Classification Based IP Geolocation Approach to Locate Data in the Cloud Datacenters

Size: px
Start display at page:

Download "Classification Based IP Geolocation Approach to Locate Data in the Cloud Datacenters"

Transcription

1 Classification Based IP Geolocation Approach to Locate Data in the Cloud Datacenters Biswajit Biswal College of Engineering Tennessee State University, Nashville, TN, USA Sachin Shetty College of Engineering Tennessee State University, Nashville, TN, USA Tamara Rogers Computer Science Tennessee State University, Nashville, TN, USA ABSTRACT Cloud subscribers would like to verify the location of outsourced data in the cloud datacenters to ensure that the availability of data satisfies the Service Level Agreement. Cloud users may not have access to their outsourced data in the event of operational failures in datacenters or occurrence of natural disasters and/or power outages. Recently, IP geolocation techniques have been proposed to locate data files in cloud datacenters. However these techniques exploit relationships between Internet delays and distance and are not extensible to incorporate different network measurements, which may be used along with Internet delay to improve accuracy. Also, most of the existing techniques have only been validated with one cloud provider (Amazon Web Services). In this paper, we propose a classification based IP geolocation algorithm, which incorporates multiple network measurements to improve the accuracy of geolocating data files in datacenters in four commercial cloud providers. To demonstrate the accuracy of our approach, we evaluate the performance on Amazon Web Services, Microsoft Azure, Google App Engine and Rackspace. Our experimental results demonstrate that our approach is geolocating data files accurately and more closely to the true location. I INTRODUCTION Cloud data owners wish to audit how their data is being handled at the cloud and, in particular, ensure that their data is available all the time without being affected by cloud outage. There is no such formal auditing tool available to cloud users to verify the location of data in cloud data centers. Recently, there have been numerous instances wherein cloud outage rendered business services inaccessible to cloud users for a significant period of time. For instance, on Dec 24, 22, Netflix services, hosted on Amazon Web Services (AWS), were unavailable to customers for more than 2 hours [4]. Similar data outages were reported by Dropbox users [5] and Xbox live users [6]. Cloud users files on Dropbox are stored on Amazon s Simple Storage Service (S3) in multiple data centers located across the United States. Xbox live users data and saved games are accessible through Windows Azure storage service. Hence, there is a increasing interest among cloud users for an auditing tool to geolocate cloud data to ascertain the availability of outsourced data. Typically, cloud users specify the QoS requirements of their outsourced data in a Service Level Agreement (SLA). In addition to common QoS requirements (bandwidth, delay, etc), cloud SLA also specify the geographic region of a service at various granularities (county, city, state, country). Cloud users can benefit from an auditing tool which can ensure that the location restrictions on the services are not violated. Availability of outsourced data is one of the critical QoS requirements. The auditing tool can verify if the availability of data is in accordance with the SLA, especially in situations like natural disasters and /or power outages and more over most of the cloud datacenters located in cities which are most vulnerable to natural disasters. The availability can be verified by geolocating cloud user data in datacenters. Recently, few efforts have been proposed for geolocation of cloud data. Gondree et al. [4] proposed the constraint-based data geolocation(cbdg) approach to geolocate data hosted on Amazon S3. Benson et al. [] developed a model to verify how many copies of their data are present in cloud datacenters. CBDG extends CBG geolocation technique, whose average accuracy is less as compared to Enhanced Classifier approach [2]. Benson s model does not focus on geolocating data on multiple cloud datacenters and has been verified on only one service on AWS. In this paper, we present an approach based on a machine learning framework, which improves the average accuracy of geolocating datacenters as compared to prior measurement-based approaches. We verify the accuracy of the approach by evaluating the geolocation results of cloud user data for multiple services in datacenters across multiple commercial ASE 24 ISBN:

2 cloud providers. We extend our enhanced classifier [2] called Classification Based IP Geolocation (CBIG) to geolocate Internet nodes to geolocate cloud data. To the best of our knowledge, this is the first effort to verify the location of cloud data for storage and web services on multiple cloud datacenters: AWS [6], Microsoft Azure [7], Rackspace [9] and Google AppEngine [8]. learning Naive Bayes framework to geolocate internet hosts. All the delay-based geolocation schemes assume that network delay is well correlated with geographic distance but this assumption is voilated when network traffic takes indirect route between hosts. This results low accuracy. Improved accuracy is obtained by combining delay with other network measurements. The rest of the paper is organized as follows. In Section II we provide an overview of the state-of-the-art Recent reported instances of cloud outages affecting availability of cloud services have increased the interest active cloud data geolocation schemes. In Section III in cloud data file geolocation. For example, we present our approach based on the CBIG. In Section IV we present the experimental setup. In Section V, experimental results of verifying our approach on in the past year, there have been instances when cloud users were not able to access services offered by online movie streaming provider Netflix and storage multiple cloud datacenters is presented. We finally provider DropBox. Similar outages have been conclude in Section VI. reported by several small and large scale businesses who use the cloud to offer services to customers for their business and were compensated by the cloud II BACKGROUND AND RELATED WORK providers. K.Benson et al. [] proposed a method to verify how many copies of data files are stored in Several geolocation schemes have studied for finding various geographic granularity such as latitude tive linear relationship between latency and the dis- the cloud. They mentioned that there exists a posi- and longitude, street address, zipcode and city or tance from a computer node to the location of the county of a given IP address. IP geolocation have actual datacenter whereas no positive linear relationship exists with other locations. In their model, Plan- approached through either Database query (passive method) or active network measuments to geolocate etlab [5] nodes are forced to download data from IP addresses. There are available public database a particular cloud datacenter located in a city by such as ARIN [24] and proprietary databases such as changing the DNS server of that city on all PlanetLab nodes. Their prediction of storage is best if Maxmind [25] and Neustar(formerly Quova) [26]. Informations obtained from database query sometime distances between PlanetLab nodes and cloud datacenters are under 5km (32.5 mi). However, to are not to our expectation and may be not suitable for security-sensitive applications. detect the new location of data the distance should Active network measurements have adapted in many research geolocation algorithms. Topology based geolocation scheme proposed by E.Katz-Bassett et al. implements traceroute measurements (i.e. hops and RTT between hops along the path to the destination). The accuracy of the solution is not reliable due to network dynamics. More accurate and real time delaybased geolocation algorithms are studied for geolocation such as CBG, Statistical and Learning-based. CBG [2] uses known landmarks to measure latency to a target, a bestline method for conversion of latency to distance and multilateration technique to geolocate the target. However, CBG has geolocation errors when monitoring landmarks are far from target. Also this method fails to consider the statistical variations in network delay measurements. Statistical geolocation [2] employs a joint probability desnsity function of network latency and geographic distance to geolocate target. Learning-base [3] uses network delay and hop measurements as input to a machine be more than 3km between Planetlab nodes and data origin. Their focus is to find diversity rather exact locations of the data. M.Gondree et al. [4] proposed a framework based on Constrained-based Geolocation(CBG) algorithm to geolocate cloud data storage. Their framework uses a combination of latency-based geolocation technique and probabilistic proof of data possession(pdp) scheme, with an average error distance of 626km. Unfortunately, the IP geolocation algorithms reported in the literature have larger average error distances as compared to CBIG approach [2]. Albeshri et al. [] proposed GeoProof, a method for geolocation assurance. GeoProof combines the proof of storage (POS) scheme and distance-bounding protocol []. In their architecture, to geolocate data a GPS enabled device is placed at provider to access position information but the idea is not feasible enough when data moves and also position information can be easily manipulated. Moreover this scheme was evaluated on a ASE 24 ISBN:

3 university network rather than a real world cloud environment. Watson et al. [2] presented the Location Based Storage (LoST) to geolocate the location of files in cloud. Their method includes a geolocation scheme and proof of location scheme. The geolocation scheme is combination of a time-distance function which translates times to distance using best-fit lines and geometric trilateration. The average geolocation error distance, however, is km. None of the papers discussed above mention geolocating other web services rather than Amazon S3. Most of the papers have geolocated results on Amazon S3 only and never experimented their geolocation scheme with other cloud providers. Paladi et al. [9] presented a survey of IP geolocation techniques used for locating cloud storage nodes. Measurement-based and topology based IP geolocation algorithm have been proposed to geolocate Internet nodes [2 23]. III APPROACH We extend our CBIG approach [2] to geolocate data files in cloud datacenters for various cloud services. CBIG approach trains a Naive Bayes classifier by using network measurements as features to geolocate Internet nodes. We extend this approach by evaluating the accuracy of the classifier on network measurements (average delay, standard deviation delay, mean & median delay, hop count) and societal characteristics (population density) features collected between cloud users (PlanetLab nodes) and data centers from four commercial cloud providers. Fig. illustrates the system model. The system model describes the process of how cloud users access various services in multiple datacenters managed by cloud providers. Each cloud user uses their accounts with multiple providers to upload data and access available services. In our system model, we have restricted the services to storage and content delivery network (CDN). PlanetLab nodes, distributed across multiple locations in United States, act as landmarks and are involved in the collection of network measurements. To geolocate storage service, network measurements between PlanetLab nodes and cloud storage datacenters are collected. To geolocate CDN service, network measurements between PlanetLab nodes and cloud CDN servers are collected. The CBIG model is trained and tested with the network measurement data. The classifier s predicted city output is compared with the true cloud datacenter location and error distance is calculated to verify the accuracy. We now present an overview of the CBIG and the extension of the approach to geolocate data files in cloud datacenters. OVERVIEW OF CLASSIFICATION BASED IP GEOLOCATION CBIG approach adopts a machine learning based technique by training a model using network measurements and societal characteristic features. The network measurements are collected between landmark and target nodes. The landmark nodes are selected PlanetLab computers in the United States. The target nodes are Internet routers discovered by conducting a mesh traceroute between groups of PlanetLab computers. The CBIG employs a Naive Bayes framework to convert network measurements between the landmark and target nodes to distances. Let the network measurements from landmarks to single target be set M = {m, m 2,..., m j }, where m j = {m jk } and k =, 2, 3, 4, 5, 6 (where the total number of measurements to the target IP address is given by M = 6j). A set of non-negative estimation weights {λ k } is introduced for each feature to reflect the importance and contribution of that feature in the overall classification process [3]. Another set of estimation weights {γ k } is introduced to order the landmarks. A landmark with the smallest feature measurement values weighs most and informs the classifier more accurately than a landmark with the largest values. The weight parameter values will be chosen by the least squares parameter estimation method. The method minimized the sum of squared distance errors between the training set of IP addresses known locations and the estimated locations. Using Naive Bayes framework, the CBIG estimates the county (ĉ) of the target IP addresses as: λ k j= ĉ = arg max( c C 5 k= J exp( j.γ k )log p(m jk ) + λ 6 log p(c)) where J is the total number of measurements from landmarks to the target IP. 2 CBIG TO GEOLOCATE CLOUD USER DATA IN DATA CENTERS We present the implementation of the CBIG approach to geolocate cloud user data ASE 24 ISBN:

4 24 ASE BIGDATA/SOCIALCOM/CYBERSECURITY Conference, Stanford University, May 27-3, 24 Figure : Experimental setup Setup Cloud User Accounts: Multiple cloud user accounts were setup for two categories of services (storage and web services) in four cloud providers (AWS, Google AppEngine, Rackspace and Microsoft Azure). The storage service on each account allowed use to upload user data files of various sizes. Similarly, the web services allowed hosting web pages on each of the four accounts. Cloud Users: Automated scripts were setup on PlanetLab nodes in various cities in the United States were selected to download web pages and user data files from the four cloud providers. The scripts were setup to mimic the activity of cloud users who wish to access the two cloud services from each of the four cloud provider accounts.the scripts accessed the cloud services at random points in time throughout each day for 2 months. Landmark nodes: PlanetLab servers will be chosen to serve as landmark nodes. We have chosen responsive PlanetLab nodes since the landmark nodes need to be stationary and reachable from each other. Cloud Users to Datacenter Network Measurements: Network measurements between clouser users and cloud datacenters will be generated when each cloud user downloads web pages or user data files while accessing either of the two ASE 24 cloud services. As the cloud user accesses the cloud services, we record the Internet protocol (IP) addresses, average latency and hop count. The IP address changes on every subsequent download request from the cloud user. Landmark nodes to Datacenter Measurements: The IP addresses of datacenters collected from the download activities of cloud users were used to generate similar network measurements are collected between landmark nodes and datacenters. Training dataset: We identify the network characteristic features (average, standard deviation, median and mode of network delay and hop count) and societal characteristic feature (population density) from the MaxMind database. The training dataset is extracted from network measurements between landmark nodes and Internet routers which were discovered by performing a full mesh traceroute between groups of PlanetLab nodes in United States. As the location of the Internet routers encompass all the cities where data centers for the cloud providers reside, our training dataset will be sufficient to estimate the location of user data in cloud datacenter. Classifier Training: CBIG approach based on the Naive Bayes framework is implemented as described in and the classifier is trained using ISBN:

5 IV the training set generated in the previous step. Classifier Evaluation: Finally, we evaluate the accuracy of the classifier by using a 5-Fold Cross Validation approach. EXPERIMENTAL SETUP To assess the accuracy of the CBIG approach, we evaluate the classifier on a real-world environment involving commercial cloud providers such as Amazon Web Services [6], Microsoft Azure [7], Google App Engine [8] and Rackspace [9]) and PlanetLab [5]. In our experiments, we only considered CDN services on AWS and Azure and storage services on AWS, Rackspace, and Google AppEngine. CLOUD SERVICE PROVIDERS by repeatedly downloading data files from cloud datacenter. For example, one of the website URLs provided by Amazon CDN service was d36j3gdmlvl6k. cloudfront.net. Every web page download from the website resulted in a different IP address associated with the URL. Datacenter location information can be obtained by ICMP echo (Ping) requests to datacenter IP. The ICMP reply message includes datacenter location (i.e. server name) information. The data center location information contains the city airport code where it is located. For instance, a reply from Microsoft Azure has server name cds9.iad9.msecn.net ( ), iad airport is in Dulles, Virginia and another from Amazon AWS has server jfk6.r.cloudfront.net ( ), jfk is in New York, NY. We employed not only domain name resolution to verify the location information is correct [] but also checked if the provider has a datacenter the same city. Cloud users have several commercial cloud providers to choose from depending on the type of service. In our experimental setup, we chose four popular commercial cloud providers: Amazon Web Services, Rackspace, Google App Engine and Microsoft Azure. To emulate various cloud services, we created cloud data stores on each of the cloud providers and uploaded different size of data files and used content delivery network to host data over the internet. 2 LANDMARK NODES To evaluate the accuracy of our approach from geographically disparate and diverse locations, we download cloud data files from reliable and suitable landmarks. We chose the landmark nodes from Planet- Lab, a group of computers available at different parts of world for computer networking and distributed systems research. PlanetLab is a live test-bed and currently has 72 nodes available worldwide [6]. There are 45 PlanetLab nodes available in the United States. Out of the 45 nodes, we used 9 alive and responsive nodes for landmarks. We tested the alive and responsiveness of the landmarks based on ICMP echo responses. 3 CLOUD DATACENTER IP DISCOVERY Datacenter IP addresses are critical to our approach because all network measurements (i.e. used as features) are carried between PlanetLab nodes and datacenter IPs. We gather unique datacenter IP addresses 4 GENERATING TRAINING DATASET To generate the training dataset, we collect instantaneous delay and hop count measurements from each of the 23,843 routers to the 67 landmarks [2]. For the instantaneous delay data, we send 4 ICMP echo request from each landmark to all the routers. Based on the instantaneous delay measurements, we calculate the average, standard deviation, mode and median of delay for each router from each landmark, which results in 67 23, = 6, 389, 924 measurements. Using traceroute to collect hop count measurements causes excessive overhead on the core routers. To avoid this overhead we send a single ICMP echo request from each landmark to all targets. We then use this request to calculate the hop count of the reverse path [3, 8]. V EXPERIMENTAL RESULTS The trained CBIG was evaluated by test datasets generated with measurements obtained from different cloud providers. Prior knowledge of datacenter location helps to verify more accurately the predicted location of the test cloud datacenter from where a test dataset (network measurements) is obtained. To show our model s flexibility, we extend our verification process to two cloud services, such as storage and content delivery network (CDN). ASE 24 ISBN:

6 ,Std,Hop ,Std,Hop (a) (b) Figure 2: Geolocation accuracy of cloud CDN Servers. (a) Amazon Web Services and (b) Microsoft Azure ,Std,Hop ,Std,Hop (a) (b) (c),std,hop Figure 3: Geolocation accuracy of cloud Storage. (a) Amazon S3, (b) Rackspace and (c) AppEngine GEOLOCATING CLOUD CDN SERVERS Content Delivery (CDN) servers are usually large distributed infrastructure deployed in multiple cloud datacenters. Cloud content delivery networks such as Amazon s CloudFront and Azure s CDN are used to distribute content (data) across internet. In cloud CDN service, client s data gets distributed across the servers in the cloud network. As the location of these servers spans the world, there is a possibility of cloud users data being stored in cities which are more prone to natural disasters and power outages. Fig. 2 illustrates the cumulative distribution of the error distance. Cumulative distribution function (CDF) is used to map values to their percentile rank in a distribution. For each IP address, an error distance between the predicted location and actual location is calculated using haversine distance formula [7] (latitude and longitude of datacenter locations are used as input in the haversine formula). Based on error distance of each IP address, these are sorted first and then assigned with cumulative probability values. Table shows the impact of combination of features on classification accuracy for Amazon AWS and Microsoft Azure. It is clear that combination of features ASE 24 ISBN:

7 Cloud Service Provider Table : Classification Accuracy IP Addresses Ave Ave Std Hop Amazon Web 35 6% 75% Services Microsoft Azure 43, 63% 85% Figure 4: Distribution of PlanetLab Nodes in USA such as average () delay, standard deviation (Std) delay and hop count (Hop) has more classification significance over feature Average () alone. For Amazon AWS, out of 35 IP addresses, 6% of IPs reported less than 2 miles error distance only with one feature (average delay) and 75% of IPs reported less than 2 miles error distance with combination of three features (average, standard deviation delay and hop count). For Microsoft Azure, out of 43, IP addresses, 63% of IPs reported less than 2 miles error distance only with one feature (average delay) and 85% of IPs reported less than 2 miles error distance with combination of three features (average, standard deviation delay and hop count). 2 GEOLOCATING CLOUD STORAGES Online storage providers like Dropbox, SkyDrive and Google Drive use cloud storage to store files. To geolocate cloud storages we have considered Amazon S3, Rackspace and Google App Engine. In the verification process of cloud storages, for each cloud provider s storage IP address, the error distance is calculated between the predicted datacenter location and nearest datacenter of that cloud provider using haversine distance formula [7]. The total number of Table 2: IP Geolocation errors Average Error (mi) AWS Ashburn, VA New York, NY Dallas, TX Miami, FL 264 Jacksonville, FL 5 Los Angeles, CA 9 San Jose, CA 2 Newark, NJ Palo Alto, CA 64 Seattle, WA 669 Rackspace Grapevine, TX Ashburn, VA Chicago, IL 5 Azure Los Angelees, CA Fairfax, VA San Antonio, TX 63 Chicago, TX 9 Ap- Google pengine Cloud Provider Datacenter Location Lenoir, NC 38 Douglas County, GA Mayes County, OK 4 The Dalles, OR 23 Council Bluffs, IA 375 storage IPs verified for Amazon S3 is 9, Rackspace is 9 and Google App Engine is 7. Fig. 3 compares the geolocation accuracy for Amazon S3, Rackspace and Google App Engine respectively. 3 GEOLOCATION ACCURACY OF CLOUD DATACENTER CITIES Fig. 4 shows the distribution of PlanetLab nodes in United States (source /image/-s2.-s gr5.jpg). To show the impact of PlanetLab nodes distribution on the accuracy of datacenter geolocation, we present the geolocation of cloud datacenters at the city level granularity. Table 2 presents the average error distance across different cloud datacenter cities. Rich concentration of PlanetLab nodes in cities produce low error distance when compare to cities with very few PlanetLab nodes. ASE 24 ISBN:

8 VI CONCLUSION We presented CBIG, a classification based IP Geolocation approach to locate cloud user data in cloud data centers to verify availability. CBIG is based on a Naive Bayes machine learning framework and utilizes six features from network measurements and societal characteristic. CBIG appears promising in geolocating datacenters for the four commercial cloud providers. The experimental evaluations demonstrate that high classification accuracy is obtained by utilizing only three features (average delay, standard deviation delay and hop count). The remaining three features do not pose a significant increase in geolocation accuracy. For future work, we would like to investigate in features which can further improve the geolocation accuracy. We also plan to enhance CBIG to detect violation of location restrictions in SLA. In this paper, we presented an approach to accurately geolocate cloud datacenters on the base of city level granularity. The approach assumes that the network measurements are not tampered or maninpulated and the experiments were only conducted on available cloud datacenters located in United States. For future work, we will evaluate the accuracy of the proposed approach geolocate cloud data centers in presence of network measurements which have been deliberately modified by adversaries external or internal to the cloud provider. ACKNOWLEDGMENT This work was partially supported by National Science Foundation (NSF) Grant HRD-37466, NSF HBCU-UP Targeted Infusion Grant HRD-37544, AFOSR grant FA , Department of Homeland Security(DHS) SLA grant 2-ST-62-4, 2-ST It is also based upon work supported by the AFRL/RI Information Institute VFRP No. R7379. References [] K. Benson, R. Dowsley and H. Shacham, Do You Know Where Your Cloud Files Are?, In Proceedings of CCSW 2. ACM Press, Oct. 2. [2] H. Maziku, S. Shetty, K. Han and T. Rogers Enhancing the Classification Accuracy of IP Geolocation, MILITARY COMMUNICA- TIONS CONFERENCE, 22 - MILCOM 22. [3] B. Eriksson, P. Barford, J. Sommers, and R. Nowak, A learning-based approach for IP geolocation, Passive and Active Measurement Workshop, 2. [4] Gondree, Mark and Peterson, Zachary N.J., Geolocation of data in cloud, CODASPY 3 Proceedings of the third ACM conference on Data and application security and privacy, 23. [5] A. Bavier, M. Bowman, B. Chun, D. Culler, S. Karlin, S. Muir, L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak, Operating System Support for Planetary-Scale Network Services, in USENIX NSDI 4, March 24. [6] Amazon Web Services,Cloud Computing(AWS) [7] Microsoft Windows Azure [8] Google App Engine [9] Rackspace [] Albeshri, Aiiad Ahmad, Boyd, Colin, & Gonzalez Nieto, Juan M., Geoproof : proofs of geographic location for cloud computing environment, 3rd International Workshop on Security and Privacy in Cloud Computing (Part of the 32nd International Conference on Distributed Computing Systems Workshops (ICDCS 22). [] G. Hancke and M. Kuhn. A RFID distance bounding protocol. In IEEE/Create-Net SecureComm, pages IEEE Computer Society Press, 25. [2] Watson, Gaven J. and Safavi-Naini, Reihaneh and Alimomeni, Mohsen and Locasto, Michael E. and Narayan, Shivaramakrishnan, LoST: Location Based Geolocation, CCSW 2 Proceedings of the 22 ACM Workshop on Cloud computing security workshop. [3] U.S. Census Bureau [4] Online 24/amazon-aws-takes-down-netflix-onchristmas-eve/ [5] Online ASE 24 ISBN:

9 [6] Online to-refund-windows-azure-customers-hit-by-2- hour-outage-that-disrupted-xbox-live/ [7] Haversine Distance formula [8] H. Wang, C. Jin, and K. Shin, Defense against spoofed IP traffic using hop-count filtering, IEEE/ACM Transactions on Networking, 27. [9] N. Paladi, C. Gehrmann and F. Morenius, State of The Art and Hot Aspects in Cloud Data Storage Security, SICS technical report, March 23. [2] I. Youn, B. Mark, and D. Richards, Statistical geolocation of Internet hosts, International Conference on Computer Communications and Networks, 29. [2] B. Gueye, A. Zivian, M. Crovella, and S. Fdida, Constraint-based geolocation of Internet hosts, IEEE/ACM Transactions on Networking, 26. [22] S. Laki, P. Matray, P. Haga, T. Sebok, I. Csabai, G. Vattay, Spotter: a model based active geolocation service, IEEE INFOCOM, 2. [23] P. Gill, Y. Ganjali, B. Wong, and D. Lie, Dude, where s that IP? Circumventing measurementbased IP geolocation, USENIX Security Symposium, 2. [24] American Registry for Internet Numbers (ARIN) [25] MaxMind - IP Geolocation and Online Fraud Prevention [26] Neustar - IP Intelligence & IP Geolocation Service (formerly Quova) ASE 24 ISBN:

Do You Know Where Your Cloud Files Are?

