Tools and Techniques for the Analysis of Large Scale BGP Datasets. Manish Karir, Larry Blunk (Merit) Dion Blazakis, John Baras (UMd)
|
|
|
- Monica Murphy
- 10 years ago
- Views:
Transcription
1 Tools and Techniques for the Analysis of Large Scale BGP Datasets Manish Karir, Larry Blunk (Merit) Dion Blazakis, John Baras (UMd)
2 The Problem Large amounts of data are now, or soon will be available: RouteViews, RIPE Archives, PREDICT, etc The problem is no longer access to raw data but how to extract useful information from the raw data Need tools that can: Scale to large input datasets Provide useful data summarizations Are easy to use Provide useful information BGP::Inspect Goal is to attempt to make it easier to use raw data from archives such as RouteViews, by pre-processing, reformatting and indexing the data
3 Outline BGP::Inspect and BGPdb Architecture, Techniques, Algorithms BGP::Inspect Interface Basic queries, Global Summarizations Detailed specific queries, AS/Prefix Case Study 1 The AS9121 Incident Case Study 2 Prefix Hijacking Example Conclusions, Future Work and Discussion
4 BGP::Inspect Analyzing MRT Data: Large volumes of data ~RV-66G compressed Extracting useful information requires writing custom parsers even for basic information Lots and lots of redundancy Approach: Preprocess RouteViews data Remove redundancy as much as possible Use data compression to the extent possible Build efficient indices to help queries Pre-compute and store commonly used statistics at data load time not at query time Build easy to use interface
5 BGPdb BGPdb is the core of the BGP::Inspect system BGPdb represents the pre-processed database, which is queried by the BGP::Inspect interface Provides some useful techniques that maybe applied to processing other large datasets not just BGP datasets
6 BGPdb Techniques and Algorithms Removing redundancy from BGP datasets ASPATH, COMMUNITY, UPDATE Msgs are repeated over and over, only time changes Compressed-Chunked Files Compromise between size and usability B+ Tree indices Indexing based on time, this enables fast time-range queries Caching while processing input datasets Messages are repetitive, so keep cache of previous processing for speedup
7 BGPdb System Architecture
8 BGP::Inspect Beta v0.2 Dataset: Jan1- March BGP::Inspect Example queries (per peer, 1,7,30 days): Most active AS s Most active prefixes Prefixes with most OriginAS changes Raw Data Analysis(per peer) Prefix/AS, Time Range Uniques prefixes by AS OriginAS changes for a prefix Time to run query More specific prefixes announced
9 BGP::Inspect Interface
10 Global Queries Most Active ASes
11 Global Queries: Most OriginAS Changes
12 Raw Data Analysis AS Query
13 Raw Data Analysis Prefix query
14 Case Study 1 AS9121 Incident At ~09:19 UTC on Dec 24, 2004, AS9121 began re-originating a large number of globally routed prefixes Forensics: What happened? Who did it? Could there have been some early detection? How widespread was it?
15 Step 1: What
16 Step 1.5: Hmm interesting Dec 22, 23 Dec 24
17 Step 2: Was I affected?/should I care?
18 Step 3: Where Level 3 - No AOL - Yes GLBX - No Sprint - Yes
19 Step 4: How widespread Level 3 AOL
20 Step 4: How widespread Sprint GLBX
21 Step 5: How long Time Unique Prefixes Announced by 9121 as seen by Sprint Primary Event Secondary Event
22 Case Study 2 Prefix Hijack Incident Incident: On Feb 10 th, AS2586, announces /24, which is part of Merit s CIDR block /14 Trouble ticket filed, bogus announcement withdrawn by AS2586 by Feb 10 th, 19:22hrs How do we find out what happened? Could there have been automated detection? What was the impact, how widespread was it? 5
23 Step 1 Finding out what happened
24 Step 2 Who, why
25 Step 3 where Sprint Level 3 Global X AOL
26 Conclusions and Future Work There is a need to build efficient tools that help extract useful information from large BGP datasets BGP::Inspect is currently available to the network operator and research communities and feedback is appreciated Aside from BGP::Inspect we have presented some basic techniques such as chunked-compressed files, B+ Tree indexing, data redundancy elimination, and caching that can be applied by other data mining tools to help analyze other large datasets as well. The goal is not just to provide access to the data, but to try to provider useful data summaries as well, that can help researchers and network operators quickly identify potentially interesting events. Top20 lists are a good way to bring potentially interesting things to the attention of people. Tools need to be useful before they can be used, and in order to be useful, feedback from potential users is critical. BGP data analysis need not be hard/painful/tedious, that s what tools are for! Where do we go from here, so we have basic capabilities what about: Automated anomaly detection, notification, same tool?, different tool? More scalability,? What are the limits? What are more useful queries? What book-keeping do we need to track those?
