Programming the Flowoid NetFlow v9 Exporter on Android
|
|
|
- Rosaline Ford
- 10 years ago
- Views:
Transcription
1 INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Programming the Flowoid NetFlow v9 Exporter on Android Julien Vaubourg N 7003 April 2013 THÈME? apport technique ISSN
2
3 Programming the Flowoid NetFlow v9 Exporter on Android Julien Vaubourg Thème? (hors thème INRIA) Projet MADYNES Rapport technique n 7003 April pages Abstract: The RFC 3954 documents the NetFlow services export protocol Version 9. This project - associated to the Flowoid Projet - allows an Android program to listen the network traffic and send it to a remote NetFlow Collector using this standard. Thanks to an highly scalable design, any sort of template can be implemented and any kind of network can be exported as NetFlow. The data generator side uses the flexibility of Java (with the Android API) whereas the sniffer side uses the power of C (native code). This document explains how to configure the Exporter in order to export consistent information to the remote collector. Key-words: netflow, flowoid, network traffic, monitoring, security, android TELECOM Nancy (last year internship in MADYNES) Unité de recherche INRIA Lorraine LORIA, Technopôle de Nancy-Brabois, Campus scientifique, 615, rue du Jardin Botanique, BP 101, Villers-Lès-Nancy (France) Téléphone : Télécopie :
4 Programmation de l exporteur NefFlow v9 du projet Flowoid sur Android Résumé : Ce document explique comment programmer l exporteur de NetFlow v9 sur Android : gestion des pilotes, définition des templates, génération des données et filtrage des paquets. Mots-clés : netflow, flowoid, trafic réseau, supervision, sécurité, android
5 Flowoid NetFlow v9 Exporter on Android 3 1 Design NetFlows are traveling between two sides: Exporter: Catches all network packets through Drivers (directly on the Android device), resumes network flows with the NetFlow format, generates some additional data to add into NetFlows and exports them to the remote Collector. Driver: Listens the traffic network on the Exporter side and transmits packets headers in live to the Exporter. Collector: On the other side (remote server), receives and treats NetFlows sent by the Exporter. In order to transmit NetFlows, an Exporter send one or more Export Packets to a remote Collector: Export Packet: Contains one or more Data FlowSets, and sometimes a Template FlowSet. Data FlowSet: Contains one or more Data Records. All of these are defined with the same Template Record and the Data FlowSet ID corresponds to the ID of this Template Record. Data Record: Contains one or more Data Fields. This kind of data corresponds to what is generally called a NetFlow. Data Field: Contains only one value (e.g. IP address, TCP port, timestamp). The Collector knows how parsing Export Packets because this one sends regularly a Template Flowset among the Data FlowSets: Template FlowSet: Contains one or more Template Records. inevitably zero. Template Record: Contains one or more Template Fields ordered. Its FlowSet ID is Template Field: Is defined with a Field Type Definition (i.e. an ID and a length in bytes). Field Type Definition: Described in RFC 3954 section 8. A Data Field associated with a Template Field should be interpreted by the remote Collector in the same manner as described in RFC. Some types have a fixed length. The Collector side needs to know all of the Field Type Definitions used by the Exporter especially if this one is out of standards. RT n 7003
6 4 Vaubourg 2 Environment and prerequisites Setting up your project: 1. The minimum SDK Version of your Android application must be at least Your device must be rooted. 3. Add madynes-flowoid-exporter.jar 1 to your Java Build Path. If you want to use the IP Driver, you could also add netutils-parse-v1.jar 2 for parsing headers. 4. Copy your Driver binary files 3 in your res/raw/ directory. 5. Your AndroidManifest file must contain at least these permissions: 1 <uses p e r m i s s i o n android : name= android. p e r m i s s i o n.access SUPERUSER /> 2 <uses p e r m i s s i o n android : name= android. p e r m i s s i o n.internet /> 3 <uses p e r m i s s i o n android : name= android. p e r m i s s i o n.read PHONE STATE /> 6. Create a new class extending ExporterService (e.g. Exporter.java): 1 import madynes. f l o w o i d. e x p o r t e r. ; 2 import madynes. f l o w o i d. e x p o r t e r. TemplateRecord. ; 3 import madynes. f l o w o i d. e x p o r t e r. TemplateField. InadequateLengthException ; 4 import madynes. f l o w o i d. e x p o r t e r. TemplateFlowSet. TemplateNotFoundException ; 5 6 public class Exporter extends E x p o r t e r S e r v i c e { 7 9 public void r e g i s t e r T e m p l a t e s ( ) throws AlreadyUsedIDException, InadequateIDException, InadequateLengthException { } public void p r o c e s s P a c k e t F i l t e r i n g ( byte [ ] headers ) throws TemplateNotFoundException { } public void onstart ( ) { } public void onstop ( ) { 1 TODO: Add web address 2 TODO: Add web address 3 TODO: Add web address INRIA
