Why running measurements?
|
|
|
- Marcus Miles Stokes
- 10 years ago
- Views:
Transcription
1 Network Measurements: Passive, Active and Hybrid approaches Stefano Traverso Why running measurements? The Internet is the first thing that humanity has built that humanity doesn't understand, the largest experiment in anarchy that we have ever had. Eric Schmidt, former Google CEO. Fundamental cornerstone to build an idea of what is going on in the network Network monitoring Troubleshooting Security Characterization of users/devices/services Stefano Traverso - TNG group - Politecnico di Torino 2 1
2 Network Measurements Active Measurements Study cause/effect relationships by injecting extra traffic into the network and observe reactions Full control on the generated traffic Lack of generality Passive Measurements Analysis of traffic traces captured by sniffers Study traffic properties without interfering with it Study traffic generated from actual Internet users In general, require a large effort Hybrid Measurements Take the best of the passive and active approaches Stefano Traverso - TNG group - Politecnico di Torino 3 Active Measurements Stefano Traverso - TNG group - Politecnico di Torino 4 2
3 The Active Measurements Scenario Supervisor Instruments probes & Extract analytics Reposit Collect measurements ory active probe data control measurements What s the bandwidth? How far is the closest server? Stefano Traverso - TNG group - Politecnico di Torino 5 Active Measurements The basic Swiss knife: Ping Host reachability tests Traceroute Detects the routers to reach a given hosts Nmap Detects open ports and hosts Iperf Measures the throughput to a host May be deployed in several vantage Points e.g., PlanetLab Stefano Traverso - TNG group - Politecnico di Torino 6 3
4 Ping Based on ICMPs echo messages Measures RTT (min,max,avg, std), TTL, packet loss, $ping PING ( ): 56 data bytes 64 bytes from : icmp_seq=0 ttl=54 time=2.715ms 64 bytes from : icmp_seq=1 ttl=54 time=2.740ms 64 bytes from : icmp_seq=2 ttl=54 time=3.218ms 64 bytes from : icmp_seq=3 ttl=54 time=2.750ms 64 bytes from : icmp_seq=4 ttl=54 time=2.932ms ^C ping statistics packets transmitted, 5 packets received, 0.0% packet loss round-trip min/avg/max/stddev = 2.715/2.871/3.218/0.190ms Stefano Traverso - TNG group - Politecnico di Torino 7 Ping advanced use Flood the host $ sudo ping -f PING ( ) 56(84) bytes of data..^c ping statistics packets transmitted, received, 0% packet loss, time 8514ms rtt min/avg/max/mdev = 0.187/0.243/0.828/0.039ms, ipg/ewma 0.277/0.224ms Get the list of traversed hops $ ping -R PING ( ) 56(124) bytes of data. 64 bytes from : icmp_req=1 ttlms NOP RR: bytes from : icmp_req=2 ttl=254 time=6.15ms NOP (same route) Stefano Traverso - TNG group - Politecnico di Torino 8 4
5 Ping advanced use (cont d) Measure the buffer size of your ADSL modem $ num=11 ; sudo ping -l $num -c $num -s PING ( ): 1472 data bytes 1480 bytes from : icmp_seq=0 ttl=50 time= ms 1480 bytes from : icmp_seq=1 ttl=50 time= ms 1480 bytes from : icmp_seq=2 ttl=50 time= ms 1480 bytes from : icmp_seq=3 ttl=50 time= ms 1480 bytes from : icmp_seq=4 ttl=50 time= ms 1480 bytes from : icmp_seq=5 ttl=50 time= ms 1480 bytes from : icmp_seq=6 ttl=50 time= ms 1480 bytes from : icmp_seq=7 ttl=50 time= ms 1480 bytes from : icmp_seq=9 ttl=50 time= ms 1480 bytes from : icmp_seq=10 ttl=50 time= ms ping statistics packets transmitted, 10 packets received, 9.1% packet loss round-trip min/avg/max/stddev = / / / ms Stefano Traverso - TNG group - Politecnico di Torino 9 Ping advanced use (cont d) Geolocation of IP addresses using multi-lateration techniques Stefano Traverso - TNG group - Politecnico di Torino 10 5
6 Ping advanced use (cont d) Ping s reliability is impaired by flow-based load balancing It can not reliably represent the performance experienced by applications In-flow RTT is more reliable Use tokyo-ping Stefano Traverso - TNG group - Politecnico di Torino 11 Ping advanced use (cont d) Often blocked by routers (they do not reply to ICMP probes) Use other protocols than ICMP UDP (as traceroute does) TCP SYN/ACK/FIN/RST messages nping Stefano Traverso - TNG group - Politecnico di Torino 12 6
