Anonym: A Tool for Anonymization of the Internet Traffic
|
|
|
- Alfred Anderson
- 9 years ago
- Views:
Transcription
1 Anonym: A Tool for Anonymization of the Internet Traffic Tanjila Farah and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada {tfarah, ljilja}@sfu.ca Abstract Collecting network traffic traces from deployed networks is one of the basic steps in understanding communication networks. Traffic traces are used for network management, traffic engineering, packet classification, and analyzing user behavior to ensure adequate quality of service. Monitored traffic traces should be anonymized for privacy and security reasons. The goal of anonymization is to preserve trace properties while enforcing privacy policies. Various tools and techniques have been implemented for trace anonymization. In this paper, we propose and implement an anonymization tool that executes multilevel anonymization and displays analysis results. We describe architecture and features of the tool and discuss analysis of unanonymized and anonymized datasets. Index Terms Network traffic, anonymization, traffic analysis. I. INTRODUCTION Measurement, characterization, and classification of the Internet traffic help ensure security of the Internet users and provide information to the network administrators to better manage the network. Traffic analysis relies on collection of trace logs from network service providers. Network traffic logs include data packet headers, which contain the source and destination Internet Protocol (IP) addresses, port numbers, type of packets and protocols, and information related to the packet source and destination. Sharing these network traces may reveal the network architecture, user identity, and user information. This makes the network vulnerable to attacks. One solution is to employ anonymization of collected traffic. Anonymization is a compromise between preserving research value of the trace and protecting the user privacy. Réseaux IP Européens (RIPE) [], Route Views [], and Corporative Association for Internet Data Analysis (CAIDA) [] provide anonymized collected traffic traces to the research community. A variety of fields that should be anonymized, anonymization techniques, and anonymization tools have been considered []. The prefix preserving anonymization is the most frequently used algorithm for anonymization of IP addresses. This technique was implemented in the Crypto-PAn [] tool. The Anontool allows perfield anonymization and provides various anonymization algorithms [6]. The FLAIM anonymization tool has an application program interface []. There are trade-offs between privacy, security, and efficiency when sanitizing collected data [7]. Finding a balance between security requirements of the organization that shares the trace logs and their research usefulness has been a topic of research interests [8]. Anonymization approaches have various limitations [9]. Trace anonymization should preserve the research value of the trace and, hence, analysis of anonymized and un-anonymized datasets such as statistical distributions, traffic volume, presence of anomalous traffic, and results of network-wide traffic analysis should lead to similar results []. We propose a tool named Anonym to anonymize stored traffic traces. It supports pcap and mrt text format trace files and provides options for traffic analysis. In this paper, we provide overview of the tool and statistical analysis of anonymized and un-anonumized data. This paper is organized as follows. Motivation for collecting network traffic traces is given in Section II. Anonymization algorithms and anonymized fields are described in Section III. In Section IV, we describe the Anonym tool, its functionality, and discuss analysis of anonymized and un-anonumized datasets. We conclude with Section V. II. COLLECTION OF NETWORK TRAFFIC Network operators continuously collect and monitor network traffic. Collecting and exploring network traffic help understand its characteristics. They assist in the development of methodologies and techniques to facilitate reliable network operations, discover network traffic patterns, and optimize network resources. Network traces are used in traffic engineering, discovery of Internet topologies, and network security analysis. ) Traffic Engineering: Measurement, characterization, modeling, and control of the Internet traffic requires understanding network traffic patterns []. The role of traffic engineering encompasses network troubleshooting, protocol debugging, workload characterization, performance evaluation, and capacity planning []. ) Discovering Internet Topologies: Mapping the Internet network [], [] is important for the design of new protocols, applications, and routing policies. The Internet service providers (ISPs) rely on Internet topologies for network planning and network management. ) Network Security Analysis: Analyzing the network-wide traffic behavior helps detect abnormal events such as malicious attacks and Internet viruses and determine the spread of network anomalies and their classification and diagnosis [].
