Software-Defined Traffic Measurement with OpenSketch
|
|
|
- Kristina Anthony
- 9 years ago
- Views:
Transcription
1 Software-Defined Traffic Measurement with OpenSketch Lavanya Jose Stanford University Joint work with Minlan Yu and Rui Miao at USC 1 1
2 Management is Control + Measurement control - Access Control - Routing measure - DDoS - Flow Size Distribution 2 2
3 Questions we want to ask 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is someone doing a port scan? 4. Is someone being DDoS-ed? 5. Who s getting traffic from blacklisted IPs? 6. How many people downloaded files from ? 3 3
4 Switches are great at counting per flow bytes and packets NetFlow and sflow sample packets NetFlow maintains per flow byte and packet counts Can find count of a particular flow, prefix or counts of heavy flows 4 4
5 Problem: NetFlow counts can t answer my questions Is someone doing a port scan? NetFlow samples packets from heavy flows. Missed packets from small port scanners. - Increase sampling rate --> inefficient 5 5
6 Streaming algorithms + Process efficiently at line rate + Accurate answers - But each answers a specific question 6 6
7 What measurement architecture can answer all my questions? 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is someone doing a port scan? 4. Is someone being DDoS-ed? 5. Who s getting traffic from blacklisted IPs? 6. How many people downloaded files from ? 7 7
8 SDN Model: Find Building Blocks 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is someone doing a port scan?...??? 8 8
9 Sketches as building blocks Sketch Data structure Support approx. computing some function of data Much smaller than actual data Streaming, small per-item processing cost Provable space-accuracy tradeoffs 9 9
10 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses Packet h1 h2 h process (Cormode 2005) 10 10
11 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses Source IP address : h1 h2 h process (Cormode 2005) 10 10
12 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses Source IP address : h1 h2 h process (Cormode 2005) 10 10
13 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses Source IP address : h1 h2 h process (Cormode 2005) 10 10
14 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses Source IP address : h1 h2 h process (Cormode 2005) 10 10
15 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses query h1 h2 h (Cormode 2005) 11 11
16 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses # packets from h ? h2 query h (Cormode 2005) 11 11
17 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses # packets from h ? h2 query h3 estimate pick min. (Cormode 2005) 11 11
18 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses # packets from h ? h2 query h3 estimate pick min. (Cormode 2005) 11 11
19 Sketches as building blocks e.g., Count Min sketch to store counts of frequent source IP addresses + Provable spaceaccuracy tradeoffs (Cormode 2005) 23 estimate pick min
20 Sketches as building blocks Counting, storing statistics Picking packets Identifying to measure heavy keys (Reversible Sketch: Schweller 2004) 13 13
21 ...answer many questions 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is someone doing a port scan? 4. Is someone being DDoS-ed? 5. Who s getting traffic from blacklisted IPs? 6. How many people downloaded files from ? (Reversible Sketch: Schweller 2004) Counting, storing statistics Identifying heavy keys 14 14
22 But each sketch estimates only one function - frequency count - cardinality - set membership - heavy keys process process process process query query query query estimate 15 15
23 3-stage pipeline - frequency count - cardinality - set membership - heavy keys process process process process query query query query estimate 16 16
24 3-stage pipeline - frequency count - cardinality - set membership - heavy keys query query query query estimate Hash Classify Count 16 16
25 3-stage pipeline pick fields to hash hash values header fields acket compute counter addresses Hash Classify Count header fields header fields pick field to match hash values 17 17
26 3-stage pipeline - frequency count - cardinality - set membership - heavy keys query query query query estimate Hash Classify Count 18 18
27 3-stage pipeline Identifying heavy keys Counting, storing statistics Picking packets to measure Hash Classify Count 18 18
28 3-stage pipeline 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is someone doing a port scan? Identifying heavy keys Counting, storing statistics Picking packets to measure Hash Classify Count 18 18
29 OpenSketch Measurement Framework Controller 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is.. Identifying heavy keys Counting, storing statistics Picking packets to measure ata Plane Hash Classify Count 19 19
30 OpenSketch Measurement Framework Controller 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is.. Measurement Identifying Counting, Library heavy keys storing Picking packets to measure statistics ata Plane Hash Classify Count 19 19
31 OpenSketch Measurement Framework Controller 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is.. Measurement Programs Measurement Identifying Counting, Library heavy keys storing Picking packets to measure statistics ata Plane Hash Classify Count 19 19
32 OpenSketch Measurement Framework Controller 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is.. Measurement Programs Measurement Identifying Counting, Library heavy keys storing Picking packets to measure statistics ata Plane #, field, range (match, action) # counters, size, update type, addr. calculation Hash Classify Count 19 19
