BGPRV: A Library for Fast and Efficient Routing Data Manipulation
|
|
|
- Patrick Davis
- 9 years ago
- Views:
Transcription
1 BGPRV: A Library for Fast and Efficient Routing Data Manipulation DETER/EMIST Workshop June 15th, Arlington, VA Patrick McDaniel, Sophie Qiu, and Kevin Butler 1
2 BGP Security Community in the midst of comprehensive effort to evaluate and address the security limitations of BGP, the Internet interdomain routing protocol. Where are we? Enormous body of analysis of the behavior of BGP Many, many security protocol proposals Time-tested operational (protective) procedures Community interest, and involvement Q: Why (technically) don t we have secure BGP? A: Massively complex protocol interactions involving thousands of independent (often untrustworthy) entities A: No way to convincingly evaluate proposals/practices 2
3 Trace based experiment... Simulation Definition (simulation scope and timeline) Extract Topology Extract Traffic Model Project Attack (simulation model) Visualization Forensic Analysis Simulation (results) (modified attack) 3
4 Problem The experimental community has a large and increasing corpus of data to use to drive experiments... (PREDICT) However, it is hard to manage data. A large cost of developing an experiment is in dealing with the source data. This is particularly true of BGP data RouteViews, RIPE, etc., all use MRT or other formats which are collected in obtuse structures on remote servers Tools for managing data specialized/rudimentary No comprehensive API for manipulating 4
5 Requirements Designers of an experiment need flexible access to the real source traces... formats should be transparent... details of collection should be abstracted away... optimize over many uses... fast, reliable, etc.... simplicity Goal state: experimenters should be completely ignorant of the location, format, and access methods of corpus of data Extract Topology Extract Traffic Model 5
6 BGPRV.pm A perl module that abstracts away all of the details of the RouteViews repository Random access stream of entire history Handles both RIB and UPDATE data routing snapshot (RIB), flows (UPDATES) Automatically interrogates RouteViews repository keeps state of repository in persistent store replicates as needed all data Applications programmer interface makes all files, replication, formats transparent to the user converts everything to ASCII Note: not only RV, but useful for any structured repository 6
7 bgpdump: an example #!/usr/bin/perl use BGPRV; # Create the RV object my ($mobj,@mrt); $mobj = BGPRV->new; # Check for CLP, then init and walk the stream if ( $ARGV[0] eq "-f" ) { $mobj->online(0); shift; } $mobj->initmrtstream( $ARGV[0], $ARGV[1] ); while ( $mobj->getnextmrt(\@mrt)) { } # Process the BGP Announcements if ( defined $mrt[$bgprv::upd_fields{announces}] ) { foreach my $prefix (@{$mrt[$bgprv::upd_fields{announces}]}) { print "$mrt[$bgprv::upd_fields{time}] A ". "$mrt[$bgprv::upd_fields{srcip}] ". "$BGPRV::ORIGINS[$mrt[$BGPRV::UPD_FIELDS{ORIG}]] ". "$prefix $mrt[$bgprv::upd_fields{path}]\n"; } } 7
8 Replication Replication: mirroring all remote files locally: 1. Scan all UPDATE and RIB directories once a day, current month once an hour (with dates and times) write to $RV_REPOSITORY/rv_state.dat get all files, inclusively for all dates within the MRT stream range [All web related tools built upon Perl lwp (libwww-perl) interfaces] 2. Read each record 1. Parse MRT formats Convert all MRT data to ASCII Create hash table (w nesting) 3. Return hash to the caller program 8
9 bgpstab: BGP stability Observes the stability of address space advertisements over a year Stable prefixes Unstable prefixes Pathological instability Categorization by AS type Characterizations of security apparatus Cryptographic methods, route filters sbgp, IRV, RCP, and many, many others... Publication: Sophie Qiu, Patrick McDaniel, Fabian Monrose, and Avi Rubin, Characterizing Address Use Structure and Stability of Origin Advertisement in Interdomain Routing. 11th IEEE Symposium on Computers and Communications, June Pula-Cagliari, Sardinia, Italy. In Progress: Dan Pei, William Aiello, Anna Gilbert, and Patrick McDaniel, Origin Disturbances in BGP. Technical Report TD-62TJJF8, AT&T Labs - Research, Florham Park, NJ, May 2006 (revised). 9