7 Traceroute Print the route packets travel to network host $ traceroute traceroute to ( ), 30 hops max, 60 byte packets ( ) 2.021ms 2.203ms 2.427ms 2 18-c6500-vss.polito.it ( ) ms 0.485ms 3 mz-c-polfi.polito.it ( ) 1.432ms * 1.727ms 4 l3-garr.polito.it ( ) 6.472ms 6.704ms 7.211ms 5 ru-polito-rx1-to1.to1.garr.net ( ) 7.520ms 7.907ms 8.205ms 6 rx1-to1-rx1-mi2.mi2.garr.net ( ) ms ms ms 7 rx1-mi2-r-mi2.mi2.garr.net ( ) 9.654ms 8.722ms 8.831ms 8 r-mi2-google.mi2.garr.net ( ) 4.044ms 6.412ms 6.398ms 9 * ( ) 8.203ms ms ( ) 8.294ms 8.331ms 8.745ms 11 mil02s05-in-f23.1e100.net ( ) 8.617ms 8.709ms 9.336ms Stefano Traverso - TNG group - Politecnico di Torino 13 Traceroute (cont d) Sends UDP/IP packets with short TTLs to induce routers to reply with ICMP Time to Live exceeded in Transit $ nping --ttl=2 --udp Starting Nping ( ) at :05 CET SENT (0.0047s) UDP :53 > :40125 ttl=2 id=17368 iplen=28 RCVD (0.0182s) ICMP > TTL=0 during transit (type=11/code=0) ttl=254 id=62922 iplen=56 Stefano Traverso - TNG group - Politecnico di Torino 14 7
8 Traceroute (cont d) Fails in presence of routers employing load balancing based on the packet header Use paris-traceroute Stefano Traverso - TNG group - Politecnico di Torino 15 Nmap Tool for network discovery and security auditing Given a host It identifies open ports It identify the OS Given a network It identifies hosts that are up Stefano Traverso - TNG group - Politecnico di Torino 16 8
9 Nmap (cont d) SYN stealth port scan Sends TCP SYN message if ACK received, port = open Immediately sends RST message to close the connection Else, port = closed $ sudo nmap -ss Starting Nmap 6.00 ( ) at :28 CET Nmap scan report for Host is up ( s latency). Not shown: 992 closed ports PORT STATE SERVICE 22/tcp open ssh 80/tcp open http 3306/tcp open mysql 6000/tcp open X /tcp open git Stefano Traverso - TNG group - Politecnico di Torino 17 A network scan Nmap (cont d) $ nmap -sp /25 Starting Nmap 6.00 ( ) at :21 CET Nmap scan report for aslan.polito.it ( ) Host is up ( s latency). Nmap scan report for l3-areait-91.polito.it ( ) Host is up (0.0048s latency). Nmap scan report for amedeonl2.polito.it ( ) Host is up (0.0014s latency).... Nmap scan report for Host is up ( s latency). Nmap scan report for printernl1.polito.it ( ) Host is up ( s latency). Nmap done: 128 IP addresses (14 hosts up) scanned in 1.71 seconds Stefano Traverso - TNG group - Politecnico di Torino 18 9
10 Iperf It measures TCP and UDP bandwidth performance Useful to 1. Run speed-tests 2. Create artificial traffic Requires the user to have control of both end points Stefano Traverso - TNG group - Politecnico di Torino 19 Iperf (cont d) Server $ iperf -s Server listening on TCP port 5001 TCP window size: 85.3 KByte (default) [ 4] local port 5001 connected with port [ ID] Interval Transfer Bandwidth [ 4] sec 768 KBytes 550 Kbits/sec Client $ iperf -c Client connecting to , TCP port 5001 TCP window size: 129 KByte (default) [ 4] local port connected with port 5001 [ ID] Interval Transfer Bandwidth [ 4] sec 768 KBytes 611 Kbits/sec Stefano Traverso - TNG group - Politecnico di Torino 20 10
11 DNS-level active measurements Useful to dissect the infrastructure of Internet services E.g., Content Delivery Networks, Cloud-based services Different DNS servers provide often different results, based on client location Stefano Traverso - TNG group - Politecnico di Torino 21 NSlookup $ nslookup eu.sc-proxy.samsungosp.com Server: Address: #53 Non-authoritative answer: eu.sc-proxy.samsungosp.com canonical name = scloud-pew1-prx eu-west- 1.elb.amazonaws.com. Name: scloud-pew1-prx eu-west-1.elb.amazonaws.com Address: Name: scloud-pew1-prx eu-west-1.elb.amazonaws.com Address: Stefano Traverso - TNG group - Politecnico di Torino 22 11
