Network monitoring in high-speed links
|
|
|
- Junior Miller
- 10 years ago
- Views:
Transcription
1 Network monitoring in high-speed links Algorithms and challenges Pere Barlet-Ros Advanced Broadband Communications Center (CCABA) Universitat Politècnica de Catalunya (UPC) NGI course, 30 Nov / 36
2 Outline 1 Network monitoring 2 Addressing the technological barriers 3 Use cases 4 Addressing the social barriers 2 / 36
3 Outline 1 Network monitoring Introduction Active monitoring Passive monitoring Technological and social barriers 2 Addressing the technological barriers 3 Use cases 4 Addressing the social barriers 3 / 36
4 Introduction to network monitoring Process of measuring network systems and traffic Routers, switches, servers,... Network traffic volume, type, topology,... Monitoring is crucial for network operation and management Traffic engineering, capacity planning, BW management Fault diagnosis, troubleshooting, performance evaluation Accounting, billing, security,... Network measurements are important for networking research Design and evaluation of protocols, applications,... Traffic modeling and characterization Network monitoring is very challenging and datasets scarce From technological and social standpoint 4 / 36
5 Classification Classification of network monitoring tools and methods Hardware vs. software Online vs. offline LAN vs. WAN Protocol level Active vs. passive 5 / 36
6 Active monitoring Active tools are based on traffic injection Probe traffic generated by a measurement device Response to probe traffic is measured Pros: Flexibility Devices can be deployed at the edge (e.g., end-hosts) No instrumentation at the core is needed Measurement does not directly rely on existing traffic Cons: Intrusiveness Probe traffic can degrade network performance Probe traffic can impact on the measurement itself Main usages Performance evaluation (e.g., ping) Bandwidth estimation (e.g., pathload) Topology discovery (e.g., traceroute) 6 / 36
7 Passive monitoring Traffic collection from inside the network Routers and switches (e.g., Cisco NetFlow) Passive devices (e.g., libpcap, DAG cards, optical taps) Pros: Transparency Network performance is not affected No additional traffic is injected Useful even with a single measurement point Cons: Complexity Requires administrative access to network devices Requires explicit presence of traffic under study Online collection and analysis is hard (e.g., sampling) Privacy concerns Multiple and diverse usages Traffic analysis and classification,... Anomaly and intrusion detection,... 7 / 36
8 Technological and social barriers Datasets and platforms for research purposes are limited Outdated datasets Academic traffic only Anonymized and without payloads Technological barriers Internet was designed without monitoring in mind Collection of Gb/s and storage of TB/day Links speeds increase at faster pace than processing speeds Building monitoring apps is error-prone and time-consuming Social barriers Lack of coordination between projects ISPs have no incentive to share information Privacy and competition concerns Monitoring hardware is expensive and difficult to manage 8 / 36
9 Outline 1 Network monitoring 2 Addressing the technological barriers Bloom filters Bitmap algorithms Direct bitmaps and variants Bitmaps over sliding windows 3 Use cases 4 Addressing the social barriers 9 / 36
10 Technological challenges Few ns per packet Interarrivals 8ns (40Gb/s), 32ns (10Gb/s) Memory access times < 10ns (SRAM), tens of ns (DRAM) Obtaining simple metrics becomes extremely challenging Approaches based on hash tables do not scale Core of most monitoring algorithms E.g., Active flows, flow size distribution, heavy hitter detection, delay, entropy, sophisticated sampling,... Probabilistic approach: trade accuracy for speed Extremely efficient compared to compute exact answer Fit in SRAM, 1 access/pkt Probabilistic guarantees (bounded error) 10 / 36