Outline. The Problem BGP/Routing Information. Netflow/Traffic Information. Conclusions
Outline The Problem BGP/Routing Information BGP-Inspect Information Extraction from BGP Update messages VAST Internet AS topology Visualization Netflow/Traffic Information Flamingo Internet Traffic Exploration
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé
Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
technical Operations Area IP Resource Management
IP Resource Management technical The IP Resource management is one of the critical areas of AfriNIC's activities. 27 has shown a great growth in its activity through new members and Resources Allocation/Assignment.
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
The Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 01003
On Characterizing BGP Routing Table Growth Tian Bu, Lixin Gao, and Don Towsley University of Massachusetts, Amherst, MA 0003 Abstract The sizes of the BGP routing tables have increased by an order of magnitude
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India
1 st Symposium on Colossal Data and Networking (CDAN-2016) March 18-19, 2016 Medicaps Group of Institutions, Indore, India Call for Papers Colossal Data Analysis and Networking has emerged as a de facto
PowerSteering Product Roadmap Your Success Is Our Bottom Line
Drive strategy. Accelerate results. cloud-based program & portfolio management software PowerSteering Product Roadmap Your Success Is Our Bottom Line Jay Hoskins Director of Product Management PowerSteering
How To Make A Network Overlay More Efficient
Corporate Technology Service Layer Components for Resource Management in Distributed Applications Fabian Stäber Siemens Corporate Technology, Information and Communications Copyright Siemens AG 2007. Alle
BGP route monitoring. Mar, 25, 2008 Matsuzaki maz Yoshinobu <[email protected]>, <[email protected]>
BGP route monitoring Mar, 25, 2008 Matsuzaki maz Yoshinobu , 1 abstract BGP prefix hijack is a serious security issue in the internet, and these events have been widely
Security Event and Log Management Service:
IBM Global Technology Services December 2007 Security Event and Log Management Service: Comprehensive, Cost-effective Approach to Enhance Network Security and Security Data Management Page 2 Contents 2
Big Data :: Big Demand
Big Data :: Big Demand Introductions John Martin Director Information Management Children s Hospital of Philadelphia [email protected] William Nieczpiel Analytics Development Manager Children s
BGPInspector: A Real-time Extensible Border Gateway Protocol Monitoring Framework
BGPInspector: A Real-time Extensible Border Gateway Protocol Monitoring Framework Mingwei Zhang University of Oregon, Eugene, OR, USA Email: [email protected] Abstract The Internet often experiences
Doing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
Cloudy With a Chance of Breach Forecasting Cyber Security Incidents
Cloudy With a Chance of Breach Forecasting Cyber Security Incidents Manish Karir Yang Liu, Armin Sarabi, Jing Zhang, Parinaz Nagzadeh, Michael Bailey, Mingyan Liu Background Reputation Matters Security
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers
Layer Four Traceroute (and related tools) A modern, flexible path-discovery solution with advanced features for network (reverse) engineers So, what is path discovery and why is it important? Path discovery
DATA MINING TECHNOLOGY. Keywords: data mining, data warehouse, knowledge discovery, OLAP, OLAM.
