Obfuscation of sensitive data in network flows 1
|
|
|
- Blaise Horton
- 9 years ago
- Views:
Transcription
1 Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. {villani, vitali, mancini}@di.uniroma1.it 2 Dipartimento di Informatica e Comunicazione, Universitá degli Studi di Milano. {daniele.riboni,claudio.bettini}@unimi.it 20 January InfoCom 2012, the 31st Annual IEEE International Conference on Computer Communications (to appear)
2 Table of contents Internet Infrastructure and Data set definition
3 Internet Actors IP Prefix (or network prefix): rappresentation of a set of IP, e.g /24; Autonomos Systems (AS): is a collection of connected Internet Protocol routing prefixes under the control of one or more network operators; Internet Service Provider: is a company that provides access to the Internet; Internet exchange Point: is a physical infrastructure through which Internet Service Providers exchange Internet traffic between their networks;
4 Internet Infrastructure:Border Gateway Protocol (BGP) Hierarchical infrastructure: Tier 1: Full mesh network Tier 2: National Internet providers Tier 3: Local Internet Service Providers... Internet today: about autonomous systems and IP Prefixes
5 Internet routing protocol: BGP AS1 announce IP prefix X AS2 say to AS3: in order to reach IP X, packets cross through AS2,AS1 each topology change causes new updates or prefix withdraws
6 Data set definition:cisco TM Netflows Netflow is a network protocol developed by Cisco TM Systems for collecting IP traffic information. real time collection; active and passive timeouts; lightweight representation of network traffic; high representive; Netflow data can be used as support for Traffic and Attacks Detection, network monitoring, QoS and other network activities.
7 Data set fields definition A network flow has been defined in many ways. The traditional definition is to use a 7-tuple key, where a flow is defined as a unidirectional sequence of packets all sharing all of the following 7 values: Source IP address Destination IP address Source port for UDP or TCP, 0 for other protocols Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols IP protocol Ingress interface (SNMP ifindex) IP Type of Service
8 ExtrABIRE project: network flows probe Large set (more than 1 year) of network flows gathered from BGP router of Commercial and Istitutional Internet Service Provider. Data set expressiveness: 2 GBytes of full netflow entries contain 110 millions of flows, 2 billions ofpackets corrisponding to 5TByte of exchanged data.
9 The role of network flows data sets in network communities Log of network flows are a fundamental tool for modeling the network behavior, identifying security attacks, and validating research results. Security and privacy concerns inhibit the release of network data. Research experiments and evaluations of proposed algorithms use synthetic data: often random network data generated by stocastic distribution differs from real data; old and short data sets: new protocol, network paradigms as well as new network attacks strategy doesn t appear in these data sets;
10 Effects of the lacks of shared network flows Dark side effects: research results become hard to evaluate; research results are inconsistent; experiments are not reproducible; application of proposed strategy with real data provides unexpected results;...
11 Anonymity, meaning without a name or namelessness ; anonymity typically refers to the state of an individual s personal identity, or personally identifiable information, being publicly unknown. aimed to: de-anonymization of data sets; inferring private informations; obtains useful information about attack target networks.
12 : Taxonomy
13 Network flows data sets attacks: grouping by precondition 2 2 J. King, K. Lakkaraju, and A. J. Slagell, A taxonomy and adversarial model for attacks against network log anonymization, in Proc. of ACM SAC. ACM, 2009, pp
14 Network flows data sets attacks: Fingerprint Fingerprint: identification is performed by matching flows fields values to the characteristics of the target environment; i.e. knowledge of network topology or services of target hosts, etc.; Injection: the adversary injects a sequence of flows in the network to be logged, that are easily recognized due to their specific characteristics; e.g., marked with uncommon TCP flags, or following particular patterns
15 Network flows data sets attacks: Web Fingerprint In this paper we attempt to quantify the risks of publishing anonymized packet traces. [...], we examine whether statistical identification techniques can be used to uncover the identities of users and their surfing activities from anonymized packet traces. Our results show that such techniques can be used by any Web server that is itself present in the packet trace and has sufficient resources to map out and keep track of the content of popular Web sites to obtain information on the network-wide browsing behavior of its clients. 3 3 D. Koukis, S. Antonatos, and K.G. Anagnostakis,On the Privacy Risks of Publishing Anonymized IP Network Traces In Proceedings of Communications and Multimedia Security
16 Previous approaches Previous approaches provide encryption of identity fields (IP address) and different techniques on quantitative fields (e.g. TCP flags, traffic stats, etc.) permutation truncation generalization No formal proof of the obfuscation property of the solution proposed are provided!
