Design and Implementation of an Interactive DBMS-supported Network Traffic Analysis and Visualization System
|
|
|
- June Cooper
- 10 years ago
- Views:
Transcription
1 Design and Implementation of an Interactive DBMS-supported Network Traffic Analysis and Visualization System 1 Hyun-chul Kim, 2Jihoon Lee Dept. of Computer Software Engineering, Sangmyung Univ., [email protected] *2,Corresponding Author Dept. of Information and Telecommunication Engineering, Sangmyung Univ., [email protected] 1, First Author Abstract Measurement, analysis, and visualization of traffic data are critical day-to-day tasks for effective and efficient network management and operation. In this paper, we design and implement a novel interactive DBMS (Database Management System)-supported network traffic analysis and visualization system. To this end, we first survey and compare existing tools for network traffic measurement and analysis in terms of their supported features and functionalities. Then, we choose to extend FlowScan, one of the most widely-used software tool for network traffic analysis and visualization, with DBMS support as well as Web-based interactive query interface. We describe the overall system architecture and implementation, and demonstrate that our system can be used to easily identify heavy hitters (e.g., malicious attackers), in near real time. Keywords: Traffic Measurement, Visualization, FlowScan 1. Introduction Measurement, analysis and visualization of traffic data are very important tasks with regard to effective and efficient network management and administration [1, 2, 7]. The two common approaches for network measurement are the passive and active ones. Passive techniques watch target traffic as it passes by, for example, at routers, switches or hosts, without generating (or injecting) additional traffic packets in the network. n the contrary, active measurement techniques inject packets into the network or transmit packets to other servers or hosts, to test, diagnose, or measure network delay, connectivity, path, etc. For the purpose of measurement of traffic volume, per-application traffic analysis, per-as traffic analysis, and top-user behavior analysis, passive measurement approach is used. Table 1 shows existing passive measurement tools and their supported useful features. As shown in the table, no tool is currently supporting all the useful features. While FlowScan [1], though it is one of the most widely network traffic measurement tools), supports many good features like time series graph (as shown in Figure 1) through which users can easily understand overall network traffic trend, it does not provide interactive interfaces for further detailed analysis; e.g., exactly identifying heavy hitters, etc. In this paper, our goal is to design and implement the first passive measurement software where all the important features in Table 1 are supported. To this end, after conducting careful and in-depth analysis of the nine existing tools, we have decided to extend FlowScan with DBMS and Web-based query interface. The rest of this paper proceeds as follows. In Section 2, we first introduce FlowScan. Section 3 describes the architecture design, implementation, and usage examples of our proposed and developed system. Section 4 concludes the paper. 2. FlowScan 2.1. Architecture As the first step, we have analyzed FlowScan system architecture and its codeset. FlowScan mainly consists of four different architectural components: (1) Netflow [9] collection module, (2) Netflow analysis module, (3) Netflow storage module, and (4) visualization module. Three of the four modules (i.e., Netflow collection, storage, and visualization modules) had actually been borrowed from other open source software; FlowScan's Netflow collection module uses CAIDA s cflowd, while storage and visualization module use RRD (Round Robin Database). In International Journal of Digital Content Technology and its Applications(JDCTA) Volume7, Number13, Sep
2 this paper, from the next subsection, we mainly focus on the Netflow analysis module, as we design our to-be-developed system to put the various Netflow analysis results and related data into a database system and handle them. In Figure 2, cflowdmux and cflowd together form Flowscan s collection module, while flowscan, rrd, and rrdtool is analysis, storage, and visualization modules, respectively. Table 1. Passive Measurement Tools: Comparison MRTG Flow -Scan Cflowd with arts tcpdump MADAS Flowtools Flow Collector Flow Analyzer Raw data Collection Data analysis Visualize Time Series Graph Raw flow dump Query Interface GUI Traffic volume Per-app. Analysis Top User Top AS Figure 1. FlowScan s time series graph 167