DATA MINING TECHNOLOGY Georgiana Marin 1 Abstract In terms of data processing, classical statistical models are restrictive; it requires hypotheses, the knowledge and experience of specialists, equations,
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
Exterior Gateway Protocols (BGP)
Exterior Gateway Protocols (BGP) Internet Structure Large ISP Large ISP Stub Dial-Up ISP Small ISP Stub Stub Stub Autonomous Systems (AS) Internet is not a single network! The Internet is a collection
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Database Marketing, Business Intelligence and Knowledge Discovery
Database Marketing, Business Intelligence and Knowledge Discovery Note: Using material from Tan / Steinbach / Kumar (2005) Introduction to Data Mining,, Addison Wesley; and Cios / Pedrycz / Swiniarski
SPAMTRACER TRACKING FLY- BY SPAMMERS
SPAMTRACER TRACKING FLY- BY SPAMMERS RIPE 67 PIERRE- ANTOINE VERVIER SYMANTEC RESEARCH LABS Pierre- [email protected] RIPE 67 - Athens - Oct. 14 th - 18 th, 2013 1 2 Where It All Begins CONJECTURE
Internet Routing Protocols Lecture 04 BGP Continued
Internet Routing Protocols Lecture 04 BGP Continued Advanced Systems Topics Lent Term, 008 Timothy G. Griffin Computer Lab Cambridge UK Two Types of BGP Sessions AS External Neighbor (EBGP) in a different
An intelligent tool for expediting and automating data mining steps. Ourania Hatzi, Nikolaos Zorbas, Mara Nikolaidou and Dimosthenis Anagnostopoulos
An intelligent tool for expediting and automating data mining steps Ourania Hatzi, Nikolaos Zorbas, Mara Nikolaidou and Dimosthenis Anagnostopoulos Outline Data Mining, current tools An intelligent tool
Understanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
Table of Contents. Chapter No. 1 Introduction 1. iii. xiv. xviii. xix. Page No.
Table of Contents Title Declaration by the Candidate Certificate of Supervisor Acknowledgement Abstract List of Figures List of Tables List of Abbreviations Chapter Chapter No. 1 Introduction 1 ii iii
DD2491 p1 2008. Load balancing BGP. Johan Nicklasson KTHNOC/NADA
DD2491 p1 2008 Load balancing BGP Johan Nicklasson KTHNOC/NADA Dual home When do you need to be dual homed? How should you be dual homed? Same provider. Different providers. What do you need to have in
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources
IP Forwarding Anomalies and Improving their Detection using Multiple Data Sources Matthew Roughan (Univ. of Adelaide) Tim Griffin (Intel Research Labs) Z. Morley Mao (Univ. of Michigan) Albert Greenberg,
State of Washington. BHAS Help Desk Support Services. July 2015 V1.0
State of Washington BHAS Help Desk Support Services July 2015 V1.0 WA-Behavioral Health Assessment Solution (BHAS ) BHAS supports the Child and Adolescent Needs and Strengths Assessment (CANS) and Adult
Life Insurance & Big Data Analytics: Enterprise Architecture
Life Insurance & Big Data Analytics: Enterprise Architecture Author: Sudhir Patavardhan Vice President Engineering Feb 2013 Saxon Global Inc. 1320 Greenway Drive, Irving, TX 75038 Contents Contents...1
LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG AND EVENT MANAGEMENT FOR SECURITY AND COMPLIANCE The Tripwire VIA platform delivers system state intelligence, a continuous approach to security that provides leading indicators of breach
Internet topology and performance analytics for mapping critical network infrastructure
CYBER SECURITY DIVISION 2014 R&D SHOWCASE AND TECHNICAL WORKSHOP Internet topology and performance analytics for mapping critical network infrastructure CAIDA/UCSD PI k claffy 16-18 December 2014 1 Team
Course 803401 DSS. Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Oman College of Management and Technology Course 803401 DSS Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization CS/MIS Department Information Sharing
THE GLOBAL EVENT MANAGER
The Big Data Mining Company THE GLOBAL EVENT MANAGER When data is available and reachable, it has to be processed and decrypted using multiple heterogeneous tools, if these are available. Each of these
Why Is MPLS VPN Security Important?
