TLD Data Analysis. ICANN Tech Day, Dublin. October 19th 2015 Maarten Wullink, SIDN. Klik om de s+jl te bewerken

Size: px
Start display at page:

Download "TLD Data Analysis. ICANN Tech Day, Dublin. October 19th 2015 Maarten Wullink, SIDN. Klik om de s+jl te bewerken"

Transcription

1 Klik om de s+jl te bewerken Klik om de models+jlen te bewerken Tweede niveau Derde niveau Vierde niveau TLD Data Analysis Vijfde niveau ICANN Tech Day, Dublin October 19th 2015 Maarten Wullink, SIDN Wie zijn wij? Mijlpalen Het huidige internet Missie - Visie Diensten Referen@es SamenvaJng 1

2 SIDN Domain name registry for.nl cctld > 5,6 million domain names 2,46 million domain names secured with DNSSEC SIDN Labs is the R&D team of SIDN

3 DNS > 3.1 million resolvers > 1.3 billion query's daily > 300 GB of PCAP data daily

4 ENTRADA ENhanced Top-Level Domain Resilience through Advanced Data Analysis Goal: data-driven improved security & stability of.nl and the Internet at large Problem: for analyzing network data do not work well with large datasets and have limited Main requirement: high-performance, near data warehouse Approach: avoid expensive pcap analysis: Convert pcap data to a performance-op@mized format (key) Perform analysis with tools/engines that leverage that

5 Use Cases Focussed on increasing the security and stability of.nl Visualize DNS pagerns (visualize traffic pagerns for phishing domain names) Detect botnet Phishing (stats.sidnlabs.nl) research with Dutch support for DNS operators

6 Example DNS security scoreboard Resolver

7 DNS Security Scoreboard Goal: Visualize DNS pagerns for malicious How: Combine external phishing feeds with DNS data

8 Architecture Security feed I new event Security feed II new event Hadoop Event Analyzer save enriched event PostgreSQL REST API Web UI retrieve event data

9 Traffic

10 Resolver (RESREP) Goal: Try to detect malicious by assigning scores to resolvers How: resolver behaviour

11 RESREP Concept ISP Resolvers.nl Registry DNS.nl Malicious Spam-runs Botnets like Cutwail agacks DNS and responses

12 RESREP Architecture Root operator.nl Privacy Board ISP network Resolvers RESREP service RESREP Privacy Policy ENTRADA Plaqorm AbuseHUB Abusedesk User HTTP Child operator (example.nl)

13 ENTRADA Architecture DNS big data system Goal: develop and services that further enhance the security and stability of.nl, the DNS, and the Internet at large ENTRADA main components and services Plaqorm and data sources Privacy framework Plaqorm + privacy framework = ENTRADA plumbing

14 ENTRADA Privacy Framework Part of the ENTRADA plumbing Juridisch%en%organisatorisch% ENTRADA%data%plaKorm%(technisch)% toepassingssilos% ENTRADA%privacyraamwerk% Key concepts privacy policy Privacy Board Enforcement Points R&D% licenje% Template% Auteur% (Ontwikkelaar% toepassing%t1)% Aanpassingen% Concept% policy% voor%t1% Privacy% Board% Policy% voor%t1% T1% T2% TN% PEP#G% PEP#A% PEP#O% PEP#G% PEP#A% PEP#O% PEP#G% PEP#A% PEP#O% Security%en%stability%% services%en%dashboards% Data#analyse%% algoritmes% Database%queries% Opslag% DNS%packets%(PCAP)% Policy elements include PEP#V% PEP#V% PEP#V% Verzameling% Purpose Data used.nl%nameservers% Filters DNS%query s%en%responses% period resolvers% Type of (R&D vs.

15 ENTRADA Technical Architecture ENTRADA-specific components Workflow Services DNS Library PCAP Conversion ENTRADA plaqorm Open source Hadoop (generic components) Support IMPALA HDFS Parquet

16 Workflow name server PCAP staging PCAP decode X Y Join Filter Hadoop Impala Analyst Enrich Parquet Monitoring Metrics Import Query data available for analysis within 10 minutes

17 Performance Example query, count # ipv4 queries per day. select concat_ws( -,day,month,year), count(1) from dns.queries where ipv=4 group by concat_ws( -,day,month,year) Query 1 Year of data is 2.2TB Parquet ~ 52TB of PCAP

18 ENTRADA Status Name server feeds 2 Queries per day ~320M Daily PCAP volume(gzipped) ~70GB Daily Parquet volume ~14GB Months opera@onal 18 Total # queries stored > 74B Total Parquet volume > 3TB HDFS (3x replica@on) > 9TB Cluster capacity ~150B-200B tuples

19 Conclusions Technical: Hadoop HDFS + Parquet + Impala is a winning combina@on! Contribu@ons: Research by SIDN Labs and universi@es Iden@fied malicious domain names and botnets External data feed to the Abuse Informa@on Exchange Insight into DNS query data