3 Figure 2. FlowScan Architecture 2.2. Netflow analysis module Using cflowd, Flowscan dumps Netflow data, collected at and sent by routers every 5 minutes. Then, flowscan module is called to analyze (for every 5 minutes as well) the received flow data files and then sleeps again for five minutes. The flowscan module reads the dumped data files and applies the analysis module on every single collected flow, classifying them according to the flow s port number, protocol number, output interface, etc. Among the analysis modules, SubNetI.pm and CampusI.pm are the representative ones, through which classification of the flow is performed (e.g., whether it is TCP, FTP, or/and inbound traffic), that put the analysis results into the RRD database. Figure 3 shows the pseudo-code of the CampusI.pm module, where the wanted function is applied to target flows to classify them according to the destination address, interface number, etc. 3. Proposed system Figure 4 describes our proposed system, comparing with its predecessor FlowScan. Basically, we have added three additional modules to FlowScan, which are flow database management module, data aggregation module, and query module, as described in this section. 168
4 3.1. Database management module The Netflow analysis module in FlowScan finds whether a flow under processing (i) is of inbound or out-bound, and (ii) can be classified using its layer-4 port number information or not. Right after this finding process, our proposed system injects all the analyzed information of the flow into database. ur proposed database system records the following information for every flow: source IP, destination IP, input interface, output interface, source port, destination port, ICMP type, the number of packets, bytes volume, next hop, flow starting time, ending time, protocol, source AS, destination AS, TCP flag, inbound_or_outbound, known_application_or_ unknown (by its port number). We used MySQL as DBMS, one of the world s most popular open source database. package CampusI; sub perfile { # Remember the time-stamp from the filename. whence = filename2time_t(filename) sub wanted { if (exporter_hop(flow::next_hop)) { # This flow is destined for another "local" flow-exporting router. # We'll catch it later, if and when it's exported by that router. return 0 if (outbound_hop(flow::next_hop) or outbound_interface(flow::output_if)) { # This flow is outgoing. outbound_total++ elsif (inbound_address(flow::destination_address)) { # This flow is incoming. inbound_total++ else { # This flow (an "intranet" flow) is unwanted. return 0 return 1 sub report { update_rrd_files(whence, inbound_total, outbound_total) Figure 3. CampusI.pm s pseudo-code 169
5 3.2. Web-based query interface nce all the flow data are stored at our database system, our system allows users to extract useful information from the database through Web-based (using Perl CGI module) query interface. Through the interface, our system provides a set of predefined queries such as top 10 users, per-as analysis, per-port analysis, per-protocol analysis, etc., which are typically most often useful and informative tasks for network operators. nce users set parameter values using Web interface, the chosen parameter values are handed over to Perl CGI scripts that (i) parse them, (ii) generate SQL queries based on the parsed results, (iii) submit the SQL queries to the NetFlow database, and (iv) convey back the query results to the users through the Web interface. Figure 5 shows a screen shot of the developed Web query interface, tested with a predefined Top 10 Users query. At the time of this writing, our system supports the following predefined queries: (i) overall traffic statistics, (ii) all flows in a specific time period, (iii) trace flows per a user, (iv) per-protocol usage statistics, (v) per-port usage statistics, (vi) next hop statistics, (vii) per-as information and traffic matrix, (vi) packet size and flow distribution, (vii) top 10 users, protocols, ports, ASes. All these information are extracted from raw NetFlow flows, which contain a variety of information as shown in Figure 6. Figure 4. FlowScan (left) and our proposed system (right) 3.3. Data aggregation ne notable problem we have confronted building our Netflow database system is, its too large volume. According to our experience, at a mid-sized university campus with (1,000) people inside, a border router exports around 100 K flows in 15 minutes on average, which means around 9.6 M flows per day and 3.5 G flows per year would have to be stored into and 170
6 handled at our database system. In fact, when we tested with a query handling one-day data (dealing with approximately 9.6 M flows), it took 1 minute to get the query results. The larger time span of data a user wants to process, the longer time they would have to wait. Besides, storing all the raw flow information in our database system takes up too much disk space. To alleviate this limitation, our system performs data aggregation. In particular, data aggregation in our system has been designed to speed up predefined queries. For every 15 minutes, it performs the flow aggregation process based on the five guidelines, reflecting the predefined queries most (likely to be) often used by network operators; per port, per protocol, per top user, per AS matrix, per next hop IP, as shown in Table 2. The proposed aggregation scheme has significantly contributed in reducing disk storage usage as well as query response times. For example, it took only a few seconds to handle a query with one week s flow data. Also, as it takes too much disk space to store and archive