SlideShare a Scribd company logo
1 of 24
A	Big	Data	Analytic	Identity	
Management	Expert	System	for	
Social	Media	Networks
K.D.B.H.	Subasinghe		S.R.	Kodithuwakku
Department	of	Statistics	and	Computer	
Science,	
Faculty	of	Science,	
University	of	Peradeniya	
Peradeniya,	
Sri	Lanka
E- mail	:	buddhimahs@hotmail.com
“Identity theft is like true love….
You never think it will happen to you.”
Johnny	Corn
Agenda
• Introduction
• Identity	Management	in	Social	Media
• Our	Approach
• Methodology
• Results
• Conclusion	and	Future	Work
• References
Introduction
• Explosive	Growth	
of	social	media
• Privacy	/	Security	
at	a	Risk	?
• Need	for	Identity	
Management
Identity	Management	in	Social	Media
The	Need
NETWORKS???
• 83M Facebook profiles	fake
• 65M LinkedIn Passwords	at	risk	AND	30,000	passwords	
cracked
• Cyber	Theft	hacked	24	M	Zappos/Amazon Customers
• 1.5	M	eHarmony Passwords	
stolen	in	2002
• 1.5	M	credit	card	
numbers		STOLEN	in	2014
Identity	Management	in	Social	Media
Current	Status
• User	Credential	based	Identity	management	system
[Brian	Soeder	et	al(2015)]
• Encryption and	multi-factor authentication followed	by	a	
cryptographic	methods	for	user	authentication
[G.-J.	Ahn	et	al(2009)]
• Game theoretic approaches	
to	reputation	and	trust
[K.	C.	Nguyen	et	al(2010)]
• Several	studies	on	e-commerce	
not	on	user	behavior	of	social	
networks [A.	Rabkin	et	al	2008]
Identity	Management	in	Social	Media
Research	Gap
• Observing usage data for identity management by the
network operator violates user privacy
• This has retarded the development of effective identity
management systems in social media
• There’s a research gap to come up with effective and
robust identity management systems without violating
user privacy rights.
Our	Approach
• We	propose	to	develop	an	evolving	Hidden	Markov	Model
(HMM)	for	each	user	at	network	operator’s	end.
• HMM	model	is	dynamically	updated	as	and	when	a	user	
browses	the	social	media	network	to	capture	his	usage	
character.
• User	activity	sequence	from	login	to	logout	is	checked	against	
his	typical	usage	behavior to	identify	illegitimate	user.
“A person can never be understood by his words,
but by his actions.”
MethodologyMethodology
Methodology
User	Behavior	HMM	model
• Here	mainly	there	is	only	one	prominent	state
• Subsequent		to	user	activity,	brings	him	back	to	the	original	
state
• Depending	on	the	user	character,	he	may	perform	respective	
activities	to	more	or	less	extent
• Transition	probabilities	of	these	user	activities	are	dynamically	
updated	with	usage
Methodology
User	Behavior	HMM	model
Activity Count Transition Probability
A1 10 P1 = 10/102
A2 13 P2 = 13/102
.
A68
.
7
.
P68	=	7/102
Sum 102 1.0
Methodology
HMM	model	– Transition	Probabilities
Methodology
No	of	Activities	logged 10
Sequence	of	Activities	per	user	login A30,A1,A5,A4…..
PT	 =	Probability	of	sequence	of	activities PT =	P30.P1.P5.P4
Mean	Transition	Probability	:	
X	=	[∏ 𝑃	 i 		(𝑞 → 𝑞`)],/..
/0, PM=		(PT)^1/N
Behavioral	Legitimacy	Index	(BLI)	
Mean	(PM)	=	µ			 ;					STD	(PM)		=	𝜎 BLI	=	𝑒𝑥𝑝((−(PM − µ)	7/2𝜎7)
Methodology
HMM	model	
Behavioral	Legitimacy	Index
Methodology
HMM	model	
Behavioral	Legitimacy	Index
Distribution	of		X	for	a	typical	user
We	observe	that	the	Mean	Transition	Probability	(X)	is	
approximately	normally	distributed
MethodologyMethodology
Login	Time	Deviation
K	Means	Clustering
• Naturally users have prominent characteristic login times during
the day
• Time deviation from a prominent login time is related to
legitimacy
Methodology
Neuro-Fuzzy	Classifier
The	Neuro-Fuzzy	Model
• Login time deviation and
User Behavioral Legitimacy
as inputs
• Three membership functions
for each input
• Nine Fuzzy rules
• Model generated using
Mathlab Fuzzy Logic toolbox
Methodology
Training	Neuro-Fuzzy	Classifier
• 5-6 years	of	usage	data	from	3 different	users
• 24 event	sequences	per	user	extracted	per	activity	log	
resulting	24x3=72 legitimate	event	sequences.	
• Each	24 legitimate	event	sequence	of	a	user	applied	in	the	
HMM	models	of	the	other	two	users	to	generate	2x24x3=144
event	sequences	considered	illegitimate.	
• Therefore,	in	total	72+144	=	216	data	points	for	our	analysis.
