Live Traffic Monitoring with Tstat: Capabilities and Experiences

Size: px
Start display at page:

Download "Live Traffic Monitoring with Tstat: Capabilities and Experiences"

Transcription

1 Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010

2 Outline Motivations Tstat - TCP STatistic and Analysis Tool Deployment Scenarios Features Layer-3 / Layer-4 Characterization Layer-7 Analysis and DPI LibTstat Outputs Gallery of Tstat Capabilities Conclusions

3 Traffic Classification & Measurement Why? Identify normal and anomalous behavior Characterize the network and its users Quality of service monitoring Traffic engineering Firewall tuning Pricing

4 Tstat at a Glance

5 Worm and Viruses? Did someone open a Christmas card? Happy new year to Windows!!

6 Anomalies (Good!) Spammer Disappear McColo SpamNet shut off on Tuesday, November 11th, 2008

7 New Applications P2PTV Fiorentina 4 - Udinese 2 Inter 1 - Juventus 0

8 TCP STatistic and Analysis Tool Tstat is a long term software project from the TLC Networks Group in Politecnico di Torino Project born to characterize the behavior of TCP connections Evolved to a full-fledged tool to monitor and analyze the traffic in IP networks Runs on most Linux/FreeBSD/NetBSD systems Working both as passive live sniffer and as offline trace analyzer Support for integration in other monitoring tools (libtstat)

9 Live Monitor Probe Just passively listen (sniff) the traffic passing on an operative link No need for special equipment Good performance with off-the-shelf hardware Manage hundreds of Mpbs with common PC hardware and integrated NIC Support for hi-end NIC cards Using Endace DAG able to manage a couple of Gbps of traffic with no fuss

10 Monitor Probe Setup LOCAL OUT IN EXTERN

11 Offline Traffic Analyzer Processing of already captured traffic traces for offline analysis Popular packet trace formats: pcap, erf, etherpeek Common compression formats: gzip, bzip, and 7zip

12 Tstat Workflow L7 L4 L3 Behavioral FSM DPI Pure DPI TCP/UDP IPv4/IPv6 Skype, Encrypted P2P Web, Mail, IM Peer-to-peer, P2P-TV #bytes, #flows, IP bitrate, packet length,

13 Tstat Workflow Layer 2 MAC encapsulation Tstat supports several MAC encapsulations (Ethernet, VLAN, MPLS), but no explicit statistic on them L4 L3 TCP/UDP IPv4/IPv6 Layer 3 IP IPv4 and IPv6 datagrams: anything different is ignored Layer 4 TCP and UDP Identification and complete characterization of TCP flows: flow length, lifetime, RTTs, window size, UDP flows: size, length, ports usage

14 Tstat Features L7 L4 Behavioral FSM DPI Pure DPI TCP/UDP Layer 7 Internet applications protocols L3 Pure Deep Packet Inspection Simple matching of known signatures in the packet payload P2P file sharing (emule/kad, Bittorrent), P2P-TV (Sopcast, PPLive, TVAnts) Finite State Machine DPI Mixes the Pure DPI with a FSM to consider packets in both directions Internet Protocols (HTTP,SMTP,SSL, SSH, ), Instant Messaging (MSN, Yahoo, Jabber), Web 2.0 Applications (Facebook, YouTube, RapidShare, Megaupload, ) Behavioral Classifier Classification of encrypted traffic through statistical properties Skype, Obfuscated emule/kad, Encrypted Bittorrent IPv4/IPv6

15 Tstat Outputs Connection Logs Text files reporting all of the relevant measures collected for the identified flows Histograms Text files collecting the empirical frequencies distributions for the collected parameters, saved at regular intervals RRD Round Robin Database Popular compact format to collect monitored statistics on several timescales. Used to monitor the probe through a CGI Web page Packed traces Dump of classes of packets into pcap traces for further elaborations

16 LibTstat Tstat can be compiled as a library to be linked with other measurement tools Simple API to pass packets to the Tstat engine The linking application can control all the aspects of the analyzed traffic Anonymization Packed payload Traffic filtering Successfully used by TIE (Univ. of Naples) and METAWIN (ftw.)