full raw flow dump data for a long time, network operators may prefer to choose to store only aggregated data for a long-term data collection. Designing a data aggregation scheme for the largest storage space saving with the smallest information loss is left as our future work. Figure 5. Web-based query interface: a screen shot (IP addresses and date information are masked out due to privacy concerns) 3.4. Deployment and Usage Examples ISPs or network operators are often interested in finding hosts or flows consuming most of network resources (e.g., heavy hitters, scanners, spammers, etc.). ur system s user interface makes it easy and convenient for users to quickly identify heavy hitters by providing both time series graph as well as interactive query system, as shown in Figure 7 and 8. We have deployed our developed system at a border router of a university campus network. While operating, when FlowScan generates a time series traffic plot like Figure 7, indicating 171
7 that sudden abnormal traffic spikes are observed, then network operators, using our Web-based query interface, can easily and successfully identify who they are (i.e., IP addresses), along with the detailed information such as what protocol and ports they use, how large is the flows, how many they are, from when to when, etc., as shown in Figure 8. Consequently, using our developed tool, we were able to exactly identify a DDoS attack destined to a machine (whose IP address was x ) on our network. FLW index: 0xc7ffff router: A.B.C.D src IP: E.F.G.H dst IP: I.J.K.L input ifindex: 13 output ifindex: 12 src port: dst port: 2036 pkts: 1 bytes: 58 IP nexthop: M.N..P start time: Sat Dec 8 20:34:41 end time: Sat Dec 8 20:34:41 protocol: 6 tos: 0 src AS: 9848 dst AS: 1781 src masklen: 13 dst masklen: 24 TCP flags: 0x18 (PUSH ACK) engine type: 1 engine id: 3 Figure 6. A sample flow information (Netflow ver. 5) Table 2. Aggregated Data Table: Schema Table Port srcport dstport pkts bytes Flows time Table Protocol protocol pkts bytes flows time protocol tcpflag Table Topuser srcip dstip pkts bytes Flows Time in/out Table Nexthop input_if output_if pkts bytes Nexthop Flows time Table Asmatrix input_as output_as protocol srcport dstport src_as Pkts protocol Bytes dst_as in/out unknown in/out in/out Flows nexthop time in/out 172
8 Figure 7. Abnormal traffic peak observed at around 23:00 by FlowScan Figure 8. Web-based query results, identifying the source addresses of coordinated attack and their target address (x ), as well as various information of those attack flows (exact date and IP address information are masked out due to privacy concerns). 4. Conclusion In this paper, we have proposed, developed, deployed, and tested our own software, which is an extension of the widely-used tool FlowScan with additional DBMS support and Web-based interactive query interface. Future work include further database and query performance optimization, 173
9 visualization of query results (in a more graphical way; currently only in a form of tables), platform independence (currently working only on FreeBSD with MySQL), and detection of application flows that passes through dynamically allocated ports, such as those of P2P applications [4, 5, 6, 8]. 5. Acknowledgements This research was supported by a 2013 Research Grant from Sangmyung University. 6. References [1] D. Plonka, Flowscan: A network traffic flow reporting and visualization tool, In Proceedings of the USENI LISA, [2] J. Lee, H. Kim, H. Hwang, K. Chon, Y. Chin, Report on the costs and benefits of cache hierarchy in Korea, In Proceedings of International WWW Caching Workshop, [3] H. Kim, D. Lee, J. Lee, J. Suh, Kilnam Chon, A Measurement Study of Storage Resource and Multimedia Contents on a High Performance Research and Educational Network, Lecture Notes in Computer Science, vol. 2720, pp , [4] M. Balitanas, T. Kim, Using Incentives for Heterogeneous peer-to-peer Network, International Journal of Advanced Science and Technology, vol. 15, pp , [5] R. Mghirbi, H. Majdoub, K. Arour, B. Defude, A Controlled Knowledge Base Evolution Approach for Query Hits Merging in P2P Systems, International Journal of Advanced Science and Technology, vol. 47, pp , [6] J. Kim, D. Kim, S. Maeng, Document Management Monitoring System in P2P Environment, Journal of the Korea Academia-Industrial cooperation Society, vol. 14, no. 3, pp , [7] M. Beck, T. Moore, The Internet2 Distributed Storage Infrastructure Project : An Architecture for Internet Content Channels, Computer Networks and ISDN Systems, vol. 30, no , pp , [8] I. Clarke,. Sandberg, Freenet: A Distributed Anonymous Information Storage and Retrieval System, Lecture Notes in Computer Science, vol. 2009, pp , [9] CISC NetFlow, 174
CISCO IOS NETFLOW AND SECURITY
CISCO IOS NETFLOW AND SECURITY INTERNET TECHNOLOGIES DIVISION FEBRUARY 2005 1 Cisco IOS NetFlow NetFlow is a standard for acquiring IP network and operational data Benefits Understand the impact of network
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
HTGR- Netflow. or, how to know what your network really did without going broke
