A Blockchain-Based Anomalous Detection System for Internet of Things Devices Joshua K

Total Page:16

File Type:pdf, Size:1020Kb

A Blockchain-Based Anomalous Detection System for Internet of Things Devices Joshua K Air Force Institute of Technology AFIT Scholar Theses and Dissertations Student Graduate Works 3-22-2019 A Blockchain-Based Anomalous Detection System for Internet of Things Devices Joshua K. Mosby Follow this and additional works at: https://scholar.afit.edu/etd Part of the Digital Communications and Networking Commons, and the Information Security Commons Recommended Citation Mosby, Joshua K., "A Blockchain-Based Anomalous Detection System for Internet of Things Devices" (2019). Theses and Dissertations. 2275. https://scholar.afit.edu/etd/2275 This Thesis is brought to you for free and open access by the Student Graduate Works at AFIT Scholar. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of AFIT Scholar. For more information, please contact [email protected]. A BLOCKCHAIN-BASED ANOMALOUS DETECTION SYSTEM FOR INTERNET OF THINGS DEVICES THESIS Joshua K. Mosby, Captain, USAF AFIT-ENG-MS-19-M-047 DEPARTMENT OF THE AIR FORCE AIR UNIVERSITY AIR FORCE INSTITUTE OF TECHNOLOGY Wright-Patterson Air Force Base, Ohio DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. The views expressed in this thesis are those of the author and do not reflect the official policy or position of the United States Air Force, Department of Defense, or the United States Government. This material is declared a work of the U.S. Government and is not subject to copyright protection in the United States. AFIT-ENG-MS-19-M-047 A BLOCKCHAIN-BASED ANOMALOUS DETECTION SYSTEM FOR INTERNET OF THINGS DEVICES THESIS Presented to the Faculty Department of Electrical and Computer Engineering Graduate School of Engineering and Management Air Force Institute of Technology Air University Air Education and Training Command In Partial Fulfillment of the Requirements for the Degree of Master of Science in Cyber Operations Joshua K. Mosby, BS Captain, USAF March 2019 DISTRIBUTION STATEMENT A. APPROVED FOR PUBLIC RELEASE; DISTRIBUTION UNLIMITED. AFIT-ENG-MS-19-M-047 A BLOCKCHAIN-BASED ANOMALOUS DETECTION SYSTEM FOR INTERNET OF THINGS DEVICES Joshua K. Mosby, BS Captain, USAF Committee Membership: Barry E. Mullins, Ph.D., P.E. Chair Scott R. Graham, Ph.D. Member Timothy H. Lacey, Ph.D, CISSP Member AFIT-ENG-MS-19-M-047 Abstract The Internet of Things (IoT) represents a new paradigm in computing. The ability to connect everyday devices to the Internet has created a global grid of sensors, generating data that is used to boost productivity in every industry. The IoT has even entered homes, improving quality of life through smart home automation. While it provides these benefits, the IoT is under attack. Long characterized by a lack of security, particularly in terms of authentication and integrity, the IoT has become a favorite target of hackers. The last three years has witnessed the birth of the botnet, delivering never-before-seen denial of service attacks. Traditional cyber security countermeasures are either inapplicable or ineffective, leaving the IoT without adequate protection. IoT devices are often lightly defended and always online, making them an attractive target. However, many device owners do not realize they have been compromised, particularly when devices lack a user interface. This creates a need for an intrusion detection system: a way to alert device users to abnormal, potentially-malicious behavior. Low computing resources on IoT devices leads many researchers to segregate vulnerable devices and set up defenses on the network boundary. If devices cannot be segregated, this approach is ineffective. A device-centric security solution provides flexibility and be applicable to a larger number of scenarios. This thesis describes an anomalous-based intrusion detection system that operates directly on IoT devices. In this approach, an agent on each node compares the node's behavior to that of its peers. If these values are not in alignment, the agent generates an iv alert. Communication amongst nodes occurs using a distributed average consensus Blockchain. A new block is generated when the majority of nodes agree on a set of values. This becomes the new standard for agents on all nodes to compare against. Nodes continually communicate to reach consensus and generate new blocks, allowing this standard to flex and evolve over time. To determine the effectiveness of this detection system, an experiment is conducted. Three different code samples simulating common IoT malware are deployed against a testbed of 12 Raspberry Pi devices, which emulate IoT devices. Increasing numbers of hosts are infected until two-thirds of the network is compromised, and the detection rate is recorded for each trial. The detection system is effective at detecting malware infections, catching at least one malicious node in every trial. 52% of trials catch all infected nodes, achieving perfect detection. The average trial detection percentage is 82%. There are differences in the detection rate for the different malware types, with two above 90% and the third at 60%. This suggests that additional tailoring of the system, as well as some changes to the alert threshold, could further increase effectiveness. This research presents a low-resource, scalable anomaly detection system that is effective at detecting malware infections. This research provides insights into how Blockchain technology can be used to improve IoT security. It also deploys security mechanisms directly to IoT devices and, by comparing nodes to their peers, turns the multitude of Internet of Things devices into an asset rather than a liability. v Acknowledgments I would like to express my sincere appreciation to my faculty advisor, Dr. Barry Mullins, for his guidance and support throughout the course of this thesis effort. I would like to thank my sponsor for both the support and latitude provided to me in this endeavor. I would also like to thank my wife for her love and support during my studies. Joshua K. Mosby vi Table of Contents Page Abstract .............................................................................................................................. iv Table of Contents .............................................................................................................. vii List of Figures ......................................................................................................................x List of Tables ................................................................................................................... xiii List of Acronyms ............................................................................................................. xiv I. Introduction ....................................................................................................................1 1.1 Background...........................................................................................................1 1.2 Problem Statement................................................................................................2 1.3 Research Goals and Hypothesis ...........................................................................2 1.4 Approach ..............................................................................................................2 1.5 Assumptions/Limitations ......................................................................................3 1.6 Research Contributions ........................................................................................3 1.7 Thesis Overview ...................................................................................................4 II. Background and Related Research ................................................................................5 2.1 Chapter Overview .................................................................................................5 2.2.1 Symmetric vs Asymmetric ........................................................................ 5 2.2.2 Public Key Cryptography .......................................................................... 6 2.2.3 Digital Signatures ...................................................................................... 7 2.2.4 Hashing ...................................................................................................... 8 2.3 Distributed Systems ..............................................................................................9 2.3.1 Overview ................................................................................................... 9 2.3.2 Consensus ................................................................................................ 10 2.4 Blockchain ..........................................................................................................12 2.4.1 Overview ................................................................................................. 12 2.4.2 Bitcoin ..................................................................................................... 13 2.4.3 Other Common Blockchains ................................................................... 15 2.5 Internet of Things ...............................................................................................17 2.5.1 Overview ................................................................................................. 17 2.5.2 Security Risks .......................................................................................... 19 2.5.3 Security Countermeasures ......................................................................
Recommended publications
  • Efficient Use of Bind Variable, Cursor Sharing and Related Cursor
    Designing applications for performance and scalability An Oracle White Paper July 2005 2 - Designing applications for performance and scalability Designing applications for performance and scalability Overview............................................................................................................. 5 Introduction ....................................................................................................... 5 SQL processing in Oracle ................................................................................ 6 The need for cursors .................................................................................... 8 Using bind variables ..................................................................................... 9 Three categories of application coding ........................................................ 10 Category 1 – parsing with literals.............................................................. 10 Category 2 – continued soft parsing ........................................................ 11 Category 3 – repeating execute only ........................................................ 11 Comparison of the categories ................................................................... 12 Decision support applications................................................................... 14 Initialization code and other non-repetitive code .................................. 15 Combining placeholders and literals ........................................................ 15 Closing unused cursors
    [Show full text]
  • Where Clause in Fetch Cursors Sql Server
    Where Clause In Fetch Cursors Sql Server Roderick devote his bora beef highly or pettily after Micah poising and transmutes unknightly, Laurentian and rootless. Amplexicaul and salving Tracy still flare-up his irrefrangibleness smatteringly. Is Sasha unbeknownst or outside when co-starring some douroucouli obsecrates inappropriately? The database table in the current result set for small block clause listing variables for sql in where cursors cannot store the time or the records Cursor variable values do every change up a cursor is declared. If bounds to savepoints let hc be manipulated and where clause in cursors sql fetch values in python sql cursor, name from a single row exists in _almost_ the interfaces will block. Positioned update in where cursors sql fetch clause is faster your cursor should explain. Fetch clauses are you can process just a string as an oci for loop executes select a result set of rows. Progress makes it causes issues with numpy data from a table that. The last world of options, you least be durable there automatically. This article will cover two methods: the Joins and the Window functions. How to get the rows in where clause in cursors sql fetch server cursor follows syntax of its products and have successfully submitted the linq select. Data architecture Evaluate Data fabrics help data lakes seek your truth. Defined with nested table variables cannot completely replace statement must be done before that is outside of. Json format as sql server to our snowflake; end users are fetching and. The anchor member can be composed of one or more query blocks combined by the set operators: union all, SSRS, and I have no idea on how to solve this.
