l
k
a
n
h
e
l
,
a
n
d
A
.
M
u
t
h
a
n
n
a
,
“
A
n
a
d
a
p
t
i
v
e
r
e
a
l
-
t
i
m
e
ma
l
i
c
i
o
u
s
n
o
d
e
d
e
t
e
c
t
i
o
n
f
r
a
m
e
w
o
r
k
u
si
n
g
mac
h
i
n
e
l
e
a
r
n
i
n
g
i
n
v
e
h
i
c
u
l
a
r
a
d
-
h
o
c
n
e
t
w
o
r
k
s
(
V
A
N
ETs)
,
”
S
e
n
s
o
rs
,
v
o
l
.
2
3
,
n
o
.
5
,
p
.
2
5
9
4
,
F
e
b
.
2
0
2
3
,
d
o
i
:
1
0
.
3
3
9
0
/
s
2
3
0
5
2
5
9
4
.
[
1
5
]
Z.
L
v
,
D
.
C
h
e
n
,
B
.
C
a
o
,
H
.
S
o
n
g
,
a
n
d
H
.
Lv
,
“
S
e
c
u
r
e
d
e
e
p
l
e
a
r
n
i
n
g
i
n
d
e
f
e
n
s
e
i
n
d
e
e
p
-
l
e
a
r
n
i
n
g
-
as
-
a
-
ser
v
i
c
e
c
o
m
p
u
t
i
n
g
sy
s
t
e
ms
i
n
d
i
g
i
t
a
l
t
w
i
n
s
,
”
I
EEE
T
ra
n
s
a
c
t
i
o
n
s
o
n
C
o
m
p
u
t
e
rs
,
v
o
l
.
7
3
,
n
o
.
3
,
p
p
.
6
5
6
–
6
6
8
,
M
a
r
.
2
0
2
4
,
d
o
i
:
1
0
.
1
1
0
9
/
TC
.
2
0
2
1
.
3
0
7
7
6
8
7
.
[
1
6
]
M
.
F
a
g
h
i
h
i
,
M
.
Y
a
d
e
g
a
r
,
M
.
B
a
k
h
t
i
a
r
i
d
o
u
s
t
,
N
.
M
e
s
k
i
n
,
J
.
S
h
a
r
i
f
i
,
a
n
d
P
.
S
h
i
,
“
D
i
s
t
r
i
b
u
t
e
d
o
p
t
i
m
a
l
c
o
v
e
r
a
g
e
c
o
n
t
r
o
l
i
n
m
u
l
t
i
-
a
g
e
n
t
s
y
s
t
e
m
s
:
k
n
o
w
n
a
n
d
u
n
k
n
o
w
n
e
n
v
i
r
o
n
m
e
n
t
s
,
”
A
u
t
o
m
a
t
i
c
a
,
v
o
l
.
1
7
3
,
p
.
1
1
2
0
3
1
,
M
a
r
.
2
0
2
5
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
a
u
t
o
m
a
t
i
c
a
.
2
0
2
4
.
1
1
2
0
3
1
.
[
1
7
]
A
.
R
.
A
l
-
G
h
u
w
a
i
r
i
,
Y
.
S
h
a
r
r
a
b
,
D
.
A
l
-
F
r
a
i
h
a
t
,
M
.
A
l
El
a
i
m
a
t
,
A
.
A
l
s
a
r
h
a
n
,
a
n
d
A
.
A
l
g
a
r
n
i
,
“
I
n
t
r
u
si
o
n
d
e
t
e
c
t
i
o
n
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
b
a
s
e
d
o
n
t
i
me
seri
e
s
a
n
o
mal
i
e
s
u
t
i
l
i
z
i
n
g
m
a
c
h
i
n
e
l
e
a
r
n
i
n
g
,
”
J
o
u
r
n
a
l
o
f
C
l
o
u
d
C
o
m
p
u
t
i
n
g
,
v
o
l
.
1
2
,
n
o
.
1
,
A
u
g
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
8
6
/
s
1
3
6
7
7
-
023
-
0
0
4
9
1
-
x.
[
1
8
]
C
.
W
a
n
g
,
H
.
L
i
u
,
C
.
Li
,
Y
.
S
u
n
,
W
.
W
a
n
g
,
a
n
d
B
.