12 HTTP-level active measurements Web servers provides information about the services they host Probe the server with artificial HTTP requests HTTP-Knocking Using automatic (headless) browsers Stefano Traverso - TNG group - Politecnico di Torino 23 HTTP-Knocking Probe a web server with a simple HTTP $ curl --head HTTP/ Method Not Allowed x-amz-request-id: ACF953EAEC5F234B x-amz-id-2: euqwzyxgrjudhfpnh00f5xzl84htcb9mi8dzd2jdcssnqhjbtg0iztr40 3RLbR9m Allow: GET Content-Type: application/xml Transfer-Encoding: chunked Date: Wed, 17 Dec :21:48 GMT Server: AmazonS3 Stefano Traverso - TNG group - Politecnico di Torino 24 12
13 Automatic Browsing Selenium WebDriver [ Can be combined with Standard browsers (Firefox, Chrome, etc.) Headless browsers (Phantomjs [ Emulates users interacting with a webpage: Important for web developers to test their designs Useful for researchers to build crawlers E.g., infer Twitter s social graph Stefano Traverso - TNG group - Politecnico di Torino 25 Passive Measurements Stefano Traverso - TNG group - Politecnico di Torino 26 13
14 The Passive Measurement Scenario Supervisor Extract analytics Collect measurements Reposit ory passive probe data control traffic Deploy some vantage points What are the performance of YouTube video streaming? What are the performance of a cache? Stefano Traverso - TNG group - Politecnico di Torino 27 Passive measurements The basic Swiss knife: TCPdump Full packet-level captures Tstat, Netflow Flow-level captures, aggregated statistics Netstat Host-level, aggregated statistics Wireshark Full packet-level captures with nice GUI May be deployed in several vantage points, e.g., probes within a large network Works on a single machine Stefano Traverso - TNG group - Politecnico di Torino 28 14
15 Netstat (cont d) Summarizes the connections, interface statistics, etc. for a given host Useful to monitor server machines $ netstat -s Tcp: active connections openings 39 passive connection openings failed connection attempts 139 connection resets received 6 connections established segments received segments send ou t segments retransmited 4 bad segments received. 278 resets sent Stefano Traverso - TNG group - Politecnico di Torino 29 Netstat (cont d) $ netstat Active Internet connections (w/o servers) Proto Recv-Q Send-Q Local Address Foreign Address State tcp 0 0 localhost:50398 localhost:23414 ESTABLISHED tcp 0 0 localhost:25001 localhost:41428 ESTABLISHED tcp 0 0 localhost:41428 localhost:25001 ESTABLISHED tcp 0 0 localhost:23414 localhost:50398 ESTABLISHED tcp 0 0 grigio.local:53723 snt-re4-10c.sjc.dr:http ESTABLISHED tcp 0 48 grigio.local:ssh :56181 ESTABLISHED tcp 0 1 grigio.local:42397 stefanonl1.polito:24800 SYN_SENT Stefano Traverso - TNG group - Politecnico di Torino 30 15
16 Tcpdump It dumps the traffic it observes flowing on a network from its vantage point It inspects packets at network level E.g., It does not rebuilds TCP flows It can generate large amounts of data In pcap and txt formats Stefano Traverso - TNG group - Politecnico di Torino 31 Tcpdump (cont d) It provides very detailed view on the packets $ sudo tcpdump -nnvvxs src :31: IP (tos 0x0, ttl 64, id 62735, offset 0, flags [DF], proto TCP (6), length 40) > : Flags [.], cksum 0xb3f6 (correct), seq , ack , win 65535, length 0 0x0000: fe47 00e0 4c36 00c cG.G..L6...E. 0x0010: 0028 f50f a9 82c0 5b49 11fe.(..@[email protected]...[I.. 0x0020: 2010 f33a d23 728c b :.P]#r..IqBP. 0x0030: ffff b3f Stefano Traverso - TNG group - Politecnico di Torino 32 16
17 Wireshark Tcpdump with a nice GUI Same very detailed view on the traffic It rebuilds TCP/HTTP/ connections Let the user run specific analysis in a few clicks Best tool for quick troubleshooting Load the traffic into the memory Not suitable to load/capture GBs of traces Stefano Traverso - TNG group - Politecnico di Torino 33 Wireshark (cont d) Stefano Traverso - TNG group - Politecnico di Torino 34 17
18 Tstat is a passive sniffer developed by Polito It works at flow-level Monitors at network level, and re-builds flows at transport-level Computes several L3/L4 metrics (e.g., #pkts, #bytes, RTT, TTL, etc.) Performs traffic classification Deep Packet Inspection (DPI) Statistical methods (Skype, obfuscated P2P) Different output formats (logs, RRDs, histograms, pcap) Run on off-the-shelf HW Up to 2Gb/s with standard network interfaces Currently adopted in real network scenarios (campus network and ISPs) Stefano Traverso - TNG group - Politecnico di Torino 35 Tstat deployment scenario Private Network Border router Rest of the world Traffic stats Stefano Traverso - TNG group - Politecnico di Torino 36 18
