Wednesday, October 30, 2019

International Management #3 Essay Example | Topics and Well Written Essays - 1000 words

International Management #3 - Essay Example Following a lift in the ban on the sale of foreign game consoles in China, the developments made it easy for Microsoft to consider a joint venture with a Chinese partner. But the Chinese lift on the ban had a condition: all the companies’ hardware and products will be produced in China. In 2013, Microsoft took the opportunity and formed the joint venture with a Shanghai media company called E-Home Entertainment, in order to make games and consoles (Hong, 2013). In this attempt at the joint venture with a regional Chinese media giant, Microsoft aims to establish itself in the lucrative gaming market in China so as to capitalize on its expertise and intellect. The two partners, which include Microsoft and BesTV New Media Co., a subsidiary of Shanghai Media Group, are to develop and sell its own gaming consoles and softwares along with entertainment related and other third party products. So far, it has only been one year since the joint venture took place and the two are determined to progress exponentially in their business. BesTV currently has nearly 18 million IPTV subscribers in China, Southeast Asia, and Eastern Europe thereby possessing a significant chunk of the market share. The combined investment from the two partners amounts to about $237 million with a 51 % share with BesTV (Hong, 2013). All of this was possible after the Chinese government decided to lift its ban on international gaming consoles thereby allowing similar business endeavors to take place. With this development, Microsoft now aims to launch one of their most popular products, Xbox One in China and explore possible business opportunities in the regional market. 2. The local Chinese gaming market has seen a regional transformation in its technology as well as consumer preferences. No longer are consumers interested in or are willing to buy low quality, inferior gaming softwares or consoles. The

Monday, October 28, 2019

Detection and Mitigation of DDOS Attack

Detection and Mitigation of DDOS Attack A Survey on Detection and Mitigation of Distributed Denial of Service attack in Named  Data Networking Sandesh Rai1*, Dr. Kalpana Sharma 2, and Dependra Dhakal 3 1Sikkim Manipal Institute of Technology, Student, Computer Science Engineering, Rangpo, Sikkim. 2Sikkim Manipal Institute of Technology, Head of Department, Professor, Computer Science Engineering, Rangpo, Sikkim 3Sikkim Manipal Institute of Technology, Assistant Professor, Computer Science Engineering, Rangpo ,Sikkim Abstract. There are various number of on-going research are taking place thats aims to provide next best Internet architecture although there are varieties of scope and maturity. This research is mainly based on to provide better security and better privacy as basic requirements of the protocol. Denial of Service Attacks which is a major issue in current Internet architecture also plays a critical issue in any new upcoming internet architecture and requires major focus for the same. The paper focus on the Interest flooding attack which is one the different type of Distributed Denial of service attack (DDOS).NDN incorporates better security features that detect and mitigate certain attack in the networks. But its resilience to the attacks has not analyzed yet. It presents the Distributed Denial of Service (DDOS) in Named Data Networking where an adversary sends out Interest packet with spoof names as an attacking packet to the NDN router. Keywords: NDN, DDOS, Content store, Pending Interest Table, Cache pollution. 1 Introduction Clearly internet has become a part of the day todays life of the people. Millions of people around the world use it to do various type of day todays task. It connect millions of people around the world via wired ,wireless, mobile or fixed computing devices and host huge amount of information(which is in the digital form) to be used by people. Internet provides information to be exchanged and has exponentially grown over time. The main ideas of the Todays internet architecture were developed in 70s.The telephone where conversation was point to point. The utilization of the Internet has dramatically changed since 70s and current internet has to adapt well with new usage model, new application and new services. To cope up with these changes, a variety number of research is taking place to design a new Internet architecture. Named Data Networking (NDN) [1] is one of the ongoing research .Its main objective is to developed a next best Internet architecture for upcoming generation. Its an instantiation of the of the Information Centric approach (ICN) or Content Centric approach (CCN) [1][2][3]. The main objective of the CCN is to provide more flexibility, security and scalability. CCN provide more security by securing the individual pieces of content rather than securing the connection. It provides more flexibility by using content name instead of using IP addresses. NDN is one of the instances of Information Centric Networking (ICN).NDN is based on the working principle of Content-Centric Networking (CCN) [3], where content instead of hosts are the main focus in the communications architecture. NDN is one of the research projects funded by the United State of National Science Foundation (NSF) which is under Future Internet Architecture (FIA) Program [3].NDN focus on the name rather than the location of th e host. In NDN every pieces of the data is digitally signed by its source producer. The signing in data allows the producer to be trusted and authenticated. Caching of the data is one of the core features of the NDN which helps to optimum use of network bandwidth use in the network . NDN provide an attractive architecture for the data distribution, anonymous communication. 1.1 Distributed Denial of service attack: As the years goes by, Distributed denial of service (DDOS) attack have become common and dangerous and it remains among the most critical threats on the current Internet. They are very difficult to detect and mitigate. Any new architecture should detect and mitigate DoS attack or at least minimum their effeteness. NDN appear to be efficient for the distribution of the content for the legitimate parties but unknown to malicious parties. Instead of using single host computer and single connection for the internet, the DDOS attack utilizes various number of host computers and various number of internet connections. The host computers for an attack are distributed across the whole wide world. The difference between a DOS attack VS a DDOS attack is that the victim host will be overloaded by thousands number of resources requests. In the attacks process, the adversary host node in the network sends request a huge number of zombie for the attack to take place. A malicious user attacks the n etwork host by requesting resources in a huge number in the form of Interest packets with spoofed names or without spoofed name. These huge numbers of Interest consumes the bandwidth of the network and exhaust a routers memory. This type of attack is known as Interest Flooding Attack (IFA) and this paper exclusively focus on this problem and their proposed countermeasures. 