Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats

Size: px
Start display at page:

Download "Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats"

Transcription

1 Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats by Florian Mansmann, Daniel A. Keim, Stephen C. North, Brian Rexroad, and Daniel Sheleheda 1

2 Why? Visualize internet activity Visualize large portions of the internet Aggregate data according to Continent Country As IP Prefix Identify emerging threats and network anomalies 2

3 Data Collect via different methods Border gate router log Flow traces Router logs GeoIP Store everything in a commercial OLAP 3

4 Data 2 Dimensions: Address space: 7 continents 190 countries autonomous systems prefixes Time: Millisecond Seconds Minutes Hours Days Months Years 4

5 Display Use hierarchical tress Each node = a rectangle All children -- inside the parent Parent size ~ no. nodes it contains Each leaf color = analyzed fact 5

6 Features Complete space utilization Rather easy to generate Stable under strong changes Easy to understand Hard to comperhand 6

7 HistoMap - limitations Must remove less significant nodes Doesn t aggregate properly under zooming Displays only node measurements not interactions 7

8 HistoMap results Geographic HistoMap layout of the upper two levels of the IP hierarchy. Size represents the number of IP addresses assigned to each country. A seventh continent is placed below Australia to visualize ASes without country reference, anonymous proxies, and satellite providers. 8

9 HistoMap results HistoMap 1D layout of all autonomous systems in Germany. The measure (number of incoming connections) of each item is expressed through color. 9

10 Order Preserving Layout Use StripTree Layout Star with a row Add nodes while the aspect ratio decreases Create a new row and continue 10

11 HistoMap The Internet Anonymized outgoing traffic connections from our university gateway on November 29th, 2005 showing all IP prefixes 11

12 HistoMap Botnet Spread 12

13 HistoMap Botnet Spread 13

14 HistoMap Botnet Spread 14

15 Conclusions Easy to render Easy to understand Stable under changes Can highlight hierarchical structure and leaf measurements Doesn t show node interactions Requires OLAP data provider 15

Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats

Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats Visual Analysis of Network Traffic for Resource Planning, Interactive Monitoring, and Interpretation of Security Threats Florian Mansmann, Daniel A. Keim, Stephen C. North, Brian Rexroad, and Daniel Sheleheda

More information

VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc., http://willsfamily.org/gwills

VISUALIZING HIERARCHICAL DATA. Graham Wills SPSS Inc., http://willsfamily.org/gwills VISUALIZING HIERARCHICAL DATA Graham Wills SPSS Inc., http://willsfamily.org/gwills SYNONYMS Hierarchical Graph Layout, Visualizing Trees, Tree Drawing, Information Visualization on Hierarchies; Hierarchical

More information

Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations

Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Visual Support for Analyzing Network Traffic and Intrusion Detection Events using TreeMap and Graph Representations Florian Mansmann 1 Fabian Fischer 1 Daniel A. Keim 1 Stephen C. North 2 1 University

More information

Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks

Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks Interactive Analysis of NetFlows for Misuse Detection in Large IP Networks Florian Mansmann, Fabian Fischer, Daniel A. Keim, Stephan Pietzko, Marcel Waldvogel first.lastname@uni-konstanz.de Abstract: While

More information

NETWORK TRAFFIC CLUSTERING AND GEOGRAPHIC VISUALIZATION

NETWORK TRAFFIC CLUSTERING AND GEOGRAPHIC VISUALIZATION NETWORK TRAFFIC CLUSTERING AND GEOGRAPHIC VISUALIZATION A Thesis Presented to The Faculty of the Department of Computer Science San José State University In Partial Fulfillment of the Requirements for

More information

Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks

Internet Peering, IPv6, and NATs. Mike Freedman V22.0480-005 Networks Internet Peering, IPv6, and NATs Mike Freedman V22.0480-005 Networks Internet Peering Review: Routing Internet has a loose hierarchy of domains Hosts now local router Local routers know site routers Site