19 How Tstat works? client Tstat server 1 TCP logs (100+ stats) L7 Data TCP Flow 2 Classification HTTP Transaction P2P Skype HTTP logs Stefano Traverso - TNG group - Politecnico di Torino 37 client Tstat server Tstat + DN-Hunter DNS server DNS conversation The worst enemy of a passive sniffer is traffic encryption (HTTPS) DN-Hunter is a plugin which inspects DNS conversations (which are not encrypted, yet) DNS-level information is attached to TCP logs L7 Data Stefano Traverso - TNG group - Politecnico di Torino 38 19
20 Tstat Use case: Understanding Amazon AWS Elastic Cloud Computing EC2 provides re-sizeable compute capacity in the Cloud by means of virtualized servers Simple Storage Service S3 offers a service to store/retrieve files into/from the Cloud Content Delivery Network CloudFront EC2/S3 Datacenters distribute content to end-users with CloudFront low latency edge-nodes and high data transfer speeds Focus: 1. Evolution over time of AWS: the number of datacenters, their locations, and performance as perceived by the ISP customers 2. Analysis of popular Cloud/CDN-based web-services: show their dynamics, how they perform, etc. Analysis of traffic generated by Clouds and CDNs 39 Tstat Use case: Understanding Amazon AWS Stefano Traverso - TNG group - Politecnico di Torino 40 20
21 Tstat Use case: NetCurator Web app based on Tstat which extracts interesting links browsed by users from HTTP traffic Stefano Traverso - TNG group - Politecnico di Torino 41 Hybrid Measurements Stefano Traverso - TNG group - Politecnico di Torino 42 21
22 Network Measurements Active measurements Let us exactly define the workload the network is subject to Allow to measure cause/effect relationhips easily Passive measurements Do not change the working point of the network More detailed view of the network status Stefano Traverso - TNG group - Politecnico di Torino 43 with some drawbacks Active measurements Difficult to obtain detailed information about Transport and Network Layers Passive measurements Generate lots of data to process Fail when no (useful) traffic is generated Stefano Traverso - TNG group - Politecnico di Torino 44 22
23 Hybrid Measurements Combine active and passive approaches: 1. Augment measurements from active tests with detailed IP/TCP-level information obtained passively 2. Active measurements generate the desired amount of traffic less logs to analyze Iperf Stefano Traverso - TNG group - Politecnico di Torino Ping 45 Hybrid Measurements for Network QoS Troubleshooting Management Layer Analysis Layer Measurement Layer ISP Stefano Traverso - TNG group - Politecnico di Torino IXP 46 23
24 Use case: Speed Tests in ISP network Active probe: IQM (by Fastweb) Passive probe: Tstat FTP Client Traceroute FTP Server Traceroute Ping Headless Browser Ping IQM Client IQM Server Stefano Traverso - TNG group - Politecnico di Torino 47 Testbed & Dataset 30+ IQM client probes uniformly distributed within Fastweb edge network Tstat installed on the IQM server probe Network configurations 1. ADSL: U-1Mbps/D-16Mbps U-1Mbps/D-12Mbps U-0.5Mbps/D-8Mbps 2. FTTH U- 10Mbps/D-10Mbps 10-sec long speed-test every 4min FTP transfers in both Upload and Download 3 months of tests (Feb 1st to Apr 30th 2014) 1.2M+ speed-test reports Stefano Traverso - TNG group - Politecnico di Torino 48 24
25 Congestion in the Virtual Leased Network ADSL U1Mbps/D12Mbps Active Test Evident day/night periodicity + Large std(rtt) and RTX rate Passive measurement Congestion in the Virtual Leased Line Stefano Traverso - TNG group - Politecnico di Torino 49 Congestion at the Uplink FTTH U10Mbps/D10Mbps Active Test Passive measurement FTTH (no low SNR issues) + No day/night periodicity + large RTX segment rate??? Small buffer at the uplink (thanks ping ) Stefano Traverso - TNG group - Politecnico di Torino 50 25