33 OpenSketch Measurement Framework Controller 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is.. Measurement Programs Measurement Identifying Counting, Library heavy keys storing Picking packets to measure statistics ata Plane Hash Classify Count 19 19
34 Details Implementing sketches with the Pipeline Configuring the Pipeline Evaluation and NetFPGA prototype 20 20
35 Count Min Sketch with the Pipeline Counting, storing statistics Source IP address : to store counts of frequent source IP addresses h1 h h process Hash Count 21 21
36 Bitmap Sketch with the Pipeline Counting, storing statistics to store number of different destination port numbers Packet h process Hash Count 22 22
37 Bitmap Sketch with the Pipeline Counting, storing statistics to store number of different destination port numbers Destination port number : 5596 h process Hash Count 22 22
38 Bitmap Sketch with the Pipeline Counting, storing statistics to store number of different destination port numbers Destination port number : 5596 h process Hash Count 22 22
39 Bitmap Sketch with the Pipeline Counting, storing statistics to store number of different destination port numbers # different destination port numbers? query (Whang 1990) 23 23
40 Bitmap Sketch with the Pipeline Counting, storing statistics to store number of different destination port numbers # different destination port numbers? query estimate 6/10 estimate N = -10 ln(6/10)= 5 (Whang 1990) Six counters out of ten are
41 Other Sketches K-ary Sketch for heavy changes Bloom Filter Sketch to check set membership PCSA sketch to count distinct values (Schweller 2004; Goel 2010; Flajolet 1985) 24 24
42 Efficient implementation of 3-stage pipeline Hash Classify Count hash in parallel TCAM rules cheap fast memory MBs of SRAM 25 25
43 Similar functions, diverse configurations Hash Classify Count?? hash functions?? TCAM entries for classify rules?? MBs of SRAM for tables of counters 26 26
44 Similar functions, diverse configurations Hash 4-8 simple hash functions per question - Count Min: 3 - Bloom Filters: Fixed size reversible sketch: 5 - Can share hash functions 27 27
45 Similar functions, diverse configurations Classify TCAM entries per question maximum - Match a prefix/ value: 1 rule - Match a set of values: Bloom Filters 28 28
46 Similar functions, diverse configurations Count From simulation and worst case bounds for different tasks up to 8MB SRAM 29 29
47 relative error (%) Similar functions, diverse configurations Count Change detection up to 8MB SRAM 2MB for 1.7% err SRAM (MB) 29 29
48 relative error (%) Similar functions, diverse configurations Count Change detection up to 8MB SRAM 7.5MB for 0.5% err SRAM (MB) 29 29
49 Measurement tasks 1. Who s sending a lot to /16? (Heavy Hitters) 2. How are flow sizes distributed? 3. Is someone doing a port scan? 4. Is someone being DDoS-ed? 5. Who s getting traffic from blacklisted IPs? 6. How many people downloaded files from ? (Heavy Hitters: Cormode 2005; Flow Size Distribution: Kumar 2004; Change detection: Schweller 2004; DDoS detection: Venkataraman 2005) 30 30
50 More efficient than NetFlow (Heavy Hitters) False pos. (%) NetFlow-pos OpenSketch-pos Efficient- needs 1/4th as much memory as NetFlow for 4% f.p Switch memory size (KB) 31 31
51 More efficient than NetFlow (Heavy Hitters) Accurate- with 600KB, OpenSketch has less than 0.05% f.p. NetFlow has around 3% False pos. (%) NetFlow-pos OpenSketch-pos Switch memory size (KB) 31 31
52 OpenSketch NetFPGA Prototype 3-stage meas. pipeline parallel to forwarding Full throughput 4 ports Measurement pipeline takes fewer cycles than forwarding 32 32
53 Conclusion Current switches good for flow statistics But they don t answer basic measurement questions Like identify heavy hitters, detect DDoS attacks, port scans, traffic from blacklisted IP address etc
54 Takeaway Hash, classify and count pipeline in the Data Plane And sketch based building blocks in the Control Plane Make measurement in switches efficient and easy 34 34
Software Defined Traffic Measurement with OpenSketch
Software Defined Traffic Measurement with OpenSketch Minlan Yu Lavanya Jose Rui Miao University of Southern California Princeton University Abstract Most network management tasks in software-defined networks
FlowRadar: A Better NetFlow for Data Centers
FlowRadar: A Better NetFlow for Data Centers Yuliang Li Rui Miao Changhoon Kim Minlan Yu University of Southern California Barefoot Networks Abstract NetFlow has been a widely used monitoring tool with
Bitmap Algorithms for Counting Active Flows on High Speed Links. Elisa Jasinska [email protected]
Bitmap Algorithms for Counting Active Flows on High Speed Links Elisa Jasinska [email protected] Seminar: Internet Measurement Technische Universität Berlin - Deutsche Telekom Laboratories
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
Counting Problems in Flash Storage Design
Flash Talk Counting Problems in Flash Storage Design Bongki Moon Department of Computer Science University of Arizona Tucson, AZ 85721, U.S.A. [email protected] NVRAMOS 09, Jeju, Korea, October 2009-1-
Indexing Full Packet Capture Data With Flow
Indexing Full Packet Capture Data With Flow FloCon January 2011 Randy Heins Intelligence Systems Division Overview Full packet capture systems can offer a valuable service provided that they are: Retaining
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
Are Second Generation Firewalls Good for Industrial Control Systems?
