SMARTxAC: A Passive Monitoring and Analysis System for High-Speed Networks

Size: px
Start display at page:

Download "SMARTxAC: A Passive Monitoring and Analysis System for High-Speed Networks"

Transcription

1 SMARTxAC: A Passive Monitoring and Analysis System for High-Speed Networks Pere Barlet-Ros, Josep Solé-Pareta, Javier Barrantes, Eva Codina, Jordi Domingo-Pascual Advanced Broadband Communications Center (CCABA), Computer Architecture Department Universitat Politècnica de Catalunya (UPC) Jordi Girona 1-3, Barcelona, Catalunya, Spain {pbarlet, pareta, jbarranp, ecodina, jordi.domingo}@ac.upc.edu Abstract This paper presents SMARTxAC, a tailor-made passive monitoring and analysis system for high-speed IP networks. This system has been designed to operate at gigabit speeds without packet loss, while providing very detailed information about the network usage. The main difference between SMARTxAC and other monitoring systems and infrastructures for high-speed networks is that SMARTxAC has been explicitly designed to analyze the network traffic online, whereas in other approaches traffic analysis tasks are usually postponed to an offline stage. Since 2003, SMARTxAC is being used for continuously monitoring the Catalan National Research and Education Network (Anella Científica), and it has become a very powerful tool for its network operators to know in detail the usage of their network and to detect network faults, anomalies and attacks when they occur. We describe the main features of SMARTxAC and the architecture resulting from the experience we acquired after more than two years of continuous operation of the system and the feedback we have received from the network operators of the Anella Científica. We also discuss the design challenges we had to face to cope with the requirements of such a system. Keywords Traffic monitoring, Traffic analysis, Network anomaly detection 1. Introduction From the beginnings of the Internet, traffic monitoring and analysis systems have been consolidated as very helpful tools for classical network administration and management tasks, and currently are widely used by network operators and administrators. Network monitoring systems provide very valuable information for a wide range of tasks such as traffic engineering, network dimensioning, capacity planning, traffic control, fault diagnosis and troubleshooting, and network performance evaluation (e.g. delays and packet looses). At the same time, network researchers have relied on network monitoring as a methodology to collect and analyze network data from real network viewpoints to study and evaluate network protocols and the behaviour of the Internet traffic. Nowadays, novel and diverse usages for network monitoring systems are also emerging. Given the current proliferation of network attacks, viruses and worms, network monitoring systems are also being used for network security tasks. Examples of security tasks that can be carried out by network monitoring systems include intrusion and anomaly detection, worm and virus detection, and protection against other network attacks, such as Denial-of-Service, flooding attacks, exploit attempts, port scanning, etc. During the last years, the Advanced Broadband Communications Center (CCABA) of the UPC has been involved in several projects related to Internet traffic monitoring and analysis in the Spanish National Research and Education Network (RedIRIS), namely CASTBA, MEHARI [1] and MIRA [2, 3]. As a result of such an experience, we have developed a traffic monitoring and analysis system, called 1

2 SMARTxAC, in joint collaboration with the Supercomputing Center of Catalonia (CESCA). SMARTxAC is a tailor-made always-on passive monitoring and analysis system that operates at gigabit speeds without packet loss. It also includes a web-based graphical interface that offers numerous traffic statistics online. Since July 2003, SMARTxAC is being used for monitoring the Catalan National Research and Education Network (Anella Científica), which is managed by CESCA, and connects about fifty universities and research centres in Catalonia. SMARTxAC is continuously monitoring the link that connects the Anella Científica to RedIRIS, which constitutes its main connection to the global Internet. This link is built from a pair of full-duplex Gigabit Ethernet links by using load balancing techniques. The average load of this link during working hours is about 1.5 Gbits/sec (270 Kpackets/sec). A GPS-synchronized and anonymized IP header trace of this link was collected for the NLANR-PMA project and can be downloaded at [4]. A first version of SMARTxAC was also successfully tested on one of the NLANR OC192MON s located on the SDSC s TeraGrid cluster. The data collection was facilitated by a pair of Endace DAG 6.1 OC192c measurement cards [5] operating in 10 Gigabit-LAN mode. A set of results of this experiment and details about the measurement point can be found at [6]. The objective of this paper is to describe the architecture of SMARTxAC and present its main features, together with the design challenges we had to address to cope with the requirements of such a system. The rest of this paper is organized as follows: Section 2 briefly reviews the related work. Section 3 presents the architecture of SMARTxAC and describes its main components in detail. Section 4 describes its anomaly detection module and some possible improvements that are currently under development. Finally, Section 5 concludes the paper and discusses the future work. 2. Related work Network monitoring techniques traditionally have been classified into two main categories according to the methodology used to measure the network traffic and characteristics, namely active and passive monitoring. Active monitoring techniques consist of injecting measurement packets onto the network to infer its characteristics and performance parameters. The main advantage of active measurement techniques is their flexibility, because the measurement devices can be installed at the edge of the network (i.e. end hosts) without requiring instrumentation inside the network. There exists a large variety of active monitoring systems and infrastructures. The most representative ones include the National Internet Measurement Infrastructure (NIMI) [7], NLANR s Active Measurement Project (AMP) [8] and several tools developed by the Cooperative Association for Internet Data Analysis (CAIDA) [9]. Passive monitoring techniques consist of collecting and analyzing the traffic from operational networks, without injecting any additional traffic. However, passive monitoring presents several limitations. On the one hand, passive monitors must be deployed inside of the network. On the other hand, the difficulty of measuring highspeed links often makes traffic measurement and online analysis unviable in practice without using specialized hardware. Examples of passive monitoring systems and infrastructures include Sprint s IPMON [10], AT&T s Gigascope [11], NLANR s Passive Measurement Project (PMA) [12], CAIDA s CoralReef [13] and Intel s CoMo [14]. 2

