Traffic Analysis on Google Maps with GMaps-Trafficker
|
|
|
- Aubrey Foster
- 9 years ago
- Views:
Transcription
1 TECHNICAL WHITE PAPER Traffic Analysis on Google Maps with GMaps-Trafficker Abstract This paper describes a high-level approach to identifying which geographical coordinates a user sees on Google Maps when utilizing an SSL-encrypted channel.
2 Overview Provided you have built the correct profile, the GMaps-Trafficker tool allows you to identify which geographical coordinates a user is looking at on Google Maps even though the user is accessing Google Maps over SSL. This proof-of-concept tool was developed in response to explaining SSL traffic analysis to several IOActive customers. Although many papers have been published in the last decade on this topic written by reputable research outlets including Microsoft Research there hasn't been much to show in the realm of usable, real-world tools and/or source code. To meet this need and to more clearly illustrate the issue to IOActive's customers, this proof of concept tool was developed. It features a simple library built on libpcap and libnids. On top of this library, the tool itself has the ability to perform traffic analysis of Google Maps sessions running over an HTTPS connection. Please note, the code is rough around the edges and will be released in a month or two; so, if you're interested please contact Vincent Berg at [email protected]. Google Maps Explained The technical basics of Google Maps in your browser are actually quite simple: there's window in your browser whose height and width depend on your browser window and, subsequently, your screen size. The Google Maps API loads what are referred to as tiles, as shown in Figure 1. Figure 1 Tiles. Tiles come in many types including satellite, map, and overlay tiles, the last of which show country, city, and street names by loading these transparent PNG tiles over the underlying map tile. The underlying map tile can be either a satellite or a map tile. Our proof-of-concept tool works only with satellite tiles even though there's no particular reason why it could not work on normal map tiles with caveats applied. Encoding. Encoding applies to the zoom level and the coordinates. Google Maps uses a x,y,z encoding to encode latitude-longitude pairs and zoom levels into x,y,z values, which Copyright 2011 by IOActive, Incorporated. All Rights Reserved. [1]
3 refer to one specific location. To load the satellite tile for location (x=1,y=2,z=3), the Google Maps API performs an HTTP request to a URL on something like: SSL Traffic Analysis To perform SSL traffic analysis, you must be able to identify corresponding TCP sessions and merge packets (either from an offline PCAP file or live capture sessions) into a correct data stream this means correct packet reassembly, and GMaps-Trafficker uses libnids. Next, you need to parse the SSL structures for the actual traffic analysis we're not interested in the algorithm handshake at the beginning or at SSL alert messages, we're interested only in the actual Application Data containers of the SSL TCP stream, as shown in Figure 2. Figure 2 Based on this, we can infer how much data travels between the browser/client and the server/google Maps. We have to take into account that SSL might incorporate padding, so it probably will never be a one-to-one mapping, but we are at least able to generate a flow for a specific connection akin to this: HTTP Request/Response Pairs (in bytes) The response sizes correspond roughly to the PNG image sizes, so now we have to convert these image sizes back to (x,y,z) coordinates. First we need to create a profile that contains a mapping of satellite tile image sized to (x,y,z) coordinates. Profiling Google Maps To build the profile, we used the tool GmapCatcher 1, an offline maps viewer with support for Google Maps that catches the downloaded data in $(HOME)/.googlemaps/sat_tiles. We used the gmaps-profile tool to convert all the downloaded images and their respective (x,y,z) coordinates to a simple binary database, which looked something like: 1 Copyright 2011 by IOActive, Incorporated. All Rights Reserved. [2]