17 Where Tstat Lives

18 Gallery of Tstat Capabilities Live probe on the edge of the Politecnico campus network 1 Gbps link connecting to GARR, the Italian Research Network Traffic quite regular, with common workplace patterns (nine-to-five activity, no traffic in the weekends) Hybrid research/education/administration environment, so possibility of peculiar behaviors Traffic from February 2010

19 One Year of TCP Flows 40 flows [x1000] http smtp ssl/tsl unknown Apr May Jun Jul Aug Sep Oct Nov Dec Jan Feb Mar

20 IP Traffic bitrate [Mbps] tcp udp Bitrate Mon Tue Wed Thu Fri Sat Sun Mon 250 Flows flows [x1000] tcp udp -200 Mon Tue Wed Thu Fri Sat Sun Mon

21 IP Bitrate bitrate [Mbps] tcp udp Mon Tue Wed Thu Fri Sat Sun Mon

22 IP Flows flows [x1000] Mon Tue Wed Thu Fri Sat Sun Mon tcp udp

23 Chat Sessions flows msn act msn pre xmpp act xmpp pre yahoo act yahoo pre 0 Mon Tue Wed Thu Fri Sat Sun Mon

24 Tracked Flows flows [x1000] udp tcp 20 0 Mon Tue Wed Thu Fri Sat Sun Mon

25 CPU Load %cpu load max system+user system+user avg system avg 0 Mon Tue Wed Thu Fri Sat Sun Mon

26 TCP Bitrate per Application bitrate [Mbps] http bit+obf ssl/tls ssh other unknown Mon Tue Wed Thu Fri Sat Sun Mon

27 HTTP Bitrate per Application 50 0 bitrate [Mbps] http-get megaupload facebook -300 youtube rapidshare other Mon Tue Wed Thu Fri Sat Sun Mon

28 Conclusions Mature tool for network monitoring and analysis Always on the cutting edge, adapting to the changes in the Internet and to the research trends in networking outperform [other] signature based tools used in the literature (IMC 2009) Web site

29 Frågor?

30 Tack!

Live Traffic Monitoring with Tstat: Capabilities and Experiences

Live Traffic Monitoring with Tstat: Capabilities and Experiences Live Traffic Monitoring with Tstat: Capabilities and Experiences A. Finamore 1, M. Mellia 1,M.Meo 1, M.M. Munafò 1, and D. Rossi 2 1 Politecnico di Torino lastname@tlc.polito.it 2 TELECOM ParisTech dario.rossi@enst.fr

More information

Tstat - A Free Open Source Passive Monitoring Tool For ISP Networks

Tstat - A Free Open Source Passive Monitoring Tool For ISP Networks 1 1-year Experience of Internet Traffic Monitoring with Tstat A. Finamore M. Mellia M. Meo M. M. Munafò D. Rossi 1 Politecnico di Torino 2 TELECOM ParisTech email: {lastname@tlc.polito.it} email: dario.rossi@enst.fr

More information

Experiences of Internet Traffic Monitoring with Tstat

Experiences of Internet Traffic Monitoring with Tstat 1 Experiences of Internet Traffic Monitoring with Tstat A. Finamore M. Mellia M. Meo M. M. Munafò D. Rossi 1 Politecnico di Torino 2 TELECOM ParisTech email: {lastname@tlc.polito.it} email: dario.rossi@enst.fr

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS*

COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) CHARTERED BANK ADMINISTERED INTEREST RATES - PRIME BUSINESS* COMPARISON OF FIXED & VARIABLE RATES (25 YEARS) 2 Fixed Rates Variable Rates FIXED RATES OF THE PAST 25 YEARS AVERAGE RESIDENTIAL MORTGAGE LENDING RATE - 5 YEAR* (Per cent) Year Jan Feb Mar Apr May Jun

More information

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015

AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 AT&T Global Network Client for Windows Product Support Matrix January 29, 2015 Product Support Matrix Following is the Product Support Matrix for the AT&T Global Network Client. See the AT&T Global Network

More information

There e really is No Place Like Rome to experience great Opera! Tel: 01213 573 866 to discuss your break to the Eternal City!

