Joint Traffic Routing and Distribution of Security Services in High Speed Networks
|
|
|
- Ambrose Sparks
- 10 years ago
- Views:
Transcription
1 Joint Traffic Routing and Distribution of Security Services in High Speed Networks Andreas Hess Telecommunication Networks Group Technical University Berlin, Germany Sudipta Sengupta Microsoft Research Redmond, WA, USA Vijay P. Kumar VPK Technologies Holmdel, NJ, USA Abstract The continued explosion of new virus/worm and other security attacks in the Internet and the tremendous propagation speed of self-propagating attacks has led to network security being considered as a design criterion rather than an afterthought. Attack prevention, detection, and mitigation mechanisms can be broadly classified as network based or host based. Network based security mechanisms have been shown to be much more effective than host based mechanisms, primarily because of the former s ability in identifying attack traffic that is further upstream from the victim and closer to the attack source. In the context of network based mechanisms, we consider a flexible overlay network of security systems running on top of programmable (active) routers. In such an architecture, security services can be dynamically distributed across the network, which provides flexibility for load-balancing of services across nodes and addition of new services over time. Such network based mechanisms inevitably decrease network performance as all packets are analyzed for malicious content before being forwarded. In this paper, we consider traffic routing, placement of active router nodes, and distribution of security services across such nodes so as to optimize certain objectives, including (i) minimize the total number of active router deployed nodes, and (ii) minimize the maximum utilization of any router node in the network. Based on an emulation in the Deter testbed we show the benefit of the presented approach. I. INTRODUCTION Recent developments show that communication networks cannot be secured by sporadic and uncoordinated security devices like firewalls at users and cooperates sites. Moreover, it cannot be expected that all users and administrators will be able to keep their system(s) secure and thus, we think that the protection of end systems should be done in the network. For the purpose, we propose a flexible overlay network of intrusion prevention systems (IPS) running on top of an active networking environment. Active networks consist of programmable nodes (active nodes) on which, for example, IPS services can be dynamically deployed for the purpose of creating overlay networks. In this paper, we remove respective assumptions in two previous approaches either the routes are given or placement of security nodes is given and provide a framework for joint optimization of both design choices. On the one hand, [3] shows how to intelligently distribute security services to efficiently protect end-systems against attacks coming from the Internet. Here, the authors assumed pre-defined routes and tree-based topology. On the other hand, [5] developed a heuristic for the placement of content-filtering nodes in a network, and, given the placement of such nodes, designed a fully polynomial time approximation scheme (FPTAS) that maximizes the traffic carried by the network subject to the constraint that all traffic passes through a content filtering node at least once. We envisage that the contribution of this paper can be applied in a network planning setting where estimated traffic patterns can be used to deploy security services at selected nodes and provision paths for load-balanced routing in the network. We develop two mixed integer linear programming (MILP) formulations that assign the routes and simultaneously place programmable router nodes and distribute security services across these nodes so as to (i) minimize the number of nodes where programmable routers are deployed, or (ii) minimize the maximum utilization of any router node in the network. Any other linear objective function can also be accommodated. In the first approach, the MILP calculates the optimal single path route for each source-destination pair in the network. In the second approach, the set of available routes for each source-destination pair is predefined and multipath routing is allowed. II. JOINT TRAFFIC ROUTING AND DISTRIBUTION OF SECURITY SERVICES In this section, we present our concept for distributed intrusion prevention in high-speed networks. It is based on two pillars: the FIDRAN architecture, which enables the dynamic integration of security services on a programmable router, and the optimal placement of security services in the network. A. The FIDRAN Architecture This section briefly describes the FIDRAN architecture; for a detailed discussion we refer to [4]. The framework consists of core components which run permanently and of add-on components the security services which are dynamically integrated into the system as needed (cf. Fig. 1). The core functionality comprises the traffic selector, the security policy, the control/management module and the default queuing discipline. Security services are implemented as loadable modules featuring IPS specific networking services. The capabilities provided by the underlying programmable networking infrastructure allow to distribute the FIDRAN system on pro-