2 Overview of NDN Architecture Named data networking is an new and ongoing research architecture whose motivation is the architectural mixed of current internet architecture and its various usage. However the architecture design and principles are motivational derivation from the successes of todays Internet architecture [4]. The thin waist as can be seen in Figure 1 of hour glass architecture was the key service of the enormous growth of the internet by allowing both upside layer and bottom layer technologies to innovate independently. The NDN architecture contains the same hourglass shape as shown in Figure 1.2.1, but changes the thin waist by using data directly rather than its location. Figure 2.1 [4]: NDN Hourglass Architectures For communication, NDN provide two different packets i.e. Interest and Data packets. A user asks for resources by issuing Interest packet to the router in the network, which contains a name for those particular resources that identifies and verifies the desired data for the host. Different fields of a data packet [5]: 1.Signature: To verify data. 2. Key locator: To verify signature. 3. Publisher Public Key Digest: Public key hash of the producer. 4. Content name: Name of the requested data. 5 Selector: which include scope: and reserved. Figure 2.2 [6]: Packets in the NDN Architecture Any node having data that satisfies it, a Data packet is issued by the satisfied router [7], each router of NDN contains following different three data structures for Interest packet and Data packet forwarding. i) Content Store (CS): Recently used data are store. ii) Forward Information Base (FIB): Routing table of name of the data and it guides Interests toward data producers [8]. iii) Pending Interest Table (PIT): Store unsatisfied data request. It record the requested data name[8]. 3 Interest Flooding attacks By using the information and state of the Pending Interest Table (PIT), a routing of content by router is performed. In the PIT the name of requesting content is looked up for identifying its entry. The malicious node uses the state of the PIT to perform DDOS attacks. Basically there are three types of Interest Flooding attack [9]: a) Static: This type of attack attacks the infrastructure of the network and is limited and caching provides a build in solution. The interest is satisfied by the content of the cache [10]. b) Dynamically generated: Here the requested resources is dynamic and all the requested interest reaches to the content producer depleting the network bandwidth and state of the Pending Interest Table (PIT).Since the requested content is dynamic, in build cache does not serve as countermeasure for the attacks[10]. c) Non- existing: This report focus on this attack type where attacker involves non-satisfiable interest for a non-existing content in the network. These kinds of interest are not taken care by the router and are routed to the content producer depleting network bandwidth and router PIT states [11]. In all three types of attacks the malicious host uses a very large number of fake request, which are distributed in nature, An adversary host can use two features unique to NDN, namely CS and PIT, to perform DDoS attacks [12] in the router. We focus on attacks that overwhelm the PIT, which keeps record which are not fulfill by a router. The adversary host issues a large set of fake request, which are possibly distributed in nature, to generate a large number of Interest packets with spoofed name as shown in Figure 1.3.1 aiming to (1) overwhelm PIT table in routers, and (2) swamp the target content producers [13][14]. Figure 3.1 [15]: Example of Interest flooding attack Once the PIT is exceed its threshold, all incoming interests are dropped as there will no memory space available to create entries for new resourced interests. Since the names are spoofed, no Interest packets will be satisfied by the content [16]. These packets request will remain in the PIT for as much as possible, which will definitely exhaust the router memory and router resources on routers. This is the goal of Interest flooding attack. 4 Related Works Gasti et al. [17] analyzed the resilience of Named Data networking to the DDOS attacks. The paper discussed two different types of attacks with their effect and proposed two countermeasure mechanisms: a) Router Statistics and b) Push-back approaches. Afanasyev et al. [18] addressed the flooding attack. Their works explain the feasibility of the interest flooding attacks and the requirement of the effective solution. In terms of evaluation of the attack the proposed mitigation plan is complementary to Poseidon mitigation .Afanasyev et al. proposed three different mitigation algorithms: a) token bucket with per interface fairness b) satisfaction-based pushback c) satisfaction-based interest acceptance. All the three algorithms exploit their own state information to stop Interest flooding attacks. Satisfaction based pushback mechanism among three algorithms effectively detect and mitigate the attack and ensure all the interest form a legitimate user. Campagno et at. [19] Addressed the flooding attacks and proposed a mitigation algorithm called Poseidon. This algorithm is strictly used for non-existing type of interest flooding attacks. This mitigation algorithm is used for local and distributed interest flooding attacks. Dai et al. [20] addressed the flooding attacks and proposed a mitigation algorithm. The solution is based on the collaboration of the router and the content producer. Dai et al. proposed Interest traceback algorithm. The algorithm generates a spoof data packet to satisfy the interest in the PIT to trace the originators. According to the, the algorithm is not proactive, that overhead the network by sending out spoof data packet for the interest depleting the bandwidth of the network and creating traffic. The main shortcoming of this approach is that its take the long unsatisfied interest in the PIT as adversary interest and others as legit interest. So the router drops any long incoming interest packet which may be a legitimate interest. Choi et al. [21] addressed the overview of the Interest Flooding attacks for strictly non-existing content only on NDN. The paper tries to explain the effectiveness of the attack in the network and in quality of services. Karami et al. [22] addressed and provide a hybrid algorithm for the solution. The algorithm is proactive. There are two phase 1) detection 2) reaction. In detection phase the attack is detect using combination of multi objective evolutionary optimization and Radial basis function (Neural Network).In the reaction phases an adaptive mechanism for reaction is used to mitigate the attacks. 