There e really is No Place Like Rome to experience great Opera! Tel: 01213 573 866 to discuss your break to the Eternal City! There e really is No Place Like Rome to experience great Opera! Tel: 01213 573 866 to discuss your break to the Eternal City! Date Fri Location 11 Sep 2015 Teatro dell'opera di Roma Opera Sat 12 Sep 2015

More information

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply

More information

Firewall Testing Methodology W H I T E P A P E R

Firewall Testing Methodology W H I T E P A P E R Firewall ing W H I T E P A P E R Introduction With the deployment of application-aware firewalls, UTMs, and DPI engines, the network is becoming more intelligent at the application level With this awareness

More information

2016 Examina on dates

2016 Examina on dates Please note the following informa on: The following exams are available throughout the year: Please click on the exam for which you wish to see the dates. When you have finished, you can select to return

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

2015 Examination dates

2015 Examination dates Please note the following information: The following exams are available throughout the year: BULATS Paper-based: Please click on the exam for which you wish to see the dates. When you have finished, you

More information

Network Based Intrusion Detection Using Honey pot Deception

Network Based Intrusion Detection Using Honey pot Deception Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.

More information

IP Traffic Measurements 2008 Mobile Internet Usage Patterns

IP Traffic Measurements 2008 Mobile Internet Usage Patterns TKK HELSINKI UNIVERSITY OF TECHNOLOGY Department of Communications and Networking Mobile Internet Usage Patterns MoMI project Antti Riikonen, Antero Kivi Agenda Measurement Description Measurement Setup

More information

Controlling SSL Decryption. Overview. SSL Variability. Tech Note

Controlling SSL Decryption. Overview. SSL Variability. Tech Note Controlling Decryption Tech Note Overview Decryption is a key feature of the PA-4000 Series firewall. With it, -encrypted traffic is decrypted for visibility, control, and granular security. App-ID and

More information

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic

Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic MonNet a project for network and traffic monitoring Trends and Differences in Connection-behavior within Classes of Internet Backbone Traffic Wolfgang John, Sven Tafvelin and Tomas Olovsson Department

More information

Best Practices for Controlling Skype within the Enterprise > White Paper

Best Practices for Controlling Skype within the Enterprise > White Paper > White Paper Introduction Skype is continuing to gain ground in enterprises as users deploy it on their PCs with or without management approval. As it comes to your organization, should you embrace it

More information

UNIVERSITY OF DAYTON DAYTON OHIO 2015-2016 ACADEMIC CALENDAR

UNIVERSITY OF DAYTON DAYTON OHIO 2015-2016 ACADEMIC CALENDAR UNIVERSITY OF DAYTON DAYTON OHIO 2015-2016 ACADEMIC CALENDAR FALL 2015 Mon, Aug 3 Tue, Aug 18 Thu, Aug 20 Sat, Aug 22 Sat-Tue, Aug 22-25 Sun, Aug 23 Tue, Aug 25 Tue, Aug 25 Wed, Aug 26 Tue, Sep 1 Mon,

More information

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes.

Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. RimApp RoadBLOCK goes beyond simple filtering! Many network and firewall administrators consider the network firewall at the network edge as their primary defense against all network woes. However, traditional

More information

Analysis One Code Desc. Transaction Amount. Fiscal Period

Analysis One Code Desc. Transaction Amount. Fiscal Period Analysis One Code Desc Transaction Amount Fiscal Period 57.63 Oct-12 12.13 Oct-12-38.90 Oct-12-773.00 Oct-12-800.00 Oct-12-187.00 Oct-12-82.00 Oct-12-82.00 Oct-12-110.00 Oct-12-1115.25 Oct-12-71.00 Oct-12-41.00

More information

Flow Analysis Versus Packet Analysis. What Should You Choose?

Flow Analysis Versus Packet Analysis. What Should You Choose? Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation

More information

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV)

LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY. 1st TERM (14 SEPT - 27 NOV) LAUREA MAGISTRALE - CURRICULUM IN INTERNATIONAL MANAGEMENT, LEGISLATION AND SOCIETY 1st TERM (14 SEPT - 27 NOV) Week 1 9.30-10.30 10.30-11.30 11.30-12.30 12.30-13.30 13.30-14.30 14.30-15.30 15.30-16.30

More information

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8

Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138. Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 1 of 138 Exhibit 8 Case 2:08-cv-02463-ABC-E Document 1-4 Filed 04/15/2008 Page 2 of 138 Domain Name: CELLULARVERISON.COM Updated Date: 12-dec-2007