3 The main difference between SMARTxAC and other passive measurement infrastructures and systems for high-speed networks, such as those deployed by NLANR and Sprint, lies in that SMARTxAC has been explicitly designed for online traffic analysis, whereas in other approaches traffic analysis tasks are usually postponed to an offline stage. Passive measurement systems also include simple tools based on the Simple Network Management Protocol (SNMP) and network monitoring software integrated into some routers and switches, such as Cisco s Netflow [15]. The main drawback of this approach is that often requires administrative access to network devices and traffic statistics are highly aggregated, so that it is not possible to obtain packet-level information and short-term congestion cannot be detected. 3. Architecture The design of SMARTxAC has been mainly driven by two main requirements. On the one hand, given the nature of our network scenario, the system has to be lightweight enough for collecting and analyzing online the network traffic from highspeed links without packet loss. On the other hand, it has to provide very detailed information about the network operation and usage. This information is very useful for helping network operators in their daily network management and administration tasks and, in particular, for detecting irregular network usage, network anomalies and attacks. Monitoring high-speed links by using either commodity or even specialized hardware is a challenging task. It involves the collection of gigabytes of traffic per second and the analysis and storage of terabytes of data per day. The problems of monitoring very high-speed links are well known by network researchers and developers of network monitoring applications. These problems are largely discussed in [16] and include limitations of current hardware, such as processing power, memory access speeds, disk bandwidth, and obviously storage capacity. In SMARTxAC we avoided these limitations by carefully designing the system to operate at gigabit speeds. We partitioned the main monitoring and traffic analysis tasks into several components according to their real-time constraints. For example, traffic collection tasks, which have strong real-time constraints, can be executed on a different computer than traffic analysis tasks, which usually are very expensive but have less real-time requirements. Finally, traffic analysis results are only presented under user request. Fig. 1 illustrates the three main components of the SMARTxAC platform that are described later in this section: the capture system, the traffic analysis system and the result visualization system. Due to performance reasons, each of them is executed on a different computer, although in other scenarios under lower traffic loads, they can run on a single computer. In order to provide useful information for network administration and management tasks, we have relied on the large experience of CESCA as the network operator of the Anella Científica. They provided us with very valuable knowledge about the statistics the system should offer in order to provide useful information, and which statistics were not needed or were rarely used in practice. It allowed us to apply very aggressive data reduction policies, early discarding unnecessary information, and consequently, significantly improving the performance and storage needs of our system. 3