5 Analysis of survey The following table show the analysis of the all the paper and comparison related only on the project. The table is a comparison of different paper which is written by well-known publishers. The Analysis try to provide a possible research gap that is present on the paper. Table 1.Comparison of different NDN related paper SLno Title Publication Details Summary Research Gap 1 DoS DDoS in Named Data Networking P. Gasti, G. Tsudik, E. Uzun, and L. Zhang. DoS DDoS in named-data networking. Technical report, University of California. Discussed two types of attacks with their effects and potential countermeasures (Router Statistics and Push-back Mechanisms). 1. The paper only put a light on the attack and its possible countermeasures. 2 Interest flooding attack and countermeasures in Named Data Networking A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang. Interest flooding attack and countermeasures in Named Data Networking. In IFIP Networking. Proposed three mitigation algorithms. (token bucket with per-interface fairness, satisfaction-based Interest acceptance, and satisfaction-based pushback). 1.Improvements in token bucket with per-interface fairness, satisfaction-based Interest acceptance was less effective than satisfaction based pushback. 3 Poseidon: Mitigating interest flooding DDoS attacks in named data networking. A. Compagno, M. Conti, P. Gasti, and G. Tsudik, Poseidon: Mitigating interest flooding DDoS attacks in named data networking,Conference on Local Computer Networks. Proposed a framework, named Poseidon, for mitigation of local and distributed Interest flooding attack for non-existing contents 1.Fixed Threshold. 4 A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking. A. Karami and M. Guerrero-Zapata, A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking,Neurocomputing. Introduced an intelligent combination algorithm for the solution. 1.Investigating inter-domain DoS attacks and applying Hybrid approach. 5 Threat of DoS by interest flooding attack in content-centric networking S. Choi, K. Kim, S. Kim, and B.-H. Roh,:Threat of DoS by interest flooding attack in content-centric networking, in International Conference on Information Networking. Explain the difficulty for getting a solution flooding attacks in the PIT. 1.Analyzing DDoS attacks and their countermeasures. 6 Mitigate ddos attacks in ndn by interest traceback H. Dai, Y. Wang, J. Fan, and B. Liu. Mitigate ddos attacks in ndn by interest traceback. In NOMEN. Introduced a traceback solution where a node sends a spoof data packet to trace the host. 1. Only the request which is long is considered as malicious request. 6 Conclusion This report starts with a brief introduction of the CCN, NDN architecture and which is further followed by common and most critical attacks in todays internet. NDN mainly focuses on the data security, data privacy for the users. This report clearly represents only the starting step for mitigating DDOS attacks on the Pending Interest Table in the context of NDN. In this paper, we have explained DDOS attack and its various types namely, interest flooding attack. We have discussed current research regarding the attack, their existing solution, and try to analyze the given solution for detection and mitigation. The adversary tries to exploit interest forwarding rule to make certain interest for the packet with the never existing content name. We analyzed that the victim of the attack is host and PIT of the router. Thus a huge amount of Interest packet will reside on the PIT of the router which use and exhaust the memory of the router and computing resources of the router which will defin itely degrade the performance of the router. The NDN is the latest ongoing research topic and a new propose Internet architecture where limited research have been done for the mitigation and detection of the interest flooding attack thus there is a very much need for details analysis on the security before the architecture actually deployed. References V. Jacobson, M. Mosko, D. Smetters, and J. Garcia-Luna-Aceves.: Content- centric networking, Whitepaper, Palo Alto Research Center, pp. 2-4 (2007) V. Jacobson, D. K. Smetters, J. D. Thornton, M. F. Plass, N. H. Briggs, and R. L. Braynard,.:Networking named content,in Proceedings of the 5th International Conference on Emerging Networking Experiments and Technologies, ACM(2009) L. Zhang, D. Estrin, J. Burke, V. Jacobson, J. D. Thornton, D. K. Smetters, B. Zhang, G. Tsudik, D. Massey, C. Papadopoulos et al.: Named data networking (NDN) project, Relatorio Tecnico NDN-0001, Xerox Palo Alto Research Center-PARC( 2010) J. Pan, S. Paul, and R. Jain.: A survey of the research on future internet architectures, Communications Magazine, IEEE (2011) A. Hoque, S. O. Amin, A. Alyyan, B. Zhang, L. Zhang, and L. Wang.: NLSR: Named-data link state routing protocol,in Proceedings of the 3rd ACM SIGCOMM Workshop7Information-Centric Networking, ACM, pp. 15-20(2013) V. Jacobson, J. Burke, L. Zhang, B. Zhang, K. Claffy, D. Krioukov, C. Papadopoulos, L. Wang, E. Yeh, and P. Crowley.:Named data networking (NDN) project 2013- 2014 report,http://named-data.net, Annual Progress Report( 2014) C. Ghali, G. Tsudik, and E. Uzun.: Elements of trust in named-data networking, ACM SIGCOMM Computer Communication Review, ACM, vol. 44, no. 5, pp. 1-9 (2014) M. Aamir and S. M. A. Zaidi,.:Denial-of-service in content centric (named data) networking: A tutorial and state-of-the-art survey, Security and Communication Networks, vol. 8, no. 11, pp. 2037-2059 (2015) M. W ¨ahlisch, T. C. Schmidt, and M. Vahlenkamp.: Backscatter from the data plane threats to stability and security in information-centric networking. CoRR, abs/1205.4778 (2012) Content centric networking (CCNx) project. http://www.ccnx.org. A. Afanasyev, I. Moiseenko, and L. Zhang.: ndnSIM: NDN simulator for NS-3. Technical Report NDN-0005, 2012, University of California, Los Angeles(2012) Wang R, Jia Z, Ju L.: An Entropy-Based Distributed DDoS Detection Mechanism in Software-Defined Networking. InTrustcom/BigDataSE/ISPA, Vol. 1, pp. 310-317(2013) Kumar, K., Joshi, R.C. and Singh, K..: A distributed approach using entropy to detect DDoS attacks in ISP domain. In Signal Processing, Communications and Networking, ICSCN07. International Conference on pp. 