More information

Computer Networks. Secure Systems

Computer Networks. Secure Systems Computer Networks Secure Systems Summary Common Secure Protocols SSH HTTPS (SSL/TSL) IPSec Wireless Security WPA2 PSK vs EAP Firewalls Discussion Secure Shell (SSH) A protocol to allow secure login to

More information

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009

Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Validate the performance and security of IPS/IDS, Firewall and Proxy - January 2009 Gregory Fresnais gfresnais@bpointsys.com +33672510922 Director of International Business Development BreakingPoint Systems

More information

How To Write A Blog Post On Dropbox

How To Write A Blog Post On Dropbox Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IMC 2012 Boston Motivation and goals 1/14 Personal cloud storage

More information

Inside Dropbox: Understanding Personal Cloud Storage Services

Inside Dropbox: Understanding Personal Cloud Storage Services Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage

More information

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA

CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA CLASSIFYING NETWORK TRAFFIC IN THE BIG DATA ERA Professor Yang Xiang Network Security and Computing Laboratory (NSCLab) School of Information Technology Deakin University, Melbourne, Australia http://anss.org.au/nsclab

More information

Statistics for www.brageboden.se (2008-08)

Statistics for www.brageboden.se (2008-08) Statistics for www.brageboden.se (-08) Sida 1 av 5-08-10 Last Update: 10 Aug - 10:39 Reported period: Aug OK Summary Reported period Month Aug First visit 01 Aug - 02:19 Last visit 10 Aug - 07:08 Unique

More information

Intrusion Detection System

Intrusion Detection System Intrusion Detection System Time Machine Dynamic Application Detection 1 NIDS: two generic problems Attack identified But what happened in the past??? Application identification Only by port number! Yet

More information

Kick starting science...

Kick starting science... Computer ing (TDDD63): Part 1 Kick starting science... Niklas Carlsson, Associate Professor http://www.ida.liu.se/~nikca/ What do you have in the future? What do you have in the future? How does it keep

More information

Open Source in Network Administration: the ntop Project

Open Source in Network Administration: the ntop Project Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:

More information

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017

Enhanced Vessel Traffic Management System Booking Slots Available and Vessels Booked per Day From 12-JAN-2016 To 30-JUN-2017 From -JAN- To -JUN- -JAN- VIRP Page Period Period Period -JAN- 8 -JAN- 8 9 -JAN- 8 8 -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- -JAN- 8-JAN- 9-JAN- -JAN- -JAN- -FEB- : days

More information

Introducing IBM s Advanced Threat Protection Platform

Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Advanced Threat Protection Platform Introducing IBM s Extensible Approach to Threat Prevention Paul Kaspian Senior Product Marketing Manager IBM Security Systems 1 IBM NDA 2012 Only IBM

More information

Nara Training & Assessing Training Calendar December 2013- March 2014

Nara Training & Assessing Training Calendar December 2013- March 2014 Nara Training & Assessing Training Calendar December 2013- March 2014 Please find attached Training Calendar for the next quarter. Please contact Natalie Bryce on 9725 6826 for current places available

More information

DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011]

DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011] DISSECTING VIDEO SERVER SELECTION STRATEGIES IN THE CDN [ICDCS 2011] Alessandro Finamore Marco Mellia Maurizio Munafò Ruben Torres Sanjay Rao 2nd TMA PhD School Objectives 1 YouTube is the most popular

More information

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief

App-ID. PALO ALTO NETWORKS: App-ID Technology Brief App-ID Application Protocol Detection / Decryption Application Protocol Decoding Application Signature Heuristics App-ID uses as many as four identification techniques to determine the exact identity of

More information

Layered protocol (service) architecture

Layered protocol (service) architecture Layered protocol (service) architecture The Internet is complex! many pieces : hosts access network routers links of various media applications protocols Question: Is there any hope of organizing a structure

More information

Protocols. Packets. What's in an IP packet

Protocols. Packets. What's in an IP packet Protocols Precise rules that govern communication between two parties TCP/IP: the basic Internet protocols IP: Internet Protocol (bottom level) all packets shipped from network to network as IP packets

More information

Transactions. Georgian Technical University. AUTOMATED CONTROL SYSTEMS - No 1(8), 2010

