Traffic-Adaptive Packet Filtering of Denial of Service Attacks

Size: px
Start display at page:

Download "Traffic-Adaptive Packet Filtering of Denial of Service Attacks"

Transcription

1 Traffic-Adaptive Packet Filtering of Denial of Service Attacks Lukas Kencl, Christian Schwarzer Intel Research JJ Thomson Avenue, Cambridge, CB FD, United Kingdom {lukas.kencl, Abstract Traffic-adaptive packet filtering is a mechanism to adjust packet classification methods at run-time to the particular traffic mix a network node is receiving. It has been conjectured previously that such techniques could perform positively when filtering out malicious attack traffic, due to their flow aggregation capabilities. In this work, we present two novel contributions - a first ever working implementation of a traffic adaptive firewall, based on insertion of shortcuts into a search tree, and both a simulated and a real-life performance study of adaptive packet filtering under denial-of-service attack traffic, the outcomes of which support the above conjecture.. Introduction Recent interest in packet filtering, or packet classification, stems from the growing size of filter rule databases (i.e. Access Control Lists (ACLs)), used to protect ISPs and enterprise networks as well as individual hosts against attacks on the increasingly hostile Internet. Packet classification methods are also used in implementing Virtual Private Networks (VPNs) and in performing Traffic Engineering (TE). By packet classification we understand a task where multiple fields in the packet header are compared against rules in a classification table, to determine the applying rule with the highest priority. The rules can be a combination of a fixed match, prefix match or range match over various fields of the packet header. Classification rule bases can be very large (e.g. k rules []) and the search speed is a major performance factor. Executed per every packet, the search must be carried out within a tight time budget. As it usually requires a number of memory accesses, and memory latency lags behind processor and link transmission speed growth, optimization of data structures is critical. Efficient rule-based classification [6, 8,, ] has been a subject of extensive research. Often, a search tree is built over a pre-processed rule-set (as in the Hi-Cuts [8] and HyperCuts [] methods, see Fig. ). The methods are typically optimized for the worst case scenario, minimizing the depth of the search tree. However, neither the packet flows (sequences of packets sharing the same -tuple flow ID ) are distributed uniformly over the address- or rule-space, nor the popularity of flows in terms of packet count is uniform [7, ]. Previous studies [7] confirmed that some of the flow parameters are correlated (e.g. rate and size) and that small flows (mice) represent the majority, yet most of the traffic (in bytes) is concentrated in few big flows (elephants) []. These were shown to be persistent at least on a small time scale (holds for flow volumes []). In search trees this traffic bias is reflected as imbalance in the tree traversal patterns, as a vast majority of searches typically end in a tiny subset of tree leaves [, ]. This phenomenon has led to recent designs of traffic-aware classification methods [, ], aiming to obtain much superior average case performance, while bounding the worst case. As often in TE [], flows that carry most of the traffic are identified and treated differently to optimize resources utilization. While performing well under the typical Zipf-like patterns of normal networking traffic, it remained an open question how would such methods fare in presence of malicious traffic, such as a denial-of-service attack [9]. In the following, we experimentally validate the performance of the shortcut method [] under such conditions, showing that it actually adapts gracefully to the attack traffic. The -tuple flow ID is defined as: IP source and destination addresses, IP protocol number and TCP/UDP source and destination port numbers. Packet IP Source: IP Dest.: IP Source 9.6/ 9.8/ IP Destination 8.6/ 8.7/ Rule IP Source: /6 IP Destination: /7... Figure. Example of tree-based packet classification, as in Hi-Cuts [8].