20 Future Work Combine data from.nl name server with scans of the complete.nl zone and ISP data. Get data from more name servers and resolvers Expand Open Data program

21 and Feedback Maarten Wullink Senior Research hgps://stats.sidnlabs.nl

DNS Big Data Analy@cs

DNS Big Data Analy@cs Klik om de s+jl te bewerken Klik om de models+jlen te bewerken! Tweede niveau! Derde niveau! Vierde niveau DNS Big Data Analy@cs Vijfde niveau DNS- OARC Fall 2015 Workshop October 4th 2015 Maarten Wullink,

More information

.nl ENTRADA. CENTR-tech 33. November 2015 Marco Davids, SIDN Labs. Klik om de s+jl te bewerken

.nl ENTRADA. CENTR-tech 33. November 2015 Marco Davids, SIDN Labs. Klik om de s+jl te bewerken Klik om de s+jl te bewerken Klik om de models+jlen te bewerken Tweede niveau Derde niveau Vierde niveau.nl ENTRADA Vijfde niveau CENTR-tech 33 November 2015 Marco Davids, SIDN Labs Wie zijn wij? Mijlpalen

More information

ENTRADA: Enabling DNS Big Data Applications

ENTRADA: Enabling DNS Big Data Applications ENTRADA: Enabling DNS Big Data Applications Maarten Wullink - SIDN APWG ecrime 2016 June 2 nd 2016 - Toronto What if You have many TB s of network data? And you want to: 1. Store it efficiently 2. Query

More information

A Privacy framework for DNS big data. November 28, 2014 Jelte Jansen

A Privacy framework for DNS big data. November 28, 2014 Jelte Jansen A Privacy framework for DNS big data November 28, 2014 Jelte Jansen SIDN.nl (Registry voor Nederland) 5.5M domain names, >1.600 registrars > 1.300.000.000 DNS queries per day Private foundation with public

More information

Big data security on.nl: infrastructure and one application

Big data security on.nl: infrastructure and one application Big data security on.nl: infrastructure and one application Giovane C. M. Moura, Maarten Wullink, Moritz Mueller, and Cristian Hesselman SIDN Labs first.lastname@sidn.nl IEPG Meeting IETF 94 Yokohama,

More information

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs

Decoding DNS data. Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs Decoding DNS data Using DNS traffic analysis to identify cyber security threats, server misconfigurations and software bugs The Domain Name System (DNS) is a core component of the Internet infrastructure,

More information

Malicious domains: Automatic Detection with DNS traffic analysis

Malicious domains: Automatic Detection with DNS traffic analysis Malicious domains: Automatic Detection with DNS traffic analysis Giovane C. M. Moura, Maarten Wullink, Moritz Müller, and Cristian Hesselman SIDN Labs {first.lastname}@sidn.nl Network Machine Learning

More information

A privacy framework for DNS big data applications *

A privacy framework for DNS big data applications * A privacy framework for DNS big data applications * Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink and Maarten Simon SIDN ** Contact person: Jelte.Jansen@sidn.nl In this paper, we discuss

More information

Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance

Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance Telecom and Internet Regulatory Challenges and Opportunities Names, Numbers, Internet Governance Global Forum ICT & The Future of Internet Bucharest, Romania, 19-20 October 2009 Theresa Swinehart Vice-President

More information

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More

Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Copyright 2015 Splunk Inc. Stream Deployments in the Real World: Enhance Opera?onal Intelligence Across Applica?on Delivery, IT Ops, Security, and More Stela Udovicic Sr. Product Marke?ng Manager Clayton

More information

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas

Big Data. The Big Picture. Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas Big Data The Big Picture Our flexible and efficient Big Data solu9ons open the door to new opportuni9es and new business areas What is Big Data? Big Data gets its name because that s what it is data that

More information

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9

How To Use Splunk For Android (Windows) With A Mobile App On A Microsoft Tablet (Windows 8) For Free (Windows 7) For A Limited Time (Windows 10) For $99.99) For Two Years (Windows 9 Copyright 2014 Splunk Inc. Splunk for Mobile Intelligence Bill Emme< Director, Solu?ons Marke?ng Panos Papadopoulos Director, Product Management Disclaimer During the course of this presenta?on, we may

More information

A privacy framework for DNS big data applications *

A privacy framework for DNS big data applications * A privacy framework for DNS big data applications * Cristian Hesselman, Jelte Jansen, Maarten Wullink, Karin Vink and Maarten Simon SIDN Contact person: Jelte.Jansen@sidn.nl In this paper, we discuss our

More information

Using RDBMS, NoSQL or Hadoop?