17 Data anonymity approaches Definition (Fingerprint Quasi Identifier (fp-qi)) A field of a network flow is denoted as a fingerprint Quasi Identifier (fp-qi) if its value, possibly combined with external knowledge about the characteristics of the network hosts, can reduce the cardinality of the candidate set for source or destination IP addresses of the flow in L (obfuscated netflow dataset).
18 fp QI fields in netflow entry Source IP address Destination IP address Source port for UDP or TCP, 0 for other protocols Destination port for UDP or TCP, type and code for ICMP, or 0 for other protocols IP protocol Ingress interface (SNMP ifindex) IP Type of Service (flags)
19 Data anonymity approaches: K-anonymity K-anonymity Making any record indistinguishable in a group of at least K records based on quasi-identifier (QI) values (example) If you try to identify a man from a release, but the only information you have is his birth date and gender. There are k people meet the requirement. This is k-anonymity.
20 Data anonymity approaches: k-anonymity attacks k-anonymity does not provide privacy if Sensitive values in an equivalence class lack diversity (Homogeneity Attack, e.g. Bob, 27 years) The attacker has background knowledge A. MachanavaJJhala, D- Kifer, J. Gehrke, M. Venkitasubramaniam, l Diversity: Privacy Beyond k-anonymity, ACM Transactions on Knowledge Discovery from Data (TKDD)
21 Data anonymity approaches: l-diversity Each equivalence class has at least l well-represented sensitive values (example) In one equivalent class, there are ten tuples. In the Disease area, one of them is Cancer, one is Heart Disease and the remaining eight are Flu. This satisfies 3-diversity, but the attacker can still affirm that the target person s disease is Flu with the accuracy of 70%.
22 Data anonymity Drawbacks: database anonymity strategy are effective only under the assumption that each individual is the respondent of at most one record in the released microdata. In a network flows data sets, each IP (identity) can appers more and more times.. Data anonymity tecniques are not directly suitable!
23 Idea: Goal In this work, we propose a novel obfuscation technique for network flows that provides formal guarantees under realistic assumptions about the adversary s knowledge (fingerprint or injection attacks).
24 Idea: IP A: original flow f IP D: IP B: IP GROUP α obfuscated flow f * f*[fp-qi] = g*[fp-qi] IP GROUP β IP E: IP C: IP F: f* is indistinguishable from g* based on the hosts fingerprint... IP A: IP G: IP B: IP GROUP α obfuscated flow g * f*[fp-qi] = g*[fp-qi] IP GROUP δ IP H: IP C: original flow g IP I Make Group IP of K addresses based on their behavior affinity; Group flow such that at most J distinct IP share the same flow values.
