DSMS Part 1 & 2. Data Management: Comparison - DBS versus DSMS. Handle Data Streams in DBS?
|
|
|
- Della Cross
- 9 years ago
- Views:
Transcription
1 DSMS Part 1 & 2 Data Stream Management Systems - Applications, Concepts, and Systems Vera Goebel Department of Informatics University of Oslo 1 Introduction: What are DSMS? (terms) Why do we need DSMS? (applications) Concepts and Issues: Architectures Data Modeling & Querying Application Examples: Network Monitoring with Esper (TelegraphCQ, STREAM, and Borealis) Medical Data Analysis with Esper Complex Event Processing (Home Care Scenario) 2 Handle Data Streams in DBS? Traditional DBS SQL Query Query Processing Main Memory Disk Result DSMS Register CQs Data Stream(s) Query Processing Main Memory Scratch store (main memory or disk) Result (stored) Data Stream(s) Archive Stored relations 3 Data Management: Comparison - DBS versus DSMS Database Systems (DBS) Persistent relations (relatively static, stored) One-time queries Random access Unbounded disk store Only current state matters No real-time services Relatively low update rate Data at any granularity Assume precise data Access plan determined by query processor, physical DB design DSMS Transient streams (on-line analysis) Continuous queries (CQs) Sequential access Bounded main memory Historical data is important Real-time requirements Possibly multi-gb arrival rate Data at fine granularity Data stale/imprecise Unpredictable/variable data arrival and characteristics 4 Adapted from [Motawani: PODS tutorial]
2 DSMS Applications Sensor Networks: Monitoring of sensor data from many sources, complex filtering, activation of alarms, aggregation and joins over single or multiple streams Network Traffic Analysis: Analyzing Internet traffic in near real-time to compute traffic statistics and detect critical conditions Financial Tickers: On-line analysis of stock prices, discover correlations, identify trends On-line auctions Transaction Log Analysis, e.g., Web, telephone calls, Motivation for DSMS Large amounts of interesting data: deploy transactional data observation points, e.g., AT&T long-distance: ~300M call tuples/day AT&T IP backbone: ~10B IP flows/day generate automated, highly detailed measurements NOAA: satellite-based measurement of earth geodetics Sensor networks: huge number of measurement points Near real-time queries/analyses ISPs: controlling the service level NOAA: tornado detection using weather radar data 5 6 VLDB 2003 Tutorial [Koudas & Srivastava 2003] Motivation for DSMS (cont.) Performance of disks: Increase CPU Performance 1 MIPS 2,000,000 MIPS 2,000,000 x Memory Size 16 Kbytes 32 Gbytes 2,000,000 x Motivation for DSMS (cont.) Take-away points: Large amounts of raw data Analysis needed as fast as possible Data feed problem Memory Performance 100 usec 2 nsec 50,000 x Disc Drive Capacity 20 Mbytes 300 Gbytes 15,000 x Disc Drive Performance 60 msec 5.3 msec 11 x Source: Seagate Technology Paper: Economies of Capacity and Speed: Choosing the most cost-effective disc drive size and RPM to meet IT requirements 7 8
3 Application Requirements Generic DSMS Architecture Data model and query semantics: order- and time-based operations Selection Nested aggregation Multiplexing and demultiplexing Frequent item queries Joins Windowed queries Query processing: Streaming query plans must use non-blocking operators Only single-pass algorithms over data streams Data reduction: approximate summary structures Synopses, digests => no exact answers Real-time reactions for monitoring applications => active mechanisms Long-running queries: variable system conditions Scalability: shared execution of many continuous queries, monitoring multiple streams Stream Mining Streaming Inputs Input Monitor Working Storage Summary Storage Static Storage Updates to Static Data Query Repository User Queries Query Processor Output Buffer Streaming Outputs 9 10 [Golab & Özsu 2003] DSMS: 3-Level Architecture DBS Data feeds to database can also be treated as data streams Resource (memory, disk, per-tuple computation) rich Useful to audit query results of DSMS Supports sophisticated query processing, analyses DSMS DSMS at multiple observation points, (voluminous) streams-in, (data reduced) streams-out Resource (memory, per tuple computation) limited, esp. at low-level Reasonably complex, near real-time, query processing Identify what data to populate in DB Data Models Real-time data stream: sequence of data items that arrive in some order and may be seen only once. Stream items: like relational tuples - relation-based models, e.g., STREAM, TelegraphCQ; or instanciations of objects - object-based models, e.g., COUGAR, Tribeca Window models: Direction of movement of the endpoints: fixed window, sliding window, landmark window Physical / time-based windows versus logical / count-based windows Update interval: eager (update for each new arriving tuple) versus lazy (batch processing -> jumping window), nonoverlapping tumbling windows VLDB 2003 Tutorial [Koudas & Srivastava 2003]
