Internet topology and performance analytics for mapping critical network infrastructure
|
|
|
- Brent Parrish
- 10 years ago
- Views:
Transcription
1 CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy December
2 Team Profile Center for Applied Internet Data Analysis (CAIDA) Founded by PI and Director k claffy Independent analysis and research group 15+ years experience in data collection, curation, and research Known for data collection tools, analysis, and data sharing located at the UC San Diego s Supercomputer Center Key personnel: Bradley Huffaker, Young Hyun, Marina Fomenkov, Josh Polterock, Ken Keys, Matthew Luckie 2
3 Need: Situational Awareness of Internet Fundamental Global Cybersecurity Challenge The Internet s scope and complexity is growing faster than our capability to understand or measure its structure, dynamics, or vulnerabilities. [46k independent networks: typically commercial, competitive, opaque] 3
4 Approach: Infrastructure, Data, Analytics 1. Design, implement, validate measurement algorithms Sustainable and scalable system design 2. Deploy and manage measurement infrastructure 106+ Archipelago monitors (38 IPv6, 58 Pi s, 36 RadClock) Continually and comprehensively probe IP address space 3. Apply algorithms and infrastructure to improve integrity and scope of maps Derive router- and AS-level topologies Curated data kits shared with researchers (ITDK) 4. Inform real-world problems with better understanding of the Internet s structure, routing dynamics, performance, and vulnerabilities 4
5 Approach: Increase Completeness, Accuracy and Richness of Topology Map AS Ranking by Customer Cones (BCP38) Archipelago Router-level map PoP- level map Operator valida0on 5
6 Approach: Curate Data to Enable Others Synthesize data to curate Internet Topology Data Kit Augment with BGP, DNS lookups, geolocation data, other sources of trace route data Derived: IP paths, AS paths, router aliases Results: relationship-aware AS graph; AS-to- Organization mappings; router graph including geolocation & ownership [Eventually] support interactive use of data kit 6
7 Approach: ITDK WorkFlow cyberspace is complicated! Center for Applied Internet Data Analysis ITDK: Internet Topology Data Kit Process IP traceroute BGP looking servers glass servers BGP BGP looking glass glass servers BGP Collectors CAIDA DDec Internet digital envoy Netacuity MAXMIND GeoLite City DNS DNS servers servers data collectors data servers CAIDA A rchipelago scamper MIDAR data files data processes iffinder geographic IPv4 address geolocation AS level BGP paths geographic IPv4 address geolocation DNS HostDB hostnames IP level Ark traces MIDAR router aliases Iffinder AS relationship complex AS relationship multi-lateral peering AS relationship peering from traceroute AS Relationship conventional Geolocation process DRoP hostname decode AS Assignment process Filter IP Hostnames process kapar process AS relationships conventional peering AS relationships conventional AS relationships complex new AS relationships conventional AS graph AS customer cone ITDK Datasets router geolocation router AS assignment hostnames router graph nodes links 7
8 Benefits: Enabling Wide Range of Security and Stability Research router topology mapping and validation architecting interdomain atlas of congestion Structure business relationship inference and validation filter policy congruity scalable measurement systems Performance Security mapping of fragility evolution of advanced TCP features understanding TCP s resilience to attacks forged address detection and mitigation
9 Benefits: Broader Impact macroscopic topology, AS rank Network intelligence: prefix hijacking, outages broader impacts Network intelligence: TreasureMap TR: DNS server placement CCS: routing bottlenecks IMC: mapping google expansion PAM: policy violations IMC: MPLS deployment TR: defend against Tor adversaries IMC: router fingerprinting IMC: ECN readiness PAM: traceroute pitfalls 9
10 Macroscopic Internet Graph 2014 (v4,6) 10
11 Competition Related Work In academics, we view as related work rather than competition and try to reduce unnecessary redundancy. RIPE Atlas ( Internet Atlas ( iplane datasets ( DIMES ( zmap ( Renesys ( recently acquired by Dyn 11