2 i Packets 1 Trace Point i 2 Security Policy Traffic Selector Drop Management Module Queues 3 4 Forward Fig. 1. Control Module Service Process Chains S 2 S 7... S m S 2... S 4 S 5... S l S 4... S 1 S 2... S n S 1... The FIDRAN architecture 5 Network grammable routers. The dynamic creation of an IPS overlay network is thereby enabled. Secure communication between programmable nodes is also provided. All network traffic is redirected to the traffic selector, which according to the rules specified in the security policy assigns the traffic to one of the categories: forward, process or drop. Traffic that is assigned to the category forward is directly forwarded and not analyzed by any installed security service (see Fig. 1). It is either not necessary to check this traffic (e. g. encrypted traffic, IPSec), or another programmable node on the route to the end-system is in charge of doing so. Traffic in the category process is queued and analyzed by specific security services. The detailed proceeding for queuing and analysis as well as the reaction in case of a detected attack is also specified in the security policy. Finally, traffic belonging to the category drop is blocked altogether by the traffic selector. The management and the control modules are responsible for the configuration of the FIDRAN system. The management module is the interface between the overlay network of programmable routers and the FIDRAN system. Hence, it is able to trigger the download of a security service from a service repository. The control module coordinates the downloaded security services. Most attacks are based on a vulnerability that is specific for an operating system, protocol or application, so a modularization of the protection services is possible. In order to realize a demand-driven intrusion prevention system, the required security services for a specific set of destinations are concatenated and stored in a service process chain. A process chain is a linked list of security services with an unique identifier that is composed of IP-address(es), port(s), and protocol. A security service can be part of one or more process chains. In addition, each security service keeps track of the amount of alarms it raised and the packets it dropped. Once the chains are set up, the control module takes a packet from one of the waiting queues, inspects it, and forwards it to the appropriate process chain. The security services contain the intrusion prevention intelligence that actually provides protection against attacks. According to the statistics recorded by them, they are reordered in regular intervals in order to optimize the internal packet processing. B. Modeling Packet Processing Times The processing time for a packet can be modeled as a sum of three components: the basic delay T base representing the routing delay in a standard network router; the delay T active representing the overhead necessary to decide whether a packet must be processed on the programmable router (applies only if the router is programmable); the sum of the processing times T s for each service s that is applied to a packet. Accordingly, the total processing time for a packet that receives services in the set A S at a node is given by T base + T active + s A T s For further details on the individual components we refer to [3]. C. Distribution of Services with Single Path Routing We first consider the single path routing version of the problem, where a demand is routed along a single path from source to destination under the constraint that it is analyzed by all security services. Multi-path routing, considered in the next section, allows the demand to be split across multiple paths from source destination. Given a network with link capacities, traffic demands, and packet processing times as above, we consider the problem of routing, placement of programmable routers, and distribution of security services, so as to minimize the total number of nodes with deployed programmable routers. Towards the end of this section, we consider a second objective function also. Let routing variable ze k have value 1 if the routing of demand k uses link e, value 0 otherwise. Let variable wi k have value 1 if node i is on the routed path for demand k, value 0 otherwise. Let service distribution variable yis k be the fraction of demand k that is provided service type s at node i. Let variable x i have value 1 if node i is a programmable router node, value 0 otherwise. Then, our problem can be expressed as the following polynomial size mixed integer linear program (MILP): subject to e E + (i) z k e minimize e E (i) e E (i) e E + (i) z k e = i N x i { +1 if i = s(k) 1 if i = d(k) 0 otherwise i N, k D (1) z k e 1 i N, k D (2) z k e 1 i N, k D (3)
3 i N w k i = { 1 if i = s(k) or d(k) e E (i) zk e otherwise i N, k D (4) y k is w k i i N, k D, s S (5) y k is x i i N, k D, s S (6) y k is = 1 k D, s S (7) t(k)w k i T base 1 i N (8) t(k)w k i (T base + T active) + t(k) T sy k is s S 1 + C(1 x i) i N (9) z k e u e e E (10) z k e, wk i, xi {0, 1} e E, i N, k D (11) y k is 0 i N, k D, s S (12) Constraints (1)-(4) involve the routing of the demands. Constraints (1) corresponding to the routing of one unit of flow from node i to node j along a single path. Constraints (2) and (3) guarantee that the paths are loop-free by enforcing that the total in-degree or out-degree of used links at any node is at most 1. Constraints (4) say that a node i (other than source or destination) is on the path for routing demand k if it has an incident link that is used. Constraints (5)-(7) involve the deployment of programmable routers at nodes and the distribution of services among such nodes. Constraints (5) model the fact that the routed demand k can receive some security service at node i only if node i is on the path. Constraints (6) model the additional requirement that such a node should have a programmable router deployed. Constraints (7) state that for each demand and for each type of service, the fraction of traffic processed over all nodes on the routed path should be 1. Constraints (8)-(9) model stability conditions for packet