4 Timestamps Explicit Injected by data source Models real-world event represented by tuple Tuples may be out-of-order, but if near-ordered can reorder with small buffers Implicit Introduced as special field by DSMS Arrival time in system Enables order-based querying and sliding windows Issues Distributed streams? Composite tuples created by DSMS? Queries - I DBS: one-time (transient) queries DSMS: continuous (persistent) queries Support persistent and transient queries Predefined and ad hoc queries (CQs) Examples (persistent CQs): Tapestry: content-based , news filtering OpenCQ, NiagaraCQ: monitor web sites Chronicle: incremental view maintenance Unbounded memory requirements Blocking operators: window techniques Queries referencing past data Queries - II DBS: (mostly) exact query answer DSMS: (mostly) approximate query answer Approximate query answers have been studied: Synopsis construction: histograms, sampling, sketches Approximating query answers: using synopsis structures Approximate joins: using windows to limit scope Approximate aggregates: using synopsis structures Batch processing Data reduction: sampling, synopses, sketches, wavelets, histograms, One-pass Query Evaluation DBS: Arbitrary data access One/few pass algorithms have been studied: Limited memory selection/sorting: n-pass quantiles Tertiary memory databases: reordering execution Complex aggregates: bounding number of passes DSMS: Per-element processing: single pass to reduce drops Block processing: multiple passes to optimize I/O cost VLDB 2003 Tutorial [Koudas & Srivastava 2003]
5 Query Languages 3 querying paradigms for streaming data: 1. Relation-based: SQL-like syntax and enhanced support for windows and ordering, e.g., Esper, CQL (STREAM), StreaQuel (TelegraphCQ), AQuery, GigaScope 2. Object-based: object-oriented stream modeling, classify stream elements according to type hierarchy, e.g., Tribeca, or model the sources as ADTs, e.g., COUGAR 3. Procedural: users specify the data flow, e.g., Aurora, users construct query plans via a graphical interface (1) and (2) are declarative query languages, currently, the relation-based paradigm is mostly used. 17 Approximate Query Answering Methods Sliding windows Only over sliding windows of recent stream data Approximation but often more desirable in applications Batched processing, sampling and synopses Batched if update is fast but computing is slow Compute periodically, not very timely Samplingif update is slow but computing is fast Compute using sample data, but not good for joins, etc. Synopsis data structures Maintain a small synopsis or sketch of data Good for querying historical data Blocking operators, e.g., sorting, avg, min, etc. Blocking if unable to produce the first output until seeing the entire input 18 [Han 2004] Outline DSMS Monitoring Morten Lindeberg Network Monitoring Introduction Network Monitoring with Esper Example Queries Results Medical Monitoring Sensors Variable sized windows Results 19 20
6 Network Monitoring: Motivation Network Monitoring - Traffic analysis: Which applications generate most traffic on the network (e.g., look at TCP port numbers), and what is the utilized bandwidth (traffic volumes during a day) - Provisioning of network resources (e.g., identify congested routers or links) - Study protocol impact (e.g., measure the overhead in terms of control messages of, e.g., OLSR) - Intrusion detection (e.g., SYN-flooding attacks) Basic principles: Passive vs. Active Online vs. Offline Our focus on passive online analysis Observe traffic flowing through a point in the network (e.g., a router or a computer) Network Monitoring Tools Common tools: tcpdump (command line interface, packet sniffing) Wireshark (graphical interface, packet sniffing) DSMS related: CoMo (network monitoring with focus on load shedding => drop packets if system does not manage to handle incoming traffic) Gigascope (AT&T Labs research project, DSMS specialized for monitoring) (project page does no longer exist) Endace (hardware network cards, hard to program) Why Use A DSMS? For Passive Online Analysis Huge streams, in-memory processing needed, disks are to slow React fast to changes in network traffic SQL interface allow dynamically changing queries to respond to network changes or characteristics Although: processing packets fast enough to handle all traffic on a link is still an issue 23 24
