High-Frequency Active Internet Topology Mapping
|
|
|
- Arron Cameron
- 10 years ago
- Views:
Transcription
1 High-Frequency Active Internet Topology Mapping Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Robert Beverly Assistant Professor Naval Postgraduate School (831)
2 Intro Project: High-Frequency Active Internet Topology Mapping TTA #7: Network Mapping and Measurement near-real time view of network maps that scale from enterprise to the global Internet matching IP address interfaces to physical routers Team: Dr. Robert Beverly (PI, Naval Postgraduate School) Dr. Geoffrey Xie (Co-PI, NPS) Dr. Justin Rohrer (Postdoc, NPS) Dr. Arthur Berger (Collaborator, Akamai/MIT) 4-6 students (Master s theses) 2
3 Objective Goal: Obtain accurate network graphs, at router and AS granularities, even at very large scale (e.g. Internet) and amid sparsity (e.g. IPv6). Obtain network topologies an order of magnitude faster than existing systems in order to capture transient dynamics, including malicious or misconfiguration events. Motivation: Protect and improve critical infrastructure Understand structural properties of the Internet topology, including robustness, vulnerability to attack, potential for correlated failures, IPv4/IPv6 interdependence, etc. 3
4 Background Why it s hard: Internet topology is dynamic and not designed to be measured; fragile inference techniques Internet naturally hides information, both for scale (e.g. BGP) and economics (e.g. commercial ISPs) Lack of ground truth State-of-the-Art: Significant prior work, but not a solved problem Production topology mapping systems (e.g. iplane, Ark) must balance measurement load vs. fidelity Takes several days to obtain an (incomplete) network map Can miss transient dynamics (e.g. Nyquist sampling loss), which might reveal properties of interest We seek to advance this state-of-the-art 4
5 Technical Approach (1) Our prior work (Beverly et al., ACM IMC 2010): Characterizes production mapping systems Develops new primitives for active topology probing Main ideas: Active probing from fixed set of vantage points High-frequency, high-fidelity continuous characterization Probe smarter, not harder Use external knowledge, data from prior cycles, and adaptive sampling to solve: Which destinations to probe How/where to perform the probe Maximize efficiency and information gain of each probe 5
6 Technical Approach (2) We develop [BBX10] three primitives Best explained by understanding sources of path diversity: 6
7 Subnet Centric Probing Instead of probing at a fixed granularity (e.g. /24 s), adapt to discover an AS s internal subnetting structure Operates on least common prefix principle with edit distance stopping criterion Especially important for IPv6 7
8 Vantage Point Spreading Discover AS ingress points and paths from multiple vantage points Use BGP knowledge to maximize the number of distinct vantage points per probed prefix 8
9 Interface Set Cover Multi-round: continuous probing while maintaining state Perform greedy minimum set cover approximation Select subset of prior round s probe packets for current round Generalizes DoubleTree [DRFC05] w/o parameterization 9
10 Promising Initial Results Result Highlights [BBX10]: Subnet Centric Probing: captures >90% vertex and edge fidelity using 40% fewer probes Vantage Point Spreading: 6% more vertices for free as compared to random assignment Interface Set Cover: >70% probe savings while missing <2% of interfaces after two-weeks Now, the hard work 10
11 Technical Challenges Non-trivial work to bring primitives to production fruition: Integrate/unify primitives, e.g.: SCP and VPS can be performed together Use SCP to discover load balancing, ISC to verify Refine algorithms, e.g.: How ISC reacts to topology changes? Understand how ISC s learned model decays How SCP can accommodate load-balancing? Updated edit distance metric Integrate real-time BGP updates to drive probing: Hybrid active/passive approach Validation between control and data plane to detect events of interest (e.g. MOAS) 11
12 Deliverables Quarterly Reports (every 90 days from award) Software (1 year from award): Implement our three primitives (SCP, VPS, ISC) into a production mapping system (CAIDA s Ark) Refined algorithmic description (1 year from award): Publication of pseudo-code and algorithm details of combined primitives Gather data at high-frequency (1-2 years from award), i.e. hours for complete Internet topology Release topology data set (1-2 years from award) 12
13 Milestones and Schedule Year 1: Implement SCP on Ark, validate on ground-truth networks Implement ISC on Ark, develop change-driven logic Implement VPS on Ark Year 2: Perform multi-cycle probing using combined primitives Quantify load savings and ability to perform alias resolution Begin gathering/analyzing network maps Gather, annotate, analyze, and release topologies Year 3: Gather, annotate, analyze, and release topologies 13 Apply system to probe IPv6 Internet topology