W
a
n
g
,
“
R
o
b
u
s
t
i
n
t
r
u
si
o
n
d
e
t
e
c
t
i
o
n
f
o
r
i
n
d
u
st
r
i
a
l
c
o
n
t
r
o
l
s
y
st
e
ms
u
s
i
n
g
i
mp
r
o
v
e
d
a
u
t
o
e
n
c
o
d
e
r
a
n
d
B
a
y
e
si
a
n
g
a
u
ss
i
a
n
mi
x
t
u
r
e
m
o
d
e
l
,
”
Ma
t
h
e
m
a
t
i
c
s
,
v
o
l
.
1
1
,
n
o
.
9
,
p
.
2
0
4
8
,
A
p
r
.
2
0
2
3
,
d
o
i
:
1
0
.
3
3
9
0
/
ma
t
h
1
1
0
9
2
0
4
8
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
I
SS
N:
2252
-
8
7
7
6
Dyn
a
mic
mo
n
ito
r
in
g
fo
r
en
h
a
n
cin
g
Qo
S
a
n
d
s
ec
u
r
ity
in
d
is
tr
ib
u
ted
s
ystems
(
S
u
d
h
a
ka
r
P
e
r
iya
s
a
my
)
321
[1
9]
S
.
R
.
B
h
a
r
a
m
a
g
o
u
d
a
r
a
n
d
S
.
V
.
S
a
b
o
j
i
,
“
L
o
c
a
t
i
o
n
-
a
w
a
r
e
h
y
b
r
i
d
m
i
c
r
o
s
c
o
p
i
c
r
o
u
t
i
n
g
s
c
h
e
me
f
o
r
m
o
b
i
l
e
o
p
p
o
r
t
u
n
i
s
t
i
c
n
e
t
w
o
r
k
,
”
I
AES
I
n
t
e
r
n
a
t
i
o
n
a
l
J
o
u
r
n
a
l
o
f
Art
i
f
i
c
i
a
l
I
n
t
e
l
l
i
g
e
n
c
e
(
I
J
AI
)
,
v
o
l
.
1
2
,
n
o
.
2
,
p
p
.
7
8
5
–
7
9
3
,
J
u
n
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
5
9
1
/
i
j
a
i
.
v
1
2
.
i
2
.
p
p
785
-
7
9
3
.
[
2
0
]
A
.
A
l
d
a
l
l
a
l
,
“
T
o
w
a
r
d
e
f
f
i
c
i
e
n
t
i
n
t
r
u
si
o
n
d
e
t
e
c
t
i
o
n
s
y
s
t
e
m
u
si
n
g
h
y
b
r
i
d
d
e
e
p
l
e
a
r
n
i
n
g
a
p
p
r
o
a
c
h
,
”
S
y
m
m
e
t
ry
,
v
o
l
.
1
4
,
n
o
.
9
,
p
.
1
9
1
6
,
S
e
p
.
2
0
2
2
,
d
o
i
:
1
0
.
3
3
9
0
/
s
y
m
1
4
0
9
1
9
1
6
.
[
2
1
]
A
.
R
.
K
h
a
n
,
"
D
y
n
a
m
i
c
l
o
a
d
b
a
l
a
n
c
i
n
g
i
n
c
l
o
u
d
c
o
m
p
u
t
i
n
g
:
o
p
t
i
m
i
z
e
d
R
L
-
b
a
s
e
d
c
l
u
s
t
e
r
i
n
g
w
i
t
h
m
u
l
t
i
-
o
b
j
e
c
t
i
v
e
o
p
t
i
m
i
z
e
d
t
a
s
k
s
c
h
e
d
u
l
i
n
g
,
"
P
r
o
c
e
s
s
e
s
,
v
o
l
.
1
2
,
n
o
.
3
,
p
.
5
1
9
,
2
0
2
4
,
d
o
i
:
1
0
.
3
3
9
0
/
p
r
1
2
0
3
0
5
1
9
.
[
2
2
]
J.
F
i
g
u
e
i
r
e
d
o
,
C
.
S
e
r
r
ã
o
,
a
n
d
A
.
M
.
d
e
A
l
me
i
d
a
,
“
D
e
e
p
l
e
a
r
n
i
n
g
m
o
d
e
l
t
r
a
n
s
p
o
s
i
t
i
o
n
f
o
r
n
e
t
w
o
r
k
i
n
t
r
u
si
o
n
d
e
t
e
c
t
i
o
n
s
y
st
e
ms,”
El
e
c
t
r
o
n
i
c
s
(
S
w
i
t
zer
l
a
n
d
)
,
v
o
l
.