7 Esper Network Monitoring With Esper Esper is a component for CEP and ESP applications, available for Java as Esper, and for.net as Nesper CEP (Complex Event Processing) ESP (Event Stream Processing) Available at: Experiment setup Application flow Network Monitoring with Esper Network Monitoring Queries 1. Capture packets from a network interface card using Unix pcap library (e.g., TCP and IP headers) 2. Create instance of Esper Component for Query Engine 3. Register query 4. Register listener for query results 5. Capture and convert packets into tuples => POJO (Plain Old Java Objects) 6. Inject POJO s into the engine 7. Output query results at listener 27 Query 1 - Projection of the TCP/IP header fields (like tcpdump) select * from PacketEvent Query 2 - Packet count and network load per second (bandwidth consumption) select sum(totallength), count(*) from PacketEvent.win:time_batch(1 sec) 28
8 Network Monitoring Queries Network Monitoring Queries Query 3 - Packet count for specific ports during five minutes (account for packets destined for certain applications) insert into PortStream select destport, count(*) as portcount from PacketEvent.win:time_batch(1 sec) group by destport select Table.destport as port, sum(port.portcount) from PortStream.win:time(300 sec) as Port, sql:portdatabase [ select destport from Ports ] as Table where Port.destport = Table.destport group by Query 4 - SYN Flood attack identifier (denial of service (DoS) attack, a server is flooded with packets with the SYN bit set) insert into NormalView select count(*) as tuplecount, destip, destport from PacketEvent.win:time_batch(1 sec) where syn = 0 group by destip, destport insert into SynView select count(*) as tuplecount, destip, destport from PacketEvent.win:time_batch(1 sec) where syn = 1 group by destip, destport select (Normal.tupleCount / Syn.tupleCount) as Ratio, Normal.tupleCount as NormalTupleCount, Normal.destip as NormalDestip, Normal.destport as NormalDestport, Syn.tupleCount as SynTupleCount from NormalView.win:time(5 sec) as Normal, SynView.win:time(5 sec) as Syn Table.destport 29 where Normal.destip = Syn.destip 30 Network Monitoring Queries Query 5 - Filter out land attack (spoofed packets causing infinite loop. Destination IP address and the source IP address are identical ) Network Monitoring Queries Query 6 - Identify attempts of port scanning (port scanning is commonly the first step in an attack; a port scan can be identified if a series of packets are sent from one source IP address to a destination IP address with many different TCP destination ports) select * from Packets where sourceip = destip and sourceport = destport and syn = 1 31 SELECT COUNT(DISTINCT destport) as distinctcount, sourceip FROM Packets WINDOW SIZE 10 seconds GROUP BY sourceip, sourceport 32
9 Performance StreamBench Determine the amount of traffic that a DSMS can handle for specific network monitoring tasks (queries) Initial results form earlier work Master s theses and INF5090 assignments Benchmarked DSMSs: Esper, Borealis, TelegraphCQ, STREAM Performance Results Processing rate: Investigates the bounds of network load that the DSMS is able to process without loosing to many packets Results: The different systems have quite differently network load bounds Some systems perform significantly better, if allowing some packet loss The processing complexity of the different queries has a significant impact on the load bounds Performance Results Performance Results CPU Consumption Query 5 Memory Consumption Query