4 Fig. 1. SMARTxAC platform overview A. Capture system We refer to capture system as the hardware and software components of the SMARTxAC platform that are used for traffic collection. Both Gigabit Ethernet links are tapped by using four optical splitters (one per link and direction) that passively send an entire copy of the traffic to an off-the-shelf computer equipped with a pair of Endace DAG 4.3GE cards [5]. The DAG 4.3GE cards are dual port, so that only two cards are needed for monitoring both links. The internal clocks of both DAG cards are synchronized via an external GPS source. The capture system basically collects packet headers at full-line rate, without packet loss, and performs a first aggregation of the traffic into traditional 5-tuple flows. This first aggregation stage allows us to perform an important reduction of the data to be sent and analysed by the traffic analysis system. However, as the traffic capture system has strong real-time constraints and has to avoid packet losses, more complex data reduction techniques, together with traffic analysis tasks, are delegated to the traffic analysis system. The capture software is based on a multithreaded implementation to exploit the presence of multiple processors on the capture system. In particular, it has been carefully designed to avoid packet losses, especially when dumping captured flows to disk or sending them to the traffic analysis system. Moreover, the software has been written to take the maximum advantage of the DAG cards by using directly the API provided by their manufacturers. However, our software also supports the libpcap packet capture library, so that it can be used with standard NIC cards as well, when monitoring links under lower traffic loads. B. Traffic analysis system The main task of the traffic analysis system is to aggregate the collected flows into a special kind of flows we have called classified flows, while computing several traffic statistics online. This aggregation is performed by translating the identifying values of the 5-tuple flows collected by the traffic capture system (source/destination IP addresses, ports and protocol) into more general and meaningful values (origins, destinations and applications, respectively). We refer to origins as the institutions connected to the monitored network, whereas destinations are considered as the external networks that Anella Científica is connected to (see Fig. 1). However, the system can be configured to support any other network scenario, since origins and destinations can be easily configured by giving their network prefixes or AS numbers. 4

5 This classification not only allows us to compute detailed statistics per institution and destination network, but also provides us valuable information about the nature of the traffic. For instance, P2P traffic that is routed to a commercial network (e.g. Espanix) is probably less academic than mail traffic routed to an academic or research network (e.g. RedIRIS or GÉANT). This information can be useful for charging and billing purposes in commercial networks. In particular, in National Research and Education Networks (NREN) it can be used for cost-sharing purposes or simple for knowing if users are using network resources and services in accordance with a given policy of use, considering that NRENs are usually financed with public funds. In SMARTxAC, a pricing matrix can be defined by setting a price or weight per byte according to its origin, destination, application and traffic direction as described in [17], but this feature is not currently used in our scenario. Although this classification process needs to perform some expensive operations, such as computing twice per flow the longest prefix match algorithm, it can be done online. The main advantage of this approach lies in drastically reducing the volume of data to be processed and stored onto disk. It makes the permanent storage of historical data feasible without losing valuable information about the network usage. For example, a header-only trace of the link we are currently monitoring would require more than 500 GB/day of disk space, while the total amount of data stored in our scenario by SMARTxAC usually does not exceed 30 MBytes/day. Thus, historical data about the Anella Científica s usage is being permanently stored since July However, if more detailed information is needed, for instance by network researchers or for intrusion detection purposes, the system can be configured to collect header or full packet traces as well. Moreover, some statistics (e.g. Top-N origin and destination IP addresses) are computed before this second aggregation stage, mainly because are bounded by N and do not significantly increase the volume of data to be stored. In addition, when a network anomaly is detected, as it will be discussed later, finer-grained information related to the anomaly is kept, since can be useful to analyze the causes of the detected anomaly. C. Available statistics and visualisation system During the classification process performed by the traffic analysis system, several statistics per institution are computed and stored onto disk. SMARTxAC includes a web-based graphical interface that allows network operators, as well as network administrators of the institutions connected to the network, to directly access to the traffic analysis statistics online. All figures and graphs are generated on demand when a user is interested in them, because SMARTxAC can offer more than 300 different combinations of graphs per institution and day. However, in order to preserve institution privacy, the access to these statistics is protected by password and data transmission is encrypted, so that institutions only can access to their own traffic statistics. A complete list of the figures and graphs available from the web-based interface can be found at [18]. As an example, here we mention only a few: the time-series plots of the link utilization per applications (Fig. 2) and destinations per applications (Fig. 3), Top-N IP addresses, protocols and ports (Fig. 4), time-series plot of the average packet size per application (Fig. 5) and anomaly detection graphs (Fig. 6). Users not only can access to the statistics that are being computed online by the traffic analysis system, but also to historical data, including the complete statistics of any particular day, and aggregated statistics and reports per week, month and year. 5