HTGR- Netflow or, how to know what your network really did without going broke Michael W. Lucas [email protected] GKN Driveline North America, Inc. Copyright 2007 Michael W. Lucas slide 1 What
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology
Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology Soon-Hwa Hong, Jae-Young Kim, Bum-Rae Cho and James W. Hong Dept. of Computer Science and Engineering, Pohang Korea Email:
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Overview. Why use netflow? What is a flow? Deploying Netflow Performance Impact
Netflow 6/12/07 1 Overview Why use netflow? What is a flow? Deploying Netflow Performance Impact 2 Caveats Netflow is a brand name like Kleenex. It was developed by Cisco Juniper uses the term cflowd for
An overview of traffic analysis using NetFlow
The LOBSTER project An overview of traffic analysis using NetFlow Arne Øslebø UNINETT [email protected] 1 Outline What is Netflow? Available tools Collecting Processing Detailed analysis security
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference
Symantec Event Collector for Cisco NetFlow version 3.7 Quick Reference Symantec Event Collector for Cisco NetFlow Quick Reference The software described in this book is furnished under a license agreement
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
TEIN2 Measurement and Monitoring Workshop Netflow. [email protected]
TEIN2 Measurement and Monitoring Workshop Netflow [email protected] Passive Measurements - Netflow Netflow Setting up Netflow on a router Using Netflow Establishing exports Configuring a collector
How good can databases deal with Netflow data
How good can databases deal with Netflow data Bachelorarbeit Supervisor: bernhard [email protected] Inteligent Networks Group (INET) Ernesto Abarca Ortiz [email protected] OVERVIEW
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Using Argus to analyse network flows. David Ford OxCERT Oxford University Computer Services
Using Argus to analyse network flows David Ford OxCERT Oxford University Computer Services What are network flows? A convenient way of representing traffic on your network Contain a timestamp, the source/
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
Wireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology [email protected] SHARKFEST
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Plugging Network Security Holes using NetFlow. Loopholes in todays network security solutions and how NetFlow can help
Plugging Network Security Holes using NetFlow Loopholes in todays network security solutions and how NetFlow can help About ManageEngine Network Servers & Applications Desktop ServiceDesk Windows Infrastructure
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks
Adaptive Flow Aggregation - A New Solution for Robust Flow Monitoring under Security Attacks Yan Hu Dept. of Information Engineering Chinese University of Hong Kong Email: [email protected] D. M. Chiu
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Network security Exercise 10 Network monitoring
Network security Exercise 10 Network monitoring Tobias Limmer Computer Networks and Communication Systems Dept. of Computer Sciences, University of Erlangen-Nuremberg, Germany 2. 6.02.2009 Tobias Limmer:
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Nfsight: NetFlow-based Network Awareness Tool
Nfsight: NetFlow-based Network Awareness Tool Robin Berthier Coordinated Science Laboratory Information Trust Institute University of Illinois Urbana-Champaign, IL, USA [email protected] Michel Cukier The
Enabling NetFlow on Virtual Switches ESX Server 3.5
Technical Note Enabling NetFlow on Virtual Switches ESX Server 3.5 NetFlow is a general networking tool with multiple uses, including network monitoring and profiling, billing, intrusion detection and
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Exercise 7 Network Forensics
Exercise 7 Network Forensics What Will You Learn? The network forensics exercise is aimed at introducing you to the post-mortem analysis of pcap file dumps and Cisco netflow logs. In particular you will:
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS
HUNTING ATTACKERS WITH NETWORK AUDIT TRAILS Tom Cross [email protected] Charles Herring [email protected] 1 CREATING THE AUDIT TRAIL 2 Creating the Trail Logging Provides user and application details
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Cisco IOS NetFlow Version 9 Flow-Record Format
Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
WhatsUpGold. v12.3.1. NetFlow Monitor User Guide
WhatsUpGold v12.3.1 NetFlow Monitor User Guide Contents CHAPTER 1 WhatsUp Gold NetFlow Monitor Overview What is NetFlow?... 1 How does NetFlow Monitor work?... 2 Supported versions... 2 System requirements...
Host Discovery with nmap
Host Discovery with nmap By: Mark Wolfgang [email protected] November 2002 Table of Contents Host Discovery with nmap... 1 1. Introduction... 3 1.1 What is Host Discovery?... 4 2. Exploring nmap s Default
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)
Network Traffic Performance & Security Monitoring Project proposal minimal project Orsenna;Invea-Tech FLOWMON PROBES 1000 & 100 Contents 1. Introduction... 2 1.1. General System Requirements... 2 1.2.