1
2
,
n
o
.
2
,
p
.
2
9
3
,
Ja
n
.
2
0
2
3
,
d
o
i
:
1
0
.
3
3
9
0
/
e
l
e
c
t
r
o
n
i
c
s
1
2
0
2
0
2
9
3
.
[
2
3
]
Z.
C
u
i
,
T.
Z
h
a
o
,
L
.
W
u
,
A
.
K
.
Q
i
n
,
a
n
d
J.
L
i
,
“
M
u
l
t
i
-
o
b
j
e
c
t
i
v
e
c
l
o
u
d
t
a
s
k
sch
e
d
u
l
i
n
g
o
p
t
i
m
i
z
a
t
i
o
n
b
a
se
d
o
n
e
v
o
l
u
t
i
o
n
a
r
y
mu
l
t
i
-
f
a
c
t
o
r
a
l
g
o
r
i
t
h
m,
”
I
EEE
T
r
a
n
s
a
c
t
i
o
n
s
o
n
C
l
o
u
d
C
o
m
p
u
t
i
n
g
,
v
o
l
.
1
1
,
n
o
.
4
,
p
p
.
3
6
8
5
–
3
6
9
9
,
O
c
t
.
2
0
2
3
,
d
o
i
:
1
0
.
1
1
0
9
/
T
C
C
.
2
0
2
3
.
3
3
1
5
0
1
4
.
[
2
4
]
S
.
I
d
o
w
u
,
D
.
S
t
r
ü
b
e
r
,
a
n
d
T
.
B
e
r
g
e
r
,
“
EM
M
M
:
a
u
n
i
f
i
e
d
me
t
a
-
m
o
d
e
l
f
o
r
t
r
a
c
k
i
n
g
ma
c
h
i
n
e
l
e
a
r
n
i
n
g
e
x
p
e
r
i
m
e
n
t
s,
”
i
n
Pr
o
c
e
e
d
i
n
g
s
-
4
8
t
h
E
u
ro
m
i
c
r
o
C
o
n
f
e
r
e
n
c
e
o
n
S
o
f
t
w
a
re
E
n
g
i
n
e
e
ri
n
g
a
n
d
A
d
v
a
n
c
e
d
A
p
p
l
i
c
a
t
i
o
n
s,
S
EAA
2
0
2
2
,
A
u
g
.
2
0
2
2
,
p
p
.
4
8
–
5
5
,
d
o
i
:
1
0
.
1
1
0
9
/
S
EA
A
5
6
9
9
4
.
2
0
2
2
.
0
0
0
1
6
.
[
2
5
]
L.
G
o
l
i
g
h
t
l
y
,
P
.
M
o
d
e
st
i
,
R
.
G
a
r
c
i
a
,
a
n
d
V
.
C
h
a
n
g
,
“
S
e
c
u
r
i
n
g
d
i
s
t
r
i
b
u
t
e
d
s
y
st
e
ms:
a
s
u
r
v
e
y
o
n
a
c
c
e
ss
c
o
n
t
r
o
l
t
e
c
h
n
i
q
u
e
s
f
o
r
c
l
o
u
d
,
b
l
o
c
k
c
h
a
i
n
,
I
o
T
a
n
d
S
D
N
,
”
C
y
b
e
r
S
e
c
u
ri
t
y
a
n
d
A
p
p
l
i
c
a
t
i
o
n
s
,
v
o
l
.
1
,
p
.
1
0
0
0
1
5
,
D
e
c
.
2
0
2
3
,
d
o
i
:
1
0
.
1
0
1
6
/
j
.
c
sa.
2
0
2
3
.
1
0
0
0
1
5
.
B
I
O
G
RAP
H
I
E
S O
F
AUTH
O
RS
Dr
S
u
d
h
a
k
a
r
Per
iy
a
s
a
m
y
p
ro
fe
ss
o
r,
S
C
S
E
a
t
G
a
lg
o
ti
a
s
Un
iv
e
rsit
y
.
Wi
t
h
1
9
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
,
h
e
h
o
l
d
s
a
P
h
.
D
.
fr
o
m
An
n
a
Un
iv
e
rsity
.