Using RDBMS, NoSQL or Hadoop? Using RDBMS, NoSQL or Hadoop? DOAG Conference 2015 Jean- Pierre Dijcks Big Data Product Management Server Technologies Copyright 2014 Oracle and/or its affiliates. All rights reserved. Data Ingest 2 Ingest

More information

Internet Security and Resiliency: A Collaborative Effort

Internet Security and Resiliency: A Collaborative Effort Internet Security and Resiliency: A Collaborative Effort Baher Esmat Manager, Regional Relations Middle East MENOG 4 Manama, 9 April 2009 1 WHAT IS THIS PRESENTATION ABOUT? ICANN s effort in enhancing

More information

Cyber Security With Big Data

Cyber Security With Big Data Cyber Security With Big Data Fast. Complete. Cost-Effec1ve. Harry J Foxwell, PhD Principal Consultant Oracle Public Sector Oct 2015 Safe Harbor Statement The following is intended to outline our general

More information

IANA Functions to cctlds Sofia, Bulgaria September 2008

IANA Functions to cctlds Sofia, Bulgaria September 2008 IANA Functions to cctlds Sofia, Bulgaria September 2008 Kim Davies Internet Assigned Numbers Authority Internet Corporation for Assigned Names & Numbers What is IANA? Internet Assigned Numbers Authority

More information

The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons

The Data Reservoir. 10 th September 2014. Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Informa4on Solu4ons Mandy Chessell FREng CEng FBCS Dis4nguished Engineer, Master Inventor Chief Architect, Solu4ons The Reservoir 10 th September 2014 A growing demand Business Teams want Open access to more informa4on More

More information

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology

Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Protec'ng Communica'on Networks, Devices, and their Users: Technology and Psychology Alexey Kirichenko, F- Secure Corpora7on ICT SHOK, Future Internet program 30.5.2012 Outline 1. Security WP (WP6) overview

More information

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS

NANOG DNS BoF. DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS NANOG DNS BoF DNS DNSSEC IPv6 Tuesday, February 1, 2011 NATIONAL ENGINEERING & TECHNICAL OPERATIONS The Role Of An ISP In DNSSEC Valida;on ISPs act in two different DNSSEC roles, both signing and valida;ng

More information

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN

DNS Traffic Monitoring. Dave Piscitello VP Security and ICT Coordina;on, ICANN DNS Traffic Monitoring Dave Piscitello VP Security and ICT Coordina;on, ICANN Domain Names ICANN coordinates the administra2on of global iden2fier systems Domain names provide user friendly identification

More information

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan

Data Management in the Cloud: Limitations and Opportunities. Annies Ductan Data Management in the Cloud: Limitations and Opportunities Annies Ductan Discussion Outline: Introduc)on Overview Vision of Cloud Compu8ng Managing Data in The Cloud Cloud Characteris8cs Data Management

More information

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015

Tim Blevins Execu;ve Director Labor and Revenue Solu;ons. FTA Technology Conference August 4th, 2015 Tim Blevins Execu;ve Director Labor and Revenue Solu;ons FTA Technology Conference August 4th, 2015 Governance and Organiza;onal Strategy PaIerns of Fraud and Abuse in Government What tools can we use

More information

April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2. Circuit Monitoring for DYNES

April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2. Circuit Monitoring for DYNES April 20 th 2011, Internet2 Spring Member Mee5ng Aaron Brown Internet2 Circuit Monitoring for DYNES Dynamic Circuits Scien5fic disciplines require greater network capacity and predictably to cope with

More information

Domain Name System Security

Domain Name System Security Domain Name System Security Guevara Noubir Network Security Northeastern University 1 Domain Name System DNS is a fundamental applica=on layer protocol Not visible but invoked every =me a remote site is

More information

Complexity and Transition Management. Theory and practice

Complexity and Transition Management. Theory and practice Complexity and Transition Management Theory and practice Shivant Jhagroe Erasmus University Rotterdam (DRIFT) jhagroe@fsw.eur.nl Florence, 13 February 2012 Today s crises de modelstijlen te bewerken niveau

More information

Power to the People: Analy0cs for All

Power to the People: Analy0cs for All Arijit Sengupta CEO, BeyondCore, Inc. Power to the People: Analy0cs for All " Ten patents related to Advanced Analytics, Privacy/Security and BPaaS. " Previously worked at Oracle, Microsoft, Yankee Group

More information

Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015

Strengthening our Ecosystem through Stakeholder Collaboration. Jia-Rong Low, Sr Director, Asia 20 August 2015 Strengthening our Ecosystem through Stakeholder Collaboration Jia-Rong Low, Sr Director, Asia 20 August 2015 Agenda 1 2 3 About ICANN and the Domain Name System (DNS) DNS attacks and their impact DNS Security

More information

More Than A Buzzword: Big Data in the Environmental Arena

More Than A Buzzword: Big Data in the Environmental Arena More Than A Buzzword: Big Data in the Environmental Arena 2015 Na>onal Environmental Monitoring Conference July 15, 2015 Brooke Roecker Senior Environmental Data Analyst Mark Packard, PG, CPG President/CEO

