BASED BOTNETS by Goalet

Total Page:16

File Type:pdf, Size:1020Kb

BASED BOTNETS by Goalet SELECTING PAYLOAD FEATURES USING N-GRAM ANALYSIS TO CHARACTERIZE IRC TRAFFIC AND MODEL BEHAVIOUR OF IRC- BASED BOTNETS by Goaletsa Rammidi BSc (Computer Science), University of Botswana, 2006 A Thesis Submitted in Partial Fulfillment of the Requirements for the Degree of Master of Computer Science in the Graduate Academic Unit of Faculty of Computer Science Supervisor: Dr. Ali A. Ghorbani, PhD, Faculty of Computer Science Examining Board: Professor John DeDourek, Computer Science, Chair Dr. Harold Boley, Adjunct Professor, Computer Science Dr. Donglei, Du, Faculty of Business Administration, UNB This thesis is accepted by the Dean of Graduate Studies THE UNIVERSITY OF NEW BRUNSWICK September, 2009 © Goaletsa Rammidi, 2010 Library and Archives Bibliotheque et 1*1 Canada Archives Canada Published Heritage Direction du Branch Patrimoine de I'edition 395 Wellington Street 395, rue Wellington OttawaONK1A0N4 Ottawa ON K1A 0N4 Canada Canada Your file Votre reference ISBN: 978-0-494-82638-6 Our file Notre r6f6rence ISBN: 978-0-494-82638-6 NOTICE: AVIS: The author has granted a non­ L'auteur a accorde une licence non exclusive exclusive license allowing Library and permettant a la Bibliotheque et Archives Archives Canada to reproduce, Canada de reproduce, publier, archiver, publish, archive, preserve, conserve, sauvegarder, conserver, transmettre au public communicate to the public by par telecommunication ou par I'lntemet, preter, telecommunication or on the Internet, distribuer et vendre des theses partout dans le loan, distribute and sell theses monde, a des fins commerciales ou autres, sur worldwide, for commercial or non­ support microforme, papier, electronique et/ou commercial purposes, in microform, autres formats. paper, electronic and/or any other formats. The author retains copyright L'auteur conserve la propriete du droit d'auteur ownership and moral rights in this et des droits moraux qui protege cette these. Ni thesis. Neither the thesis nor la these ni des extraits substantiels de celle-ci substantial extracts from it may be ne doivent etre imprimes ou autrement printed or otherwise reproduced reproduits sans son autorisation. without the author's permission. In compliance with the Canadian Conformement a la loi canadienne sur la Privacy Act some supporting forms protection de la vie privee, quelques may have been removed from this formulaires secondaires ont ete enleves de thesis. cette these. While these forms may be included Bien que ces formulaires aient inclus dans in the document page count, their la pagination, il n'y aura aucun contenu removal does not represent any loss manquant. of content from the thesis. 1+1 Canada DEDICATION To my mother Khumoetsile Rammidi, and in loving memory of my father Maranyane Rammidi. Being your daughter is a blessing. n ABSTRACT A botnet is a network of compromised computers remotely controlled by an attacker. Different feature selection methods are applied to find a lower dimension subset of Unicode characters as payload features, using n-gram analysis with n=l, to classify TCP packets into IRC and non-IRC application groups. The identified IRC packets are grouped into 1 minute intervals to create a temporal- frequent distribution, and then unsupervised clustering is applied to separate botnet IRC from normal IRC. The botnet cluster is labeled as one with minimum cluster standard deviation. We found a subset of 9 features that separate IRC packets from non-IRC in less time and comparable accuracy to using all the 256 features. We also found that IRC traffic is dominated by the first 128 Unicode characters, therefore, using all the 256 characters may not be necessary. Clustering packets into IRC and non-IRC using merged X-means had lower false alarm rates than K-means and consistent higher detection rates than unmerged X-means. in ACKNOWLEDGEMENTS I would like to thank Dr Ali A. Ghorbani for his supervision throughout this thesis. I am also thankful to Dr Wei Lu for his professional guidance and support during my research. I