26 Thanks! Stefano Traverso - TNG group - Politecnico di Torino 51 26
Troubleshooting Tools
Troubleshooting Tools An overview of the main tools for verifying network operation from a host Fulvio Risso Mario Baldi Politecnico di Torino (Technical University of Turin) see page 2 Notes n The commands/programs
Policy Based Forwarding
Policy Based Forwarding Tech Note PAN-OS 4.1 Revision A 2012, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Security... 3 Performance... 3 Symmetric Routing... 3 Service Versus
Monitoring Android Apps using the logcat and iperf tools. 22 May 2015
Monitoring Android Apps using the logcat and iperf tools Michalis Katsarakis [email protected] Tutorial: HY-439 22 May 2015 http://www.csd.uoc.gr/~hy439/ Outline Introduction Monitoring the Android
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Network Management and Debugging. Jing Zhou
Network Management and Debugging Jing Zhou Network Management and Debugging Network management generally includes following task: Fault detection for networks, gateways and critical servers Schemes for
Internet Protocol: IP packet headers. vendredi 18 octobre 13
Internet Protocol: IP packet headers 1 IPv4 header V L TOS Total Length Identification F Frag TTL Proto Checksum Options Source address Destination address Data (payload) Padding V: Version (IPv4 ; IPv6)
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Website Analysis. foxnews has only one mail server ( foxnewscommail.protection.outlook.com ) North America with 4 IPv4.
Website Analysis Hanieh Hajighasemi Dehaghi Computer Networks : Information transfert (LINGI2141) Ecole Polytechnique de Louvain (EPL) Université Catholique de Louvain Abstract The candidate website(foxnews.com)
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
LESSON 3.6. 98-366 Networking Fundamentals. Understand TCP/IP
Understand TCP/IP Lesson Overview In this lesson, you will learn about: TCP/IP Tracert Telnet Netstat Reserved addresses Local loopback IP Ping Pathping Ipconfig Protocols Anticipatory Set Experiment with
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
IP network tools & troubleshooting. AFCHIX 2010 Nairobi, Kenya October 2010
IP network tools & troubleshooting AFCHIX 2010 Nairobi, Kenya October 2010 Network configuration Reminder, configure your network in /etc/ rc.conf ( x = your IP, from.10 to...) ifconfig_bge0= 41.215.76.x/24
Network performance in virtual infrastructures
Network performance in virtual infrastructures A closer look at Amazon EC2 Alexandru-Dorin GIURGIU University of Amsterdam System and Network Engineering Master 03 February 2010 Coordinators: Paola Grosso
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Introduction to Network Security Lab 2 - NMap
Introduction to Network Security Lab 2 - NMap 1 Introduction: Nmap as an Offensive Network Security Tool Nmap, short for Network Mapper, is a very versatile security tool that should be included in every
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Rapid IP redirection with SDN and NFV. Jeffrey Lai, Qiang Fu, Tim Moors December 9, 2015
Rapid IP redirection with SDN and NFV Jeffrey Lai, Qiang Fu, Tim Moors December 9, 2015 Background Enabling ISP-CDN collaboration SDN, NFV, CDN Basics Client assumptions And breaking them The problem My
Live Traffic Monitoring with Tstat: Capabilities and Experiences
Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015
Workshop on Scientific Applications for the Internet of Things (IoT) March 16-27 2015 IPv6 in practice with RPi Alvaro Vives - [email protected] Contents 1 Lab topology 2 IPv6 Configuration 2.1 Linux commands
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Internet Firewall CSIS 3230. Internet Firewall. Spring 2012 CSIS 4222. net13 1. Firewalls. Stateless Packet Filtering
Internet Firewall CSIS 3230 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 8.8: Packet filtering, firewalls, intrusion detection Ch
The Ecosystem of Computer Networks. Ripe 46 Amsterdam, The Netherlands