He
h
a
s
p
u
b
li
sh
e
d
7
p
a
ten
ts,
5
b
o
o
k
c
h
a
p
ters
,
a
n
d
2
0
re
se
a
rc
h
p
a
p
e
rs
p
u
b
l
ish
e
d
in
re
p
u
tab
le
i
n
tern
a
ti
o
n
a
l
j
o
u
r
n
a
ls
a
n
d
c
o
n
fe
re
n
c
e
s.
His
e
x
p
e
rti
se
in
c
l
u
d
e
s
n
e
two
r
k
s,
c
y
b
e
r
se
c
u
rit
y
,
c
lo
u
d
c
o
m
p
u
ti
n
g
,
a
n
d
m
a
c
h
in
e
lea
rn
in
g
.
He
c
a
n
b
e
c
o
n
t
a
c
ted
a
t
e
m
a
il
:
p
.
su
d
h
a
k
a
r@g
a
l
g
o
ti
a
su
n
iv
e
rsit
y
.
e
d
u
.
i
n
.
Vija
y
a
la
k
s
h
m
i
Al
a
g
a
r
sa
m
y
a
ss
istan
t
p
r
o
fe
ss
o
r
in
c
o
m
p
u
ter
sc
ien
c
e
a
n
d
e
n
g
in
e
e
rin
g
a
t
Ch
e
n
n
a
i
In
st
it
u
te
o
f
Tec
h
n
o
lo
g
y
,
h
o
ld
s
1
1
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
a
n
d
i
s
p
u
rsu
i
n
g
a
P
h
.
D
.
in
c
o
m
p
u
ter
sc
i
e
n
c
e
a
n
d
e
n
g
in
e
e
rin
g
a
t
An
n
a
U
n
iv
e
rsity
.
Wi
th
a
n
M
.
E
.
C
S
E
fo
rm
An
n
a
Un
iv
e
rsit
y
,
sh
e
h
a
s
p
u
b
l
ish
e
d
1
p
a
ten
t
a
n
d
1
re
se
a
rc
h
p
a
p
e
r,
sp
e
c
ializin
g
in
n
e
two
rk
s
a
n
d
se
c
u
rit
y
,
n
o
n
-
li
n
e
a
r
d
y
n
a
m
ics
,
a
n
d
m
a
c
h
in
e
lea
rn
in
g
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
v
ij
iala
g
a
rsa
m
y
1
9
9
1
@
g
m
a
il
.
c
o
m
.
Dr
.
Pa
la
n
i
L
a
th
a
p
ro
fe
ss
o
r
in
De
p
a
rtme
n
t
o
f
I
n
fo
rm
a
ti
o
n
Tec
h
n
o
lo
g
y
a
t
P
a
n
ima
lar
En
g
in
e
e
rin
g
Co
ll
e
g
e
,
a
c
c
u
m
u
latin
g
2
5
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
S
h
e
e
a
rn
e
d
h
e
r
Ph
.
D
.
re
c
o
rd
with
4
p
a
ten
ts,
a
n
d
2
0
re
se
a
rc
h
p
a
p
e
rs
p
u
b
li
s
h
e
d
i
n
e
ste
e
m
e
d
in
ter
n
a
ti
o
n
a
l
jo
u
r
n
a
ls
a
n
d
c
o
n
fe
re
n
c
e
s.
He
r
e
x
p
e
rti
se
sp
a
n
s
wire
les
s
a
d
-
h
o
c
n
e
two
rk
s
,
I
o
T
a
n
d
a
rti
ficia
l
in
telli
g
e
n
c
e
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
lath
a
8
2
0
1
@
g
m
a
il
.
c
o
m
.
Dr
.
K
a
r
u
p
p
ia
h
T
a
m
il
a
r
a
si
a
ss
o
c
iate
p
ro
fe
ss
o
r
i
n
De
p
a
rtm
e
n
t
o
f
In
f
o
rm
a
ti
o
n
Tec
h
n
o
l
o
g
y
a
t
P
a
n
ima
lar
En
g
in
e
e
rin
g
Co
ll
e
g
e
,
a
c
c
u
m
u
lati
n
g
2
4
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
S
h
e
e
a
rn
e
d
h
e
r
P
h
.