More information

Monitoring Network Traffic with Radial Traffic Analyzer

Monitoring Network Traffic with Radial Traffic Analyzer Monitoring Network Traffic with Radial Traffic Analyzer Daniel A. Keim Florian Mansmann Jörn Schneidewind Tobias Schreck Databases and Visualization Group University of Konstanz, Germany {keim,mansmann,schneide,schreck}@inf.uni-konstanz.de

More information

Exploring Big Data using Visual Analytics

Exploring Big Data using Visual Analytics Exploring Big Data using Visual Analytics Daniel A. Keim Data Analysis and Information Visualization Group University of Konstanz, Germany Data Mining for Business Intelligence, Beer Sheva, Israel April

More information

Exterior Gateway Protocols (BGP)

Exterior Gateway Protocols (BGP) Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection

More information

Hierarchical Data Visualization. Ai Nakatani IAT 814 February 21, 2007

Hierarchical Data Visualization. Ai Nakatani IAT 814 February 21, 2007 Hierarchical Data Visualization Ai Nakatani IAT 814 February 21, 2007 Introduction Hierarchical Data Directory structure Genealogy trees Biological taxonomy Business structure Project structure Challenges

More information

Finding Anomalies in Time- Series using Visual Correla/on for Interac/ve Root Cause Analysis

Finding Anomalies in Time- Series using Visual Correla/on for Interac/ve Root Cause Analysis VizSec 2013 October 14, 2013 Atlanta GA, USA Finding Anomalies in Time- Series using Visual Correla/on for Interac/ve Root Cause Analysis Florian Stoffel, Fabian Fischer, Daniel A. Keim Data Analysis and

More information

Cyber Security Through Visualization

Cyber Security Through Visualization Cyber Security Through Visualization Kwan-Liu Ma Department of Computer Science University of California at Davis Email: ma@cs.ucdavis.edu Networked computers are subject to attack, misuse, and abuse.

More information

Visualization of Host Behavior for Network Security

Visualization of Host Behavior for Network Security Visualization of Host Behavior for Network Security Florian Mansmann, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of

More information

Monitoring commercial cloud service providers

Monitoring commercial cloud service providers Monitoring commercial cloud service providers July Author: Lassi Kojo Supervisor: Stefan Lüders CERN openlab Summer Student Report Abstract There is a growing tendency by individuals to sign-up for public

More information

#!) * & /! $* - 01 $& -$ 2 1 $& -# 32# $- - + $- -*!45 $-

#!) * & /! $* - 01 $& -$ 2 1 $& -# 32# $- - + $- -*!45 $- ! Version Date Status Owner 1.0 2009-11-09 Released 1.1 2010-01-05 Hints for Fax added Provider hints and new layout 1.2 2010-12-17 Additional hints and corrections 1.3 2011-05-19 Updates for new STUN

More information

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved.

1 Copyright 2011, Oracle and/or its affiliates. All rights reserved. 1 Copyright 2011, Oracle and/or its affiliates. All rights Building Visually Appealing Web 2.0 Data Dashboards Frank Nimphius Senior Principal Product Manager, Oracle 2 Copyright 2011, Oracle and/or its

More information

TOP New Features of Oracle Business Intelligence 11g

TOP New Features of Oracle Business Intelligence 11g 10 TOP New Features of Oracle Business Intelligence 11g TABLE OF CONTENTS Feature 1 New Chart Choices Funnel Chart 2 Trellis Chart 3 Waterfall 4 Tile Diagram 5 Feature 2 Recommended Visualization 6 Feature

More information

Product Comparison List

Product Comparison List Product Comparison List Data Center Size Site Solution / Feature

More information

Border Gateway Protocol (BGP)

Border Gateway Protocol (BGP) Border Gateway Protocol (BGP) Petr Grygárek rek 1 Role of Autonomous Systems on the Internet 2 Autonomous systems Not possible to maintain complete Internet topology information on all routers big database,

More information

Hierarchy and Tree Visualization

Hierarchy and Tree Visualization Hierarchy and Tree Visualization Definition Hierarchies An ordering of groups in which larger groups encompass sets of smaller groups. Data repository in which cases are related to subcases Hierarchical