25 : algorithm details 1/3 Input L: original set of network flows; fp-qi fp QI : set of fingerprint Quasi Indentified K: minimum group size Output L : Obfuscated data set
26 : algorithm details 2/3 Input L: original set of network flows; fp-qi fp QI : set of fingerprint Quasi Indentified K: minimum group size Output IP Groups: G 1, G 2,..., G j IP Groups identifier: GID 1, GID 2,..., GID j
27 : algorithm details 3/3 Input L: original set of network flows; fp-qi fp QI : set of fingerprint Quasi Indentified j: minimum number of ftp-indistinguishable flows τ: time granularity Output L : Obfuscated data set
28 : obfuscated data sets Each non fp-qi field changes as follow: src,dstip Group IP byte, packets (min, max) interval tos, proto set of values flags Xor-ed values
29 Suppressed flows j=2 j=3 j=4 j=5 j=6 j=7 Suppressed flows (%) Time granule τ (minutes)
30 Obfuscated data set quality There are no universally accepted criteria to evaluate Obfuscated or anonymized data set. Usually, many network data analysis tecniques use Information theory based approaches or statistical informations. Entropy based Query based
31 Experiment results: Information theory based analysis Entropy of source IP addresses distribution (one hour and week) H(x) = (p i log pi ) 9 original flows k=5 k=10 k=20 9 original flows k=5 k=10 k=20 Entropy on source IP addresses Entropy on source IP address :00 12:05 12:10 12:15 12:20 12:40 12:35 12:30 12:25 Time of the day 12:45 12:50 12:55 13:00 Mon Tue Wed Sat Fri Thu Day of the week Sun Mon Tue
32 Experiment results: Information theory based analysis Entropy of destination IP addresses distribution (one hour and week) Entropy on destination IP addresses original flows k=5 k=10 k=20 Entropy on destination IP address original flows k=5 k=10 k= :00 12:05 12:10 12:15 12:20 12:40 12:35 12:30 12:25 Time of the day 12:45 12:50 12:55 13:00 Mon Tue Wed Thu Sat Fri Day of the week Sun Mon Tue
33 Experiment results: statistical analysis We executed queries for each possible value/range, and for each minute in a one-hour time window, for a total of about 120, 000 queries. For each query, we calculated the error rate by the following formula: r t e = r t r t where r (resp. r ) is the result of the query on the original (resp. obfuscated) flows, and t (resp. t ) is the total number of original (resp. obfuscated) flows.
34 Experiment results: Tos, Proto, Flag bucketization j=2 j=3 j=4 j=5 j=6 j= j=2 j=3 j=4 j=5 j=6 j= j=2 j=3 j=4 j=5 j=6 j=7 Average error (%) Average error (%) Average error (%) Time granule τ (minutes) Figure: proto field Time granule τ (minutes) Figure: flag field Time granule τ (minutes) Figure: tos field
35 Experiment results: bytes and packets bucketization j=2 j=3 j=4 j=5 j=6 j= j=2 j=3 j=4 j=5 j=6 j=7 Average error (%) Average error (%) Time granule τ (minutes) Time granule τ (minutes) Figure: Query on byte field Figure: Query on packet field
36 K-J Obfuscation benefit Make flows indistinguishable by a fingerprint attack; Preserve traffic diversity and data quality; Formal guarantee of works (refer to paper for more details).
37 Questions? Thanks
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
(Big) Data Anonymization Claude Castelluccia Inria, Privatics
(Big) Data Anonymization Claude Castelluccia Inria, Privatics BIG DATA: The Risks Singling-out/ Re-Identification: ADV is able to identify the target s record in the published dataset from some know information
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Data attribute security and privacy in distributed database system
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661, p- ISSN: 2278-8727Volume 16, Issue 2, Ver. V (Mar-Apr. 2014), PP 27-33 Data attribute security and privacy in distributed database system
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Lab 4.1.2 Characterizing Network Applications
Lab 4.1.2 Characterizing Network Applications Objective Device Designation Device Name Address Subnet Mask Discovery Server Business Services 172.17.1.1 255.255.0.0 R1 FC-CPE-1 Fa0/1 172.17.0.1 Fa0/0 10.0.0.1
Network-Wide Capacity Planning with Route Analytics