11 Bloom filters 1 Space-efficient data structure to test set membership Based on hashing (e.g., pseudo-random hash functions) Examples of usage in network monitoring Replace hash tables to check if a flow has already been seen Definition of flow is flexible Advantages Small memory (SRAM) is needed compared to hash tables Limitations False positives are possible Removals are not possible (counting variants can support them) 1 B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Commun. ACM, 13(7), / 36
12 Bloom filters Parameters k: #hash functions m: size of the bitmap p: false positive rate n: #elements in the filter (max) Figure: Example of a bloom filter 2 2 A. Broder and M. Mitzenmacher. Network Applications of Bloom Filters: A Survey. Internet Mathematics, 1(4), / 36
13 Direct bitmaps (linear counting) 3 Space-efficient algorithms to count the number of unique items E.g., useful to count the number of flows over a fixed time interval Basic idea Each flow hashes to one position (and all its packets) Counting the number of 1 s is inaccurate due to collisions Count the number of unset positions instead E.g., 20KB to count 1M flows with 1% error Estimate formulae Flow hashes to a given bit: p = 1/b No flow hashes to a given bit: p z = (1 p) n (1/e) n/b Expected non-set bits: E[z] = bp z b(1/e) n/b Estimated number of flows: ˆn = b ln(b/z) 3 K.-Y. Whang et al. A linear-time probabilistic counting algorithm for database applications. ACM Trans. Database Syst., 15(2), / 36
14 Bitmap variants 4 Direct bitmaps scale linearly with the number of flows Variants: Virtual, multiresolution, adaptive, triggered bitmaps,... 4 C. Estan, G. Varghese, M. Fisk. Bitmap algorithms for counting active flows on high speed links. IEEE/ACM Trans. Netw. 14(5), / 36
15 Bitmaps over sliding windows Timestamp Vector (TSV) 5 Vector of timestamps (instead of bits) O(n) query cost Countdown Vector (CDV) 6 Vector of small timeout counters (instead of full timestamps) Independent query and update processes O(1) query cost 5 H. Kim, D. O Hallaron. Counting network flows in real time. In Proc. of IEEE Globecom, Dec J. Sanjuàs-Cuxart et al. Counting flows over sliding windows in high speed networks. In Proc. of IFIP/TC6 Networking, May / 36
16 CDV and TSV performance 30-min trace, 271 Mbps, 1 query/s, 50K/10s-1.8M/min flows 7 relative error w = 10 s, average error w = 10 s, 95 percentile of error w = 300 s, average error w = 300 s, 95 percentile of error w = 600 s, average error w = 600 s, 95 percentile of error counter initialization value Bytes 2.5 x 106 TSV TSV (extension) CDV window accesses/s 3 x 105 TSV TSV (extension) 2.5 CDV window 7 A hash table would require several MBs with these settings 16 / 36
17 Outline 1 Network monitoring 2 Addressing the technological barriers 3 Use cases Load shedding Lossy difference aggregator 4 Addressing the social barriers 17 / 36
18 Overload problem Previous solutions focus on a particular metric They are not valid for any (arbitrary) monitoring application Monitoring systems are prone to dramatic overload situations Link speeds, anomalous traffic, bursty traffic nature... Complexity of traffic analysis methods Overload situations lead to uncontrolled packet loss Severe and unpredictable impact on the accuracy of applications... when results are most valuable!! 18 / 36
19 Overload problem Previous solutions focus on a particular metric They are not valid for any (arbitrary) monitoring application Monitoring systems are prone to dramatic overload situations Link speeds, anomalous traffic, bursty traffic nature... Complexity of traffic analysis methods Overload situations lead to uncontrolled packet loss Severe and unpredictable impact on the accuracy of applications... when results are most valuable!! Load Shedding Scheme Efficiently handle extreme overload situations Over-provisioning is not feasible 18 / 36
20 Case study: Intel CoMo CoMo (Continuous Monitoring) 8 Open-source passive monitoring system Framework to develop and execute network monitoring applications Open (shared) network monitoring platform Traffic queries are defined as plug-in modules written in C Contain complex computations / 36