Transactions. Georgian Technical University. AUTOMATED CONTROL SYSTEMS - No 1(8), 2010 EFFECTIVE BLOCKING OF THE SKYPE PROTOCOL WITH CISCO IOS NATIVE FEATURES Kartvelishvili Mikheil, Davitashvili Nicolas Green Networks Ltd., Tbilisi, Georgia, O. Kartvelishvili - GTU, Georgia Abstract The

More information

Scalable Extraction, Aggregation, and Response to Network Intelligence

Scalable Extraction, Aggregation, and Response to Network Intelligence Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues

More information

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture

CSIS 3230. CSIS 3230 Spring 2012. Networking, its all about the apps! Apps on the Edge. Application Architectures. Pure P2P Architecture Networking, its all about the apps! CSIS 3230 Chapter 2: Layer Concepts Chapter 5.4: Link Layer Addressing Networks exist to support apps Web Social ing Multimedia Communications Email File transfer Remote

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PACKET SNIFFING MS. SONALI A. KARALE 1, MS. PUNAM P. HARKUT 2 HVPM COET Amravati.

More information

REPORT & ENFORCE POLICY

REPORT & ENFORCE POLICY App-ID KNOWN PROTOCOL DECODER Start Decryption (SSL or SSH) Decode Signatures Policy IP/Port Policy Application Signatures Policy IDENTIFIED TRAFFIC (NO DECODING) UNKNOWN PROTOCOL DECODER Apply Heuristics

More information

Versus Certification Training 2016 Guideline of Versus Technical Education Courses

Versus Certification Training 2016 Guideline of Versus Technical Education Courses Guideline of Versus Technical Education Courses General Information Instructor-Led Training Classes begin promptly at 8:30 am each day. When making travel arrangements, it is generally best to assume that

More information

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser)

How To Control Your Network With A Firewall On A Network With An Internet Security Policy On A Pc Or Ipad (For A Web Browser) 1110 Cool Things Your Firewall Should Do Extend beyond blocking network threats to protect, manage and control application traffic Table of Contents The Firewall Grows Up 1 What does SonicWALL Application

More information

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER

11 THINGS YOUR FIREWALL SHOULD DO. a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 11 THINGS YOUR FIREWALL SHOULD DO a publication of 2012 INVENIO IT A SMALL BUSINESS WHITEPAPER 2 THE GUIDE OF BY DALE SHULMISTRA Dale Shulmistra is a Technology Strategist at Invenio IT, responsible for

More information

Lab 1: Packet Sniffing and Wireshark

Lab 1: Packet Sniffing and Wireshark Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.

More information

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013

SOUTHERN POLYTECHNIC STATE UNIVERSITY. Snort and Wireshark. IT-6873 Lab Manual Exercises. Lucas Varner and Trevor Lewis Fall 2013 SOUTHERN POLYTECHNIC STATE UNIVERSITY Snort and Wireshark IT-6873 Lab Manual Exercises Lucas Varner and Trevor Lewis Fall 2013 This document contains instruction manuals for using the tools Wireshark and

More information

CONSTRUCTION AND MANAGEMENT OF A SECURE NETWORK IN SPRING-8

CONSTRUCTION AND MANAGEMENT OF A SECURE NETWORK IN SPRING-8 1th ICALEPCS Int. Conf. on Accelerator & Large Expt. Physics Control Systems. Geneva, 1-14 Oct 2, TU3.2-3O (2) CONSTRUCTION AND MANAGEMENT OF A SECURE NETWORK IN SPRING-8 M. Ishii, T. Fukui, M. Kodera,

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Data driven approach in analyzing energy consumption data in buildings. Office of Environmental Sustainability Ian Tan

Data driven approach in analyzing energy consumption data in buildings. Office of Environmental Sustainability Ian Tan Data driven approach in analyzing energy consumption data in buildings Office of Environmental Sustainability Ian Tan Background Real time energy consumption data of buildings in terms of electricity (kwh)

More information

VisuSniff: A Tool For The Visualization Of Network Traffic

VisuSniff: A Tool For The Visualization Of Network Traffic VisuSniff: A Tool For The Visualization Of Network Traffic Rainer Oechsle University of Applied Sciences, Trier Postbox 1826 D-54208 Trier +49/651/8103-508 oechsle@informatik.fh-trier.de Oliver Gronz University