7 Flowoid NetFlow v9 Exporter on Android } 27 } 7. In your AndroidManifest think to declare your Exporter Service (here your/package/- Exporter.java): 1 <s e r v i c e android : name= your. package. Exporter ></s e r v i c e > The next sections explain you how to implement your own Exporter. 3 Creating templates All templates are defined inside of the registertemplates() function. 1. Create all of the Template Fields you need, by creating TemplateField objects. The constructor needs an ID among those available in TemplateField.TypeDefinition.*. If the associated length is zero, you need to use the alternative constructor to specify a length in bytes. Example: TemplateField tcpportsrc = new TemplateField(TemplateField.TypeDefinition.L4 SRC PORT). 2. Create a new Template Record with your own ID. This one is unique and must be between 256 and Example: TemplateRecord ipv6tcptemplate = new TemplateRecord(257); 3. Add Template Fields to your Template Record with the addtemplatefield(templatefield) function. A same Template Field instance can be reused for many different Template Records. Example: ipv6tcptemplate.addtemplatefield(tcpportsrc); 4. Register your new Template Record with the registertemplaterecord(recordtemplate). Example: registertemplaterecord(ipv6tcptemplate); RT n 7003
8 6 Vaubourg 4 Defining how to fill your NetFlows Template Fields define how the data is represented and - for the standardized ones - what is it. Data Fields define how the value can be retrieved from the System. So each Template Field should have a corresponding Data Field. To create a Data Field, you have to add a new class extending DataField. Then you have to implement four functions: 1. oninit(byte[]): Called when a new NetFlow is created. The argument corresponds to the headers (depending of the Driver used) of the first packet received for this NetFlow. 2. onupdate(byte[]): Called when a packet is catching for an existent NetFlow. The argument corresponds to the new packet headers. 3. onexport(byte[]): Called just before the Export Packet is sent with this NetFlow (Data Record) inside. The argument corresponds to the last packet received. But if the Data Record was flagged ended (isended() condition met) it s the end packet. E.g. in the case of a TCP connection, if the record is ended it s the packet containing a FIN or RST flag. And not the least packet (final ACK). However in the case of an UDP connection, if the record is ended it s the least packet before the final time out. 4. getvalue(): Called when the Exporter creates the Export Packet. Please use the getbytebuffer() function to create a ByteBuffer. For instance, if this Data Field is associated to a Template Field with a length of 4 (bytes), you have to use the putint(int) function on your ByteBuffer before returning it. Example of implementation (FieldTCPPortSrc.java): 1 import java. nio. ByteBuffer ; 2 import edu. h u j i. c s. n e t u t i l s. p a r s e. TCPPacket ; 3 4 public class FieldTCPPortSrc extends DataField { 5 private short value ; 6 8 public void o n I n i t ( byte [ ] headers ) { 9 TCPPacket tcppacket = new TCPPacket ( headers ) ; 10 value = ( short ) tcppacket. getsourceport ( ) ; 11 } public void onupdate ( byte [ ] headers ) {} public void onexport ( byte [ ] headers ) {} 18 INRIA
