University Library, University of Illinois at Urbana-Champaign

The items in the Digital Collections of the University of Illinois Urbana-Champaign Library contain materials which represent or depict sensitive topics or were written from perspectives using outdated or biased language. The Library condemns discrimination and hatred on any grounds. As a research library that supports the mission and values of this land grant institution, it is incumbent upon the University Library to preserve, describe, and provide access to materials to accurately document our past, support learning about it, and effect change in the present. In accordance with the American Library Association’s Freedom to Read statement, we do not censor our materials or prevent patrons from accessing them.

If you have questions regarding this statement or any content in the Library’s digital collections, please contact digitalcollections@lists.illinois.edu

American Library Association’s Freedom to Read Statement

Diversity, Equity, Inclusion and Accessibility at the University Library
Service
Creator
Subject
Repository
Showing 1,601–1,640 of 54,797 items
  • Session Management for Accountability in Distributed Multimedia Services
    Scholarship
    Creator
    Conner, William G.
    Description
    Internet-based multimedia applications (e.g., voice-over-IP, instant messaging, and video conferencing) are continuing to grow in importance as more people depend on such applications for personal and professional communications. Although performance is almost always a concern with multimedia systems that must satisfy quality-of-service (QoS) constraints, security is also a major requirement given the increasing criticality of such applications. For example, businesses might depend on Internet telephony to reach customers while governments might depend on video streaming to disseminate information. For distributed multimedia services, in addition to the traditional security properties (confidentiality, integrity, and availability), accountability is also important to complement perimeter defenses. Accounting for user actions within the system enables the development of higher-level security services. This dissertation will present the Kantoku framework, which includes several different accounting mechanisms for different environments ranging from single servers to server clusters to computing clouds. Our framework focuses on distributed multimedia services deployed in such environments. In particular, we will show how our Kantoku framework can be used to address the problem of transaction state overload on multimedia servers. The primary attack that we consider throughout this dissertation is a novel denial-of-service attack that intentionally induces transaction state overload at multimedia servers. We refer to this attack as a Ringing-based denial-of-service attack. Unlike many denial-of-service attacks that rely on an increase in the incoming traffic rate, a Ringing-based denial-of-service attack only requires an increase in the transaction durations while the incoming traffic rate does not change. Such attacks cannot be detected by protection mechanisms that monitor the network traffic for anomalies. After briefly explaining some background information on the Session Initiation Protocol, we characterize transaction state accumulation during a Ringing-based denial-of-service attack both mathematically and empirically through extensive experiments. The first solution to preventing transaction state overload that we present is a family of early termination algorithms that selectively terminate transactions suspected of causing transaction state overload in multimedia servers. This protection mechanism relies on per-transaction accounting at a single server. The three algorithms that we developed are thoroughly evaluated in the context of Ringing-based denial-of-service attacks with experiments on a local testbed. As an alternative to early termination, we also developed two admission control algorithms that selectively reject transaction requests from users suspected of consuming more than their fair share of transaction resources among a group of multimedia servers. This protection mechanism relies on per-client accounting across a cluster of multimedia servers. The two algorithms that we developed are thoroughly evaluated in the context of Ringing-based denial-of-service attacks with experiments on a local testbed. For service-oriented environments, we developed a distributed accounting architecture to implement accountability for distributed multimedia services. Specifically, our accounting architecture considers per-client monitoring for accounting across a potentially large number of nodes that are geographically distributed across a wide area network. Using the distributed accounting architecture, we built a reputation-based trust management framework that allows distributed multimedia services to share and retrieve relevant trust information that can be applied to their server-side access control decisions in a customized fashion. We briefly explain how the Ringing-based denial-of-service attack problem can be reduced to a reputation-based trust management problem. We also evaluate the performance of the implementation of our trust management framework both in terms of throughput and latency. This dissertation makes contributions in three major areas. The first area is the introduction and detailed analysis of the Ringing-based denial-of-service attack, which is a type of malicious transaction state overload that targets multimedia servers running the Session Initiation Protocol. The second area includes early termination and admission control algorithms for specifically mitigating the effects of Ringing-based denial-of-service attacks. The final area includes our distributed accounting architecture and the reputation-based trust management system that uses this accounting architecture. Although our accounting architecture and reputation-based trust management system are applicable to many general problems related to accountability, we consider how they can be applied to the problem of Ringing-based denial-of-service attacks.
  • Three essays on energy economics: Policy options and evaluation
    Scholarship
    Creator
    Ta, Chi Lan
    Description
    My dissertation evaluates the effectiveness of energy policies designed to mitigate emissions from energy production and to promote renewable energy. It also explains key factors that determine both the magnitude and the direction of each policy's effects on various economic and environmental outcomes. It consists of three chapters with studies in the context of both developed and developing countries. Rebates that reward economic agents if they meet a minimum conservation threshold are a popular policy to encourage energy conservation. However, most threshold-based rebates are structured such that they do not encourage reduction beyond the threshold. In the first chapter of my dissertation, I show theoretically that programs with the additional feature that households compete to win rebates can effectively encourage further conservation among those who can meet the threshold reduction. The theory also identifies factors that determine the effectiveness of the program. I then exploit a unique confidential dataset of monthly residential electricity use with over 45 million observations to estimate the overall effect of a Vietnamese electricity rebate program with this competitive element. Next, I empirically test the model's predictions. I find that the program reduces electricity consumption by 18%, nearly double the threshold level of 10%. Interestingly, the program's effect persists for at least twelve months after it ends, which has important implications for the cost-effectiveness of such interventions. The second chapter of my dissertation studies the effects of tightening renewable energy standards on carbon dioxide emissions and renewable generation. My co-author and I first use an analytical general equilibrium model to explain why tightening a state's Renewable Portfolio Standard (RPS) unambiguously reduces carbon dioxide emissions but has ambiguous effects on renewable energy development. Second, it shows how the direction and magnitude of the effects of tightening the RPS on both carbon emissions and renewable deployment depend on key factors such as the state's endowment of intermittent resources like wind and solar potential as well as non-intermittent resources like geothermal or hydropower potential. Results also depend on actual renewable energy intermittency, transmission constraints, the pre-existing renewable energy requirement, each cost share parameter, and each elasticity of substitution. We use the model to generate testable hypotheses, and we use U.S. state-level data from 1990 to 2015 to test these hypotheses. My third dissertation chapter examines the rebound effect, an important concept in conservation and energy economics that measures the reduction in energy savings from energy efficiency improvements. My co-author and I construct a new general equilibrium model to derive analytical expressions that allow us to compare rebound effects from a costless technology shock (CTS) to those from a costly energy efficiency standard (EES). We decompose each total effect on the use of energy into a direct efficiency effect, direct rebound effect, and indirect rebound effect. We show which factors determine the sign and magnitude of each. Rebound from a CTS is generally positive, as in prior literature, but we also show how a pre-existing EES can negate the direct energy savings from the CTS – leaving only the positive rebound effect on energy use. Then we analyze increased stringency of an EES, and we show exactly when the increased costs reverse the sign of rebound. Using plausible parameter values in this model, we find that indirect effects can outweigh the direct effects captured in partial equilibrium models, and that the total rebound from a costly EES can be negative.