More information

Visualization of Software Metrics Marlena Compton Software Metrics SWE 6763 April 22, 2009

Visualization of Software Metrics Marlena Compton Software Metrics SWE 6763 April 22, 2009 Visualization of Software Metrics Marlena Compton Software Metrics SWE 6763 April 22, 2009 Abstract Visualizations are increasingly used to assess the quality of source code. One of the most well developed

More information

Agenda. TreeMaps. What is a Treemap? Basics

Agenda. TreeMaps. What is a Treemap? Basics Agenda TreeMaps What is a Treemap? Treemap Basics Original Treemap Algorithm (Slice-and-dice layout) Issues for Treemaps Cushion Treemaps Squarified Treemaps Ordered Treemaps Quantum Treemaps Other Treemaps

More information

Polycom. RealPresence Ready Firewall Traversal Tips

Polycom. RealPresence Ready Firewall Traversal Tips Polycom RealPresence Ready Firewall Traversal Tips Firewall Traversal Summary In order for your system to communicate with end points in other sites or with your customers the network firewall in all you

More information

Interdomain Routing. Project Report

Interdomain Routing. Project Report Interdomain Routing Project Report Network Infrastructure improvement proposal To Company A Team 4: Zhang Li Bin Yang Md. Safiqul Islam Saurabh Arora Network Infrastructure Improvement Interdomain routing

More information

Inter-domain Routing. Outline. Border Gateway Protocol

Inter-domain Routing. Outline. Border Gateway Protocol Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small

More information

We Are HERE! Subne\ng

We Are HERE! Subne\ng TELE 302 Network Design Lecture 21 Addressing Strategies Source: McCabe 12.1 ~ 12.4 Jeremiah Deng TELE Programme, University of Otago, 2013 We Are HERE! Requirements analysis Flow Analysis Logical Design

More information

SAS VISUAL ANALYTICS AN OVERVIEW OF POWERFUL DISCOVERY, ANALYSIS AND REPORTING

SAS VISUAL ANALYTICS AN OVERVIEW OF POWERFUL DISCOVERY, ANALYSIS AND REPORTING SAS VISUAL ANALYTICS AN OVERVIEW OF POWERFUL DISCOVERY, ANALYSIS AND REPORTING WELCOME TO SAS VISUAL ANALYTICS SAS Visual Analytics is a high-performance, in-memory solution for exploring massive amounts

More information

Customizing LANsurveyor Maps

Customizing LANsurveyor Maps Customizing LANsurveyor Maps Revised 2/15/2008 Introduction...1 Customizing Large Network Maps...1 Selecting Mapped Devices...1 Changing the Map Zoom Percentage...2 Customizing Map Properties...2 Using

More information

SAP BO 4.1 COURSE CONTENT

SAP BO 4.1 COURSE CONTENT Data warehousing/dimensional modeling/ SAP BW 7.0 Concepts 1. OLTP vs. OLAP 2. Types of OLAP 3. Multi Dimensional Modeling Of SAP BW 7.0 4. SAP BW 7.0 Cubes, DSO s,multi Providers, Infosets 5. Business

More information

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing

Routing Protocols. Interconnected ASes. Hierarchical Routing. Hierarchical Routing Routing Protocols scale: with 200 million destinations: can t store all dest s in routing tables! routing table exchange would swamp links! Hierarchical Routing Our routing study thus far - idealization

More information

Situational Awareness Through Network Visualization

Situational Awareness Through Network Visualization CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction

More information

Security threats and network. Software firewall. Hardware firewall. Firewalls

Security threats and network. Software firewall. Hardware firewall. Firewalls Security threats and network As we have already discussed, many serious security threats come from the networks; Firewalls The firewalls implement hardware or software solutions based on the control of

More information

Visualization of Host Behavior for Network Security

Visualization of Host Behavior for Network Security Visualization of Host Behavior for Network Security Florian Mansman, Lorenz Meier, and Daniel A. Keim Abstract Monitoring host behavior in a network is one of the most essential tasks in the fields of

More information

WhatsUp Gold v16.1 Wireless User Guide

WhatsUp Gold v16.1 Wireless User Guide WhatsUp Gold v16.1 Wireless User Guide Contents Welcome to WhatsUp Gold Wireless Wireless Overview... 3 Wireless licensing and accessibility... 5 Using WhatsUp Gold Wireless Discovering wireless devices...