More information

Hadoop & SAS Data Loader for Hadoop

Hadoop & SAS Data Loader for Hadoop Turning Data into Value Hadoop & SAS Data Loader for Hadoop Sebastiaan Schaap Frederik Vandenberghe Agenda What s Hadoop SAS Data management: Traditional In-Database In-Memory The Hadoop analytics lifecycle

More information

NIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting

NIST Email Security Improvements. William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting NIST Email Security Improvements William C. Barker and Scott Rose October 22, 2015 M3AAWG 35 th General Meeting Presenters Scott Rose Computer Scientist, NIST ITL William (Curt) Barker Guest Researcher,

More information

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna

DDOS Mi'ga'on in RedIRIS. SIG- ISM. Vienna DDOS Mi'ga'on in RedIRIS SIG- ISM. Vienna Index Evolu'on of DDOS a:acks in RedIRIS Mi'ga'on Tools Current DDOS strategy About RedIRIS Spanish Academic & research network. Universi'es, research centers,.

More information

Big data Journey. From a pallet of parts to big data analytics. Sebastian Castro.nz Registry Services

Big data Journey. From a pallet of parts to big data analytics. Sebastian Castro.nz Registry Services Big data Journey From a pallet of parts to big data analytics Sebastian Castro.nz Registry Services Introduction Apache Hadoop Open-source software framework Storage using HDFS Data processing in batch

More information

NERSC Data Efforts Update Prabhat Data and Analytics Group Lead February 23, 2015

NERSC Data Efforts Update Prabhat Data and Analytics Group Lead February 23, 2015 NERSC Data Efforts Update Prabhat Data and Analytics Group Lead February 23, 2015-1 - A little bit about myself Computer Scien.st Brown, IIT Delhi Real- 3me Graphics, Virtual Reality, HCI Computa3onal

More information

Apache Spark and the future of big data applica5ons. Eric Baldeschwieler

Apache Spark and the future of big data applica5ons. Eric Baldeschwieler Apache Spark and the future of big data applica5ons Eric Baldeschwieler Who is Eric14? Big data veteran (since 1996) Databricks Tech Advisor Twitter handle: @jeric14 Previously CTO/CEO of Hortonworks Yahoo

More information

UNIFIED, END- TO- END EDISCOVERY

UNIFIED, END- TO- END EDISCOVERY ac.onable informa.on governance Partners Providing Excellence in: UNIFIED, END- TO- END EDISCOVERY 2011 IBM Corpora.on Meet the Presenters Amir Jaibaji Vice President, Product Management StoredIQ Kevin

More information

The Right BI Tool for the Job in a non- SAP Applica9on Environment

The Right BI Tool for the Job in a non- SAP Applica9on Environment September 9 11, 2013 Anaheim, California The Right BI Tool for the Job in a non- SAP Applica9on Environment Speaker Name(s): Ty Miller Full Spectrum Business Intelligence Self Service Dashboards and Apps

More information

IPv6 - A Quick Introduction

IPv6 - A Quick Introduction IPv6 campus deployment experiences Tim Chown University of Southampton HEAnet 2010, Kilkenny 11 th November 2010 tjc@soton.ac.uk Topics A very quick what is IPv6 Why IPv6? Phased deployment Managing a

More information

A versatile platform for DNS metrics with its application to IPv6

A versatile platform for DNS metrics with its application to IPv6 A versatile platform for DNS metrics with its application to IPv6 Stéphane Bortzmeyer AFNIC bortzmeyer@nic.fr RIPE 57 - Dubai - October 2008 1 A versatile platform for DNS metrics with its application

More information

Copyright 2014 Splunk Inc.

Copyright 2014 Splunk Inc. Copyright 2014 Splunk Inc. Extend Splunk by Visualizing Data using Tableau and the ODBC driver Sharad Kylasam Sr. Product Manager, Splunk Ashley Jaschke Product Manager, Tableau Joe Specht Sr. Director

More information

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved

Hortonworks & SAS. Analytics everywhere. Page 1. Hortonworks Inc. 2011 2014. All Rights Reserved Hortonworks & SAS Analytics everywhere. Page 1 A change in focus. A shift in Advertising From mass branding A shift in Financial Services From Educated Investing A shift in Healthcare From mass treatment

More information

SQream Technologies Ltd - Confiden7al

SQream Technologies Ltd - Confiden7al SQream Technologies Ltd - Confiden7al 1 Ge#ng Big Data Done On a GPU- Based Database Ori Netzer VP Product 26- Mar- 14 Analy7cs Performance - 3 TB, 18 Billion records SQream Database 400x More Cost Efficient!

