IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION

Size: px
Start display at page:

Download "IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION"

Transcription

1 IP NETWORK MONITORING AND AUTOMATIC ANOMALY DETECTION Michael de Castro, DEEC, Instituto Superior Técnico, Lisboa, Portugal November 2008 Abstract. This paper presents a new tool designed to assist in monitoring and network management. First, an algorithm is developed in order to allow automatic level-2 topology discovery. This feature is based on information collected by SNMP, provided by reference MIBs with the purpose of being supported by the vast majority of the equipments. The second part of this project describes a method of unsupervised learning which allows the detection of abnormal situations in the network. These irregularities are identified by a traffic model composed by a Gaussian mixture, responsible for representing the normal operation of the system. Index Terms Anomaly Detection, Information Security, Network Management, Network Monitoring, SNMP, Topology Discovery. I. INTRODUCTION Nowadays, a constantly growing amount of people s work relies on Information Technologies (IT). This rising need in network applications and information sharing resulted in higher IT requirements, as performance and quality of service (QoS), which became one of the main concerns of IT responsibles. In order to correctly manage IT networks, its configuration and operation have to be continuously monitored and reviewed by network administrators. It s fundamental to possess knowledge about network infrastructure for a proper network management or problem identification and it s important to keep this information constantly updated in order for it to remain reliable and quickly available. However, the size and complexity of today s networks make the manual search for topology difficult and timeconsuming, resulting in a frequent lack of details about the network. In response, this project proposes a new autonomous tool, designed to assist in monitoring and network management. The main focus consists in the development of an algorithm to allow automatic level-2 topology discovery, bypassing the need of manual operations. This tool requires a quantity of information to be obtained regularly from the network, supplying an important database which can be used for several new functionalities, in order to improve network control and administration. Data analysis provides the possibility to verify network operation and performance, with the purpose of identifying equipments failures or security issues. This project also implements that functionality, describing a process to identify network anomalies, even if unknown, with the purpose of mitigating risks and dangers that threaten the proper functioning of a network. A method of unsupervised learning is presented to allow the detection of abnormal situations in the network, which are identified by a traffic model composed by a gaussianas mixture representing the normal operation of the system. The remaining of this document is organized as follows. In Section 2, network management approaches are discussed in order to present the chosen methodology for this project. Section 3 describes the network topology discovery algorithm, while Section 4 focuses on anomaly detection. In Section 5 the results of the tests are presented and, finally, Section 6 concludes the document. II. NETWORK MANAGEMENT APPROACH The main objective of this project is to develop and implement a new network management tool, in order to increase administration efficiency and systems security. The chosen approach is based in automatically retrieving information from the network, building a flexible and complete data resource. This task can be accomplished by polling the different network equipments using Simple Network Management Protocol (SNMP), a management protocol supported by most of IP network s devices. This information gathering must be done as regularly as possible, in order to maintain the data updated and valuable. The obtained data can then be analysed in order to provide different functionalities. This tool tries to centralize several administration needs in a single console, to speed up information s access and problem s resolution. The principal aim is to contribute to the automation and optimization of monitoring and control operations, resulting in an improved network management and an increased security and quality of service. III. NETWORK TOPOLOGY DISCOVERY The knowledge about the correct network topology is crucial for network management tasks like, for instance, event correlation or localization of harmful irregularities. With the purpose of identifying this information, numerous methods and techniques were developed. A. Related Work One of the first approaches consists in searching the layer-3 topology, getting the routing information from the all available routers in the network [1, 2]. This methodology provides interesting results for large and decentralized networks; however, it s not very useful for small and medium network with a centralized star topology, as at Instituto Superior Técnico (IST). In these - 1 -