More information

TIBCO Spotfire Network Analytics 1.1. User s Manual

TIBCO Spotfire Network Analytics 1.1. User s Manual TIBCO Spotfire Network Analytics 1.1 User s Manual Revision date: 26 January 2009 Important Information SOME TIBCO SOFTWARE EMBEDS OR BUNDLES OTHER TIBCO SOFTWARE. USE OF SUCH EMBEDDED OR BUNDLED TIBCO

More information

Oracle OLAP. Describing Data Validation Plug-in for Analytic Workspace Manager. Product Support

Oracle OLAP. Describing Data Validation Plug-in for Analytic Workspace Manager. Product Support Oracle OLAP Data Validation Plug-in for Analytic Workspace Manager User s Guide E18663-01 January 2011 Data Validation Plug-in for Analytic Workspace Manager provides tests to quickly find conditions in

More information

Visualizing Threats: Improved Cyber Security Through Network Visualization

Visualizing Threats: Improved Cyber Security Through Network Visualization Visualizing Threats: Improved Cyber Security Through Network Visualization Intended audience This white paper has been written for anyone interested in enhancing an organizational cyber security regime

More information

Risk Visualization: Presenting Data to Facilitate Better Risk Management

Risk Visualization: Presenting Data to Facilitate Better Risk Management Track 4: New Dimensions in Financial Risk Management Risk Visualization: Presenting Data to Facilitate Better Risk Management 1:30pm 2:20pm Presenter: Jeffrey Bohn Senior Managing Director, Head of Portfolio

More information

Is SIP Trunking on Your Horizon? Sue Bradshaw, Technology Writer

Is SIP Trunking on Your Horizon? Sue Bradshaw, Technology Writer White Paper Is SIP Trunking on Your Horizon? Sue Bradshaw, Technology Writer This white paper from Integrated Research discusses how understanding your call flows, PSTN trunk capacity and usage today will

More information

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager

DEPLOYMENT GUIDE Version 1.1. DNS Traffic Management using the BIG-IP Local Traffic Manager DEPLOYMENT GUIDE Version 1.1 DNS Traffic Management using the BIG-IP Local Traffic Manager Table of Contents Table of Contents Introducing DNS server traffic management with the BIG-IP LTM Prerequisites

More information

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks

CCNA R&S: Introduction to Networks. Chapter 9: Subnetting IP Networks CCNA R&S: Introduction to Networks Chapter 9: Subnetting IP Networks Frank Schneemann Chapter 9: Subnetting IP Networks Subnetting IP Networks In this chapter, you will be learning how devices can be grouped

More information

Passive Measurement in CSTNET

Passive Measurement in CSTNET Passive Measurement in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. Passive measurement systems introduction in CSTNET 2. Large - scale distributed traffic analysis system in IPv6 1, Passive measurement

More information

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know

WHITE PAPER. Understanding IP Addressing: Everything You Ever Wanted To Know WHITE PAPER Understanding IP Addressing: Everything You Ever Wanted To Know Understanding IP Addressing: Everything You Ever Wanted To Know CONTENTS Internet Scaling Problems 1 Classful IP Addressing 3

More information

Sara Florian 2009-11730

Sara Florian 2009-11730 Sara Florian 2009-11730 What is Plan Visualization? Why it is needed? How it is going to be implemented? Workflow Time line? Time line Overview Program Structure Conclusion Appendix: Time line implementation

More information

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR.

SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. SETTING UP REMOTE ACCESS ON EYEMAX PC BASED DVR. 1. Setting up your network to allow incoming connections on ports used by Eyemax system. Default ports used by Eyemax system are: range of ports 9091~9115

More information

SAS BI Dashboard 4.3. User's Guide. SAS Documentation

SAS BI Dashboard 4.3. User's Guide. SAS Documentation SAS BI Dashboard 4.3 User's Guide SAS Documentation The correct bibliographic citation for this manual is as follows: SAS Institute Inc. 2010. SAS BI Dashboard 4.3: User s Guide. Cary, NC: SAS Institute

More information

Figure 1: SPAM Filtering

Figure 1: SPAM Filtering Owner of the content within this article is www.isaserver.org Written by Marc Grote www.it-training-grote.de Configuring and using the E-Mail protection feature in Microsoft Forefront Threat Management

More information

HP Networking BGP and MPLS technology training

HP Networking BGP and MPLS technology training Course overview HP Networking BGP and MPLS technology training (HL046_00429577) The HP Networking BGP and MPLS technology training provides networking professionals the knowledge necessary for designing,

More information

Spotfire v6 New Features. TIBCO Spotfire Delta Training Jumpstart

Spotfire v6 New Features. TIBCO Spotfire Delta Training Jumpstart Spotfire v6 New Features TIBCO Spotfire Delta Training Jumpstart Map charts New map chart Layers control Navigation control Interaction mode control Scale Web map Creating a map chart Layers are added

More information

CalPlanning. Smart View Essbase Ad Hoc Analysis

CalPlanning. Smart View Essbase Ad Hoc Analysis 1 CalPlanning CalPlanning Smart View Essbase Ad Hoc Analysis Agenda Overview Introduction to Smart View & Essbase 4 Step Smart View Essbase Ad Hoc Analysis Approach 1. Plot Dimensions 2. Drill into Data

More information

Designing Reliable IP/MPLS Core Transport Networks

Designing Reliable IP/MPLS Core Transport Networks Designing Reliable IP/MPLS Core Transport Networks Matthias Ermel Workshop ITG FG 5.2.1 14. November 2008 München Content 1. Introduction 2. Protection Mechanisms 3. Failure Detection Page 1 Architecture

More information

Network Topology. White Paper

Network Topology. White Paper White Paper Network Topology JANUARY 2015 This document describes the benefits of Cisco Meraki s Network Topology technology and how you can use it to visualize and troubleshoot your network. In addition,

More information

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,

More information

What s New / 2011.1 Data Visualization. JASON BERES : VP, Product Management jasonb@infragistics.com / @jasonberes / @infragistics

What s New / 2011.1 Data Visualization. JASON BERES : VP, Product Management jasonb@infragistics.com / @jasonberes / @infragistics What s New / 2011.1 Data Visualization JASON BERES : VP, Product Management jasonb@infragistics.com / @jasonberes / @infragistics Agenda 1 / 2011.1 Packaging 2 / Core Investments 3 / Shared XAML Strategy

More information

Treemaps for Search-Tree Visualization

Treemaps for Search-Tree Visualization Treemaps for Search-Tree Visualization Rémi Coulom July, 2002 Abstract Large Alpha-Beta search trees generated by game-playing programs are hard to represent graphically. This paper describes how treemaps

More information

A Framework for Effective Alert Visualization. SecureWorks 11 Executive Park Dr Atlanta, GA 30329 {ubanerjee, jramsey}@secureworks.

A Framework for Effective Alert Visualization. SecureWorks 11 Executive Park Dr Atlanta, GA 30329 {ubanerjee, jramsey}@secureworks. A Framework for Effective Alert Visualization Uday Banerjee Jon Ramsey SecureWorks 11 Executive Park Dr Atlanta, GA 30329 {ubanerjee, jramsey}@secureworks.com Abstract Any organization/department that

More information

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project

BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,

More information

Data security in SAS OLAP cubes and reports

Data security in SAS OLAP cubes and reports Data security in SAS OLAP cubes and reports Dec 2012 Kalavgunta Hari Krishna Sai Chaitanya Praghathi Abirami Santhalingam Scenario» User should view its own data and its sub-ordinates data if available.»