2 III. ANONYMIZATION ALGORITHMS Anonymization is the modification of network traffic data in order to protect the identity of the end users. The goal of anonymization is to remove the ability to identify the connection between two end-points while preserving the usefulness of the data. The network traffic data, also known as a network flow, consists of a sequence of packets from source to destination end-points. It is defined by five fields (-tuple): source address, destination address, source port number, destination port number, and protocol type. A flow record includes additional fields such as packet length, Media Access Control (MAC) address, flow number, Autonomous System (AS) number, window size, maximum segment size, and payload length. Some of these fields uniquely identify endpoints while others identify the pattern and behavior of network users. Anonymization processes consider all these fields in hope to increase the anonymity of the data []. Network data may be protected by controlling the access to data or by applying mechanism such as anonymization of the dataset. A raw packet trace contains various data fields. They may contain sensitive data and, hence, it is important to carefully select fields to be anonymized. Not all fields require anonymization. Anonymization algorithms or anonymization primitives provide various levels of anonymization of the collected datasets []. The precision and efficiency of an anonymization algorithm are important to maintain the research value of the collected data []. Listed are some known anonymization algorithms: Black marker algorithm is the most extreme method of anonymization. It deletes or replaces with a fixed value all information in a field. It may be applied to all fields of a network flow. Although it entirely protects the data, it also reduces the usefulness of the anonymized dataset. Enumeration algorithm works on a well-ordered set of data. After sorting the data, it selects the first value from the record. For each successive record, it selects a larger number. This algorithm may not be applied to all fields. The enumerated data is useful for the analysis requiring strict sequencing. However, the anonymization destroys the time-stamp information. Hash algorithm replaces the data with a fixed size bit string. Any change in the data alters the hash value. The results of a hash function are sometimes shorter than the field value. Hence, the hash algorithm is easy to break. One form of hash algorithm is the Hash Message Authentication Code (HMAC). Partitioning algorithm partitions a set of possible values into subsets by an equivalence relation. A canonical example for each subset is chosen. The anonymization function then replaces each data with the canonical value []. Precision degradation algorithm removes the most precise content of a time-stamp field. The anonymized data may not be useful for applications that require strict sequencing of flows. Permutation algorithm is mostly used for anonymization of the IP and MAC addresses. It applies a random permutation to map un-anonymized addresses to a set of possible addresses. It uses one hash table for mapping from un-anonymized to anonymized IP addresses and another to store all anonymized addresses. There are many variations of permutation functions, each having trade-offs in terms of performance. Permutation functions are random and prefix-preserving. Prefix-preserving pseudonymization algorithm is similar to the Permutation algorithm. A function F is prefix-preserving if two addresses a and b share the first n bits. This is one-to-one mapping on a set of values generated from a block cipher. It is used to anonymize the IP addresses. This algorithm preserves the structure by preserving the prefixes values. Cryptographic keys are used to keep the mapping consistent [6], [7]. Random time shift algorithm adds a random offset to every value in a field. Truncation algorithm is used to anonymize the IP and the MAC addresses. It deletes a portion of the data while keeping the remaining unchanged. Truncation removes n least significant bits from a field value by replacing them with zeros. This technique is effective to make an end-point nonidentifiable. Reverse truncation algorithm is used to anonymize the IP and MAC addresses. It removes n of the most significant bits. This technique is effective to make a network address or an organization non-identifiable. Time unit annihilation is a partitioning algorithm used to anonymize time-stamps. It annihilates a portion of the timestamp by replacing it with zeros. The usually anonymized fields are: IP address, MAC address, port numbers, length of packets, time-stamps, and counters. Multiple anonymization algorithms are available for fields that commonly appear in the traffic data, as shown in Table I. TABLE I FIELDS AND THE RELATED ANONYMIZATION PROCESS. Field IP address MAC address Time-stamps Counter Port number Anonymization algorithm Truncation, Reverse