    [Show full text]
  • Sql Server Cursor for Update Example
    Sql Server Cursor For Update Example Nationalistic and melting Zorro laurelled some exclusionism so howsoever! Christos usually demagnetized luxuriously or incrassatingglaciates pedantically his ropers when sheer slovenlier and determinedly. Erny peroxides inoffensively and obstructively. Rugulose Thorstein unhallows: he Node webinar to submit feedback and cursor sql server database that they are affected by clause This can be done using cursors. The more I learn about SQL, the more I like it. The data comes from a SQL query that joins multiple tables. Is your SQL Server running slow and you want to speed it up without sharing server credentials? It appears to take several gigabytes, much more than the db for just one query. The following example opens a cursor for employees and updates the commission, if there is no commission assigned based on the salary level. This cursor provides functionality between a static and a dynamic cursor in its ability to detect changes. You can declare cursor variables as the formal parameters of functions and procedures. Cursor back if an order by row does, sql server cursor for update example. If you think that the FAST_FORWARD option results in the fastest possible performance, think again. Sometimes you want to query a value corresponding to different types based on one or more common attributes of multiple rows of records, and merge multiple rows of records into one row. According to Microsoft documentation, Microsoft SQL Server statements produce a complete result set, but there are times when the results are best processed one row at a time. How to Access SQL Server Instances From the Networ.
    [Show full text]
  • Sql Server Cursor for Update Example
    Sql Server Cursor For Update Example Muffin shoot-out his left-footers coquet adjunctly or already after Thorpe metastasizes and dematerialize girlishly, basipetal and even-minded. Walk-on Jabez enquired some Trajan after agog Ramsey schusses insipidly. Opportunistic Jule neologised obligatorily or buttling unhurtfully when Virgil is trilobed. The keyset cursors are faster than the statement uses appropriate datum, update cursor for sql server You through the first row if cursor sql server for update. Should let use cursor SQL? PLSQL Cursor for Update Example of feedback off center table f a number b varchar210 insert into f values 5'five' insert into f values 6'six' insert into f. Cursors in SQL Server What is CURSOR by Arjun Sharma. What moment can different cursor options have. How many make a T-SQL Cursor faster Stack Overflow. How that update SQL table from FoxPro cursor Microsoft. What capacity a cursor FOR safe use? PLSQL Cursors In this chapter of will prohibit the cursors in PLSQL. Relational database management systems including SQL Server are very. How too use cursor to update the Stack Overflow. PLSQL Cursor By Practical Examples Oracle Tutorial. For regular query running from certain table to view software update data whereas another table. In PLSQL what almost a difference between a cursor and a reference. DB2 UPDATE RETURNING db2 update god The DB2 Driver. Simple cursor in SQL server to update rows September 20 2014 December 23 2019 by SQL Geek Leave a Comment The blog explains a simple cursor in. How to mostly Update Cursors in SQL Server CodeProject.