10 bgptopo: topology extractor Extracts the IDR state of the network (or subset) Topology uses Prefix assignments Prefix transitions Usage Extract Topology Topology from center-point AS X, diameter Y over period Z bgptopo [-f] <START> <END> <CENTER AS> <DIAMETER> <MAXLINKS> Example:./bgptopo -f "05/24/06 00:00:00" "05/24/06 01:00:00" Note: compiles directly into lseb compatible topo file 10
11 bgpevent: event extractor How do we extract the important events from a corpus of data -- build the script for the evolving environment Inprogress: dual of bgptopo, extracts events from corpus Develops maps of state transition of known topology Currently prefix advertisements prefix withdrawals link state changes working : route filters, policy... Extract Traffic Model Research challenges: how do you reliable determine the difference between failures, changes in configuration, and other events from indirect observations 11
12 Future work... Implementation enhancements Namespaces: RouteViews, Ripe Experimental sources: use non-bgp event information E.g., AT&T Ruby system provides details of interface level logs throughout AS7018 Useful for more reliable event introspection E.g., Router configurations, CISCO COI Useful for determining real topology, more realistic events Further integration with existing experimental systems lseb (large-scale replayable ebgp experiments) 12
13 Availability BGPRV and (some) tools are currently available... Some use in community, more welcome Please see or 13
Embedded BGP Routing Monitoring. Th. Lévy O. Marcé
Embedded BGP Routing Monitoring Th. Lévy O. Marcé Introduction & Motivations Off-line BGP routing monitoring initiatives (i.e based on router logs) already exist: Periodic report : The CIDR Report Objective
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies
A Case Study Design of Border Gateway Routing Protocol Using Simulation Technologies Chengcheng Li School of Information Technology University of Cincinnati Cincinnati, OH 45221 [email protected] ABSTRACT
Border Gateway Protocol BGP4 (2)
Border Gateway Protocol BGP4 (2) Professor Richard Harris School of Engineering and Advanced Technology (SEAT) Presentation Outline Border Gateway Protocol - Continued Computer Networks - 1/2 Learning
Bell Aliant. Business Internet Border Gateway Protocol Policy and Features Guidelines
Bell Aliant Business Internet Border Gateway Protocol Policy and Features Guidelines Effective 05/30/2006, Updated 1/30/2015 BGP Policy and Features Guidelines 1 Bell Aliant BGP Features Bell Aliant offers
Inter-domain Routing Basics. Border Gateway Protocol. Inter-domain Routing Basics. Inter-domain Routing Basics. Exterior routing protocols created to:
Border Gateway Protocol Exterior routing protocols created to: control the expansion of routing tables provide a structured view of the Internet by segregating routing domains into separate administrations
Towards a virtualized Internet for computer networking assignments
Towards a virtualized Internet for computer networking assignments Luis Bellido, David Fernández, Encama Pastor Abstract By combining virtualization technologies, virtual private network techniques and
BGP Routing Stability of Popular Destinations
BGP Routing Stability of Popular Destinations Jennifer Rexford, Jia Wang, Zhen Xiao, and Yin Zhang AT&T Labs Research; Florham Park, NJ Abstract The Border Gateway Protocol (BGP) plays a crucial role in
JUNOS Secure BGP Template
JUNOS Secure BGP Template Version 1.92, 03/30/2005 Stephen Gill E-mail: [email protected] Published: 04/25/2001 Contents Credits... 2 Introduction... 2 Template... 4 References... 10 Credits Rob Thomas
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Doing Don ts: Modifying BGP Attributes within an Autonomous System
Doing Don ts: Modifying BGP Attributes within an Autonomous System Luca Cittadini, Stefano Vissicchio, Giuseppe Di Battista Università degli Studi RomaTre IEEE/IFIP Network Operations and Management Symposium
Microsoft Windows PowerShell v2 For Administrators
Course 50414B: Microsoft Windows PowerShell v2 For Administrators Course Details Course Outline Module 1: Introduction to PowerShell the Basics This module explains how to install and configure PowerShell.