21 Case study: Intel CoMo CoMo (Continuous Monitoring) 8 Open-source passive monitoring system Framework to develop and execute network monitoring applications Open (shared) network monitoring platform Traffic queries are defined as plug-in modules written in C Contain complex computations Traffic queries are black boxes Arbitrary computations and data structures Load shedding cannot use knowledge of the queries / 36
22 Load shedding approach 9 Working scenario Monitoring system supporting multiple arbitrary queries Single resource: CPU cycles Approach: Real-time modeling of the queries CPU usage 1 Find correlation between traffic features and CPU usage Features are query agnostic with deterministic worst case cost 2 Exploit the correlation to predict CPU load 3 Use the prediction to decide the sampling rate 9 P. Barlet-Ros, G. Iannaccone, J. Sanjuàs-Cuxart, and J. Solé-Pareta.. IEEE/ACM Transactions on Networking, / 36
23 System overview Figure: Prediction and Load Shedding Subsystem 21 / 36
24 Traffic features vs CPU usage CPU cycles x Packets x Bytes tuple flows Time (s) Figure: CPU usage compared to the number of packets, bytes and flows 22 / 36
25 Traffic features vs CPU usage 2.8 x CPU cycles new_5tuple_hashes < <= new_5tuple_hashes < <= new_5tuple_hashes < 1000 new_5tuple_hashes >= packets/batch Figure: CPU usage versus the number of packets and flows 23 / 36
26 Prediction methodology 10 Multiple Linear Regression (MLR) Y i = β 0 + β 1 X 1i + β 2 X 2i + + β p X pi + ε i, i = 1, 2,..., n. Y i = n observations of the response variable (measured cycles) X ji = n observations of the p predictors (traffic features) β j = p regression coefficients (unknown parameters to estimate) ε i = n residuals (OLS minimizes SSE) 10 P. Barlet-Ros et al. Load Shedding in Network Monitoring Applications, In Proc. of USENIX Annual Technical Conf., / 36
27 Prediction methodology 10 Multiple Linear Regression (MLR) Y i = β 0 + β 1 X 1i + β 2 X 2i + + β p X pi + ε i, i = 1, 2,..., n. Y i = n observations of the response variable (measured cycles) X ji = n observations of the p predictors (traffic features) β j = p regression coefficients (unknown parameters to estimate) ε i = n residuals (OLS minimizes SSE) Feature selection Variant of the Fast Correlation-Based Filter (FCBF) Removes irrelevant and redundant predictors Reduces significantly the cost and improves accuracy of the MLR 10 P. Barlet-Ros et al. Load Shedding in Network Monitoring Applications, In Proc. of USENIX Annual Technical Conf., / 36
28 Load shedding scheme 11 Prediction and Load Shedding subsystem 1 Each 100ms of traffic is grouped into a batch of packets 2 The traffic features are efficiently extracted from the batch (multi-resolution bitmaps) 3 The most relevant features are selected (using FCBF) to be used by the MLR 4 MLR predicts the CPU cycles required by each query to run 5 Load shedding is performed to discard a portion of the batch 6 CPU usage is measured (using TSC) and fed back to the prediction system 11 P. Barlet-Ros et al. Robust network monitoring in the presence of non-cooperative traffic queries. Computer Networks, 53(3), / 36
29 Results: Load shedding performance 9 x CPU usage [cycles/sec] CoMo cycles Load shedding cycles Query cycles Predicted cycles CPU limit am 10 am 11 am 12 pm 01 pm 02 pm 03 pm 04 pm 05 pm time Figure: Stacked CPU usage (Predictive Load Shedding) 26 / 36
30 Results: Load shedding performance F(CPU usage) CPU limit per batch Predictive Original Reactive CPU usage [cycles/batch] x 10 8 Figure: CDF of the CPU usage per batch 27 / 36
31 Results: Packet loss 11 x x x Total DAG drops Unsampled packets 6 5 packets 6 5 packets Total DAG drops Total DAG drops Unsampled 0 09 am 10 am 11 am 12 pm 01 pm 02 pm 03 pm 04 pm 05 pm time (a) Original CoMo 0 09 am 10 am 11 am 12 pm 01 pm 02 pm 03 pm 04 pm 05 pm time (b) Reactive Load Shedding 0 09 am 10 am 11 am 12 pm 01 pm 02 pm 03 pm 04 pm 05 pm time (c) Predictive Load Shedding Figure: Link load and packet drops 28 / 36