2 . Traffic-Adaptive Packet Filtering The adaptive packet filtering method periodically introduces shortcuts into the search tree along frequently travelled paths, to reduce the number of memory accesses. Statistics about how the tree is traversed are collected continuously and read periodically. Reading counters in all the tree leaves is sufficient to recreate the entire traversal pattern of the tree, as the statistics can be aggregated in parent nodes all the way up to the root. With large trees, this operation may be prohibitive (e.g. in a tree of depth l = and node degree d =, about million leaf counters would have to be read). Heuristics and optimizations have been proposed to streamline the counter management [, ]. Shortcuts are further edges inserted into the tree, bypassing several nodes and aggregating the tests along that path (see Fig. ). Shortcuts are placed only along such paths where beneficial for the number of memory accesses saved. In this work, we use the previously proposed sequential shortcut placement heuristic by Bergamini and Kencl []. This Network of Shortcuts (NoS) placement algorithm traverses the tree in a top-down, left-to-right fashion, and at each node attempts to place the best shortcut in the node subtree, based on Local Gain, i.e. how many memory accesses would placing such a shortcut save. The complexity is O(N log d N), wheren is the total number of nodes. Variables used for evaluating the shortcut method performance are Total Gain, e.g. the total number of memory accesses saved by using the method (equal to the sum of Local Gains), and, which determines what fraction of memory accesses have been eliminated. If BMA is the number of memory accesses needed if using the original tree and AMA if using the shortcuts, Total Gain is defined as TGAIN =(BMA AMA) and as RGAIN = TGAIN/BMA. The NoS method performs a control loop, where periodically the statistics are read and the shortcuts for the next time interval are placed. The duration of the adaptation interval is determined on a few profiling runs by trading off the gain obtained by the shortcuts against the cost of recomputing the shortcuts and running the control loop. The method of prediction of the frequently travelled paths is open for further research. In this work, we place shortcuts as they would perform best on traffic in the previous time interval. The NoS method has been shown in [] to compare favorably with a similar sized cache. This is due to high aggregation of different flows along a single path, easily covered with shortcuts. Similarly, we conjecture that a shortcut method actually benefits from an exhaustive Denial-of- Service (DoS) Attack on the firewall, as the many different flow identifiers used in the attack packets gather along few paths in the search tree. a Figure. Shortcut example: a shortcut from a is inserted to reach hotspot e faster.. Implementation The traffic-adaptive packet filtering is implemented, on one hand, in MATLAB for fast prototyping and simulation and, on the other hand, in Linux for real-life experiments. Our Linux implementation is based on PTree [], a treebased packet classification package for Linux. that is implemented in three parts: a Java GUI front-end, a user-space back-end with tree compiler and a kernel module that hooks itself into the Linux protocol stack by means of the netfilter architecture. We enhanced the PTree implementation with modules that perform the adaptation to the network traffic conditions. The resulting architecture is shown in Fig.. Kernel modules execute the actual per-packet classification and the hit statistics collection on all the tree nodes. The creation of the search tree and the periodic recomputation of the shortcuts is performed in the user-space. The NoS module periodically pulls the hit statistics from the User Space PTree Front End GUI Kernel Space Packets IN PTree Back End NoS Module Rule Base Statistics Gathering b Search Tree NoS Placement NoS on PTree Packet Classification Kernel module Memory Node Monitoring Counters Tree NoS Shortcuts Figure. NoS Linux implementation. c d e Packets OUT

3 kernel to the user-space in order to compute a new shortcut placement. The new shortcuts are then downloaded to the kernel and added to the decision tree without updating the original search tree itself. The actual shortcuts are represented as enhanced copies of original tree nodes and stored at a different memory location than the classification tree. Branch and shortcut traversal is done by memory indirection, which doesn t affect the memory layout of the initial classification tree.. Experimental Validation We use two approaches to validate the shortcut concept. Firstly, we simulate the classification based on packet headers from real traces against realistic trees in MATLAB software. Secondly, the Linux kernel implementation of the adaptive classification method is used as a firewall over which a client is streaming a video from a server. Both in the simulated as well as in the real-life experiments, we evaluate the behavior and performance of the adaptive system in presence of a denial of service (DoS) attack... Simulated Experiments In order to make the simulated MATLAB experiments as realistic as possible we are not only using real network traces to extract -tuple packet header information, but also realistic rule sets to generate the classification tree. Two different real network traces are replayed against the packet classification tree. The dump trace was collected by the network monitor described in [] at a Gigabit Ethernet connection. The distributions of flow sizes, durations and rates can be considered to be in stationary regime. The prefix-preserving anonymized DDoS_Attack trace (as used in [9]) contains a distributed denial of service attack. The attack is a reflector attack that sends echo reply packets to a target victim. Basic statistics for the two traces are shown in Table. Fig. shows the scatter plot of IP destination address (-bit) vs. IP source address (- bit) of all flow IDs for both traces. The IP tuples of the DDoS_Attack trace occupy a much larger area of the total tuple space ( ) than those of the dump trace. This is probably caused by the anonymization scheme. Table. Trace statistics DDos Attack dump Total packets Distinct flow IDs 99 Attack packets - Attack flow IDs - First attack packet 7 - Last attack packet 69 - We evaluate the shortcut method on two instances of search trees. Firstly, on an artificial balanced and complete tree of degree and depth 9, where at each node the search space is partitioned into neighboring chunks of equal size. Secondly, a HyperCuts [] packet classification tree on IP source and destination fields is derived from rules with the filter set generator of the ClassBench suite [6], with default parameters: smoothness =, address scope = and application scope = -.. HyperCuts parameters are: maximum rules in leaf = and maximum number of cuts =. The resulting tree has a total of nodes out of which 99 are leaves. Average tree depth is 7. (standard deviation of.7), whereas minimal and maximal depth are and 9. As performance metric of the shortcut placement we use RGAIN (fraction of memory accesses saved per adaptation interval). An adaptation interval of packets was used for both dump and DDoS_Attack traces. Results Discussion: The evolution of the relative gain vs. the number of the adaptation interval is shown in Fig. (top and middle). The adaptation intervals containing packets of the distributed denial of service attack can clearly be distinguished from intervals containing only non-malicious traffic. In fact, the attack has a beneficial impact on the performance of the adaptive method. On average, there are only around packets per non-malicious flow as opposed to 79 packets in a flow taking part in the DDoS attack. As many packets in few different flows can be much better captured by the shortcuts than few packets in many different flows, the adaptive method performs better during the attack. The shortcut placement algorithm achieves better performance on the dump trace. This is probably due to the fact that IP source and destination tuples (Fig. ) in the DDoS_Attack trace are spread more uniformly over the address space. Clustering in the dump trace leads to more packets being caught by the same branch in the classification tree, which makes a shortcut placement in such a branch more effective. Fig. also shows results for both trees. The higher relative gain on the balanced tree is due to its high depth that allows the placement of longer and, therefore, more effective shortcuts, as illustrated by average shortcut lengths in Fig. (bottom). IP destination address... x 9 9 IP source address x IP destination address... x 9 9 IP source address x Figure. IP source vs. dest. address for DDoS Attack (left) and dump (right) trace