truncation, Permutation, Prefix-preserving pseudonymization, Black marker Truncation, Reverse truncation, Permutation, Structured pseudonymization, Black marker Precision degradation, Enumeration, Random-time shift, Black marker Precision degradation, Binning, Random noiseaddition, Black marker Binning, Permutation, Black marker IV. THE ANONYM TOOL The developed Anonym tool anonymizes time-stamps, IP addresses (IPv and IPv6), MAC addresses, port numbers, and packet length fields. The Anonym is a MATLAB-based tool that supports pcap and mrt format input file and provides options to convert there text file to pre-anonymized dataset file. This pre-anonymized file is the parsed input file that contains data columns corresponding to fields to be anonymized. Anonym supports multiple anonymization algorithms and data analysis options. The anonymization results and the graphs of data analysis are displayed in the output and figure screens. The results of anonymization are saved in the same format
3 ) Upload input file ) Anonymization algorithm ) Exit the window 7) Clear current output ) Analysis figure ) Parser 8) Save current Figure 6) Anonymized output 9) Choosing dataset ) Analysis types Fig.. Interface of the Anonym tool. as the input file (pcap or mrt). Anonym supports Linux and Windows operating systems. Anonym is developed with a graphical user interface (GUI). The functionality of the Anonym GUI is shown in Figure, where: ) Upload option is used for uploading pcap and mrt input files. ) PCAP and MRT options are used for parsing the input files for anonymization and analysis. ) Anonymization algorithms currently supported are: Black marker, Prefix-preserving, Reverse truncation, Time precision degradation, Time random shift, and Truncation. ) Analysis types currently supported are: Volume (bytes), Volume curve fitting, Volume (packets), Empirical distribution, Packet length distribution, Throughput, Protocol distribution, Boxplot, and Packet length PDF and CDF. ) Analysis figure appears in the figure window. 6) Anonymized output appears in the output window. 7) Clear option removes results from the figure and output windows. 8) Save option saves the figure that has been displayed in the figure window. 9) Choosing dataset option selects the dataset for analysis. ) Exit option closes the tool. The Anonym tool includes thirty options. The operational diagram of the prefix preserving option is shown in Figure. The user first uploads an input file and chooses an appropriate parsing function. After the parsing, a function is called to separate IPv and IPv6 flow records. Two functions for anonymizing IPv and IPv6 flow records perform the prefix preserving anonymization on IP address fields. The Time precision degradation function anonymizes time-stamp field while the Enumeration function anonymizes packet length field. The anonymized IPv and IPv6 flow records are saved in two separate files. A function assembles these flow records in the order as they appeared in the input file. The output function then displays the anonymized results in the output window. Another function rewrites the input file with anonymized fields. Fig.. Operational diagram of the prefix-preserving option. Anonym supports options that are not available in the existing anonymization tools. One such option is the anonimyzation of IPv6 addresses. The IPv6 addresses were introduced to the Internet in June and, hence, the existing tools do not perform IPv6 anonimyzation. IPv6 uses 8 bit addresses and its address structure is shown in Figure.
4 Un-anonimyzed dataset:. :98:::: :98:::: BGP BGP 9 Anonimyzed dataset:. 8:A7:::::: 8:A7:::::: BGP BGP 9 Fig.. Anonymization process of IP addresses. A MAC address uniquely identify a device in a network interface. Anonym tool provides Truncation and Reverse truncation algorithms to anonimyze MAC addresses. The Truncation anonymization process is shown in Figure. function of time, and statistical distributions of packet length. The traffic traces are processed in a human readable form. The statistical analysis is performed using the Anonym tool. A. Traffic Volume Analysis of traffic volume is used for classification of network traffic, for traffic engineering, measuring network usage, and anomaly detection. Traffic volume is measured as the number of bytes or packets sent and received. Traffic volumes of the Border Gateway Protocol (BGP), Transmission Control Protocol (TCP), and User Datagram Protocol (UDP) are shown in Figure. The data was collected from the BCNET between May and September [9], []. The same traffic patterns appear for anonymized and un-anonymized datasets. Un-anonimyzed dataset:.78 Cisco e7:a:c (:b:d:e7:a:c) JuniperN e:ba:bd (78:9:f7:e:ba:bd) TCP 6 Anonimyzed dataset:.78 Cisco e7:a:c (:b:d:e7::) JuniperN e:ba:bd (78:9:f7:e::) TCP 6 Fig.. Anonymization process of MAC addresses. Anonym provides option to apply the Kolmogorov-Smirnov (K-S) test to compare datasets with various reference