9 Flowoid NetFlow v9 Exporter on Android 7 20 public ByteBuffer getvalue ( ) { 21 ByteBuffer bytes = g e t B y t e B u f f e r ( ) ; bytes. putshort ( value ) ; return bytes ; 26 } 27 } 5 Condition to cut NetFlows A new NetFlow is created when the combination of these discriminant fields is not yet known. This point will be explained later in the section 6 page 7. Conditions to stop NetFlows are evaluated for every new packet. If conditions are met, the NetFlow is moved from the current NetFlows list to the Export Queue. So, for each Template Record you register, you have to create a Data Record extending the DataRecord class and override the isended(byte[]) function. The argument corresponds to the new packet headers added to the NetFlow. For instance (RecordTCP.java): 1 import madynes. f l o w o i d. e x p o r t e r. TemplateRecord ; 2 import edu. h u j i. c s. n e t u t i l s. p a r s e. TCPPacket ; 3 4 public class RecordTCP extends DataRecord { 5 6 public RecordTCP ( TemplateRecord template ) { 7 super ( template ) ; 8 } 9 11 public boolean isended ( byte [ ] headers ) { 12 TCPPacket tcppacket = new TCPPacket ( headers ) ; return tcppacket. i s F i n ( ) tcppacket. i s R s t ( ) ; 15 } } 6 Associating data with templates Your programming space for that is the processpacketfiltering(byte[]) function. 1. First choose a previously registred Template Record with a Template Record ID. RT n 7003
10 8 Vaubourg Example: TemplateRecord template = getregistredtemplaterecord(257); 2. Then create a Data Record with one of your previoulsy created class. Examples: record = new RecordTCP(template); 3. Associate Template Fields of your Data Record with Data Fields one by one. You must associate all of them and in the same order you added Template Fields in your Template Record. The boolean argument specify whether this Data Field is a part of the NetFlow Key (see below and the example section 7 page 8) or not. Example: record.associatetemplatewithdata(new FieldIPv6AddrSrc(), true); 4. Finally, request the packet processing with your record. Example: processpacket(record, headers); Your record - in fact only fields declared as NetFlow Key part - will be used to identify the NetFlow/record associated to the current packet. If the associated NetFlow/record already exists, the packet will be added to it. Otherwise your new record will be used as new NetFlow. 7 Filtering packets Every sniffed packet is sent to the processpacketfiltering(byte[]) packet. So before creating records, you have to parse and check headers. For instance: 2 public boolean p r o c e s s P a c k e t F i l t e r i n g ( byte [ ] headers ) throws TemplateNotFoundException { 3 LocationFinder l o c a t i o n F i n d e r = LocationFinder. g e t I n s t a n c e ( this ) ; 4 DataRecord r e c o r d = null ; 5 6 try { 7 // TCP / IPv6 8 i f ( EthernetFrame. s t a t I s I p v 6 P a c k e t ( headers ) 9 && IPFactory. istcppacket ( headers ) ) { 10 INRIA
11 Flowoid NetFlow v9 Exporter on Android 9 11 TemplateRecord template = getregistredtemplaterecord ( ipv6 tcp ) ; 12 r e c o r d = new RecordTCP ( template ) ; // NetFlow Key Parts 15 r e c o r d. associatetemplatewithdata (new FieldIPv6AddrSrc ( ), true ) ; 16 r e c o r d. associatetemplatewithdata (new FieldIPv6AddrDst ( ), true ) ; 17 r e c o r d. associatetemplatewithdata (new FieldTCPPortSrc ( ), true ) ; 18 r e c o r d. associatetemplatewithdata (new FieldTCPPortDst ( ), true ) ; // Others 21 r e c o r d. associatetemplatewithdata (new FieldIPv6Length ( ), f a l s e ) ; 22 } // Other kind o f p a c k e t f o r o t h e r record t y p e 25 else i f (... ) { } // Go! ( or not ) 30 i f ( r e c o r d!= null ) { 31 p r o c e s s P a c k e t ( record, headers ) ; 32 } // Parser e r r o r 35 } catch (... ) { 36 return f a l s e ; 37 } return true ; 40 } 8 New Driver Drivers are written in native code (C) in order to access to low functionnalities as sniffing network traffic. Your only constraint is sending every packet headers to the Java Exporter through a TCP socket (see section 9 page 10 to know the port) and creating templates on the Exporter side. You will need a Java parser for your headers. Put your sources in the jni/drivers/ directory and use the Makefile to build your Driver. This one will copy the binary in the res/raw/ directory. Then just after the Exporter Service starting, call Driver.useDriver with your Driver name resource and the network interface RT n 7003