processing times. The total traffic entering node i is f i = t(k)wk i. Thus, the average time between consecutive packet arrivals is 1/f i. The stability condition for a node i without a programmable router is T base 1/f i, or f i T base 1. This is constraint (8). This constraint becomes redundant if x i = 1 (i.e., node i has a programmable router) due to the presence of constraint (9). The average processing time of a packet at a programmable router node i is T base + T active + t(k)w k i f i T s yis k s S Now observe that the bilinear product term wi kyk is is 0 when wi k = 0, i.e., when node i is not on the path for demand k. In that case, yis k is also 0. Otherwise, when wk i = 1, the product term equals yis k. Thus, in both case, we have wk i yk is = yk is. Hence, the average processing time becomes T base + T active + 1 t(k) T s yis k f i s S This must be at most 1/f i, whence f i (T base + T active ) + t(k) s S T s y k is 1 This corresponds to constraint (9). We have added a term C(1 x i ) on the right-hand-side of (9), where C = t(k)(t base + T active + s S T s ) so that this constraint is correct when node i has a programmable router (x i = 1), and is redundant otherwise (x i = 0). Finally, constraints (10) are the link capacity constraints. It is well known that the performance of a router rapidly degrades as packet processing times approach inter-packet arrival times. Motivated by this, we might want to minimize the maximum ratio of average packet processing time to the average packet inter-arrival time at each node. The value of this ratio at a node i is the left-hand-size of constraint (8) if node i is not a programmable router, or constraint (9) is node i is a programmable router. If we denote the maximum value of this ratio over all nodes by v, we want to minimize v subject to constraints (1)-(7) and (10)-(12), with constraints (8)-(9) replaced by t(k)wi k T base v i N (13) t(k)wi k (T base + T active ) + t(k) T s yis k s S v + C(1 x i ) i N (14) The mixed integer linear programs outlined in this section and the next can be solved using a standard MILP solver like CPLEX. D. Distribution of Services with Multi-Path Routing In this section, we modify the MILP formulation for single path routing to allow routing of the demand to be split across multiple paths from source destination. Let P k denote the set of available paths from source s(k) to destination d(k) for routing demand k. For example, we could choose the K- shortest hop paths from s(k) to d(k) as the set P k. The routing variables now become z k (P ) which denotes the amount of traffic on path P for routing demand k. Also, let service distribution variable yis k (P ) be the amount (and not fraction) from z k (P ) that is provided service type s at node i. The variable yis k (P ) is defined only if node i appears on path P. We will simplify notation and use P to denote either the set of nodes or the set of links on path P (the specific use will be clear from the context). Then, the multi-path routing version of our problem can be expressed as the following polynomial size mixed integer linear program (MILP):
4 STTL CHIN subject to minimize i N x i z k (P ) = t(k) k D (15) P P k y k is (P ) t(k)xi i N, P P k, k D, s S (16) y k is (P ) = zk (P ) P P k, SNVA r 9 r 10 r 3 r 7 Fig. 2. r 6 r 5 The Abilene network r 2 r 8 r 11 NYCM WASH P i P i i P k D, s S (17) z k (P )T base 1 i N (18) z k (P )(T base + T active) + P e T sy k is (P ) P i s S 1 + C(1 x i) i N (19) z k (P ) u e e E (20) x i {0, 1} i N (21) z k (P ), y k is (P ) 0 i N, P P k, k D, s S (22) In a manner analogous to that in the previous section, we can minimize the maximum ratio of average packet processing time to the average packet inter-arrival time at each node. The value of this ratio at a node i is the left-hand-size of constraint (18) if node i is not a programmable router, or constraint (19) is node i is a programmable router. If we denote the maximum value of this ratio over all nodes by v, we want to minimize v subject to constraints (15)-(17) and (20)-(22), with constraints (18)-(19) replaced by z k (P )T base v i N (23) P i T s yis(p k ) z k (P )(T base + T active ) + P i P i s S v + C(1 x i ) III. EMULATION i N (24) The performance of FIDRAN was assessed on the Cyber Defense Technology Experimental Research testbed (DETER) [2], [7] which is a shared infrastructure designed for mediumscale repeatable experiments in computer security. The testbed provides a pool of over 300 computers of varying hardware which can be used to emulate networks. As scenario we chose the Abilene network depicted in Figure 2 which is a research IP backbone connecting multiple universities across the US. For this network real world data traffic flows and link capacities is available on the project s web-site [1]. Reference [3] describes in detail the FIDRAN prototype implemented which includes a set of security services and LOSA r 4 which was used throughout the experiments. Table I represents the traffic matrix, the column index specifies the source and the row index the destination. Measurements of local-area and wide-area network traffic have shown that packet-switched data traffic is self-similar. Glen Kramer implemented a tool [6] to synthetically generate self-similar network traffic traces by the superposition of a large number of 0/1 renewal processes whose ON and OFF periods are heavy tailed distributed. Finally, to avoid effects of congestion and flow control mechanisms all experiments were restricted to Udp-traffic. To consider the hardware resources provided by the DETER testbed, the network was emulated on a scale of 1 : 100 which means that traffic rates were divided by 100 and accordingly the delays were multiplied by 100. A. The Abilene