32 Results: Error of the queries Query original reactive predictive application (pkts) 55.38% ± % ± % ±0.65 application (bytes) 55.39% ± % ± % ±0.76 counter (pkts) 55.03% ± % ± % ±0.50 counter (bytes) 55.06% ± % ± % ±0.60 flows 38.48% ± % ± % ±3.34 high-watermark 8.68% ± % ± % ±2.30 top-k destinations ± ± ± Error (%) Original Reactive Predictive 29 / 36
33 One-way delay measurement Traditional approaches are expensive Probing traffic (intrusive) Trajectory sampling Constant overhead per sample Alternative: LDA (Lossy Difference Aggregator) 12 Send only sums of timestamps Deal with packet loss (sampling + partition input stream) 12 R. Kompella et al. Every microsecond counts: tracking fine-grain latencies with a lossy difference aggregator. SIGCOMM, / 36
34 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b 31 / 36
35 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b (2 1)+(3 2)+... n = 1 (send n timestamps) 31 / 36
36 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b (2 1)+(3 2)+... n = 1 (send n timestamps) ( ) ( ) 4 = tb t a n = 1 (send just one ts) 31 / 36
37 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b # 15 5 # / 36
38 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b # 15 5 # 20 5 result: = 1 31 / 36
39 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b # 15 5 # 17 4 packet loss: mismatch in number of packets! must protect against packet loss 31 / 36
40 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b # # total: < 15, 5 > total: < 20, 5 > = 1 31 / 36
41 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b # # total: < 13, 4 > total: < 17, 4 > = 1 31 / 36
42 Lossy Difference Aggregator (LDA) (delay = 1) 1,2,...,5 2,3,...,6 a network b s # s # / 36
43 Dimensioning the packet sampling rate 13 PSR presents a classical tradeoff. The higher, the more packets it aggregates, but the higher the chance of counter invalidation We wish to maximize the exp. effective sample size: E [S] = (1 r) p n e n r p/b which is max. with p = b n r Original analysis obtained p 0.5 b n r our analysis doubles the sampling rate we improve sample size by 20% Best algorithm in terms of network overhead up to 25% loss 13 J. Sanjuàs-Cuxart et al. Validation and improvement of the Lossy Difference Aggregator to measure packet delays. TMA, / 36
44 Outline 1 Network monitoring 2 Addressing the technological barriers 3 Use cases 4 Addressing the social barriers CoMo-UPC initiative 33 / 36
45 The problem Several researchers working on: Anomaly Detection (AD) Traffic Classification (TC) Real packet traces are needed to test novel AD and TC methods Several AD and TC algorithms require: Unanonymized IP addresses (or prefix-preserving) Payload inspection (e.g., IDS, DPI,... ) Traditional solution: Anonymized traffic traces Examples: NLANR, CAIDA, CRAWDAD, / 36
46 The problem Several researchers working on: Anomaly Detection (AD) Traffic Classification (TC) Real packet traces are needed to test novel AD and TC methods Several AD and TC algorithms require: Unanonymized IP addresses (or prefix-preserving) Payload inspection (e.g., IDS, DPI,... ) Traditional solution: Anonymized traffic traces Examples: NLANR, CAIDA, CRAWDAD,... Anonymization is not the right solution! Data owners: Privacy concerns Researchers: Not enough data Lack of recent publicly available traces 34 / 36
47 CoMo-UPC 14 Move the code to the data Instead of publishing anonymized data traces Significantly lowers the privacy concerns Traffic data do not leave provider premises Data providers keep the ownership of the data The source code can be inspected by the data owner Researchers have (blind) access to unanonymized traffic IP addresses and payloads can be processed but not stored or exported The CoMo system is based on this model Implement AD and TC methods as CoMo modules / 36