am grateful to my friend Nyaladzani Jairo Nkhwanana for his valuable comments and for being supportive in writing this thesis, and to my family for their love and support throughout my studies. I also extend my gratitude to Botswana International University of Science and Technology for funding me to pursue this degree. IV Table of Contents DEDICATION ii ABSTRACT iii ACKNOWLEDGEMENTS iv Table of Contents v List of Tables viii List of Figures ix List of Symbols, Nomenclature or Abbreviations x Introduction 1 1.1 Introduction 1 1.2 Summary of thesis contributions 2 1.3 Thesis organization 4 2 Background information and literature review 7 2.1 What is a bot and a botnet? 7 2.2 Botnet communication control topologies 8 2.2.1 Centralized C&C 8 2.2.2 Peer to Peer (P2P) botnets 10 2.3 Literature on botnet detection techniques 12 2.4 Clustering 18 2.4.1 Hierarchical clustering 18 2.4.2 Density-based clustering 19 2.4.3 Partition-based methods 19 2.4.4 Related research using clustering algorithms in intrusion detection 21 2.5 N-gram and its application to intrusion detection 22 2.6 Concluding remarks 24 3 Proposed framework 26 3.1 Overview of proposed framework 26 3.2 Traffic classification 28 3.2.1 The rationale 28 3.2.2 Obtaining 1-gram frequent payload features 32 3.2.3 Feature selection process 34 v 3.2.4 Traffic classification using C4.5 algorithm 37 3.3 Botnet detection 40 3.3.1 The rationale 40 3.3.2 Obtaining temporal-frequent payload features 42 3.3.3 Standard deviation metric for cluster labeling 44 3.3.4 K-means detection 45 3.3.5 Comparison toX-means detection approach 48 3.4 Concluding remarks 53 4 Experiments and Results 55 4.1 Feature selection and application classification 55 4.1.1 Datasets 56 4.1.2 Metrics 58 4.1.3 Experimental procedure 59 4.1.4 Subset evaluation results 60 4.1.5 Gain ratio results 61 4.1.6 Classification results for final subset of 9 selected features 63 4.1.7 Comparing 9, 128 and 256 features 66 4.2 Validating standard deviation metric 70 4.2.1 Validation on frequency vectors 70 4.2.2 Validation on temporal-frequency vectors 75 4.3 Botnet detection 77 4.3.1 Description of clustering datasets 77 4.3.2 Metrics to evaluate clustering performance 79 4.3.3 K-means detection 81 4.3.4 Unmerged X-means detection 83 4.3.5 Merged X-means detection 86 4.3.6 Comparison of the three detection approaches 88 4.4 Concluding remarks 90 5 Conclusions and future works 91 5.1 Conclusion 91 5.2 Future Work 93 VI Bibliography 95 Appendix A: Gain Ratio values for bottom 15 selected features 100 Appendix B: Time results for comparing 9, 128 and 256 features 101 Curriculum Vitae vn List of Tables 4.1 - Description of the datasets 57 4.2 - CfsSubsetEval classification results on traindatal 61 4.3 - CfsSubsetEval classification results on traindata2 61 4.4 - Top 5 gain ratio selected features 62 4.5 - GainRatioAttributeEval classification results on traindatal 62 4.6 - GainRatioAttributeEval classification results on traindata2 63 4.7 - Unicode index values and the corresponding Java printed characters 64 4.8 - Classification results using the final selected subset of 9 features 65 4.9 - Example to approximate time for 1 feature 67 4.10 - Compare classification accuracy for 9, 128 and 256 features 69 4.11 - Line of best fit constants for normal versus botnet IRC datasets 74 4.12 - Validation using 128 versus 256 temporal-frequent features 76 4.13 - IRC botnet detection datasets 78 4.14 - Clustering data models 79 4.15 - K-means cluster statistics 83 4.16 - K-means performance results 83 4.17 - X-means original number of clusters 84 4.18 - Unmerged X-means cluster statistics 85 4.19 - Unmerged X-means performance results 86 4.20 - Merged X-means cluster statistics 87 4.21 - Merged X-means performance results 88 viii List of Figures 2.1 - An example of n-gram sliding window 23 3.1 - Framework of proposed solution 28 3.2 - Average character frequencies for IRC packets versus non-IRC packets 31 3.3 - Algorithm to extract 1-gram frequency features from a packet payload 33 3.4 - Algorithm for ID3 decision tree for boolean-valued functions 38 3.5 - Illustration