4 Image Size Coordinate List (1,2,3); (81,3,12); (144,45,8); (43,66,2); (12,55,3); 9013 (64,22,4); Traffic Analysis on Google Maps Now we put the pieces together: we can identify individual request/response pairs and map those response sizes back to a list of possible coordinates, but there are several problems: It's not really possible to create a database of all Google Maps tiles since you would need several pentabytes of storage. If the profile data contains too many entries, the number of matching coordinates will become too large. If the user has enabled the overlay images, two images are downloaded for each (x,y,z) location; we need to differentiate between those two request types. The last issue can be resolved; if you map the HTTP request sizes on a histogram, here's what you get: Figure 3 The first bump represents all the HTTP requests for the overlay images and the second bump represents the HTTP requests for the satellite tiles. The difference is in the length of the URL, although we could probably create a mapping based on response sizes, which would be less reliable because the overlay images will, in general, be much smaller than Copyright 2011 by IOActive, Incorporated. All Rights Reserved. [3]
5 the satellite tiles. All the other bumps represent Google Maps data being loaded such as the JavaScript APIs. Based on this histogram, we can monitor a connection, create the histogram, and then determine (after a certain amount of time) which requests likely correspond to actual satellite images. All other requests are then ignored. If we continue to look at those remaining HTTP response sizes, the image sizes of the satellite tiles are distributed roughly according to the following graph. Figure 4 If you get small images (roughly 1 kb), you'll have a lot more coordinates to search than if you get big images. Of course, this is obvious since the larger images contain more information (a mountain range and woods and a lake) than a simple satellite tile of the middle of the ocean (of which there are many, indistinguishable from one another). So, for a given time frame we have an enormous list of possible coordinates that we need to reduce as quickly as possible, which goes like this: For each zoomlevel z: Generate a hashmap index on x and put the (x,y) values in it. Generate a hashmap index on y and put the (x,y) values in it. Search for straight line segments as follows: For each x in the hashmap index on x look for adjacent y values. For each x in the hashmap index on x look for adjacent y values. Search for a combination of line segments that comprise an entire rectangle. Return the list of rectangles for zoomlevel z. Copyright 2011 by IOActive, Incorporated. All Rights Reserved. [4]
6 By using this approach, we eliminate all the coordinates that are placed somewhere arbitrary and have no relationship to the other requests that occurred in that time frame. Since the algorithm is somewhat difficult to describe, the following plot shows the analysis of a certain time for a certain zoomlevel with all the (x,y) values. Figure 5 If you look closely, the actual matches occur only at those places were actual rectangles are being formed. If the browser's view window comprises eight tiles, we will get matches for rectangles of at least eight tiles in size (in practice the rectangles will be bigger since Google Maps loads hidden tiles on the edges of the viewport to make smooth scrolling. Based on the above approach, we can reliably identify a complete zoom and get a bunch of coordinates back for the rectangle. We can then convert these coordinates to latitudelongitude pairs and even use reverse geocoding (not implemented yet) to convert these pairs back to human-readable names. As a result, instead of 48,51; 2,21 we will get Paris, France. Copyright 2011 by IOActive, Incorporated. All Rights Reserved. [5]
7 Contact IOActive, Inc. Global Headquarters: 701 5th Avenue, Suite 6850, Seattle, WA Toll free: (866) Office: (206) Fax: (206) EMEA Headquarters: 110 Cannon Street, London EC4N 6AR Toll Free: +44 (0) Direct: +44 (0) Copyright 2011 by IOActive, Incorporated. All Rights Reserved. [6]
XML Processing and Web Services. Chapter 17
XML Processing and Web Services Chapter 17 Textbook to be published by Pearson Ed 2015 in early Pearson 2014 Fundamentals of http://www.funwebdev.com Web Development Objectives 1 XML Overview 2 XML Processing
Ethereal: Getting Started
Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me
Chapter 7 Transport-Level Security
Cryptography and Network Security Chapter 7 Transport-Level Security Lectured by Nguyễn Đức Thái Outline Web Security Issues Security Socket Layer (SSL) Transport Layer Security (TLS) HTTPS Secure Shell
B6: GET /started/with/ HTTP Analysis
B6: GET /started/with/ HTTP Analysis Robert Bullen Application Performance Engineer Blue Cross Blue Shield of Minnesota [email protected] The BCBSMN Experience Who is Blue Cross Blue Shield
Front-End Performance Testing and Optimization
Front-End Performance Testing and Optimization Abstract Today, web user turnaround starts from more than 3 seconds of response time. This demands performance optimization on all application levels. Client