10 Network Monitoring Results Outline Query 6 (port scan) results Network Monitoring Introduction Network Monitoring with Esper Example Queries Results Medical Monitoring Sensors Variable sized windows Results Experiment Goal #1 Online Analysis of Myocardial Ischemia From Medical Sensor Data Streams with Esper Stig Støa 1, Morten Lindeberg 2 and Vera Goebel 2 1 The Interventional Centre (IVS), Rikshospitalet University Hospital, Oslo, Norway 2 Distributed Multimedia Systems (DMMS), Department of Informatics, University of Oslo, Norway Recreate an off-line technique of Elle et al. [1] conducted in MATLAB Early recognition of regional cardiac ischemia 3-way accelerometer placed on the left ventricle of the heart Single metric: Fast Fourier Transformation (FFT) is used to examine the accelerometer signal in the frequency-domain Euclidian distance vector (EDV(i)) between reference vector RV(0) and current vector CV(j), where j is the latest sample number CV(j) : FFT over sliding window (size 512 over y-axis) RV(0) : FFT over baseline window (first 512 samples) Data set from surgery performed on pigs at the Interventional Centre We can conduct experiments with the same data set (referred to as data set 1) 39 40
11 Experiment Goal #2 Improve results by adding beat to beat detection using a QRS detection algorithm on ECG signals Each ECG trace of a normal heartbeat typically contains a QRS event A good reference for separating heartbeats We need a to perform FFT over a sliding window of variable size! Cannot use the same data, use new data set that include ECG (data set 2) [ image from ] 41 Challenges 1. Incorporate signal processing operations Problem: Not supported in the query language Fast Fourier Transformation of the accelerometer signals Euclidian distance vector from baseline window QRS detection for detecting the heartbeats from the ECG signals Solution: Custom aggregate functions 2. Static sized windows are not feasible for beat-to-beat detection Problem: Heartbeat duration is not a static pre-known size. DSMS window techniques only describe static time-based or tuple-based windows. Solution: Introduce variable length triggered tumbling windows 3. Synchronize the two streams Problem: QRS detection introduces variable delay (approx. 91 samples) Solution: Introduce variable buffer, that slows the accelerometer stream down 42 Signal processing operations Implement as custom aggregate functions Use defined Java interface and simply add to query engine Implemented methods: QRSD(v): QRS detection based upon algorithm from Hamilton et al. [2], source code is also public available edv(v): Euclidian distance from baseline Variable length triggered tumbling windows The ECG stream is aggregated into a stream consisting of QRS events S b This stream (S b ) triggers the flushing of the sliding window w(t) where the custom aggregation over the stream S a is performed The window is not supported by Esper => We implemented a workaround exploiting functionality of externally timed windows 43 44
12 Stream Synchronization The QRS detection algorithm over the ECG stream introduces a variable delay t Introduce the same delay to the accelerometer stream Accelerometer stream is sent through a FIFO queue, with dynamic size QRS detection function sets the dynamic size of the FIFO queue (also triggers the flushing of the aggregate window, in order to obtain dynamic windows, as already seen) Results #1 (data set 1) SELECT edv(y) Easier than MATLAB FROM Accelerometer WINDOW LENGTH(512) Occlusion occurs after 80 seconds Figure shows a perfect overlap, thus the technique by Elle et al. [1] can be recreated online using Esper Perfusion after 170 seconds Results #2 (data set 2) Plot shows fixed sliding window (512 samples) SELECT edv(y) FROM Accelerometer TRIGGER and dynamic triggered window (based on QRS WINDOW BY QRSD(ECG.value) detection) => less variance! Results #3 (data set 2) SELECT edv(y), min(y) FROM Query with added local minimum Accelerometer TRIGGER WINDOW BY value => easy to change! QRSD(ECG.value) Occlusion Perfusion The bottom plot represents local minimum value for the accelerometer stream Sudden drop caused by ultra sound probe 47 48
13 Summary DSMSs can be used for: Network monitoring: Performance is an issue, systems behave/handles overload differently Medical monitoring of patients: Custom operators are helpful, dynamic window sizes to adapt to heart rate References [1] Elle, O. J., Halvorsen, S., Gulbrandsen, M. G., Aurdal, L., Bakken, A., Samset, E., Dugstad H. and Fosse, E. Early recognition of regional cardiac ischemia using a 3-axis accelerometer sensor. Institute of Physics Publishing. Physiological Measurement, Volume 26, Number 4, August 2005, pp [2] Hamilton, P. S. and Tompkins, W. J. Quantitive Investigation of QRS Detection Rules Using the MIT/BIH Arrhythmia Database. IEEE Transactions on Biomedical Engineering, Volume BME-33, Number 12, December 1986, pp Questions? Thank you for attending lecture! 49 50