of dimension reduction in training and testing dataset 39 3.6 - Illustration of C4.5 decision tree using 1-gram frequency features 40 3.7-High level view of clustering IRC and non-IRC traffic 42 3.8 - Algorithm for K-means clustering 46 3.9 - Algorithm for IRC botnet detection using K-means 47 3.10 - Algorithm for IRC botnet detection using unmerged X-means 51 3.11 - Algorithm for IRC botnet detection using merged X-means 53 4.1 - J48 versus SVM false positive rates 65 4.2 - Comparing times for 9, 128 and 256 features on J48 67 4.3 - Compare FPR for 9, 128 and 256 features 69 4.4 - Normalized standard deviation graph for normal versus botnet IRC packets 72 4.5 - Normalized standard deviation graphs on scale [-0.6, 0.6] 73 4.6 - Line of best fit graphs for normal versus botnet IRC datasets 74 IX List of Symbols, Nomenclature or Abbreviations fij Average frequency of Unicode character with 28 integer value j (it is also at index position/) FJ Frequency of the Unicode character at jth index 28 position. <jj Standard deviation of Unicode character with 42 integer value j (it is also at index position j). Can also refer to standard deviation of cluster labeled j pi Reduced average frequency of the Unicode 43 character at/A position on the ith minute interval.
Recommended publications
  • Emacspeak — the Complete Audio Desktop User Manual
    Emacspeak | The Complete Audio Desktop User Manual T. V. Raman Last Updated: 19 November 2016 Copyright c 1994{2016 T. V. Raman. All Rights Reserved. Permission is granted to make and distribute verbatim copies of this manual without charge provided the copyright notice and this permission notice are preserved on all copies. Short Contents Emacspeak :::::::::::::::::::::::::::::::::::::::::::::: 1 1 Copyright ::::::::::::::::::::::::::::::::::::::::::: 2 2 Announcing Emacspeak Manual 2nd Edition As An Open Source Project ::::::::::::::::::::::::::::::::::::::::::::: 3 3 Background :::::::::::::::::::::::::::::::::::::::::: 4 4 Introduction ::::::::::::::::::::::::::::::::::::::::: 6 5 Installation Instructions :::::::::::::::::::::::::::::::: 7 6 Basic Usage. ::::::::::::::::::::::::::::::::::::::::: 9 7 The Emacspeak Audio Desktop. :::::::::::::::::::::::: 19 8 Voice Lock :::::::::::::::::::::::::::::::::::::::::: 22 9 Using Online Help With Emacspeak. :::::::::::::::::::: 24 10 Emacs Packages. ::::::::::::::::::::::::::::::::::::: 26 11 Running Terminal Based Applications. ::::::::::::::::::: 45 12 Emacspeak Commands And Options::::::::::::::::::::: 49 13 Emacspeak Keyboard Commands. :::::::::::::::::::::: 361 14 TTS Servers ::::::::::::::::::::::::::::::::::::::: 362 15 Acknowledgments.::::::::::::::::::::::::::::::::::: 366 16 Concept Index :::::::::::::::::::::::::::::::::::::: 367 17 Key Index ::::::::::::::::::::::::::::::::::::::::: 368 Table of Contents Emacspeak :::::::::::::::::::::::::::::::::::::::::: 1 1 Copyright :::::::::::::::::::::::::::::::::::::::
    [Show full text]
  • Emacspeak User's Guide
    Emacspeak User's Guide Jennifer Jobst Revision History Revision 1.3 July 24,2002 Revised by: SDS Updated the maintainer of this document to Sharon Snider, corrected links, and converted to HTML Revision 1.2 December 3, 2001 Revised by: JEJ Changed license to GFDL Revision 1.1 November 12, 2001 Revised by: JEJ Revision 1.0 DRAFT October 19, 2001 Revised by: JEJ This document helps Emacspeak users become familiar with Emacs as an audio desktop and provides tutorials on many common tasks and the Emacs applications available to perform those tasks. Emacspeak User's Guide Table of Contents 1. Legal Notice.....................................................................................................................................................1 2. Introduction.....................................................................................................................................................2 2.1. What is Emacspeak?.........................................................................................................................2 2.2. About this tutorial.............................................................................................................................2 3. Before you begin..............................................................................................................................................3 3.1. Getting started with Emacs and Emacspeak.....................................................................................3 3.2. Emacs Command Conventions.........................................................................................................3