2 cases, most of the network is based on layer-2 equipments that forward the traffic to the core router, responsible for the connection to Internet. For this reason, the subsequent studies in this document will be focused towards layer-2 topology discovery. One of the first problems that come across in layer-2 topology is the utilization of Spanning Tree Protocol (STP) [3]. This layer-2 protocol offers connection redundancy and failure tolerance, but results in a higher number of topology changes, which complicates the discovery process. Although the STP provides some information that can be used to deduce connections between equipments [4, 5], it only identifies parts of the network, failing in recognising the global topology for complex or heterogeneous networks. From a different perspective, we can compare the network traffic from all the ports of the existent devices and conclude that the interfaces are connected if the sampled traffic is similar. Alternately, data packets can be injected in the network for analysing where they are delivered [6]. Yet, the results from these techniques are mainly based on approximations, which makes this algorithm non reliable for the objectives of the project. In order to provide consistent results, we can try to use the information available in switches Address Forwarding Table (AFT). When two equipments establish a communication, they exchange network packets that are forwarded by the switches located between the equipments, constructing a forwarding path. In the process, the involved switches populate their AFTs with the Media Access Control (MAC) addresses from the neighbour devices, which send or receive information through the network. From the integration of AFTs from several switches, we can conclude connections between equipments, with interesting results [7, 8, 9, 10, 11]. However, this methodology is often based in ideal systems or multinetwork topologies, resulting in requirements hardly verifiable in the real networks, with the characteristics of IST. For this reason, we will develop a new discovery algorithm, based in the AFT analysis, but flexible and aimed at heterogeneous star networks, mainly composed by layer-2 devices. B. Discovery Algorithm We will start by presenting the notation used in this section. We denote S i the switch i from the network where i is only an identifier and we define S ij the j interface from switch S i. For a given switch i, the AFT corresponding to the interface j is denoted by A ij while all the AFTs from that switch are noted by A i. Finally, the set of all switches in the network is represented by N. One of the first issues on AFT based algorithms is the fact that the AFTs are often incomplete of even empty. This occurs when the traffic is low in the network, providing little occupation for the switches. To mitigate this issue, we can ping all the switches from the respective network before starting each topology discovery, which will result in filling most of the AFT entries. If we consider complete AFTs (for each switch i, A i contains the MAC addresses from all the other switches in the network), we can easily deduce Lemma 1, based on [7]: Lemma 1: If A i and A k are complete, the switches i and k are connected by the interfaces j and l correspondingly if and only if A ij A kl = «and A ij» A kl = N. Demonstration: If S ij and S kl are directly connected, there can be no other switch between them, so A ij A kl = «. As the AFTs are complete, all the switches from the network are contained in the union of the AFTs of two connected interfaces, resulting in A ij» A kl = N. Considering now that A ij A kl = «and A ij» A kl = N, we can deduce the following statements. As A ij» A kl = N, the interfaces S ij and S kl must be connected, otherwise we would have S i, S k Ã(A i» A k ) and consequently A ij» A kl N, because S i à A i and S k à A k. If S ij and S kl are connected but not directly connected, there must be a path between S ij and S kl which contains at least one switch, thus A ij A kl «. Therefore, we can conclude that if A ij A kl = «and A ij» A kl = N, then the interfaces S ij and S kl must be directly connected. The application of Lemma 1 permits to search for every direct connection in the network, but requires the AFTs to be complete, which is very unlikely in real networks. In order to create a robust discovery tool, we will need to complement this algorithm with a different approach. The chosen idea is to analyse all the forwarding paths between pairs of switches [9]. Given S i and S j, all the switches that are connected between S i and S j are part of the forwarding path between S i and S j. A switch can only be part of the path if it has the addresses of S i and S j in different AFTs, as we can verify by Lemma 2: Lemma 2: Given three connected switches S i, S k and S m where C is the path between S i and S k ; if S i Õ A mr and S k Õ A ms, with r s, then S m belong to C. Demonstration: If S i, S k and S m are connected and S i, S k Õ A m, then there are only four possible situations: 1. S m connected to S i which is connected to S k by another interface. In this situation, S m is not part of C because S i, S k Õ A mr, which means that S i and S k are connected to the same interface of A m. 2. S m connected to S k, which is connected to S i by another interface. It s the same type of situation as the previous one, where S m does not belong to C, this time because S i, S k Õ A ms. 3. S m connected between S i and S k, but not making part of path C (this situation can occur if the three switches are directly connected to the same hub). A i contains S m and S k in the same interface, as A k with S m and S i ; however, both S i and S k are connected through the same interface of S m, which results in S i, S k Õ A mt. 4. S m connected between S i and S k, belonging to C. A i contains S m and S k in the same interface, as A k with S m and S i ; but now S m has S i Õ A mr and S k Õ A ms, with r s. We can conclude that for S m to be part of C, we only need to verify that S i Õ A mr and S k Õ A ms, with r s. The converse of Lemma 2 is not valid, because the AFTs may be incomplete. Consequently, this method can t assure - 2 -