4 "DDos_Attack" on artificial tree "DDos_Attack" on HyperCuts tree.6.6 Attack.... Attack "dump" on artificial tree "dump" on HyperCuts tree. Average Shortcut Length "dump" on artificial tree Average Shortcut Length "dump" on HyperCuts tree Figure. Time series of relative gain and average shortcut length for DDoS Attack and dump trace on artificial tree and HyperCuts tree. Adaptation interval is packets... Real-life Experiments The performance of the shortcut method in a real network configuration is demonstrated by using the Linux implementation of the adaptive packet filter as a firewall on a Linux machine. The firewall is placed as a router in a small network configuration using four Linux machines. The testbed is depicted in Fig. 6 and includes the router running a tree-based packet classifier, a video streaming server, a video client and a machine hosting an attacker. The client is playing a video stream provided by the video server directly over the network and over the cen- Video Server Video Stream Malicious Traffic Router with Firewall Attacker Video Stream Figure 6. Experimental testbed Video Client tral router. The firewall on the router is configured to allow through the video data packets from server to client and the corresponding acknowledgements from client to server. Packets not belonging to one of these flows are dropped at the router. We compare the performance of the shortcut placement in terms of throughput at the client with and without attacking traffic on the router by switching the adaptive shortcut placement module from off to on during the experiments. Results Discussion: In both experiments, the video is initially played at the client without loss or jitter at a rate of about. MBytes/sec (Fig. 7: NoS off). As the shortcuts accelerate the classification of a data flow, the activation of the adaptive method increases the throughput of the video stream as shown on the left of Fig. 7. If the attacker starts her denial of service attack by sending bogus packets at rate MBytes/sec against the router, the tree-based classification algorithm gets overwhelmed with malicious packets that also need to be matched against the firewall tree. For the purpose of this experiment, the firewall is configured as not to be able to handle the amount