Network In the network each subnet sends data to all other subnets resulting in an overall number of 30 traffic flows. The propagation delay for each link was specified by dividing the distance from start node to end node by the speed of light. Table I represents the traffic matrix, the column index specifies the source and the row index the destination. To generate the traffic each subnet is supplied with an UDP sender for each destination which generates self-similar traffic as described above. Each experiment lasted 1800s and contained the sending of over 7, 500, 000 packets. TABLE I THE ABILENE TRAFFIC MATRIX [MBPS] To CHIN LOSA NYCM SNVA STTL WASH CHIN X LOSA X NYCM X SNVA X STTL X WASH X Each traffic flow must be analyzed by three security services, whereby the service processing times T s were scaled as mentioned. We study the performance of the solutions obtained for both presented MILPs (single-path routing and multipath routing) with the objective of minimizing the maximum router utilization, and compare them to the solutions of the MILPs presented in [3] extended to generalized topologies. r 1
5 Drop-rate [packets/s] No Dijkstra SP MP end-to-end-delay [s] No Dijkstra SP MP Flow-ID (a) Flow-specific drop rates Flow-ID (b) Flow-specific end-to-end-delays Fig. 3. Results for Abilene Network IV. RESULTS Our objective is to balance the router load while providing security service to all packets and not increase the delay or drop performance of the network, thus appropriate metrics must be used. The performance of the placement strategies is evaluated in terms of mean packet drop rates and end-toend-delays. Figure 3(a) depicts for all deployment strategies the flowspecific packet drop rates as well as flow-specific end-to-end delays. The flow-ids are assigned according to the traffic matrix, for example, the flow from CHIN to LOSA has the flow-id 1 and ID 15 identifies the flow from NYCM to WASH. The flow-specific average end-to-end-delays are depicted in Figure 3(b). The impact of doing intrusion prevention is evident in both figures. Initially, almost no drops occur in case that no FIDRAN system is running on a router. Then independent of the strategy chosen the deployment of security services in the network causes packet loss. When comparing strategies Dijkstra, MP and SP with each other, it can be seen that both optimal deployment strategies clearly reduce the packet drop rates. For example, considering the flow of the highest volume from WASH to NYCM flow-id 28 the mean drop rate is 51packets/sec for the Dijkstra strategy, 28packets/sec for the SP strategy and finally, 14packets/sec for the MP strategy. The high average end-to-end-delays for the Dijkstra strategy depicted in Figure 3(b) and are correlated to the drop-rates (Figure 3(a)). Nearly all packets the red boxes in Figure 3(a) represent the number of packets that are dropped when no router is running a security service are dropped by FIDRAN systems whose waiting queues are filled and consequently, no further packets are accepted. Furthermore, packets in the waiting queue have to wait to be served. V. DISCUSSION Providing security to communication networks requires that packets be inspected for malicious contents and, consequently, impacts normal network operation. In this paper we presented an optimization framework for joint traffic routing and service placement, which can be used to study that impact, while fulfilling a pre-definied objective. Here, we presented objective function that minimize the amount of security-enabled routers or the maximum router load. Using a scenario based on a real network the Abilene network we showed that the routing and deployment strategies obtained as solution to the problems formulated balance the network load and significantly reduce the overall dropping rate. For the scenario under consideration, we also showed that the joint optimization of single path routing and service placement is a big improvement with respect to optimal service placement over routes calculated with the Dijkstra algorithm, since the latter does not take the additional router load due to security processing into account. Good solutions were obtained for both presented strategies. The single-path strategy tends to generate long paths to disburden heavy loaded routers. In contrast, the multi-path strategy splits huge flow into smaller ones and reroutes these over different paths. Both solutions shows that they balance the load well. REFERENCES [1] The Abilene Network. [2] T. Benzel, R. Braden, D. Kim, C. Neuman, A. Joseph, K. Sklower, R. Ostrenga, and S. Schwab. Experience with DETER: a testbed for security research. In Testbeds and Research Infrastructures for the Development of Networks and Communities TRIDENTCOM, March [3] A. Hess, H. F. Geerdes, and R. Wessäly. Intelligent distribution of intrusion prevention services on programmable routers. In Proc. of 25th IEEE INFOCOM, Barcelona, Spain, May [4] A. Hess, M. Jung, and G. Schäfer. FIDRAN: A flexible Intrusion Detection and Response Framework for Active Networks. In 8th IEEE Symposium on Computers and Communications (ISCC 2003), Kemer,Antalya,Turkey, July [5] M. Kodialam, T. V. Lakshman, and Sudipta Sengupta. Configuring networks with content filtering nodes with applications to network security. In IEEE INFOCOM, [6] Glen Kramer. Synthetic traffic generation. kramer/research.html. [7] Cyber Defense Technology Experimental Research. The deter testbed: Overview. Oct
Chapter 4. VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network)
Chapter 4 VoIP Metric based Traffic Engineering to Support the Service Quality over the Internet (Inter-domain IP network) 4.1 Introduction Traffic Engineering can be defined as a task of mapping traffic