Are Second Generation Firewalls Good for Industrial Control Systems? Bernie Pella, CISSP Schneider Electric Cyber Security Services [email protected] Firewall Overview Firewalls provide
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Enabling Open-Source High Speed Network Monitoring on NetFPGA
Network Operations and Management Symposium (NOMS) 2012 Enabling Open-Source High Speed Network Monitoring on NetFPGA Gianni Antichi, Stefano Giordano Email: @iet.unipi.it Department of Information
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
On the effect of forwarding table size on SDN network utilization
IBM Haifa Research Lab On the effect of forwarding table size on SDN network utilization Rami Cohen IBM Haifa Research Lab Liane Lewin Eytan Yahoo Research, Haifa Seffi Naor CS Technion, Israel Danny Raz
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
RID-DoS: Real-time Inter-network Defense Against Denial of Service Attacks. Kathleen M. Moriarty. MIT Lincoln Laboratory.
: Real-time Inter-network Defense Against Denial of Service Attacks Kathleen M. Moriarty 22 October 2002 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations,
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
The State of OpenFlow: Advice for Those Considering SDN. Steve Wallace Executive Director, InCNTRE SDN Lab Indiana University ssw@iu.
The State of OpenFlow: Advice for Those Considering SDN Steve Wallace Executive Director, InCNTRE SDN Lab Indiana University [email protected] 2 3 4 SDN is an architecture Separation of Control and Data Planes
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Principle and Implementation of. Protocol Oblivious Forwarding
Principle and Implementation of Protocol Oblivious Forwarding PUBLICATION DATE DECEMBER 27, 2012 Contents Principle and Implementation of... 1 Protocol Oblivious Forwarding... 1 AUTHORS... 错 误! 未 定 义 书
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Network Tomography and Internet Traffic Matrices
Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert
Software Defined Networking (SDN) - Open Flow
Software Defined Networking (SDN) - Open Flow Introduction Current Internet: egalitarian routing/delivery based on destination address, best effort. Future Internet: criteria based traffic management,
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
An Efficient Algorithm for Measuring Medium- to Large-sized Flows in Network Traffic
An Efficient Algorithm for Measuring Medium- to Large-sized Flows in Network Traffic Ashwin Lall Georgia Inst. of Technology Mitsunori Ogihara University of Miami Jun (Jim) Xu Georgia Inst. of Technology
How To Understand The Power Of The Internet
DATA COMMUNICATOIN NETWORKING Instructor: Ouldooz Baghban Karimi Course Book: Computer Networking, A Top-Down Approach, Kurose, Ross Slides: - Course book Slides - Slides from Princeton University COS461
SDN Programming Languages. Programming SDNs!
SDN Programming Languages Programming SDNs! The Good Network-wide visibility Direct control over the switches Simple data-plane abstraction The Bad Low-level programming interface Functionality tied to
Packet Flow Analysis and Congestion Control of Big Data by Hadoop
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
NetFlow probe on NetFPGA
Verze #1.00, 2008-12-12 NetFlow probe on NetFPGA Introduction With ever-growing volume of data being transferred over the Internet, the need for reliable monitoring becomes more urgent. Monitoring devices
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Open Flow Controller and Switch Datasheet
Open Flow Controller and Switch Datasheet California State University Chico Alan Braithwaite Spring 2013 Block Diagram Figure 1. High Level Block Diagram The project will consist of a network development
OpenFlow and Onix. OpenFlow: Enabling Innovation in Campus Networks. The Problem. We also want. How to run experiments in campus networks?