Do You Know Where Your Cloud Files Are? Do You Know Where Your Cloud Files Are? Karyn Benson Rafael Dowsley Hovav Shacham Department of Computer Science and Engineering University of California, San Diego La Jolla, California, USA {kbenson,rdowsley,hovav}@cs.ucsd.edu

More information

Estimation of Internet Node Location by Latency Measurements The Underestimation Problem

Estimation of Internet Node Location by Latency Measurements The Underestimation Problem ISSN 1392 124X (print), ISSN 2335 884X (online) INFORMATION TECHNOLOGY AND CONTROL, 2015, T. 44, Nr. 3 Estimation of Internet Node Location by Latency Measurements The Underestimation Problem Dan Komosny

More information

A landmark calibration-based IP geolocation approach

A landmark calibration-based IP geolocation approach Chen et al. EURASIP Journal on Information Security (2016) 2016:4 DOI 10.1186/s13635-015-0029-5 RESEARCH A landmark calibration-based IP geolocation approach Jingning Chen 1,2, Fenlin Liu 1,2, Xiangyang

More information

Studying Black Holes on the Internet with Hubble

Studying Black Holes on the Internet with Hubble Studying Black Holes on the Internet with Hubble Ethan Katz-Bassett, Harsha V. Madhyastha, John P. John, Arvind Krishnamurthy, David Wetherall, Thomas Anderson University of Washington August 2008 This

More information

Massive Cloud Auditing using Data Mining on Hadoop

Massive Cloud Auditing using Data Mining on Hadoop Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed

More information

International Journal of Software and Web Sciences (IJSWS) www.iasir.net. Network Traffic Auditing and Assessment in Cloud Environment

International Journal of Software and Web Sciences (IJSWS) www.iasir.net. Network Traffic Auditing and Assessment in Cloud Environment International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) ISSN (Print): 2279-0063 ISSN (Online): 2279-0071 International

More information

Posit: An Adaptive Framework for Lightweight IP Geolocation

Posit: An Adaptive Framework for Lightweight IP Geolocation Posit: An Adaptive Framework for Lightweight IP Geolocation Brian Eriksson Department of Computer Science Boston University eriksson@cs.bu.edu Bruce Maggs Department of Computer Science Duke University

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

Experimentation with the YouTube Content Delivery Network (CDN)

Experimentation with the YouTube Content Delivery Network (CDN) Experimentation with the YouTube Content Delivery Network (CDN) Siddharth Rao Department of Computer Science Aalto University, Finland siddharth.rao@aalto.fi Sami Karvonen Department of Computer Science

More information

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront

Delivering Media from the Cloud. Alex Dunlap Senior Manager, Amazon CloudFront Delivering Media from the Cloud Alex Dunlap Senior Manager, Amazon CloudFront Agenda Today we will: Provide a brief introduction to Amazon CloudFront. Examine common needs and challenges we ve seen from

More information

A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud

A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud A Position Paper on Data Sovereignty: The Importance of Geolocating Data in the Cloud Zachary N. J. Peterson Mark Gondree Robert Beverly Abstract In this paper we define the problem and scope of data sovereignty

More information

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect 1 Pega as a Service Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect This information is not a commitment, promise or legal obligation to deliver any material,

More information

Geolocating IP Addresses in Cellular Data Networks

Geolocating IP Addresses in Cellular Data Networks Geolocating IP Addresses in Cellular Data Networks Sipat Triukose, Sebastien Ardon, Anirban Mahanti, Aaditeshwar Seth NICTA, Locked Bag 9013, Alexandria, NSW, Australia {sipat.triukose,sebastien.ardon,anirban.mahanti}@nicta.com.au

More information

Posit: A Lightweight Approach for IP Geolocation

Posit: A Lightweight Approach for IP Geolocation Posit: A Lightweight Approach for IP Geolocation Brian Eriksson Boston University and UW Madison eriksson@cs.bu.edu Paul Barford UW Madison pb@cs.wisc.edu Bruce Maggs Duke University and Akamai Technologies

More information

Four Reasons To Outsource Your DNS

Four Reasons To Outsource Your DNS Four Reasons To Outsource Your DNS Your company s website is up. Servers are churning transactions. The network is pumping data. Life is good. But everything in IT can change quickly. Today s slightly

More information

Towards Street-Level Client-Independent IP Geolocation

Towards Street-Level Client-Independent IP Geolocation Towards Street-Level Client-Independent IP Geolocation Yong Wang UESTC/Northwestern University Aleksandar Kuzmanovic Northwestern University Daniel Burgener Northwestern University Cheng Huang Microsoft

More information

Global Data Center Location Insights March 2013

Global Data Center Location Insights March 2013 Global Data Center Location March 2013 This report is solely for the use of Talent Neuron clients and Talent Neuron Subscribers. No part of it may be circulated, quoted, or reproduced for distribution

More information

Internet Infrastructure Measurement: Challenges and Tools

Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with

More information

State of the Cloud DNS Report

State of the Cloud DNS Report transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare

More information

How To Connect To Telx Dia (Dia) For Free

How To Connect To Telx Dia (Dia) For Free Dedicated Internet Access (DIA) Frequently Asked Questions (FAQ) What is DIA? Telx Dedicated Internet Access service, or DIA for short, combines Telx s network neutral environment with colocation and automated

More information

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com

CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS. Review Business and Technology Series www.cumulux.com ` CUMULUX WHICH CLOUD PLATFORM IS RIGHT FOR YOU? COMPARING CLOUD PLATFORMS Review Business and Technology Series www.cumulux.com Table of Contents Cloud Computing Model...2 Impact on IT Management and

More information

Network (Tree) Topology Inference Based on Prüfer Sequence

Network (Tree) Topology Inference Based on Prüfer Sequence Network (Tree) Topology Inference Based on Prüfer Sequence C. Vanniarajan and Kamala Krithivasan Department of Computer Science and Engineering Indian Institute of Technology Madras Chennai 600036 vanniarajanc@hcl.in,

More information

How To Find A Failure In A Network

How To Find A Failure In A Network Practical Issues with Using Network Tomography for Fault Diagnosis Yiyi Huang Georgia Institute of Technology yiyih@cc.gatech.edu Nick Feamster Georgia Institute of Technology feamster@cc.gatech.edu Renata