Design, Implementation, and Evaluation of Network Monitoring Tasks with the TelegraphCQ Data Stream Management System
Design, Implementation, and Evaluation of Network Monitoring Tasks with the TelegraphCQ Data Stream Management System INF5100, Autumn 2006 Jarle Content Introduction Streaming Applications Data Stream
Data Mining for Knowledge Management. Mining Data Streams
Data Mining for Knowledge Management Mining Data Streams Themis Palpanas University of Trento http://dit.unitn.it/~themis Spring 2007 Data Mining for Knowledge Management 1 Motivating Examples: Production
4 Internet QoS Management
4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology [email protected] September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control
Data Stream Processing on Enterprise Integration Platforms
Data Stream Processing on Enterprise Integration Platforms A thesis submitted in part fulfilment of the degree of MSc Advanced Software Engineering in Computer Science with the supervision of Dr. Joseph
Models and Issues in Data Stream Systems
Models and Issues in Data Stream Systems Brian Babcock Shivnath Babu Mayur Datar Rajeev Motwani Jennifer Widom Department of Computer Science Stanford University Stanford, CA 94305 babcock,shivnath,datar,rajeev,widom
Data Stream Management and Complex Event Processing in Esper. INF5100, Autumn 2010 Jarle Søberg
Data Stream Management and Complex Event Processing in Esper INF5100, Autumn 2010 Jarle Søberg Outline Overview of Esper DSMS and CEP concepts in Esper Examples taken from the documentation A lot of possibilities
CS 356 Lecture 16 Denial of Service. Spring 2013
CS 356 Lecture 16 Denial of Service Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control Lists Chapter
Data Stream Management
Data Stream Management Synthesis Lectures on Data Management Editor M. Tamer Özsu, University of Waterloo Synthesis Lectures on Data Management is edited by Tamer Özsu of the University of Waterloo. The
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems. Christopher Roblee Vincent Berk George Cybenko
Implementing Large-Scale Autonomic Server Monitoring Using Process Query Systems Christopher Roblee Vincent Berk George Cybenko These slides are based on the paper Implementing Large-Scale Autonomic Server
Load Distribution in Large Scale Network Monitoring Infrastructures
Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu
Dual Mechanism to Detect DDOS Attack Priyanka Dembla, Chander Diwaker 2 1 Research Scholar, 2 Assistant Professor
International Association of Scientific Innovation and Research (IASIR) (An Association Unifying the Sciences, Engineering, and Applied Research) International Journal of Engineering, Business and Enterprise
Network Intrusion Detection Systems. Beyond packet filtering
Network Intrusion Detection Systems Beyond packet filtering Goal of NIDS Detect attacks as they happen: Real-time monitoring of networks Provide information about attacks that have succeeded: Forensic
CS 640 Introduction to Computer Networks. Network security (continued) Key Distribution a first step. Lecture24
Introduction to Computer Networks Lecture24 Network security (continued) Key distribution Secure Shell Overview Authentication Practical issues Firewalls Denial of Service Attacks Definition Examples Key
Pulsar Realtime Analytics At Scale. Tony Ng April 14, 2015
Pulsar Realtime Analytics At Scale Tony Ng April 14, 2015 Big Data Trends Bigger data volumes More data sources DBs, logs, behavioral & business event streams, sensors Faster analysis Next day to hours
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Fuzzy Network Profiling for Intrusion Detection
Fuzzy Network Profiling for Intrusion Detection John E. Dickerson ([email protected]) and Julie A. Dickerson ([email protected]) Electrical and Computer Engineering Department Iowa State University
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Quality of Service versus Fairness. Inelastic Applications. QoS Analogy: Surface Mail. How to Provide QoS?