48 UPC traffic UPC access link 1 GE full-duplex ( 900 Mbps, 60K flows/s) Connects 40 departments and 25 faculties (10 campuses) 12 traffic traces are also available 36 / 36
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
Custom Load Shedding for Non-Cooperative Network Monitoring Applications
Custom Load Shedding for Non-Cooperative Network Monitoring Applications Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC), Barcelona,
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Bitmap Algorithms for Counting Active Flows on High Speed Links. Elisa Jasinska [email protected]
Bitmap Algorithms for Counting Active Flows on High Speed Links Elisa Jasinska [email protected] Seminar: Internet Measurement Technische Universität Berlin - Deutsche Telekom Laboratories
Application Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Software-Defined Traffic Measurement with OpenSketch
Software-Defined Traffic Measurement with OpenSketch Lavanya Jose Stanford University Joint work with Minlan Yu and Rui Miao at USC 1 1 Management is Control + Measurement control - Access Control - Routing
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks
Adaptive Probing: A Monitoring-Based Probing Approach for Fault Localization in Networks Akshay Kumar *, R. K. Ghosh, Maitreya Natu *Student author Indian Institute of Technology, Kanpur, India Tata Research
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Enabling Flow-level Latency Measurements across Routers in Data Centers
Enabling Flow-level Latency Measurements across Routers in Data Centers Parmjeet Singh, Myungjin Lee, Sagar Kumar, Ramana Rao Kompella Purdue University Abstract Detecting and localizing latency-related
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Lecture 12: Network Management Architecture
Lecture 12: Network Management Architecture Prof. Shervin Shirmohammadi SITE, University of Ottawa Prof. Shervin Shirmohammadi CEG 4185 12-1 Defining Network Management Contains multiple layers: Business
TE in action. Some problems that TE tries to solve. Concept of Traffic Engineering (TE)
1/28 2/28 TE in action S-38.3192 Verkkopalvelujen tuotanto S-38.3192 Network Service Provisioning Networking laboratory 3/28 4/28 Concept of Traffic Engineering (TE) Traffic Engineering (TE) (Traffic Management)
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
Enabling Open-Source High Speed Network Monitoring on NetFPGA
Network Operations and Management Symposium (NOMS) 2012 Enabling Open-Source High Speed Network Monitoring on NetFPGA Gianni Antichi, Stefano Giordano Email: @iet.unipi.it Department of Information
Qcast : IP Multicast Traffic Monitoring System with IPFIX/PSAMP
IPTV Traffic Qcast : IP Multicast Traffic Monitoring System with IPFIX/PSAMP Shingo Kashima and Atsushi Kobayashi NTT Information Sharing Platform Laboratories FloCon 2010 2009 NTT Information Sharing
SMARTxAC: A Passive Monitoring and Analysis System for High-Speed Networks
SMARTxAC: A Passive Monitoring and Analysis System for High-Speed Networks Pere Barlet-Ros, Josep Solé-Pareta, Javier Barrantes, Eva Codina, Jordi Domingo-Pascual Advanced Broadband Communications Center
LOBSTER: Overview. LOBSTER: Large Scale Monitoring for Broadband Internet Infrastructure
LOBSTER: Overview LOBSTER: Large Scale Monitoring for Broadband Internet Infrastructure Herbert Bos* [email protected] http://www.cs.vu.nl/~herbertb Department of Computer Science Vrije Universiteit Amsterdam
Cisco Performance Agent Data Source Configuration in the Branch-Office Router
Deployment Guide Cisco Performance Agent Figure 1. Application visibility in all network segments using Performance Agent in branch office Cisco Performance Agent is a licensed software feature of Cisco
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Clearing the Way for VoIP
Gen2 Ventures White Paper Clearing the Way for VoIP An Alternative to Expensive WAN Upgrades Executive Overview Enterprises have traditionally maintained separate networks for their voice and data traffic.