probability distributions and to infer the underlying structure of the network traffic. The test helps extract variables, detect outliers and anomalies, test underlying assumptions, and develop a theory-based models of the traffic trace. We compared the Anonym tool with two existing tools: Anontool and FLAIM. The comparison is shown in Table II. TABLE II COMPARISON OF ANONYMIZATION TOOLS. Tool Input Fields Anontool pcap, netflow IPv address, MAC address, (v and v9) port numbers, length of packets, time-stamps, and counters FLAIM pcap, nfdump IPv address, MAC address, port numbers, length of packets, time-stamps, and counters Anonym pcap, mrt IP address (v and v6), MAC address, port numbers, length of packets, time-stamps, and counters V. ANALYSIS OF DATASETS Analysis of the network traffic [8] is an essential element of understanding network requirements and capabilities. It addresses average load and the bandwidth requirements for various applications. Statistical analysis of network traffic may also reveal the user behavior pattern. Anonymization may cause loss of information in collected datasets. We employ statistical modeling and analysis of both anonymized and unanonymized datasets and show that anonymization does not significantly change their statistics. The options include the distribution of various protocols, analysis of traffic volume as Fig.. Traffic volume in bytes: un-anonymized (top) and anonymized (bottom) datasets. The visual inspection of datasets shows no significant difference and, hence, we employed statistical tests to analyze their distribution patterns. We considered exponential, polynomial, and Fourier distributions of the un-anonymized and anonymized datasets, as shown in Figure 6. The minimum, maximum, mean, median, and standard deviation for un-anonymized and anonymized datasets are shown in Table III. The minimum, maximum, mean, and median values
5 6 lengthpp vs. time Polynomial Exponential Fourier Traffic (bytes) IPv Traffic (packets/second) 8 6 TCP ICMP DNS BGP lengthpp vs. time Polynomial Exponential Fourier 8 6 x IPv UDP Traffic (packets/second) Traffic (bytes) UDP TCP ICMP DNS BGP x Fig. 6. Fitting curves to traffic volume graph: un-anonymized (top) and anonymized (bottom) datasets. Fig. 7. Packet distribution by protocols: un-anonymized (top) and anonymized (bottom) datasets. have been increased by bytes due to the Enumeration algorithms used for anonymizing the dataset. However, the standard deviation values indicate that the structure of the datasets remains unchanged. C. Packet Length Distribution Histogram of packet length distribution is shown in Figure 9. The patterns of un-anonymized and anonymized datasets show insignificant variations. The only visible difference is the change of the packet lengths due to the Enumeration algorithm. TABLE III S TATISTICS OF DATASETS. Statistics Minimum Maximum Mean Median Standard deviation Un-anonymized dataset Anonymized dataset B. Protocol Distribution Packets were classified according to protocols, as shown in Figure 7. The BGP packets are most common. In the anonymized dataset, time field is anonymized using the Precision degradation algorithm. Traffic throughput is shown in Figure 8. Anonymization has not change the throughput statistics of the dataset. VI. C ONCLUSION Sharing network trace data helps improve quality of service and network security. In this paper, we introduced Anonym, a network trace anonymization tool. The tool is used to anonymize time-stamps, the IPv and IPv6 addresses, MAC addresses, port numbers, and packet length fields. We compared un-anonymized and anonymized datasets. Traffic data collected from BCNET were used to analyze temporal patterns and for fitting traffic volume to known distributions. The traces are anonymized and analyzed using the developed tool. Investigation of packet distributions shows no significant variations between the un-anonymized and anonymized traces. R EFERENCES [] (989-) RIPE (Re seaux IP Europe ens). [Online]. Available:
6 x 6 Packet length frequency 8 Traffic (bits/second) Packet length (bytes) Packet length (bytes) x 6 x 8 Packet length frequency Traffic (bits/second) x Fig. 8. Throughput: un-anonymized (top) and anonymized (bottom) datasets. [] University of Oregon Route Views Project. [Online]. Available: [] The Corporative Association for Internet Data Analysis. [Online]. Available: [] A. Slagell, K. Lakkaraju, and K. Luo, FLAIM: a multi-level anonymization framework for computer and network logs, in Proc. th Conference on Large Installation System Administration, Washington, DC, USA, July 6, pp.. [] J. Xu, J. Fan, M. Ammar, and S. B. Moon, On the design and performance of prefix-preserving IP traffic trace anonymization, in Proc. st ACM SIGCOMM Workshop on Internet Measurement, San Francisco, CA, USA, Nov., pp [6] M. Foukarakis, D. Antoniades, S. Antonatos, and E. P. Markatos, Flexible and high-performance anonymization of netflow records using anontool, in Proc. Third International Workshop on the Value of Security Through Collaboration, Nice, France, Sept. 7, pp. 8. [7] M. Bishop, B. Bhumiratana, R. Crawford, and K. Levitt, How to sanitize data, in Proc. th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, Washington, DC, USA, June, pp. 7. [8] R. Pang, M. Allman, V. Paxson, and J. Lee, The devil and packet trace anonymization, ACM SIGCOMM, Aug. 6, vol. 6, pp [9] R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, Sanitization models and their limitations, in Proc. 6 Workshop on New Security Paradigms, Schloss Dagstuhl, Germany, Mar. 6, pp. 6. [] A. Lakhina, M. Crovella, and C. Diot, Mining anomalies using traffic feature distributions, in Proc. Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, New York, NY, USA, Aug., vol., pp Fig. 9. Distribution of packet length: un-anonymized (top) and anonymized (bottom) datasets. [] D. Awduche, A. Chiu, A. Elwalid, I. Widjaja, and X. Xiao, Overview and principles of Internet traffic engineering, RFC 7, IETF, May. [] G. Siganos, M. Faloutsos, P. Faloutsos, and C. Faloutsos, Power-laws and the AS-level Internet topology, IEEE/ACM Trans. Networking, vol., no., pp., Aug.. [] Lj. Trajkovic, Analysis of Internet topologies, IEEE Circuits and Systems Magazine, Sept., vol., no., pp. 8. [] E. Bosch and B. Trammell, IP flow anonymization support, RFC 6, IETF, May. [] M. Foukarakis, D. Antoniades, S. Antonatos, and E. P. Markatos, On the anonymization and deanonymization of netflow traffic, in Proc. Conference for Network Flow Analysis, Savannah, GA, USA, Jan. 8, pp [6] J. Fan, J. Xu, M. H. Ammar, and S. B. Moon, Prefix-preserving IP address anonymization: measurement-based security evaluation and a new cryptography-based scheme, Computer Networks, vol. 6, pp. 7, Oct.. [7] M. Peuhkuri, A method to compress and anonymize packet traces, in Proc. st ACM SIGCOMM Workshop on Internet Measurement, San Francisco, CA, USA, Nov., pp [8] W. E. Leland, W. Willinger, D. V. Wilson, and M. S. Taqqu, On the self-similar nature of Ethernet traffic, IEEE/ACM Trans. Networking, vol., no., pp., Feb. 99. [9] BCNET. [Online]. Available: [] T. Farah, S. Lally, R. Gill, N. Al-Rousan, R. Paul, D. Xu, and Lj. Trajkovic, Collection of BCNET BGP traffic, in Proc. rd International Teletraffic Congress, San Francisco, CA, USA, Sept., pp..
Algorithms and Tools for Anonymization of the Internet Traffic
Algorithms and Tools for Anonymization of the Internet Traffic Tanjila Farah [email protected] Communication Networks Laboratory School of Engineering Science Simon Fraser University Roadmap Introduction Collection
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Anontool and NetFlow Anonymization Tools
Flexible and High-Performance Anonymization of NetFlow Records using Anontool Michalis Foukarakis, Demetres Antoniades, Spiros Antonatos, Evangelos P. Markatos Institute of Computer Science (ICS), Foundation
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure William Yurcik* Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham University
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records
1 Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records Adam J Slagell, Yifan Li and Katherine Luo National Center for Supercomputing Applications University
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security Abstract Yifan Li, Adam Slagell, Katherine Luo, William Yurcik National Center for Supercomputing Applications
Obfuscation of sensitive data in network flows 1
Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. E-mail: {villani, vitali,
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows Adam Slagell, Jun Wang, William Yurcik National Center for Supercomputing Applications University of Illinois at Urbana-Champaign
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS
AUTONOMOUS NETWORK SECURITY FOR DETECTION OF NETWORK ATTACKS Nita V. Jaiswal* Prof. D. M. Dakhne** Abstract: Current network monitoring systems rely strongly on signature-based and supervised-learning-based
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Towards Modelling The Internet Topology The Interactive Growth Model
Towards Modelling The Internet Topology The Interactive Growth Model Shi Zhou (member of IEEE & IEE) Department of Electronic Engineering Queen Mary, University of London Mile End Road, London, E1 4NS
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令
IPV6 流 量 分 析 探 讨 北 京 大 学 计 算 中 心 周 昌 令 1 内 容 流 量 分 析 简 介 IPv6 下 的 新 问 题 和 挑 战 协 议 格 式 变 更 用 户 行 为 特 征 变 更 安 全 问 题 演 化 流 量 导 出 手 段 变 化 设 备 参 考 配 置 流 量 工 具 总 结 2 流 量 分 析 简 介 流 量 分 析 目 标 who, what, where,
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
Lab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
Appmon: An Application for Accurate per Application Network Traffic Characterization
Appmon: An Application for Accurate per Application Network Traffic Characterization Demetres Antoniades 1, Michalis Polychronakis 1, Spiros Antonatos 1, Evangelos P. Markatos 1, Sven Ubik 2, Arne Øslebø