The Ecosystem of Computer Networks Ripe 46 Amsterdam, The Netherlands Silvia Veronese NetworkPhysics.com [email protected] September 2003 1 Agenda Today s IT challenges Introduction to Network
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
File transfer and login using IPv6, plus What to do when things don t work
File transfer and login using IPv6, plus What to do when things don t work Introduction Usually file transfers to remote computers and logins just work. But sometimes they don t. This article reviews the
Network and Services Discovery
A quick theorical introduction to network scanning January 8, 2016 Disclaimer/Intro Disclaimer/Intro Network scanning is not exact science When an information system is able to interact over the network
NETWORK SECURITY WITH OPENSOURCE FIREWALL
NETWORK SECURITY WITH OPENSOURCE FIREWALL Vivek Kathayat,Dr Laxmi Ahuja AIIT Amity University,Noida [email protected] [email protected] ATTACKER SYSTEM: Backtrack 5r3( 192.168.75.10 ) HOST: Backtrack
Practical Network Forensics
BCS-ISSG Practical Network Forensics Day BCS, London Practical Network Forensics Alan Woodroffe [email protected] www.securesystemssupport.co.uk Copyright Secure Systems Support Limited.
Chapter 8 Security Pt 2
Chapter 8 Security Pt 2 IC322 Fall 2014 Computer Networking: A Top Down Approach 6 th edition Jim Kurose, Keith Ross Addison-Wesley March 2012 All material copyright 1996-2012 J.F Kurose and K.W. Ross,
Port Scanning. Objectives. Introduction: Port Scanning. 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap.
Port Scanning Objectives 1. Introduce the techniques of port scanning. 2. Use port scanning audit tools such as Nmap. Introduction: All machines connected to a LAN or connected to Internet via a modem
Inside Dropbox: Understanding Personal Cloud Storage Services
Inside Dropbox: Understanding Personal Cloud Storage Services Idilio Drago Marco Mellia Maurizio M. Munafò Anna Sperotto Ramin Sadre Aiko Pras IRTF Vancouver Motivation and goals 1 Personal cloud storage
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Broadband Quality Test Plan
Broadband Quality Test Plan Version 1.2 December 2007 Page 1 Table of Contents 1 EXPERIMENT DESIGN... 3 1.1 METRICS... 3 1.2 DESTINATIONS...4 1.3 MEASUREMENT TECHNIQUES... 6 2 TEST SETUP... 7 2.1 ISPS
1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP.
Chapter 2 Review Questions 1. The Web: HTTP; file transfer: FTP; remote login: Telnet; Network News: NNTP; e-mail: SMTP. 2. Network architecture refers to the organization of the communication process
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Tools for penetration tests 1. Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus.
Tools for penetration tests 1 Carlo U. Nicola, HT FHNW With extracts from documents of : Google; Wireshark; nmap; Nessus. What is a penetration test? Goals: 1. Analysis of an IT-environment and search
Networks: IP and TCP. Internet Protocol
Networks: IP and TCP 11/1/2010 Networks: IP and TCP 1 Internet Protocol Connectionless Each packet is transported independently from other packets Unreliable Delivery on a best effort basis No acknowledgments
Application Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
Network Connect Performance Logs on MAC OS
Network Connect Performance Logs on MAC OS How-to Juniper Networks, Inc. 1 Table of Contents Introduction Part 1: Client Prerequisites... 3 Step 1.1: Packet Sniffer... 3 Step 1.2: Output IPs, Routes, Ping,
Homework 3 TCP/IP Network Monitoring and Management
Homework 3 TCP/IP Network Monitoring and Management Hw3 Assigned on 2013/9/13, Due 2013/9/24 Hand In Requirement Prepare a activity/laboratory report (name it Hw3_WebSys.docx) using the ECET Lab report
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Challenges of Sending Large Files Over Public Internet
Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting
+ iptables. packet filtering && firewall
+ iptables packet filtering && firewall + what is iptables? iptables is the userspace command line program used to configure the linux packet filtering ruleset + a.k.a. firewall + iptable flow chart what?