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器
基 於 SDN 與 可 程 式 化 硬 體 架 構 之 雲 端 網 路 系 統 交 換 器 楊 竹 星 教 授 國 立 成 功 大 學 電 機 工 程 學 系 Outline Introduction OpenFlow NetFPGA OpenFlow Switch on NetFPGA Development Cases Conclusion 2 Introduction With the proposal
Introduction to Quality of Service. Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.
Introduction to Quality of Service Andrea Bianco Telecommunication Network Group [email protected] http://www.telematica.polito.it/ QoS Issues in Telecommunication Networks - 1 Quality of service
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
Hybrid network traffic engineering system (HNTES)
Hybrid network traffic engineering system (HNTES) Zhenzhen Yan, Zhengyang Liu, Chris Tracy, Malathi Veeraraghavan University of Virginia and ESnet Jan 12-13, 2012 [email protected], [email protected] Project
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks
Provider-Based Deterministic Packet Marking against Distributed DoS Attacks Vasilios A. Siris and Ilias Stavrakis Institute of Computer Science, Foundation for Research and Technology - Hellas (FORTH)
Network Performance Monitoring at Small Time Scales
Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA [email protected] Electrical and Computer Engineering Department University
Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking
Internet Protocol trace back System for Tracing Sources of DDoS Attacks and DDoS Detection in Neural Network Packet Marking 1 T. Ravi Kumar, 2 T Padmaja, 3 P. Samba Siva Raju 1,3 Sri Venkateswara Institute
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
MODELING RANDOMNESS IN NETWORK TRAFFIC
MODELING RANDOMNESS IN NETWORK TRAFFIC - LAVANYA JOSE, INDEPENDENT WORK FALL 11 ADVISED BY PROF. MOSES CHARIKAR ABSTRACT. Sketches are randomized data structures that allow one to record properties of
Nine Use Cases for Endace Systems in a Modern Trading Environment
FINANCIAL SERVICES OVERVIEW Nine Use Cases for Endace Systems in a Modern Trading Environment Introduction High-frequency trading (HFT) accounts for as much as 75% of equity trades in the US. As capital
Software Defined Traffic Measurement with OpenSketch
Software Defined Traffic Measurement with OpenSketch Minlan Yu Lavanya Jose Rui Miao University of Southern California Princeton University Abstract Most network management tasks in software-defined networks
Packet-Marking Scheme for DDoS Attack Prevention
Abstract Packet-Marking Scheme for DDoS Attack Prevention K. Stefanidis and D. N. Serpanos {stefanid, serpanos}@ee.upatras.gr Electrical and Computer Engineering Department University of Patras Patras,
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
Building a better NetFlow
Building a better NetFlow (to appear in SIGCOMM 2004) Cristian Estan, Ken Keys, David Moore, George Varghese University of California, San Diego IETF60 Aug 4, 2004 IPFIX WG UCSD CSE Disclaimers "NetFlow"
A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction
1 A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction Pere Barlet-Ros, Helena Pujol, Javier Barrantes, Josep Solé-Pareta, Jordi Domingo-Pascual Abstract SMARTxAC is a passive
Observer Probe Family
Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Cisco Integrated Services Routers Performance Overview
Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,
Effects of Interrupt Coalescence on Network Measurements
Effects of Interrupt Coalescence on Network Measurements Ravi Prasad, Manish Jain, and Constantinos Dovrolis College of Computing, Georgia Tech., USA ravi,jain,[email protected] Abstract. Several
Effects of Filler Traffic In IP Networks. Adam Feldman April 5, 2001 Master s Project
Effects of Filler Traffic In IP Networks Adam Feldman April 5, 2001 Master s Project Abstract On the Internet, there is a well-documented requirement that much more bandwidth be available than is used
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling
Reformulating the monitor placement problem: Optimal Network-wide wide Sampling Gianluca Iannaccone Intel Research @ Cambridge Joint work with: G. Cantieni,, P. Thiran (EPFL) C. Barakat (INRIA), C. Diot
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
SiteCelerate white paper
SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Traffic Monitoring in a Switched Environment
Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring
SLA para aplicaciones en redes WAN. Alvaro Cayo Urrutia
SLA para aplicaciones en redes WAN Alvaro Cayo Urrutia Quién es FLUKE NETWORKS? Enterprise SuperVision (ESV) Soluciones portátiles de prueba y análisis LAN y WAN distribuidas Infrastructure SuperVision
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
IP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France [email protected] 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation
Improving the Performance of TCP Using Window Adjustment Procedure and Bandwidth Estimation R.Navaneethakrishnan Assistant Professor (SG) Bharathiyar College of Engineering and Technology, Karaikal, India.