5 Throughput [bytes/s] 7 x 7 6 NoS off NoS on 6 Time [s] Throughput [bytes/s]. x 7 NoS off NoS on Attacker Traffic Video Traffic Time [s] Figure 7. Throughput of video data at the client before/after (NoS off/on) the activation of the shortcut placement without (left) and with (right) attack on the firewall. Adaptation interval is seconds. of packets being sent by the attacker, which leads to a growing packet queue at the root of the classification tree. Video data packets are, therefore, experiencing large delays leading to very low or zero effective throughput at the client (region in the right of Fig. 7). As a consequence, the video software stops the playback or loops through the local buffer content. Switching on the adaptive control loop remedies the situation by adapting the classification tree to the current traffic situation. The placement of shortcuts in the three frequently traveled tree branches corresponding to server-to-client, client-to-server and attacker-to-firewall packet flows reduces significantly the number of memory accesses in the classification process and, consequently, increases the throughput at the firewall. The actual throughput of video data packets (Region in the right of Fig. 7) is now again high enough to guarantee lossless and jitter-free playback at the client.. Conclusion Two statements can be concluded based on this study: firstly, it is feasible to implement an adaptive extension to a tree-based filtering method and it can improve a networking device throughput significantly; secondly, the shortcut insertion (NoS) technique can be very effective in boosting a filter performance under the DoS attack traffic conditions. To reach a general conclusion about a traffic-adaptive method s performance under attack condition, much more thorough investigation is needed, with many other types of attacks; in particular an algorithmic attack on the adaptation method itself. For the moment, though, this paper justifies mild optimism about the applicability of such methods. References [] D. Becker, R. Todorovic, and Q. Wang. PTREE: A system for flexible, efficient packet classification. Technical Report CS Networking Project at Washington University in St. Louis, USA,. [] A. Bergamini and L. Kencl. Network of shortcuts: An adaptive data structure for tree-based search methods. In Proceedings of IFIP Networking, Waterloo, Canada, May. [] N. Brownlee and kc claffy. Understanding internet traffic streams: Dragonflies and tortoises. IEEE Communications Magazine,, October. [] E. Cohen and C. Lund. Packet classification in large ISPs: design and evaluation of decision tree classifiers. In Proceedings of SIGMETRICS, Banff, Canada,. [] H. Dreger, A. Feldmann, B. Krishnamurthy, J. Wallerich, and W. Willinger. A methodology for studying stability aspects of Internet flows. Computer Communication Review, May. [6] A. Feldmann and S. Muthukrishnan. Tradeoffs for packet classification. In Proceedings of IEEE Infocom,. [7] A. Feldmann and W. Whitt. Fittingmixtures of exponentials to long-tail distributions to analyze network performance models. In Proceedings of IEEE Infocom, 997. [8] P. Gupta and N. McKeown. Packet classification using hierarchical intelligent cuttings. In Proceedings of Hot Interconnects VII, 999. [9] A. Hussain, J. Heidemann, and C. Papadopoulos. A framework for classifying denial of service attacks. In Proceedings of SIGCOMM, Karlsruhe, Germany, August. [] N. Kammenhuber and L. Kencl. Efficient statistics gathering from tree-search methods in packet processing systems. In Proceedings of IEEE ICC, Seoul, Korea, May. [] M. Kounavis, A. Kumar, H. Vin, R. Yavatkar, and A. Campbell. Directions in packet classification for network processors. In Proceedings of the nd IEEE Workshop on Network Processors,. [] A. Moore, J.Hall, C.Kreibich, E.Harris, and I.Pratt. Architecture of a network monitor. In Passive and Active Measurement Workshop (PAM), La Jolla, CA, USA,. [] K. Papagiannaki, N. Taft, and C. Diot. Impact of flow dynamics on traffic engineering principles. In Proceedings of INFOCOM,. [] S. Ramabhadran and G. Varghese. Efficient implementation of a statistics counter architecture. In Proceedings of ACM SIGMETRICS, San Diego, CA, USA, June. [] S. Singh, F. Baboescu, G. Varghese, and J. Wang. Packet classification using multidimensional cutting. In Proceedings of SIGCOMM, Karlsruhe, Germany,. [6] D. Taylor and J. Turner. ClassBench: A packet classification benchmark. In Proceedings of INFOCOM, Miami, FL, USA,. [7] Y. Zhang, L.Breslau, V.Paxson, and S. Shenker. On the characteristics and origins of internet flow rates. In Proceedings of SIGCOMM,.

Monitoring Large Flows in Network

Monitoring Large Flows in Network Monitoring Large Flows in Network Jing Li, Chengchen Hu, Bin Liu Department of Computer Science and Technology, Tsinghua University Beijing, P. R. China, 100084 { l-j02, hucc03 }@mails.tsinghua.edu.cn,

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

On Constructing Efficient Shared Decision Trees for Multiple Packet Filters

On Constructing Efficient Shared Decision Trees for Multiple Packet Filters On Constructing Efficient Shared Decision Trees for Multiple Packet Filters Bo Zhang T. S. Eugene Ng Department of Computer Science Rice University Abstract Multiple packet filters serving different purposes

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds

A Novel Distributed Denial of Service (DDoS) Attacks Discriminating Detection in Flash Crowds International Journal of Research Studies in Science, Engineering and Technology Volume 1, Issue 9, December 2014, PP 139-143 ISSN 2349-4751 (Print) & ISSN 2349-476X (Online) A Novel Distributed Denial