18-345: Introduction to Telecommunication Networks Lectures 20: Quality of Service Peter Steenkiste Spring 2015 www.cs.cmu.edu/~prs/nets-ece Overview What is QoS? Queuing discipline and scheduling Traffic
Chapter 28 Denial of Service (DoS) Attack Prevention
Chapter 28 Denial of Service (DoS) Attack Prevention Introduction... 28-2 Overview of Denial of Service Attacks... 28-2 IP Options... 28-2 LAND Attack... 28-3 Ping of Death Attack... 28-4 Smurf Attack...
Lecture 8 Performance Measurements and Metrics. Performance Metrics. Outline. Performance Metrics. Performance Metrics Performance Measurements
Outline Lecture 8 Performance Measurements and Metrics Performance Metrics Performance Measurements Kurose-Ross: 1.2-1.4 (Hassan-Jain: Chapter 3 Performance Measurement of TCP/IP Networks ) 2010-02-17
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN
MONITORING OF TRAFFIC OVER THE VICTIM UNDER TCP SYN FLOOD IN A LAN Kanika 1, Renuka Goyal 2, Gurmeet Kaur 3 1 M.Tech Scholar, Computer Science and Technology, Central University of Punjab, Punjab, India
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT
STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Application Latency Monitoring using nprobe
Application Latency Monitoring using nprobe Luca Deri Problem Statement Users demand services measurements. Network boxes provide simple, aggregated network measurements. You cannot always
Chapter 3. Internet Applications and Network Programming
Chapter 3 Internet Applications and Network Programming 1 Introduction The Internet offers users a rich diversity of services none of the services is part of the underlying communication infrastructure
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring
NetStore: An Efficient Storage Infrastructure for Network Forensics and Monitoring Paul Giura and Nasir Memon Polytechnic Intitute of NYU, Six MetroTech Center, Brooklyn, NY Abstract. With the increasing
How To Set Up An Ip Firewall On Linux With Iptables (For Ubuntu) And Iptable (For Windows)
Security principles Firewalls and NAT These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/) Host vs Network
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide
HP Intelligent Management Center v7.1 Network Traffic Analyzer Administrator Guide Abstract This guide contains comprehensive information for network administrators, engineers, and operators working with
Online and Scalable Data Validation in Advanced Metering Infrastructures
Online and Scalable Data Validation in Advanced Metering Infrastructures Chalmers University of technology Agenda 1. Problem statement 2. Preliminaries Data Streaming 3. Streaming-based Data Validation
Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor
-0- Improving the Database Logging Performance of the Snort Network Intrusion Detection Sensor Lambert Schaelicke, Matthew R. Geiger, Curt J. Freeland Department of Computer Science and Engineering University
AlienVault Unified Security Management (USM) 4.x-5.x. Deployment Planning Guide
AlienVault Unified Security Management (USM) 4.x-5.x Deployment Planning Guide USM 4.x-5.x Deployment Planning Guide, rev. 1 Copyright AlienVault, Inc. All rights reserved. The AlienVault Logo, AlienVault,
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Middleware support for the Internet of Things
Middleware support for the Internet of Things Karl Aberer, Manfred Hauswirth, Ali Salehi School of Computer and Communication Sciences Ecole Polytechnique Fédérale de Lausanne (EPFL) CH-1015 Lausanne,
CSCE 465 Computer & Network Security
CSCE 465 Computer & Network Security Instructor: Dr. Guofei Gu http://courses.cse.tamu.edu/guofei/csce465/ Intrusion Detection System 1 Intrusion Definitions A set of actions aimed to compromise the security
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Resource Utilization of Middleware Components in Embedded Systems
Resource Utilization of Middleware Components in Embedded Systems 3 Introduction System memory, CPU, and network resources are critical to the operation and performance of any software system. These system
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Monitoring Traffic manager
Monitoring Traffic manager eg Enterprise v6 Restricted Rights Legend The information contained in this document is confidential and subject to change without notice. No part of this document may be reproduced
Congestion Control Review. 15-441 Computer Networking. Resource Management Approaches. Traffic and Resource Management. What is congestion control?