J-Flow on J Series Services Routers and Branch SRX Series Services Gateways
APPLICATION NOTE Juniper Flow Monitoring J-Flow on J Series Services Routers and Branch SRX Series Services Gateways Copyright 2011, Juniper Networks, Inc. 1 APPLICATION NOTE - Juniper Flow Monitoring
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
Guide to TCP/IP, Third Edition. Chapter 3: Data Link and Network Layer TCP/IP Protocols
Guide to TCP/IP, Third Edition Chapter 3: Data Link and Network Layer TCP/IP Protocols Objectives Understand the role that data link protocols, such as SLIP and PPP, play for TCP/IP Distinguish among various
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Network Security Part II: Standards
Network Security Part II: Standards Raj Jain Washington University Saint Louis, MO 63131 [email protected] These slides are available on-line at: http://www.cse.wustl.edu/~jain/cse473-05/ 18-1 Overview
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Network Measurement. Why Measure the Network? Types of Measurement. Traffic Measurement. Packet Monitoring. Monitoring a LAN Link. ScienLfic discovery
Why Measure the Network? Network Measurement Jennifer Rexford COS 461: Computer Networks Lectures: MW 10-10:50am in Architecture N101 ScienLfic discovery Characterizing traffic, topology, performance Understanding
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Scalable Extraction, Aggregation, and Response to Network Intelligence
Scalable Extraction, Aggregation, and Response to Network Intelligence Agenda Explain the two major limitations of using Netflow for Network Monitoring Scalability and Visibility How to resolve these issues
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets Yingying Chen, Sourabh Jain, Vijay Kumar Adhikari, Zhi-Li Zhang, and Kuai Xu 2 University of Minnesota-Twin Cities 2 Arizona
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc
(International Journal of Computer Science & Management Studies) Vol. 17, Issue 01 Performance Evaluation of AODV, OLSR Routing Protocol in VOIP Over Ad Hoc Dr. Khalid Hamid Bilal Khartoum, Sudan [email protected]
Introduction to Cisco IOS Flexible NetFlow
Introduction to Cisco IOS Flexible NetFlow Last updated: September 2008 The next-generation in flow technology allowing optimization of the network infrastructure, reducing operation costs, improving capacity
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Performance Measurement of TCP/IP Header Compression
International Journal of Electronics and Communication Engineering. ISSN 0974-2166 Volume 4, Number 4 (2011), pp. 399-404 International Research Publication House http://www.irphouse.com Performance Measurement
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification
Thwarting Selective Insider Jamming Attacks in Wireless Network by Delaying Real Time Packet Classification LEKSHMI.M.R Department of Computer Science and Engineering, KCG College of Technology Chennai,
How To Identify Different Operating Systems From A Set Of Network Flows
Passive OS detection by monitoring network flows Siebren Mossel University of Twente P.O. Box 217, 7500AE Enschede The Netherlands [email protected] ABSTRACT` Network flow monitoring is a way of monitoring
Establishing a valuable method of packet capture and packet analyzer tools in firewall
International Journal of Research Studies in Computing 2012 April, Volume 1 Number 1, 11-20 Establishing a valuable method of packet capture and packet analyzer tools in firewall Kumar, P. Senthil Nandha
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ
Computer Networks 1 (Mạng Máy Tính 1) Lectured by: Dr. Phạm Trần Vũ 1 Lecture 7: Network Layer in the Internet Reference: Chapter 5 - Computer Networks, Andrew S. Tanenbaum, 4th Edition, Prentice Hall,
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY
EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION
CYBER SCIENCE 2015 AN ANALYSIS OF NETWORK TRAFFIC CLASSIFICATION FOR BOTNET DETECTION MATIJA STEVANOVIC PhD Student JENS MYRUP PEDERSEN Associate Professor Department of Electronic Systems Aalborg University,
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets
A First Look at Inter-Data Center Traffic Characteristics via Yahoo! Datasets Yingying Chen, Sourabh Jain,VijayKumarAdhikari, Zhi-Li Zhang,andKuaiXu 2 University of Minnesota-Twin Cities 2 Arizona State
Security vulnerabilities in the Internet and possible solutions
Security vulnerabilities in the Internet and possible solutions 1. Introduction The foundation of today's Internet is the TCP/IP protocol suite. Since the time when these specifications were finished in
A Review of Anomaly Detection Techniques in Network Intrusion Detection System
A Review of Anomaly Detection Techniques in Network Intrusion Detection System Dr.D.V.S.S.Subrahmanyam Professor, Dept. of CSE, Sreyas Institute of Engineering & Technology, Hyderabad, India ABSTRACT:In
Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently.