More information

Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability

Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability Hadoop- Based Data Explora1on for the Healthcare Safety- Net Technical & Sociocultural Challenges to Big Data Usability David Hartzband, D.Sc. Research Affiliate, SSRC, MIT & Director, Technology Research

More information

FAQ (Frequently Asked Questions)

FAQ (Frequently Asked Questions) FAQ (Frequently Asked Questions) Specific Questions about Afilias Managed DNS What is the Afilias DNS network? How long has Afilias been working within the DNS market? What are the names of the Afilias

More information

DTCC Data Quality Survey Industry Report

DTCC Data Quality Survey Industry Report DTCC Data Quality Survey Industry Report November 2013 element 22 unlocking the power of your data Contents 1. Introduction 3 2. Approach and participants 4 3. Summary findings 5 4. Findings by topic 6

More information

Managed Services. An essen/al set of tools for today's businesses

Managed Services. An essen/al set of tools for today's businesses Managed Services An essen/al set of tools for today's businesses Manage your enterprise better with a holis/c solu/on to all your IT worries only at Infolob What are Managed Services? By far the most cu/ng

More information

Computer Security Incident Handling Detec6on and Analysis

Computer Security Incident Handling Detec6on and Analysis Computer Security Incident Handling Detec6on and Analysis Jeff Roth, CISSP- ISSEP, CISA, CGEIT Senior IT Security Consultant 1 Coalfire Confiden+al Agenda 2 SECURITY INCIDENT CONTEXT TERMINOLOGY DETECTION

More information

Performance Management in Big Data Applica6ons. Michael Kopp, Technology Strategist @mikopp

Performance Management in Big Data Applica6ons. Michael Kopp, Technology Strategist @mikopp Performance Management in Big Data Applica6ons Michael Kopp, Technology Strategist NoSQL: High Volume/Low Latency DBs Web Java Key Challenges 1) Even Distribu6on 2) Correct Schema and Access paperns 3)

More information

1 Actuate Corpora-on 2013. Big Data Business Analy/cs

1 Actuate Corpora-on 2013. Big Data Business Analy/cs 1 Big Data Business Analy/cs Introducing BIRT Analy3cs Provides analysts and business users with advanced visual data discovery and predictive analytics to make better, more timely decisions in the age

More information

Data Stream Algorithms in Storm and R. Radek Maciaszek

Data Stream Algorithms in Storm and R. Radek Maciaszek Data Stream Algorithms in Storm and R Radek Maciaszek Who Am I? l Radek Maciaszek l l l l l l Consul9ng at DataMine Lab (www.dataminelab.com) - Data mining, business intelligence and data warehouse consultancy.

More information

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS

Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Copyright 2014 Splunk Inc. Hunk & Elas=c MapReduce: Big Data Analy=cs on AWS Dritan Bi=ncka BD Solu=ons Architecture Disclaimer During the course of this presenta=on, we may make forward looking statements

More information

The IANA Functions. An Introduction to the Internet Assigned Numbers Authority (IANA) Functions

The IANA Functions. An Introduction to the Internet Assigned Numbers Authority (IANA) Functions The IANA Functions An Introduction to the Internet Assigned Numbers Authority (IANA) Functions Contents SECTION 1: INTRODUCTION 4 SECTION 2: POLICY, STAKEHOLDERS AND STEWARDSHIP IMPLEMENTATION 6 SECTION

More information

Big Data for Investment Research Management

Big Data for Investment Research Management IDT Partners www.idtpartners.com Big Data for Investment Research Management Discover how IDT Partners helps Financial Services, Market Research, and Investment Management firms turn big data into actionable

More information

Texas Digital Government Summit. Data Analysis Structured vs. Unstructured Data. Presented By: Dave Larson

Texas Digital Government Summit. Data Analysis Structured vs. Unstructured Data. Presented By: Dave Larson Texas Digital Government Summit Data Analysis Structured vs. Unstructured Data Presented By: Dave Larson Speaker Bio Dave Larson Solu6ons Architect with Freeit Data Solu6ons In the IT industry for over

More information

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional.

Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. Program Model: Muskingum University offers a unique graduate program integra6ng BUSINESS and TECHNOLOGY to develop the 21 st century professional. 163 Stormont Street New Concord, OH 43762 614-286-7895

More information

How To Use A Webmail On A Pc Or Macodeo.Com

How To Use A Webmail On A Pc Or Macodeo.Com Big data workloads and real-world data sets Gang Lu Institute of Computing Technology, Chinese Academy of Sciences BigDataBench Tutorial MICRO 2014 Cambridge, UK INSTITUTE OF COMPUTING TECHNOLOGY 1 Five

More information

Main Research Gaps in Cyber Security

Main Research Gaps in Cyber Security Comprehensive Approach to cyber roadmap coordina5on and development Main Research Gaps in Cyber Security María Pilar Torres Bruna everis Aerospace and Defence Index CAMINO WP2: Iden8fica8on and Analysis