More information

RAVEN, Network Security and Health for the Enterprise

RAVEN, Network Security and Health for the Enterprise RAVEN, Network Security and Health for the Enterprise The Promia RAVEN is a hardened Security Information and Event Management (SIEM) solution further providing network health, and interactive visualizations

More information

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks

Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Workshop on Infrastructure Security and Operational Challenges of Service Provider Networks Farnam Jahanian University of Michigan and Arbor Networks IFIP Working Group 10.4 June 29-30, 2006 What s the

More information

Simple Tips to Improve Drupal Performance: No Coding Required. By Erik Webb, Senior Technical Consultant, Acquia

Simple Tips to Improve Drupal Performance: No Coding Required. By Erik Webb, Senior Technical Consultant, Acquia Simple Tips to Improve Drupal Performance: No Coding Required By Erik Webb, Senior Technical Consultant, Acquia Table of Contents Introduction................................................ 3 Types of

More information

NNMi120 Network Node Manager i Software 9.x Essentials

NNMi120 Network Node Manager i Software 9.x Essentials NNMi120 Network Node Manager i Software 9.x Essentials Instructor-Led Training For versions 9.0 9.2 OVERVIEW This course is designed for those Network and/or System administrators tasked with the installation,

More information

BGP (Border Gateway Protocol)

BGP (Border Gateway Protocol) BGP (Border Gateway Protocol) Document revision 1.2 (Thu Mar 04 19:34:34 GMT 2004) This document applies to V2.8 Table of Contents Table of Contents General Information Summary Specifications Related Documents

More information

Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond

Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute

More information

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs

Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs Disaster Recovery Design Ehab Ashary University of Colorado at Colorado Springs As a head of the campus network department in the Deanship of Information Technology at King Abdulaziz University for more

More information

Voronoi Treemaps in D3

Voronoi Treemaps in D3 Voronoi Treemaps in D3 Peter Henry University of Washington phenry@gmail.com Paul Vines University of Washington paul.l.vines@gmail.com ABSTRACT Voronoi treemaps are an alternative to traditional rectangular

More information

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé

Embedded BGP Routing Monitoring. Th. Lévy O. Marcé Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective

More information

Components of Routing Table Growth

Components of Routing Table Growth Components of Routing Table Growth Harsha Narayan (U. of California, San Diego) Joint work with Ramesh Govindan (U. of Southern California) and George Varghese (U. of California, San Diego) 1 The Goal

More information

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o.

NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, milos.zekovic@soneco.rs. ICmyNet Chief Customer Officer Soneco d.o.o. NetFlow use cases ICmyNet / NetVizura, milos.zekovic@soneco.rs Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN

More information

IP Addressing. IP Addresses. Introductory material.

IP Addressing. IP Addresses. Introductory material. IP Addressing Introductory material. An entire module devoted to IP addresses. IP Addresses Structure of an IP address Classful IP addresses Limitations and problems with classful IP addresses Subnetting

More information

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS

CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS CHAPTER 4 PERFORMANCE ANALYSIS OF CDN IN ACADEMICS The web content providers sharing the content over the Internet during the past did not bother about the users, especially in terms of response time,

More information

BIG DATA VISUALIZATION. Team Impossible Peter Vilim, Sruthi Mayuram Krithivasan, Matt Burrough, and Ismini Lourentzou

BIG DATA VISUALIZATION. Team Impossible Peter Vilim, Sruthi Mayuram Krithivasan, Matt Burrough, and Ismini Lourentzou BIG DATA VISUALIZATION Team Impossible Peter Vilim, Sruthi Mayuram Krithivasan, Matt Burrough, and Ismini Lourentzou Let s begin with a story Let s explore Yahoo s data! Dora the Data Explorer has a new

More information

Based on Computer Networking, 4 th Edition by Kurose and Ross

Based on Computer Networking, 4 th Edition by Kurose and Ross Computer Networks Internet Routing Based on Computer Networking, 4 th Edition by Kurose and Ross Intra-AS Routing Also known as Interior Gateway Protocols (IGP) Most common Intra-AS routing protocols:

More information

LiveAction: GUI-Based Management and Visualization for Cisco Intelligent WAN

LiveAction: GUI-Based Management and Visualization for Cisco Intelligent WAN Solution Overview LiveAction: GUI-Based Management and Visualization for Cisco Intelligent WAN Overview Cisco Intelligent WAN (IWAN) delivers an uncompromised user experience over any connection, whether

More information

Experimentation driven traffic monitoring and engineering research

Experimentation driven traffic monitoring and engineering research Experimentation driven traffic monitoring and engineering research Amir KRIFA (Amir.Krifa@sophia.inria.fr) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering

More information

Graph Drawing for Security Visualization

Graph Drawing for Security Visualization Graph Drawing for Security Visualization Roberto Tamassia 1, Bernardo Palazzi 1,2,3, and Charalampos Papamanthou 1 1 Brown University, Department of Computer Science, Providence, RI, USA {rt,bernardo,cpap}@cs.brown.edu

More information

Reporting and Analysis with SAP BusinessObjects

Reporting and Analysis with SAP BusinessObjects Ingo Hilgefort Reporting and Analysis with SAP BusinessObjects Bonn Boston Contents at a Glance 1 Introduction to the SAP BusinessObjects Reporting and Analysis Tools... 19 2 Customer Requirements and

More information

Global IP Network Mobility

Global IP Network Mobility Brian L. Skeen brian.l.skeen@boeing.com Global IP Network Mobility using Border Gateway Protocol (BGP) BGP Network Mobility Connexion Service Summary Current IP Mobility standards Network and Service Challenges

More information

OverFlow: An Overview Visualization for Network Analysis

OverFlow: An Overview Visualization for Network Analysis OverFlow: An Overview Visualization for Network Analysis Joel Glanfield glanfield@cs.dal.ca Stephen Brooks sbrooks@cs.dal.ca Teryl Taylor teryl@cs.dal.ca Diana Paterson paterson@cs.dal.ca Christopher Smith

More information

Visual Analysis of Complex Firewall Configurations

Visual Analysis of Complex Firewall Configurations Visual Analysis of Complex Firewall Configurations Florian Mansmann University of Konstanz Florian.Mansmann@unikonstanz.de Timo Göbel University of Konstanz timo.goebel@timogoebel.eu William Cheswick ches@cheswick.com

More information

Fax. Problems with Fax Delivery to Users CHAPTER

Fax. Problems with Fax Delivery to Users CHAPTER CHAPTER 4 See the following sections: Problems with Delivery to Users, page 4-1 Problems with Delivery to a Machine, page 4-3 Problems with Notifications, page 4-5 Problems with Receipts, page 4-5 Problems

More information

SolarEdge Site Mapping Tool Software Guide

SolarEdge Site Mapping Tool Software Guide 1 2 Important Notice Copyright 2011 SolarEdge Inc. All rights reserved. No part of this document may be reproduced, stored in a retrieval system or transmitted, in any form or by any means, electronic,

More information

Weighted Maps: treemap visualization of geolocated quantitative data

Weighted Maps: treemap visualization of geolocated quantitative data Weighted Maps: treemap visualization of geolocated quantitative data Mohammad Ghoniem a and Maël Cornil a and Bertjan Broeksema a and Mickaël Stefas a and Benoît Otjacques a a CRP Gabriel Lippmann, 41

More information

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0

Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Avaya Solution & Interoperability Test Lab Application Notes for Avaya IP Office 7.0 Integration with Skype Connect R2.0 Issue 1.0 Abstract These Application Notes describe the steps to configure an Avaya

More information

BGP: Border Gateway Protocol

BGP: Border Gateway Protocol LAB 8 BGP: Border Gateway Protocol An Interdomain Routing Protocol OBJECTIVES The objective of this lab is to simulate and study the basic features of an interdomain routing protocol called Border Gateway