with Route Analytics Executive Summary Capacity planning is an important business process in large IP networks for ensuring reliable application and service delivery. In the days of fixed circuits and
Experimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA ([email protected]) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
NetFlow: What is it, why and how to use it? Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, [email protected] Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
ACL Based Dynamic Network Reachability in Cross Domain
South Asian Journal of Engineering and Technology Vol.2, No.15 (2016) 68 72 ISSN No: 2454-9614 ACL Based Dynamic Network Reachability in Cross Domain P. Nandhini a, K. Sankar a* a) Department Of Computer
NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE
NETWORK TRAFFIC ANALYSIS: HADOOP PIG VS TYPICAL MAPREDUCE Anjali P P 1 and Binu A 2 1 Department of Information Technology, Rajagiri School of Engineering and Technology, Kochi. M G University, Kerala
A Catechistic Method for Traffic Pattern Discovery in MANET
A Catechistic Method for Traffic Pattern Discovery in MANET R. Saranya 1, R. Santhosh 2 1 PG Scholar, Computer Science and Engineering, Karpagam University, Coimbatore. 2 Assistant Professor, Computer
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Wireshark Developer and User Conference
Wireshark Developer and User Conference Using NetFlow to Analyze Your Network June 15 th, 2011 Christopher J. White Manager Applica6ons and Analy6cs, Cascade Riverbed Technology [email protected] SHARKFEST
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
NSC 93-2213-E-110-045
NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends
Anonym: A Tool for Anonymization of the Internet Traffic
Anonym: A Tool for Anonymization of the Internet Traffic Tanjila Farah and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada {tfarah, ljilja}@sfu.ca Abstract Collecting network
CS346: Advanced Databases
CS346: Advanced Databases Alexandra I. Cristea [email protected] Data Security and Privacy Outline Chapter: Database Security in Elmasri and Navathe (chapter 24, 6 th Edition) Brief overview of
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
Network Tomography and Internet Traffic Matrices
Network Tomography and Internet Traffic Matrices Matthew Roughan School of Mathematical Sciences 1 Credits David Donoho Stanford Nick Duffield AT&T Labs-Research Albert
Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications
Outline EEC 274 Internet Measurements & Analysis Spring Quarter, 2006 Traffic Measurements Traffic measurements What metrics are we interested in? Measurement and analysis methodologies Traffic characterization
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
An Efficient Filter for Denial-of-Service Bandwidth Attacks
An Efficient Filter for Denial-of-Service Bandwidth Attacks Samuel Abdelsayed, David Glimsholt, Christopher Leckie, Simon Ryan and Samer Shami Department of Electrical and Electronic Engineering ARC Special
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Network traffic monitoring and management. Sonia Panchen [email protected] 11 th November 2010
Network traffic monitoring and management Sonia Panchen [email protected] 11 th November 2010 Lecture outline What is network traffic management? Traffic management applications Traffic monitoring
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
Detecting Botnets with NetFlow
Detecting Botnets with NetFlow V. Krmíček, T. Plesník {vojtec plesnik}@ics.muni.cz FloCon 2011, January 12, Salt Lake City, Utah Presentation Outline NetFlow Monitoring at MU Chuck Norris Botnet in a Nutshell
3. Dataset size reduction. 4. BGP-4 patterns. Detection of inter-domain routing problems using BGP-4 protocol patterns P.A.
Newsletter Inter-domain QoS, Issue 8, March 2004 Online monthly journal of INTERMON consortia Dynamic information concerning research, standardisation and practical issues of inter-domain QoS --------------------------------------------------------------------
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Minimal network traffic is the result of SiteAudit s design. The information below explains why network traffic is minimized.