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
2004 Networks UK Publishers. Reprinted with permission.
Riikka Susitaival and Samuli Aalto. Adaptive load balancing with OSPF. In Proceedings of the Second International Working Conference on Performance Modelling and Evaluation of Heterogeneous Networks (HET
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL NORTH CAROLINA STATE UNIVERSITY
A REPORT ON ANALYSIS OF OSPF ROUTING PROTOCOL Using OPNET 14.5 Modeler NORTH CAROLINA STATE UNIVERSITY SUBMITTED BY: SHOBHANK SHARMA [email protected] Page 1 ANALYSIS OF OSPF ROUTING PROTOCOL A. Introduction
Routing in packet-switching networks
Routing in packet-switching networks Circuit switching vs. Packet switching Most of WANs based on circuit or packet switching Circuit switching designed for voice Resources dedicated to a particular call
TRUFFLE Broadband Bonding Network Appliance BBNA6401. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance BBNA6401 A Frequently Asked Question on Link Bonding vs. Load Balancing LBRvsBBNAFeb15_08b 1 Question: What's the difference between a Truffle Broadband Bonding
TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]
A Study of Network Security Systems
A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya
Distributed Explicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks
Distributed Eplicit Partial Rerouting (DEPR) Scheme for Load Balancing in MPLS Networks Sherif Ibrahim Mohamed [email protected] Khaled M. F. Elsayed, senior member IEEE [email protected] Department
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks
A Fuzzy Logic-Based Information Security Management for Software-Defined Networks Sergei Dotcenko *, Andrei Vladyko *, Ivan Letenko * * The Bonch-Bruevich Saint-Petersburg State University of Telecommunications,
CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING
CHAPTER 6 CROSS LAYER BASED MULTIPATH ROUTING FOR LOAD BALANCING 6.1 INTRODUCTION The technical challenges in WMNs are load balancing, optimal routing, fairness, network auto-configuration and mobility
How To Provide Qos Based Routing In The Internet
CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks
Study of Different Types of Attacks on Multicast in Mobile Ad Hoc Networks Hoang Lan Nguyen and Uyen Trang Nguyen Department of Computer Science and Engineering, York University 47 Keele Street, Toronto,
Path Selection Methods for Localized Quality of Service Routing
Path Selection Methods for Localized Quality of Service Routing Xin Yuan and Arif Saifee Department of Computer Science, Florida State University, Tallahassee, FL Abstract Localized Quality of Service
PRASAD ATHUKURI Sreekavitha engineering info technology,kammam
Multiprotocol Label Switching Layer 3 Virtual Private Networks with Open ShortestPath First protocol PRASAD ATHUKURI Sreekavitha engineering info technology,kammam Abstract This paper aims at implementing
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS
137 CHAPTER 8 CONCLUSION AND FUTURE ENHANCEMENTS 8.1 CONCLUSION In this thesis, efficient schemes have been designed and analyzed to control congestion and distribute the load in the routing process of
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks
Dynamic Congestion-Based Load Balanced Routing in Optical Burst-Switched Networks Guru P.V. Thodime, Vinod M. Vokkarane, and Jason P. Jue The University of Texas at Dallas, Richardson, TX 75083-0688 vgt015000,
CHAPTER 6. VOICE COMMUNICATION OVER HYBRID MANETs
CHAPTER 6 VOICE COMMUNICATION OVER HYBRID MANETs Multimedia real-time session services such as voice and videoconferencing with Quality of Service support is challenging task on Mobile Ad hoc Network (MANETs).
(MPLS) MultiProtocol Labling Switching. Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004.
(MPLS) MultiProtocol Labling Switching Software Engineering 4C03 Computer Network & Computer Security Dr. Kartik Krishnan Winter 2004 Final Copy Researcher: Paul Chan Student ID: 9914759 Last Revised:
Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow
International Journal of Soft Computing and Engineering (IJSCE) Performance Analysis of AQM Schemes in Wired and Wireless Networks based on TCP flow Abdullah Al Masud, Hossain Md. Shamim, Amina Akhter
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks
A Comparison Study of Qos Using Different Routing Algorithms In Mobile Ad Hoc Networks T.Chandrasekhar 1, J.S.Chakravarthi 2, K.Sravya 3 Professor, Dept. of Electronics and Communication Engg., GIET Engg.
COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 5 May, 2013 Page No. 1680-1684 COMPARATIVE ANALYSIS OF ON -DEMAND MOBILE AD-HOC NETWORK ABSTRACT: Mr.Upendra
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
PART III. OPS-based wide area networks
PART III OPS-based wide area networks Chapter 7 Introduction to the OPS-based wide area network 7.1 State-of-the-art In this thesis, we consider the general switch architecture with full connectivity
Communications and Computer Networks
SFWR 4C03: Computer Networks and Computer Security January 5-8 2004 Lecturer: Kartik Krishnan Lectures 1-3 Communications and Computer Networks The fundamental purpose of a communication system is the
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency
Simulation of Heuristic Usage for Load Balancing In Routing Efficiency Nor Musliza Mustafa Fakulti Sains dan Teknologi Maklumat, Kolej Universiti Islam Antarabangsa Selangor [email protected] Abstract.