331-337(2007) Feinstein L, Schnackenberg D, Balupari R, Kindred D. :Statistical approaches to DDoS attack detection and response. InDARPA Information Survivability Conference and Exposition, 2003. Proceedings Vol. 1, pp. 303-314(2003) Krishnan, R., Krishnaswamy, D. and Mcdysan, D.: Behavioral security threat detection strategies for data center switches and routers. In Distributed Computing Systems Workshops (ICDCSW), 2014 IEEE 34th International Conference on pp. 82-87(2014) Zhang Y.:An adaptive flow counting method for anomaly detection in SDN. InProceedings of the ninth ACM conference on Emerging networking experiments and technologies pp. 25-30(2013) P. Gasti, G. Tsudik, E. Uzun, and L. Zhang, DoS and DDoS in named data networking, in 22nd International Conference on Computer Communications and Networks (ICCCN), pp. 1-7(2013) A. Afanasyev, P. Mahadevan, I. Moiseenko, E. Uzun, and L. Zhang.:Interest flooding attack and countermeasures in named data networking, in IFIP Networking Conference, pp. 1-9(2013) A. Compagno, M. Conti, P. Gasti, and G. Tsudik,Poseidon: Mitigating interest flooding DDoS attacks in named data networking,in 38th Conference on Local Computer Networks (LCN), IEEE, pp. 630- 638(2013) H. Dai, Y. Wang, J. Fan, and B. Liu, Mitigate DDoS attacks in NDN by interest traceback, in Conference on Computer Communications Workshops.(INFOCOM WKSHPS), IEEE,pp. 381- 386(2013) S. Choi, K. Kim, S. Kim, and B.-H. Roh, Threat of DoS by interest flooding attack in content-centric networking, in International Conference on Information Networking (ICOIN), pp. 315-319(2013) A. Karami and M. Guerrero-Zapata.: A hybrid multiobjective RBFPSO method for mitigating DoS attacks in named data networking, Neurocomputing, vol. 151, pp. 1262-1282(2015)

Friday, October 25, 2019

The Computer Evolution :: Essays Papers

The Computer Evolution "Who controls the past commands the future. Who commands the future conquers the past." -George Orwell The computer evolution has been an amazing one. There have been astonishing achievements in the computer industry, which dates back almost 2000 years. The earliest existence of the computer dates back to the first century, but the electronic computer has only been around for over a half-century. Throughout the last 40 years computers have changed drastically. They have greatly impacted the American lifestyle. A computer can be found in nearly every business and one out of every two households (Hall, 156). Our Society relies critically on computers for almost all of their daily operations and processes. Only once in a lifetime will a new invention like the computer come about. The fist computer, known as the abacus, was made of wood and parallel wires on which beads were strung. Arithmetic operations were performed when the beads were moved along the wire according to â€Å"programming† rules that had to be memorized by the user (Soma, 14). The second earliest computer, invented by Blaise Pascal in 1694, was a â€Å"digital calculating machine.† Pascal designed this first known digital computer to help his father, who was a tax collector. Pascal’s computer could only add numbers, and they had to be entered by turning dials (Soma, 32). It required a manual process like its ancestor, the abacus. Automation was introduced in the early 1800’s by a mathematics professor named Charles Babbage. He created an automatic calculation machine that was steam powered and stored up to 1000 50-digit numbers. Unlike its two earliest ancestors, Babbage’s invention was able to perform various operations. It relied on cards with hole s punched in them, which are called â€Å"punch cards.† These cards carried out the programming and storing operations for the machine. Unluckily, Babbage’s creation flopped due to the lack of mechanical precision and the lack of demand for the product (Soma, 46). The machine could not operate efficiently because technology was t adequate to make the machine operate efficiently Computer interest dwindled for many years, and it wasn’t until the mid-1800’s that people became interested in them once again. Between 1850 and 1900, the mathematics and physics fields began advancing. The advancements involved extremely arduous calculations and formulas that took a great deal of time when done manually. The Computer Evolution :: Essays Papers The Computer Evolution "Who controls the past commands the future. Who commands the future conquers the past." -George Orwell The computer evolution has been an amazing one. There have been astonishing achievements in the computer industry, which dates back almost 2000 years. The earliest existence of the computer dates back to the first century, but the electronic computer has only been around for over a half-century. Throughout the last 40 years computers have changed drastically. They have greatly impacted the American lifestyle. A computer can be found in nearly every business and one out of every two households (Hall, 156). Our Society relies critically on computers for almost all of their daily operations and processes. Only once in a lifetime will a new invention like the computer come about. The fist computer, known as the abacus, was made of wood and parallel wires on which beads were strung. Arithmetic operations were performed when the beads were moved along the wire according to â€Å"programming† rules that had to be memorized by the user (Soma, 14). The second earliest computer, invented by Blaise Pascal in 1694, was a â€Å"digital calculating machine.† Pascal designed this first known digital computer to help his father, who was a tax collector. Pascal’s computer could only add numbers, and they had to be entered by turning dials (Soma, 32). It required a manual process like its ancestor, the abacus. Automation was introduced in the early 1800’s by a mathematics professor named Charles Babbage. He created an automatic calculation machine that was steam powered and stored up to 1000 50-digit numbers. Unlike its two earliest ancestors, Babbage’s invention was able to perform various operations. It relied on cards with hole s punched in them, which are called â€Å"punch cards.† These cards carried out the programming and storing operations for the machine. Unluckily, Babbage’s creation flopped due to the lack of mechanical precision and the lack of demand for the product (Soma, 46). The machine could not operate efficiently because technology was t adequate to make the machine operate efficiently Computer interest dwindled for many years, and it wasn’t until the mid-1800’s that people became interested in them once again. Between 1850 and 1900, the mathematics and physics fields began advancing. The advancements involved extremely arduous calculations and formulas that took a great deal of time when done manually.