F5 and the 8 Ways to Virtualization
F5 White Paper F5 pioneered the concept of breaking up data center virtualization technologies into eight unique categories within the data center. Any virtualization products or technologies implemented
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Chapter 17. Transport-Level Security
Chapter 17 Transport-Level Security Web Security Considerations The World Wide Web is fundamentally a client/server application running over the Internet and TCP/IP intranets The following characteristics
Monitoring the Real End User Experience
An AppDynamics Business White Paper HOW MUCH REVENUE DOES IT GENERATE? Monitoring the Real End User Experience Web application performance is fundamentally associated in the mind of the end user; with
Chapter 5. Data Communication And Internet Technology
Chapter 5 Data Communication And Internet Technology Purpose Understand the fundamental networking concepts Agenda Network Concepts Communication Protocol TCP/IP-OSI Architecture Network Types LAN WAN
Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS
Whitepaper : Using Unsniff Network Analyzer to analyze SSL / TLS A number of applications today use SSL and TLS as a security layer. Unsniff allows authorized users to analyze these applications by decrypting
Accelerating Mobile Access
Mobile devices are proliferating, and their use to access applications is skyrocketing, while users are less accepting of application performance issues than ever before. Since mobile devices have limited
Wireshark Lab: Assignment 1w (Optional)
Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding
Network Security Essentials Chapter 5
Network Security Essentials Chapter 5 Fourth Edition by William Stallings Lecture slides by Lawrie Brown Chapter 5 Transport-Level Security Use your mentality Wake up to reality From the song, "I've Got
What is an SSL Certificate?
Security is of the utmost importance when doing business on the Web. Your customers want to know that their information is protected when crossing data lines. A Thawte SSL Web Server Certificate or SuperCert
Data Driven Success. Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA)
Data Driven Success Comparing Log Analytics Tools: Flowerfire s Sawmill vs. Google Analytics (GA) In business, data is everything. Regardless of the products or services you sell or the systems you support,
Dynamic Content Acceleration: Lightning-Fast Web Apps with Amazon CloudFront and Amazon Route 53
Dynamic Content Acceleration: Lightning-Fast Web Apps with Amazon CloudFront and Amazon Route 53 Constantin Gonzalez, Solutions Architect Amazon Web Services Germany GmbH 2014 Amazon.com, Inc. and its
Load Balancing 101: Firewall Sandwiches
F5 White Paper Load Balancing 101: Firewall Sandwiches There are many advantages to deploying firewalls, in particular, behind Application Delivery Controllers. This white paper will show how you can implement
Online Data Monitoring Framework Based on Histogram Packaging in Network Distributed Data Acquisition Systems
Online Data ing Framework Based on Histogram Packaging in Network Distributed Data Acquisition Systems Tomoyuki Konno 1, Anatael Cabrera 2 Masaki Ishitsuka 1, Masahiro Kuze 1, Yasunobu Sakamoto 3 CHEP2010@
WatchGuard Gateway AntiVirus
Gateway AntiVirus WatchGuard Gateway AntiVirus Technical Brief WatchGuard Technologies, Inc. Published: March 2011 Malware Continues to Grow New and ever-changing threats appear with alarming regularity,
HOW DOES GOOGLE ANALYTICS HELP ME?
Google Analytics HOW DOES GOOGLE ANALYTICS HELP ME? Google Analytics tells you how visitors found your site and how they interact with it. You'll be able to compare the behavior and profitability of visitors
Visualizing Data: Scalable Interactivity
Visualizing Data: Scalable Interactivity The best data visualizations illustrate hidden information and structure contained in a data set. As access to large data sets has grown, so has the need for interactive
World-wide online monitoring interface of the ATLAS experiment
World-wide online monitoring interface of the ATLAS experiment S. Kolos, E. Alexandrov, R. Hauser, M. Mineev and A. Salnikov Abstract The ATLAS[1] collaboration accounts for more than 3000 members located
End User Monitoring. AppDynamics Pro Documentation. Version 4.1.8. Page 1
End User Monitoring AppDynamics Pro Documentation Version 4.1.8 Page 1 End User Monitoring....................................................... 4 Browser Real User Monitoring.............................................