3 that all network connections are discovered and that each identified connection is a direct connection between equipments. However, inferring the connections of all possible paths between pairs of switches returns important results, as we will verify latter on this document, even if the AFTs are mostly incomplete. The complete discovery algorithm starts by searching direct connections using Lemma 1. Afterwards, it will search all the possible paths between switches (Lemma 2) and sort the results using the relative information in the AFTs from the devices belonging to the paths. The correlation of all this information enables a topology discovery where only a small number of AFT s entries is needed in order to identify real connections, even in low loaded networks, as we will observe in the results from the implementation at IST network. This information provides faster problem identification and automatic location of links and equipments, which compose an important support tool for any system administrator with network management s responsibilities. IV. ANOMALY DETECTION The rising dependence in IT services and IT applications results in larger and more complex networks, therefore increasing its exposure to threats and failures. There are several risks resulting from equipment crashes, malicious attacks or security breaches which can be mitigate by a correct prevention plan and constant monitoring. There are quite a few tools responsible for equipment monitoring or intrusions detection, but they are mostly based in local thresholds supervision or known anomalies scans. It is quite common to verify unknown threats or complex situations to bypass automatic detection, which can be sometimes identifiable by experienced human operators. Even if hostile traffic is often different from benign traffic, it is frequently hard to translate this difference in a set of explicit rules or deterministic parameters. This is mainly due to the highly irregular nature of the traffic, which constantly transforms network patterns and anomaly effects. A. Related Work One first approach consists in searching for relevant differences in traffic, comparing the real samples with the results from statistical [12] or prediction [13, 14] models. Nevertheless, theses studies are mainly focused in backbone links or highly bandwidth nodes, where small anomalies are insignificant comparing with the global throughput, and the normal traffic presents some regularity. For this reason, this methodology can t easily be adapted to medium university networks like IST, where the normal traffic is predominantly irregular and hardly predictable. A different technique can be used, dividing the traffic in several components, corresponding to different frequencies, as with Fourier s transformation [15, 16]. Despite the complex implementation, the presented results are quite satisfactory, but only reflect local anomalies. With this algorithm, an irregular situation wouldn t be detected if all the values from the different equipments were below the limits, when independently observed, but where the global correlation of information would indicate an abnormal activity. In order to respond to a wider range of situations, we propose to study unsupervised learning systems with the intention of creating a model which characterizes the normal behaviour of the network. This kind of approach is not deterministic but provides a vaster applicability, as it isn t based in pre-defined rules or parameters and can continuously adapt itself to the real data. This methodology can be used with several different systems like neural networks or artificial intelligence models [17]. B. Traffic Model We propose to model the normal operation of the network by a probability density function (pdf) composed by a Gaussian mixture. As inputs for the unsupervised learning model, we choose to have the traffic values from different nodes in the network and the time and data of the samples. It s important to consider the time and date of the data, because there are strong discrepancies on network utilization between workday and week-end or night and business hours. The main objective of this study is to search the model parameters that best characterize the patterns in data, reflecting the normal behaviour of the network. After obtaining these values, we are able to set thresholds to the likelihood function in order to identify anomalous situations. The pdf of a mixture of M Gaussians at d dimensions is given by ( ) = M p x p( x j) P( j) (1) j = 1 where P( j) corresponds to the probability of the Gaussian j, whose pdf is 1 { } T 1 1 p( x j) = exp ( x μ) Σ ( x μ) d /2 1/2 (2 π ) Σ 2 where μ is the Gaussian mean and Σ the respective covariance matrix. We can now use varied approaches to identify the unknown parameters. One of the simplest solutions consists in using the expectation-maximization (EM) algorithm for finding the maximum likelihood estimates of the mixture parameters [17]. This deterministic algorithm provides the desired results but requires the number of Gaussians in the mixture to be manually chosen. The experimental results showed that the number of Gaussians that best represents the data differs from model to model, depending on the existent patterns in the data. With the purpose of setting this parameter automatically, we will complement the EM algorithm with a method for scoring models. Shannon s information theory [18] states that information can be compressed by an optimal code, so that it can use the smallest message to represent the original information. Following this theory, the length (in bits) of a model θ, with a probability P( θ ), can be given by 2 (2) length( θ ) = -log ( P ( θ )) (3) - 3 -

4 Based on Occam's razor principle, Wallace developed the Minimum Message Length (MML) methodology aiming at searching the simplest model that still fits the data correctly [19]. Considering a message E containing all traffic data, we can compress this information replacing the data by a model θ and a difference D, corresponding to the error between the model θ and the real data: length( E) = length( θ ) + length( D θ ) (4) = -log ( P( θ )) - log ( P( D θ )) 2 2 Both the model and the error can be modelled by a variety of functions or distributions, such as Gaussian mixture for example. In this case, the more complex is the model, the more Gaussians will be used in the mixture, but simpler will be the remaining error distribution. We can conclude that the minimization of the data message length provides a way to identify the preferential Gaussian mixture, following the MML principle. This method provides a way to balance model accuracy with the corresponding complexity. For the purposes of this project, we choose to use the PyMML [20] toolkit which provides a MML implementation that can be used to search and compute all the parameters from the Gaussian mixture that minimize the length of data representation. Using the presented methodology, we are able to construct a traffic model where the Gaussians represent the principal network patterns. In this case, the normal operation of the network fits in the identified patterns, resulting in a high pdf value. In opposition, irregular traffic is distant for the normal behaviour of the network, resulting in low pdf values. We can easily deduce that setting a threshold in the pdf values provides a way to identify network anomalies, even if unknown, corresponding to unusual events that result in abnormal traffic. As a result, we can generate alarms for potentially harmful situations that should be further investigated, increasing operational control and global security awareness. compare the results, we verify the percentage of found anomalies in three types of situations: real traffic, manually created anomalies and random traffic, as we can see at Figure 2. It is important that all simulated anomalies are detected; otherwise the number of false negatives will be too significant. On the other hand, we need to find the balance between the false positives (anomalies in real traffic superior to 0,5%) and the accuracy of the model, reflected by random traffic results, as these chaotic values are far away from the normal behavior, modeling abnormal situations. (a) January 2008 V. RESULTS FROM IST NETWORK The presented functionalities were tested at IST, a medium sized and heterogeneous network where traffic is strongly irregular as it depends, among other influences, on student s schedule. A. Network Topologies In a first experiment, we observe the results from the topology discovery algorithm. Even from a medium loaded network, no connections were detected using the full AFT algorithm. However, the path analysis allowed a complete topology discovery which correctly identified the existent connections at IST, for several configurations, as shown in Figure 1. We conclude that the developed algorithm returns valid results, accompanying network changes and completely fulfilling the proposed objectives. B. Detected Anomalies Several traffic models were created corresponding to different weeks of usual operation. In order to evaluate and (b) June 2008 Fig. 1. Results from the network topology discovery algorithm applied at IST. -7 Using the threshold , we verify that less than 0.4% of real traffic is detected as anomalous, which is acceptable, while over 96% of the irregular traffic is identified. We can conclude that the presented - 4 -

5 methodology produces traffic models that are able to correctly differentiate normal data from anomalies, meeting the desired objectives. Data Simulated Real Traffic Random traffic Threshold Model 1 Model 2 Model 1 Model 2 Model 1 Model anomalies % N/A 71.4% N/A 86.1% N/A % 0.2% 100.0% 100.0% 95.0% 97.2% % 0.4% 100.0% 100.0% 96.7% 97.7% % 1.2% 100.0% 100.0% 97.9% 98.9% % N/A 100.0% N/A 100.0% N/A Fig. 2. Percentage of anomalous traffic in different models. Finally, Figure 3 presents the traffic evolution by time around detected irregularities, which are represented by red arrows on the graphics. These situations confirm the previous results as the identified anomalies correspond to real irregularities that can be originated by harmful behaviours: (a) may be the consequence of a network attack or malicious application resulting in an intense network activity while (b) might indicate an equipment failure. Both situations justify further investigation which can be pushed by the anomaly detection alarms that warn system administrators of the incident. (a) Anomaly at port 1001 from core (b) Anomaly at port 2008 from core Fig. 3. Results from anomaly detection applied to IST core traffic. VI. CONCLUSIONS In this document, we proposed a new methodology for discovering layer-2 topology and detecting anomalies. The main objectives were achieved, providing several new functionalities to network management and security. Different information is made available, like global topology, device s details and network configurations. In addition, the anomaly detection method offers a new layer of security and awareness, not only to warn administrators about irregular operation, but also to provide a wide range of useful functionalities, like equipment s location or traffic analyser, assisting in problem resolution tasks. The practicality of this approach was verified by the execution of the new and centralized tool, implementing the presented techniques and algorithms. One of the main advantages of the implemented algorithms is their adaptability to a variety of network conditions, producing valuable results through different scenarios. The application at the IST network revealed all the network connections between equipments, as well as various network anomalies. These results proved that this tool enables a faster operation management, increasing system s global efficiency and security. REFERENCES [1] Hwa-Chun Lin, Yi-Fan Wang, Chien-Hsing Wang, Chien-Lin Chen, "Web-based Distributed Topology Discovery of IP Networks", Proceedings of 15th International Conference on Information Networking (ICOIN'01), 2001, pp [2] D. T. Stott, "Snmp-based layer-3 path discovery," Tech. Rep. ALR , Avaya Labs Research, Avaya Inc., Basking Ridge, NJ, [3] IEEE Computer Society, IEEE Std 802.1D-2004, IEEE Standard for Local and Metropolitan Area Networks: Media Access Control (MAC) Bridges, IEEE Standard, [4] D. T. Stott, Layer-2 path discovery using spanning tree mibs, Avaya Labs Research, Avaya Inc., Basking Ridge, NJ, Tech. Rep. ALR , [5] Yuzhao Li, Changxing Pei, Changhua Zhu, Jiandong Li, "An Algorithm for Discovering Physical Topology in Single Subnet IP Networks", in Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA'05), Volume 2, 2005, pp [6] Richard Black, Austin Donnelly, Cedric Fournet, "Ethernet Topology Discovery without Network Assistance", Proceedings of 12th IEEE International Conference on Network Protocols (ICNP'04), 2004, pp [7] Y. Breitbart, M. Garofalakis, C. Martin, R. Rastogi, S. Seshadri, and A. Silberschatz, Topology discovery in heterogeneous IP networks, in Proc. IEEE INFOCOM, 2000, pp [8] Yuri Breitbart, Minos Garofalakis, Ben Jai, Cliff Martin, Rajeev Rastogi, and Avi Silberschatz, Topology Discovery in Heterogeneous IP Networks: - 5 -

6 The NetInventory System, IEEE/ACM Transactions on Networking, Vol. 12, No. 3, June 2004, pp [9] Y. Bejerano, Y. Breitbart, M. Garofalakis, and R. Rastogi, Physical topology discovery for large multisubnet networks, in Proc. IEEE INFOCOM, 2003, pp [10] Yuzhao Li, Changxing Pei, Changhua Zhu, Jiandong Li, "An Algorithm for Discovering Physical Topology in Single Subnet IP Networks", in Proceedings of 19th International Conference on Advanced Information Networking and Applications (AINA'05), Volume 2, 2005, pp [11] B. Lowekamp, D. R. O Hallaron, and T. R. Gross, Topology Discovery for Large Ethernet Networks, in Proceedings of ACM SIGCOMM, San Diego, California, Aug [12] G. Cormode, S. Muthukrishnan, "What's new: Finding significant differences in network data streams," in Proc. of IEEE Infocom, [13] B. Krishnamurthy, S. Sen, Y. Zhang, Y Chen, Sketch-based Change Detection: Methods, Evaluation, and Applications", Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement,2003. [14] Jun Jiang, Symeon Papavassiliou, A Network Fault Diagnostic Approach Based on a Statistical Traffic Normality Prediction Algorithm, GLOBECOM, IEEE, 2003, pp [15] Jun Gao, Guangmin Hu, Xingmiao Yao, Rocky K. C. Chang,,Anomaly Detection of Network Traffic Based on Wavelet Packet, IEEE, [16] Jun Lv, Xing Li, Tong Li, The New Detection Algorithms for Network Traffic Anomalies, Proceedings of the Sixth International Conference on Networking (ICN'07), IEEE, [17] Christopher M. Bishop, Neural Networks for Pattern Recognition, Clarendon Press, Oxford, UK, [18] Claude Elwood Shannon, Warren Weaver, The mathematical theory of communication, Urbana: University of Illinois Press, USA, [19] C.S. Wallace, Statistical and Inductive Inference by Minimum Message Length, Springer, USA, [20] Paul Harrison, PyMML, Python library for implementing MML estimators, version 0.5, 2005 (

Finding Ethernet-Type Network Topology is Not Easy

Finding Ethernet-Type Network Topology is Not Easy Finding Ethernet-Type Network Topology is Not Easy Hassan Gobjuka, Yuri Breitbart Department of Computer Science Kent State University Kent, OH 44242 {hgobjuka,yuri}@cs.kent.edu 1 Abstract In this paper

More information

Network Discovery Tool

Network Discovery Tool Bestin Jose Mahesh Kumar Shyamsunder Computer Science and Engineering Indian Institue of Technology Bombay November 28, 2004 1 Problem Statement 2 Introduction to Netdisco Features of NetDisco 3 4 5 Problem

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

Ethernet Topology Discovery: A Survey

Ethernet Topology Discovery: A Survey Journal of Communication and Computer 10 (2013) 951-959 Kamal A. Ahmat Department of Information Technology, City University of New York, New York 10075, USA Received: May 10, 2012 / Accepted: June 12,

More information

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING

A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING A HYBRID RULE BASED FUZZY-NEURAL EXPERT SYSTEM FOR PASSIVE NETWORK MONITORING AZRUDDIN AHMAD, GOBITHASAN RUDRUSAMY, RAHMAT BUDIARTO, AZMAN SAMSUDIN, SURESRAWAN RAMADASS. Network Research Group School of

More information

Ethernet Topology Discovery: A Survey

Ethernet Topology Discovery: A Survey Ethernet Topology Discovery: A Survey Kamal A. Ahmat CITY UNIVERSITY OF NEW YORK/Information Technology New York, USA Email: kamal.ahmat@live.lagcc.cuny.edu ABSTRACT Ethernet networks have undergone impressive

More information

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401

IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401 IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 12, NO. 3, JUNE 2004 401 Topology Discovery in Heterogeneous IP Networks: The NetInventory System Yuri Breitbart, Minos Garofalakis, Member, IEEE, Ben Jai, Cliff

More information

An MPI Tool for Automatically Discovering the Switch Level Topologies of Ethernet Clusters

An MPI Tool for Automatically Discovering the Switch Level Topologies of Ethernet Clusters An MPI Tool for Automatically Discovering the Switch Level Topologies of Ethernet Clusters Joshua Lawrence Xin Yuan Department of Computer Science, Florida State University, Tallahassee, FL 32306 {lawrence,

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

How To Understand and Configure Your Network for IntraVUE

How To Understand and Configure Your Network for IntraVUE How To Understand and Configure Your Network for IntraVUE Summary This document attempts to standardize the methods used to configure Intrauve in situations where there is little or no understanding of

More information

Using Data Mining for Mobile Communication Clustering and Characterization

Using Data Mining for Mobile Communication Clustering and Characterization Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer

More information

Taxonomy of Intrusion Detection System

Taxonomy of Intrusion Detection System Taxonomy of Intrusion Detection System Monika Sharma, Sumit Sharma Abstract During the past years, security of computer networks has become main stream in most of everyone's lives. Nowadays as the use

More information

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER)

DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER) Journal homepage: www.mjret.in ISSN:2348-6953 DISCOVERY OF NETWORK ELEMENTS AND RECONCILIATION (DNER) Narendra Shewale 1, Sharad Hadke 2, Mayur Kharote 3 Department of Computer Engineering, University

More information

Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology

Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology Using Simple Per-Hop Capacity Metrics to Discover Link Layer Network Topology Shane Alcock 1, Anthony McGregor 1,2, and Richard Nelson 1 1 WAND Group, University of Waikato 2 NLANR Measurement and Network

More information

IP Network Topology Discovery Using SNMP

IP Network Topology Discovery Using SNMP IP Network Topology Discovery Using SNMP Suman Pandey #1, Mi-Jung Choi #2, Sung-Joo Lee #3, James W. Hong #4 # Dept. of Computer Science and Engineering, POSTECH, Korea 1 suman@postech.ac.kr, 2 mjchoi@postech.ac.kr,

More information

Quality of Service Routing Network and Performance Evaluation*

Quality of Service Routing Network and Performance Evaluation* Quality of Service Routing Network and Performance Evaluation* Shen Lin, Cui Yong, Xu Ming-wei, and Xu Ke Department of Computer Science, Tsinghua University, Beijing, P.R.China, 100084 {shenlin, cy, xmw,

More information

CHAPTER 1 INTRODUCTION

CHAPTER 1 INTRODUCTION 21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless

More information

Intrusion Detection via Machine Learning for SCADA System Protection

Intrusion Detection via Machine Learning for SCADA System Protection Intrusion Detection via Machine Learning for SCADA System Protection S.L.P. Yasakethu Department of Computing, University of Surrey, Guildford, GU2 7XH, UK. s.l.yasakethu@surrey.ac.uk J. Jiang Department

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

Building Secure Network Infrastructure For LANs

Building Secure Network Infrastructure For LANs Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives

More information

An Active Packet can be classified as

An Active Packet can be classified as Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,pat@ati.stevens-tech.edu Abstract-Traditionally, network management systems

More information

Graph Theory Applications in Network Security

Graph Theory Applications in Network Security Graph Theory Applications in Network Security Jonathan Webb1, Fernando Docemmilli2, and Mikhail Bonin3 Theory Lab - Central Queensland University Wayville SA 5034 E-mail addresses: (1) jonwebb@cqu.edu.au

More information

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System

Index Terms Denial-of-Service Attack, Intrusion Prevention System, Internet Service Provider. Fig.1.Single IPS System Detection of DDoS Attack Using Virtual Security N.Hanusuyakrish, D.Kapil, P.Manimekala, M.Prakash Abstract Distributed Denial-of-Service attack (DDoS attack) is a machine which makes the network resource

More information

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring

ICMP, SNMP: Collaborative Approach to Network Discovery and Monitoring 1 Aman Mahajan, 2 Haresh Joshi, 3 Sahil Khajuria, 4 Anil k Verma 1,3,4 CSE, Thapar University, Patiala, India 2 Manager-Technology,CGL Mumbai, India Email: 1 akverma@thapar.edu, 2 haresh.joshi@cgglobal.com,

More information

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW

APPLICATION NOTE 210 PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW PROVIDER BACKBONE BRIDGE WITH TRAFFIC ENGINEERING: A CARRIER ETHERNET TECHNOLOGY OVERVIEW By Thierno Diallo, Product Specialist Originally designed as a local-area network (LAN) communication protocol,

More information

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products

Configuring and Managing Token Ring Switches Using Cisco s Network Management Products Configuring and Managing Token Ring Switches Using Cisco s Network Management Products CHAPTER 12 Cisco offers several network management applications that you can use to manage your Catalyst Token Ring

More information

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies

ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies ISSN: 2321-7782 (Online) Volume 2, Issue 2, February 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at:

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

Service Description DDoS Mitigation Service

Service Description DDoS Mitigation Service Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: info@interoute.com Contents Contents 1 Introduction...3 2 An Overview...3

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols

Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution

More information

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool

Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society

More information

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud

The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Proceedings of the APAN Network Research Workshop 2013 The flow back tracing and DDoS defense mechanism of the TWAREN defender cloud Ming-Chang Liang 1, *, Meng-Jang Lin 2, Li-Chi Ku 3, Tsung-Han Lu 4,

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

5 Steps to Avoid Network Alert Overload

5 Steps to Avoid Network Alert Overload 5 Steps to Avoid Network Alert Overload By Avril Salter 1. 8 0 0. 8 1 3. 6 4 1 5 w w w. s c r i p t l o g i c. c o m / s m b I T 2011 ScriptLogic Corporation ALL RIGHTS RESERVED. ScriptLogic, the ScriptLogic

More information

Research Article Volume 6 Issue No. 4

Research Article Volume 6 Issue No. 4 DOI 10.4010/2016.863 ISSN 2321 3361 2016 IJESC Research Article Volume 6 Issue No. 4 Different Modes of Discovery of Network Nodes Using SNMP and Reconciliation HemlataL.Eglambe 1, Divyani R.Vade 2, Megha

More information

Secure Networks for Process Control

Secure Networks for Process Control Secure Networks for Process Control Leveraging a Simple Yet Effective Policy Framework to Secure the Modern Process Control Network An Enterasys Networks White Paper There is nothing more important than

More information

ACL Based Dynamic Network Reachability in Cross Domain

ACL Based Dynamic Network Reachability in Cross Domain South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer

More information

hp ProLiant network adapter teaming

hp ProLiant network adapter teaming hp networking june 2003 hp ProLiant network adapter teaming technical white paper table of contents introduction 2 executive summary 2 overview of network addressing 2 layer 2 vs. layer 3 addressing 2

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Time-Frequency Detection Algorithm of Network Traffic Anomalies

Time-Frequency Detection Algorithm of Network Traffic Anomalies 2012 International Conference on Innovation and Information Management (ICIIM 2012) IPCSIT vol. 36 (2012) (2012) IACSIT Press, Singapore Time-Frequency Detection Algorithm of Network Traffic Anomalies

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

INTRUSION PREVENTION AND EXPERT SYSTEMS

INTRUSION PREVENTION AND EXPERT SYSTEMS INTRUSION PREVENTION AND EXPERT SYSTEMS By Avi Chesla avic@v-secure.com Introduction Over the past few years, the market has developed new expectations from the security industry, especially from the intrusion

More information

Cisco Change Management: Best Practices White Paper

Cisco Change Management: Best Practices White Paper Table of Contents Change Management: Best Practices White Paper...1 Introduction...1 Critical Steps for Creating a Change Management Process...1 Planning for Change...1 Managing Change...1 High Level Process

More information

Firewall Policy Anomalies- Detection and Resolution

Firewall Policy Anomalies- Detection and Resolution Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment

Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Advancement in Virtualization Based Intrusion Detection System in Cloud Environment Jaimin K. Khatri IT Systems and Network Security GTU PG School, Ahmedabad, Gujarat, India Mr. Girish Khilari Senior Consultant,

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

RAVEN, Network Security and Health for the Enterprise

RAVEN, Network Security and Health for the Enterprise RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations

More information

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks

A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.

More information

System Specification. Author: CMU Team

System Specification. Author: CMU Team System Specification Author: CMU Team Date: 09/23/2005 Table of Contents: 1. Introduction...2 1.1. Enhancement of vulnerability scanning tools reports 2 1.2. Intelligent monitoring of traffic to detect

More information

CLOUD MONITORING BASED ON SNMP

CLOUD MONITORING BASED ON SNMP CLOUD MONITORING BASED ON SNMP 1 J. SWARNA, 2 C. SENTHIL RAJA, 3 DR.K.S.RAVICHANDRAN 1,3 SASTRA University, Thanjavur, Tamil Nadu, India 2 Alcatel-Lucent India Limited, Chennai, India Email: 1 swarna.jp@gmail.com

More information

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network

CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network CCNP SWITCH: Implementing High Availability and Redundancy in a Campus Network Olga Torstensson SWITCHv6 1 Components of High Availability Redundancy Technology (including hardware and software features)

More information

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition)

Assignment One. ITN534 Network Management. Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Assignment One ITN534 Network Management Title: Report on an Integrated Network Management Product (Solar winds 2001 Engineer s Edition) Unit Co-coordinator, Mr. Neville Richter By, Vijayakrishnan Pasupathinathan

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved.

Abstract. MEP; Reviewed: GAK 10/17/2005. Solution & Interoperability Test Lab Application Notes 2005 Avaya Inc. All Rights Reserved. Configuring Single Instance Rapid Spanning Tree Protocol (RSTP) between an Avaya C360 Converged Switch and HP ProCurve Networking Switches to support Avaya IP Telephony Issue 1.0 Abstract These Application

More information

Hirschmann. Simply a good Connection. White paper: Security concepts. based on EAGLE system. Security-concepts Frank Seufert White Paper Rev. 1.

Hirschmann. Simply a good Connection. White paper: Security concepts. based on EAGLE system. Security-concepts Frank Seufert White Paper Rev. 1. Hirschmann. Simply a good Connection. White paper: Security concepts based on EAGLE system Security-concepts Frank Seufert White Paper Rev. 1.1 Contents Security concepts based on EAGLE system 1 Introduction

More information

Inter-domain Routing

Inter-domain Routing Inter-domain Routing The structure of Internet Qinsi Wang Computer Science Department, Carnegie Mellon September 15, 2010 Outline Lecture 4: Interdomain Routing; L. Gao, On inferring autonomous system

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK AN OVERVIEW OF MOBILE ADHOC NETWORK: INTRUSION DETECTION, TYPES OF ATTACKS AND

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network

A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network ASEE 2014 Zone I Conference, April 3-5, 2014, University of Bridgeport, Bridgpeort, CT, USA A Hybrid Electrical and Optical Networking Topology of Data Center for Big Data Network Mohammad Naimur Rahman

More information

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks

Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Layered Approach of Intrusion Detection System with Efficient Alert Aggregation for Heterogeneous Networks Lohith Raj S N, Shanthi M B, Jitendranath Mungara Abstract Protecting data from the intruders

More information

TOPOLOGIES NETWORK SECURITY SERVICES

TOPOLOGIES NETWORK SECURITY SERVICES TOPOLOGIES NETWORK SECURITY SERVICES 1 R.DEEPA 1 Assitant Professor, Dept.of.Computer science, Raja s college of Tamil Studies & Sanskrit,Thiruvaiyaru ABSTRACT--In the paper propose about topology security

More information

Lesson 5-2: Network Maintenance and Management

Lesson 5-2: Network Maintenance and Management Unit 5: Network Operating Systems Lesson 5-2: Network Maintenance and Management At a Glance This lesson presents an overview of network planning and management tasks. It also discusses hardware and software

More information

Web Forensic Evidence of SQL Injection Analysis

Web Forensic Evidence of SQL Injection Analysis International Journal of Science and Engineering Vol.5 No.1(2015):157-162 157 Web Forensic Evidence of SQL Injection Analysis 針 對 SQL Injection 攻 擊 鑑 識 之 分 析 Chinyang Henry Tseng 1 National Taipei University

More information

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System

Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Preventing DDOS attack in Mobile Ad-hoc Network using a Secure Intrusion Detection System Shams Fathima M.Tech,Department of Computer Science Kakatiya Institute of Technology & Science, Warangal,India

More information

IBM Tivoli Network Manager 3.8

IBM Tivoli Network Manager 3.8 IBM Tivoli Network Manager 3.8 Configuring initial discovery 2010 IBM Corporation Welcome to this module for IBM Tivoli Network Manager 3.8 Configuring initial discovery. configuring_discovery.ppt Page

More information

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks Res. Lett. Inf. Math. Sci., 2005, Vol. 7, pp 19-27 19 Available online at http://iims.massey.ac.nz/research/letters/ Performance of voice and video conferencing over ATM and Gigabit Ethernet backbone networks

More information

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards

Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards Redundancy = Protection from Network Failure. Redundancy Standards WP-31-REV0-4708-1/5 Industrial Ethernet How to Keep Your Network Up and Running A Beginner s Guide to Redundancy Standards For a very

More information

Efficient Detection of Ddos Attacks by Entropy Variation

Efficient Detection of Ddos Attacks by Entropy Variation IOSR Journal of Computer Engineering (IOSRJCE) ISSN: 2278-0661, ISBN: 2278-8727 Volume 7, Issue 1 (Nov-Dec. 2012), PP 13-18 Efficient Detection of Ddos Attacks by Entropy Variation 1 V.Sus hma R eddy,

More information

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware.