6 Fig. 2. Traffic per application time series Fig. 3. Traffic per application and destination Fig. 4. Top-25 ports Fig. 5. Average packet size time series (HTTP) 4. Anomaly detection The statistics provided by SMARTxAC are very useful to manually detect irregular usage or anomalies. Nevertheless, in order to facilitate to network operators the tough task of reviewing the network statistics and graphs looking for anomalies, our aim is to add some intelligence to our system, so that it could come to some conclusions by itself after having extracted and analyzed the collected traffic. Traditional intrusion detection systems (IDS) are usually designed to protect enduser systems or small networks. Most of their detection techniques are based on payload or system log analysis, since they assume that log information can be easily accessed or the traffic volume to be analyzed will be low enough to perform online payload analysis (e.g. signature-based IDSs). On the contrary, SMARTxAC is focused on the analysis of large networks and the measurement of high-speed links. Therefore, the anomaly detection method used by SMARTxAC must be lightweight enough to operate with strong real-time constraints. Under this assumption, SMARTxAC integrates a simple anomaly detection method based on traffic thresholds. It consists of establishing an upper and lower traffic limit per institution, so that the system will consider as anomalies those situations in which the traffic of an institution exceeds a predefined threshold. These thresholds can be configured manually or automatically by training the system with historical data, and can be independently set for both traffic directions in bits/second, packets/second and flow/second units. Moreover, all thresholds can also be associated to a particular interval, so that it is possible to configure different thresholds for different periods of time (e.g. day/night, workday/weekend). Once a threshold is exceeded, an alarm is triggered and notified 6

7 through the SMARTxAC web-based graphical interface, and a mail is sent to the network operator. When more than one alarm is triggered at the same time, the system is able to group all of them and show them as a unique alarm, to keep their number as low as possible. At this point, the system also stores some additional data concerning the anomaly during a fixed window of time. Thus, it is possible to carry out an offline analysis of stored data to infer the anomaly causes. Fig. 6 shows a daily flows/second time-series plot per application for a particular institution of the Anella Científica. Three alarms were raised at 8:06, at 9:36, and at 11:06, respectively, because the upper flows/second threshold was exceeded. For example, after reviewing the collected information, it was concluded that the last one was due to a TCP port scanning attack. Fig. 6. Flows/second threshold-based anomaly detector This simple technique is effective to detect those anomalies causing an important degradation of the network performance, although its detection power for other anomalies is relatively limited. For this reason, we are currently working on more effective, but still lightweight, techniques for detecting and classifying network anomalies. If the regular traffic of all the institutions that are connected to the network could be inferred, to detect anomalies would be as easy as comparing the regular traffic of an institution to its actual measured traffic. Nevertheless, because of inherent variations of Internet traffic by itself (e.g. burstiness, day/night, workday/weekend, etc.) to infer the regular traffic pattern of an institution is not an easy task. However, some anomalies can also be seen as unexpected changes on the traffic profile of an institution. Thus, unexpected changes may be easily detected by using traffic prediction techniques. With traffic prediction, anomalies can be detected when the actual measured traffic differs significantly from the predicted one for the same interval. Therefore, regular traffic profiles for each institution would not have to be explicitly known. Moreover, its implementation is lightweight enough to be used in a measurement system for high-speed networks, like SMARTxAC. Consequently, we are currently improving the SMARTxAC anomaly detection module to use adaptive traffic prediction to automatically detect network anomalies. Traffic prediction techniques will used in conjunction with other simpler techniques, like our current threshold-based detectors, in order to solve some limitations of adaptive prediction in the presence of anomalies that imply progressive and long-term traffic changes. Preliminary results of this work are described in [19]. 5. Conclusions and Future work In this paper we have described the architecture and main features of SMARTxAC, a passive monitoring and analysis system for high-speed networks. This system is the result of the experience we acquired in the participation in previous 7

8 projects and the guidelines and continuous feedback we have received from the network operators of the Anella Científica (CESCA) after more than two years of continuous usage of the system. Their experience and expertise in network administration and management fields have constituted an invaluable source of information that allowed us to improve the performance and functionalities of our system. The best proof of the success of SMARTxAC is that is daily used by CESCA to obtain detailed statistics about the Anella Científica s usage, and to detect network anomalies and attacks, network performance problems and network faults when they occur. In the design of this system we addressed the limitations of monitoring highspeed links, while focusing on providing useful information for CESCA and the network administrators of the institutions connected to the Anella Científica network. In order to address these challenges we had to trade generality for performance, resulting in an efficient but very specific tailor-made monitoring system that can be easily configured to be used in other network scenarios, but that is difficult to be used for other applications than the one it was designed for. For this reason, we are currently collaborating with the Intel s CoMo project [20] in developing a general-purpose network monitoring system that will allow the fast prototyping of network monitoring and network data mining applications. Currently, besides of improving the anomaly detection module, we are working on including in our system sampling measurement techniques, IPv6 support, and some recent proposals for detecting network applications based on heuristic techniques (e.g. [21]). Moreover, we plan to deploy more measurement points in the Anella Científica network and modify our traffic analysis system to analyze the traffic collected from several traffic capture systems at the same time. Acknowledgements This work is partially supported by the Supercomputing Center of Catalonia (CESCA), under the SMARTxAC agreement, and by the Spanish Ministry of Education, under contract TSI C References [1] P. J. Lizcano, A. Azcorra, J. Solé-Pareta, J. Domingo-Pascual and M. Álvarez- Campana. MEHARI: A System for Analyzing the Use of the Internet Services. Computer Networks, 31(21): , [2] C. Veciana-Nogués, J. Domingo-Pascual and J. Solé-Pareta. Servers Location and Verification Tool for Backbone Access Points. In Proceedings of 13th ITC Specialist Seminar: IP Traffic Measurement, Modeling and Management, Sep [3] C. Veciana-Nogués, J. Domingo-Pascual and J. Solé-Pareta. Cost-Sharing and Billing in the National Research Networks: the MIRA Approach. Terena Networking Conference, June [4] NLANR Special Traces Archive: CESCA-I Data Set. [5] Endace Measurement Systems. [6] NLANR Teragrid-II 10GigE real-time analysis. [7] V. Paxson, J. Mahdavi, A. Adams and M. Mathis. An architecture for large-scale Internet measurement. IEEE Communications, 36(8):48-54, Aug