Understanding Route Aggregation in BGP
Understanding Route Aggregation in BGP Document ID: 5441 Contents Introduction Prerequisites Requirements Components Used Conventions Network Diagram Aggregate Without the as set Argument Aggregate with
Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches
print email Article ID: 4941 Enabling Multiple Wireless Networks on RV320 VPN Router, WAP321 Wireless-N Access Point, and Sx300 Series Switches Objective In an ever-changing business environment, your
Enhancing Network Monitoring with Route Analytics
with Route Analytics Executive Summary IP networks are critical infrastructure, transporting application and service traffic that powers productivity and customer revenue. Yet most network operations departments
MPLS WAN Explorer. Enterprise Network Management Visibility through the MPLS VPN Cloud
MPLS WAN Explorer Enterprise Network Management Visibility through the MPLS VPN Cloud Executive Summary Increasing numbers of enterprises are outsourcing their backbone WAN routing to MPLS VPN service
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices. Technical White Paper. April 2014
DDL Systems, Inc. ACO MONITOR : Managing your IBM i (or AS/400) using wireless devices Technical White Paper April 2014 DDL Systems, Inc. PO Box 1262 Valparaiso, IN 46384 Phone: 866 559-0800 Introduction
Lecture 18: Border Gateway Protocol"
Lecture 18: Border Gateway Protocol" CSE 123: Computer Networks Alex C. Snoeren HW 3 due Wednesday! Some figures courtesy Mike Freedman Lecture 18 Overview" Path-vector Routing Allows scalable, informed
TEST AUTOMATION FRAMEWORK
TEST AUTOMATION FRAMEWORK Twister Topics Quick introduction Use cases High Level Description Benefits Next steps Twister How to get Twister is an open source test automation framework. The code, user guide
Opnet Based simulation for route redistribution in EIGRP, BGP and OSPF network protocols
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735.Volume 9, Issue 1, Ver. IV (Jan. 2014), PP 47-52 Opnet Based simulation for route redistribution
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes
Pretty Good BGP: Improving BGP by Cautiously Adopting Routes Josh Karlin University of New Mexico [email protected] Stephanie Forrest University of New Mexico Santa Fe Institute [email protected] Jennifer
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
How to Configure BGP Tech Note
How to Configure BGP Tech Note This document gives step by step instructions for configuring and testing full-mesh multi-homed ebgp using Palo Alto Networks devices in both an Active/Passive and Active/Active
Introduction to Routing
Introduction to Routing How traffic flows on the Internet Philip Smith [email protected] RIPE NCC Regional Meeting, Moscow, 16-18 18 June 2004 1 Abstract Presentation introduces some of the terminologies used,
Detecting BGP hijacks in 2014
Detecting BGP hijacks in 2014 Guillaume Valadon & Nicolas Vivet Agence nationale de la sécurité des systèmes d information http://www.ssi.gouv.fr/en NSC - November 21th, 2014 ANSSI - Detecting BGP hijacks
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
BGP FORGOTTEN BUT USEFUL FEATURES. Piotr Wojciechowski (CCIE #25543)
BGP FORGOTTEN BUT USEFUL FEATURES Piotr Wojciechowski (CCIE #25543) ABOUT ME Senior Network Engineer MSO at VeriFone Inc. Previously Network Solutions Architect at one of top polish IT integrators CCIE
Firewall Builder Architecture Overview
Firewall Builder Architecture Overview Vadim Zaliva Vadim Kurland Abstract This document gives brief, high level overview of existing Firewall Builder architecture.