Results
• The	HMM	user	behavioural	model	alone	gives	an	accuracy	of	
73.61%	in	detecting	authorized	users
• 71.33%	accuracy	in	detecting	unauthorized	users.
• Overall	precision	of	detecting	right	user	
(legitimate/illegitimate)	is	72.1%
• false	positive	rate of 8.83%
• false	negative	rate of 19.07%
Results
Final	Legitimacy	of	Users	from	
Neuro-Fuzzy	Inferencing
• Overall	precision	of	detecting	right	user	is 76.85%,	
• false	positive	rate	of	10.65%	
• false	negative	rate	of	12.5%.
Results
Final	Distribution	of		Valid	and
Invalid	User
• Accuracy	of	identifying	a	legitimate	user - 84%	
• Accuracy	in	identifying	an illegitimate	user - 62.5%
• Illegitimate	users	undetected	 - 37.5%	
• Legitimate users	detected	illegitimate												- 15.97%
Conclusion	and	Future	Work
• A	novel	analytical	method	for	detecting	unauthorised	access	
of	computer	resources	is	developed
• Developed	a	novel	mechanism	to	monitor	social	media	user	
activities	without	violating	their	privacy	rights
• This	principle	can	be	applied	to	any	web-based	application	
which	require	user	identification	based	on	his	activities	
performed.
• This	research	being	extended	to	monitor	user	generated	text	
in	web	applications	to	carry	out	NLP	based	contextual	analysis	
to	moderate	content.
Conclusion	and	Future	Work
References
• Kaplan,	Andreas	M.	and	Haenlein,	Michael.	(2010).	Users	of	the	world,	unite!	The	challenges	and	opportunities	of	Social	
Media.	Business	Horizons,	53,	59-68.	
• R.Schullich,”Risk	Assessment	of	Social	Media”	GIAC	(GSEC)	Gold	Certification,	December	5th
2011
• The	Guardian	,	available	at	http://www.theguardian.com/technology/2012/aug/02/facebook-83m-profiles-bogus-fake
• Krog,A.(1998),	“An	Introduction	to	hidden	Markov	models	for	biological	sequences”,Computational	Methods	in	Molecular	
Biology,	pp.	45-63,	Elsevier
• S.S.	Joshi	and	V.V	Phoha,	‘Investigating	Hidden	Markov	Models	Capabilities	in	Anomaly	Detection,”	Proc.	43rd
ACM	Ann.	
Southeast	Regional	Conf.,vol.	1,	pp.45-55,	2014.
• S.	Blake,	D.L.	Black,	M.A.	Carlson,	E.	Davies,	Z.	Wang,W.Weiss,	“An	Architecture	for	Differentiated	Services,”	RFC2475,	
Internet	Engineering	Task	Force,	Network	Working	Group,	December	1998.	Category:	
Informational.http://www.ietf.org/html.charters/diffserv-charter.html.
• A.	Cabrera,	S.	Sánchez-Solano,	P.	Brox,	A.	Barriga,	R.Senhadji.	“Hardware/Software	Codesign	of	Configurable	FuzzyControl	
Systems”.	Applied	Soft	Computing,	Vol.	4,	n.	3,	pp.271-285,	December	2014.
• H.C.	Cho,	M.S.	Fadali,	H.	Lee,	“Dynamic	Queue	Scheduling	using	Fuzzy	Systems	for	Internet
• Routers,”	IEEE	International	Conference	on	Fuzzy	Systems	(FUZZ-IEEE)	2005,	Reno,	USA,May	2013.
• Cisco	Systems,	Inc.	“Cisco	Series	12000	router	performance	evaluation.	2005.http://www.cisco.com
• G.-J.	Ahn,	M.	Ko,	and	M.	Shehab.	Privacy-enhanced	user-centric	identity	management.	In	IEEE	International	Conference	on	
Communications,	pages	1–5,	2009.
• A.	Rabkin.	Personal	knowledge	questions	for	fallback	authentication:	security	questions	in	the	era	of	Facebook.	In	SOUPS	
’08:	Proc.	of	the	4th	symposium	on	Usable	privacy	and	security,	pages	13–23,	New	York,	NY,	USA,	2008.
• T.	W.	van	der Horst	and	K.	E.	Seamons.	Simple	authentication	for	the	web.	In	WWW	’07:	Proc.	of	the	16th	international	
conference	on	World	Wide	Web,	pages	1217–1218,	New	York,	NY,	USA,	2007.	ACM.
• P.	J.	Windley,	D.	Daley,	B.	Cutler,	and	K.	Tew.	Using	reputation	to	augment	explicit	authorization.	In	DIM	’07:	Proc.	of	the	2007	
ACM		workshop	on	Digital	identity	management,	pages	72–81,	New	York,	NY,USA,	2007.	ACM.
• S.	Kruk,	S.	Grzonkowski,	A.	Gzella,	T.	Woroniecki,	and	H.-C.	Choi.	D-foaf:	Distributed	identity	management	with	access	rights	
delegation.	In	The	Semantic	Web	– ASWC	2006,	volume	4185	of	Lecture	Notesin Computer	Science,	chapter	15,	pages	140–
154.	Springer	Berlin	Heidelberg,	2006.
• K.	Aberer and	Z.	Despotovic.	On	reputation	in	game	theory	applicationon online	settings,	2004.	U.	D.	Farzad Salim,	Jason	
Reid	and	E.	Dawson.	Towards	a	game	theoretic	authorisation	model.	In	Proc.	of	the	1st	IEEE	Conference	on	Decision	and	
Game	Theory	for	Security,	2010.
Thank	you	!