Congestion Control Review What is congestion control? 15-441 Computer Networking What is the principle of TCP? Lecture 22 Queue Management and QoS 2 Traffic and Resource Management Resource Management
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Monitoring PostgreSQL database with Verax NMS
Monitoring PostgreSQL database with Verax NMS Table of contents Abstract... 3 1. Adding PostgreSQL database to device inventory... 4 2. Adding sensors for PostgreSQL database... 7 3. Adding performance
Firewalls Overview and Best Practices. White Paper
Firewalls Overview and Best Practices White Paper Copyright Decipher Information Systems, 2005. All rights reserved. The information in this publication is furnished for information use only, does not
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis
Hillstone T-Series Intelligent Next-Generation Firewall Whitepaper: Abnormal Behavior Analysis Keywords: Intelligent Next-Generation Firewall (ingfw), Unknown Threat, Abnormal Parameter, Abnormal Behavior,
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS
WHITE PAPER INCREASE NETWORK VISIBILITY AND REDUCE SECURITY THREATS WITH IMC FLOW ANALYSIS TOOLS Network administrators and security teams can gain valuable insight into network health in real-time by
Nine Use Cases for Endace Systems in a Modern Trading Environment
FINANCIAL SERVICES OVERVIEW Nine Use Cases for Endace Systems in a Modern Trading Environment Introduction High-frequency trading (HFT) accounts for as much as 75% of equity trades in the US. As capital
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
An Active Packet can be classified as
Mobile Agents for Active Network Management By Rumeel Kazi and Patricia Morreale Stevens Institute of Technology Contact: rkazi,[email protected] Abstract-Traditionally, network management systems
Denial of Service attacks: analysis and countermeasures. Marek Ostaszewski
Denial of Service attacks: analysis and countermeasures Marek Ostaszewski DoS - Introduction Denial-of-service attack (DoS attack) is an attempt to make a computer resource unavailable to its intended
Network Security Demonstration - Snort based IDS Integration -
Network Security Demonstration - Snort based IDS Integration - Hyuk Lim ([email protected]) with TJ Ha, CW Jeong, J Narantuya, JW Kim Wireless Communications and Networking Lab School of Information and
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT:
Using Fuzzy Logic Control to Provide Intelligent Traffic Management Service for High-Speed Networks ABSTRACT: In view of the fast-growing Internet traffic, this paper propose a distributed traffic management
Network traffic: Scaling
Network traffic: Scaling 1 Ways of representing a time series Timeseries Timeseries: information in time domain 2 Ways of representing a time series Timeseries FFT Timeseries: information in time domain
Challenges of Sending Large Files Over Public Internet
Challenges of Sending Large Files Over Public Internet CLICK TO EDIT MASTER TITLE STYLE JONATHAN SOLOMON SENIOR SALES & SYSTEM ENGINEER, ASPERA, INC. CLICK TO EDIT MASTER SUBTITLE STYLE OUTLINE Ø Setting
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Chapter 7 outline. 7.5 providing multiple classes of service 7.6 providing QoS guarantees RTP, RTCP, SIP. 7: Multimedia Networking 7-71
Chapter 7 outline 7.1 multimedia networking applications 7.2 streaming stored audio and video 7.3 making the best out of best effort service 7.4 protocols for real-time interactive applications RTP, RTCP,
How To Store Data On An Ocora Nosql Database On A Flash Memory Device On A Microsoft Flash Memory 2 (Iomemory)
WHITE PAPER Oracle NoSQL Database and SanDisk Offer Cost-Effective Extreme Performance for Big Data 951 SanDisk Drive, Milpitas, CA 95035 www.sandisk.com Table of Contents Abstract... 3 What Is Big Data?...