Visualizations and Correlations in Troubleshooting
Visualizations and Correlations in Troubleshooting Kevin Burns Comcast [email protected] 1 Comcast Technology Groups Cable CMTS, Modem, Edge Services Backbone Transport, Routing Converged Regional
Frequently Asked Questions
Frequently Asked Questions 1. Q: What is the Network Data Tunnel? A: Network Data Tunnel (NDT) is a software-based solution that accelerates data transfer in point-to-point or point-to-multipoint network
Internet Infrastructure Measurement: Challenges and Tools
Internet Infrastructure Measurement: Challenges and Tools Internet Infrastructure Measurement: Challenges and Tools Outline Motivation Challenges Tools Conclusion Why Measure? Why Measure? Internet, with
L3DSR Overcoming Layer 2 Limitations of Direct Server Return Load Balancing
L3DSR Overcoming Layer 2 Limitations of Direct Server Return Load Balancing Jan Schaumann, Systems Architect ! E2A7 437A 7AB8 6EA1 7E1D! F6DC BF09 CDC9 E157 FAB8! Traditional or
How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On
Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply
1! Network forensics
Network Forensics COMP 2555: Principles of Computer Forensics Autumn 2014 http://www.cs.du.edu/2555 1! Network forensics Network Forensics Overview! Systematic tracking of incoming and outgoing traffic!
What is a DoS attack?
CprE 592-YG Computer and Network Forensics Log-based Signature Analysis Denial of Service Attacks - from analyst s point of view Yong Guan 3216 Coover Tel: (515) 294-8378 Email: [email protected] October
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
Nmap: Scanning the Internet
Nmap: Scanning the Internet by Fyodor Black Hat Briefings USA August 6, 2008; 10AM Defcon 16 August 8, 2008; 4PM Abstract The Nmap Security Scanner was built to efficiently scan large networks, but Nmap's
Introduction of Intrusion Detection Systems
Introduction of Intrusion Detection Systems Why IDS? Inspects all inbound and outbound network activity and identifies a network or system attack from someone attempting to compromise a system. Detection:
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Carrier/WAN SDN Brocade Flow Optimizer Making SDN Consumable
Brocade Flow Optimizer Making SDN Consumable Business And IT Are Changing Like Never Before Changes in Application Type, Delivery and Consumption Public/Hybrid Cloud SaaS/PaaS Storage Users/ Machines Device
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
Technical Support Information Belkin internal use only
The fundamentals of TCP/IP networking TCP/IP (Transmission Control Protocol / Internet Protocols) is a set of networking protocols that is used for communication on the Internet and on many other networks.