ASM Educational Center (ASM) Est. 1992
Cisco CCNP Routing and Switching Certification Course outline ROUTE v2.0 - Implementing Cisco IP Routing Module 1: Basic Network and Routing Concepts Lesson 1: Differentiating Routing Protocols Lesson
SOFTWARE DEFINED NETWORKS REALITY CHECK. DENOG5, Darmstadt, 14/11/2013 Carsten Michel
SOFTWARE DEFINED NETWORKS REALITY CHECK DENOG5, Darmstadt, 14/11/2013 Carsten Michel Software Defined Networks (SDN)! Why Software Defined Networking? There s a hype in the industry!! Dispelling some myths
Managing BGP Routes with a BGP Session Multiplexer
Managing BGP Routes with a BGP Session Multiplexer Vytautas Valancius and Nick Feamster School of Computer Science, Georgia Tech ABSTRACT This paper presents the design, implementation, and evaluation
CSCI-1680 So ware-defined Networking
CSCI-1680 So ware-defined Networking Rodrigo Fonseca Most content from lecture notes by Scott Shenker SDN For now: a new paradigm for network management SDN widely accepted as future of networking ~1000
INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION
" - * INCIDENT RESPONSE & COMPUTER FORENSICS, SECOND EDITION CHRIS PROSISE KEVIN MANDIA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul
SDX Project Updates GEC 20
SDX Project Updates GEC 20 Georgia Tech Team: Russ Clark, Nick Feamster, Arpit Gupta Ron Hutchins, Cas D Angelo, Siva Jayaraman! June 23, 2014! Project Goals Enable and support SDX research in the GENI
Internet infrastructure. Prof. dr. ir. André Mariën
Internet infrastructure Prof. dr. ir. André Mariën (c) A. Mariën 31/01/2006 Topic Firewalls (c) A. Mariën 31/01/2006 Firewalls Only a short introduction See for instance: Building Internet Firewalls, second
The RouteNormalizer and Network Routing Anomalification
A Firewall for Routers: Protecting Against Routing Misbehavior Ying Zhang Z. Morley Mao Jia Wang University of Michigan AT&T Labs Research Abstract In this work, we present the novel idea of route normalization
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE)
IMPLEMENTING CISCO IP ROUTING V2.0 (ROUTE) COURSE OVERVIEW: Implementing Cisco IP Routing (ROUTE) v2.0 is an instructor-led five day training course developed to help students prepare for Cisco CCNP _
Troubleshooting and Maintaining Cisco IP Networks Volume 1
Troubleshooting and Maintaining Cisco IP Networks Volume 1 Course Introduction Learner Skills and Knowledge Course Goal and E Learning Goal and Course Flow Additional Cisco Glossary of Terms Your Training
Supporting Large-scale Deployments through Virtual Directory Technology. A White Paper by Phil Hunt Director, Product Management, OctetString, Inc.