D
.
re
c
o
rd
wit
h
7
p
a
ten
ts,
5
b
o
o
k
c
h
a
p
ters
,
a
n
d
2
1
re
se
a
rc
h
p
a
p
e
rs
p
u
b
li
s
h
e
d
i
n
e
ste
e
m
e
d
in
te
rn
a
ti
o
n
a
l
jo
u
rn
a
ls
a
n
d
c
o
n
fe
re
n
c
e
s.
He
r
e
x
p
e
rti
se
sp
a
n
s
c
y
b
e
r
se
c
u
rit
y
,
n
e
two
r
k
s,
c
l
o
u
d
c
o
m
p
u
ti
n
g
,
a
n
d
m
a
c
h
in
e
lea
rn
i
n
g
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
a
t
e
m
a
il
:
th
a
m
izh
a
n
n
a
@g
m
a
il
.
c
o
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.
I
SS
N
:
2
2
5
2
-
8
7
7
6
I
n
t J I
n
f
&
C
o
m
m
u
n
T
ec
h
n
o
l
,
Vo
l.
1
5
,
No
.
1
,
Ma
r
ch
20
2
6
:
31
3
-
32
2
322
Dr
.
Th
e
n
m
o
z
h
i
El
u
m
a
la
i
is
a
p
r
o
fe
ss
o
r
i
n
th
e
De
p
a
rtme
n
t
o
f
I
n
fo
rm
a
ti
o
n
Tec
h
n
o
l
o
g
y
a
t
P
a
n
ima
lar
En
g
in
e
e
rin
g
Co
ll
e
g
e
.
Wi
t
h
2
2
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
,
sh
e
h
o
l
d
s
a
P
h
.
D
.
a
n
d
h
a
s
a
u
th
o
re
d
7
p
a
ten
ts,
8
b
o
o
k
c
h
a
p
ters
,
a
n
d
2
2
r
e
se
a
rc
h
p
a
p
e
rs
in
re
n
o
wn
e
d
in
tern
a
ti
o
n
a
l
j
o
u
r
n
a
ls
a
n
d
c
o
n
fe
re
n
c
e
s.
He
r
a
re
a
s
o
f
e
x
p
e
rti
se
in
c
lu
d
e
c
y
b
e
r
se
c
u
rit
y
,
n
e
two
rk
s
,
a
n
d
m
a
c
h
in
e
lea
rn
i
n
g
.
S
h
e
c
a
n
b
e
c
o
n
tac
ted
at
e
m
a
il
:
e
th
e
n
m
o
z
h
i
2
2
.
p
e
c
@g
m
a
il
.
c
o
m
.
Pra
b
u
K
a
l
iy
a
p
e
r
u
m
a
l
a
ss
ist
a
n
t
p
r
o
fe
ss
o
r
in
S
c
h
o
o
l
o
f
C
o
m
p
u
ter
S
c
ien
c
e
a
n
d
En
g
i
n
e
e
rin
g
a
t
G
a
lg
o
ti
a
s
Un
i
v
e
rs
it
y
,
h
a
s
1
6
y
e
a
rs
o
f
tea
c
h
in
g
e
x
p
e
rien
c
e
.
Cu
rre
n
tl
y
p
u
rsu
in
g
a
P
h
.
D
.
,
h
e
h
o
ld
s
a
n
M
.
Tec
h
.
in
C
S
E
fro
m
S
R
M
Un
i
v
e
rsity
a
n
d
M
BA
fro
m
An
n
a
Un
i
v
e
rsity
.
He
h
a
s
p
u
b
li
sh
e
d
4
p
a
ten
ts,
2
b
o
o
k
c
h
a
p
ters
,
a
n
d
1
5
re
se
a
rc
h
p
a
p
e
rs
in
in
tern
a
ti
o
n
a
l
jo
u
rn
a
l
s
a
n
d
c
o
n
fe
re
n
c
e
s.
His
e
x
p
e
rti
se
in
c
lu
d
e
s
c
y
b
e
r
se
c
u
rit
y
,
n
e
tw
o
rk
s,
c
lo
u
d
c
o
m
p
u
ti
n
g
a
n
d
m
a
c
h
in
e
lea
rn
in
g
.
He
c
a
n
b
e
c
o
n
t
a
c
ted
a
t
e
m
a
il
:
m
e
g
a
.
p
ra
b
u
@g
m
a
il
.
c
o
m
.
Evaluation Warning : The document was created with Spire.PDF for Python.