More information

Internet Anonymity and the Design Process - A Practical Approach

Internet Anonymity and the Design Process - A Practical Approach anon.next: A Framework for Privacy in the Next Generation Internet Matthew Wright Department of Computer Science and Engineering, The University of Texas at Arlington, Arlington, TX, USA, mwright@uta.edu,

More information

How to Grow and Transform your Security Program into the Cloud

How to Grow and Transform your Security Program into the Cloud How to Grow and Transform your Security Program into the Cloud Wolfgang Kandek Qualys, Inc. Session ID: SPO-207 Session Classification: Intermediate Agenda Introduction Fundamentals of Vulnerability Management

More information

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20

Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20 Azure Media Service Cloud Video Delivery KILROY HUGHES MICROSOFT AZURE MEDIA 2015.08.20 Azure Cloud Topology Public cloud providers such as Amazon Web Service, Google, IBM, Rackspace, etc. have similar

More information

A Catechistic Method for Traffic Pattern Discovery in MANET

A Catechistic Method for Traffic Pattern Discovery in MANET A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer

More information

State of the Cloud DNS Report

State of the Cloud DNS Report transparency for the cloud State of the Cloud DNS Report Basic Edition April 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare

More information

The Internet is Not a Cloud Geographies Matter as Much as Ever for Internet Storage, Routing and Surveillance

The Internet is Not a Cloud Geographies Matter as Much as Ever for Internet Storage, Routing and Surveillance The Internet is Not a Cloud Geographies Matter as Much as Ever for Internet Storage, Routing and Surveillance Andrew Clement Fac. of Information, Univ. of Toronto Seeing through the Cloud Assessing Privacy

More information

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.

packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3. Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System

More information

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions

Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions Usage of OPNET IT tool to Simulate and Test the Security of Cloud under varying Firewall conditions GRADUATE PROJECT REPORT Submitted to the Faculty of The School of Engineering & Computing Sciences Texas

More information

Building well-balanced CDN 1

Building well-balanced CDN 1 Proceedings of the Federated Conference on Computer Science and Information Systems pp. 679 683 ISBN 978-83-60810-51-4 Building well-balanced CDN 1 Piotr Stapp, Piotr Zgadzaj Warsaw University of Technology

More information

On the Deficiencies of Active Network Discovery Systems

On the Deficiencies of Active Network Discovery Systems On the Deficiencies of Active Network Discovery Systems Ofir Arkin Chief Technology Officer Insightix Copyright 2012 - All Rights Reserved. This material is proprietary of Insightix. Any unauthorized

More information

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall.

Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. Web Analytics Understand your web visitors without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

More information

The ISP Column A monthly column on all things Internet

The ISP Column A monthly column on all things Internet The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question

More information

Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723

Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723 Title: Scalable, Extensible, and Safe Monitoring of GENI Clusters Project Number: 1723 Authors: Sonia Fahmy, Department of Computer Science, Purdue University Address: 305 N. University St., West Lafayette,

More information

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK

EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK EFFICIENT DETECTION IN DDOS ATTACK FOR TOPOLOGY GRAPH DEPENDENT PERFORMANCE IN PPM LARGE SCALE IPTRACEBACK S.Abarna 1, R.Padmapriya 2 1 Mphil Scholar, 2 Assistant Professor, Department of Computer Science,

More information

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests.

3rd Party Audited Cloud Infrastructure SOC 1, Type II SOC 2, Type II ISO 27001. Annual 3rd party application Pen Tests. THE BRIGHTIDEA CLOUD INFRASTRUCTURE INTRODUCTION Brightidea s world-class cloud infrastructure is designed and certified to handle the most stringent security, reliability, scalability, and performance

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Mapping the Expansion of Google s Serving Infrastructure

Mapping the Expansion of Google s Serving Infrastructure Mapping the Expansion of Google s Serving Infrastructure Technical Report 3-935, University of Southern California, Department of Computer Science Matt Calder, Xun Fan 2, Zi Hu 2, Ethan Katz-Bassett, John

More information

Network Flow Data Fusion GeoSpatial and NetSpatial Data Enhancement

Network Flow Data Fusion GeoSpatial and NetSpatial Data Enhancement Network Flow Data Fusion GeoSpatial and NetSpatial Data Enhancement FloCon 2010 New Orleans, La Carter Bullard QoSient, LLC carter@qosient.com 1 Carter Bullard carter@qosient.com QoSient - Research and

More information

Exploring Big Data in Social Networks

Exploring Big Data in Social Networks Exploring Big Data in Social Networks virgilio@dcc.ufmg.br (meira@dcc.ufmg.br) INWEB National Science and Technology Institute for Web Federal University of Minas Gerais - UFMG May 2013 Some thoughts about

More information

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1

Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Application of Adaptive Probing for Fault Diagnosis in Computer Networks 1 Maitreya Natu Dept. of Computer and Information Sciences University of Delaware, Newark, DE, USA, 19716 Email: natu@cis.udel.edu

More information

Argonne National Laboratory, Argonne, IL USA 60439

Argonne National Laboratory, Argonne, IL USA 60439 LEGS: A WSRF Service to Estimate Latency between Arbitrary Hosts on the Internet R Vijayprasanth 1, R Kavithaa 2,3, and Rajkumar Kettimuthu 2,3 1 Department of Information Technology Coimbatore Institute

More information

State of the Cloud DNS Report. Basic Edition April 2014

State of the Cloud DNS Report. Basic Edition April 2014 State of the Cloud DNS Report Basic Edition April 2014 2014 Table of Contents Overview Introduction... 3 Anycast vs. Unicast DNS... 3 Provider Overview & Current News... 4 Provider Market Share...7 Technology

More information

International Journal of Advanced Research in Computer Science and Software Engineering

International Journal of Advanced Research in Computer Science and Software Engineering Volume 2, Issue 9, September 2012 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com An Experimental

More information

A Review of Anomaly Detection Techniques in Network Intrusion Detection System

A Review of Anomaly Detection Techniques in Network Intrusion Detection System A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In

More information

Executing Bag of Distributed Tasks on the Cloud: Investigating the Trade-offs Between Performance and Cost

Executing Bag of Distributed Tasks on the Cloud: Investigating the Trade-offs Between Performance and Cost Executing Bag of Distributed Tasks on the Cloud: Investigating the Trade-offs Between Performance and Cost Long Thai, Blesson Varghese and Adam Barker School of Computer Science, University of St Andrews,