netkit lab MPLS VPNs with overlapping address spaces 1.0 S.Filippi, L.Ricci, F.Antonini Version Author(s)
netkit lab MPLS VPNs with overlapping address spaces Version Author(s) 1.0 S.Filippi, L.Ricci, F.Antonini E-mail Web Description [email protected] http://www.kaksonetworks.it/ A lab showing
Applications. Network Application Performance Analysis. Laboratory. Objective. Overview
Laboratory 12 Applications Network Application Performance Analysis Objective The objective of this lab is to analyze the performance of an Internet application protocol and its relation to the underlying
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
CSE331: Introduction to Networks and Security. Lecture 12 Fall 2006
CSE331: Introduction to Networks and Security Lecture 12 Fall 2006 Announcements Midterm I will be held Friday, Oct. 6th. True/False Multiple Choice Calculation Short answer Short essay Project 2 is on
NQA Technology White Paper
NQA Technology White Paper Keywords: NQA, test, probe, collaboration, scheduling Abstract: Network Quality Analyzer (NQA) is a network performance probe and statistics technology used to collect statistics
Network Address Translation (NAT) Virtual Private Networks (VPN)
Network Address Translation (NAT) Virtual Private Networks (VPN) March 19, 1998 Gordon Chaffee Berkeley Multimedia Research Center University of California, Berkeley Email: [email protected] URL:
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway
Controlling Risk, Conserving Bandwidth, and Monitoring Productivity with Websense Web Security and Websense Content Gateway Websense Support Webinar January 2010 web security data security email security
Introduction to Performance Measurements and Monitoring. Vinayak Hegde [email protected] @vinayakh
Introduction to Performance Measurements and Monitoring Vinayak Hegde [email protected] @vinayakh 1 Structure Part 1 Basics of Measurement (40 min) Part 2 Basic Statistics primer (40 min) Part 3 Measurement
You can keep your firewall (if you want to) Practical, simple and cost saving applications of OpenDaylight you can implement today
You can keep your firewall (if you want to) Practical, simple and cost saving applications of OpenDaylight you can implement today John Sobanski, Engineer, Solers Inc. July 2015 @OpenDaylightSDN #OpenSDN
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Configuring PA Firewalls for a Layer 3 Deployment
Configuring PA Firewalls for a Layer 3 Deployment Configuring PAN Firewalls for a Layer 3 Deployment Configuration Guide January 2009 Introduction The following document provides detailed step-by-step
Chapter 8 Network Security
[Computer networking, 5 th ed., Kurose] Chapter 8 8.1 What is network security? 8.2 Principles of cryptography 8.3 Message integrity 84Securing 8.4 e-mail 8.5 Securing TCP connections: SSL 8.6 Network
Scanning Tools. Scan Types. Network sweeping - Basic technique used to determine which of a range of IP addresses map to live hosts.
Scanning Tools The goal of the scanning phase is to learn more information about the target environment and discover openings by interacting with that target environment. This paper will look at some of
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
How To Gather Log Files On A Pulse Secure Server On A Pc Or Ipad (For A Free Download) On A Network Or Ipa (For Free) On An Ipa Or Ipv (For An Ubuntu) On Your Pc
Network Connect & Pulse Performance Logs on Windows How-to Published Date July 2015 Contents Introduction 4 Part 1: Client Prerequisites 4 Step 1.1: Packet Sniffer 4 Step 1.2: Output of IPs, Routes, Ping,
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
Test Methodology White Paper. Author: SamKnows Limited
Test Methodology White Paper Author: SamKnows Limited Contents 1 INTRODUCTION 3 2 THE ARCHITECTURE 4 2.1 Whiteboxes 4 2.2 Firmware Integration 4 2.3 Deployment 4 2.4 Operation 5 2.5 Communications 5 2.6
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
FIREWALLS. Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others
FIREWALLS FIREWALLS Firewall: isolates organization s internal net from larger Internet, allowing some packets to pass, blocking others FIREWALLS: WHY Prevent denial of service attacks: SYN flooding: attacker
IP address format: Dotted decimal notation: 10000000 00001011 00000011 00011111 128.11.3.31
IP address format: 7 24 Class A 0 Network ID Host ID 14 16 Class B 1 0 Network ID Host ID 21 8 Class C 1 1 0 Network ID Host ID 28 Class D 1 1 1 0 Multicast Address Dotted decimal notation: 10000000 00001011
Configuration Guide. BES12 Cloud
Configuration Guide BES12 Cloud Published: 2016-04-08 SWD-20160408113328879 Contents About this guide... 6 Getting started... 7 Configuring BES12 for the first time...7 Administrator permissions you need
CS197U: A Hands on Introduction to Unix
CS197U: A Hands on Introduction to Unix Lecture 10: Security Issues and Traffic Monitoring Tian Guo University of Massachusetts Amherst CICS 1 Reminders Assignment 5 is due Thursday (Oct. 22) Part 1 (tracking
NETWORK LAYER/INTERNET PROTOCOLS
CHAPTER 3 NETWORK LAYER/INTERNET PROTOCOLS You will learn about the following in this chapter: IP operation, fields and functions ICMP messages and meanings Fragmentation and reassembly of datagrams IP
Packet filtering with Linux
LinuxFocus article number 289 http://linuxfocus.org Packet filtering with Linux by Vincent Renardias About the author: GNU/Linux user since 1993, Vincent Renardias started to
IP Network Monitoring and Measurements: Techniques and Experiences
IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France [email protected] 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration
