Complexeventprocessingand the CoMiFinproject

Size: px
Start display at page:

Download "Complexeventprocessingand the CoMiFinproject"

Transcription

1 Complexeventprocessingand the CoMiFinproject Gönczy László Budapesti Műszaki és Gazdaságtudományi Egyetem Méréstechnika és Információs Rendszerek Tanszék 1

2 CEP basics Complex event o A logical composition of atomic events Main characteristics o Timing(e.g., sliding window) o Asynchron operation o Causility, hierarchy of events o Correlation SQL-like languages o E,g.. EPL: Event Processing Language, JAQL, o Queries as basic steps of event processing Distributed data sources o Databases, online transaction handling systems, monitoring systems, etc. Scalability o Distributed, cloud-based deplyoment o ~100k/sec transcations 2

3 CEP applicationareas Business&finance o Investments, stock exchange o Treasury o Risk assessment o Transport tracking Business Activity Monitoring Online fraud detection/prevention o Transaction scanning o Online betting(pl. UEFA) Operation of large IT systems o Detection complex patterns in operation o Metrics evaluation Security o E.g.,. Early detection of ddos 3

4 Map odata split Reduce o Data processing Example Map/Reducealgorithm osplit a text towords, countoccurencesoccurences o Implementation in multiple languages Apache implementation o Distributed architecture o Hadoop(+ Hadoop Distributed File System) o Schedule : Job Tracker, Task Tracker 4

5 Esper Drools Fusion CEP tools IBM InfoSphereStreams(System S) OpenESB- Intelligent Event Processor Apache Hadoop + extending projects Main features o Event processing logic o Throughput o Requested response time( low latency ) 5

6 Casestudy: CoMiFinproject From public material of the CoMiFin consortium 6

7 CoMiFin Communication Middleware for Financial Infrastructures Motivation o Banking systems are more and more dependable on IT services o Attacks are becoming more sophisticated o Criticalinfrastructures(network, telco, powersupply) interconnected o Traditionaloffline communicationis slow(e.g., 8 daystoclosea bug) Aim o Schemetosetupand managea secureenvironment(software, hardware, monitoring tools, etc.) forinformationexchangeand analysis Demonstrator lead by a BME spin-off(optxware) 7

8 Information Federation Purpose: detect events(attacks) in a collaborative way o Security: collaboration, not competition o Collaborative network of certified participants o Security measures implemented o Resilient by its distributed nature o Systematicmodel-basedmanagement and monitoring Privacy assurance o Working on data about transactions o No transaction details o Anonymization o seecomifin.eu

9 Example: logicalinterconnections 9

10 Attacktypes(IT) Distributed Denial of Service (ddos) oe.g., botnets Man inthemiddle oe.g., phishing Identity theft and many combinations 10

11 Attacksurface Banking systems with lot of entry points Martin Goulet and Morten Nygaard, Managing 21st Century Business and Technology Innovation: Reduce Operational Risk, Enable Compliance, Protect Privacy with IBM System z, IBM s Global Banking community, ibm.com/banking. 11

12 CoMiFintopology ENEL TELECOM UNICREDIT LLYODS TSB Control Centre CoMiFin Control Service Centre AT&T AIG Intra-communications Inter-communications SWIFT 12

13 SemanticRoomconcept Basic unit of information federation Logical separation of entities SR features: a SaaS offerof theunderlying CoMiFin infrastructure o Membership management o Resource allocation o Monitoring o Information exchange 13

14 Online dataanalysis(cep) 14

15 Logicalcomponents 15

16 Model-drivensystemmonitoring 16

17 Resource level o Network, Disk o Memory, CPU o SR Administrator View Application level o Event processing o Evaluation of alerts Levels for metrics o SR Administrator, o SR Manager View o FI specific parts. SR Member Business level o What CoMiFin produces? o Alerts are also displayed o SR Manager, SR Member

18 Example:Metric definition Name Definition Performance capability of web server The number of threads that can receive and process HTTP requests. States Normal Operational State: The number of threads matches the estimated capacity of the underlying resources. Measuring Overloaded Operational State: The number of threads are higher than the maximal estimated for the underlying resources. Unusable Operational State: The number of processing threads cannot be determined. Measurement Unit piece Range non-negative integer Type Low level The web server should be instrumented with an SNMP agent exposing this attribute. Frequency periodical, every 3 minutes Evaluation Method classification (see states above) Time range evaluation is instantaneous

19 Architectural Example: Monitoring of the Gateway

20 Advanced Evaluation Simple evaluations (average, etc.) Rule-based evaluation with Drools Information manager is such an evaluator, calculating trust Evaluation with CoMiFin CEP?

21 Evaluation of measurements Advanced Evaluator plugin for monitoring Nagios integrated with Drools o Nagios: monitoring o Drools: correlation of events sent by Nagios Motivation o CoMiFin is itself a critical infrastructure advanced monitoring of resource should be ensured e.g. COBIT/SOX/ directives odetecting meaningful patterns within CoMiFin could be beneficial

22 Overview of advanced evaluation Infrastructure Nagios Nagios stores the plugins output in the database Event Correlation Monitoring Database data We check the database periodically for new information and forward it to the rule engine Rule Engine advice, alerts, action Alert Rules logic The rule engine matches the rules against the received information If a rule matched we could react

23 CoMiFinControlLoop

24 Examplemetric Name Definition Performance capability of web server The number of threads that can receive and process HTTP requests. States Normal Operational State: The number of threads matches the estimated capacity of the underlying resources. Measuring Overloaded Operational State: The number of threads are higher than the maximal estimated for the underlying resources. Unusable Operational State: The number of processing threads cannot be determined. Measurement Unit piece Range non-negative integer Type Low level The web server should be instrumented with an SNMP agent exposing this attribute. Frequency periodical, every 3 minutes Evaluation Method classification (see states above) Time range evaluation is instantaneous 24

25 Rule-basedeventdetection 25

26 Session Hijack detection Session hijack: modify the sesison by observing/modifying user communication Configuration: sample banking app o User management o Transaction management Monitoring of application level information osession ID o Client data fault injection oattacks

27 Session Hijacking Application Server Bad Guy Ordinary Client

28 Session hijackdetection CheckingIP and session ID withdrools WARNING: possible session hijack: { currentaddress= , remoteaddress= , sessionid=21...b6 } and the possible attacker with the same session: { currentaddress= , remoteaddress= , sessionid=21...b6 }

29 Demo 2: Missingbackup problem Information from multiple aplications/ event sources Related standards o e.g. COBIT PO-4 Define the IT Processes, Organization and Relationships o COBIT PO-9 Manage IT Human Resources 0 - OK 1 - WARNING 1 Backup failure Time Value Bckp Value Admin Problem stil exists Administrator absent

30 Droolsbaseddetection Nagios (Simulator) Event Correlation Alert Rules logic data Rule Engine advice, alerts, action

31 Connectivity of Semantic Rooms Vision: CoMiFin as a platform (D6.5) o Framework for information sharing among FIs o A trusted third party platform Connectivity in CoMiFin o Allows for propagating alerts among SRs oimproves the quality of Event Processing with additional input o Improves the capability of CoMiFin to detect attacks ofacilitates the creation of new services built on a combination of SRs improves the ability of FIs to prevent attacks

32 Architecture Financial Institutions (FI) emulated by Gateways Monitoring and evaluation SLA management, visualization Logical management (SR creation, ) Reliable communication (currently: Java Message Service) CoMiFinmanagement components (OptXware testbed, Budapest) ED Event Processing (DHT) (ED Testbed, Rome) IBM Event Processing (AGILIS) (IBM Testbed, Haifa) 32

33 What to Measurein CoMiFin? Message processing performance (anonymization, filtering,aggregation) Input from FI Message compliance Resource level metrics (all components) Communication performance Comm. errors Trust of Financial Institutions Event processing metrics Alerts

34 Sampleresults 34

35 SR Composition (1) Vertical, hierarchical composition othe goal of the collaborating SRs is identical othe topmost SR has an aggregatedglobal view o The underlying SRs have detailed local view o Example: Banks and the Financial Supervisory Authority Authority Headquarters Branches

36 SR Composition (2) Horizontal, sequential composition o Communicating SRs have different goals o Complex/combined attacks can be detected by information fusion oe.g., alerts generated in PortscanSR contributes to the Blacklist managed in MitM SR

37 Demo Scenario SR1 (Port Scanning) is setup Alertsgenerated by SR1 SR2 (MitM) is setup Alertsgenerated by SR2 onitsown

38 Demo -Scenario SR1 (Port Scanning) is setup SR Connectivity between the two SRsis activated SRC notifies SR2 about suspicious IPs SR2 (MitM) is setup Attacks from suspicious IPs also considered

39 SR Connectivity Metrics # of sent and received messages # of corrupt messages Time required to forward the messages

Information Sharing in the Cloud:

Information Sharing in the Cloud: Sapienza Università di Roma Dipartimento di Informatica e Sistemistica Information Sharing in the Cloud: Opportunities and Challenges Roberto Baldoni Università degli Studi di Roma La Sapienza baldoni@dis.uniroma1.it,

More information

The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance

The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance The new services in nagios: network bandwidth utility, email notification and sms alert in improving the network performance Mohammad Ali Arsyad bin Mohd Shuhaimi Hang Tuah Jaya, 76100 Durian Tunggal,

More information

Tutorial: Load Testing with CLIF

Tutorial: Load Testing with CLIF Tutorial: Load Testing with CLIF Bruno Dillenseger, Orange Labs Learning the basic concepts and manipulation of the CLIF load testing platform. Focus on the Eclipse-based GUI. Menu Introduction about Load

More information

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS

THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS THE SMARTEST WAY TO PROTECT WEBSITES AND WEB APPS FROM ATTACKS INCONVENIENT STATISTICS 70% of ALL threats are at the Web application layer. Gartner 73% of organizations have been hacked in the past two

More information

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence

Exploring Oracle E-Business Suite Load Balancing Options. Venkat Perumal IT Convergence Exploring Oracle E-Business Suite Load Balancing Options Venkat Perumal IT Convergence Objectives Overview of 11i load balancing techniques Load balancing architecture Scenarios to implement Load Balancing

More information

Security Event Management. February 7, 2007 (Revision 5)

Security Event Management. February 7, 2007 (Revision 5) Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST

More information

P2P-Enabling for Critical Infrastructure Protection

P2P-Enabling for Critical Infrastructure Protection AUTONOMICS 2009 P2P-Enabling for Critical Infrastructure Protection Abdelmajid Khelil, Hamza Ghani, Daniel Germanus and Neeraj Suri Technische Universität Darmstadt, Germany Cyprus, Sept. 10, 2009 Dependable

More information

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2 DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing Slide 1 Slide 3 A style of computing in which dynamically scalable and often virtualized resources are provided as a service over the Internet.

More information

Denial of Service Attacks

Denial of Service Attacks 2 Denial of Service Attacks : IT Security Sirindhorn International Institute of Technology Thammasat University Prepared by Steven Gordon on 13 August 2013 its335y13s2l06, Steve/Courses/2013/s2/its335/lectures/malicious.tex,

More information

WÜRTHPHOENIX NetEye Version 3

WÜRTHPHOENIX NetEye Version 3 WÜRTHPHOENIX NetEye Release Note WÜRTHPHOENIX NetEye Version 3 Release date: March 2009 Overview of the updates and newly introduced functionalities in VS 3 In the following summaries, you can obtain a

More information

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko

Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server

More information

Chapter 1 - Web Server Management and Cluster Topology

Chapter 1 - Web Server Management and Cluster Topology Objectives At the end of this chapter, participants will be able to understand: Web server management options provided by Network Deployment Clustered Application Servers Cluster creation and management

More information

OpenScape Voice V8 Application Developers Manual. Programming Guide A31003-H8080-R100-2-7620

OpenScape Voice V8 Application Developers Manual. Programming Guide A31003-H8080-R100-2-7620 OpenScape Voice V8 Application Developers Manual Programming Guide A31003-H8080-R100-2-7620 Our Quality and Environmental Management Systems are implemented according to the requirements of the ISO9001

More information

PANDORA FMS NETWORK DEVICES MONITORING

PANDORA FMS NETWORK DEVICES MONITORING NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,

More information

Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand

Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand Exploiting Remote Memory Operations to Design Efficient Reconfiguration for Shared Data-Centers over InfiniBand P. Balaji, K. Vaidyanathan, S. Narravula, K. Savitha, H. W. Jin D. K. Panda Network Based

More information

Configuring WMI Performance Monitors

Configuring WMI Performance Monitors Configuring WMI Performance Monitors With WMI, WhatsUp Gold Premium Edition monitors and sends alerts based on performance counters that are reported from Microsoft Windows devices. The data collected

More information

Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD

Building Out Your Cloud-Ready Solutions. Clark D. Richey, Jr., Principal Technologist, DoD Building Out Your Cloud-Ready Solutions Clark D. Richey, Jr., Principal Technologist, DoD Slide 1 Agenda Define the problem Explore important aspects of Cloud deployments Wrap up and questions Slide 2

More information

Introduction to Cloud Computing

Introduction to Cloud Computing Introduction to Cloud Computing Cloud Computing I (intro) 15 319, spring 2010 2 nd Lecture, Jan 14 th Majd F. Sakr Lecture Motivation General overview on cloud computing What is cloud computing Services

More information

Stephen Coty Director, Threat Research

Stephen Coty Director, Threat Research Emerging threats facing Cloud Computing Stephen Coty Director, Threat Research Cloud Environments 101 Cloud Adoption is Gaining Momentum Cloud market revenue will increase at a 36% annual rate Analyst

More information

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye

Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for

More information

The TransactionVision Solution

The TransactionVision Solution The TransactionVision Solution Bristol's TransactionVision is transaction tracking and analysis software that provides a real-time view of business transactions flowing through a distributed enterprise

More information

PANDORA FMS NETWORK DEVICE MONITORING

PANDORA FMS NETWORK DEVICE MONITORING NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,

More information

SECURITY DOCUMENT. BetterTranslationTechnology

SECURITY DOCUMENT. BetterTranslationTechnology SECURITY DOCUMENT BetterTranslationTechnology XTM Security Document Documentation for XTM Version 6.2 Published by XTM International Ltd. Copyright XTM International Ltd. All rights reserved. No part of

More information

Seminar Monitoring large scale complex systems through Complex Event Processing Technologies

Seminar Monitoring large scale complex systems through Complex Event Processing Technologies Seminar Monitoring large scale complex systems through Complex Event Processing Technologies Lecture 3 - April 15 th 2011 Practical examples of applicability of CEP - port scan detection - implementation

More information

Red Hat Network: Monitoring Module Overview

Red Hat Network: Monitoring Module Overview Red Hat Network: Monitoring Module Overview Red Hat has built the next generation of systems management software presenting both highgrowth businesses and service providers with a simple, scalable and

More information

Maintaining Non-Stop Services with Multi Layer Monitoring

Maintaining Non-Stop Services with Multi Layer Monitoring Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems lahavs@emindsys.com www.emindsys.com The approach Non-stop applications can t leave on their

More information

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ]

10 METRICS TO MONITOR IN THE LTE NETWORK. [ WhitePaper ] [ WhitePaper ] 10 10 METRICS TO MONITOR IN THE LTE NETWORK. Abstract: The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert service-impacting

More information

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com

Whitepaper. 10 Metrics to Monitor in the LTE Network. www.sevone.com blog.sevone.com info@sevone.com 10 Metrics to Monitor in the LTE Network The deployment of LTE increases dependency on the underlying network, which must be closely monitored in order to avert serviceimpacting events. In addition, the

More information

Fuzzy Network Profiling for Intrusion Detection

Fuzzy Network Profiling for Intrusion Detection Fuzzy Network Profiling for Intrusion Detection John E. Dickerson (jedicker@iastate.edu) and Julie A. Dickerson (julied@iastate.edu) Electrical and Computer Engineering Department Iowa State University

More information

XpoLog Center Suite Log Management & Analysis platform

XpoLog Center Suite Log Management & Analysis platform XpoLog Center Suite Log Management & Analysis platform Summary: 1. End to End data management collects and indexes data in any format from any machine / device in the environment. 2. Logs Monitoring -

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Open Source for Cloud Infrastructure

Open Source for Cloud Infrastructure Open Source for Cloud Infrastructure June 29, 2012 Jackson He General Manager, Intel APAC R&D Ltd. Cloud is Here and Expanding More users, more devices, more data & traffic, expanding usages >3B 15B Connected

More information

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds.

Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid clouds. ENTERPRISE MONITORING & LIFECYCLE MANAGEMENT Unify IT Operations Enterprise IT is complex. Today, IT infrastructure spans the physical, the virtual and applications, and crosses public, private and hybrid

More information

TIBCO Live Datamart: Push-Based Real-Time Analytics

TIBCO Live Datamart: Push-Based Real-Time Analytics TIBCO Live Datamart: Push-Based Real-Time Analytics ABSTRACT TIBCO Live Datamart is a new approach to real-time analytics and data warehousing for environments where large volumes of data require a management

More information

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011

CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 CA Virtual Assurance/ Systems Performance for IM r12 DACHSUG 2011 Happy Birthday Spectrum! On this day, exactly 20 years ago (4/15/1991) Spectrum was officially considered meant - 2 CA Virtual Assurance

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Enterprise Application Monitoring with

Enterprise Application Monitoring with Enterprise Application Monitoring with 11/10/2007 Presented by James Peel james.peel@altinity.com / www.altinity.com 1 Who am I? James Peel - james.peel@altinity.com Job: Managing Director of Altinity

More information

Web Application Penetration Testing

Web Application Penetration Testing Web Application Penetration Testing 2010 2010 AT&T Intellectual Property. All rights reserved. AT&T and the AT&T logo are trademarks of AT&T Intellectual Property. Will Bechtel William.Bechtel@att.com

More information

TORNADO Solution for Telecom Vertical

TORNADO Solution for Telecom Vertical BIG DATA ANALYTICS & REPORTING TORNADO Solution for Telecom Vertical Overview Last decade has see a rapid growth in wireless and mobile devices such as smart- phones, tablets and netbook is becoming very

More information

Scalable Architecture on Amazon AWS Cloud

Scalable Architecture on Amazon AWS Cloud Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies kalpak@clogeny.com 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect

More information

TIBCO ActiveSpaces Use Cases How in-memory computing supercharges your infrastructure

TIBCO ActiveSpaces Use Cases How in-memory computing supercharges your infrastructure TIBCO Use Cases How in-memory computing supercharges your infrastructure is a great solution for lifting the burden of big data, reducing reliance on costly transactional systems, and building highly scalable,

More information

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM?

MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? MEASURING WORKLOAD PERFORMANCE IS THE INFRASTRUCTURE A PROBLEM? Ashutosh Shinde Performance Architect ashutosh_shinde@hotmail.com Validating if the workload generated by the load generating tools is applied

More information

MySQL Enterprise Monitor

MySQL Enterprise Monitor MySQL Enterprise Monitor Lynn Ferrante Principal Sales Consultant 1 Program Agenda MySQL Enterprise Monitor Overview Architecture Roles Demo 2 Overview 3 MySQL Enterprise Edition Highest Levels of Security,

More information

Guideline for stresstest Page 1 of 6. Stress test

Guideline for stresstest Page 1 of 6. Stress test Guideline for stresstest Page 1 of 6 Stress test Objective: Show unacceptable problems with high parallel load. Crash, wrong processing, slow processing. Test Procedure: Run test cases with maximum number

More information

MONITORING EMC GREENPLUM DCA WITH NAGIOS

MONITORING EMC GREENPLUM DCA WITH NAGIOS White Paper MONITORING EMC GREENPLUM DCA WITH NAGIOS EMC Greenplum Data Computing Appliance, EMC DCA Nagios Plug-In, Monitor DCA hardware components Monitor DCA database and Hadoop services View full DCA

More information

PROFESSIONAL SECURITY SYSTEMS

PROFESSIONAL SECURITY SYSTEMS PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security

More information

Module: Sharepoint Administrator

Module: Sharepoint Administrator Module: Sharepoint Administrator Mode: Classroom Duration: 40 hours This course teaches IT Professionals to design and deploy Microsoft SharePoint 2010. Course Outline: Module 1: Designing a Logical Architecture

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

Business Intelligence for Big Data

Business Intelligence for Big Data Business Intelligence for Big Data Will Gorman, Vice President, Engineering May, 2011 2010, Pentaho. All Rights Reserved. www.pentaho.com. What is BI? Business Intelligence = reports, dashboards, analysis,

More information

OpenITSM - IT Service Management with Open Source Software

OpenITSM - IT Service Management with Open Source Software OpenITSM - IT Service Management with Open Source Software März 2011 CeBIT Speaker: Julian Hein NETWAYS Founded 1995 26 full time employees Headquarter Nuremberg, Germany Focus on Open Source in Systems

More information

A Cloud Test Bed for China Railway Enterprise Data Center

A Cloud Test Bed for China Railway Enterprise Data Center A Cloud Test Bed for China Railway Enterprise Data Center BACKGROUND China Railway consists of eighteen regional bureaus, geographically distributed across China, with each regional bureau having their

More information

KPACK: SQL Capacity Monitoring

KPACK: SQL Capacity Monitoring KPACK: SQL Capacity Monitoring Microsoft SQL database capacity monitoring is extremely critical for enterprise high availability deployments. Although built-in SQL tools and certain 3 rd party monitoring

More information

Solving big data problems in real-time with CEP and Dashboards - patterns and tips

Solving big data problems in real-time with CEP and Dashboards - patterns and tips September 10-13, 2012 Orlando, Florida Solving big data problems in real-time with CEP and Dashboards - patterns and tips Kevin Wilson Karl Kwong Learning Points Big data is a reality and organizations

More information

Server & Application Monitor

Server & Application Monitor Server & Application Monitor agentless application & server monitoring SolarWinds Server & Application Monitor provides predictive insight to pinpoint app performance issues. This product contains a rich

More information

WebSphere XD Virtual Enterprise v7.0: virtualization and infrastructure optimization

WebSphere XD Virtual Enterprise v7.0: virtualization and infrastructure optimization Antonella Bertoletti Executive IT Specialist WebSphere Client Technical Professional Team IBM Software Group WebSphere XD Virtual Enterprise v7.0: virtualization and infrastructure optimization WAS family

More information

friendlyway composer network services server

friendlyway composer network services server HelpAndManual_illegal_keygen friendlyway composer network services server User manual Contents I Contents Welcome 1 Why composer network services? 2 Support 3 Introduction 4... 4 Getting started with

More information

7/15/2011. Monitoring and Managing VDI. Monitoring a VDI Deployment. Veeam Monitor. Veeam Monitor

7/15/2011. Monitoring and Managing VDI. Monitoring a VDI Deployment. Veeam Monitor. Veeam Monitor Monitoring a VDI Deployment Monitoring and Managing VDI with Veeam Aseem Anwar S.E. Channel UKI Need for real-time performance metrics Detailed alerting and fault finding tools Identification of bottlenecks

More information

Web Application Hosting Cloud Architecture

Web Application Hosting Cloud Architecture Web Application Hosting Cloud Architecture Executive Overview This paper describes vendor neutral best practices for hosting web applications using cloud computing. The architectural elements described

More information

A Quantitative Approach to Security Monitor Deployment

A Quantitative Approach to Security Monitor Deployment A Quantitative Approach to Security Monitor Deployment Uttam Thakore PI: William H. Sanders Problem Intrusion detection requires adequate monitoring Monitors must collect sufficient information about intrusions

More information

Oracle Service Bus: - When to use, where to use and when not to use

Oracle Service Bus: - When to use, where to use and when not to use Oracle Service Bus: - When to use, where to use and when not to use Session ID#: 244 Prepared by: Abhay Kumar Senior Consultant AST Corporation REMINDER Check in on the COLLABORATE mobile app Specialized.

More information

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013

Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Presenting Mongoose A New Approach to Traffic Capture (patent pending) presented by Ron McLeod and Ashraf Abu Sharekh January 2013 Outline Genesis - why we built it, where and when did the idea begin Issues

More information

Web Application s Performance Testing

Web Application s Performance Testing Web Application s Performance Testing B. Election Reddy (07305054) Guided by N. L. Sarda April 13, 2008 1 Contents 1 Introduction 4 2 Objectives 4 3 Performance Indicators 5 4 Types of Performance Testing

More information

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis

Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,

More information

www.prolexic.com Stop DDoS Attacks in Minutes

www.prolexic.com Stop DDoS Attacks in Minutes www.prolexic.com Stop DDoS Attacks in Minutes Prolexic gives us the strong insurance policy against DDoS attacks that we were looking for. Mark Johnson, Chief Financial Officer, RealVision You ve seen

More information

Collax Monitoring with Nagios

Collax Monitoring with Nagios Collax Monitoring with Nagios Howto This howto describes the configuration of active monitoring on a Collax server. Internally, the system uses Nagios for this purpose. Nagios is used primarily for the

More information

APRIL 2010 HIGH PERFORMANCE INTRUSION PREVENTION SYSTEMS

APRIL 2010 HIGH PERFORMANCE INTRUSION PREVENTION SYSTEMS APRIL 2010 HIGH PERFORMANCE INTRUSION PREVENTION SYSTEMS A new approach to network security appliance development that promises lower overall cost, lower risk and faster time-to-market Disclaimer: This

More information

Alcatel-Lucent IMS Application Server

Alcatel-Lucent IMS Application Server September Alain Grignac, Gérard Tixier Application BD/ CTO Office History 1999/2000/2001 Java middleware initiated as basis for a high-performances WAP Gateway. First commercial deployments 2002/2003/2004

More information

OpenITSM - IT Service Management with Open Source Software

OpenITSM - IT Service Management with Open Source Software OpenITSM - IT Service Management with Open Source Software 03.02.2011 CloudExpo London Speaker: Julian Hein NETWAYS Founded 1995 26 full time employees Headquarter Nuremberg, Germany Focus on Open Source

More information

Application Performance Management for Enterprise Applications

Application Performance Management for Enterprise Applications Application Performance Management for Enterprise Applications White Paper from ManageEngine Web: Email: appmanager-support@manageengine.com Table of Contents 1. Introduction 2. Types of applications used

More information

Web Application Platform for Sandia

Web Application Platform for Sandia Web Application Platform for Sandia Sandia National Laboratories is a multi-program laboratory managed and operated by Sandia Corporation, a wholly owned subsidiary of Lockheed Martin Corporation, for

More information

Tk20 Network Infrastructure

Tk20 Network Infrastructure Tk20 Network Infrastructure Tk20 Network Infrastructure Table of Contents Overview... 4 Physical Layout... 4 Air Conditioning:... 4 Backup Power:... 4 Personnel Security:... 4 Fire Prevention and Suppression:...

More information

Beyond the Basics: Making the Most of Oracle Enterprise Manager 12c Monitoring

Beyond the Basics: Making the Most of Oracle Enterprise Manager 12c Monitoring Beyond the Basics: Making the Most of Oracle Enterprise Manager 12c Monitoring Ana McCollum Director of Product Management Oracle Enterprise Manager September 29, 2014 Safe Harbor Statement The following

More information

Eric Ledu, The Createch Group, a BELL company

Eric Ledu, The Createch Group, a BELL company Eric Ledu, The Createch Group, a BELL company Intelligence Analytics maturity Past Present Future Predictive Modeling Optimization What is the best that could happen? Raw Data Cleaned Data Standard Reports

More information

Stop DDoS Attacks in Minutes

Stop DDoS Attacks in Minutes PREVENTIA Forward Thinking Security Solutions Stop DDoS Attacks in Minutes 1 On average there are more than 7,000 DDoS attacks observed daily. You ve seen the headlines. Distributed Denial of Service (DDoS)

More information

Monitoring can be as simple as waiting

Monitoring can be as simple as waiting Proactive monitoring for dynamic virtualized environments By David Weber and Veronique Delarue Virtualization can significantly increase monitoring complexity. By using BMC ProactiveNet Performance Management,

More information

Company & Solution Profile

Company & Solution Profile Company & Solution Profile About Us NMSWorks Software Limited is an information technology company specializing in developing Carrier grade Integrated Network Management Solutions for the emerging convergent

More information

Seminar Monitoring large scale complex systems through Complex Event Processing Technologies

Seminar Monitoring large scale complex systems through Complex Event Processing Technologies Seminar Monitoring large scale complex systems through Complex Event Processing Technologies Lecture 2 - Practical examples of applicability of CEP for security attacks detection Giorgia Lodi lodi@dis.uniroma1.it

More information

Cognos8 Deployment Best Practices for Performance/Scalability. Barnaby Cole Practice Lead, Technical Services

Cognos8 Deployment Best Practices for Performance/Scalability. Barnaby Cole Practice Lead, Technical Services Cognos8 Deployment Best Practices for Performance/Scalability Barnaby Cole Practice Lead, Technical Services Agenda > Cognos 8 Architecture Overview > Cognos 8 Components > Load Balancing > Deployment

More information

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS

LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS LOAD BALANCING TECHNIQUES FOR RELEASE 11i AND RELEASE 12 E-BUSINESS ENVIRONMENTS Venkat Perumal IT Convergence Introduction Any application server based on a certain CPU, memory and other configurations

More information

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical

Radware ADC-VX Solution. The Agility of Virtual; The Predictability of Physical Radware ADC-VX Solution The Agility of Virtual; The Predictability of Physical Table of Contents General... 3 Virtualization and consolidation trends in the data centers... 3 How virtualization and consolidation

More information

WebSphere Application Server V6.1 Extended Deployment: Overview and Architecture

WebSphere Application Server V6.1 Extended Deployment: Overview and Architecture Chapter 32 WebSphere Application Server V6.1 Extended Deployment: Overview and Architecture The WebSphere Application Server Extended Deployment (WAS XD) package provides many extensions to existing functionality

More information

Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008.

Case Study - I. Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008. Case Study - I Industry: Social Networking Website Technology : J2EE AJAX, Spring, MySQL, Weblogic, Windows Server 2008 Challenges The scalability of the database servers to execute batch processes under

More information

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION

WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION WHITE PAPER AUTOMATED, REAL-TIME RISK ANALYSIS AND REMEDIATION Table of Contents Executive Summary...3 Vulnerability Scanners Alone Are Not Enough...3 Real-Time Change Configuration Notification is the

More information

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT:

Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Trust based Peer-to-Peer System for Secure Data Transmission ABSTRACT: Open nature of peer-to-peer systems exposes them to malicious activity. Building trust relationships among peers can mitigate attacks

More information

BUILDING HIGH-AVAILABILITY SERVICES IN JAVA

BUILDING HIGH-AVAILABILITY SERVICES IN JAVA BUILDING HIGH-AVAILABILITY SERVICES IN JAVA MATTHIAS BRÄGER CERN GS-ASE Matthias.Braeger@cern.ch AGENDA Measuring service availability Java Messaging Shared memory solutions Deployment Examples Summary

More information

Insight into Performance Testing J2EE Applications Sep 2008

Insight into Performance Testing J2EE Applications Sep 2008 Insight into Performance Testing J2EE Applications Sep 2008 Presented by Chandrasekar Thodla 2008, Cognizant Technology Solutions. All Rights Reserved. The information contained herein is subject to change

More information

HRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry

HRC Advanced Citrix Troubleshooting Guide. Remove all Citrix Instances from the Registry HRC Advanced Citrix Troubleshooting Guide Advanced Troubleshooting procedures: 1. Add https://mobile.hrc.army.mil to Internet Explorer s trusted sites list. Click on Tools Internet Options Security. Click

More information

Zend and IBM: Bringing the power of PHP applications to the enterprise

Zend and IBM: Bringing the power of PHP applications to the enterprise Zend and IBM: Bringing the power of PHP applications to the enterprise A high-performance PHP platform that helps enterprises improve and accelerate web and mobile application development Highlights: Leverages

More information

CS 356 Lecture 16 Denial of Service. Spring 2013

CS 356 Lecture 16 Denial of Service. Spring 2013 CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter

More information

PROPOSAL To Develop an Enterprise Scale Disease Modeling Web Portal For Ascel Bio Updated March 2015

PROPOSAL To Develop an Enterprise Scale Disease Modeling Web Portal For Ascel Bio Updated March 2015 Enterprise Scale Disease Modeling Web Portal PROPOSAL To Develop an Enterprise Scale Disease Modeling Web Portal For Ascel Bio Updated March 2015 i Last Updated: 5/8/2015 4:13 PM3/5/2015 10:00 AM Enterprise

More information

Performance Test Summary Report Skills Development Management System. December 2014

Performance Test Summary Report Skills Development Management System. December 2014 Performance Test Summary Report Skills Development Management System December 2014 Performance Test report submitted to National Skill Development Corporation Version Date Name Summary of Changes 1.0 22/12/2014

More information

A SURVEY ON AUTOMATED SERVER MONITORING

A SURVEY ON AUTOMATED SERVER MONITORING A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. priscillapersis@gmail.com Abstract This paper covers the automatic way of server

More information

Microsoft Dynamics CRM 2011 Performance Counters

Microsoft Dynamics CRM 2011 Performance Counters Microsoft Dynamics CRM 2011 Performance Counters Microsoft Corporation Published August 2011 Abstract Windows Server 2008 R2 includes a tool named Windows Performance Monitor. You can configure Windows

More information

DCML Framework Use Cases

DCML Framework Use Cases DCML Framework Use Cases Introduction Use Case 1: Monitoring Newly Provisioned Servers Use Case 2: Ensuring Accurate Asset Inventory Across Multiple Management Systems Use Case 3: Providing Standard Application

More information

Best Practices for Managing Virtualized Environments

Best Practices for Managing Virtualized Environments WHITE PAPER Introduction... 2 Reduce Tool and Process Sprawl... 2 Control Virtual Server Sprawl... 3 Effectively Manage Network Stress... 4 Reliably Deliver Application Services... 5 Comprehensively Manage

More information

Accelerating Hadoop MapReduce Using an In-Memory Data Grid

Accelerating Hadoop MapReduce Using an In-Memory Data Grid Accelerating Hadoop MapReduce Using an In-Memory Data Grid By David L. Brinker and William L. Bain, ScaleOut Software, Inc. 2013 ScaleOut Software, Inc. 12/27/2012 H adoop has been widely embraced for

More information

SERVICE SCHEDULE PUBLIC CLOUD SERVICES

SERVICE SCHEDULE PUBLIC CLOUD SERVICES SERVICE SCHEDULE PUBLIC CLOUD SERVICES This is a Service Schedule as defined in the Conditions. Where the Services set out in this Service Schedule form part of the Services to be supplied under a Contract

More information

Performance Testing IBM MQSeries* Infrastructures

Performance Testing IBM MQSeries* Infrastructures Performance Testing IBM * Infrastructures MQTester TM for LoadRunner from CommerceQuest Inc. 2001 CommerceQuest Inc. All rights reserved. The information contained herein is the proprietary property of

More information

Network Security Platform 7.5

Network Security Platform 7.5 M series Release Notes Network Security Platform 7.5 Revision B Contents About this document New features Resolved issues Known issues Installation instructions Product documentation About this document

More information