More information

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS

A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS A SURVEY OF CLOUD COMPUTING: NETWORK BASED ISSUES PERFORMANCE AND ANALYSIS *Dr Umesh Sehgal, #Shalini Guleria *Associate Professor,ARNI School of Computer Science,Arni University,KathagarhUmeshsehgalind@gmail.com

More information

Politecnico di Torino. Porto Institutional Repository

Politecnico di Torino. Porto Institutional Repository Politecnico di Torino Porto Institutional Repository [Proceeding] Dissecting Video Server Selection Strategies in the YouTube CDN Original Citation: Ruben Torres,Alessandro Finamore,Jin Ryong Kim,Marco

More information

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without

More information

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary

White Paper. The Ten Features Your Web Application Monitoring Software Must Have. Executive Summary White Paper The Ten Features Your Web Application Monitoring Software Must Have Executive Summary It s hard to find an important business application that doesn t have a web-based version available and

More information

Learning Network Structure from Passive Measurements

Learning Network Structure from Passive Measurements Learning Network Structure from Passive Measurements Brian Eriksson UW-Madison bceriksson@wisc.edu Paul Barford UW-Madison pb@cs.wisc.edu Mark Crovella Boston University crovella@cs.bu.edu Robert Nowak

More information

Where Do You Tube? Uncovering YouTube Server Selection Strategy

Where Do You Tube? Uncovering YouTube Server Selection Strategy Where Do You Tube? Uncovering YouTube Server Selection Strategy Vijay Kumar Adhikari, Sourabh Jain, Zhi-Li Zhang University of Minnesota- Twin Cities Abstract YouTube is one of the most popular video sharing

More information

Amazon CloudFront Overview. Tal Saraf General Manager Amazon CloudFront and Route 53

Amazon CloudFront Overview. Tal Saraf General Manager Amazon CloudFront and Route 53 Amazon CloudFront Overview Tal Saraf General Manager Amazon CloudFront and Route 53 Agenda Provide a brief introduc2on to Amazon Web Services Present an overview of Amazon CloudFront Demo how to set up

More information

Active Measurement Data Analysis Techniques

Active Measurement Data Analysis Techniques 3/27/2000: This work is an Authors version, and has been submitted for publication. Copyright may be transferred without further notice and the accepted version may then be posted by the publisher. Active

More information

From Internet Data Centers to Data Centers in the Cloud

From Internet Data Centers to Data Centers in the Cloud From Internet Data Centers to Data Centers in the Cloud This case study is a short extract from a keynote address given to the Doctoral Symposium at Middleware 2009 by Lucy Cherkasova of HP Research Labs

More information

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS

Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves

More information

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks

An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks 2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh

More information

An Efficient Load Balancing Technology in CDN

An Efficient Load Balancing Technology in CDN Issue 2, Volume 1, 2007 92 An Efficient Load Balancing Technology in CDN YUN BAI 1, BO JIA 2, JIXIANG ZHANG 3, QIANGGUO PU 1, NIKOS MASTORAKIS 4 1 College of Information and Electronic Engineering, University

More information

Content Retrieval using Cloud-based DNS

Content Retrieval using Cloud-based DNS Content Retrieval using Cloud-based DNS Ravish Khosla, Sonia Fahmy, Y. Charlie Hu Purdue University Email: {rkhosla, fahmy, ychu}@purdue.edu Abstract Cloud-computing systems are rapidly gaining momentum,

More information

A Novel Packet Marketing Method in DDoS Attack Detection

A Novel Packet Marketing Method in DDoS Attack Detection SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun

More information

ALTO and Content Delivery Networks dra7- penno- alto- cdn

ALTO and Content Delivery Networks dra7- penno- alto- cdn ALTO and Content Delivery Networks dra7- penno- alto- cdn Stefano Previdi, sprevidi@cisco.com Richard Alimi, ralimi@google.com Jan Medved, jmedved@juniper.net Reinaldo Penno, rpenno@juniper.net Richard

More information

Web Caching and CDNs. Aditya Akella

Web Caching and CDNs. Aditya Akella Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion

More information

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks

Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. prashil.waghmare14@gmail.com

More information

Using IPM to Measure Network Performance

Using IPM to Measure Network Performance CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring

More information

Internet topology and performance analytics for mapping critical network infrastructure

Internet topology and performance analytics for mapping critical network infrastructure CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy 16-18 December 2014 1 Team

More information

Performance Evaluation of the Illinois Cloud Computing Testbed

Performance Evaluation of the Illinois Cloud Computing Testbed Performance Evaluation of the Illinois Cloud Computing Testbed Ahmed Khurshid, Abdullah Al-Nayeem, and Indranil Gupta Department of Computer Science University of Illinois at Urbana-Champaign Abstract.

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Near Sheltered and Loyal storage Space Navigating in Cloud

Near Sheltered and Loyal storage Space Navigating in Cloud IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 8 (August. 2013), V2 PP 01-05 Near Sheltered and Loyal storage Space Navigating in Cloud N.Venkata Krishna, M.Venkata

More information

Top 10 Reasons Enterprises are Moving Security to the Cloud

Top 10 Reasons Enterprises are Moving Security to the Cloud ZSCALER EBOOK Top 10 Reasons Enterprises are Moving Security to the Cloud A better approach to security Albert Einstein defined insanity as doing the same thing over and over again and expecting different

More information

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012

Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 Traffic delivery evolution in the Internet ENOG 4 Moscow 23 rd October 2012 January 29th, 2008 Christian Kaufmann Director Network Architecture Akamai Technologies, Inc. way-back machine Web 1998 way-back

More information

Characterization and Analysis of NTP Amplification Based DDoS Attacks

Characterization and Analysis of NTP Amplification Based DDoS Attacks Characterization and Analysis of NTP Amplification Based DDoS Attacks L. Rudman Department of Computer Science Rhodes University Grahamstown g11r0252@campus.ru.ac.za B. Irwin Department of Computer Science

More information

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON

GLOBAL SERVER LOAD BALANCING WITH SERVERIRON APPLICATION NOTE GLOBAL SERVER LOAD BALANCING WITH SERVERIRON Growing Global Simply by connecting to the Internet, local businesses transform themselves into global ebusiness enterprises that span the