14 Technology Transition Plan Actively collaborating with CAIDA Use Ark infrastructure as initial target All software released publicly without restriction Datasets published to DHS PREDICT and/or CAIDA ITDK repositories Interface with Akamai technologies to use developed technologies in real-world applications 14
15 BAA Number: Cyber Security BAA TTA#7: High Frequency Active Internet Topology Mapping BGP adaptive sampling logic prior topologies Operational Capability 1. Improve efficiency (time and induced load) of existing active network mapping techniques by an order of magnitude Prober Prober Internet near real-time resolution 2. Efficiency gains permit more detailed interface alias resolution and load balancing enumeration thus improving map fidelity 3. Provide improved router level maps in near real-time at scale 4. Discover structure, evolution, and temporal dynamics of critical infrastructure to enable network monitoring, modeling, and protection Prober Proposed Technical Approach: 1. Our active probing primitives from IMC2010 research use BGP, adaptive sampling, and prior traces to intelligently infer large network topologies 2. Employ these probing algorithms to dramatically reduce network mapping overhead while maintaining fidelity 3. Initial work demonstrates individual promise of primitives, reducing load by >80% without compromising recall 4. Unify algorithms into an operational system to provide near realtime view of large scale network topologies 5. Deploy on CAIDA s Archipelago infrastructure to gather maps at high frequency and uncover temporal dynamics Schedule, Deliverables, & Contact Info: Period of Performance: Oct 2012 Sept 2015 Deliverables: Resultant topological data to be included in PREDICT or other data repositories without restriction, system code under free license, derivative technical reports, conference publications, etc. Administrative Contact: Daniella Kuska Naval Postgraduate School Monterey, CA [email protected]
Efficient strategies for active interface-level network topology discovery
Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2013-09 Efficient strategies for active interface-level network topology discovery Baltra, Guillermo P. Monterey, California:
Internet topology and performance analytics for mapping critical network infrastructure
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy 16-18 December 2014 1 Team
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
On the Deficiencies of Active Network Discovery Systems
On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized
Internet (IPv4) Topology Mapping. Department of Computer Science The University of Texas at Dallas
Internet (IPv4) Topology Mapping Kamil Sarac ([email protected]) Department of Computer Science The University of Texas at Dallas Internet topology measurement/mapping Need for Internet topology measurement
Sampling Biases in IP Topology Measurements
Sampling Biases in IP Topology Measurements Anukool Lakhina with John Byers, Mark Crovella and Peng Xie Department of Boston University Discovering the Internet topology Goal: Discover the Internet Router
Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures
Workshop on Novel Approaches to Risk and Security Management for Utility Providers and Critical Infrastructures Using Vulnerable Hosts to Assess Cyber Security Risk in Critical Infrastructures Xiaobing
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option Matthew Luckie and kc claffy {mjl,kc}@caida.org CAIDA, UC San Diego, USA Abstract. Artifacts in traceroute
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Intro to Firewalls. Summary
Topic 3: Lesson 2 Intro to Firewalls Summary Basic questions What is a firewall? What can a firewall do? What is packet filtering? What is proxying? What is stateful packet filtering? Compare network layer
Subnet Level Network Topology Mapping
Subnet Level Network Topology Mapping M. Engin Tozal, Student Member, IEEE, Kamil Sarac, Member, IEEE, Department of Computer Science, University of Texas at Dallas, TX 75080 U.S.A. {engintozal, ksarac}@utdallas.edu
EVILSEED: A Guided Approach to Finding Malicious Web Pages
+ EVILSEED: A Guided Approach to Finding Malicious Web Pages Presented by: Alaa Hassan Supervised by: Dr. Tom Chothia + Outline Introduction Introducing EVILSEED. EVILSEED Architecture. Effectiveness of
Measuring and Characterizing End-to-End Route Dynamics in the Presence of Load Balancing
Measuring and Characterizing End-to-End Route Dynamics in the Presence of Load Balancing Ítalo Cunha,2 Renata Teixeira 2,3 Christophe Diot Technicolor 2 UPMC Sorbonne Universités 3 CNRS Abstract Since
Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network
LiveAction Application Note Finding Network Security Breaches Using LiveAction Software to detect and analyze security issues in your network September 2012 http://www.liveaction.com Table of Contents
EE627 Lecture 22. Multihoming Route Control Devices