9 [8] T. McGregor, H.-W. Braun and J. Brown. The NLANR network analysis infrastructure. IEEE Communications, 38(5): , May [9] The Cooperative Association for Internet Data Analysis (CAIDA). [10] C. Fraleigh, S. Moon, B. Lyles, C. Cotton, M. Khan, R. Rockell, D. Moll, T. Seely and C. Diot. Packet-Level Traffic Measurements from the Sprint IP Backbone. IEEE Network, 17(6):6-16, Nov./Dec [11] C. Cranor, T. Johnson, O. Spataschek and V. Shkapenyuk. Gigascope: A stream database for network applications. In Proceedings of ACM SIGMOD International Conference on Management of Data, June [12] NLANR: National Laboratory for Applied Network Research. [13] D. Moore, K. Keys, R. Koga, E. Lagache, K. C. Claffy. The CoralReef software suite as a tool for system and network administrators. In Proceedings of USENIX LISA, Dec [14] G. Iannaccone, C. Diot, D. McAuley, A. Moore, I. Pratt and L. Rizzo. The CoMo White Paper. Technical report IRC-TR , Intel Research, Sep [15] NetFlow Services Solutions Guide. White paper, Cisco Systems, [16] G. Iannaccone, C. Diot, I. Graham and N. McKeown. Monitoring very high speed links. In Proceedings of ACM SIGCOMM Internet Measurement Workshop (IMW), Nov [17] B. Stiller, P. Barlet-Ros, J. Cushnie, J. Domingo-Pascual, D. Hutchison, R. Lopes, A. Mauthe, M. Popa, J. Roberts, J. Solé-Pareta, D. Trcek, C. Veciana and L. Wolf. Pricing and QoS. Quality of Future Internet Services: COST Action 263 Final Report, 2856: , Springer-Verlag, Dec [18] The SMARTxAC project. [19] P. Barlet-Ros, H. Pujol, J. Barrantes, J. Solé-Pareta and J. Domingo-Pascual. A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction. Technical report, UPC-DAC-RR-CBA , June [20] The CoMo Project, Intel Research Cambridge. [21] A. W. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. Proc. of the ACM SIGMETRICS, Banff, Canada, June Vitae Pere Barlet-Ros received the M.Sc. degree in Computer Science from the Universitat Politècnica de Catalunya (UPC) in He is Assistant Professor and Ph.D. student at the Computer Architecture Department of the UPC. In 2004, he was visiting Ph.D. student at the National Laboratory for Applied Network Research (NLANR) for two months and intern at Intel Research Cambridge for three months. His research interests are in the fields of network measurement, traffic analysis and network performance evaluation. Josep Solé-Pareta was awarded his Master's degree in Telecommunication Engineering in 1984, and his Ph. D. in Computer Science in 1991, both from the Universitat Politècnica de Catalunya (UPC). In 1984 he joined the Computer Architecture Department of UPC, where currently is Full Professor in Computer Science and Communications. He did a Postdoc stage (summers of 1993 and 1994) at the Broadband and Wireless Networking Lab. of the Georgia Institute of Technology. His current research interests are in broadband Internet and high-speed and optical 9