MPLS VPN Security An Overview Monique Morrow Michael Behringer May 2 2007 Future-Net Conference New York Futurenet - MPLS Security 1 Why Is MPLS VPN Security Important? Customer buys Internet Service :
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Examination. IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491
Examination IP routning på Internet och andra sammansatta nät, DD2491 IP routing in the Internet and other complex networks, DD2491 Date: December 15 2009 14:00 18:00 1. No help material is allowed - You
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
SES / CIF. Internet2 Combined Industry and Research Constituency Meeting April 24, 2012
SES / CIF Internet2 Combined Industry and Research Constituency Meeting April 24, 2012 Doug Pearson Technical Director, REN-ISAC [email protected] Background on REN-ISAC The REN-ISAC mission is to
Practical BGP Security: Architecture, Techniques and Tools
renesys WHITE PAPER Practical BGP Security: Architecture, Techniques and Tools Laris Benkis A practical approach to identify weaknesses and highlight strategies for the detection of internetwork failures
VLSM and CIDR Malin Bornhager Halmstad University
VLSM and CIDR Malin Bornhager Halmstad University Session Number 2002, Svenska-CNAP Halmstad University 1 Objectives Classless routing VLSM Example of a VLSM calculation 2 Classless routing CIDR (Classless
Data Mining for Customer Service Support. Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin
Data Mining for Customer Service Support Senioritis Seminar Presentation Megan Boice Jay Carter Nick Linke KC Tobin Traditional Hotline Services Problem Traditional Customer Service Support (manufacturing)
Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
Turban, Aronson, and Liang Decision Support Systems and Intelligent Systems, Seventh Edition Chapter 5 Business Intelligence: Data Warehousing, Data Acquisition, Data Mining, Business Analytics, and Visualization
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics
CHANGING THE SECURITY MONITORING STATUS QUO Solving SIEM problems with RSA Security Analytics TRADITIONAL SIEMS ARE SHOWING THEIR AGE Security Information and Event Management (SIEM) tools have been a
LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF LOG MANAGEMENT AND SIEM FOR SECURITY AND COMPLIANCE As part of the Tripwire VIA platform, Tripwire Log Center offers out-of-the-box integration with Tripwire Enterprise to offer visibility
Managing Large Imagery Databases via the Web
'Photogrammetric Week 01' D. Fritsch & R. Spiller, Eds. Wichmann Verlag, Heidelberg 2001. Meyer 309 Managing Large Imagery Databases via the Web UWE MEYER, Dortmund ABSTRACT The terramapserver system is
Inter-domain Routing. Outline. Border Gateway Protocol
Inter-domain Routing Outline Border Gateway Protocol Internet Structure Original idea Backbone service provider Consumer ISP Large corporation Consumer ISP Small corporation Consumer ISP Consumer ISP Small
Tier Architectures. Kathleen Durant CS 3200
Tier Architectures Kathleen Durant CS 3200 1 Supporting Architectures for DBMS Over the years there have been many different hardware configurations to support database systems Some are outdated others
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
Extending Security Analytics to support Operational Efficiency. John A. Greco Deloitte & Touche LLP Cyber Risk Services
Extending Security Analytics to support Operational Efficiency John A. Greco Deloitte & Touche LLP Cyber Risk Services Extending security analytics to support operational efficiency Key components of the
Solutions for Encrypting Data on Tape: Considerations and Best Practices
Solutions for Encrypting Data on Tape: Considerations and Best Practices NOTICE This white paper may contain proprietary information protected by copyright. Information in this white paper is subject to
Network-Wide Class of Service (CoS) Management with Route Analytics. Integrated Traffic and Routing Visibility for Effective CoS Delivery
Network-Wide Class of Service (CoS) Management with Route Analytics Integrated Traffic and Routing Visibility for Effective CoS Delivery E x e c u t i v e S u m m a r y Enterprise IT and service providers
What s New in Security Analytics 10.4. Be the Hunter.. Not the Hunted