EE627 Lecture 22 Multihoming Route Control Devices 1 Multihoming Connect to multiple ISPs Provide reliability from access link/isp failures Potential for load balancing Intelligent Route Control Devices
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Traffic Engineering for Pan-African Research and Education Network: Software Defined Internet exchange Points
Traffic Engineering for Pan-African Research and Education Network: Software Defined Internet exchange Points Josiah Chavula Supervisors: A/Prof. Hussein Suleman, A/Prof. Antoine Bagula 1 Introduction
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Outline. Internet Routing. Alleviating the Problem. DV Algorithm. Routing Information Protocol (RIP) Link State Routing. Routing algorithms
Outline Internet Routing Venkat Padmanabhan Microsoft Research 9 pril 2001 Routing algorithms distance-vector (DV) link-state (LS) Internet Routing border gateway protocol (BGP) BGP convergence paper Venkat
Internet Nameserver IPv4 and IPv6 Address Relationships
Internet Nameserver IPv4 and IPv6 Address Relationships Arthur Berger MIT CSAIL / Akamai [email protected] Nicholas Weaver ICSI / UCSD [email protected] Larry Campbell Akamai [email protected]
Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity
Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
Active Learning with the CyberCIEGE Video Game
Active Learning with the CyberCIEGE Video Game 2011 Michael F. Thompson and Dr. Cynthia E. Irvine Department of Computer Science Naval Postgraduate School Monterey, CA USA The CyberCIEGE Educational Video
Riverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
Introduction. The Inherent Unpredictability of IP Networks # $# #
Introduction " $ % & ' The Inherent Unpredictability of IP Networks A major reason that IP became the de facto worldwide standard for data communications networks is its automated resiliency based on intelligent
Riverbed SteelCentral. Product Family Brochure
Riverbed SteelCentral Product Family Brochure Application performance from the perspective that matters most: Yours Applications are now the center of the business world. We rely on them to reach customers,
Enhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
Where Do You Tube? Uncovering YouTube Server Selection Strategy
Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
Restorable Logical Topology using Cross-Layer Optimization
פרויקטים בתקשורת מחשבים - 236340 - סמסטר אביב 2016 Restorable Logical Topology using Cross-Layer Optimization Abstract: Today s communication networks consist of routers and optical switches in a logical
IP Routing Configuring Static Routes
11 IP Routing Configuring Static Routes Contents Overview..................................................... 11-3 IP Addressing.............................................. 11-3 Networks.................................................
OneSight Voice Quality Assurance
OneSight Voice Quality Assurance Benefits Proactively determine voice quality issues as well as other service impacting issues before users complain Comprehensively monitor communications systems with
The Coremelt Attack. Ahren Studer and Adrian Perrig. We ve Come to Rely on the Internet
The Coremelt Attack Ahren Studer and Adrian Perrig 1 We ve Come to Rely on the Internet Critical for businesses Up to date market information for trading Access to online stores One minute down time =
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK
WHITE PAPER ON SECURITY TESTING IN TELECOM NETWORK DATE OF RELEASE: 27 th July 2012 Table of Contents 1. Introduction... 2 2. Need for securing Telecom Networks... 3 3. Security Assessment Techniques...
Intrusion Detection for Mobile Ad Hoc Networks
Intrusion Detection for Mobile Ad Hoc Networks Tom Chen SMU, Dept of Electrical Engineering [email protected] http://www.engr.smu.edu/~tchen TC/Rockwell/5-20-04 SMU Engineering p. 1 Outline Security problems
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Filtering Based Techniques for DDOS Mitigation
Filtering Based Techniques for DDOS Mitigation Comp290: Network Intrusion Detection Manoj Ampalam DDOS Attacks: Target CPU / Bandwidth Attacker signals slaves to launch an attack on a specific target address
Observer Analyzer Provides In-Depth Management
Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing corporate security policies, the Observer Performance Management Platform is a complete,
Intelligent Routing Platform White Paper
White Paper Table of Contents 1. Executive Summary...3 2. The Challenge of a Multi-Homed Environment...4 3. Network Congestion and Blackouts...4 4. Intelligent Routing Platform...5 4.1 How It Works...5
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points
The Feasibility of Supporting Large-Scale Live Streaming Applications with Dynamic Application End-Points Kay Sripanidkulchai, Aditya Ganjam, Bruce Maggs, and Hui Zhang Instructor: Fabian Bustamante Presented
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management