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Lab Exercise SSL/TLS. Objective. Step 1: Open a Trace. Step 2: Inspect the Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
EBOOK. The Network Comes of Age: Access and Monitoring at the Application Level
EBOOK The Network Comes of Age: Access and Monitoring at the Application Level www.ixiacom.com 915-6948-01 Rev. A, January 2014 2 Table of Contents How Flow Analysis Grows Into Total Application Intelligence...
Application Detection
The following topics describe Firepower System application detection : Overview:, page 1 Custom Application Detectors, page 7 Viewing or Downloading Detector Details, page 15 Sorting the Detector List,
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
Appspace 5.X Reference Guide (Digital Signage) Updated on February 9, 2015
Appspace 5.X Reference Guide (Digital Signage) Updated on February 9, 2015 1 TABLE OF CONTENTS 2 What is Appspace For Digital Signage... 4 3 Access Appspace... 4 4 Best Practices and Notes... 4 5 Appspace
Introduction. Interoperability & Tools Group. Existing Network Packet Capture Tools. Challenges for existing tools. Microsoft Message Analyzer
Introduction Interoperability & Tools Group Existing Network Packet Capture Tools Challenges for existing tools Microsoft Message Analyzer Slide 2 Interop and Tools What we do Part of Windows Server Org
Free 15-day trial. Signata Waveform Viewer Datasheet
The Signata Waveform Viewer allows you to view and analyze data captured from your oscilloscope anytime and anywhere. You will gain instant insight into device performance, quickly determine the root cause
HIVE STREAMING. Mikael Högqvist Senior Research Engineer 07/05/14 1
HIVE STREAMING Mikael Högqvist Senior Research Engineer 07/05/14 1 ABOUT PEERIALISM! Founded in 2007 by entrepreneurs and researchers from KTH/SICS! Mix of business people, developers and researchers!
Architecture and Data Flow Overview. BlackBerry Enterprise Service 10 721-08877-123 Version: 10.2. Quick Reference
Architecture and Data Flow Overview BlackBerry Enterprise Service 10 721-08877-123 Version: Quick Reference Published: 2013-11-28 SWD-20131128130321045 Contents Key components of BlackBerry Enterprise
TCP/IP Protocol Suite. Marshal Miller Chris Chase
TCP/IP Protocol Suite Marshal Miller Chris Chase Robert W. Taylor (Director of Information Processing Techniques Office at ARPA 1965-1969) "For each of these three terminals, I had three different sets
How the Great Firewall discovers hidden circumvention servers. Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson
How the Great Firewall discovers hidden circumvention servers Roya Ensafi David Fifield Philipp Winter Nick Weaver Nick Feamster Vern Paxson Much already known about GFW Numerous research papers and blog
Virtual Private Networks Solutions for Secure Remote Access. White Paper
Virtual Private Networks Solutions for Secure Remote Access White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information
Building WebRTC Solutions with the Avaya WebRTC Collaboration Environment Snap-in. Joel Ezell Lead Architect, Collaboration Environment R&D
Building WebRTC Solutions with the WebRTC Collaboration Environment Snap-in Joel Ezell Lead Architect, Collaboration Environment R&D Use Cases for Collaboration Environment 3.0 WebRTC Outbound only Click
How to Integrate Camera Live View into Web Application?