Thursday, October 24, 2019

Blood Promise Chapter Seven

It was like Christmas morning. I wasn't usually big on God or fate, but now I was seriously reconsidering. After I'd passed out, Sydney had apparently made some frantic calls, and someone she knew in Baia had driven to us-risking the darkness-to rescue us and take us back where I could be treated. That was no doubt why I'd had vague sensations of being in a car during my delirium; it hadn't all been part of the dream. And then, somehow, out of all the dhampirs in Baia, I had been taken to Dimitri's mother. That was enough to make me seriously consider that there might truly be forces greater than me at work in the universe. No one told me exactly how it happened, but I soon learned Olena Belikova had a reputation among her peers for healing-and not even any sort of magical healing. She'd had medical training and was the person other dhampirs-and even some Moroi-went to in this region when they wanted to avoid human attention. Still. The coincidence was eerie, and I couldn't help but think there was something going on that I didn't understand. For now, I didn't worry too much about the hows and whys of my current situation. I was too busy staring wide-eyed at my surroundings and its inhabitants. Olena didn't live alone. All of Dimitri's sisters-three of them-lived in the house too, along with their kids. The family resemblance was startling. None of them looked exactly like Dimitri, but in every face, I could see him. The eyes. The smile. Even the sense of humor. Seeing them fed the Dimitri withdrawal I'd had since he'd disappeared-and made it worse at the same time. Whenever I looked at any of them out of my peripheral vision, I'd think I was seeing Dimitri. It was like a house of mirrors, with distorted reflections of him everywhere. Even the house gave me a thrill. There were no obvious signs that Dimitri had ever lived there, but I kept thinking, this is where he grew up. He walked these floors, touched these walls†¦ As I walked from room to room, I'd touch the walls too, trying to draw his energy from them. I'd envision him lounging on the couch, home on break from school. I wondered if he'd slid down the banisters when he was little. The images were so real that I had to keep reminding myself that he hadn't been here in ages. â€Å"You've made an amazing recovery,† Olena noted the next morning after I'd been brought to her. She watched with approval as I inhaled a plate of blini. They were ultra-thin pancakes stacked and layered with butter and jam. My body always required a lot of food to keep its strength up, and I figured as long as I wasn't chewing with my mouth open or anything, I had no reason to feel bad about eating so much. â€Å"I thought you were dead when Abe and Sydney brought you in.† â€Å"Who?† I asked between bites of food. Sydney sat at the table with the rest of the family, hardly touching her food as usual. She seemed clearly uneasy at being in a dhampir household, but when I'd first come downstairs this morning, I'd definitely seen some relief in her eyes. â€Å"Abe Mazur,† said Sydney. Unless I was mistaken, some of the other people at the table exchanged knowing glances. â€Å"He's a Moroi. I†¦ I didn't know how badly you were injured last night, so I called him. He drove down with his guardians. He was the one who brought you here.† Guardians. Plural. â€Å"Is he royal?† Mazur wasn't a royal name, but that wasn't always a sure sign of someone's lineage. And while I was beginning to trust Sydney's social networking and connections to powerful people, I couldn't imagine why a royal would go out of his way for me. Maybe he owed the Alchemists a favor. â€Å"No,† she said bluntly. I frowned. A non-royal Moroi with more than one guardian? Very odd. It was clear she wasn't going to say anything else on the matter-at least not for now. I swallowed another mouthful of blini and turned my attention back to Olena. â€Å"Thanks for taking me in.† Dimitri's older sister, Karolina, sat at the table too, along with her baby girl and son Paul. Paul was about ten and seemed fascinated by me. Dimitri's teenage sister, Viktoria, was also there. She appeared to be a little younger than me. The third Belikov sister was named Sonya and had left for work before I woke up. I'd have to wait to meet her. â€Å"Did you really kill two Strigoi all by yourself?† Paul asked me. â€Å"Paul,† chastised Karolina. â€Å"That's not a nice question to ask.† â€Å"But it's an exciting one,† said Viktoria with a grin. Her brown hair was streaked with gold, but her dark eyes sparkled so much like Dimitri's when he was excited that it tugged at my heart. Again, I had that taunting sensation of Dimitri being here but not here. â€Å"She did,† said Sydney. â€Å"I saw the bodies. Like always.† She wore that comically tormented expression of hers, and I laughed. â€Å"At least I left them where you could find them this time.† My humor suddenly dimmed. â€Å"Did anyone†¦ any other humans notice or hear?† â€Å"I got rid of the bodies before anyone saw,† she said. â€Å"If people heard anything†¦ Well, backwoods places like that are always filled with superstitions and ghost stories. They don't have factual evidence of vampires, per se, but there's always sort of this belief that the supernatural and dangerous are out there. Little do they know.† She said â€Å"ghost stories† without any change of expression. I wondered if she'd seen any of the spirits last night but finally decided she probably hadn't. She'd come outside near the tail end of the fight, and if past evidence was any indication, nobody else could see the spirits I saw-except Strigoi, as it turned out. â€Å"You must have had some good training then,† said Karolina, shifting so the baby leaned against her shoulder. â€Å"You look like you should still be in school.† â€Å"Just got out,† I said, earning another scrutinizing look from Sydney. â€Å"You're American,† said Olena matter-of-factly. â€Å"What in the world could bring you out here?