12 10 Vaubourg to listen on. For instance: Driver.useDriver(this, R.raw.driver ip, "eth0");. Finaly just reinstall your Android application. 9 Preferences All of the below variables are available from your ExporterService implementation through classical getters and setters and you have to set them before using the Exporter Service: prefchecktoexportinterval: The Export Thread checks every N seconds if it can create and send an Export Packet. prefcollectoraddr: Collector address (IP address or hostname). prefcollectorport: UDP port to connect to for sending NetFlow to the remote Collector. prefdriversport: TCP port to listen on for receiving packets headers from drivers. prefcheckdriversinterval: The Drivers Thread checks every N seconds if all Drivers are still working and restarts them if necessary. prefmaxheaderssize: Max headers size in bytes authorized for a sniffed packet transmitted by a Driver. prefmaxnetflowstotrack: Max NetFlows/records to track simultaneous. prefminrecordsbyflowset: Don t send a FlowSet if there are less than N records into it. prefmaxexportpacketsize: In order to avoid fragmentation, cut Export Packets nearly N bytes. prefnetflowtimeout: After N seconds of life, a NetFlow/record is considered ended and is added to the Export Queue. This is useful for non-connected protocols (e.g. UDP) and long term connections (e.g. TCP streaming). prefpackettimeout: Even though prefminrecordsbyflowset is not reached, after N seconds, the Export Thread empties the Export Queue and sends an Export Packet. prefsendtemplateseverynpackets: Packet. Send the Template FlowSet every N Export preftimebeforenetflowend: Returns the life time remaining when a NetFlow is detected as ended. This is useful to catch the last ACK with a TCP three-way handshake avoiding to create a second NetFlow. INRIA
13 Flowoid NetFlow v9 Exporter on Android Statistics All of the below getters are available from your ExporterService implementation: getstatactivenetflows(): Number of currently active NetFlows/records. getstatconnecteddrivers(): Number of currently connected Drivers. getstatexportednetflows(): Number of NetFlows/records sent from the Exporter to the Collector. getstatexportedpackets(): Number of Export Packets sent from the Exporter to the Collector. getstatfailedsniffedpackets(): Number of sniffed packets with which a parser error has occurred at the filtering step. getstatnetflowswaitingtobeexported(): Number of NetFlows/records currently waiting to be exported (Export Queue size). getstatrecognizedsniffedpackets(): Number of sniffed packets recognized by at least one parser at the filtering step. getstatrejectednetflows(): Number of NetFlows/record not created due to the prefmaxnetflowstotrack preference. getstatsniffedpackets(): Number of sniffed packets received by the Exporter from all Drivers. getstatunrecognizedsniffedpackets(): Number of sniffed packets unrecognized by any parser (statsniffedpackets - statrecognizedsniffedpackets - statfailedsniffedpackets). 11 Activity The minimal code for calling your Exporter is (with an IP driver, a network interface eth0 and your implementation Exporter.java): 1 import madynes. f l o w o i d. e x p o r t e r. E x p o r t e r S e r v i c e ; 2 3 public class MainActivity extends A c t i v i t y { 4 6 protected void oncreate ( Bundle s a v e d I n s t a n c e S t a t e ) { 7 super. oncreate ( s a v e d I n s t a n c e S t a t e ) ; 8 9 E x p o r t e r S e r v i c e. s t a r t ( this, Exporter. class ) ; 10 Driver. use ( this, R. raw. d r i v e r i p, eth0, tcp or udp ) ; 11 } RT n 7003
14 12 Vaubourg 12 } The l a s t empty argument c o r r e s p o n d s to o p t i o n a l l i b c a p f i l t e r s. Contents 1 Design 3 2 Environment and prerequisites 4 3 Creating templates 5 4 Defining how to fill your NetFlows 6 5 Condition to cut NetFlows 7 6 Associating data with templates 7 7 Filtering packets 8 8 New Driver 9 9 Preferences Statistics Activity 11 INRIA
15 Unité de recherche INRIA Lorraine LORIA, Technopôle de Nancy-Brabois - Campus scientifique 615, rue du Jardin Botanique - BP Villers-lès-Nancy Cedex (France) Unité de recherche INRIA Rennes : IRISA, Campus universitaire de Beaulieu Rennes Cedex (France) Unité de recherche INRIA Rhône-Alpes : 655, avenue de l Europe Montbonnot-St-Martin (France) Unité de recherche INRIA Rocquencourt : Domaine de Voluceau - Rocquencourt - BP Le Chesnay Cedex (France) Unité de recherche INRIA Sophia Antipolis : 2004, route des Lucioles - BP Sophia Antipolis Cedex (France) Éditeur INRIA - Domaine de Voluceau - Rocquencourt, BP Le Chesnay Cedex (France) ISSN
Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters
INSTITUT NATIONAL DE RECHERCHE EN INFORMATIQUE ET EN AUTOMATIQUE Ghost Process: a Sound Basis to Implement Process Duplication, Migration and Checkpoint/Restart in Linux Clusters Geoffroy Vallée, Renaud
NetFlow, RMON and Cisco-NAM deployment