    [Show full text]
  • T-SQL Cursors
    T-SQL Cursors www.tsql.info In this chapter you can learn how to work with cursors using operations like declare cursor, create procedure, fetch, delete, update, close, set, deallocate. Cursor operations Declare cursor Create procedure Open cursor Close cursor Fetch cursor Deallocate cursor Delete Update Declare cursors Declare cursor Syntax: DECLARE cursor_name CURSOR [ LOCAL | GLOBAL ] [ FORWARD_ONLY | SCROLL ] [ STATIC | KEYSET | DYNAMIC | FAST_FORWARD ] [ READ_ONLY | SCROLL_LOCKS | OPTIMISTIC ] [ TYPE_WARNING ] FOR select_query_statement [ FOR UPDATE [ OF column_name [ ,...n ] ] ] ; Declare simple cursor example: DECLARE product_cursor CURSOR FOR SELECT * FROM model.dbo.products; OPEN product_cursor FETCH NEXT FROM product_cursor; Create procedure Create procedure example: USE model; GO IF OBJECT_ID ( 'dbo.productProc', 'P' ) IS NOT NULL DROP PROCEDURE dbo.productProc; GO CREATE PROCEDURE dbo.productProc @varCursor CURSOR VARYING OUTPUT AS SET NOCOUNT ON; SET @varCursor = CURSOR FORWARD_ONLY STATIC FOR SELECT product_id, product_name FROM dbo.products; OPEN @varCursor; GO Open cursors Open cursor Syntax: OPEN { { cursor_name } | cursor_variable_name } Open cursor example: USE model; GO DECLARE Student_Cursor CURSOR FOR SELECT id, first_name, last_name, country FROM dbo.students WHERE country != 'US'; OPEN Student_Cursor; FETCH NEXT FROM Student_Cursor; WHILE @@FETCH_STATUS = 0 BEGIN FETCH NEXT FROM Student_Cursor; END; CLOSE Student_Cursor; DEALLOCATE Student_Cursor; GO Close cursors Close cursor Syntax: CLOSE { { cursor_name
    [Show full text]
  • CS 235: Introduction to Databases Queries in PSM Cursors Fetching
    Queries in PSM • The following rules apply to the use of CS 235: queries: 1. Queries returning a single value can be Introduction to Databases used in assignments 2. Queries returning a single tuple can be used Svetlozar Nestorov with INTO. 3. Queries returning several tuples can be Lecture Notes #15 used via a cursor. Cursors Fetching Tuples From a Cursor • A cursor serves as a tuple-variable that • Get next tuple: ranges over the tuples of the result of a FETCH c INTO a1, a2, …, ak; query. – a1, a2, …, ak are the attributes of the result of DECLARE c CURSOR FOR (<query>); the query of c. • Opening a cursor evaluates <query>. – c is moved to the next tuple. OPEN c; • A cursor is used by creating a loop around • Closed with CLOSE c; FETCH. End of Cursor Cursor Structure • SQL operations return status in DECLARE c CURSOR FOR… SQLSTATE (in PSM). … • FETCH returns ‘02000’ in SQLSTATE cursorLoop: LOOP … when no more tuples are found. FETCH c INTO…; • Useful declaration: IF NotFound THEN LEAVE cursorLoop; DECLARE NotFound CONDITION FOR END IF; SQLSTATE ‘02000’ … END LOOP; 1 Cursor Example Example • Write a procedure that makes free all beers BEGIN OPEN c; sold for more than $5 at Spoon. menuLoop: LOOP CREATE PROCEDURE FreeBeer() FETCH c INTO aBeer, aPrice; IF NotFound THEN LEAVE menuLoop END IF; DECLARE aBeer VARCHAR[30]; IF aPrice > 5.00 THEN DECLARE aPrice REAL; UPDATE Sells DECLARE NotFound CONDITION FOR SET price = 0 WHERE bar = ‘Spoon’ and beer = aBeer; SQLSTATE ‘02000’; END IF; DECLARE CURSOR c FOR END LOOP; SELECT beer, price FROM Sells WHERE bar = CLOSE c; ‘Spoon’; END; MySQL Routines Procedures • MySQL’s version of PSM (Persistent, CREATE PROCEDURE <name>(<arglist>) Stored Modules).
    [Show full text]
  • CURSOR MANAGEMENT in PL/SQL a Cursor Is a Private SQL Work Area That Oracle Uses to Execute SQL Statements and Store Information
    CURSOR MANAGEMENT in PL/SQL A Cursor is a private SQL work area that Oracle uses to execute SQL statements and store information. Whenever you issue a SQL statement, the Oracle server opens an area of memory in which the command is parsed and executed. This area is called a ​ Cursor . This temporary work area is used to store the data retrieved from the ​ database, and manipulate this data. A cursor can hold more than one row, but can process one row at a time. The set of rows the cursor holds is called the Active Set. ​ ​ TYPES OF CURSOR There are two types of Cursors in PL/SQL:­ (1) Implicit Cursor (2) Explicit Cursor IMPLICIT CURSOR :­ It is declared by PL/SQL implicitly when DML statements like ​ INSERT, UPDATE and DELETE statements are executed. They are also declared when a SELECT statement that returns just one row is executed. When the executable part of a PL/SQL block issues a SQL statement, PL/SQL creates an implicit cursor, which PL/SQL manages automatically. IMPLICIT CURSOR ATTRIBUTES :­ Oracle provides few attributes for implicit cursor ​ called as implicit cursor attributes to check the status of DML operations. These attributes are :­ (1) %FOUND (2) %NOTFOUND (3) %ROWCOUNT (4) %ISOPEN The status of the cursor for each of these attributes is defined in the below table :­ Attribute Return Value Example %FOUND The return value is TRUE, SQL%FOUND if the DML statements like INSERT, DELETE and UPDATE affect at least one row and if SELECT...INTO statement return at least one row. The return value is FALSE, if the DML statements like INSERT, DELETE and UPDATE do not affect any row and if SELECT ….