† â€Å"I†¦ I'm looking for someone,† I said after a few moments' hesitation. I was afraid they were going to press for details or that she too would have blood whore suspicions, but just then, the kitchen door opened and Dimitri's grandmother, Yeva, walked in. She had poked her head in earlier and scared the hell out of me. Dimitri had told me that she was a witch of sorts, and I could believe it. She looked like she was a gazillion years old and was so thin, it was a wonder the wind didn't blow her away. She barely stood five feet tall, and her hair covered her head in patchy gray wisps. But it was her eyes that truly frightened me. The rest of her might be frail, but those dark eyes were sharp and alert and seemed to bore into my soul. Even without Dimitri's explanation, I would have taken her for a witch. She was also the only one in the household who didn't speak English. She sat down at one of the empty chairs, and Olena hastily jumped up to get some more blini. Yeva muttered something in Russian that made the others look uncomfortable. Sydney's lips twitched into a small smile. Yeva's eyes were on me as she spoke, and I glanced around for translation. â€Å"What?† I asked. â€Å"Grandmother says you're not telling us the whole truth about why you're here. She says the longer you delay, the worse it will be,† Viktoria explained. She then gave Sydney an apologetic look. â€Å"And she wants to know when the Alchemist is leaving.† â€Å"As soon as possible,† said Sydney dryly. â€Å"Well, why I'm here†¦ it's kind of a long story.† Could I be any vaguer? Yeva said something else, and Olena retorted with what sounded like a chastisement. To me, she spoke gently: â€Å"Ignore her, Rose. She's in one of her moods. Why you're here is your own business-although I'm sure Abe would like to talk to you at some point.† She frowned slightly, and I was reminded of the earlier looks at the table. â€Å"You should make sure you thank him. He seemed very concerned about you.† â€Å"I'd kind of like to see him too,† I mumbled, still curious about this well-protected, non-royal Moroi who had given me a ride and seemed to make everyone uneasy. Eager to avoid more talk of why I was here, I hastily changed the subject. â€Å"I'd also love to look around Baia. I've never been in a place like this before-where so many dhampirs live, I mean.† Viktoria brightened. â€Å"I can definitely give you a tour-if you're sure you're feeling okay. Or if you don't have to leave right away.† She believed I was passing through, which was just as well. Honestly, I wasn't sure what I was doing anymore, now that it seemed likely Dimitri wasn't in the area. I glanced at Sydney questioningly. She shrugged. â€Å"Do whatever you want. I'm not going anywhere.† I found that a little disconcerting too. She'd brought me here as her superiors had told her to do-but now what? Well, that was a concern for later. As soon as I finished my food, Viktoria practically dragged me out the door, as if I was the most exciting thing that had happened around here in a while. Yeva hadn't taken her eyes off me for the rest of the meal, and even though she'd never said anything else, her suspicious look clearly told me she didn't believe a word I'd said. I invited Sydney along on the outing, but she declined, choosing instead to lock herself away in a bedroom to read about Greek temples or make world-controlling phone calls or do whatever it was she did. Viktoria said downtown wasn't far from where they lived and was easy to walk to. The day was clear and cool, with enough sun to make being outside pretty pleasant. â€Å"We don't get a lot of visitors,† she explained. â€Å"Except for Moroi men, but most don't stay long.† She added no more, but I wondered about her implications. Were these Moroi men off to find some action with dhampir women? I'd grown up thinking of these women, dhampirs who chose not to become guardians, as disgraceful and dirty. The ones in the Nightingale had certainly met the blood whore stereotype, but Dimitri had assured me that not all dhampir women were like that. After meeting the Belikovs, I believed him. As we approached the center of town, I soon discovered another myth shattered. People always talked about blood whores living in camps or communes, but that wasn't the case here. Baia wasn't huge, not like Saint Petersburg or even Omsk, but it was a real town with a large human population. Hardly a rural camp or farm settlement. The whole setting was astonishingly normal, and when we reached downtown, lined with small shops and restaurants, it too seemed like any other place in the world people might live. Modern and ordinary, just with a slight village feel. â€Å"Where are all the dhampirs?† I wondered aloud. Sydney had said there was a secret dhampir subculture, but I saw no signs of it. Viktoria smiled. â€Å"Oh, they're here. We have a lot of businesses and other places that humans don't know about.† While I could understand dhampirs going unnoticed in big cities, it seemed remarkable to pull that off here. â€Å"And lots of us just live and work with humans.† She nodded over toward what looked like a drugstore. â€Å"That's where Sonya works now.† â€Å"Now?† â€Å"Now that she's pregnant.† Viktoria rolled her eyes. â€Å"I'd take you to meet her, but she's grumpy all the time lately. I hope the baby's early.† She left it at that, and I again wondered about the dynamics of dhampirs and Moroi here. We didn't mention it again, and our conversation stayed light and even teasing. Viktoria was easy to like, and in only an hour, we'd clicked as though we'd known each other forever. Maybe my connection to Dimitri bound me to his family, too. My thoughts were cut off when someone called Viktoria's name. We turned to see a very cute dhampir guy crossing the street. He had bronze hair and dark eyes, his age falling somewhere between mine and Viktoria's. He said something chatty and conversational to her. She grinned at him and then gestured to me, giving my introduction in Russian. â€Å"This is Nikolai,† she told me in English. â€Å"Nice to meet you,† he said, also switching languages. He gave me a quick assessment in the way guys often do, but when he turned back to Viktoria, it was clear who the object of his affections was. â€Å"You should bring Rose to Marina's party. It's Sunday night.† He hesitated, turning a bit shy. â€Å"You're going, aren't you?† Viktoria turned thoughtful, and I realized she was completely oblivious to his crush. â€Å"I'll be there, but†¦Ã¢â‚¬  She turned to me. â€Å"Will you still be around?† â€Å"I don't know,† I said honestly. â€Å"But I'll go if I'm still here. What kind of party is it?† â€Å"Marina's a friend from school,† explained Viktoria. â€Å"We're just going to get together and celebrate before we go back.† â€Å"To school?† I asked stupidly. Somehow, it had never occurred to me that the dhampirs out here would be in school. â€Å"We're on break right now,† said Nikolai. â€Å"For Easter.† â€Å"Oh.† It was late April, but I had no clue what day Easter fell on this year. I'd lost track of the days. It hadn't happened yet, so their school must have their break the week before Easter. St. Vladimir's took its vacation afterward. â€Å"Where is your school?