NetFlow, RMON and Cisco-NAM deployment Frédéric Beck To cite this version: Frédéric Beck. NetFlow, RMON and Cisco-NAM deployment. [Technical Report] RT-0343, INRIA. 2007, pp.27. HAL
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server 2003 http://sourceforge.net/projects/pktfilter/
PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server 2003 http://sourceforge.net/projects/pktfilter/ Jean-Baptiste Marchand [email protected] Contents 1
Configuring NetFlow. Information About NetFlow. Send document comments to [email protected]. CHAPTER
CHAPTER 11 Use this chapter to configure NetFlow to characterize IP traffic based on its source, destination, timing, and application information, to assess network availability and performance. This chapter
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Generalised Socket Addresses for Unix Squeak 3.9 11
Generalised Socket Addresses for Unix Squeak 3.9 11 Ian Piumarta 2007 06 08 This document describes several new SocketPlugin primitives that allow IPv6 (and arbitrary future other) address formats to be
Computer Networks Practicum 2015
Computer Networks Practicum 2015 Vrije Universiteit Amsterdam, The Netherlands http://acropolis.cs.vu.nl/ spyros/cnp/ 1 Overview This practicum consists of two parts. The first is to build a TCP implementation
Configuring NetFlow Secure Event Logging (NSEL)
75 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data
Configuring SNMP and using the NetFlow MIB to Monitor NetFlow Data NetFlow is a technology that provides highly granular per-flow statistics on traffic in a Cisco router. The NetFlow MIB feature provides
SSC - Communication and Networking Java Socket Programming (II)
SSC - Communication and Networking Java Socket Programming (II) Shan He School for Computational Science University of Birmingham Module 06-19321: SSC Outline Outline of Topics Multicast in Java User Datagram
StreamServe Persuasion SP4 Service Broker
StreamServe Persuasion SP4 Service Broker User Guide Rev A StreamServe Persuasion SP4 Service Broker User Guide Rev A 2001-2009 STREAMSERVE, INC. ALL RIGHTS RESERVED United States patent #7,127,520 No
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
Semester Thesis Traffic Monitoring in Sensor Networks
Semester Thesis Traffic Monitoring in Sensor Networks Raphael Schmid Departments of Computer Science and Information Technology and Electrical Engineering, ETH Zurich Summer Term 2006 Supervisors: Nicolas
EE984 Laboratory Experiment 2: Protocol Analysis
EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a
Building a Multi-Threaded Web Server
Building a Multi-Threaded Web Server In this lab we will develop a Web server in two steps. In the end, you will have built a multi-threaded Web server that is capable of processing multiple simultaneous
The POSIX Socket API
The POSIX Giovanni Agosta Piattaforme Software per la Rete Modulo 2 G. Agosta The POSIX Outline Sockets & TCP Connections 1 Sockets & TCP Connections 2 3 4 G. Agosta The POSIX TCP Connections Preliminaries
Question: 3 When using Application Intelligence, Server Time may be defined as.
1 Network General - 1T6-521 Application Performance Analysis and Troubleshooting Question: 1 One component in an application turn is. A. Server response time B. Network process time C. Application response
Configuring NetFlow Secure Event Logging (NSEL)
73 CHAPTER This chapter describes how to configure NSEL, a security logging mechanism that is built on NetFlow Version 9 technology, and how to handle events and syslog messages through NSEL. The chapter
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Firewall Implementation
CS425: Computer Networks Firewall Implementation Ankit Kumar Y8088 Akshay Mittal Y8056 Ashish Gupta Y8410 Sayandeep Ghosh Y8465 October 31, 2010 under the guidance of Prof. Dheeraj Sanghi Department of
Session Hijacking Exploiting TCP, UDP and HTTP Sessions
Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being
The syslog-ng Premium Edition 5LTS
The syslog-ng Premium Edition 5LTS PRODUCT DESCRIPTION Copyright 2000-2013 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
2057-15. First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring
2057-15 First Workshop on Open Source and Internet Technology for Scientific Environment: with case studies from Environmental Monitoring 7-25 September 2009 TCP/IP Networking Abhaya S. Induruwa Department
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000.