12 Current Status: Recent achievements (infrastructure, software/services, data) Deployed 27 Ark nodes (2014) bringing total to 106 Implemented & deployed Dolphin: bulk DNS resolution tool public release of DNS Decoder (DDec) automated hostnamebased geolocation data store and feedback collection service released beta version of interactive intermediate (PoP/citylevel) map validation functionality for testing & feedback (Apr) produced new AS classification derived from: darknet traffic data, AS-relationships, BGP announcements, peeringdb released April 2014 Internet Topology Data Kit (ITDK), with router and BGP-derived AS level topology published AS Core Topology Graph poster for 2014 new interactive data interface (caida.org tab) 12
13 Current Status: Recent achievements (publications, workshops, predictions) two papers at IMC2014 (&TPRC14): Fine-Grained AS Relationship Inference and Challenges in Inferring Internet Interdomain Congestion ACM SIGCOMM CCR papers on DNS-based router positioning (DRoP), spurious routes in BGP data two papers to appear PAM2015: IPv6 AS Relationships, Clique, and Congruence, Measuring and Characterizing IPv6 Router Availability (collaboration with NPS.edu) invited panel (slides&video online): Internet Architecture Innovation: 2020 and 2030, Duke Law s Center for Innovation Policy Forum Active Internet Measurement Workshop (AIMS2014) Workshop on Internet Economics (WIE2014) New CAIDA program plan
14 Next Steps: CAIDA Interactive Interactive views of data that allows users to: Learn from annotated Internet data Provide feedback on analysis & inference methods Execute on-demand measurements Correlate with other data sources Aiming for user-friendly interface to topology data and infrastructure AS Rank as-rank.caida.org DDec ddec.caida.org DatCat CHARTH USE charthouse.caida.org Vela vela.caida.org 14
15 Contact Information k claffy [email protected] 15
High-Frequency Active Internet Topology Mapping
High-Frequency Active Internet Topology Mapping Cyber Security Division 2012 Principal Investigators Meeting October 10, 2012 Robert Beverly Assistant Professor Naval Postgraduate School [email protected]
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies
The Joint Degree Distribution as a Definitive Metric of the Internet AS-level Topologies Priya Mahadevan, Dimitri Krioukov, Marina Fomenkov, Brad Huffaker, Xenofontas Dimitropoulos, kc claffy, Amin Vahdat
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé
Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective
Active Measurements: traceroute
Active Measurements: traceroute 1 Tools: Traceroute Exploit TTL (Time to Live) feature of IP When a router receives a packet with TTL=1, packet is discarded and ICMP_time_exceeded returned to sender Operational
Distributed Systems. 23. Content Delivery Networks (CDN) Paul Krzyzanowski. Rutgers University. Fall 2015
Distributed Systems 23. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2015 November 17, 2015 2014-2015 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Distributed Systems. 25. Content Delivery Networks (CDN) 2014 Paul Krzyzanowski. Rutgers University. Fall 2014
Distributed Systems 25. Content Delivery Networks (CDN) Paul Krzyzanowski Rutgers University Fall 2014 November 16, 2014 2014 Paul Krzyzanowski 1 Motivation Serving web content from one location presents
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option
A Second Look at Detecting Third-Party Addresses in Traceroute Traces with the IP Timestamp Option Matthew Luckie and kc claffy {mjl,kc}@caida.org CAIDA, UC San Diego, USA Abstract. Artifacts in traceroute
Outline. EE 122: Interdomain Routing Protocol (BGP) BGP Routing. Internet is more complicated... Ion Stoica TAs: Junda Liu, DK Moon, David Zats
Outline EE 22: Interdomain Routing Protocol (BGP) Ion Stoica TAs: Junda Liu, DK Moon, David Zats http://inst.eecs.berkeley.edu/~ee22/fa9 (Materials with thanks to Vern Paxson, Jennifer Rexford, and colleagues
PORTOLAN. Probing the Internet through Smartphone-based Crowdsourcing
PORTOLAN Probing the Internet through Smartphone-based Crowdsourcing Adriano Faggiani, Enrico Gregori, Alessandro Improta, Luciano Lenzini, Valerio Luconi, Alessio Vecchio RIPE 67 Athens 14-18 October
Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee
Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee {yhlee06, lee}@cnu.ac.kr http://networks.cnu.ac.kr/~yhlee Chungnam National University, Korea January 8, 2013 FloCon 2013 Contents Introduction
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
Summary : Mapping Interconnection in the Internet: Colocation, Connectivity and Congestion
Summary: Mapping Interconnection in the Internet: Colocation, Connectivity and Congestion As the global Internet expands to satisfy the demands and expectations of an ever-increasing fraction of the world