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document
Recommendations for Network Traffic Analysis Using the NetFlow Protocol Best Practice Document Produced by AMRES NMS Group (AMRES BPD 104) Author: Ivan Ivanović November 2011 TERENA 2010. All rights reserved.
Bandwidth Management for Peer-to-Peer Applications
Overview Bandwidth Management for Peer-to-Peer Applications With the increasing proliferation of broadband, more and more users are using Peer-to-Peer (P2P) protocols to share very large files, including
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
ABSTRACT. GOFF, BRIAN DAVID. Distributed Resource Monitoring Tool and its Use in
ABSTRACT GOFF, BRIAN DAVID. Distributed Resource Monitoring Tool and its Use in Security and Quality of Service Evaluation. (Under the direction of Dr. Mladen A. Vouk.) As networks become increasingly
NFQL: A Tool for Querying Network Flow Records [6]
NFQL: A Tool for Querying Network Flow Records [6] nfql.vaibhavbajpai.com Vaibhav Bajpai, Johannes Schauer, Corneliu Claudiu Prodescu, Jürgen Schönwälder {v.bajpai, j.schauer, c.prodescu, [email protected]
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
A Critical Investigation of Botnet
Global Journal of Computer Science and Technology Network, Web & Security Volume 13 Issue 9 Version 1.0 Year 2013 Type: Double Blind Peer Reviewed International Research Journal Publisher: Global Journals
Practical Experience with IPFIX Flow Collectors
Practical Experience with IPFIX Flow Collectors Petr Velan CESNET, z.s.p.o. Zikova 4, 160 00 Praha 6, Czech Republic [email protected] Abstract As the number of Internet applications grows, the number
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept
Using The Paessler PRTG Traffic Grapher In a Cisco Wide Area Application Services Proof of Concept What You Will Learn Understanding bandwidth traffic and resource consumption is vital to enhanced and
Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter
NetFlow The De Facto Standard for Traffic Analytics
NetFlow The De Facto Standard for Traffic Analytics A Webinar on NetFlow and its uses in Enterprise Networks for Bandwidth and Traffic Analytics Don Thomas Jacob Technical Marketing Engineer ManageEngine
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
Monitoring Replication
Monitoring Replication Article 1130112-02 Contents Summary... 3 Monitor Replicator Page... 3 Summary... 3 Status... 3 System Health... 4 Replicator Configuration... 5 Replicator Health... 6 Local Package
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
AlienVault Unified Security Management Solution Complete. Simple. Affordable Life Cycle of a log
Complete. Simple. Affordable Copyright 2014 AlienVault. All rights reserved. AlienVault, AlienVault Unified Security Management, AlienVault USM, AlienVault Open Threat Exchange, AlienVault OTX, Open Threat
Netflow For Incident Detection 1
Netflow For Incident Detection 1 Michael Scheck / Cisco CSIRT [email protected] Introduction Netflow is often deployed for network billing, auditing, and accounting. However, Netflow can also be for incident
Chapter 11 Cloud Application Development
Chapter 11 Cloud Application Development Contents Motivation. Connecting clients to instances through firewalls. Chapter 10 2 Motivation Some of the questions of interest to application developers: How
2010 Carnegie Mellon University. Malware and Malicious Traffic
Malware and Malicious Traffic What We Will Cover Introduction Your Network Fundamentals of networks, flow, and protocols Malicious traffic External Events & Trends Malware Networks in the Broad Working
[Optional] Network Visibility with NetFlow
[Optional] Network Visibility with NetFlow TELE301 Laboratory Manual Contents 1 NetFlow Architecture........................... 1 2 NetFlow Versions.............................. 2 3 Requirements Analysis...........................
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
Keywords Attack model, DDoS, Host Scan, Port Scan
Volume 4, Issue 6, June 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com DDOS Detection
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
Netflow Collection with AlienVault Alienvault 2013
Netflow Collection with AlienVault Alienvault 2013 CONFIGURE Configuring NetFlow Capture of TCP/IP Traffic from an AlienVault Sensor or Remote Hardware Level: Beginner to Intermediate Netflow Collection
Securing and Monitoring BYOD Networks using NetFlow
Securing and Monitoring BYOD Networks using NetFlow How NetFlow can help with Security Analysis, Application Detection and Traffic Monitoring Don Thomas Jacob Technical Marketing Engineer ManageEngine
Using UDP Packets to Detect P2P File Sharing
188 IJCSNS International Journal of Computer Science and Network Security, VOL.7 No.8, August 27 Using UDP Packets to Detect P2P File Sharing Tsang-Long Pao and Jian-Bo Chen Tatung University, Taipei,