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS [email protected]
Introduction to Network Traffic Monitoring -ICS [email protected] http://www.ics.forth.gr/~markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas () Roadmap Motivation
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
How Much Broadcast and Multicast Traffic Should I Allow in My Network?
PowerConnect Application Note #5 November 2003 How Much Broadcast and Multicast Traffic Should I Allow in My Network? This Application Note relates to the following Dell PowerConnect products: PowerConnect
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks
Entropy-Based Collaborative Detection of DDoS Attacks on Community Networks Krishnamoorthy.D 1, Dr.S.Thirunirai Senthil, Ph.D 2 1 PG student of M.Tech Computer Science and Engineering, PRIST University,
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Scheduling using Optimization Decomposition in Wireless Network with Time Performance Analysis
Scheduling using Optimization Decomposition in Wireless Network with Time Performance Analysis Aparna.C 1, Kavitha.V.kakade 2 M.E Student, Department of Computer Science and Engineering, Sri Shakthi Institute
Monitoring of Internet traffic and applications
Monitoring of Internet traffic and applications Chadi BARAKAT INRIA Sophia Antipolis, France Planète research group ETH Zurich October 2009 Email: [email protected] WEB: http://www.inria.fr/planete/chadi
VoIP QoS on low speed links
Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia [email protected] QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical
Networking Topology For Your System
This chapter describes the different networking topologies supported for this product, including the advantages and disadvantages of each. Select the one that best meets your needs and your network deployment.
FlowRadar: A Better NetFlow for Data Centers
FlowRadar: A Better NetFlow for Data Centers Yuliang Li Rui Miao Changhoon Kim Minlan Yu University of Southern California Barefoot Networks Abstract NetFlow has been a widely used monitoring tool with
Monitoring and analyzing audio, video, and multimedia traffic on the network
Monitoring and analyzing audio, video, and multimedia traffic on the network Slavko Gajin [email protected] AMRES Academic Network of Serbia AMRES Academic Network of Serbia RCUB - Belgrade University
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Monitoring high-speed networks using ntop. Luca Deri <[email protected]>
Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
IPTV Traffic Monitoring System with IPFIX/PSAMP
IPTV Traffic Monitoring System with IPFIX/PSAMP Shingo Kashima NTT Information Sharing Platform Laboratories 3rd NMRG Workshop 2010 NTT Information Sharing Platform Laboratories Outline Introduction Motivation
CHAPTER 1 INTRODUCTION
21 CHAPTER 1 INTRODUCTION 1.1 PREAMBLE Wireless ad-hoc network is an autonomous system of wireless nodes connected by wireless links. Wireless ad-hoc network provides a communication over the shared wireless
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
Introduction to Performance Measurements and Monitoring. Vinayak Hegde [email protected] @vinayakh
Introduction to Performance Measurements and Monitoring Vinayak Hegde [email protected] @vinayakh 1 Structure Part 1 Basics of Measurement (40 min) Part 2 Basic Statistics primer (40 min) Part 3 Measurement
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Radware s Attack Mitigation Solution On-line Business Protection
Radware s Attack Mitigation Solution On-line Business Protection Table of Contents Attack Mitigation Layers of Defense... 3 Network-Based DDoS Protections... 3 Application Based DoS/DDoS Protection...