SiteAudit Knowledge Base Network Traffic March 2012 In This Article: SiteAudit s Traffic Impact How SiteAudit Discovery Works Why Traffic is Minimal How to Measure Traffic Minimal network traffic is the
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
Network Security through Software Defined Networking: a Survey
[email protected] 09/30/14 Network Security through Software Defined Networking: a Survey Jérôme François, Lautaro Dolberg, Olivier Festor, Thomas Engel 2 1 Introduction 2 Firewall 3 Monitoring
How To Analyze Network Traffic With Mapreduce On A Microsoft Server On A Linux Computer (Ahem) On A Network (Netflow) On An Ubuntu Server On An Ipad Or Ipad (Netflower) On Your Computer
A Comparative Survey Based on Processing Network Traffic Data Using Hadoop Pig and Typical Mapreduce Anjali P P and Binu A Department of Information Technology, Rajagiri School of Engineering and Technology,
DATA MINING - 1DL360
DATA MINING - 1DL360 Fall 2013" An introductory class in data mining http://www.it.uu.se/edu/course/homepage/infoutv/per1ht13 Kjell Orsborn Uppsala Database Laboratory Department of Information Technology,
Quality Certificate for Kaspersky DDoS Prevention Software
Quality Certificate for Kaspersky DDoS Prevention Software Quality Certificate for Kaspersky DDoS Prevention Software Table of Contents Definitions 3 1. Conditions of software operability 4 2. General
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I)
EMIST Network Traffic Digesting (NTD) Tool Manual (Version I) J. Wang, D.J. Miller and G. Kesidis CSE & EE Depts, Penn State EMIST NTD Tool Manual (Version I) Page 1 of 7 Table of Contents 1. Overview...
First Midterm for ECE374 03/09/12 Solution!!
1 First Midterm for ECE374 03/09/12 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam
Strategies to Protect Against Distributed Denial of Service (DD
Strategies to Protect Against Distributed Denial of Service (DD Table of Contents Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks...1 Introduction...1 Understanding the Basics
Configuring Static and Dynamic NAT Simultaneously
Configuring Static and Dynamic NAT Simultaneously Document ID: 13778 Contents Introduction Prerequisites Requirements Components Used Conventions Configuring NAT Related Information Introduction In some
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software
LiveAction Application Note Cisco ASA and NetFlow Using ASA NetFlow with LiveAction Flow Software January 2013 http://www.actionpacked.com Table of Contents 1. Introduction... 1 2. ASA NetFlow Security
NetFlow Tracker Overview. Mike McGrath x ccie CTO [email protected]
NetFlow Tracker Overview Mike McGrath x ccie CTO [email protected] 2006 Copyright Crannog Software www.crannog-software.com 1 Copyright Crannog Software www.crannog-software.com 2 LEVELS OF NETWORK
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting
Catalyst 6500/6000 Switches NetFlow Configuration and Troubleshooting Document ID: 70974 Introduction Prerequisites Requirements Components Used Conventions Background Information Configure Network Diagram
Scan Detection - Revisited
Scan Detection - Revisited Levent Ertöz 1, Eric Eilertson 1, Paul Dokas 1, Vipin Kumar 1, and Kerry Long 2 1 University of Minnesota, Minneapolis MN 55455, USA 2 Army Research Laboratory, Adelphi MD 20783,
co Characterizing and Tracing Packet Floods Using Cisco R
co Characterizing and Tracing Packet Floods Using Cisco R Table of Contents Characterizing and Tracing Packet Floods Using Cisco Routers...1 Introduction...1 Before You Begin...1 Conventions...1 Prerequisites...1
Datagram-based network layer: forwarding; routing. Additional function of VCbased network layer: call setup.