† â€Å"It's about three hours away. Even more remote than here.† Viktoria made a face. â€Å"Baia's not so bad,† teased Nikolai. â€Å"Easy for you to say. You'll eventually leave and go see new and exciting places.† â€Å"Can't you?† I asked her. She frowned, suddenly uncomfortable. â€Å"Well, I could†¦ but that's not how we do it here-at least not in my family. Grandmother has some†¦ strong opinions about men and women. Nikolai will be a guardian, but I'll stay here with my family.† Nikolai suddenly gave me a new appraisal. â€Å"Are you a guardian?† â€Å"Ah, well.† Now I was the uncomfortable one. Viktoria spoke before I could come up with anything to say. â€Å"She killed two Strigoi outside of town. By herself.† He looked impressed. â€Å"You are a guardian.† â€Å"Well, no†¦ I've killed before, but I'm not actually sworn.† Turning around, I lifted up my hair to show them my neck. In addition to all my regular molnija marks, I also had the little star-shaped tattoo that meant I'd been in a battle. They both gasped, and Nikolai said something in Russian. I let my hair drop and looked back. â€Å"What?† â€Å"You're†¦Ã¢â‚¬  Viktoria bit her lip, eyes contemplative as she groped for what she wanted to say. â€Å"Unpromised? I don't know the English word.† â€Å"Unpromised?† I said. â€Å"I guess†¦ but technically, aren't all the women here?† â€Å"Even if we aren't guardians, we still get marks showing we completed our training. No promise mark, though. For you to have killed so many Strigoi and have no loyalties to a school or the guardians†¦Ã¢â‚¬  Viktoria shrugged. â€Å"We call it being unpromised-it's a strange thing.† â€Å"It's strange where I come from too,† I admitted. Unheard of, really. So much so, that we didn't have a term for it. It just wasn't done. â€Å"I should let you two go,† said Nikolai, his lovesick eyes back on Viktoria. â€Å"But I'll see you at Marina's for sure? Maybe sooner?† â€Å"Yes,† she agreed. They said their farewells in Russian, and then he loped off across the street with the kind of easy, athletic grace guardians often acquired with training. It reminded me a bit of Dimitri's. â€Å"I must have scared him off,† I said. â€Å"No, he thinks you're exciting.† â€Å"Not as exciting as he thinks you are.† Her eyebrows rose. â€Å"What?† â€Å"He likes you†¦ I mean, really likes. Can't you tell?† â€Å"Oh. We're just friends.† I could tell from her attitude that she meant it. She was completely indifferent to him, which was too bad. He was cute and nice. Letting poor Nikolai go, I brought up the guardians again. I was intrigued by the different attitudes around here. â€Å"You said you can't†¦ but do you want to be a guardian?† She hesitated. â€Å"I've never really considered it. I get all the same training at school, and I like being able to defend myself. But I'd rather use it in defense of my family than Moroi. I guess it sounds†¦Ã¢â‚¬  She paused again to think of the right word. â€Å"†¦ Sexist? But, the men become guardians, and women stay at home. Only my brother left.† I nearly tripped. â€Å"Your brother?† I asked, keeping my voice as steady as possible. â€Å"Dimitri,† she said. â€Å"He's older than me and has been a guardian for a while. He's over in the United States, actually. We haven't seen him in a long time.† â€Å"Huh.† I felt horrible and guilty. Guilty because I was keeping the truth from Viktoria and the others. Horrible because apparently no one from back home had bothered to pass the news on to his family yet. Smiling at her own memories, she didn't notice my change in mood. â€Å"Paul actually looks exactly like he did at that age. I should show you pictures of him-and some recent ones, too. Dimitri's pretty cute. For my brother, I mean.† I was sure seeing pictures of Dimitri as a little boy would rip my heart out. As it was, the more Viktoria began to talk about him, the sicker I felt. She had no clue about what had happened, and even though it had been a couple of years since she'd seen him, it was clear she and the rest of the family loved him like crazy. Not that that should be a surprise. (And really, who couldn't love Dimitri?) Being around them just one morning had shown me how close they all were. I knew from Dimitri's stories that he was crazy about all of them, too. â€Å"Rose? Are you okay?† Viktoria was peering at me with concern, probably because I hadn't said anything in the last ten minutes. We had circled around and were almost back at her house. Looking at her, at her open, friendly face and eyes that were so much like Dimitri's, I realized I had another task ahead of me before I could go after Dimitri, wherever he was. I swallowed. â€Å"I†¦ yeah. I think†¦ I think I need to sit down with you and the rest of your family.† â€Å"Okay,† she said, the worry still in her voice. Inside the house, Olena was bustling around the kitchen with Karolina. I thought they were making plans for tonight's dinner, which was startling considering we'd just finished a huge breakfast. I could definitely get used to the way they ate around here. In the living room, Paul was building an elaborate racetrack out of Legos. Yeva sat in a rocking chair and appeared to be the world's most stereotypical grandmother as she knit a pair of socks. Except most grandmothers didn't look like they could incinerate you with a single glance. Olena was talking to Karolina in Russian but switched to English when she saw me. â€Å"You two are back earlier than I expected.† â€Å"We saw the town,† said Viktoria. â€Å"And†¦ Rose wanted to talk to you. To all of us.† Olena gave me a look as puzzled and concerned as Viktoria's. â€Å"What's going on?† The weight of all those Belikov eyes on me made my heart start thumping in my chest. How was I going to do this? How could I explain something I hadn't spoken about in weeks? I couldn't stand to put them-or myself-through it. When Yeva scuttled in, it made things that much worse. Maybe she'd had some mystical sense that something big was about to go down. â€Å"We should sit,† I said. Paul stayed in the living room, for which I was grateful. I was pretty sure I couldn't handle saying what I had to with a little kid-one who looked like Dimitri, apparently-watching me. â€Å"Rose, what's wrong?