Quality of Service using Traffic Engineering over MPLS: An Analysis. Praveen Bhaniramka, Wei Sun, Raj Jain
Praveen Bhaniramka, Wei Sun, Raj Jain Department of Computer and Information Science The Ohio State University 201 Neil Ave, DL39 Columbus, OH 43210 USA Telephone Number: +1 614-292-3989 FAX number: +1
UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004
[CRT14] UNIVERSITY OF BOLTON CREATIVE TECHNOLOGIES COMPUTING AND NETWORK SECURITY SEMESTER TWO EXAMINATIONS 2014/2015 NETWORK SECURITY MODULE NO: CPU6004 Date: Wednesday 27 th May 2015 Time: 14:00 16:00
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Scaling 10Gb/s Clustering at Wire-Speed
Scaling 10Gb/s Clustering at Wire-Speed InfiniBand offers cost-effective wire-speed scaling with deterministic performance Mellanox Technologies Inc. 2900 Stender Way, Santa Clara, CA 95054 Tel: 408-970-3400
ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL
R. RAVI: ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE MODEL WITH QUALITY OF SERVICE SUPPORT USING WAXMAN MODEL ENHANCED PROVISIONING ALGORITHM FOR VIRTUAL PRIVATE NETWORK IN HOSE
Computer Networking Networks
Page 1 of 8 Computer Networking Networks 9.1 Local area network A local area network (LAN) is a network that connects computers and devices in a limited geographical area such as a home, school, office
Path Optimization in Computer Networks
Path Optimization in Computer Networks Roman Ciloci Abstract. The main idea behind path optimization is to find a path that will take the shortest amount of time to transmit data from a host A to a host
LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M. F. Elsayed [email protected]
LMPS: Localized Multi-Path Selection for QoS Routing in VoIP Networks Khaled M F Elsayed khaled@ieeeorg Hassan Fadel Amin M Nassar anassar@engcuedueg hassanfadel@egticomeg Department of Electronics and
ENSC 427: Communication Networks. Analysis of Voice over IP performance on Wi-Fi networks
ENSC 427: Communication Networks Spring 2010 OPNET Final Project Analysis of Voice over IP performance on Wi-Fi networks Group 14 members: Farzad Abasi ([email protected]) Ehsan Arman ([email protected]) http://www.sfu.ca/~faa6
Load Balancing by MPLS in Differentiated Services Networks
Load Balancing by MPLS in Differentiated Services Networks Riikka Susitaival, Jorma Virtamo, and Samuli Aalto Networking Laboratory, Helsinki University of Technology P.O.Box 3000, FIN-02015 HUT, Finland
Network Traffic Monitoring on DETER
Network Traffic Monitoring on DETER Efrain Plascencia Graduate Mentors: Saurabh Amin, Blaine Nelson, Dr. Suzanna Schmeelk Faculty Mentor: Professor S. Shankar Sastry July 30 th, 2010 Research Experience
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Robust Router Congestion Control Using Acceptance and Departure Rate Measures
Robust Router Congestion Control Using Acceptance and Departure Rate Measures Ganesh Gopalakrishnan a, Sneha Kasera b, Catherine Loader c, and Xin Wang b a {[email protected]}, Microsoft Corporation,
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks
A New Fault Tolerant Routing Algorithm For GMPLS/MPLS Networks Mohammad HossienYaghmae Computer Department, Faculty of Engineering, Ferdowsi University of Mashhad, Mashhad, Iran [email protected]
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress
Security Considerations for Intrinsic Monitoring within IPv6 Networks: Work in Progress Alan Davy and Lei Shi Telecommunication Software&Systems Group, Waterford Institute of Technology, Ireland adavy,[email protected]
A Routing Metric for Load-Balancing in Wireless Mesh Networks
A Routing Metric for Load-Balancing in Wireless Mesh Networks Liang Ma and Mieso K. Denko Department of Computing and Information Science University of Guelph, Guelph, Ontario, Canada, N1G 2W1 email: {lma02;mdenko}@uoguelph.ca
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls
Securing Ad Hoc Wireless Networks Against Data Injection Attacks Using Firewalls Jun Cheol Park and Sneha Kumar Kasera School of Computing, University of Utah Email: {jcpark, kasera}@cs.utah.edu Abstract
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Configuring the BIG-IP and Check Point VPN-1 /FireWall-1
Configuring the BIG-IP and Check Point VPN-1 /FireWall-1 Introducing the BIG-IP and Check Point VPN-1/FireWall-1 LB, HALB, VPN, and ELA configurations Configuring the BIG-IP and Check Point FireWall-1
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions
Investigation and Comparison of MPLS QoS Solution and Differentiated Services QoS Solutions Steve Gennaoui, Jianhua Yin, Samuel Swinton, and * Vasil Hnatyshin Department of Computer Science Rowan University
Network Level Multihoming and BGP Challenges
Network Level Multihoming and BGP Challenges Li Jia Helsinki University of Technology [email protected] Abstract Multihoming has been traditionally employed by enterprises and ISPs to improve network connectivity.