What s New in Security Analytics 10.4 Be the Hunter.. Not the Hunted Attackers Are Outpacing Detection Attacker Capabilities Time To Discovery Source: VERIZON 2014 DATA BREACH INVESTIGATIONS REPORT 2 TRANSFORM
Certified Tester. Advanced Level Overview
Version 2012 Copyright Notice This document may be copied in its entirety, or extracts made, if the source is acknowledged. Copyright (hereinafter called ISTQB ). Advanced Level Working Group: Mike Smith
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution
Analyzing Big Data with Splunk A Cost Effective Storage Architecture and Solution Jonathan Halstuch, COO, RackTop Systems [email protected] Big Data Invasion We hear so much on Big Data and
MIS. Platform Services. Software. Business Intelligence. Technology Customer Support
* Custom application development Payroll applications (time & attendance) Student assignment algorithm HR applications (staffing, transfers etc.) School safety web applications Mobile platform applications
BGPRV: A Library for Fast and Efficient Routing Data Manipulation
BGPRV: A Library for Fast and Efficient Routing Data Manipulation DETER/EMIST Workshop June 15th, 2006 - Arlington, VA Patrick McDaniel, Sophie Qiu, and Kevin Butler 1 BGP Security Community in the midst
Indexing Full Packet Capture Data With Flow
Indexing Full Packet Capture Data With Flow FloCon January 2011 Randy Heins Intelligence Systems Division Overview Full packet capture systems can offer a valuable service provided that they are: Retaining
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER
Tripwire Log Center NEXT GENERATION LOG AND EVENT MANAGEMENT WHITE PAPER Introduction A decade or more ago, logs of events recorded by firewalls, intrusion detection systems and other network devices were
LOG INTELLIGENCE FOR SECURITY AND COMPLIANCE
PRODUCT BRIEF uugiven today s environment of sophisticated security threats, big data security intelligence solutions and regulatory compliance demands, the need for a log intelligence solution has become
A Review of Data Mining Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
Introduction. Internet Address Depletion and CIDR. Introduction. Introduction
Introduction Internet Address Depletion and A subnet is a subset of class A, B, or C networks IP addresses are formed of a network and host portions network mask used to separate the information Introduction
Using Data Mining for Mobile Communication Clustering and Characterization
Using Data Mining for Mobile Communication Clustering and Characterization A. Bascacov *, C. Cernazanu ** and M. Marcu ** * Lasting Software, Timisoara, Romania ** Politehnica University of Timisoara/Computer
BGPmon: A real-time, scalable, extensible monitoring system
Cybersecurity Applications & Technology Conference For Homeland Security BGPmon: A real-time, scalable, extensible monitoring system He Yan Colorado State University [email protected] Dave Matthews
ETHEL THE AARDVARK GOES BGP ROUTING
Fable Of Contents ISP TECH TALK by Avi Freedman ETHEL THE AARDVARK GOES BGP ROUTING In this exciting column we'll actually walk through configuring a Cisco router for BGP. It's very important, however,
CS 6220: Data Mining Techniques Course Project Description
CS 6220: Data Mining Techniques Course Project Description College of Computer and Information Science Northeastern University Spring 2013 General Goal In this project, you will have an opportunity to
Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad Email: [email protected]
96 Business Intelligence Journal January PREDICTION OF CHURN BEHAVIOR OF BANK CUSTOMERS USING DATA MINING TOOLS Dr. U. Devi Prasad Associate Professor Hyderabad Business School GITAM University, Hyderabad
Subgraph Patterns: Network Motifs and Graphlets. Pedro Ribeiro
Subgraph Patterns: Network Motifs and Graphlets Pedro Ribeiro Analyzing Complex Networks We have been talking about extracting information from networks Some possible tasks: General Patterns Ex: scale-free,
How to use the GOSS Online Support System. Version 2.0
Version 2.0 Table of Contents Table of Contents... 1 Document Information... 3 Getting Started... 4 The GOSS Online Support System... 4 Login... 4 Lost/forgotten password?... 4 Using the GOSS Online Support