† asked Olena. She looked so sweet and, well†¦ motherly, that I nearly cried. Whenever I'd been angry with my own mother for not being around or doing a good job, I'd always compared her to some idealized image of a mom-a mom who seemed a lot like Dimitri's, I realized. Dimitri's sisters looked equally worried, like I was someone they'd known forever. That acceptance and concern made my eyes burn even more, seeing as they'd just met me this morning. Yeva wore a very strange expression, however-almost like she'd been expecting something like this all along. â€Å"Well†¦ the thing is, the reason I came here, to Baia, was to find you guys.† That wasn't entirely true. I'd come to search for Dimitri. I'd never thought much about finding his family, but now, I realized that it was a good thing I had. â€Å"You see, Viktoria was talking about Dimitri earlier.† Olena's face brightened when I said her son's name. â€Å"And†¦ I knew-er, know him. He used to be a guardian at my school. My teacher, actually.† Karolina and Viktoria lit up as well. â€Å"How is he?† asked Karolina. â€Å"It's been ages since we've seen him. Do you know when he's going to visit?† I couldn't even think about answering her question, so I pushed forward with my story before I lost my courage in front of all those loving faces. As the words came out of my mouth, it was almost like someone else was saying them and I was simply watching from a distance. â€Å"A month ago†¦ our school was attacked by Strigoi. A really bad attack†¦ a huge group of Strigoi. We lost a lot of people-Moroi and dhampirs, both.† Olena exclaimed in Russia. Viktoria leaned toward me. â€Å"St. Vladimir's?† I halted in my story, surprised. â€Å"You've heard of it?† â€Å"Everyone's heard of it,† said Karolina. â€Å"We all know what happened. That was your school? You were there that night?† I nodded. â€Å"No wonder you have so many molnija marks,† breathed Viktoria in wonder. â€Å"And that's where Dimitri's at now?† asked Olena. â€Å"We lost track of his latest assignment.† â€Å"Um, yeah†¦Ã¢â‚¬  My tongue felt thick in my throat. I couldn't breathe. â€Å"I was at the school the night of the attack,† I reaffirmed. â€Å"And so was Dimitri. He was one of the leaders in the battle†¦ and the way he fought†¦ he was†¦ he was so brave†¦ and†¦Ã¢â‚¬  My words were breaking up, but by this point, the others were catching on. Olena gasped and again murmured in Russian. I picked out the word for â€Å"God.† Karolina sat frozen, but Viktoria leaned toward me. Those eyes that were so like her brother's stared at me intently, as intently as he would if pushing me to tell the truth, no matter how awful. â€Å"What happened?† she demanded. â€Å"What happened to Dimitri?† I looked away from their faces, my eyes drifting to the living room. On the far wall, I caught sight of a bookcase filled with old, leather-covered books. They had gold-embossed lettering on the spines. It was totally random, but I suddenly remembered Dimitri mentioning those. They were these old adventure novels my mother collected, he'd told me once. The covers were so beautiful, and I loved them. If I was careful, she'd let me read them sometimes. The thought of a young Dimitri sitting in front of that bookcase, carefully turning the pages-and oh, he would have been careful-almost made me lose it. Had that been where he'd developed his love of western novels? I was losing it. I was getting distracted. I wasn't going to be able to tell them the truth. My emotions were growing too powerful, my memories flooding me as I fought to think about something-anything-that didn't involve that horrible battle. Then I glanced at Yeva again, and something about her eerie, knowing expression inexplicably spurred me on. I had to do this. I turned back to the others. â€Å"He fought really bravely in the battle, and afterward, he helped lead a rescue mission to save some people that the Strigoi had captured. He was really amazing there, too, only†¦ he†¦Ã¢â‚¬  I stopped again and realized tears were running down my cheeks. In my mind, I was replaying that awful scene in the cave, with Dimitri so close to freedom and taken by a Strigoi at the last minute. Shaking that thought away, I took another deep breath. I had to finish this. I owed it to his family. There was no gentle way to say it. â€Å"One of the Strigoi there†¦ well, he overpowered Dimitri.† Karolina buried her face in her mother's shoulder, and Olena made no effort to hide her own tears. Viktoria wasn't crying, but her face had gone perfectly still. She was working hard to keep her emotions in check, just as Dimitri would have. She searched my face, needing to know for sure. â€Å"Dimitri is dead,† she said. It was a statement, not a question, but she was looking to me for confirmation. I wondered if I'd given away something, some hint that there was still more to the story. Or maybe she just needed the certainty of those words. And for a moment, I considered telling them that Dimitri was dead. It was what the Academy would tell them, what the guardians would tell them. It would be easier on them†¦ but somehow, I couldn't stand to lie to them-even if it was a comforting lie. Dimitri would have wanted the whole truth, and his family would too. â€Å"No,† I said, and for a heartbeat, hope sprang up in everyone's faces-at least until I spoke again. â€Å"Dimitri's a Strigoi.†

Wednesday, October 23, 2019

Birago Diop’s Vanity Essay

Birago Diop: He was born in 1906 at Dakar, Senegal. He was educated in Senegal and in France where in qualifed in veterinary surgeon. VANITY is one of his many poems he used in expressing the presence of the ancestor. THE POEM VANITY If we tell, gently, gently All that we shall one day have to tell, Who then will hear our voices without laughter, Sad complaining voices of beggars Who indeed will hear them without laughter? If we roughly of our torments Ever increasing from the start of things What eyes will watch our large mouths Shaped by the laughter of big children What eyes will watch our large mouth? What hearts will listen to our clamoring? What ear to our pitiful anger Which grows in us like a tumor In the black depth of our plaintive throats? When our Dead comes with their Dead When they have spoken to us in their clumsy voices; Just as our ears were deaf To their cries, to their wild appeals Just as our ears were deaf They have left on the earth their cries, In the air, on the water, where they have traced their signs For us blind deaf and unworthy Sons Who see nothing of what they have made In the air, on the water, where they have traced their signs And since we did not understand the dead Since we have never listen to their cries If we weep, gently, gently If we cry roughly to our torments What heart will listen to our clamoring, What ear to our sobbing hearts?