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1
SHIN, WANG AND GU: A FIRST STEP TOWARDS NETWORK SECURITY VIRTUALIZATION: FROM CONCEPT TO PROTOTYPE 1 A First Step Towards Network Security Virtualization: From Concept To Prototype Seungwon Shin, Haopei
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science
EINDHOVEN UNIVERSITY OF TECHNOLOGY Department of Mathematics and Computer Science Examination Computer Networks (2IC15) on Monday, June 22 nd 2009, 9.00h-12.00h. First read the entire examination. There
Supporting Differentiated QoS in MPLS Networks
Supporting Differentiated QoS in MPLS Networks Roberto A. Dias 1, Eduardo Camponogara 2, and Jean-Marie Farines 2 1 Federal Technology Center of Santa Catarina, Florianópolis, 88020-300, Brazil 2 Federal
Prevention, Detection and Mitigation of DDoS Attacks. Randall Lewis MS Cybersecurity
Prevention, Detection and Mitigation of DDoS Attacks Randall Lewis MS Cybersecurity DDoS or Distributed Denial-of-Service Attacks happens when an attacker sends a number of packets to a target machine.
An Adaptive Load Balancing to Provide Quality of Service
An Adaptive Load Balancing to Provide Quality of Service 1 Zahra Vali, 2 Massoud Reza Hashemi, 3 Neda Moghim *1, Isfahan University of Technology, Isfahan, Iran 2, Isfahan University of Technology, Isfahan,
DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR
Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India [email protected],
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET
SECURE DATA TRANSMISSION USING INDISCRIMINATE DATA PATHS FOR STAGNANT DESTINATION IN MANET MR. ARVIND P. PANDE 1, PROF. UTTAM A. PATIL 2, PROF. B.S PATIL 3 Dept. Of Electronics Textile and Engineering
Cisco Application Networking for Citrix Presentation Server
Cisco Application Networking for Citrix Presentation Server Faster Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address
The Interaction of Forward Error Correction and Active Queue Management
The Interaction of Forward Error Correction and Active Queue Management Tigist Alemu, Yvan Calas, and Alain Jean-Marie LIRMM UMR 5506 CNRS and University of Montpellier II 161, Rue Ada, 34392 Montpellier
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna
Improving End-to-End Delay through Load Balancing with Multipath Routing in Ad Hoc Wireless Networks using Directional Antenna Siuli Roy 1, Dola Saha 1, Somprakash Bandyopadhyay 1, Tetsuro Ueda 2, Shinsuke
Influence of Load Balancing on Quality of Real Time Data Transmission*
SERBIAN JOURNAL OF ELECTRICAL ENGINEERING Vol. 6, No. 3, December 2009, 515-524 UDK: 004.738.2 Influence of Load Balancing on Quality of Real Time Data Transmission* Nataša Maksić 1,a, Petar Knežević 2,
ENSC 427: Communication Networks
Spring 2012 ENSC 427: Communication Networks Creating a Secure Network through Firewalls and Virtual Private Networks http://www.sfu.ca/~msa102 Team #2 Maxim Soleimani-Nouri Andy Cheng Saman Mehdizadeh
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements
The Quality of Internet Service: AT&T s Global IP Network Performance Measurements In today's economy, corporations need to make the most of opportunities made possible by the Internet, while managing
Architecture of distributed network processors: specifics of application in information security systems
Architecture of distributed network processors: specifics of application in information security systems V.Zaborovsky, Politechnical University, Sait-Petersburg, Russia [email protected] 1. Introduction Modern
SIP Service Providers and The Spam Problem
SIP Service Providers and The Spam Problem Y. Rebahi, D. Sisalem Fraunhofer Institut Fokus Kaiserin-Augusta-Allee 1 10589 Berlin, Germany {rebahi, sisalem}@fokus.fraunhofer.de Abstract The Session Initiation
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS
MAXIMIZING RESTORABLE THROUGHPUT IN MPLS NETWORKS 1 M.LAKSHMI, 2 N.LAKSHMI 1 Assitant Professor, Dept.of.Computer science, MCC college.pattukottai. 2 Research Scholar, Dept.of.Computer science, MCC college.pattukottai.