Supporting Large-scale Deployments through Virtual Directory Technology A White Paper by Phil Hunt Director, Product Management, OctetString, Inc. February 2004 Table of Contents Introduction... 2 Clogged
Future Network Monitoring for IXPs
Future Network Monitoring for IXPs Saleem Bhatti Felipe Huici Department of, UCL http://nrg.cs.ucl.ac.uk/ 1 Outline of talk 1. Problem space and requirements
Comprehensive IP Traffic Monitoring with FTAS System
Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar [email protected] CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
Testing Network Security Using OPNET
Testing Network Security Using OPNET Agustin Zaballos, Guiomar Corral, Isard Serra, Jaume Abella Enginyeria i Arquitectura La Salle, Universitat Ramon Llull, Spain Paseo Bonanova, 8, 08022 Barcelona Tlf:
Microsoft Azure ExpressRoute
Microsoft Azure ExpressRoute Michael Washam Summary: Microsoft Azure ExpressRoute makes it easy to establish dedicated and private circuits between your data center and Microsoft Azure. ExpressRoute connections
Secure Network Provenance
Secure Network Provenance Wenchao Zhou *, Qiong Fei*, Arjun Narayan*, Andreas Haeberlen*, Boon Thau Loo*, Micah Sherr + * University of Pennsylvania + Georgetown University http://snp.cis.upenn.edu/ Motivation
Web Security Testing Cookbook*
Web Security Testing Cookbook* Systematic Techniques to Find Problems Fast Paco Hope and Ben Walther O'REILLY' Beijing Cambridge Farnham Koln Sebastopol Tokyo Table of Contents Foreword Preface xiii xv
Designing and Implementing a Server Infrastructure
Course 20413C: Designing and Implementing a Server Infrastructure Course Details Course Outline Module 1: Planning Server Upgrade and Migration This module explains how to plan a server upgrade and migration
SPAMfighter Mail Gateway
SPAMfighter Mail Gateway User Manual Copyright (c) 2009 SPAMfighter ApS Revised 2009-05-19 1 Table of contents 1. Introduction...3 2. Basic idea...4 2.1 Detect-and-remove...4 2.2 Power-through-simplicity...4
Monitoring Infrastructure (MIS) Software Architecture Document. Version 1.1
Monitoring Infrastructure (MIS) Software Architecture Document Version 1.1 Revision History Date Version Description Author 28-9-2004 1.0 Created Peter Fennema 8-10-2004 1.1 Processed review comments Peter
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka
Monitoring BGP and Route Leaks using OpenBMP and Apache Kafka Tim Evens ([email protected]) NANOG-65 Traditional Method: VTY (cli/netconf/xml) Data is polled instead of pushed (not real-time) Large queries
#41 D A N T E I N P R I N T. TEN-155 Multicast: MBGP and MSDP monitoring. Jan Novak Saverio Pangoli
D A N T E I N P R I N T TEN-155 Multicast: #41 MBGP and MSDP monitoring Jan Novak Saverio Pangoli DANTE IN PRINT is a track record of papers and articles published by, or on behalf of DANTE. An HTML version
3. Dataset size reduction. 4. BGP-4 patterns. Detection of inter-domain routing problems using BGP-4 protocol patterns P.A.
Newsletter Inter-domain QoS, Issue 8, March 2004 Online monthly journal of INTERMON consortia Dynamic information concerning research, standardisation and practical issues of inter-domain QoS --------------------------------------------------------------------
ICSA Labs Web Application Firewall Certification Testing Report Web Application Firewall - Version 2.1 (Corrected) Radware Inc. AppWall V5.6.4.
ICSA Labs Web Application Firewall Certification Testing Report Radware Inc. V5.6.4.1 May 30, 2013 Prepared by ICSA Labs 1000 Bent Creek Blvd., Suite 200 Mechanicsburg, PA 17050 www.icsalabs.com WAFX RADWAREINC-2013-0530-01
Multihoming and Multi-path Routing. CS 7260 Nick Feamster January 29. 2007
Multihoming and Multi-path Routing CS 7260 Nick Feamster January 29. 2007 Today s Topic IP-Based Multihoming What is it? What problem is it solving? (Why multihome?) How is it implemented today (in IP)?