More information

Parallel Firewalls on General-Purpose Graphics Processing Units

Parallel Firewalls on General-Purpose Graphics Processing Units Parallel Firewalls on General-Purpose Graphics Processing Units Manoj Singh Gaur and Vijay Laxmi Kamal Chandra Reddy, Ankit Tharwani, Ch.Vamshi Krishna, Lakshminarayanan.V Department of Computer Engineering

More information

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis

Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Echidna: Efficient Clustering of Hierarchical Data for Network Traffic Analysis Abdun Mahmood, Christopher Leckie, Parampalli Udaya Department of Computer Science and Software Engineering University of

More information

Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling

Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling Online Identification of Multi-Attribute High-Volume Traffic Aggregates Through Sampling Yong Tang Shigang Chen Department of Computer & Information Science & Engineering University of Florida, Gainesville,

More information

Influence of Load Balancing on Quality of Real Time Data Transmission*

Influence of Load Balancing on Quality of Real Time Data Transmission* SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,

More information

Dynamics of Prefix Usage at an Edge Router

Dynamics of Prefix Usage at an Edge Router Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, christos@cs.colostate.edu}

More information

OpenFlow Based Load Balancing

OpenFlow Based Load Balancing OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple

More information

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS

A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS ICTACT JOURNAL ON COMMUNICATION TECHNOLOGY, JUNE 2010, ISSUE: 02 A TWO LEVEL ARCHITECTURE USING CONSENSUS METHOD FOR GLOBAL DECISION MAKING AGAINST DDoS ATTACKS S.Seetha 1 and P.Raviraj 2 Department of

More information

Policy Distribution Methods for Function Parallel Firewalls

Policy Distribution Methods for Function Parallel Firewalls Policy Distribution Methods for Function Parallel Firewalls Michael R. Horvath GreatWall Systems Winston-Salem, NC 27101, USA Errin W. Fulp Department of Computer Science Wake Forest University Winston-Salem,

More information

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518

International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 ISSN 2229-5518 International Journal of Scientific & Engineering Research, Volume 4, Issue 8, August-2013 1300 Efficient Packet Filtering for Stateful Firewall using the Geometric Efficient Matching Algorithm. Shriya.A.

More information

Online Measurement of Large Traffic Aggregates on Commodity Switches

Online Measurement of Large Traffic Aggregates on Commodity Switches Online Measurement of Large Traffic Aggregates on Commodity Switches Lavanya Jose, Minlan Yu, and Jennifer Rexford Princeton University; Princeton, NJ Abstract Traffic measurement plays an important role

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking

Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand

More information

Index Terms Domain name, Firewall, Packet, Phishing, URL.

Index Terms Domain name, Firewall, Packet, Phishing, URL. BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Architecture of distributed network processors: specifics of application in information security systems

Architecture of distributed network processors: specifics of application in information security systems Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia vlad@neva.ru 1. Introduction Modern

More information

Data Structures For IP Lookup With Bursty Access Patterns

Data Structures For IP Lookup With Bursty Access Patterns Data Structures For IP Lookup With Bursty Access Patterns Sartaj Sahni & Kun Suk Kim sahni, kskim @cise.ufl.edu Department of Computer and Information Science and Engineering University of Florida, Gainesville,

More information

KNOM Tutorial 2003. Internet Traffic Measurement and Analysis. Sue Bok Moon Dept. of Computer Science

KNOM Tutorial 2003. Internet Traffic Measurement and Analysis. Sue Bok Moon Dept. of Computer Science KNOM Tutorial 2003 Internet Traffic Measurement and Analysis Sue Bok Moon Dept. of Computer Science Overview Definition of Traffic Matrix 4Traffic demand, delay, loss Applications of Traffic Matrix 4Engineering,

More information

A High-Performance Capabilities-Based Network Protocol

A High-Performance Capabilities-Based Network Protocol A High-Performance Capabilities-Based Network Protocol Tilman Wolf and Kamlesh T. Vasudevan Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA {wolf,kthondar}@ecs.umass.edu

More information

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers

Layer 4-7 Server Load Balancing. Security, High-Availability and Scalability of Web and Application Servers Layer 4-7 Server Load Balancing Security, High-Availability and Scalability of Web and Application Servers Foundry Overview Mission: World Headquarters San Jose, California Performance, High Availability,

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

Smart Queue Scheduling for QoS Spring 2001 Final Report

Smart Queue Scheduling for QoS Spring 2001 Final Report ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang(hfanga@sfu.ca) & Liu Tang(llt@sfu.ca)