    [Show full text]
  • An Automated Approach to Grammar Recovery for a Dialect of the C++ Language
    An Automated Approach to Grammar Recovery for a Dialect of the C++ Language Edward B. Duffy and Brian A. Malloy School of Computing Clemson University Clemson, SC 29634, USA feduffy,[email protected] Abstract plications developed in a new or existing language [12, 15]. Frequently, the only representation of a dialect is the gram- In this paper we present the design and implementa- mar contained in the source code of a compiler; however, a tion of a fully automated technique for reverse engineering compiler grammar is difficult to comprehend since parser or recovering a grammar from existing language artifacts. generation algorithms place restrictions on the form of the The technique that we describe uses only test cases and a compiler grammar [16, page 10]. parse tree, and we apply the technique to a dialect of the Another problem with language dialects is that there C++ language. However, given test cases and a parse tree has been little research, to date, addressing the problem for a language or a dialect of a language, our technique of reverse engineering a grammar or language specifica- can be used to recover a grammar for the language, in- tion for a language dialect from existing language arti- cluding languages such as Java, C, Python or Ruby. facts. Lammel¨ and Verhoef have developed a technique that uses a language reference manual and test cases to recover a grammar for a language or dialect [16]. How- 1. Introduction ever, their technique requires user intervention along most of the stages of recovery and some of the recovery process The role of programming languages in software devel- is manual.
    [Show full text]
  • Cultures and Traditions of Wordplay and Wordplay Research the Dynamics of Wordplay
    Cultures and Traditions of Wordplay and Wordplay Research The Dynamics of Wordplay Edited by Esme Winter-Froemel Editorial Board Salvatore Attardo, Dirk Delabastita, Dirk Geeraerts, Raymond W. Gibbs, Alain Rabatel, Monika Schmitz-Emans and Deirdre Wilson Volume 6 Cultures and Traditions of Wordplay and Wordplay Research Edited by Esme Winter-Froemel and Verena Thaler The conference “The Dynamics of Wordplay / La dynamique du jeu de mots – Interdisciplinary perspectives / perspectives interdisciplinaires” (Universität Trier, 29 September – 1st October 2016) and the publication of the present volume were funded by the German Research Founda- tion (DFG) and the University of Trier. Le colloque « The Dynamics of Wordplay / La dynamique du jeu de mots – Interdisciplinary perspectives / perspectives interdisciplinaires » (Universität Trier, 29 septembre – 1er octobre 2016) et la publication de ce volume ont été financés par la Deutsche Forschungsgemeinschaft (DFG) et l’Université de Trèves. ISBN 978-3-11-058634-3 e-ISBN (PDF) 978-3-11-058637-4 e-ISBN (EPUB) 978-3-11-063087-9 This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivs 4.0 License. For details go to http://creativecommons.org/licenses/by-nc-nd/4.0/. Library of Congress Control Number: 2018955240 Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Nationalbibliografie; detailed bibliographic data are available on the Internet at http://dnb.dnb.de. © 2018 Esme Winter-Froemel and Verena Thaler, published by Walter de Gruyter GmbH, Berlin/Boston Printing and binding: CPI books GmbH, Leck www.degruyter.com Contents Esme Winter-Froemel, Verena Thaler and Alex Demeulenaere The dynamics of wordplay and wordplay research 1 I New perspectives on the dynamics of wordplay Raymond W.