BGPStream: a software framework for live and historical BGP data analysis
BGPStream: a software framework for live and historical BGP data analysis Chiara Orsini, Alistair King, Alberto Dainotti CAIDA, UC San Diego ABSTRACT We present the design and implementation of BGPStream,
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project
BGP Prefix Hijack: An Empirical Investigation of a Theoretical Effect Masters Project Advisor: Sharon Goldberg Adam Udi 1 Introduction Interdomain routing, the primary method of communication on the internet,
How To Make A Network Plan Based On Bg, Qos, And Autonomous System (As)
Policy Based QoS support using BGP Routing Priyadarsi Nanda and Andrew James Simmonds Department of Computer Systems Faculty of Information Technology University of Technology, Sydney Broadway, NSW Australia
Understanding Route Redistribution & Filtering
Understanding Route Redistribution & Filtering When to Redistribute and Filter PAN-OS 5.0 Revision B 2013, Palo Alto Networks, Inc. www.paloaltonetworks.com Contents Overview... 3 Route Redistribution......
Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
Week 4 / Paper 1. Open issues in Interdomain Routing: a survey
Week 4 / Paper 1 Open issues in Interdomain Routing: a survey Marcelo Yannuzzi, Xavier Masip-Bruin, Olivier Bonaventure IEEE Network, Nov.-Dec. 2005, vol. 19, no. 6, pp. 49 56 Main point There are many
Avis Fleet Services United Road Towing Arizona
fleet management Managing a fleet of vehicles requires an organization to achieve control over an inconsistent environment to keep vehicles and their operators performing at their peak. It requires a careful
Firewall-on-Demand. GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF. Leonidas Poulopoulos
Firewall-on-Demand GRNET s approach to advanced network security services management via bgp flow-spec and NETCONF Leonidas Poulopoulos 1 leopoul@nocgrnetgr 1 NOC/Greek Research and Technology Network
Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time
Essential Curriculum Computer Networking II Cisco Discovery 3: Introducing Routing and Switching in the Enterprise 157.8 hours teaching time Chapter 1 Networking in the Enterprise-------------------------------------------------
Course Syllabus. Maintaining a Microsoft SQL Server 2005 Database. At Course Completion
Course Syllabus Maintaining a Microsoft SQL Server 2005 Database Elements of this syllabus are subject to change. This five-day instructor-led course provides students with the knowledge and skills to
Best Practices for Eliminating Risk from Routing Changes
Best Practices for Eliminating Risk from Routing Changes TECHNICAL BRIEF Table of Contents Introduction 3 Route Analytics Intelligence to Meet the Routing Management Challenge 3 Routing Management Best
Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5
Technical Note Web Services for Management Perl Library VMware ESX Server 3.5, VMware ESX Server 3i version 3.5, and VMware VirtualCenter 2.5 In the VMware Infrastructure (VI) Perl Toolkit 1.5, VMware
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE
COURSE OUTLINE MOC 20413: DESIGNING AND IMPLEMENTING A SERVER INFRASTRUCTURE MODULE 1: PLANNING SERVER UPGRADE AND MIGRATION This module explains how to plan a server upgrade and migration strategy. Considerations
EQ-BGP: an efficient inter-domain QoS routing protocol
EQ-BGP: an efficient inter-domain QoS routing protocol Andrzej Beben Institute of Telecommunications Warsaw University of Technology Nowowiejska 15/19, 00-665 Warsaw, Poland [email protected] Abstract
The Bro Network Security Monitor. Broverview
The Bro Network Security Monitor Broverview Outline 2 Outline Philosophy and Architecture A framework for network traffic analysis. 2 Outline Philosophy and Architecture A framework for network traffic
Introduction to Automated Testing
Introduction to Automated Testing What is Software testing? Examination of a software unit, several integrated software units or an entire software package by running it. execution based on test cases
ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1
ns-3 development overview ns-3 GENI Eng. Conf., Nov. 2010 1 ns-3 tutorial agenda 3:00-4:30: ns-3 current capabilities Project overview Walkthrough of basic simulation scenario Parallel simulations and
Forecasting Traffic Growth and Impact with Cisco MATE Design
White Paper Forecasting Traffic Growth and Impact with Cisco MATE Design Forecasting Scenarios for Planners, Engineers, and Operations What You Will Learn The ability to predict the impact of traffic growth
How To Load Balance On A Bgg On A Network With A Network (Networking) On A Pc Or Ipa On A Computer Or Ipad On A 2G Network On A Microsoft Ipa (Netnet) On An Ip
Globally Distributed Content (Using BGP to Take Over the World) Horms (Simon Horman) [email protected] November 2001 http://supersparrow.org/ 1 Introduction Electronic content is becoming increasingly
Towards a Next- Generation Inter-domain Routing Protocol. L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I.