More information

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw

SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術. 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw SDN 交 換 機 核 心 技 術 - 流 量 分 類 以 及 應 用 辨 識 技 術 黃 能 富 教 授 國 立 清 華 大 學 特 聘 教 授, 資 工 系 教 授 E-mail: nfhuang@cs.nthu.edu.tw Contents 1 2 3 4 5 6 Introduction to SDN Networks Key Issues of SDN Switches Machine

More information

Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP

Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP Smart Network Access System SmartNA 10 Gigabit Aggregating Filtering TAP Gain Access and Visibility to your 10 Gigabit Links Today! 10 Gigabit SR or LR Passive Optical TAP or connect two (2) 10 Gigabit

More information

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping

Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Getting the Most Out of Your Existing Network A Practical Guide to Traffic Shaping Executive Summary As organizations

More information

Fine-grained traffic classification with Netflow data

Fine-grained traffic classification with Netflow data Fine-grained traffic classification with Netflow data Dario Rossi, Silvio Valenti Telecom ParisTech, France INFRES Department first.last@enst.fr ABSTRACT Nowadays Cisco Netflow is the de facto standard

More information

The Next Generation Firewall The Policy and Security Control Point

The Next Generation Firewall The Policy and Security Control Point The Next Generation Firewall The Policy and Security Control Point By Jim Metzler Jim@Kubernan.Com Introduction In the IT industry, the phrase next generation is used quite frequently. Vendors often use

More information

Networking for Caribbean Development

Networking for Caribbean Development Networking for Caribbean Development BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n o g. o r g N E T W O R K I N G F O R C A R I B B E A N D E V E L O P M E N T BELIZE NOV 2 NOV 6, 2015 w w w. c a r i b n

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

SECURE P2P VOICE OVER IP USING DEEP PACKET INSPECTION

SECURE P2P VOICE OVER IP USING DEEP PACKET INSPECTION SECURE P2P VOICE OVER IP USING DEEP PACKET INSPECTION 1 Satish N. Gujar, 2 Dr. V.M.Thakare 1 Information Technology Department,Shri Jagdish Prasad Jhabarmal Tibrewala University, Rajasthan 2 Computer Science

More information

Alcohol. Alcohol SECTION 10. Contents:

Alcohol. Alcohol SECTION 10. Contents: Contents: Alcohol Alcohol SECTION 1 Figure 1.1 Number of Collisions and Victims Involving Alcohol by Year 69 1.2 Per cent of Collisions and Victims Involving Alcohol by Year 7 1.3 Alcohol-Involved Collisions

More information

An Experience of Monitoring University Network Security Using a Commercial Service and DIY Monitoring

An Experience of Monitoring University Network Security Using a Commercial Service and DIY Monitoring An Experience of Monitoring University Network Security Using a Commercial Service and DIY Monitoring Masato Masuya Kagoshima University 1-21-35 Korimoto, Kagoshima Kagoshima 890-0065, Japan +81-99-285-7474

More information

Uncovering the Big Players of the Web

Uncovering the Big Players of the Web Uncovering the Big Players of the Web 3 rd TMA Workshop Vienna March 12 Vinicius Gehlen Alessandro Finamore Marco Mellia Maurizio M. Munafò TMA COST Action Introduction 2 Nowadays Internet traffic volume

More information

EKT 332/4 COMPUTER NETWORK

EKT 332/4 COMPUTER NETWORK UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)

More information

Ethereal: Getting Started

Ethereal: Getting Started Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me

More information

Network Packet Analysis and Scapy Introduction

Network Packet Analysis and Scapy Introduction Copyright: The development of this document is funded by Higher Education of Academy. Permission is granted to copy, distribute and /or modify this document under a license compliant with the Creative

More information

Network Agent Quick Start

Network Agent Quick Start Network Agent Quick Start Topic 50500 Network Agent Quick Start Updated 17-Sep-2013 Applies To: Web Filter, Web Security, Web Security Gateway, and Web Security Gateway Anywhere, v7.7 and 7.8 Websense

More information

Application of Internet Traffic Characterization to All-Optical Networks

Application of Internet Traffic Characterization to All-Optical Networks Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio

More information

Canaveral Port Authority Master Cruise Ship Schedule -- FY 2015

Canaveral Port Authority Master Cruise Ship Schedule -- FY 2015 Dec 25, 2014 Thu CT10 Dec 25, 2014 Thu CT8 Dec 25, 2014 Thu CT6 Dec 25, 2014 Thu CT5 Dec 25, 2014 Thu CT1 Dec 25, 2014 Thu CT3 Dec 26, 2014 Fri CT10 Enchantment of the Seas 0700 1630 Royal Caribbean ICS

More information

Wireshark Tutorial. Figure 1: Packet sniffer structure

Wireshark Tutorial. Figure 1: Packet sniffer structure Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer Wireshark. Wireshark would be used for the lab experiments. This document introduces the basic operation

More information

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison

Deep Security/Intrusion Defense Firewall - IDS/IPS Coverage Statistics and Comparison Deep Security/Intrusion Defense Firewall - IDS/IPS Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security and Intrusion Defense Firewall. The document

More information

Wireshark Tutorial INTRODUCTION

Wireshark Tutorial INTRODUCTION Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation

More information

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK

DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK DELIVERING APPLICATION ANALYTICS FOR AN APPLICATION FLUENT NETWORK INTRODUCTION Managing and designing an enterprise network is becoming more complex. Delivering real-time applications is a top priority

More information

Introduction to Netflow

Introduction to Netflow Introduction to Netflow Mike Jager Network Startup Resource Center mike.jager@synack.co.nz These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)

More information

Intrusion Detection Systems (IDS)

Intrusion Detection Systems (IDS) Intrusion Detection Systems (IDS) What are They and How do They Work? By Wayne T Work Security Gauntlet Consulting 56 Applewood Lane Naugatuck, CT 06770 203.217.5004 Page 1 6/12/2003 1. Introduction Intrusion

More information

Analysis of Network Packets. C DAC Bangalore Electronics City

Analysis of Network Packets. C DAC Bangalore Electronics City Analysis of Network Packets C DAC Bangalore Electronics City Agenda TCP/IP Protocol Security concerns related to Protocols Packet Analysis Signature based Analysis Anomaly based Analysis Traffic Analysis

More information

UNIVERSITY OF DAYTON DAYTON OHIO 2013-2014 ACADEMIC CALENDAR (Subject to Change)

UNIVERSITY OF DAYTON DAYTON OHIO 2013-2014 ACADEMIC CALENDAR (Subject to Change) UNIVERSITY OF DAYTON DAYTON OHIO 2013-2014 ACADEMIC CALENDAR (Subject to Change) FALL 2013 Mon, Aug 5 Fri, Aug 16 Sat-Tue, Aug 17-20 Sat, Aug 17 Sun, Aug 18 Tue, Aug 20 Tue, Aug 20 Wed, Aug 21 Tue, Aug

More information

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts

More information

TRACING OF VOIP TRAFFIC IN THE RAPID FLOW INTERNET BACKBONE

TRACING OF VOIP TRAFFIC IN THE RAPID FLOW INTERNET BACKBONE TRACING OF VOIP TRAFFIC IN THE RAPID FLOW INTERNET BACKBONE A.Jenefa 1, Blessy Selvam 2 1 Teaching Fellow, Computer Science and Engineering, Anna University (BIT campus), TamilNadu, India 2 Teaching Fellow,

More information

The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies

The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies The Need for an Intelligent Measurement Plane: the Example of Time-Variant CDN Policies A. Finamore, V. Gehlen, M. Mellia, M. M. Munafò Politecnico di Torino, Italy Email: lastname@tlc.polito.it S. Nicolini

More information

High-Speed Network Traffic Monitoring Using ntopng. Luca Deri @lucaderi

High-Speed Network Traffic Monitoring Using ntopng. Luca Deri @lucaderi High-Speed Network Traffic Monitoring Using ntopng Luca Deri @lucaderi Some History In 1998, the original ntop has been created. It was a C-based app embedding a web server able to capture traffic and

More information

Niagara IT Manager s Guide

Niagara IT Manager s Guide 3951 Westerre Parkway, Suite 350 Richmond, VA 23233 804.747.4771 Phone 804.747.5204 FAX Niagara IT Manager s Guide A White Paper An IT Manager s Guide to Niagara This document addresses some of the common

More information

Clustering as an add-on for firewalls

Clustering as an add-on for firewalls Clustering as an add-on for firewalls C. Caruso & D. Malerba Dipartimento di Informatica, University of Bari, Italy. Abstract The necessary spread of the access points to network services makes them vulnerable