whitepaper Network Traffic Analysis Using Cisco NetFlow Taking the Guesswork Out of Network Performance Management Taking the Guesswork Out of Network Performance Management EXECUTIVE SUMMARY Many enterprise
An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network
An Evaluation of Peering and Traffic Engineering in the Pan- African Research and Education Network *Clifford Sibanda (National University of Science and Technology- Bulawayo) *Josiah Chavula (Mzuzu University
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT
HOW TO PREVENT DDOS ATTACKS IN A SERVICE PROVIDER ENVIRONMENT The frequency and sophistication of Distributed Denial of Service attacks (DDoS) on the Internet are rapidly increasing. Most of the earliest
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
An Introduction to Network Vulnerability Testing
CONTENTS Introduction 3 Penetration Testing Overview 4 Step 1: Defining the Scope 4 Step 2: Performing the Penetration Test 5 Step 3: Reporting and Delivering Results 6 VeriSign SecureTEST 7 Common Vulnerability
Wireless Network Analysis. Complete Network Monitoring and Analysis for 802.11a/b/g/n
Wireless Network Analysis Complete Network Monitoring and Analysis for 802.11a/b/g/n Comprehensive Wireless Network Management Made Simple From deploying access points to baselining activity to enforcing
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans
MPLS Layer 2 VPNs Functional and Performance Testing Sample Test Plans Contents Overview 1 1. L2 VPN Padding Verification Test 1 1.1 Objective 1 1.2 Setup 1 1.3 Input Parameters 2 1.4 Methodology 2 1.5
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
The Internet: A Remarkable Story. Inside the Net: A Different Story. Networks are Hard to Manage. Software Defined Networking Concepts
The Internet: A Remarkable Story Software Defined Networking Concepts Based on the materials from Jennifer Rexford (Princeton) and Nick McKeown(Stanford) Tremendous success From research experiment to
Layer 1-Informed Internet Topology Measurement
Layer 1-Informed Internet Topology Measurement Ramakrishnan Durairajan University of Wisconsin-Madison [email protected] Joel Sommers Colgate University [email protected] Paul Barford University of
Ofir Arkin Insightix. A New Hybrid Approach for Infrastructure Discovery, Monitoring and Control
Ofir Arkin is the CTO and Co-founder of Insightix, which pioneers the next generation of IT infrastructure discovery, monitoring and auditing systems for enterprise networks. Ofir holds 10 years of experience
Network-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System
Design and Experiments of small DDoS Defense System using Traffic Deflecting in Autonomous System Ho-Seok Kang and Sung-Ryul Kim Konkuk University Seoul, Republic of Korea [email protected] and [email protected]
[state of the internet] / SEO Attacks. Threat Advisory: Continuous Uptick in SEO Attacks
TLP: GREEN Issue Date: 1.12.16 Threat Advisory: Continuous Uptick in SEO Attacks Risk Factor High The Akamai Threat Research Team has identified a highly sophisticated Search Engine Optimization (SEO)
with NetFlow Technology Adam Powers Chief Technology Officer [email protected]
Maximize Network Visibility with NetFlow Technology Adam Powers Chief Technology Officer [email protected] www.lancope.com com Agenda What is NetFlow h Introduction to NetFlow h NetFlow Examples NtFl
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Some Examples of Network Measurements
Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet
Capture of Mission Assets
Capture of Mission Assets Vern Paxson University of California Berkeley, California USA [email protected] June 2009 Presented by Giovanni Vigna Outline Motivational context Tracking network system
NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS
NEW TECHNIQUES FOR THE DETECTION AND TRACKING OF THE DDOS ATTACKS Iustin PRIESCU, PhD Titu Maiorescu University, Bucharest Sebastian NICOLAESCU, PhD Verizon Business, New York, USA Rodica NEAGU, MBA Outpost24,
Internet Anonymity and the Design Process - A Practical Approach
anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, [email protected],
OF-RHM: Transparent Moving Target Defense using Software Defined Networking
OF-RHM: Transparent Moving Target Defense using Software Defined Networking Haadi Jafarian, Qi Duan and Ehab Al-Shaer ACM SIGCOMM HotSDN Workshop August 2012 Helsinki, Finland Why IP Mutation Static assignment
Metrics Suite for Enterprise-Level Attack Graph Analysis
Metrics Suite for Enterprise-Level Attack Graph Analysis Cyber Security Division 2012 Principal Investigators Meeting October 11, 2012 Sushil Jajodia (PI), Steven Noel (co-pi) Metrics Suite for Enterprise-Level
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
How To Understand The Importance Of Network Forensics
Report WildPackets surveyed more than 250 network engineers and IT professionals to better understand the presence of network forensics solutions within the enterprise. The survey, Trends in Network Forensics,