Firewall Policy Anomalies- Detection and Resolution
Firewall Policy Anomalies- Detection and Resolution Jitha C K #1, Sreekesh Namboodiri *2 #1 MTech student(cse),mes College of Engineering,Kuttippuram,India #2 Assistant Professor(CSE),MES College of Engineering,Kuttippuram,India
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking
Quantifying the Performance Degradation of IPv6 for TCP in Windows and Linux Networking Burjiz Soorty School of Computing and Mathematical Sciences Auckland University of Technology Auckland, New Zealand
Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003
http://technet.microsoft.com/en-us/library/cc757501(ws.10).aspx Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003 Updated: October 7, 2005 Applies To: Windows Server 2003 with
Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee
International Journal of Science and Engineering Vol.4 No.2(2014):251-256 251 Dynamic Security Traversal in OpenFlow Networks with QoS Guarantee Yu-Jia Chen, Feng-Yi Lin and Li-Chun Wang Department of
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data
QoSIP: A QoS Aware IP Routing Protocol for Multimedia Data Md. Golam Shagadul Amin Talukder and Al-Mukaddim Khan Pathan* Department of Computer Science and Engineering, Metropolitan University, Sylhet,
Internet Security Firewalls
Overview Internet Security Firewalls Ozalp Babaoglu! Exo-structures " Firewalls " Virtual Private Networks! Cryptography-based technologies " IPSec " Secure Socket Layer ALMA MATER STUDIORUM UNIVERSITA
Assignment #3 Routing and Network Analysis. CIS3210 Computer Networks. University of Guelph
Assignment #3 Routing and Network Analysis CIS3210 Computer Networks University of Guelph Part I Written (50%): 1. Given the network graph diagram above where the nodes represent routers and the weights
Extending the Internet of Things to IPv6 with Software Defined Networking
Extending the Internet of Things to IPv6 with Software Defined Networking Abstract [WHITE PAPER] Pedro Martinez-Julia, Antonio F. Skarmeta {pedromj,skarmeta}@um.es The flexibility and general programmability
QoS issues in Voice over IP
COMP9333 Advance Computer Networks Mini Conference QoS issues in Voice over IP Student ID: 3058224 Student ID: 3043237 Student ID: 3036281 Student ID: 3025715 QoS issues in Voice over IP Abstract: This
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort Traffic
Telecommunication Systems 24:2 4, 275 292, 2003 2003 Kluwer Academic Publishers. Manufactured in The Netherlands. Router Scheduling Configuration Based on the Maximization of Benefit and Carried Best Effort
Performance Comparison of Mixed Protocols Based on EIGRP, IS-IS and OSPF for Real-time Applications
Middle-East Journal of Scientific Research 12 (11): 1502-1508, 2012 ISSN 1990-9233 IDOSI Publications, 2012 DOI: 10.5829/idosi.mejsr.2012.12.11.144 Performance Comparison of Mixed Protocols Based on EIGRP,
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network
Energy Efficient Load Balancing among Heterogeneous Nodes of Wireless Sensor Network Chandrakant N Bangalore, India [email protected] Abstract Energy efficient load balancing in a Wireless Sensor
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected]. DDoS and IP Traceback. Overview
DDoS and IP Traceback Dr. Arjan Durresi Louisiana State University, Baton Rouge, LA 70803 [email protected] Louisiana State University DDoS and IP Traceback - 1 Overview Distributed Denial of Service
CSE3214 Computer Network Protocols and Applications. Chapter 1 Examples and Homework Problems
CSE3214 Computer Network Protocols and Applications Chapter 1 Examples and Homework Problems Example 1 (review question 18) (1) How long does it take a packet of length 1000 bytes to propagate over a link
ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP
ENSC 427: Communication Networks ANALYSIS OF LONG DISTANCE 3-WAY CONFERENCE CALLING WITH VOIP Spring 2010 Final Project Group #6: Gurpal Singh Sandhu Sasan Naderi Claret Ramos ([email protected]) ([email protected])
A Fast Path Recovery Mechanism for MPLS Networks
A Fast Path Recovery Mechanism for MPLS Networks Jenhui Chen, Chung-Ching Chiou, and Shih-Lin Wu Department of Computer Science and Information Engineering Chang Gung University, Taoyuan, Taiwan, R.O.C.
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining
Intrusion Detection: Game Theory, Stochastic Processes and Data Mining Joseph Spring 7COM1028 Secure Systems Programming 1 Discussion Points Introduction Firewalls Intrusion Detection Schemes Models Stochastic
Aspen Solutions. Branch Office IP Telephony: Improving the Reliability of Voice over Virtual Private Networks. Introduction TECHNICAL NOTE
Aspen Solutions Branch Office IP Telephony: Improving the Reliability of Voice over Virtual Private Networks TECHNICAL NOTE Introduction IP PBX and IP phones are increasingly being deployed by small and
Computer Networks - CS132/EECS148 - Spring 2013 ------------------------------------------------------------------------------
Computer Networks - CS132/EECS148 - Spring 2013 Instructor: Karim El Defrawy Assignment 2 Deadline : April 25 th 9:30pm (hard and soft copies required) ------------------------------------------------------------------------------
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR
Optimization of AODV routing protocol in mobile ad-hoc network by introducing features of the protocol LBAR GUIDOUM AMINA University of SIDI BEL ABBES Department of Electronics Communication Networks,
Multiple Layer Traffic Engineering in NTT Network Service
Multi-layer traffic engineering in photonic-gmpls-router networks Naoaki Yamanaka, Masaru Katayama, Kohei Shiomoto, Eiji Oki and Nobuaki Matsuura * NTT Network Innovation Laboratories * NTT Network Service
Business Cases for Brocade Software-Defined Networking Use Cases
Business Cases for Brocade Software-Defined Networking Use Cases Executive Summary Service providers (SP) revenue growth rates have failed to keep pace with their increased traffic growth and related expenses,