More information

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller

OpenFlow: Load Balancing in enterprise networks using Floodlight Controller OpenFlow: Load Balancing in enterprise networks using Floodlight Controller Srinivas Govindraj, Arunkumar Jayaraman, Nitin Khanna, Kaushik Ravi Prakash srinivas.govindraj@colorado.edu, arunkumar.jayaraman@colorado.edu,

More information

Optimizing Data Center Networks for Cloud Computing

Optimizing Data Center Networks for Cloud Computing PRAMAK 1 Optimizing Data Center Networks for Cloud Computing Data Center networks have evolved over time as the nature of computing changed. They evolved to handle the computing models based on main-frames,

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX

Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Comparisons of SDN OpenFlow Controllers over EstiNet: Ryu vs. NOX Shie-Yuan Wang Hung-Wei Chiu and Chih-Liang Chou Department of Computer Science, National Chiao Tung University, Taiwan Email: shieyuan@cs.nctu.edu.tw

More information

Secure SCTP against DoS Attacks in Wireless Internet

Secure SCTP against DoS Attacks in Wireless Internet Secure SCTP against DoS Attacks in Wireless Internet Inwhee Joe College of Information and Communications Hanyang University Seoul, Korea iwjoe@hanyang.ac.kr Abstract. The Stream Control Transport Protocol

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

UPC team: Pere Barlet-Ros Josep Solé-Pareta Josep Sanjuàs Diego Amores Intel sponsor: Gianluca Iannaccone

UPC team: Pere Barlet-Ros Josep Solé-Pareta Josep Sanjuàs Diego Amores Intel sponsor: Gianluca Iannaccone Load Shedding for Network Monitoring Systems (SHENESYS) Centre de Comunicacions Avançades de Banda Ampla (CCABA) Universitat Politècnica de Catalunya (UPC) UPC team: Pere Barlet-Ros Josep Solé-Pareta Josep

More information

Comparing Two Models of Distributed Denial of Service (DDoS) Defences

Comparing Two Models of Distributed Denial of Service (DDoS) Defences Comparing Two Models of Distributed Denial of Service (DDoS) Defences Siriwat Karndacharuk Computer Science Department The University of Auckland Email: skar018@ec.auckland.ac.nz Abstract A Controller-Agent

More information

Cisco Application Networking for Citrix Presentation Server

Cisco Application Networking for Citrix Presentation Server Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload

Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Performance Modeling and Analysis of a Database Server with Write-Heavy Workload Manfred Dellkrantz, Maria Kihl 2, and Anders Robertsson Department of Automatic Control, Lund University 2 Department of

More information

Low-rate TCP-targeted Denial of Service Attack Defense

Low-rate TCP-targeted Denial of Service Attack Defense Low-rate TCP-targeted Denial of Service Attack Defense Johnny Tsao Petros Efstathopoulos University of California, Los Angeles, Computer Science Department Los Angeles, CA E-mail: {johnny5t, pefstath}@cs.ucla.edu

More information

Source-domain DDoS Prevention

Source-domain DDoS Prevention bhattacharjee, LTS S 05 Page: 0 Source-domain DDoS Prevention Bobby Bhattacharjee Christopher Kommareddy Mark Shayman Dave Levin Richard La Vahid Tabatabaee University of Maryland bhattacharjee, LTS S

More information

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering

Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls

More information

Performance Evaluation of Linux Bridge

Performance Evaluation of Linux Bridge Performance Evaluation of Linux Bridge James T. Yu School of Computer Science, Telecommunications, and Information System (CTI) DePaul University ABSTRACT This paper studies a unique network feature, Ethernet

More information

How To Monitor And Test An Ethernet Network On A Computer Or Network Card

How To Monitor And Test An Ethernet Network On A Computer Or Network Card 3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel

More information

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP)

A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) A Review on Quality of Service Architectures for Internet Network Service Provider (INSP) Herman and Azizah bte Abd. Rahman Faculty of Computer Science and Information System Universiti Teknologi Malaysia

More information

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)

Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic

More information

Load Balancing Mechanisms in Data Center Networks

Load Balancing Mechanisms in Data Center Networks Load Balancing Mechanisms in Data Center Networks Santosh Mahapatra Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 33 {mahapatr,xyuan}@cs.fsu.edu Abstract We consider

More information

co Characterizing and Tracing Packet Floods Using Cisco R

co Characterizing and Tracing Packet Floods Using Cisco R co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1

More information

Concept of Cache in web proxies

Concept of Cache in web proxies Concept of Cache in web proxies Chan Kit Wai and Somasundaram Meiyappan 1. Introduction Caching is an effective performance enhancing technique that has been used in computer systems for decades. However,

More information

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery

Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding

More information

SAN Conceptual and Design Basics

SAN Conceptual and Design Basics TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

Firewalls and Intrusion Detection

Firewalls and Intrusion Detection Firewalls and Intrusion Detection What is a Firewall? A computer system between the internal network and the rest of the Internet A single computer or a set of computers that cooperate to perform the firewall

More information

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU

Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Performance Analysis of IPv4 v/s IPv6 in Virtual Environment Using UBUNTU Savita Shiwani Computer Science,Gyan Vihar University, Rajasthan, India G.N. Purohit AIM & ACT, Banasthali University, Banasthali,

More information

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service?