More information

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Firewalls and VPNs. Principles of Information Security, 5th Edition 1 Firewalls and VPNs Principles of Information Security, 5th Edition 1 Learning Objectives Upon completion of this material, you should be able to: Understand firewall technology and the various approaches

More information

2015 Timetables 20151118 / HEL STO

2015 Timetables 20151118 / HEL STO 2015 Timetables 20151118 / HEL STO HELSINKI-MARIEHAMN-STOCKHOLM SILJA SERENADE, SILJA SYMPHONY 09.11-31.12.2015 Helsinki Mariehamn 17:00 04:15/04:25 09:45 Mariehamn Helsinki 16:45 23:45/23:55 10:30 Even

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,

More information

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison

Deep Security Intrusion Detection & Prevention (IDS/IPS) Coverage Statistics and Comparison Deep Security Intrusion Detection & Prevention (IDS/IPS) Trend Micro, Incorporated A technical brief summarizing vulnerability coverage provided by Deep Security. The document also outlines a comparison

More information

Second-generation (GenII) honeypots

Second-generation (GenII) honeypots Second-generation (GenII) honeypots Bojan Zdrnja CompSci 725, University of Auckland, Oct 2004. b.zdrnja@auckland.ac.nz Abstract Honeypots are security resources which trap malicious activities, so they

More information

IDS / IPS. James E. Thiel S.W.A.T.

IDS / IPS. James E. Thiel S.W.A.T. IDS / IPS An introduction to intrusion detection and intrusion prevention systems James E. Thiel January 14, 2005 S.W.A.T. Drexel University Overview Intrusion Detection Purpose Types Detection Methods

More information

Load Balance Router R258V

Load Balance Router R258V Load Balance Router R258V Specification Hardware Interface WAN - 5 * 10/100M bps Ethernet LAN - 8 * 10/100M bps Switch Reset Switch LED Indicator Power - Push to load factory default value or back to latest

More information

NORTH EAST Regional Road Safety Resource

NORTH EAST Regional Road Safety Resource NORTH EAST Regional Road Safety Resource Project Report: 1. Regional Overview of Pedal Cycle Accidents 2005 2007. Produced May 2008. Natalie Goodman Project is supported by the Department of Transport.

More information

2015 2016 Training. 2015 Assessments. 2016 Assessments NAEP Assessments (selected sample)

2015 2016 Training. 2015 Assessments. 2016 Assessments NAEP Assessments (selected sample) Jan 11 (Mon) ESC training for the 2016 state assessment program Jan 29 (Fri) Completion date for training of district testing coordinators by ESCs Test Date(s) TAKS Oct 19 (Mon) Oct 20 (Tues) Oct 21 (Wed)

More information

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent

Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent IEEE ICC 2013 - Communication Software and Services Symposium 1 Classifying P2P Activity in Netflow Records: A Case Study on BitTorrent Ahmed Bashir 1, Changcheng Huang 1, Biswajit Nandy 2, Nabil Seddigh

More information

Applications erode the secure network How can malware be stopped?

Applications erode the secure network How can malware be stopped? Vulnerabilities will continue to persist Vulnerabilities in the software everyone uses everyday Private Cloud Security It s Human Nature Programmers make mistakes Malware exploits mistakes Joe Gast Recent

More information

Network Monitoring and Management NetFlow Overview

Network Monitoring and Management NetFlow Overview Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)

More information

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1, Matěj Grégr 2 and Pavel Čeleda1 1 CESNET, z.s.p.o., Zikova 4, 160 00 Prague, Czech Republic martin.elich@gmail.com,

More information

INTRUSION DETECTION SYSTEMS and Network Security

INTRUSION DETECTION SYSTEMS and Network Security INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS

More information

Network sniffing packet capture and analysis

Network sniffing packet capture and analysis Network sniffing packet capture and analysis October 3, 2014 Administrative submittal instructions answer the lab assignment s 13 questions in numbered list form, in a Word document file. (13 th response

More information

Computer Networks & Security 2014/2015

Computer Networks & Security 2014/2015 Computer Networks & Security 2014/2015 IP Protocol Stack & Application Layer (02a) Security and Embedded Networked Systems time Protocols A human analogy All Internet communication is governed by protocols!

More information