EN-4000 Reference Manual Document 10 DMNR in the EN-4000 T his document discusses implementation of dynamic mobile network routing (DMNR) in the EN-4000. Encore Networks EN-4000 complies with all Verizon
Integrating VoltDB with Hadoop
The NewSQL database you ll never outgrow Integrating with Hadoop Hadoop is an open source framework for managing and manipulating massive volumes of data. is an database for handling high velocity data.
SyncML Device Management
SyncML Device Management An overview and toolkit implementation Radu State Ph.D. The MADYNES Research Team LORIA INRIA Lorraine 615, rue du Jardin Botanique 54602 Villers-lès-Nancy France [email protected]
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 19 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 19-1 Licensing Requirements
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
Transport Layer. Chapter 3.4. Think about
Chapter 3.4 La 4 Transport La 1 Think about 2 How do MAC addresses differ from that of the network la? What is flat and what is hierarchical addressing? Who defines the IP Address of a device? What is
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: March 2012 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 2.0, and LogLogic Software Release 5.1
LogLogic Cisco NetFlow Log Configuration Guide
LogLogic Cisco NetFlow Log Configuration Guide Document Release: September 2011 Part Number: LL600068-00ELS090000 This manual supports LogLogic Cisco NetFlow Version 1.0, and LogLogic Software Release
Configuring NetFlow. Information About NetFlow. NetFlow Overview. Send document comments to [email protected]. CHAPTER
CHAPTER 16 This chapter describes how to configure the NetFlow feature on Cisco NX-OS devices. This chapter includes the following sections: Information About NetFlow, page 16-1 Licensing Requirements
RMCS Installation Guide
RESTRICTED RIGHTS Use, duplication, or disclosure by the Government is subject to restrictions as set forth in subparagraph (C)(1)(ii) of the Rights in Technical Data and Computer Software clause at DFARS
Exam 1 Review Questions
CSE 473 Introduction to Computer Networks Exam 1 Review Questions Jon Turner 10/2013 1. A user in St. Louis, connected to the internet via a 20 Mb/s (b=bits) connection retrieves a 250 KB (B=bytes) web
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm,
Passive Network Traffic Analysis: Understanding a Network Through Passive Monitoring Kevin Timm, Network IDS devices use passive network monitoring extensively to detect possible threats. Through passive
How to develop your own app
How to develop your own app It s important that everything on the hardware side and also on the software side of our Android-to-serial converter should be as simple as possible. We have the advantage that
How To Monitor Network Traffic On A Cell Phone
Location-aware Network Monitoring using IPFIX/NetFlow Abdelkader Lahmadi Julien Vaubourg Olivier Festor Université de Lorraine Rick Hofstede Aiko Pras University of Twente NMRG meeting July 30, 2013 (compiled
Packet Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
3.5. cmsg Developer s Guide. Data Acquisition Group JEFFERSON LAB. Version
Version 3.5 JEFFERSON LAB Data Acquisition Group cmsg Developer s Guide J E F F E R S O N L A B D A T A A C Q U I S I T I O N G R O U P cmsg Developer s Guide Elliott Wolin [email protected] Carl Timmer [email protected]
The syslog-ng Premium Edition 5F2
The syslog-ng Premium Edition 5F2 PRODUCT DESCRIPTION Copyright 2000-2014 BalaBit IT Security All rights reserved. www.balabit.com Introduction The syslog-ng Premium Edition enables enterprises to collect,
CIT 380: Securing Computer Systems
CIT 380: Securing Computer Systems Scanning CIT 380: Securing Computer Systems Slide #1 Topics 1. Port Scanning 2. Stealth Scanning 3. Version Identification 4. OS Fingerprinting 5. Vulnerability Scanning
Secure use of iptables and connection tracking helpers
Secure use of iptables and connection tracking helpers Authors: Eric Leblond, Pablo Neira Ayuso, Patrick McHardy, Jan Engelhardt, Mr Dash Four Introduction Principle of helpers Some protocols use different
Cisco IOS Flexible NetFlow Command Reference
Americas Headquarters Cisco Systems, Inc. 170 West Tasman Drive San Jose, CA 95134-1706 USA http://www.cisco.com Tel: 408 526-4000 800 553-NETS (6387) Fax: 408 527-0883 THE SPECIFICATIONS AND INFORMATION
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi
File Transfer And Access (FTP, TFTP, NFS) Chapter 25 By: Sang Oh Spencer Kam Atsuya Takagi History of FTP The first proposed file transfer mechanisms were developed for implementation on hosts at M.I.T.