    [Show full text]
  • Giant Pacific Octopus (Enteroctopus Dofleini) Care Manual
    Giant Pacific Octopus Insert Photo within this space (Enteroctopus dofleini) Care Manual CREATED BY AZA Aquatic Invertebrate Taxonomic Advisory Group IN ASSOCIATION WITH AZA Animal Welfare Committee Giant Pacific Octopus (Enteroctopus dofleini) Care Manual Giant Pacific Octopus (Enteroctopus dofleini) Care Manual Published by the Association of Zoos and Aquariums in association with the AZA Animal Welfare Committee Formal Citation: AZA Aquatic Invertebrate Taxon Advisory Group (AITAG) (2014). Giant Pacific Octopus (Enteroctopus dofleini) Care Manual. Association of Zoos and Aquariums, Silver Spring, MD. Original Completion Date: September 2014 Dedication: This work is dedicated to the memory of Roland C. Anderson, who passed away suddenly before its completion. No one person is more responsible for advancing and elevating the state of husbandry of this species, and we hope his lifelong body of work will inspire the next generation of aquarists towards the same ideals. Authors and Significant Contributors: Barrett L. Christie, The Dallas Zoo and Children’s Aquarium at Fair Park, AITAG Steering Committee Alan Peters, Smithsonian Institution, National Zoological Park, AITAG Steering Committee Gregory J. Barord, City University of New York, AITAG Advisor Mark J. Rehling, Cleveland Metroparks Zoo Roland C. Anderson, PhD Reviewers: Mike Brittsan, Columbus Zoo and Aquarium Paula Carlson, Dallas World Aquarium Marie Collins, Sea Life Aquarium Carlsbad David DeNardo, New York Aquarium Joshua Frey Sr., Downtown Aquarium Houston Jay Hemdal, Toledo
    [Show full text]
  • PISA Sample Tasks, Texts, Item Statistics, and Item Maps for Mathematics, Reading Literacy, Science, and Problem Solving
    Sample tasks from PISA from http://www.erc.ie/pisa PISA Sample Tasks, Texts, Item Statistics, and Item Maps for Mathematics, Reading Literacy, Science, and Problem Solving Table of Contents Interpreting the Tables of the PISA Item Statistics 2 PISA Item Difficulty 2 Example Interpretations of PISA Sample Items 4 Mathematics 6 Unit: Exchange Rate 6 Unit: Staircase 8 Unit: Exports 9 Unit: Growing Up 11 Unit: Skateboard 13 Unit: Number Cubes 16 Unit: Walking 18 Unit: Test Scores 20 Unit: Carpenter 21 Unit: Robberies 22 Unit: Internet Relay Chat 23 Unit: Earthquake 25 Reading Literacy 26 Unit: The Gift 26 Unit: Labour Force 32 Science 36 Unit: Semmelweis 36 Unit: Ozone 40 Problem Solving 43 Unit: Cinema Outing 43 Unit: Library System 45 Unit: Irrigation 48 1 Interpreting the Tables of the PISA Item Statistics Sample tasks and items for mathematics and problem solving have been adapted from the OECD's initial reports for PISA 2003 (OECD, 2004a, 2004b). The layout has been compacted somewhat and is not identical to that presented to students in the test booklets. As no new items for reading literacy or science were released following the PISA 2003 assessment, sample items for these domains are drawn from a pool of items released following the 2000 assessment (see OECD, 2001; Shiel et al., 2001). Sample tasks for mathematics originate from both PISA 2000 and PISA 2003. The PISA cycle from which the task originates is given in brackets after the title. For items shown, their classification in the framework is given (e.g., content area, process, context and item type).
    [Show full text]
  • Pipenightdreams Osgcal-Doc Mumudvb Mpg123-Alsa Tbb
    pipenightdreams osgcal-doc mumudvb mpg123-alsa tbb-examples libgammu4-dbg gcc-4.1-doc snort-rules-default davical cutmp3 libevolution5.0-cil aspell-am python-gobject-doc openoffice.org-l10n-mn libc6-xen xserver-xorg trophy-data t38modem pioneers-console libnb-platform10-java libgtkglext1-ruby libboost-wave1.39-dev drgenius bfbtester libchromexvmcpro1 isdnutils-xtools ubuntuone-client openoffice.org2-math openoffice.org-l10n-lt lsb-cxx-ia32 kdeartwork-emoticons-kde4 wmpuzzle trafshow python-plplot lx-gdb link-monitor-applet libscm-dev liblog-agent-logger-perl libccrtp-doc libclass-throwable-perl kde-i18n-csb jack-jconv hamradio-menus coinor-libvol-doc msx-emulator bitbake nabi language-pack-gnome-zh libpaperg popularity-contest xracer-tools xfont-nexus