More Related Content

Similar to A Big Data Analytic Identity Management Expert System for Social Media Networks

Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJim Bouse
 
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillarsResponsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillarsSofus Macskássy
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AIKeita Broadwater
 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6APNIC
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageTogar Simatupang
 
EDUCAUSE 2018: Verifiable Digital Records and the Blockchain
EDUCAUSE 2018: Verifiable Digital Records and the BlockchainEDUCAUSE 2018: Verifiable Digital Records and the Blockchain
EDUCAUSE 2018: Verifiable Digital Records and the BlockchainChris Jagers
 
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptEDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptPreethamS41
 
Big data psychology
Big data psychology Big data psychology
Big data psychology Cogeco Peer 1
 
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...Jeffrey Nichols
 
University Single Constituent View Repository ( SCoRe)
University Single Constituent View Repository ( SCoRe)University Single Constituent View Repository ( SCoRe)
University Single Constituent View Repository ( SCoRe)Hemant Verma
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021andygustafson
 
Educating Problem-Solvers for Our Emerging Digital Ecosystem
Educating Problem-Solvers for Our Emerging Digital EcosystemEducating Problem-Solvers for Our Emerging Digital Ecosystem
Educating Problem-Solvers for Our Emerging Digital EcosystemRebecca Davis
 
Role of Biometric in Reducing the Size of Big Data
Role of Biometric in Reducing the Size of Big DataRole of Biometric in Reducing the Size of Big Data
Role of Biometric in Reducing the Size of Big DataManish Mathuria
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneInflection Point Global
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesKavitha Gupta, CIPP-Asia
 
The Secret to Digital Strategy Success
The Secret to Digital Strategy SuccessThe Secret to Digital Strategy Success
The Secret to Digital Strategy SuccessIAB Canada
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferMAX Technical Training
 