CEN 007C Computer Networks Fundamentals Instructor: Prof. A. Helmy Homework : Network Layer Assigned: Nov. 28 th, 2011. Due Date: Dec 8 th, 2011 (to the TA) 1. ( points) What are the 2 most important network-layer
Routing and traffic measurements in ISP networks
Routing and traffic measurements in ISP networks Steve Uhlig Network Architectures and Services Delft University of Technology Email : [email protected] URL : http://www.nas.ewi.tudelft.nl/people/steve/
The Benefits. Locator/ID Separation
INL: IP Networking Lab Université Catholique de Louvain The Benefits of Locator/ID Separation AGAVE: A lightweight Approach for Viable End-to-end IP-based QoS Services Joint Work: L. Iannone, O.Bonaventure,
Live Traffic Monitoring with Tstat: Capabilities and Experiences
Live Traffic Monitoring with Tstat: Capabilities and Experiences Maurizio M. Munafò Alessandro Finamore Marco Mellia Michela Meo Dario Rossi WWIC - Luleå, June 3, 2010 Outline Motivations Tstat - TCP STatistic
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows Adam Slagell, Jun Wang, William Yurcik National Center for Supercomputing Applications University of Illinois at Urbana-Champaign
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Building Secure Network Infrastructure For LANs
Building Secure Network Infrastructure For LANs Yeung, K., Hau; and Leung, T., Chuen Abstract This paper discusses the building of secure network infrastructure for local area networks. It first gives
Using IPM to Measure Network Performance
CHAPTER 3 Using IPM to Measure Network Performance This chapter provides details on using IPM to measure latency, jitter, availability, packet loss, and errors. It includes the following sections: Measuring
Appendix A Remote Network Monitoring
Appendix A Remote Network Monitoring This appendix describes the remote monitoring features available on HP products: Remote Monitoring (RMON) statistics All HP products support RMON statistics on the
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
ABSTRACT Acknowledgments List of Abbreviations Contents ABSTRACT 3 Acknowledgments 5 List of Abbreviations 7 List of Figures 15 List of Tables 23 1 Introduction 25 2 Motivation and background 29 3 Overview
for guaranteed IP datagram routing
Core stateless distributed admission control at border routers for guaranteed IP datagram routing Takahiro Oishi Masaaki Omotani Kohei Shiomoto NTT Network Service Systems Laboratories, NTT corporation
NetFlow Performance Analysis
NetFlow Performance Analysis Last Updated: May, 2007 The Cisco IOS NetFlow feature set allows for the tracking of individual IP flows as they are received at a Cisco router or switching device. Network
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Nino Pellegrino October the 20th, 2015
Learning Behavioral Fingerprints from NetFlows... using Timed Automata Nino Pellegrino October the 20th, 2015 Nino Pellegrino Learning Behavioral Fingerprints October the 20th, 2015 1 / 32 Use case Nino
Detecting Network Anomalies. Anant Shah
Detecting Network Anomalies using Traffic Modeling Anant Shah Anomaly Detection Anomalies are deviations from established behavior In most cases anomalies are indications of problems The science of extracting
Internet Traffic Trends A View from 67 ISPs
Internet Traffic Trends A View from 67 ISPs Craig Labovitz ([email protected]) Danny McPherson ([email protected]) Scott Iekel-Johnson ([email protected]) Mike Hollyman ([email protected]) Internet Statistics
Limitations of Packet Measurement
Limitations of Packet Measurement Collect and process less information: Only collect packet headers, not payload Ignore single packets (aggregate) Ignore some packets (sampling) Make collection and processing
Configuring Flexible NetFlow
CHAPTER 62 Note Flexible NetFlow is only supported on Supervisor Engine 7-E, Supervisor Engine 7L-E, and Catalyst 4500X. Flow is defined as a unique set of key fields attributes, which might include fields
UltraFlow -Cisco Netflow tools-
UltraFlow UltraFlow is an application for collecting and analysing Cisco Netflow data. It is written in Python, wxpython, Matplotlib, SQLite and the Python based Twisted network programming framework.
Network Security. Mobin Javed. October 5, 2011
Network Security Mobin Javed October 5, 2011 In this class, we mainly had discussion on threat models w.r.t the class reading, BGP security and defenses against TCP connection hijacking attacks. 1 Takeaways
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Nfsight: NetFlow-based Network Awareness Tool
Nfsight: NetFlow-based Network Awareness Tool Robin Berthier Coordinated Science Laboratory Information Trust Institute University of Illinois Urbana-Champaign, IL, USA [email protected] Michel Cukier The
Network Data Monitoring and Analysis. Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay ĠBRĠKÇĠ Prepared by Çağla TERLĠKCĠOĞULLARI
Network Data Monitoring and Analysis Computer Networks Lecture's Seminar Lecturer:Assoc.Prof.Turgay ĠBRĠKÇĠ Prepared by Çağla TERLĠKCĠOĞULLARI 1 2 Presentation Contents What Is Network Monitoring? Importance
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