opendrim-lmp-baseserver libvorbisfile-ruby liblinebreak-doc libgfcui-2.0-0c2a-dbg libblacs-mpi-dev dict-freedict-spa-eng blender-ogrexml aspell-da x11-apps openoffice.org-l10n-lv openoffice.org-l10n-nl pnmtopng libodbcinstq1 libhsqldb-java-doc libmono-addins-gui0.2-cil sg3-utils linux-backports-modules-alsa-2.6.31-19-generic yorick-yeti-gsl python-pymssql plasma-widget-cpuload mcpp gpsim-lcd cl-csv libhtml-clean-perl asterisk-dbg apt-dater-dbg libgnome-mag1-dev language-pack-gnome-yo python-crypto svn-autoreleasedeb sugar-terminal-activity mii-diag maria-doc libplexus-component-api-java-doc libhugs-hgl-bundled libchipcard-libgwenhywfar47-plugins libghc6-random-dev freefem3d ezmlm cakephp-scripts aspell-ar ara-byte not+sparc openoffice.org-l10n-nn linux-backports-modules-karmic-generic-pae
    [Show full text]
  • List of TCP and UDP Port Numbers 1 List of TCP and UDP Port Numbers
    List of TCP and UDP port numbers 1 List of TCP and UDP port numbers This is a list of Internet socket port numbers used by protocols of the Transport Layer of the Internet Protocol Suite for the establishment of host-to-host communications. Originally, these ports number were used by the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but are also used for the Stream Control Transmission Protocol (SCTP), and the Datagram Congestion Control Protocol (DCCP). SCTP and DCCP services usually use a port number that matches the service of the corresponding TCP or UDP implementation if they exist. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] However, many unofficial uses of both well-known and registered port numbers occur in practice. Table legend Use Description Color Official Port is registered with IANA for the application white Unofficial Port is not registered with IANA for the application blue Multiple use Multiple applications are known to use this port. yellow Well-known ports The port numbers in the range from 0 to 1023 are the well-known ports. They are used by system processes that provide widely used types of network services. On Unix-like operating systems, a process must execute with superuser privileges to be able to bind a network socket to an IP address using one of the well-known ports. Port TCP UDP Description Status 0 UDP Reserved Official 1 TCP UDP TCP Port Service Multiplexer (TCPMUX) Official [2] [3]
    [Show full text]
  • Before Peer Production: Infrastructure Gaps and the Architecture of Openness in Synthetic Biology
    BEFORE PEER PRODUCTION: INFRASTRUCTURE GAPS AND THE ARCHITECTURE OF OPENNESS IN SYNTHETIC BIOLOGY David Singh Grewal* In memoriam Mark Fischer (1950 – 2015)µ * Professor of Law, Yale Law School, and Director, BioBricks Foundation. The views expressed here are my own, and do not reflect the views of any of the organizations or entities with which I am or have been affiliated. Among those to whom I owe thanks, I am especially grateful to Drew Endy, President of the BioBricks Foundation (BBF) who worked to educate me about synthetic biology, and later invited me to join the board of directors of the BBF, and to the late Mark Fischer, who was the lead drafter (along with Drew Endy, Lee Crews, and myself) of the BioBrick™ Public Agreement, and to whose memory this Article is dedicated. I am also grateful to other past and present directors and staff of the BBF, including Richard Johnson, Linda Kahl, Tom Knight, Thane Krier, Nathalie Kuldell, Holly Million, Jack Newman, Randy Rettberg, and Pamela Silver. I have benefitted from conversations about synthetic biology and open source theory with a number of other scientists, including Rob Carlson, George Church, Jason Kelly, Manu Prakash, Zach Serber, Reshma Shetty, Christina Smolke, Ron Weiss and with a number of lawyers, scholars, and open source advocates including Yochai Benkler, James Boyle, Daniela Cammack, Paul Cammack, Paul Goldstein, Hank Greely, Janet Hope, Margot Kaminski, Mark Lemley, Stephen Maurer, Eben Moglen, Lisa Ouellette, Jedediah Purdy, Arti Rai, Pamela Samuelson, Jason Schultz, and Andrew Torrance, and especially Talli Somekh, who first introduced me to synthetic biology and noted the connections between my work in network theory and new developments in biotechnology.