Radware s Smart IDS Management. FireProof and Intrusion Detection Systems. Deployment and ROI. North America. International. www.radware. Radware s Smart IDS Management FireProof and Intrusion Detection Systems Deployment and ROI North America Radware Inc. 575 Corporate Dr. Suite 205 Mahwah, NJ 07430 Tel 888 234 5763 International Radware

More information

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network

Fuzzy Active Queue Management for Assured Forwarding Traffic in Differentiated Services Network Fuzzy Active Management for Assured Forwarding Traffic in Differentiated Services Network E.S. Ng, K.K. Phang, T.C. Ling, L.Y. Por Department of Computer Systems & Technology Faculty of Computer Science

More information

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network

Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network , pp.273-284 http://dx.doi.org/10.14257/ijdta.2015.8.5.24 Big Data Analytics of Multi-Relationship Online Social Network Based on Multi-Subnet Composited Complex Network Gengxin Sun 1, Sheng Bin 2 and

More information

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor

Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise

More information

Automated Service Discovery for Enterprise Network Management

Automated Service Discovery for Enterprise Network Management Automated Service Discovery for Enterprise Network Management William Tu, Priya Thangaraj, Jui-hao Chiang Professor Tzi-cker Chiueh CEWIT Stony Brook University March 8, 2009 1 Introductin A key pillar

More information

Characteristics of Network Traffic Flow Anomalies

Characteristics of Network Traffic Flow Anomalies Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic

More information

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks

WHITE PAPER OCTOBER 2014. CA Unified Infrastructure Management for Networks WHITE PAPER OCTOBER 2014 CA Unified Infrastructure Management for Networks 2 WHITE PAPER: CA UNIFIED INFRASTRUCTURE MANAGEMENT FOR NETWORKS ca.com Table of Contents Solution Overview 3 Specialized Probes

More information

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist

CONTROL LEVEL NETWORK RESILIENCY USING RING TOPOLOGIES. Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist CONTROL LEVEL NETWORK RESILIENCY Written by: Joseph C. Lee, Product Manager Jessica Forguites, Product Specialist DANGER 65 65 65 65 65 65 65 65 EtherNet/IP 1 3 4 5 6 LINK 1 LINK MOD NET 15 14 13 1 11

More information

OAM Operations Administration and Maintenance

OAM Operations Administration and Maintenance OAM Operations Administration and Maintenance IERU Communications Ltd OAM Rev. A Page 1 of 9 Operations Administration and Maintenance 1. Overview This paper describes the Ethernet and Multi-Protocol Label

More information

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks

Computer Networks. Definition of LAN. Connection of Network. Key Points of LAN. Lecture 06 Connecting Networks Computer Networks Lecture 06 Connecting Networks Kuang-hua Chen Department of Library and Information Science National Taiwan University Local Area Networks (LAN) 5 kilometer IEEE 802.3 Ethernet IEEE 802.4

More information

CMPT 471 Networking II

CMPT 471 Networking II CMPT 471 Networking II Firewalls Janice Regan, 2006-2013 1 Security When is a computer secure When the data and software on the computer are available on demand only to those people who should have access

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Intrusion Detection Systems

Intrusion Detection Systems Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics

More information

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and

RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM

A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM A SURVEY ON GENETIC ALGORITHM FOR INTRUSION DETECTION SYSTEM MS. DIMPI K PATEL Department of Computer Science and Engineering, Hasmukh Goswami college of Engineering, Ahmedabad, Gujarat ABSTRACT The Internet

More information

Monitoring and Diagnosis of Networked Medical Hardware and Software for the Integrated Operating Room

Monitoring and Diagnosis of Networked Medical Hardware and Software for the Integrated Operating Room Monitoring and Diagnosis of Networked Medical Hardware and Software for the Integrated Operating Room Stefan Bohn, Michael Lessnau, Oliver Burgert Innovation Center Computer Assisted Surgery (ICCAS), Medical

More information

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks

Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks 1 Autoconfiguration and maintenance of the IP address in ad-hoc mobile networks M. Fazio, M. Villari, A. Puliafito Università di Messina, Dipartimento di Matematica Contrada Papardo, Salita Sperone, 98166

More information

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems

Impact of Feature Selection on the Performance of Wireless Intrusion Detection Systems 2009 International Conference on Computer Engineering and Applications IPCSIT vol.2 (2011) (2011) IACSIT Press, Singapore Impact of Feature Selection on the Performance of ireless Intrusion Detection Systems

More information

Computer Networking: A Survey

Computer Networking: A Survey Computer Networking: A Survey M. Benaiah Deva Kumar and B. Deepa, 1 Scholar, 2 Assistant Professor, IT Department, Sri Krishna College of Arts and Science College, Coimbatore, India. Abstract- Computer

More information

Network Terminology Review

Network Terminology Review Network Terminology Review For those of you who have experience with IP networks, this document may serve as a reminder of the current lexicon of terms used in our industry. If you re new to it or specialized

More information

Nemea: Searching for Botnet Footprints

Nemea: Searching for Botnet Footprints Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events

Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Applying Internal Traffic Models to Improve Identification of High Fidelity Cyber Security Events Abstract Effective Security Operations throughout both DoD and industry are requiring and consuming unprecedented

More information

Collapse by Cascading Failures in Hybrid Attacked Regional Internet

Collapse by Cascading Failures in Hybrid Attacked Regional Internet Collapse by Cascading Failures in Hybrid Attacked Regional Internet Ye Xu and Zhuo Wang College of Information Science and Engineering, Shenyang Ligong University, Shenyang China xuy.mail@gmail.com Abstract

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Service Definition. Internet Service. Introduction. Product Overview. Service Specification Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service

More information

SSVP SIP School VoIP Professional Certification

SSVP SIP School VoIP Professional Certification SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover

More information