    [Show full text]
  • SQL Stored Routines
    11/1/2014 www.DBTechNet.org SQL Stored Routines DBTechNet workshop in Reutlingen University 2014‐11‐04 [email protected] Stored Routines for Application Logic and Business Rules End-user User Interface / user transactions Application logic Retry wrapper Retry wrapper …… Transaction Transaction Transaction Data access DBMS Stored routines procedures functions database triggers 1 11/1/2014 Procedural Languages Languages: • ISO SQL: SQL/PSM language definition 1996.. • Oracle: PL/SQL • DB2: SQL PL (SQL/PSM), PL/SQL • MySQL/MariaDB: SQL/PSM • PostgreSQL: PL/pgSQL, … • SQL Server: Transact SQL (”T‐SQL”) Used for: Stored Routines (modules, packages of), Scripting Oracle Server’s Stack of Engines and Languages packages + triggers 2 11/1/2014 Database Server Stacks SQL PL, PL/SQL, PLpgSQL, .. PL engine Oracle, MySQL, MariaDB MongoDB XQuery SQL engine engine noSQL engine Oracle, DB2, InnoDB, MyISAM, .. Storage local transaction manager engine concurrency control database database database .. Procedural Languages ‐ Control structures 3 11/1/2014 PL/SQL Control Structures by Timo Leppänen / Oracle Finland Stored Routines • Procedures : Callable ”subprograms” • Functions : User Defined Functions (UDF) Scalar and table‐valued functions extending the SQL language • Methods: Function methods of User Defined Type (UDT) objects • Triggers: Programmable constraints • Packages: (non‐standard) collections of procedures/functions 4 11/1/2014 PL/SQL Block Types by Timo Leppänen / Oracle Finland ‐ Used in scripts and compound commands by SQL‐clients PL/SQL
    [Show full text]
  • T-SQL: a Simple Example Using a Cursor
    Steve Stedman Freelance SQL Server Consultant http://stevestedman.com T-SQL: A Simple Example Using a Cursor For more information on cursors, also take a look at the free SQL query training provided by Steve Stedman. In SQL Server the cursor is a tool that is used to iterate over a result set, or to loop through each row of a result set one row at a time. It may not be the best way to work with a set of data, but if you need to loop row by agonizing row (RBAR) in a T-SQL script then a cursor is one way of doing it. Note: If you are new to SQL Server and come from an Oracle background, you should know that cursors on SQL Server are different from those on Oracle. Before creating the cursor, we will just start with a simple query that will end up being used in the cursor. Which looks something like this: 1 / 6 Steve Stedman Freelance SQL Server Consultant http://stevestedman.com Now to convert it to a cursor, instead of just a select statement. Step 1: Declare variables to hold the output from the cursor. Step 2: Declare the cursor object; Step 3: Assign the query to the cursor. Step 4: Open the cursor. Step 5: Fetch the first row. 2 / 6 Steve Stedman Freelance SQL Server Consultant http://stevestedman.com Step 5: Loop until there are no more results. In the loop print out the ID and the name from the result set and fetch the net row.