Presentation_ID. 2001, Cisco Systems, Inc. All rights reserved.
Presentation_ID 2001, Cisco Systems, Inc. All rights reserved. 1 IPv6 Security Considerations Patrick Grossetete [email protected] Dennis Vogel [email protected] 2 Agenda Native security in IPv6 IPv6 challenges
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
CYBER ATTACKS EXPLAINED: PACKET CRAFTING
CYBER ATTACKS EXPLAINED: PACKET CRAFTING Protect your FOSS-based IT infrastructure from packet crafting by learning more about it. In the previous articles in this series, we explored common infrastructure
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC. Host based Analysis. {Himanshu Pareek, himanshup@cdac.
Workshop on Network Traffic Capturing and Analysis IITG, DIT, CERT-In, C-DAC Host based Analysis {Himanshu Pareek, [email protected]} {C-DAC Hyderabad, www.cdachyd.in} 1 Reference to previous lecture Bots
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
Overview. Securing TCP/IP. Introduction to TCP/IP (cont d) Introduction to TCP/IP
Overview Securing TCP/IP Chapter 6 TCP/IP Open Systems Interconnection Model Anatomy of a Packet Internet Protocol Security (IPSec) Web Security (HTTP over TLS, Secure-HTTP) Lecturer: Pei-yih Ting 1 2
There are numerous ways to access monitors:
Remote Monitors REMOTE MONITORS... 1 Overview... 1 Accessing Monitors... 1 Creating Monitors... 2 Monitor Wizard Options... 11 Editing the Monitor Configuration... 14 Status... 15 Location... 17 Alerting...
Spring Design ScreenShare Service SDK Instructions
Spring Design ScreenShare Service SDK Instructions V1.0.8 Change logs Date Version Changes 2013/2/28 1.0.0 First draft 2013/3/5 1.0.1 Redefined some interfaces according to issues raised by Richard Li
From traditional to alternative approach to storage and analysis of flow data. Petr Velan, Martin Zadnik
From traditional to alternative approach to storage and analysis of flow data Petr Velan, Martin Zadnik Introduction Network flow monitoring Visibility of network traffic Flow analysis and storage enables
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Cisco IOS NetFlow Version 9 Flow-Record Format
Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: February 007 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
Local DNS Attack Lab. 1 Lab Overview. 2 Lab Environment. SEED Labs Local DNS Attack Lab 1
SEED Labs Local DNS Attack Lab 1 Local DNS Attack Lab Copyright c 2006 Wenliang Du, Syracuse University. The development of this document was partially funded by the National Science Foundation s Course,
Investigating Wired and Wireless Networks Using a Java-based Programmable Sniffer
Investigating Wired and Wireless Networks Using a Java-based Programmable Sniffer Michael J Jipping [email protected] Andrew Kalafut Bradley University Peoria, IL 61625 USA +1 309 677 3101 [email protected]
Configuring Logging. Information About Logging CHAPTER
52 CHAPTER This chapter describes how to configure and manage logs for the ASASM/ASASM and includes the following sections: Information About Logging, page 52-1 Licensing Requirements for Logging, page
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
Linux Networking Basics
Linux Networking Basics Naveen.M.K, Protocol Engineering & Technology Unit, Electrical Engineering Department, Indian Institute of Science, Bangalore - 12. Outline Basic linux networking commands Servers
Emerald. Network Collector Version 4.0. Emerald Management Suite IEA Software, Inc.
Emerald Network Collector Version 4.0 Emerald Management Suite IEA Software, Inc. Table Of Contents Purpose... 3 Overview... 3 Modules... 3 Installation... 3 Configuration... 3 Filter Definitions... 4
Transport Layer Protocols
Transport Layer Protocols Version. Transport layer performs two main tasks for the application layer by using the network layer. It provides end to end communication between two applications, and implements
Using TestLogServer for Web Security Troubleshooting
Using TestLogServer for Web Security Troubleshooting Topic 50330 TestLogServer Web Security Solutions Version 7.7, Updated 19-Sept- 2013 A command-line utility called TestLogServer is included as part
DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses.