ACTi Knowledge Base Category: Installation & Configuration Note Sub-category: Integration Model: All Firmware: N/A Software: N/A Author: Published: 2009/12/30 Reviewed: 2011/11/30 How to Integrate Camera
Computer Networking LAB 2 HTTP
Computer Networking LAB 2 HTTP 1 OBJECTIVES The basic GET/response interaction HTTP message formats Retrieving large HTML files Retrieving HTML files with embedded objects HTTP authentication and security
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES
DISCOVERY OF WEB-APPLICATION VULNERABILITIES USING FUZZING TECHNIQUES By Michael Crouse Dr. Errin W. Fulp, Ph.D., Advisor Abstract The increasingly high volume of users on the web and their use of web
New York University Computer Science Department Courant Institute of Mathematical Sciences
New York University Computer Science Department Courant Institute of Mathematical Sciences Course Title: Data Communication & Networks Course Number: g22.2662-001 Instructor: Jean-Claude Franchitti Session:
Update logo and logo link on A Master. Update Date and Product on B Master
Cover Be sure to: Update META data Update logo and logo link on A Master Update Date and Product on B Master Web Performance Metrics 101 Contents Preface...3 Response Time...4 DNS Resolution Time... 4
Installation Guide ARGUS Symphony 1.6 and Business App Toolkit. 6/13/2014 2014 ARGUS Software, Inc.
ARGUS Symphony 1.6 and Business App Toolkit 6/13/2014 2014 ARGUS Software, Inc. Installation Guide for ARGUS Symphony 1.600.0 6/13/2014 Published by: ARGUS Software, Inc. 3050 Post Oak Boulevard Suite
Building Customer Confidence through SSL Certificates and SuperCerts
Building Customer Confidence through SSL Certificates and SuperCerts Contents 1. Overview 2. Why SSL? 3. Who needs an SSL certificate? 4. How to tell if a website is secure 5. Browser warnings 6. What
INF3510 Information Security University of Oslo Spring 2011. Lecture 9 Communication Security. Audun Jøsang
INF3510 Information Security University of Oslo Spring 2011 Lecture 9 Communication Security Audun Jøsang Outline Network security concepts Communication security Perimeter security Protocol architecture
Advertising Specifications, Standards and Guidelines
Advertising Specifications, Standards and Guidelines www.sitomobile.com MOBILE AD FORMATS Formats and functionality by device type Standard Banners Dimensions File Format Expansion MOBILE LEADERBOARD 320x50
HTTPS is Fast and Hassle-free with CloudFlare
HTTPS is Fast and Hassle-free with CloudFlare 1 888 99 FLARE [email protected] www.cloudflare.com In the past, organizations had to choose between performance and security when encrypting their
CS 356 Lecture 27 Internet Security Protocols. Spring 2013
CS 356 Lecture 27 Internet Security Protocols Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Identifying and Exploiting Padding Oracles. Brian Holyfield Gotham Digital Science
Identifying and Exploiting Padding Oracles Brian Holyfield Gotham Digital Science Session ID: ASEC-403 Session Classification: Intermediate What is a Padding Oracle? We re a SQL Server Shop, we don t use
Repeater. BrowserStack Local. browserstack.com 1. BrowserStack Local makes a REST call using the user s access key to browserstack.
Connection Setup Process makes a REST call using the user s access key to chooses a repeater for establishing a secure connection for Local Testing. The repeater exists within the BrowserStack cloud infrastructure.
Conditions affecting performance of a WebEx session.
Conditions affecting performance of a WebEx session. WebEx Network Bandwidth White Paper The performance of a WebEx session depends on many factors. While vendors like Cisco can control some of these factors,
Intrusion Detection in AlienVault
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Reverse Proxy with SSL - ProxySG Technical Brief
SGOS 5 Series Reverse Proxy with SSL - ProxySG Technical Brief What is Reverse Proxy with SSL? The Blue Coat ProxySG includes the functionality for a robust and flexible reverse proxy solution. In addition
UNMASKCONTENT: THE CASE STUDY
DIGITONTO LLC. UNMASKCONTENT: THE CASE STUDY The mystery UnmaskContent.com v1.0 Contents I. CASE 1: Malware Alert... 2 a. Scenario... 2 b. Data Collection... 2 c. Data Aggregation... 3 d. Data Enumeration...
Load Balancing and Sessions. C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002.
Load Balancing and Sessions C. Kopparapu, Load Balancing Servers, Firewalls and Caches. Wiley, 2002. Scalability multiple servers Availability server fails Manageability Goals do not route to it take servers
JPX-LEI User Guide 2014/8/1. Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved.