More information

ICANN STRATEGIC PLAN JULY 2012 JUNE 2015

ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 ICANN STRATEGIC PLAN JULY 2012 JUNE 2015 One World. One Internet. One World. One Internet. ICANN is the global organization that coordinates the Internet s unique identifier systems for worldwide public

More information

An Introduc@on to Big Data, Apache Hadoop, and Cloudera

An Introduc@on to Big Data, Apache Hadoop, and Cloudera An Introduc@on to Big Data, Apache Hadoop, and Cloudera Ian Wrigley, Curriculum Manager, Cloudera 1 The Mo@va@on for Hadoop 2 Tradi@onal Large- Scale Computa@on Tradi*onally, computa*on has been processor-

More information

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi

Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi Sicurezza & Big Data: la Security Intelligence aiuta le aziende a difendersi dagli attacchi Giovanni Abbadessa, IBM IT Security Architect Umberto Sansovini, IBM Security Consultant Document number Big

More information

Big Data and New Paradigms in Information Management. Vladimir Videnovic Institute for Information Management

Big Data and New Paradigms in Information Management. Vladimir Videnovic Institute for Information Management Big Data and New Paradigms in Information Management Vladimir Videnovic Institute for Information Management 2 "I am certainly not an advocate for frequent and untried changes laws and institutions must

More information

APPLICATION PROGRAMMING INTERFACE

APPLICATION PROGRAMMING INTERFACE DATA SHEET Advanced Threat Protection INTRODUCTION Customers can use Seculert s Application Programming Interface (API) to integrate their existing security devices and applications with Seculert. With

More information

Oracle Big Data SQL Technical Update

Oracle Big Data SQL Technical Update Oracle Big Data SQL Technical Update Jean-Pierre Dijcks Oracle Redwood City, CA, USA Keywords: Big Data, Hadoop, NoSQL Databases, Relational Databases, SQL, Security, Performance Introduction This technical

More information

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE

BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE BEST PRACTICES FOR IMPROVING EXTERNAL DNS RESILIENCY AND PERFORMANCE Your external DNS is a mission critical business resource. Without

More information

Cloud Risks and Opportunities

Cloud Risks and Opportunities Cloud Risks and Opportunities John Howie COO Cloud Security Alliance #SCCLondon About the Cloud Security Alliance Global, not- for- profit organiza;on Building security best prac;ces for next genera;on

More information

Retaining globally distributed high availability Art van Scheppingen Head of Database Engineering

Retaining globally distributed high availability Art van Scheppingen Head of Database Engineering Retaining globally distributed high availability Art van Scheppingen Head of Database Engineering Overview 1. Who is Spil Games? 2. Theory 3. Spil Storage Pla9orm 4. Ques=ons? 2 Who are we? Who is Spil

More information

H T Tech nologies 2013

H T Tech nologies 2013 H T Technologies 2013 HOST: Eric Kavanagh THIS YEAR is Embedded Analytics Predictive analytics solutions exploit patterns found in data to identify risk and opportunities Embedded solutions can provide

More information

2015 IANA Functions Customer Service Survey Results

2015 IANA Functions Customer Service Survey Results 2015 IANA Functions Customer Service Survey Results Report on the third annual customer service satisfaction survey administered by Ebiquity Marilia Hirano November 2015 Contents Survey objective... 3

More information

Computer Networks: Domain Name System

Computer Networks: Domain Name System Computer Networks: Domain Name System Domain Name System The domain name system (DNS) is an application-layer protocol for mapping domain names to IP addresses DNS www.example.com 208.77.188.166 http://www.example.com

More information

Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook

Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook Best Practices in Domain Name Registry Solutions Understanding the Technical Requirements of ICANN's Applicant Guidebook Adrian Kinderis - CEO AusRegistry International Agenda What options should

More information

DOMAIN NAME DAY. + Helsinki; 14 th February; 2014. + Nigel Hickson, ICANN

DOMAIN NAME DAY. + Helsinki; 14 th February; 2014. + Nigel Hickson, ICANN DOMAIN NAME DAY + Helsinki; 14 th February; 2014 + Nigel Hickson, ICANN 1 AGENDA + gtlds and all that + The European and global debate on Internet Governance 2 Internet Corporation for Assigned Names

More information

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management

SAC 049 SSAC Report on DNS Zone Risk Assessment and Management SAC 049 SSAC Report on DNS Zone Risk Assessment and Management A Report from the ICANN Security and Stability Advisory Committee (SSAC) 03 June 2011 SAC049 1 Preface This is a Report of the Security and

More information

Beyond Strategy: Building Your Mobile Capabili6es

Beyond Strategy: Building Your Mobile Capabili6es Beyond Strategy: Building Your Mobile Capabili6es TASSCC Technology Educa6on Conference April 10, 2015 Presented by: Raj Polikepa6 Director of App Development Texas.gov Agenda ê Objec6ves of Mobile Strategy