Lab Exercise DNS Objective DNS (Domain Name System) is the system & protocol that translates domain names to IP addresses. Step 1: Analyse the supplied DNS Trace Here we examine the supplied trace of a
Mini-Challenge 3. Data Descriptions for Week 1
Data Sources Mini-Challenge 3 Data Descriptions for Week 1 The data under investigation spans a two week period. This document describes the data available for week 1. A supplementary document describes
TCP Performance Management for Dummies
TCP Performance Management for Dummies Nalini Elkins Inside Products, Inc. Monday, August 8, 2011 Session Number 9285 Our SHARE Sessions Orlando 9285: TCP/IP Performance Management for Dummies Monday,
Configuring Health Monitoring
CHAPTER4 Note The information in this chapter applies to both the ACE module and the ACE appliance unless otherwise noted. The features that are described in this chapter apply to both IPv6 and IPv4 unless
Innominate mguard Version 6
Innominate mguard Version 6 Application Note: Firewall Logging mguard smart mguard PCI mguard blade mguard industrial RS EAGLE mguard mguard delta Innominate Security Technologies AG Albert-Einstein-Str.
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Guide to Network Defense and Countermeasures Third Edition. Chapter 2 TCP/IP
Guide to Network Defense and Countermeasures Third Edition Chapter 2 TCP/IP Objectives Explain the fundamentals of TCP/IP networking Describe IPv4 packet structure and explain packet fragmentation Describe
CS 457 Lecture 19 Global Internet - BGP. Fall 2011
CS 457 Lecture 19 Global Internet - BGP Fall 2011 Decision Process Calculate degree of preference for each route in Adj-RIB-In as follows (apply following steps until one route is left): select route with
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords
Design Notes for an Efficient Password-Authenticated Key Exchange Implementation Using Human-Memorable Passwords Author: Paul Seymer CMSC498a Contents 1 Background... 2 1.1 HTTP 1.0/1.1... 2 1.2 Password
How To Stop A Ddos Attack On A Network From Tracing To Source From A Network To A Source Address
Inter-provider Coordination for Real-Time Tracebacks Kathleen M. Moriarty 2 June 2003 This work was sponsored by the Air Force Contract number F19628-00-C-002. Opinions, interpretations, conclusions, and
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
ERserver. iseries. TFTP server
ERserver iseries TFTP server ERserver iseries TFTP server Copyright International Business Machines Corporation 2000. All rights reserved. US Government Users Restricted Rights Use, duplication or disclosure
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
TCP/IP Support Enhancements
TPF Users Group Spring 2005 TCP/IP Support Enhancements Mark Gambino AIM Enterprise Platform Software IBM z/transaction Processing Facility Enterprise Edition 1.1.0 Any references to future plans are for
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Operating Systems Design 16. Networking: Sockets
Operating Systems Design 16. Networking: Sockets Paul Krzyzanowski [email protected] 1 Sockets IP lets us send data between machines TCP & UDP are transport layer protocols Contain port number to identify
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
Cisco IOS NetFlow Version 9 Flow-Record Format
White Paper Cisco IOS NetFlow Version 9 Flow-Record Format Last updated: May 0 Overview Cisco IOS NetFlow services provide network administrators with access to information concerning IP flows within their
Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS
Windows Quick Start Guide for syslog-ng Premium Edition 5 LTS November 19, 2015 Copyright 1996-2015 Balabit SA Table of Contents 1. Introduction... 3 1.1. Scope... 3 1.2. Supported platforms... 4 2. Installation...
LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide
LogLogic Juniper Networks Intrusion Detection and Prevention (IDP) Log Configuration Guide Document Release: September 2011 Part Number: LL600015-00ELS090000 This manual supports LogLogic Juniper Networks
Certes Networks Layer 4 Encryption. Network Services Impact Test Results
Certes Networks Layer 4 Encryption Network Services Impact Test Results Executive Summary One of the largest service providers in the United States tested Certes Networks Layer 4 payload encryption over
Life of a Packet CS 640, 2015-01-22
Life of a Packet CS 640, 2015-01-22 Outline Recap: building blocks Application to application communication Process to process communication Host to host communication Announcements Syllabus Should have