OpenFlow and Onix Bowei Xu [email protected] [1] McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," ACM SIGCOMM CCR, 38(2):69-74, Apr. 2008. [2] Koponen et al., "Onix: a Distributed Control
ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE
ON THE IMPLEMENTATION OF ADAPTIVE FLOW MEASUREMENT IN THE SDN-ENABLED NETWORK: A PROTOTYPE PANG-WEI TSAI, CHUN-YU HSU, MON-YEN LUO AND CHU-SING YANG NATIONAL CHENG KUNG UNIVERSITY, INSTITUTE OF COMPUTER
The Lagopus SDN Software Switch. 3.1 SDN and OpenFlow. 3. Cloud Computing Technology
3. The Lagopus SDN Software Switch Here we explain the capabilities of the new Lagopus software switch in detail, starting with the basics of SDN and OpenFlow. 3.1 SDN and OpenFlow Those engaged in network-related
DPtech ADX Application Delivery Platform Series
Data Sheet DPtech ADX Series DPtech ADX Application Delivery Platform Series Overview IT requirements for service capability can be summarized as "acceleration", "security" and "reliability". The contradiction
Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee
Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee {yhlee06, lee}@cnu.ac.kr http://networks.cnu.ac.kr/~yhlee Chungnam National University, Korea January 8, 2013 FloCon 2013 Contents Introduction
SDN_CDN Documentation
SDN_CDN Documentation Release 0.1.1 introom9 October 27, 2015 Contents 1 What s it about 1 2 Get the code 3 3 Contents: 5 3.1 Overview................................................. 5 3.2 sdn_module................................................
Limitations of Current Networking Architecture OpenFlow Architecture
CECS 572 Student Name Monday/Wednesday 5:00 PM Dr. Tracy Bradley Maples OpenFlow OpenFlow is the first open standard communications interface that enables Software Defined Networking (SDN) [6]. It was
Big Data & Scripting Part II Streaming Algorithms
Big Data & Scripting Part II Streaming Algorithms 1, Counting Distinct Elements 2, 3, counting distinct elements problem formalization input: stream of elements o from some universe U e.g. ids from a set
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Experimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA ([email protected]) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Applications of Software-Defined Networking (SDN) in Power System Communication Infrastructure: Benefits and Challenges
Applications of Software-Defined Networking (SDN) in Power System Communication Infrastructure: Benefits and Challenges Jasson Casey and Alex Sprintson Texas A&M University ([email protected] and [email protected]
General system requirements
2 General system requirements Minimal requirements Processor: Intel Core 2 Duo or equivalent Memory (RAM): HDD: NIC: 1 GB At least 100 MB available hard disk space. 1000 Mb/s, Jumbo frame 9kb. OS: Windows
Getting traffic statistics from network devices in an SDN environment using OpenFlow
Getting traffic statistics from network devices in an SDN environment using OpenFlow Diyar Jamal Hamad, Khirota Gorgees Yalda, and Ibrahim Tanner Okumus Abstract Software Defined Networking (SDN) provides
Configurable String Matching Hardware for Speeding up Intrusion Detection. Monther Aldwairi*, Thomas Conte, Paul Franzon
Configurable String Matching Hardware for Speeding up Intrusion Detection Monther Aldwairi*, Thomas Conte, Paul Franzon Department of Electrical and Computer Engineering, North Carolina State University,
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller, Zhichun Li, Yan Chen, Yan Gao, Ashish Gupta, Yin Zhang, Peter Dinda, Ming-Yang Kao, Gokhan
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond
Leveraging Advanced Load Sharing for Scaling Capacity to 100 Gbps and Beyond Ananda Rajagopal Product Line Manager Service Provider Solutions Foundry Networks [email protected] Agenda 2 Why Load
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Programmable Networking with Open vswitch
Programmable Networking with Open vswitch Jesse Gross LinuxCon September, 2013 2009 VMware Inc. All rights reserved Background: The Evolution of Data Centers Virtualization has created data center workloads
Cisco Network Foundation Protection Overview
Cisco Network Foundation Protection Overview June 2005 1 Security is about the ability to control the risk incurred from an interconnected global network. Cisco NFP provides the tools, technologies, and
OpenFlow Based Load Balancing