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition April 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
AS Relationships, Customer Cones, and Validation
AS Relationships, Customer Cones, and Validation Matthew Luckie CAIDA / UC San Diego [email protected] Vasileios Giotsas University College London [email protected] Bradley Huffaker CAIDA / UC San Diego
State of the Cloud DNS Report
transparency for the cloud State of the Cloud DNS Report Basic Edition August 2015 2015 Table of Contents Overview Introduction 3 Anycast vs. Unicast DNS 3 Provider Overview & Current News 4 Provider Marketshare
Some Examples of Network Measurements
Some Examples of Network Measurements Example 1 Data: Traceroute measurements Objective: Inferring Internet topology at the router-level Example 2 Data: Traceroute measurements Objective: Inferring Internet
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
Livermore Computer Network Simulation Program
LLNL-CONF-524373 Livermore Computer Network Simulation Program P. D. Barnes, J. M. Brase, T. W. Canales, M. M. Damante, M. A. Horsley, D. R. Jefferson, R. A. Soltz January 25, 2012 LIvermore Computer Network
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Towards Autonomic DDoS Mitigation using Software Defined Networking
Towards Autonomic DDoS Mitigation using Software Defined Networking Authors: Rishikesh Sahay, Gregory Blanc, Zonghua Zhang, Hervé Debar NDSS Workshop on Security of Emerging Networking Technologies (SENT
Layer 1-Informed Internet Topology Measurement
Layer 1-Informed Internet Topology Measurement Ramakrishnan Durairajan University of Wisconsin-Madison [email protected] Joel Sommers Colgate University [email protected] Paul Barford University of
XPROBE-NG. What s new with upcoming version of the tool. Fyodor Yarochkin Armorize Technologies
XPROBE-NG What s new with upcoming version of the tool Fyodor Yarochkin Armorize Technologies Abstract Attacks trends analysis and network modern discovery requirements lazy scanning, application level
Internet Traffic Trends A View from 67 ISPs
Internet Traffic Trends A View from 67 ISPs Craig Labovitz ([email protected]) Danny McPherson ([email protected]) Scott Iekel-Johnson ([email protected]) Mike Hollyman ([email protected]) Internet Statistics
Massive Cloud Auditing using Data Mining on Hadoop
Massive Cloud Auditing using Data Mining on Hadoop Prof. Sachin Shetty CyberBAT Team, AFRL/RIGD AFRL VFRP Tennessee State University Outline Massive Cloud Auditing Traffic Characterization Distributed
Efficient strategies for active interface-level network topology discovery
Calhoun: The NPS Institutional Archive Theses and Dissertations Thesis Collection 2013-09 Efficient strategies for active interface-level network topology discovery Baltra, Guillermo P. Monterey, California:
Web Caching and CDNs. Aditya Akella
Web Caching and CDNs Aditya Akella 1 Where can bottlenecks occur? First mile: client to its ISPs Last mile: server to its ISP Server: compute/memory limitations ISP interconnections/peerings: congestion
A Novel Packet Marketing Method in DDoS Attack Detection
SCI-PUBLICATIONS Author Manuscript American Journal of Applied Sciences 4 (10): 741-745, 2007 ISSN 1546-9239 2007 Science Publications A Novel Packet Marketing Method in DDoS Attack Detection 1 Changhyun
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Networking Research: Trends and Issues
1 Networking Research: Trends and Issues Deep Medhi Networking & Telecommunication Research (NeTReL) Computer Science & Electrical Engineering Department School of Computing & Engineering University of
XPROBE. Building Efficient Network Discovery Tools. Fyodor Yarochkin
XPROBE Building Efficient Network Discovery Tools Fyodor Yarochkin Outline Introduction Some motivating stories: real-life attacks Efficient network mapping with Lazy Scan mode Layer 7 extensions Scripting
Challenges in Inferring Internet Interdomain Congestion
Challenges in Inferring Internet Interdomain Congestion Matthew Luckie [email protected] Bradley Huffaker [email protected] Amogh Dhamdhere [email protected] kc claffy [email protected] David Clark MIT [email protected]
Leveraging SDN and NFV in the WAN
Leveraging SDN and NFV in the WAN Introduction Software Defined Networking (SDN) and Network Functions Virtualization (NFV) are two of the key components of the overall movement towards software defined
BREAKING HTTPS WITH BGP HIJACKING. Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected]