Similar to A Big Data Analytic Identity Management Expert System for Social Media Networks (20)

Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online vJbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
Jbouse EM Comms Big Data Laptop v AACRAO Webinar 150402v1 online v
 
Responsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillarsResponsible Data Use in AI - core tech pillars
Responsible Data Use in AI - core tech pillars
 
How to Enhance Your Career with AI
How to Enhance Your Career with AIHow to Enhance Your Career with AI
How to Enhance Your Career with AI
 
Social mediav1.0
Social mediav1.0Social mediav1.0
Social mediav1.0
 
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6Observations on Social Engineering presentation by Warren Finch for LkNOG 6
Observations on Social Engineering presentation by Warren Finch for LkNOG 6
 
Reputation based model for decision making in the digital age
Reputation based model for decision making in the digital ageReputation based model for decision making in the digital age
Reputation based model for decision making in the digital age
 
EDUCAUSE 2018: Verifiable Digital Records and the Blockchain
EDUCAUSE 2018: Verifiable Digital Records and the BlockchainEDUCAUSE 2018: Verifiable Digital Records and the Blockchain
EDUCAUSE 2018: Verifiable Digital Records and the Blockchain
 
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.pptEDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
EDUCAUSE_SEC10_Apr2010_Fed_Seminar_Final.ppt
 
Cyber bullying
Cyber bullyingCyber bullying
Cyber bullying
 
Big data psychology
Big data psychology Big data psychology
Big data psychology
 
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
CHI 2014 Panel: Opportunities and Risks of Discovering Personality Traits fro...
 
Do it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 PresentationDo it Best Corp. Techapalooza 2014 Presentation
Do it Best Corp. Techapalooza 2014 Presentation
 
University Single Constituent View Repository ( SCoRe)
University Single Constituent View Repository ( SCoRe)University Single Constituent View Repository ( SCoRe)
University Single Constituent View Repository ( SCoRe)
 
Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021Big Data Ethics Cjbe july 2021
Big Data Ethics Cjbe july 2021
 
Educating Problem-Solvers for Our Emerging Digital Ecosystem
Educating Problem-Solvers for Our Emerging Digital EcosystemEducating Problem-Solvers for Our Emerging Digital Ecosystem
Educating Problem-Solvers for Our Emerging Digital Ecosystem
 
Role of Biometric in Reducing the Size of Big Data
Role of Biometric in Reducing the Size of Big DataRole of Biometric in Reducing the Size of Big Data
Role of Biometric in Reducing the Size of Big Data
 
Social Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:OneSocial Network Privacy, Security and Identity:One
Social Network Privacy, Security and Identity:One
 
Smart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and StrategiesSmart Cities in India: Privacy & Security Concerns and Strategies
Smart Cities in India: Privacy & Security Concerns and Strategies
 
The Secret to Digital Strategy Success
The Secret to Digital Strategy SuccessThe Secret to Digital Strategy Success
The Secret to Digital Strategy Success
 
Is Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson HelferIs Your Company's Data Secure? Shelley Vinson Helfer
Is Your Company's Data Secure? Shelley Vinson Helfer
 

More from APNIC

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024APNIC
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGAPNIC
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119APNIC
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119APNIC
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119APNIC
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119APNIC
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119APNIC
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...APNIC
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonAPNIC
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonAPNIC
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPNIC
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6APNIC
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!APNIC
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023APNIC
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAPNIC
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAPNIC
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAPNIC
 

More from APNIC (20)

DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
DDoS In Oceania and the Pacific, presented by Dave Phelan at NZNOG 2024
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
Networking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOGNetworking in the Penumbra presented by Geoff Huston at NZNOG
Networking in the Penumbra presented by Geoff Huston at NZNOG
 
IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119IP addressing and IPv6, presented by Paul Wilson at IETF 119
IP addressing and IPv6, presented by Paul Wilson at IETF 119
 
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119draft-harrison-sidrops-manifest-number-01, presented at IETF 119
draft-harrison-sidrops-manifest-number-01, presented at IETF 119
 
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
Making an RFC in Today's IETF, presented by Geoff Huston at IETF 119
 
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
IPv6 Operational Issues (with DNS), presented by Geoff Huston at IETF 119
 
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
Is DNS ready for IPv6, presented by Geoff Huston at IETF 119
 
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
Benefits of doing Internet peering and running an Internet Exchange (IX) pres...
 