More information

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study

Six Days in the Network Security Trenches at SC14. A Cray Graph Analytics Case Study Six Days in the Network Security Trenches at SC14 A Cray Graph Analytics Case Study WP-NetworkSecurity-0315 www.cray.com Table of Contents Introduction... 3 Analytics Mission and Source Data... 3 Analytics

More information

Splunk for Networking and SDN

Splunk for Networking and SDN Copyright 2013 Splunk Inc. Splunk for Networking and SDN Stela Udovicic Senior Product Marke?ng Manager, Splunk #splunkconf Legal No?ces During the course of this presenta?on, we may make forward- looking

More information

Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole

Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole Paper BB-01 Lost in Space? Methodology for a Guided Drill-Through Analysis Out of the Wormhole ABSTRACT Stephen Overton, Overton Technologies, LLC, Raleigh, NC Business information can be consumed many

More information

Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation

Testing Tools using Visual Studio. Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Testing Tools using Visual Studio Randy Pagels Sr. Developer Technology Specialist Microsoft Corporation Plan REQUIREMENTS BACKLOG Monitor + Learn Development Collaboration Production Develop + Test Release

More information

OFERTIE OpenFlow Experiments in Real- Time Interac7ve Edutainment

OFERTIE OpenFlow Experiments in Real- Time Interac7ve Edutainment OFERTIE OpenFlow Experiments in Real- Time Interac7ve Edutainment Tim Chown, Mar7n Hall- May, Tim Humernbrum, Iris Bueno- Rodriguez SDNRG, IETF89, London 6 th March 2014 About OFERTIE OFERTIE is a research

More information

Mining the Cloud.! Building and supporting a Virtual Research Infrastructure!

Mining the Cloud.! Building and supporting a Virtual Research Infrastructure! ! Mining the Cloud.! Building and supporting a Research Infrastructure! Gary Wroblewski Applica2on Coordinator/Mgr. Technical Services The Herbert H. and Grace A. Dow College of Health Professions Central

More information

SIMPLIFYING BIG DATA Real- &me, interac&ve data analy&cs pla4orm for Hadoop NFLABS

SIMPLIFYING BIG DATA Real- &me, interac&ve data analy&cs pla4orm for Hadoop NFLABS SIMPLIFYING BIG DATA Real- &me, interac&ve data analy&cs pla4orm for Hadoop NFLABS Did you know? Founded in 2011, NFLabs is an enterprise software c o m p a n y w o r k i n g o n developing solutions to

More information

Making Sense of Big Data. Dr. Thomas E. Potok Computa2onal Data Analy2cs Group Leader Oak Ridge Na2onal Laboratory potokte@ornl.

Making Sense of Big Data. Dr. Thomas E. Potok Computa2onal Data Analy2cs Group Leader Oak Ridge Na2onal Laboratory potokte@ornl. Making Sense of Big Data Dr. Thomas E. Potok Computa2onal Data Analy2cs Group Leader Oak Ridge Na2onal Laboratory potokte@ornl.gov 865-574- 0834 ORNL s Big Data Legacy Science National Security Energy

More information

MSc Data Science at the University of Sheffield. Started in September 2014

MSc Data Science at the University of Sheffield. Started in September 2014 MSc Data Science at the University of Sheffield Started in September 2014 Gianluca Demar?ni Lecturer in Data Science at the Informa?on School since 2014 Ph.D. in Computer Science at U. Hannover, Germany

More information

Private Cloud Website Solu2on

Private Cloud Website Solu2on Private Cloud Website Solu2on Who We Are 2 HighPoint Solu1ons is a premier provider of specialized Management and IT services dedicated to the Life Sciences and Healthcare industries. Since 2000, our business

More information

Network measurement II. Sebastian Castro NZRS 27 th May 2015 Victoria University

Network measurement II. Sebastian Castro NZRS 27 th May 2015 Victoria University Network measurement II Sebastian Castro NZRS 27 th May 2015 Victoria University Agenda Network measurement in the wild Common pitfalls in methodologies Network measurement datasets Stories Our work AMP

More information

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN)

Final. Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Final Dr. Paul Twomey President and Chief Executive Officer Internet Corporation for Assigned Names and Numbers (ICANN) Opening Speech to the Second International Forum Partnership Among State, Business

More information

Big Data Analy,cs (and Security Intelligence) in Smart Grid Applica,ons Alvaro A. Cárdenas University of Texas at Dallas IEEE ISGT Conference

Big Data Analy,cs (and Security Intelligence) in Smart Grid Applica,ons Alvaro A. Cárdenas University of Texas at Dallas IEEE ISGT Conference 1 Big Data Analy,cs (and Security Intelligence) in Smart Grid Applica,ons Alvaro A. Cárdenas University of Texas at Dallas IEEE ISGT Conference February 26, 2013 Big Data World Growth of Data in Mo,on