OpenFlow Based Load Balancing Hardeep Uppal and Dane Brandon University of Washington CSE561: Networking Project Report Abstract: In today s high-traffic internet, it is often desirable to have multiple
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Software Defined Networks
Software Defined Networks Damiano Carra Università degli Studi di Verona Dipartimento di Informatica Acknowledgements! Credits Part of the course material is based on slides provided by the following authors
Autonomous NetFlow Probe
Autonomous Ladislav Lhotka [email protected] Martin Žádník [email protected] TF-CSIRT meeting, September 15, 2005 Outline 1 2 Specification Hardware Firmware Software 3 4 Short-term fixes Test
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS
IMPLEMENTATION AND EVALUATION OF THE MOBILITYFIRST PROTOCOL STACK ON SOFTWARE-DEFINED NETWORK PLATFORMS BY ARAVIND KRISHNAMOORTHY A thesis submitted to the Graduate School New Brunswick Rutgers, The State
Portland: how to use the topology feature of the datacenter network to scale routing and forwarding
LECTURE 15: DATACENTER NETWORK: TOPOLOGY AND ROUTING Xiaowei Yang 1 OVERVIEW Portland: how to use the topology feature of the datacenter network to scale routing and forwarding ElasticTree: topology control
Securing Local Area Network with OpenFlow
Securing Local Area Network with OpenFlow Master s Thesis Presentation Fahad B. H. Chowdhury Supervisor: Professor Jukka Manner Advisor: Timo Kiravuo Department of Communications and Networking Aalto University
How to launch and defend against a DDoS
How to launch and defend against a DDoS John Graham-Cumming October 9, 2013 The simplest way to a safer, faster and smarter website DDoSing web sites is... easy Motivated groups of non-technical individuals
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Network Virtualization Based on Flows
TERENA NETWORKING CONFERENCE 2009 June 9, 2009 Network Virtualization Based on Flows Peter Sjödin Markus Hidell, Georgia Kontesidou, Kyriakos Zarifis KTH Royal Institute of Technology, Stockholm Outline
Traffic Monitoring using sflow
Making the Network Visible www.sflow.org Traffic Monitoring using sflow With the ever-increasing reliance on network services for business critical applications, the smallest change in network usage can
BROADCOM SDN SOLUTIONS OF-DPA (OPENFLOW DATA PLANE ABSTRACTION) SOFTWARE
BROADCOM SDN SOLUTIONS OF-DPA (OPENFLOW DATA PLANE ABSTRACTION) SOFTWARE Network Switch Business Unit Infrastructure and Networking Group 1 TOPICS SDN Principles Open Switch Options Introducing OF-DPA
Fiber Channel Over Ethernet (FCoE)
Fiber Channel Over Ethernet (FCoE) Using Intel Ethernet Switch Family White Paper November, 2008 Legal INFORMATION IN THIS DOCUMENT IS PROVIDED IN CONNECTION WITH INTEL PRODUCTS. NO LICENSE, EXPRESS OR
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
Per-Packet Load Balancing
Per-Packet Load Balancing Feature History Release 12.0(19)ST 12.0(21)S 12.0(22)S Modification This feature was introduced on the Cisco 10000 series routers. This feature was introduced on the Cisco 12000
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool
Anomaly Detection in Backbone Networks: Building A Security Service Upon An Innovative Tool Wayne Routly, Maurizio Molina - (DANTE) Ignasi Paredes-Oliva - Universitat Politècnica de Catalunya (UPC) Ashish
Overview: Load Balancing with the MNLB Feature Set for LocalDirector
CHAPTER 1 Overview: Load Balancing with the MNLB Feature Set for LocalDirector This chapter provides a conceptual overview of load balancing and introduces Cisco s MultiNode Load Balancing (MNLB) Feature
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Scalable and Reliable control and Management for SDN-based Large-scale Networks. CJK Workshop @ CFI2014 2014. 06.18.
Scalable and Reliable control and Management for SDN-based Large-scale Networks CJK Workshop @ CFI2014 2014. 06.18. Taesang Choi ETRI Traditional Control & Network Management Architecture NETWORK MANAGEMENT
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
A low-cost, connection aware, load-balancing solution for distributing Gigabit Ethernet traffic between two intrusion detection systems
Iowa State University Digital Repository @ Iowa State University Graduate Theses and Dissertations Graduate College 2010 A low-cost, connection aware, load-balancing solution for distributing Gigabit Ethernet