BREAKING HTTPS WITH BGP HIJACKING Artyom Gavrichenkov R&D Team Lead, Qrator Labs [email protected] ABSTRACT OVERVIEW OF BGP HIJACKING GLOBAL AND LOCAL HIJACKING HIJACKING A CERTIFICATE AUTHORITY MITIGATIONS
Measuring and Characterizing End-to-End Route Dynamics in the Presence of Load Balancing
Measuring and Characterizing End-to-End Route Dynamics in the Presence of Load Balancing Ítalo Cunha,2 Renata Teixeira 2,3 Christophe Diot Technicolor 2 UPMC Sorbonne Universités 3 CNRS Abstract Since
Subnet Level Network Topology Mapping
Subnet Level Network Topology Mapping M. Engin Tozal, Student Member, IEEE, Kamil Sarac, Member, IEEE, Department of Computer Science, University of Texas at Dallas, TX 75080 U.S.A. {engintozal, ksarac}@utdallas.edu
INTERNET TOPOLOGY DISCOVERY: A SURVEY
4TH QUARTER 2007, VOLUME 9, NO. 4 IEEE C OMMUNICATIONS SURVEYS T he Electronic Magazine of O riginal Peer-Reviewed Survey Articles www.comsoc.org/pubs/surveys INTERNET TOPOLOGY DISCOVERY: A SURVEY BENOIT
DREAMER and GN4-JRA2 on GTS
GTS Tech+Futures Workshop (Copenhagen) GTS Tech+Futures Workshop (Copenhagen) DREAMER and GN4-JRA2 on GTS CNIT Research Unit of Rome University of Rome Tor Vergata Outline DREAMER (Distributed REsilient
Situational Awareness Through Network Visualization
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Situational Awareness Through Network Visualization Pacific Northwest National Laboratory Daniel M. Best Bryan Olsen 11/25/2014 Introduction
The forces behind the changing Internet: IXPs, content delivery, and virtualization
The forces behind the changing Internet: IXPs, content delivery, and virtualization Prof. Steve Uhlig Head of Networks research group Queen Mary, University of London [email protected] http://www.eecs.qmul.ac.uk/~steve/
How Akamai Maps the Net:
How Akamai Maps the Net: An Industry Perspective George Economou In 2010, everyone uses the Internet. Even if you don t browse the Web, your computer, DVD player, and other appliances try to pull uses
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Data Center Content Delivery Network
BM 465E Distributed Systems Lecture 4 Networking (cont.) Mehmet Demirci Today Overlay networks Data centers Content delivery networks Overlay Network A virtual network built on top of another network Overlay
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Influence Maps - a novel 2-D visualization of massive geographically distributed data sets Introduction Methodology Location Map.
Influence Maps - a novel 2-D visualization of massive geographically distributed data sets Bradley Huffaker, Marina Fomenkov, kc claffy CAIDA, University of California San Diego Introduction As the Internet
Active Measurement Data Analysis Techniques
3/27/2000: This work is an Authors version, and has been submitted for publication. Copyright may be transferred without further notice and the accepted version may then be posted by the publisher. Active
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
SDN and NFV in the WAN
WHITE PAPER Hybrid Networking SDN and NFV in the WAN HOW THESE POWERFUL TECHNOLOGIES ARE DRIVING ENTERPRISE INNOVATION rev. 110615 Table of Contents Introduction 3 Software Defined Networking 3 Network
Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS
White paper Request Routing, Load-Balancing and Fault- Tolerance Solution - MediaDNS June 2001 Response in Global Environment Simply by connecting to the Internet, local businesses transform themselves
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Hypothesis Testing for Network Security
Hypothesis Testing for Network Security Philip Godfrey, Matthew Caesar, David Nicol, William H. Sanders, Dong Jin INFORMATION TRUST INSTITUTE University of Illinois at Urbana-Champaign We need a science
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems
A Measurement of NAT & Firewall Characteristics in Peer to Peer Systems L. D Acunto, J.A. Pouwelse, and H.J. Sips Department of Computer Science Delft University of Technology, The Netherlands [email protected]
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study
Bloom Filter based Inter-domain Name Resolution: A Feasibility Study Konstantinos V. Katsaros, Wei Koong Chai and George Pavlou University College London, UK Outline Inter-domain name resolution in ICN
Traffic & Peering Analysis
Traffic & Peering Analysis or how I learned to stop worrying and love route hijacking Pete Crocker [email protected] Agenda Alternate methods of traffic / peering analysis Traffic Matrices Pros & Cons