More information

DNS Security, Stability and Resiliency

DNS Security, Stability and Resiliency DNS Security, Stability and Resiliency John Crain Chief Technical Officer April 21st 2009 Garmisch 1 Agenda The Global DNS SSR Symposium Problems and Opportunities Questions? 2 The Organization Sponsors:

More information

Big data analy+cs for global change monitoring and research in forestry and agriculture. Lubia Vinhas

Big data analy+cs for global change monitoring and research in forestry and agriculture. Lubia Vinhas Big data analy+cs for global change monitoring and research in forestry and agriculture Lubia Vinhas Earth observa+on satellites and geosensor webs provide key informa+on about global change but that informa+on

More information

The Evolu*on of Service Management

The Evolu*on of Service Management The Evolu*on of Extending Disciplines Across the Enterprise Michael Jones Regional CTO - Architecture Michael.Jones@servicenow.com 2015 Now All Rights Reserved 1 How work gets done today! Emails Spreadsheets

More information

ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model

ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model ICANN: achievements and challenges of a multi-stakeholder, bottom up, transparent model Anne Rachel Inné, Giovanni Seppia Regional Liaisons Aurelio Peccei Lecture 4 April 2007 1 Presentation overview The

More information

Domain Name Market Briefing. 24 June 2012

Domain Name Market Briefing. 24 June 2012 Domain Name Market Briefing 24 June 2012 Agenda Topic Introduction/ Registry environment gtld registry models cctld registry models Domain name lifecycle Corporate / Consumer Resellers, proxy svcs & expiration

More information

The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013!

The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013! The Internet Ecosystem and ICANN!! Steve Sheng @ Stanford University, Center for Information and Society! 29 April 2013! Ecosystem! + A network of interactions among organisms, and between organisms and

More information

Cisco and Splunk: Under the Hood of Cisco IT

Cisco and Splunk: Under the Hood of Cisco IT Cisco and Splunk: Under the Hood of Cisco IT Robert Novak, Cisco Big Data Partner CSE George Lancaster, Engineer, Cisco IT September 2015 Agenda Cisco s History with Splunk How Cisco Uses Splunk IT Operations

More information

Data Governance in the Hadoop Data Lake. Michael Lang May 2015

Data Governance in the Hadoop Data Lake. Michael Lang May 2015 Data Governance in the Hadoop Data Lake Michael Lang May 2015 Introduction Product Manager for Teradata Loom Joined Teradata as part of acquisition of Revelytix, original developer of Loom VP of Sales

More information

PLATFORA INTERACTIVE, IN-MEMORY BUSINESS INTELLIGENCE FOR HADOOP

PLATFORA INTERACTIVE, IN-MEMORY BUSINESS INTELLIGENCE FOR HADOOP PLATFORA INTERACTIVE, IN-MEMORY BUSINESS INTELLIGENCE FOR HADOOP Your business is swimming in data, and your business analysts want to use it to answer the questions of today and tomorrow. YOU LOOK TO

More information

Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager

Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Blue Medora VMware vcenter Opera3ons Manager Management Pack for Oracle Enterprise Manager Oracle WebLogic J2EE on VMware Monitoring 203 Blue Medora LLC All rights reserved WebLogic on VMware Management

More information

2014 IANA FUNCTIONS CUSTOMER SERVICE SURVEY RESULTS. Survey by Ebiquity Report by Leo Vegoda & Marilia Hirano

2014 IANA FUNCTIONS CUSTOMER SERVICE SURVEY RESULTS. Survey by Ebiquity Report by Leo Vegoda & Marilia Hirano 2014 IANA FUNCTIONS CUSTOMER SERVICE SURVEY RESULTS Survey by Ebiquity Report by Leo Vegoda & Marilia Hirano November 2014 Table of Contents Survey objective 1 Executive summary 2 Methodology 4 General

More information

Merit Member Conference 2015 Does Migra+ng to a Virtualized Data Center Make Sense in Higher Educa+on?

Merit Member Conference 2015 Does Migra+ng to a Virtualized Data Center Make Sense in Higher Educa+on? Merit Member Conference 2015 Does Migra+ng to a Virtualized Data Center Make Sense in Higher Educa+on? is underway with a pilot migra8on from a tradi8onal university data center to a scalable virtualized

More information

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division

Lesson 13: DNS Security. Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Lesson 13: DNS Security Javier Osuna josuna@gmv.com GMV Head of Security and Process Consulting Division Introduction to DNS The DNS enables people to use and surf the Internet, allowing the translation

More information

SIDekICk SuspIcious DomaIn Classification in the.nl Zone

SIDekICk SuspIcious DomaIn Classification in the.nl Zone Master Thesis as part of the major in Security & Privacy at the EIT Digital Master School SIDekICk SuspIcious DomaIn Classification in the.nl Zone delivered by Moritz C. Müller moritz.muller@utwente.nl

More information