TLP:WHITE - Port Evolution Port evolution: a software to find the shady IP profiles in Netflow. Or how to reduce Netflow records efficiently. Gerard Wagener 41, avenue de la Gare L-1611 Luxembourg Grand-Duchy
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
Packet Flow Analysis and Congestion Control of Big Data by Hadoop
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks
Strategies to Protect Against Distributed Denial of Service (DDoS) Attacks Document ID: 13634 Contents Introduction Understanding the Basics of DDoS Attacks Characteristics of Common Programs Used to Facilitate
Network Traffic Characterization using Energy TF Distributions
Network Traffic Characterization using Energy TF Distributions Angelos K. Marnerides [email protected] Collaborators: David Hutchison - Lancaster University Dimitrios P. Pezaros - University
Design and Implementation of One-way IP Performance Measurement Tool
Design and Implementation of One-way IP Performance Measurement Tool Jaehoon Jeong 1, Seungyun Lee 1, Yongjin Kim 1, and Yanghee Choi 2 1 Protocol Engineering Center, ETRI, 161 Gajong-Dong, Yusong-Gu,
IPsec Details 1 / 43. IPsec Details
Header (AH) AH Layout Other AH Fields Mutable Parts of the IP Header What is an SPI? What s an SA? Encapsulating Security Payload (ESP) ESP Layout Padding Using ESP IPsec and Firewalls IPsec and the DNS
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
F5 Silverline DDoS Protection Onboarding: Technical Note
F5 Silverline DDoS Protection Onboarding: Technical Note F5 Silverline DDoS Protection onboarding F5 Networks is the first leading application services company to offer a single-vendor hybrid solution
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
Network layer: Overview. Network layer functions IP Routing and forwarding
Network layer: Overview Network layer functions IP Routing and forwarding 1 Network layer functions Transport packet from sending to receiving hosts Network layer protocols in every host, router application
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Netflow Overview. PacNOG 6 Nadi, Fiji
Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools
Advanced Computer Networks IN2097. 1 Dec 2015
Chair for Network Architectures and Services Technische Universität München Advanced Computer Networks IN2097 1 Dec 2015 Prof. Dr.-Ing. Georg Carle Chair for Network Architectures and Services Department
Answers to Sample Questions on Network Layer
Answers to Sample Questions on Network Layer ) IP Packets on a certain network can carry a maximum of only 500 bytes in the data portion. An application using TCP/IP on a node on this network generates
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall
Internet Architecture and Philosophy
Internet Architecture and Philosophy Conceptually, TCP/IP provides three sets of services to the user: Application Services Reliable Transport Service Connectionless Packet Delivery Service The underlying
Packet Sniffer A Comparative Study
International Journal of Computer Networks and Communications Security VOL. 2, NO. 5, MAY 2014, 179 187 Available online at: www.ijcncs.org ISSN 2308-9830 C N C S Packet Sniffer A Comparative Study Dr.
Online event registration with minimal privacy violation
Master s programme System and Network Engineering Research Project 2 Online event registration with minimal privacy violation A study into Privacy Enhanced Filtering techniques Author: Supervisor: Niels
Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
Agenda. Taxonomy of Botnet Threats. Background. Summary. Background. Taxonomy. Trend Micro Inc. Presented by Tushar Ranka
Taxonomy of Botnet Threats Trend Micro Inc. Presented by Tushar Ranka Agenda Summary Background Taxonomy Attacking Behavior Command & Control Rallying Mechanisms Communication Protocols Evasion Techniques
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
Ethernet. Ethernet. Network Devices
Ethernet Babak Kia Adjunct Professor Boston University College of Engineering ENG SC757 - Advanced Microprocessor Design Ethernet Ethernet is a term used to refer to a diverse set of frame based networking
A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction
1 A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction Pere Barlet-Ros, Helena Pujol, Javier Barrantes, Josep Solé-Pareta, Jordi Domingo-Pascual Abstract SMARTxAC is a passive