Observer Analysis Advantages
In-Depth Analysis for Gigabit and 10 Gb Networks For enterprise management, gigabit and 10 Gb Ethernet networks mean high-speed communication, on-demand systems, and improved business functions. For enterprise
Intrusion Detection Systems
Intrusion Detection Systems Assessment of the operation and usefulness of informatics tools for the detection of on-going computer attacks André Matos Luís Machado Work Topics 1. Definition 2. Characteristics
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT
Track 2 Workshop PacNOG 7 American Samoa Firewalling and NAT Core Concepts Host security vs Network security What is a firewall? What does it do? Where does one use it? At what level does it function?
Detection of Distributed Denial of Service Attack with Hadoop on Live Network
Detection of Distributed Denial of Service Attack with Hadoop on Live Network Suchita Korad 1, Shubhada Kadam 2, Prajakta Deore 3, Madhuri Jadhav 4, Prof.Rahul Patil 5 Students, Dept. of Computer, PCCOE,
Application Visibility and Monitoring >
White Paper Application Visibility and Monitoring > An integrated approach to application delivery Application performance drives business performance Every business today depends on secure, reliable information
SAN Conceptual and Design Basics
TECHNICAL NOTE VMware Infrastructure 3 SAN Conceptual and Design Basics VMware ESX Server can be used in conjunction with a SAN (storage area network), a specialized high speed network that connects computer
Chapter 6 Basics of Data Integration. Fundamentals of Business Analytics RN Prasad and Seema Acharya
Chapter 6 Basics of Data Integration Fundamentals of Business Analytics Learning Objectives and Learning Outcomes Learning Objectives 1. Concepts of data integration 2. Needs and advantages of using data
Infrastructure for active and passive measurements at 10Gbps and beyond
Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA
Vulnerability Analysis of Hash Tables to Sophisticated DDoS Attacks
International Journal of Information & Computation Technology. ISSN 0974-2239 Volume 4, Number 12 (2014), pp. 1167-1173 International Research Publications House http://www. irphouse.com Vulnerability
Distributed Denial of Service (DDoS)
Distributed Denial of Service (DDoS) Defending against Flooding-Based DDoS Attacks: A Tutorial Rocky K. C. Chang Presented by Adwait Belsare ([email protected]) Suvesh Pratapa ([email protected]) Modified by
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com
Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
Security Event Management. February 7, 2007 (Revision 5)
Security Event Management February 7, 2007 (Revision 5) Table of Contents TABLE OF CONTENTS... 2 INTRODUCTION... 3 CRITICAL EVENT DETECTION... 3 LOG ANALYSIS, REPORTING AND STORAGE... 7 LOWER TOTAL COST
Testing L7 Traffic Shaping Policies with IxChariot IxChariot
TEST PLAN Testing L7 Traffic Shaping Policies with IxChariot IxChariot www.ixiacom.com 915-6658-01, 2005 Contents 1. Introduction 1 2. Overview of L7 Layer Payload Definition Options in IxChariot 1 2.1
Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman
Cloud and Big Data Summer School, Stockholm, Aug. 2015 Jeffrey D. Ullman 2 In a DBMS, input is under the control of the programming staff. SQL INSERT commands or bulk loaders. Stream management is important
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