More information

Network Security: From Firewalls to Internet Critters Some Issues for Discussion

Network Security: From Firewalls to Internet Critters Some Issues for Discussion Network Security: From Firewalls to Internet Critters Some Issues for Discussion Slide 1 Presentation Contents!Firewalls!Viruses!Worms and Trojan Horses!Securing Information Servers Slide 2 Section 1:

More information

Doing Don ts: Modifying BGP Attributes within an Autonomous System

Doing Don ts: Modifying BGP Attributes within an Autonomous System Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium

More information

Lecture 23: Firewalls

Lecture 23: Firewalls Lecture 23: Firewalls Introduce several types of firewalls Discuss their advantages and disadvantages Compare their performances Demonstrate their applications C. Ding -- COMP581 -- L23 What is a Digital

More information

Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining

Data Mining: Exploring Data. Lecture Notes for Chapter 3. Introduction to Data Mining Data Mining: Exploring Data Lecture Notes for Chapter 3 Introduction to Data Mining by Tan, Steinbach, Kumar Tan,Steinbach, Kumar Introduction to Data Mining 8/05/2005 1 What is data exploration? A preliminary

More information

Dynamics of Prefix Usage at an Edge Router

Dynamics of Prefix Usage at an Edge Router Dynamics of Prefix Usage at an Edge Router Kaustubh Gadkari, Daniel Massey, and Christos Papadopoulos Computer Science Department, Colorado State University, USA {kaustubh, massey, christos@cs.colostate.edu}

More information

Regular TreeMap Layouts for Visual Analysis of Hierarchical Data

Regular TreeMap Layouts for Visual Analysis of Hierarchical Data Regular TreeMap Layouts for Visual Analysis of Hierarchical Data Tobias Schreck Daniel Keim Florian Mansmann Databases and Visualization Group University of Konstanz, Germany {schreck,keim,mansmann}@inf.uni-konstanz.de

More information

Challenge 10 - Attack Visualization The Honeynet Project / Forensic Challenge 2011 / 2011-12-18

Challenge 10 - Attack Visualization The Honeynet Project / Forensic Challenge 2011 / 2011-12-18 Challenge 10 - Attack Visualization The Honeynet Project / Forensic Challenge 2011 / 2011-12-18 Fabian Fischer Data Analysis and Visualization Group University of Konstanz Data Preprocessing with & I wanted

More information

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004

SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 SFWR ENG 4C03 Class Project Firewall Design Principals Arash Kamyab 9940313 March 04, 2004 Introduction: A computer firewall protects computer networks from unwanted intrusions which could compromise confidentiality

More information

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics

CSC458 Lecture 6. Homework #1 Grades. Inter-domain Routing IP Addressing. Administrivia. Midterm will Cover Following Topics CSC458 Lecture 6 Inter-domain Routing IP Addressing Stefan Saroiu http://www.cs.toronto.edu/syslab/courses/csc458 University of Toronto at Mississauga Homework #1 Grades Fraction of Students 100 80 60

More information

Internetworking and Internet-1. Global Addresses

Internetworking and Internet-1. Global Addresses Internetworking and Internet Global Addresses IP servcie model has two parts Datagram (connectionless) packet delivery model Global addressing scheme awaytoidentifyall H in the internetwork Properties

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

Introduction to Routing

Introduction to Routing Introduction to Routing How traffic flows on the Internet Philip Smith pfs@cisco.com RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,

More information

Troubleshooting Network Performance with Alpine

Troubleshooting Network Performance with Alpine Troubleshooting Network Performance with Alpine Jeffrey Papen As a Network Engineer, I am often annoyed by slow Internet performance caused by network issues like congestion, fiber cuts, and packet loss.

More information

BGP. 1. Internet Routing

BGP. 1. Internet Routing BGP 1. Internet Routing (C) Herbert Haas 2005/03/11 1 Internet Routing Interior Gateway Protocols (IGPs) not suitable for Inter-ISP routing Technical metrics only No policy features Inter-ISP routing is

More information