JPX-LEI User Guide 2014/8/1 Japan Exchange Group, Inc. / Tokyo Stock Exchange, Inc. Copyright 2014 Tokyo Stock Exchange, Inc. All rights reserved. 1 Contents Outline General User JPX-LEI Search File Download
Load balancing Microsoft IAG
Load balancing Microsoft IAG Using ZXTM with Microsoft IAG (Intelligent Application Gateway) Server Zeus Technology Limited Zeus Technology UK: +44 (0)1223 525000 The Jeffreys Building 1955 Landings Drive
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
ArcGIS Server 9.3.1 mashups
Welcome to ArcGIS Server 9.3.1: Creating Fast Web Mapping Applications With JavaScript Scott Moore ESRI Olympia, WA [email protected] Seminar agenda ArcGIS API for JavaScript: An Overview ArcGIS Server Resource
Infinity Call Tracking
Infinity Call Tracking An introduction from our founder Infinity Tracking is the most advanced call tracking solution in the UK and can track an unlimited number of search keywords. For any company where
DMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
Web Browsing Quality of Experience Score
Web Browsing Quality of Experience Score A Sandvine Technology Showcase Contents Executive Summary... 1 Introduction to Web QoE... 2 Sandvine s Web Browsing QoE Metric... 3 Maintaining a Web Page Library...
PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY
APPLICATION NOTE PERFORMANCE VALIDATION OF JUNIPER NETWORKS SRX5800 SERVICES GATEWAY Copyright 2010, Juniper Networks, Inc. Table of Contents Introduction........................................................................................
Three attacks in SSL protocol and their solutions
Three attacks in SSL protocol and their solutions Hong lei Zhang Department of Computer Science The University of Auckland [email protected] Abstract Secure Socket Layer (SSL) and Transport Layer
Understanding and Selecting Geospatial Analytics Tools
Understanding and Selecting Geospatial Analytics Tools A Practical Example COLLABORATIVE WHITEPAPER SERIES Geospatial Business Intelligence (BI) has been in the conversation related to BI now for quite
Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems?
Finding Fault Location: Combining network topology and end-to-end measurments to locate network problems? Chris Kelly - [email protected] Research Network Operations Center Georgia Tech Office
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER
INUVIKA OPEN VIRTUAL DESKTOP FOUNDATION SERVER ARCHITECTURE OVERVIEW AND SYSTEM REQUIREMENTS Mathieu SCHIRES Version: 1.0.0 Published March 5, 2015 http://www.inuvika.com Contents 1 Introduction 3 2 Architecture
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY. Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University
1 LARGE-SCALE INTERNET MEASUREMENTS FOR DIAGNOSTICS AND PUBLIC POLICY Henning Schulzrinne (+ Walter Johnston & James Miller) FCC & Columbia University 2 Overview Quick overview What does MBA measure? Can
The F5 Intelligent DNS Scale Reference Architecture.
The F5 Intelligent DNS Scale Reference Architecture. End-to-end DNS delivery solutions from F5 maximize the use of organizational resources, while remaining agile and intelligent enough to scale and support
Networks and Security Lab. Network Forensics
Networks and Security Lab Network Forensics Network Forensics - continued We start off from the previous week s exercises and analyze each trace file in detail. Tools needed: Wireshark and your favorite
Nginx 1 Web Server Implementation
Nginx 1 Web Server Implementation Cookbook Over 100 recipes to master using the Nginx HTTP server and reverse proxy Dipankar Sarkar [ 11 open so " *' '" i I community experience d PUBLISHING community
REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER
NEFSIS TRAINING SERIES Nefsis Dedicated Server version 5.1.0.XXX Requirements and Implementation Guide (Rev 4-10209) REQUIREMENTS AND INSTALLATION OF THE NEFSIS DEDICATED SERVER Nefsis Training Series
Monitoring Hybrid Cloud Applications in VMware vcloud Air
Monitoring Hybrid Cloud Applications in ware vcloud Air ware vcenter Hyperic and ware vcenter Operations Manager Installation and Administration Guide for Hybrid Cloud Monitoring TECHNICAL WHITE PAPER
Load Balancing Web Applications
Mon Jan 26 2004 18:14:15 America/New_York Published on The O'Reilly Network (http://www.oreillynet.com/) http://www.oreillynet.com/pub/a/onjava/2001/09/26/load.html See this if you're having trouble printing
JISIS and Web Technologies
27 November 2012 Status: Draft Author: Jean-Claude Dauphin JISIS and Web Technologies I. Introduction This document does aspire to explain how J-ISIS is related to Web technologies and how to use J-ISIS
Vizit 4.1 Installation Guide
Vizit 4.1 Installation Guide Contents Running the Solution Installer... 3 Installation Requirements... 3 The Solution Installer... 3 Activating your License... 7 Online Activation... 7 Offline Activation...
SWE 444 Internet and Web Application Development. Introduction to Web Technology. Dr. Ahmed Youssef. Internet
SWE 444 Internet and Web Application Development Introduction to Web Technology Dr. Ahmed Youssef Internet It is a network of networks connected and communicating using TCP/IP communication protocol 2
WHITE PAPER Citrix Secure Gateway Startup Guide
WHITE PAPER Citrix Secure Gateway Startup Guide www.citrix.com Contents Introduction... 2 What you will need... 2 Preparing the environment for Secure Gateway... 2 Installing a CA using Windows Server
Global Server Load Balancing
White Paper Global Server Load Balancing APV Series Application Delivery Controllers May 2011 Global Server Load Balancing Access. Security. Delivery. Introduction Scalability, high availability and performance
Mobile Push Architectures
Praktikum Mobile und Verteilte Systeme Mobile Push Architectures Prof. Dr. Claudia Linnhoff-Popien Michael Beck, André Ebert http://www.mobile.ifi.lmu.de WS 2015/2016 Asynchronous communications How to
Experimenting in the domain of RIA's and Web 2.0
Experimenting in the domain of RIA's and Web 2.0 Seenivasan Gunabalan IMIT IV Edition, Scuola Suoperiore Sant'Anna,Pisa, Italy E-mail: [email protected] ABSTRACT This paper provides an overview
Email, SNMP, Securing the Web: SSL
Email, SNMP, Securing the Web: SSL 4 January 2015 Lecture 12 4 Jan 2015 SE 428: Advanced Computer Networks 1 Topics for Today Email (SMTP, POP) Network Management (SNMP) ASN.1 Secure Sockets Layer 4 Jan
AN INTRODUCTION TO MAPBOX TOOLS AND SOFTWARE. Matt Gregory 24 July 2013
AN INTRODUCTION TO MAPBOX TOOLS AND SOFTWARE Matt Gregory 24 July 2013 BACKGROUND AND MOTIVATION Research involves regionalscale vegetation modeling (mapping) where every pixel is associated with a treelist
Addressing Mobile Load Testing Challenges. A Neotys White Paper
Addressing Mobile Load Testing Challenges A Neotys White Paper Contents Introduction... 3 Mobile load testing basics... 3 Recording mobile load testing scenarios... 4 Recording tests for native apps...
Using the Push Notifications Extension Part 1: Certificates and Setup
// tutorial Using the Push Notifications Extension Part 1: Certificates and Setup Version 1.0 This tutorial is the second part of our tutorials covering setting up and running the Push Notifications Native
Firefox, Opera, Safari for Windows BMP file handling information leak. September 2008. Discovered by: Mateusz j00ru Jurczyk, Hispasec Labs
Firefox, Opera, Safari for Windows BMP file handling information leak September 2008 Discovered by: Mateusz j00ru Jurczyk, Hispasec Labs 1. Introduction The bitmap format implementations in Mozilla Firefox
3.2: Transport Layer: SSL/TLS Secure Socket Layer (SSL) Transport Layer Security (TLS) Protocol
Chapter 2: Security Techniques Background Chapter 3: Security on Network and Transport Layer Network Layer: IPSec Transport Layer: SSL/TLS Chapter 4: Security on the Application Layer Chapter 5: Security