More information

Analysis of the Traffic on the Gnutella Network

Analysis of the Traffic on the Gnutella Network Analysis of the Traffic on the Gnutella Network Kelsey Anderson University of California, San Diego CSE222 Final Project March 21 Abstract The Gnutella network is an overlay network

More information

Monitoring commercial cloud service providers

Monitoring commercial cloud service providers Monitoring commercial cloud service providers July Author: Lassi Kojo Supervisor: Stefan Lüders CERN openlab Summer Student Report Abstract There is a growing tendency by individuals to sign-up for public

More information

Broadband Quality Test Plan

Broadband Quality Test Plan Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS

More information

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage

NetCrunch 6. AdRem. Network Monitoring Server. Document. Monitor. Manage AdRem NetCrunch 6 Network Monitoring Server With NetCrunch, you always know exactly what is happening with your critical applications, servers, and devices. Document Explore physical and logical network

More information

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html

Additional Information: A link to the conference website is available at: http://www.curtin.edu.my/cutse2008/index.html Citation: Veeramani, S. and Gopal, Lenin. 2008. Network monitoring tool, in Curtin University of Technology (ed), Curtin University of Technology Science and Engineering International Conference CUTSE

More information

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS

CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of

More information

A Framework for Routing Assisted Traffic Monitoring

A Framework for Routing Assisted Traffic Monitoring A Framework for Routing Assisted Traffic Monitoring D. Krishna Kumar, B.Sai baba M.Tech Krishna.desa@gmail.com Vishnu Institute of Technology college of Engineering and Technology, Bhimavaram, A.P. Abstract

More information

Measuring CDN Performance. Hooman Beheshti, VP Technology

Measuring CDN Performance. Hooman Beheshti, VP Technology Measuring CDN Performance Hooman Beheshti, VP Technology Why this matters Performance is one of the main reasons we use a CDN Seems easy to measure, but isn t Performance is an easy way to comparison shop

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

Firewall Stateful Inspection of ICMP

Firewall Stateful Inspection of ICMP The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection

More information

MON: On-demand Overlays for Distributed System Management

MON: On-demand Overlays for Distributed System Management MON: On-demand Overlays for Distributed System Management Jin Liang, Steven Y. Ko, Indranil Gupta and Klara Nahrstedt University of Illinois at Urbana-Champaign {jinliang, sko, indy, klara}@cs.uiuc.edu

More information

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud

The Advanced Attack Challenge. Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge Creating a Government Private Threat Intelligence Cloud The Advanced Attack Challenge One of the most prominent and advanced threats to government networks is advanced delivery

More information

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing

Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Microsoft Dynamics CRM 2015 with NetScaler for Global Server Load Balancing Solution Guide This solution guide focuses on defining the deployment process for Microsoft Dynamics CRM with Citrix NetScaler.

More information

Combining Global Load Balancing and Geo-location with Emissary TM

Combining Global Load Balancing and Geo-location with Emissary TM Combining Global Load Balancing and Geo-location with Emissary TM A New Kind of Global Internet Traffic Management Appliance from Coyote Point Systems and Digital Envoy Establishing a Geo-Sensitive, Highly

More information

Backbone Capacity Planning Methodology and Process

Backbone Capacity Planning Methodology and Process Backbone Capacity Planning Methodology and Process A Technical Paper prepared for the Society of Cable Telecommunications Engineers By Leon Zhao Senior Planner, Capacity Time Warner Cable 13820 Sunrise

More information

Path Optimization in Computer Networks

Path Optimization in Computer Networks Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host

More information

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed

ASPERA HIGH-SPEED TRANSFER SOFTWARE. Moving the world s data at maximum speed ASPERA HIGH-SPEED TRANSFER SOFTWARE Moving the world s data at maximum speed PRESENTERS AND AGENDA PRESENTER John Heaton Aspera Director of Sales Engineering john@asperasoft.com AGENDA How Cloud is used

More information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information

Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Continuous Fastest Path Planning in Road Networks by Mining Real-Time Traffic Event Information Eric Hsueh-Chan Lu Chi-Wei Huang Vincent S. Tseng Institute of Computer Science and Information Engineering

More information

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION

A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS INTRODUCTION A SOCIAL NETWORK ANALYSIS APPROACH TO ANALYZE ROAD NETWORKS Kyoungjin Park Alper Yilmaz Photogrammetric and Computer Vision Lab Ohio State University park.764@osu.edu yilmaz.15@osu.edu ABSTRACT Depending

More information

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM

15-2394-3696 RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM RIGOROUS PUBLIC AUDITING SUPPORT ON SHARED DATA STORED IN THE CLOUD BY PRIVACY-PRESERVING MECHANISM Dhanashri Bamane Vinayak Pottigar Subhash Pingale Department of Computer Science and Engineering SKN

More information

Content Distribution Networks (CDN)

Content Distribution Networks (CDN) 229 Content Distribution Networks (CDNs) A content distribution network can be viewed as a global web replication. main idea: each replica is located in a different geographic area, rather then in the

More information

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring

Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Correlations in End-to-End Network Metrics: Impact on Large Scale Network Monitoring Praveen Yalagandula, Sung-Ju Lee, Puneet Sharma and Sujata Banerjee Hewlett-Packard Labs, Palo Alto, CA Abstract With

More information

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013

International Journal of Computer Trends and Technology (IJCTT) volume 4 Issue 8 August 2013 A Short-Term Traffic Prediction On A Distributed Network Using Multiple Regression Equation Ms.Sharmi.S 1 Research Scholar, MS University,Thirunelvelli Dr.M.Punithavalli Director, SREC,Coimbatore. Abstract:

More information

MILP Model And Models For Cloud Network Backup

MILP Model And Models For Cloud Network Backup Minimizing Disaster Backup Window for Geo-Distributed Multi-Datacenter Cloud Systems Jingjing Yao, Ping Lu, Zuqing Zhu School of Information Science and Technology University of Science and Technology

More information

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services

PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services PlanetSeer: Internet Path Failure Monitoring and Characterization in Wide-Area Services Ming Zhang, Chi Zhang Vivek Pai, Larry Peterson, Randy Wang Princeton University Motivation Routing anomalies are

More information

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study

Real-Time Analysis of CDN in an Academic Institute: A Simulation Study Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management

More information