Towards a Next- Generation Inter-domain Routing Protocol L. Subramanian, M. Caesar, C.T. Ee, M. Handley, Z. Mao, S. Shenker, and I. Stoica Routing 1999 Internet Map Coloured by ISP Source: Bill Cheswick,
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets
Lab 5.5.3 Developing ACLs to Implement Firewall Rule Sets All contents are Copyright 1992 2007 Cisco Systems, Inc. All rights reserved. This document is Cisco Public Information. Page 1 of 8 Device Interface
BlackBerry Enterprise Service 10. Secure Work Space for ios and Android Version: 10.1.1. Security Note
BlackBerry Enterprise Service 10 Secure Work Space for ios and Android Version: 10.1.1 Security Note Published: 2013-06-21 SWD-20130621110651069 Contents 1 About this guide...4 2 What is BlackBerry Enterprise
SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE
SSM6437 DESIGNING A WINDOWS SERVER 2008 APPLICATIONS INFRASTRUCTURE Duration 5 Days Course Outline Module 1: Designing IIS Web Farms The students will learn the process of designing IIS Web Farms with
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure
Interdomain traffic engineering with BGP B. Quoitin, S. Uhlig, C. Pelsser, L. Swinnen and O. Bonaventure Abstract Traffic engineering is performed by means of a set of techniques that can be used to better
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics
Link-Rank: A Graphical Tool for Capturing BGP Routing Dynamics Mohit Lad, Lixia Zhang Computer Science Department University of California Los Angeles, CA 90095, USA mohit,lixia @cs.ucla.edu Dan Massey
Experimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA ([email protected]) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
VESZPROG ANTI-MALWARE TEST BATTERY
VESZPROG ANTI-MALWARE TEST BATTERY 2012 The number of threats increased in large measure in the last few years. A set of unique anti-malware testing procedures have been developed under the aegis of CheckVir
How To Write A Policy Based Networking System For Bgg
Utilizing Semantic Policies for Secure BGP Route Dissemination Sethuram Balaji Kodeswaran, Palanivel Kodeswaran, Anupam Joshi Department of Computer Science and Electrical Engineering University of Maryland
Agent Languages. Overview. Requirements. Java. Tcl/Tk. Telescript. Evaluation. Artificial Intelligence Intelligent Agents
Agent Languages Requirements Overview Java Tcl/Tk Telescript Evaluation Franz J. Kurfess, Cal Poly SLO 211 Requirements for agent Languages distributed programming large-scale (tens of thousands of computers)
The Win32 Network Management APIs
The Win32 Network Management APIs What do we have in this session? Intro Run-Time Requirements What's New in Network Management? Windows 7 Windows Server 2003 Windows XP Network Management Function Groups
KT The Value Networking Company
KT The Value Networking Company IRIMS (Internet Routing Information Management System) 2005. 9 Y.D. KIM, G.E.KIM, C.K.Hwang, J.H.YOO (webman, gekim, ckhwang, styoo@kt kt.co..co.kr) Abstract An AS (Autonomous
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led
MCSA/MCITP: Enterprise Windows Server 2008 Course 9952; 14 Days, Instructor-led Course Description Whether you are looking to learn new technology, gain Server 2008 certification, or simply improve your
Measuring IP Network Routing Convergence. A new approach to the problem
59 Measuring IP Network Routing Convergence A new approach to the problem A Blind Spot In Network Performance Monitoring Today s monitoring technologies tell us how the network performs in steady state