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
APNIC Update and RIR Policies for ccTLDs, presented at APTLD 85
 
NANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff HustonNANOG 90: 'BGP in 2023' presented by Geoff Huston
NANOG 90: 'BGP in 2023' presented by Geoff Huston
 
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff HustonDNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
DNS-OARC 42: Is the DNS ready for IPv6? presentation by Geoff Huston
 
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, ThailandAPAN 57: APNIC Report at APAN 57, Bangkok, Thailand
APAN 57: APNIC Report at APAN 57, Bangkok, Thailand
 
Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6Lao Digital Week 2024: It's time to deploy IPv6
Lao Digital Week 2024: It's time to deploy IPv6
 
AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!AINTEC 2023: Networking in the Penumbra!
AINTEC 2023: Networking in the Penumbra!
 
CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023CNIRC 2023: Global and Regional IPv6 Deployment 2023
CNIRC 2023: Global and Regional IPv6 Deployment 2023
 
AFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet developmentAFSIG 2023: APNIC Foundation and support for Internet development
AFSIG 2023: APNIC Foundation and support for Internet development
 
AFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment StatusAFNOG 1: Afghanistan IP Deployment Status
AFNOG 1: Afghanistan IP Deployment Status
 
AFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressingAFSIG 2023: Internet routing and addressing
AFSIG 2023: Internet routing and addressing
 

Recently uploaded

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girladitipandeya
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Deliverybabeytanya
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Dana Luther
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012rehmti665
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirtrahman018755
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsThierry TROUIN ☁
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一Fs
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Personfurqan222004
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girlsstephieert
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Roomishabajaj13
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escortsindian call girls near you
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdfkeithzhangding
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneCall girls in Ahmedabad High profile
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 

Recently uploaded (20)

VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call GirlVIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
VIP 7001035870 Find & Meet Hyderabad Call Girls LB Nagar high-profile Call Girl
 
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Saket Delhi 💯Call Us 🔝8264348440🔝
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on DeliveryCall Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
Call Girls In Mumbai Central Mumbai ❤️ 9920874524 👈 Cash on Delivery
 
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
Packaging the Monolith - PHP Tek 2024 (Breaking it down one bite at a time)
 
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
Call Girls South Delhi Delhi reach out to us at ☎ 9711199012
 
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya ShirtChallengers I Told Ya Shirt
Challengers I Told Ya ShirtChallengers I Told Ya Shirt
 
AlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with FlowsAlbaniaDreamin24 - How to easily use an API with Flows
AlbaniaDreamin24 - How to easily use an API with Flows
 
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
定制(UAL学位证)英国伦敦艺术大学毕业证成绩单原版一比一
 
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
Call Girls in Uttam Nagar Delhi 💯Call Us 🔝8264348440🔝
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Complet Documnetation for Smart Assistant Application for Disabled Person
Complet Documnetation   for Smart Assistant Application for Disabled PersonComplet Documnetation   for Smart Assistant Application for Disabled Person
Complet Documnetation for Smart Assistant Application for Disabled Person
 
Russian Call girls in Dubai +971563133746 Dubai Call girls
Russian  Call girls in Dubai +971563133746 Dubai  Call girlsRussian  Call girls in Dubai +971563133746 Dubai  Call girls
Russian Call girls in Dubai +971563133746 Dubai Call girls
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With RoomVIP Kolkata Call Girl Salt Lake 👉 8250192130  Available With Room
VIP Kolkata Call Girl Salt Lake 👉 8250192130 Available With Room
 
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our EscortsCall Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
Call Girls in East Of Kailash 9711199171 Delhi Enjoy Call Girls With Our Escorts
 
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
象限策略:Google Workspace 与 Microsoft 365 对业务的影响 .pdf
 
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service ThaneRussian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
Russian Call Girls Thane Swara 8617697112 Independent Escort Service Thane
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 

A Big Data Analytic Identity Management Expert System for Social Media Networks