APPLICATION NOTE 209 QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS. Quality of Service Drivers. Why Test Quality of Service? QUALITY OF SERVICE: KEY CONCEPTS AND TESTING NEEDS By Thierno Diallo, Product Specialist With the increasing demand for advanced voice and video services, the traditional best-effort delivery model is

More information

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family

Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family Intel Ethernet Switch Load Balancing System Design Using Advanced Features in Intel Ethernet Switch Family White Paper June, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL

More information

CYBER ATTACKS EXPLAINED: PACKET CRAFTING

CYBER ATTACKS EXPLAINED: PACKET CRAFTING CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Chapter 9. IP Secure

Chapter 9. IP Secure Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.

More information

Security vulnerabilities in the Internet and possible solutions

Security vulnerabilities in the Internet and possible solutions Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in

More information

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere!

Interconnection Networks. Interconnection Networks. Interconnection networks are used everywhere! Interconnection Networks Interconnection Networks Interconnection networks are used everywhere! Supercomputers connecting the processors Routers connecting the ports can consider a router as a parallel

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Testing Network Security Using OPNET

Testing Network Security Using OPNET Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:

More information

Stateful Firewalls. Hank and Foo

Stateful Firewalls. Hank and Foo Stateful Firewalls Hank and Foo 1 Types of firewalls Packet filter (stateless) Proxy firewalls Stateful inspection Deep packet inspection 2 Packet filter (Access Control Lists) Treats each packet in isolation

More information

How To Understand A Firewall

How To Understand A Firewall Module II. Internet Security Chapter 6 Firewall Web Security: Theory & Applications School of Software, Sun Yat-sen University Outline 6.1 Introduction to Firewall What Is a Firewall Types of Firewall

More information

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl The SCAMPI Scaleable Monitoring Platform for the Internet Baiba Kaskina TERENA baiba@terena.nl Agenda Project overview Project objectives Project partners Work packages Technical information SCAMPI architecture

More information

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu

On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu On the Feasibility of Prefetching and Caching for Online TV Services: A Measurement Study on Hulu Dilip Kumar Krishnappa, Samamon Khemmarat, Lixin Gao, Michael Zink University of Massachusetts Amherst,

More information

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?

Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS? 18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic

More information

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing

A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing A Scalable Network Monitoring and Bandwidth Throttling System for Cloud Computing N.F. Huysamen and A.E. Krzesinski Department of Mathematical Sciences University of Stellenbosch 7600 Stellenbosch, South

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Trie-Based Policy Representations for Network Firewalls

Trie-Based Policy Representations for Network Firewalls Proceedings of the IEEE International Symposium on Computer Communications, 2005 Trie-Based Policy Representations for Network Firewalls Errin W. Fulp and Stephen J. Tarsa Wake Forest University Department

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

An API for dynamic firewall control and its implementation for Linux Netfilter

An API for dynamic firewall control and its implementation for Linux Netfilter An API for dynamic firewall control and its implementation for Linux Netfilter 3. Essener Workshop "Neue Herausforderungen in der Netzsicherheit" Jochen Kögel, Sebastian Kiesel, Sebastian Meier jochen.koegel@ikr.uni-stuttgart.de

More information

SIDN Server Measurements

SIDN Server Measurements SIDN Server Measurements Yuri Schaeffer 1, NLnet Labs NLnet Labs document 2010-003 July 19, 2010 1 Introduction For future capacity planning SIDN would like to have an insight on the required resources

More information

A VoIP Traffic Monitoring System based on NetFlow v9

A VoIP Traffic Monitoring System based on NetFlow v9 A VoIP Traffic Monitoring System based on NetFlow v9 Chang-Yong Lee *1, Hwan-Kuk Kim, Kyoung-Hee Ko, Jeong-Wook Kim, Hyun- Cheol Jeong Korea Information Security Agency, Seoul, Korea {chylee, rinyfeel,