    [Show full text]
  • Nuclear Burning in Collapsar Accretion Disks 3
    MNRAS 000, 1–18 (2020) Preprint 12 August 2020 Compiled using MNRAS LATEX style file v3.0 Nuclear Burning in Collapsar Accretion Disks Yossef Zenati1, Daniel M. Siegel2,3, Brian D. Metzger4, and Hagai B. Perets1 1Physics Department, Technion - Israel Institute of Technology, Haifa 3200004, Israel 2Perimeter Institute for Theoretical Physics, Waterloo, Ontario, Canada, N2L 2Y5 3Department of Physics, University of Guelph, Guelph, Ontario, Canada, N1G 2W1 4Department of Physics, Columbia University, New York, USA Accepted XXX. Received YYY; in original form ZZZ ABSTRACT The core collapse of massive, rapidly-rotating stars are thought to be the progenitors of long-duration gamma-ray bursts (GRB) and their associated hyper-energetic su- pernovae (SNe). At early times after the collapse, relatively low angular momentum material from the infalling stellar envelope will circularize into an accretion disk lo- cated just outside the black hole horizon, resulting in high accretion rates necessary to power a GRB jet. Temperatures in the disk midplane at these small radii are suffi- ciently high to dissociate nuclei, while outflows from the disk can be neutron-rich and may synthesize r-process nuclei. However, at later times, and for high progenitor an- gular momentum, the outer layers of the stellar envelope can circularize at larger radii & 107 cm, where nuclear reactions can take place in the disk midplane (e.g. 4He + 16O → 20Ne + γ). Here we explore the effects of nuclear burning on collapsar accretion disks and their outflows by means of hydrodynamical α-viscosity torus simulations coupled to a 19-isotope nuclear reaction network, which are designed to mimic the late infall epochs in collapsar evolution when the viscous time of the torus has become comparable to the envelope fall-back time.
    [Show full text]
  • Arb Documentation Release 2.8.0
    ζ(s) Arb Arb Documentation Release 2.8.0 Fredrik Johansson December 29, 2015 CONTENTS 1 Introduction 1 2 General information 3 2.1 Feature overview.............................................3 2.2 Setup...................................................4 2.2.1 Download............................................4 2.2.2 Dependencies..........................................4 2.2.3 Installation as part of FLINT..................................4 2.2.4 Standalone installation.....................................4 2.2.5 Running code..........................................5 2.3 Potential issues..............................................5 2.3.1 Interface changes........................................5 2.3.2 Correctness...........................................5 2.3.3 Aliasing.............................................6 2.3.4 Integer overflow.........................................6 2.3.5 Thread safety and caches....................................7 2.3.6 Use of hardware floating-point arithmetic...........................7 2.4 History and changes...........................................8 2.5 Example programs............................................ 20 2.5.1 pi.c............................................... 21 2.5.2 hilbert_matrix.c......................................... 21 2.5.3 keiper_li.c............................................ 21 2.5.4 real_roots.c........................................... 22 2.5.5 poly_roots.c........................................... 25 2.5.6 complex_plot.c........................................
    [Show full text]
  • List of TCP and UDP Port Numbers 1 List of TCP and UDP Port Numbers
    List of TCP and UDP port numbers 1 List of TCP and UDP port numbers In computer networking, the protocols of the Transport Layer of the Internet Protocol Suite, most notably the Transmission Control Protocol (TCP) and the User Datagram Protocol (UDP), but also other protocols, use a numerical identifier for the data structures of the endpoints for host-to-host communications. Such an endpoint is known as a port and the identifier is the port number. The Internet Assigned Numbers Authority (IANA) is responsible for maintaining the official assignments of port numbers for specific uses.[1] Table legend Color coding of table entries Official Port/application combination is registered with IANA Unofficial Port/application combination is not registered with IANA Conflict Port is in use for multiple applications Well-known ports: 0–1023 According to IANA "The Well Known Ports are assigned by the IANA and on most systems can only be used by system (or root) processes or by programs executed by privileged users. Ports are used in the TCP [RFC793] to name the ends of logical connections which carry long term conversations. For the purpose of providing services to unknown callers, a service contact port is defined. This list specifies the port used by the server process as its contact port. The contact port is sometimes called the well-known port."[1] Port TCP UDP Description Status 0 UDP Reserved Official 0 TCP UDP When running a server on port 0, the system will run it on a random port from 1-65535 or 1024-65535 Official depending on the privileges of the user.
    [Show full text]