    [Show full text]
  • Pro*COBOL Programmer's Guide Is Intended for Anyone Developing New COBOL Applications Or Converting Existing Applications to Run in the Oracle9i Environment
    Pro*COBOL® Programmer's Guide Release 9.2 Part No. A96109-03 December 2003 Pro*COBOL Programmer’s Guide, Release 9.2 Part No. A96109-03 Copyright © 1996, 2003, Oracle. All rights reserved. Primary Authors: Syed Mujeed Ahmed, Jack Melnick, James W. Rawles, Neelam Singh Contributing Authors: Subhranshu Banerjee, Beethoven Cheng, Michael Chiocca, Nancy Ikeda, Maura Joglekar, Alex Keh, Thomas Kurian, Shiao-Yen Lin, Diana Lorentz, Lee Osborne, Jacqui Pons, Ajay Popat, Chris Racicot, Pamela Rothman, Simon Slack, Gael Stevens, Eric Wan Contributors: Phil Locke, Valarie Moore The Programs (which include both the software and documentation) contain proprietary information; they are provided under a license agreement containing restrictions on use and disclosure and are also protected by copyright, patent, and other intellectual and industrial property laws. Reverse engineering, disassembly, or decompilation of the Programs, except to the extent required to obtain interoperability with other independently created software or as specified by law, is prohibited. The information contained in this document is subject to change without notice. If you find any problems in the documentation, please report them to us in writing. This document is not warranted to be error-free. Except as may be expressly permitted in your license agreement for these Programs, no part of these Programs may be reproduced or transmitted in any form or by any means, electronic or mechanical, for any purpose. If the Programs are delivered to the United States Government or anyone licensing or using the Programs on behalf of the United States Government, the following notice is applicable: U.S. GOVERNMENT RIGHTS Programs, software, databases, and related documentation and technical data delivered to U.S.
    [Show full text]
  • Oracle Database: Introduction to SQL/PLSQL Accelerated
    Oracle Database: Introduction to SQL/PLSQL Accelerated CODICE DURATA PREZZO LINGUA MODALITÀ D80178GC10 5 Giorni 5.570,00€ (iva escl.) Italiano Virtual Classroom Corso in aula SCHEDULAZIONE - A Richiesta PREREQUISITI Familiarity with data processing concepts and techniques Data processing Suggested Prerequisites Previous programming experience Audience: Application Developers Data Warehouse Administrator Database Administrators Developer Forms Developer PL/SQL Developer System Analysts Technical Consultant OBIETTIVI Write SELECT statements that include queries Retrieve row and column data from tables Run data manipulation statements (DML) in Oracle Database 12c Create tables to store data Utilize views to display data Control database access to specific objects Manage schema objects Display data from multiple tables using JOIN syntax Use conditional compilation to customize the functionality in a PL/SQL application without removing any source code Design PL/SQL packages to group related constructs Create overloaded package subprograms for more flexibility Design PL/SQL anonymous blocks that execute efficiently Leverage the functionality of the various Oracle Supplied PL/SQL packages Write dynamic SQL for more coding flexibility Identify the major structural components of the Oracle Database 12c Create reports of aggregated data www.novanext.it/training 1 CONTENUTI Introduction to Oracle Database List the features of Oracle Database 12c Discuss the basic design, theoretical, and physical aspects of a relational database Categorize the different
    [Show full text]
  • Quickstart – Learn DAX Basics in 30 Minutes
    QuickStart: Learn DAX Basics in 30 Minutes Owen Duncan Summary: This QuickStart is for users new to PowerPivot or tabular model projects authored in SQL Server Data Tools. It is meant to give you a quick and easy introduction on how you can use Data Analysis Expressions (DAX) to solve a number of basic data modeling and analytical problems. Category: Quick Step-By-Step Applies to: PowerPivot for Excel (all versions), SQL Server 2008 R2, SQL Server 2012 Source: TechNet Wiki (link to source content) E-book publication date: May 2012 13 pages Copyright © 2012 by Microsoft Corporation All rights reserved. No part of the contents of this book may be reproduced or transmitted in any form or by any means without the written permission of the publisher. Microsoft and the trademarks listed at http://www.microsoft.com/about/legal/en/us/IntellectualProperty/Trademarks/EN-US.aspx are trademarks of the Microsoft group of companies. All other marks are property of their respective owners. The example companies, organizations, products, domain names, email addresses, logos, people, places, and events depicted herein are fictitious. No association with any real company, organization, product, domain name, email address, logo, person, place, or event is intended or should be inferred. This book expresses the author’s views and opinions. The information contained in this book is provided without any express, statutory, or implied warranties. Neither the authors, Microsoft Corporation, nor its resellers, or distributors will be held liable for any damages caused or alleged to be caused either directly or indirectly by this book. QuickStart: Learn DAX Basics in 30 Minutes This QuickStart is for users new to PowerPivot or tabular model projects authored in SQL Server Data Tools.
    [Show full text]