More information

Malice Aforethought [D]DoS on Today's Internet

Malice Aforethought [D]DoS on Today's Internet Malice Aforethought [D]DoS on Today's Internet Henry Duwe and Sam Mussmann http://bit.ly/cs538-ddos What is DoS? "A denial of service (DoS) attack aims to deny access by legitimate users to shared services

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP

EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Scientific Bulletin of the Electrical Engineering Faculty Year 11 No. 2 (16) ISSN 1843-6188 EXPERIMENTAL STUDY FOR QUALITY OF SERVICE IN VOICE OVER IP Emil DIACONU 1, Gabriel PREDUŞCĂ 2, Denisa CÎRCIUMĂRESCU

More information

Detection of Distributed Denial of Service Attack with Hadoop on Live Network

Detection of Distributed Denial of Service Attack with Hadoop on Live Network Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,

More information

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc

Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc (International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan dr.khalidbilal@hotmail.com

More information

Filtering Based Techniques for DDOS Mitigation

Filtering Based Techniques for DDOS Mitigation Filtering Based Techniques for DDOS Mitigation Comp290: Network Intrusion Detection Manoj Ampalam DDOS Attacks: Target CPU / Bandwidth Attacker signals slaves to launch an attack on a specific target address

More information

Intel DPDK Boosts Server Appliance Performance White Paper

Intel DPDK Boosts Server Appliance Performance White Paper Intel DPDK Boosts Server Appliance Performance Intel DPDK Boosts Server Appliance Performance Introduction As network speeds increase to 40G and above, both in the enterprise and data center, the bottlenecks

More information

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.

Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup. CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer

More information

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow

Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter

More information

Per-Flow Queuing Allot's Approach to Bandwidth Management

Per-Flow Queuing Allot's Approach to Bandwidth Management White Paper Per-Flow Queuing Allot's Approach to Bandwidth Management Allot Communications, July 2006. All Rights Reserved. Table of Contents Executive Overview... 3 Understanding TCP/IP... 4 What is Bandwidth

More information

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall

SOFTWARE ENGINEERING 4C03. Computer Networks & Computer Security. Network Firewall SOFTWARE ENGINEERING 4C03 Computer Networks & Computer Security Network Firewall HAO WANG #0159386 Instructor: Dr. Kartik Krishnan Mar.29, 2004 Software Engineering Department of Computing and Software

More information

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Proceedings of the APAN Network Research Workshop 2013 The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Ming-Chang Liang 1, *, Meng-Jang Lin 2, Li-Chi Ku 3, Tsung-Han Lu 4,

More information

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications

Single Pass Load Balancing with Session Persistence in IPv6 Network. C. J. (Charlie) Liu Network Operations Charter Communications Single Pass Load Balancing with Session Persistence in IPv6 Network C. J. (Charlie) Liu Network Operations Charter Communications Load Balancer Today o Load balancing is still in use today. It is now considered

More information

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback

Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow. Feedback Adaptive Discriminating Detection for DDoS Attacks from Flash Crowds Using Flow Correlation Coeff icient with Collective Feedback N.V.Poorrnima 1, K.ChandraPrabha 2, B.G.Geetha 3 Department of Computer

More information

A Flow-based Method for Abnormal Network Traffic Detection

A Flow-based Method for Abnormal Network Traffic Detection A Flow-based Method for Abnormal Network Traffic Detection Myung-Sup Kim, Hun-Jeong Kang, Seong-Cheol Hong, Seung-Hwa Chung, and James W. Hong Dept. of Computer Science and Engineering POSTECH {mount,

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

LCMON Network Traffic Analysis

LCMON Network Traffic Analysis LCMON Network Traffic Analysis Adam Black Centre for Advanced Internet Architectures, Technical Report 79A Swinburne University of Technology Melbourne, Australia adamblack@swin.edu.au Abstract The Swinburne

More information

Comparative Analysis of Packet Filtering Algorithms with Implementation

Comparative Analysis of Packet Filtering Algorithms with Implementation Research Journal of Recent Sciences ISSN 2277-2502. Comparative Analysis of Packet Filtering Algorithms with Implementation Abstract Hediyeh Amir Jahanshahi Sistani 1, Sayyed Mehdi Poustchi Amin 2 and

More information

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS

QoS Parameters. Quality of Service in the Internet. Traffic Shaping: Congestion Control. Keeping the QoS Quality of Service in the Internet Problem today: IP is packet switched, therefore no guarantees on a transmission is given (throughput, transmission delay, ): the Internet transmits data Best Effort But:

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information