10 networks, with emphasis on traffic engineering, traffic characterization, traffic management, QoS provisioning and MAC protocols for legacy and optical metro networks. Javier Barrantes received the M.Sc. degree in Computer Science from the Universitat Politècnica de Catalunya (UPC) in He is currently a Projects Graduate Scholarship Holder and Ph.D. student in the Computer Architecture Department, UPC. His research interests are in the fields of traffic measurements, modeling and prediction. Eva Codina received the M.Sc. degree in Computer Science from the Universitat Politència de Catalunya (UPC) in She is currently a Projects Graduate Scholarship Holder in the Computer Architecture Department, UPC. Her research interests are in the fields of traffic measurements, modeling and prediction. Jordi Domingo-Pascual is Full Professor of Computer Science and Communications at the Universitat Politècnica de Catalunya (UPC) in Barcelona. There, he received the engineering degree in Telecommunication (1982) and the Ph.D. Degree in Computer Science (1987). In 1983 he joined the Computer Architecture Department. He was visiting researcher at the International Computer Science Institute in Berkeley (California) for six months. His research topics are broadband communications and applications, IP/ATM integration, QoS management and provision, traffic engineering, IP traffic analysis and characterization, group communications and multicast. 10

A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction

A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction 1 A System for Detecting Network Anomalies based on Traffic Monitoring and Prediction Pere Barlet-Ros, Helena Pujol, Javier Barrantes, Josep Solé-Pareta, Jordi Domingo-Pascual Abstract SMARTxAC is a passive

More information

Load Distribution in Large Scale Network Monitoring Infrastructures

Load Distribution in Large Scale Network Monitoring Infrastructures Load Distribution in Large Scale Network Monitoring Infrastructures Josep Sanjuàs-Cuxart, Pere Barlet-Ros, Gianluca Iannaccone, and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {jsanjuas,pbarlet,pareta}@ac.upc.edu

More information

Signature-aware Traffic Monitoring with IPFIX 1

Signature-aware Traffic Monitoring with IPFIX 1 Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764

More information

UPC team: Pere Barlet-Ros Josep Solé-Pareta Josep Sanjuàs Diego Amores Intel sponsor: Gianluca Iannaccone

UPC team: Pere Barlet-Ros Josep Solé-Pareta Josep Sanjuàs Diego Amores Intel sponsor: Gianluca Iannaccone Load Shedding for Network Monitoring Systems (SHENESYS) Centre de Comunicacions Avançades de Banda Ampla (CCABA) Universitat Politècnica de Catalunya (UPC) UPC team: Pere Barlet-Ros Josep Solé-Pareta Josep

More information

Cisco IOS Flexible NetFlow Technology

Cisco IOS Flexible NetFlow Technology Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application

More information

Internet Traffic Measurement

Internet Traffic Measurement Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software

More information

Statistical Characteristics of Multicast Traffic on a National Backbone Network

Statistical Characteristics of Multicast Traffic on a National Backbone Network Statistical Characteristics of Multicast Traffic on a National Backbone Network Tao He, Xing Li, Jian Qiu Department of Electronic Engineering Tsinghua University, Beijing, 84, China Telephone: +86--6279255

More information

IP Network Monitoring and Measurements: Techniques and Experiences

IP Network Monitoring and Measurements: Techniques and Experiences IP Network Monitoring and Measurements: Techniques and Experiences Philippe Owezarski LAAS-CNRS Toulouse, France Owe@laas.fr 1 Outline 4 Introduction 4 Monitoring problematic 8Only based on network administration

More information

Packet Flow Analysis and Congestion Control of Big Data by Hadoop

Packet Flow Analysis and Congestion Control of Big Data by Hadoop Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456

More information

ABW - Short-timescale passive bandwidth monitoring

ABW - Short-timescale passive bandwidth monitoring ABW - Short-timescale passive bandwidth monitoring Sven Ubik (CESNET, Czech Republic), Demetres Antoniades (ICS-FORTH, Greece), Arne Oslebo (UNINETT, Norway) November 18, 2006 Abstract Bandwidth usage

More information

ABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98

ABSTRACT 1.1 MEASUREMENT APPROACHES 1. INTRODUCTION 2. OCXMON/CORAL PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 PASSIVE MONITORING OF INTERNET TRAFFIC AT SUPERCOMPUTING 98 Brynjar Åge Viken e mail: brynjar@item.ntnu.no, bviken@nlanr.net National Laboratory for Applied Network Research, Measurement and Operations

More information

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.

ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B. ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow

More information

Network monitoring in high-speed links

Network monitoring in high-speed links Network monitoring in high-speed links Algorithms and challenges Pere Barlet-Ros Advanced Broadband Communications Center (CCABA) Universitat Politècnica de Catalunya (UPC) http://monitoring.ccaba.upc.edu

More information

A Scalable High Performance Network Monitoring Agent for CERNET

A Scalable High Performance Network Monitoring Agent for CERNET A Scalable High Performance Network Monitoring Agent for CERNET ZHANG, Hui CERNET Network Research Center Tsinghua University, Beijing, 100084, China Email: hzhang@cernet.edu.cn Abstract _ In a cost-effective

More information

Comprehensive IP Traffic Monitoring with FTAS System

Comprehensive IP Traffic Monitoring with FTAS System Comprehensive IP Traffic Monitoring with FTAS System Tomáš Košňar kosnar@cesnet.cz CESNET, association of legal entities Prague, Czech Republic Abstract System FTAS is designed for large-scale continuous

More information

Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications

Page 1. Outline EEC 274 Internet Measurements & Analysis. Traffic Measurements. Motivations. Applications Outline EEC 274 Internet Measurements & Analysis Spring Quarter, 2006 Traffic Measurements Traffic measurements What metrics are we interested in? Measurement and analysis methodologies Traffic characterization

More information

Application of Netflow logs in Analysis and Detection of DDoS Attacks

Application of Netflow logs in Analysis and Detection of DDoS Attacks International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in

More information

Traffic Classification with Sampled NetFlow

Traffic Classification with Sampled NetFlow Traffic Classification with Sampled NetFlow Valentín Carela-Español, Pere Barlet-Ros, Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC) {vcarela,pbarlet,pareta}@ac.upc.edu Abstract The traffic

More information

Application of Internet Traffic Characterization to All-Optical Networks

Application of Internet Traffic Characterization to All-Optical Networks Application of Internet Traffic Characterization to All-Optical Networks Pedro M. Santiago del Río, Javier Ramos, Alfredo Salvador, Jorge E. López de Vergara, Javier Aracil, Senior Member IEEE* Antonio

More information

How To Classify Network Traffic In Real Time

How To Classify Network Traffic In Real Time 22 Approaching Real-time Network Traffic Classification ISSN 1470-5559 Wei Li, Kaysar Abdin, Robert Dann and Andrew Moore RR-06-12 October 2006 Department of Computer Science Approaching Real-time Network

More information

Predicting Resource Usage of Arbitrary Network Traffic Queries

Predicting Resource Usage of Arbitrary Network Traffic Queries Predicting Resource Usage of Arbitrary Network Traffic Queries Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart, Diego Amores-López, Josep Solé-Pareta Universitat Politècnica de Catalunya Barcelona,

More information

Characteristics of Network Traffic Flow Anomalies

Characteristics of Network Traffic Flow Anomalies Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic

More information

The Architecture of NG-MON: a Passive Network Monitoring System for High-Speed IP Networks 1

The Architecture of NG-MON: a Passive Network Monitoring System for High-Speed IP Networks 1 The Architecture of NG-MON: a Passive Network Monitoring System for High-Speed IP Networks 1 Se-Hee Han 1, Myung-Sup Kim 2, Hong-Taek Ju 3 and James Won-Ki Hong 4 1,2,4 Department of Computer Science and

More information

Research on Errors of Utilized Bandwidth Measured by NetFlow

Research on Errors of Utilized Bandwidth Measured by NetFlow Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic

More information

Hadoop Technology for Flow Analysis of the Internet Traffic

Hadoop Technology for Flow Analysis of the Internet Traffic Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet

More information

Traffic Measurements for Link Dimensioning

Traffic Measurements for Link Dimensioning Traffic Measurements for Link Dimensioning A Case Study Remco van de Meent, Aiko Pras, Michel Mandjes, Hans van den Berg, and Lambert Nieuwenhuis University of Twente PO Box 217 7500 AE Enschede The Netherlands

More information

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl

The SCAMPI Scaleable Monitoring Platform for the Internet. Baiba Kaskina TERENA baiba@terena.nl The SCAMPI Scaleable Monitoring Platform for the Internet Baiba Kaskina TERENA baiba@terena.nl Agenda Project overview Project objectives Project partners Work packages Technical information SCAMPI architecture

More information

NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements

NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements NETI@home: A Distributed Approach to Collecting End-to-End Network Performance Measurements Charles Robert Simpson, Jr. and George F. Riley Georgia Institute of Technology (Georgia Tech), Atlanta Georgia,

More information

ABW - Short-timescale passive bandwidth monitoring

ABW - Short-timescale passive bandwidth monitoring ABW - Short-timescale passive bandwidth monitoring Sven Ubik (CESNET, Czech Republic), Demetres Antoniades (ICS-FORTH, Greece), Arne Oslebo (UNINETT, Norway) Abstract Bandwidth usage monitoring is important

More information

An apparatus for P2P classification in Netflow traces

An apparatus for P2P classification in Netflow traces An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA

More information

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity

Product Overview. Product Family. Product Features. Powerful intrusion detection and monitoring capacity NIP IDS Product Overview The Network Intelligent Police (NIP) Intrusion Detection System (IDS) is a new generation of session-based intelligent network IDS developed by Huaweisymantec. Deployed in key

More information

Lab VI Capturing and monitoring the network traffic

Lab VI Capturing and monitoring the network traffic Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)

More information

Adaptive Sampling for Network Performance Measurement Under Voice Traffic

Adaptive Sampling for Network Performance Measurement Under Voice Traffic Sampling for Network Performance Measurement Under Voice Traffic Wenhong Ma and Changcheng Huang Optical Networks Laboratory Department of Systems and Computer Engineering, Carleton University 1125 Colonel

More information

Cisco Performance Visibility Manager 1.0.1

Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager 1.0.1 Cisco Performance Visibility Manager (PVM) is a proactive network- and applicationperformance monitoring, reporting, and troubleshooting system for maximizing

More information

Longitudinal study of Internet traffic in 1998-2003

Longitudinal study of Internet traffic in 1998-2003 1 Longitudinal study of Internet traffic in 1998-23 Marina Fomenkov, Ken Keys, David Moore, and k claffy Abstract There is growing interest in capturing and analyzing Internet traffic characteristics in

More information

Network Performance Monitoring at Small Time Scales

Network Performance Monitoring at Small Time Scales Network Performance Monitoring at Small Time Scales Konstantina Papagiannaki, Rene Cruz, Christophe Diot Sprint ATL Burlingame, CA dina@sprintlabs.com Electrical and Computer Engineering Department University

More information

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark

Detecting Threats in Network Security by Analyzing Network Packets using Wireshark 1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,

More information

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)

How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free) Network Traffic Performance & Security Monitoring Project proposal minimal project Orsenna;Invea-Tech FLOWMON PROBES 1000 & 100 Contents 1. Introduction... 2 1.1. General System Requirements... 2 1.2.

More information

Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network

Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network JOURNAL OF INFORMATION SCIENCE AND ENGINEERING 21, 571-578 (2005) Short Paper Detect and Notify Abnormal SMTP Traffic and Email Spam over Aggregate Network Department of Computer Science and Information

More information

Traffic Monitoring in a Switched Environment

Traffic Monitoring in a Switched Environment Traffic Monitoring in a Switched Environment InMon Corp. 1404 Irving St., San Francisco, CA 94122 www.inmon.com 1. SUMMARY This document provides a brief overview of some of the issues involved in monitoring

More information

Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS markatos@ics.forth.gr

Introduction to Network Traffic Monitoring. Evangelos Markatos. FORTH-ICS markatos@ics.forth.gr Introduction to Network Traffic Monitoring -ICS markatos@ics.forth.gr http://www.ics.forth.gr/~markatos Institute of Computer Science (ICS) Foundation for Research and Technology Hellas () Roadmap Motivation

More information

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On

How To Monitor A Network On A Network With Bro (Networking) On A Pc Or Mac Or Ipad (Netware) On Your Computer Or Ipa (Network) On An Ipa Or Ipac (Netrope) On Michel Laterman We have a monitor set up that receives a mirror from the edge routers Monitor uses an ENDACE DAG 8.1SX card (10Gbps) & Bro to record connection level info about network usage Can t simply

More information

Infrastructure for active and passive measurements at 10Gbps and beyond

Infrastructure for active and passive measurements at 10Gbps and beyond Infrastructure for active and passive measurements at 10Gbps and beyond Best Practice Document Produced by UNINETT led working group on network monitoring (UFS 142) Author: Arne Øslebø August 2014 1 TERENA

More information

and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs

and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin slavko.gajin@rcub.bg.ac.rs AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty

More information

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK

AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Abstract AN OVERVIEW OF QUALITY OF SERVICE COMPUTER NETWORK Mrs. Amandeep Kaur, Assistant Professor, Department of Computer Application, Apeejay Institute of Management, Ramamandi, Jalandhar-144001, Punjab,

More information

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features

High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features UDC 621.395.31:681.3 High-Performance IP Service Node with Layer 4 to 7 Packet Processing Features VTsuneo Katsuyama VAkira Hakata VMasafumi Katoh VAkira Takeyama (Manuscript received February 27, 2001)

More information

Cover. White Paper. (nchronos 4.1)

Cover. White Paper. (nchronos 4.1) Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced

More information

Load Shedding in Network Monitoring Applications

Load Shedding in Network Monitoring Applications Load Shedding in Network Monitoring Applications Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart, Diego Amores-López, Josep Solé-Pareta Technical University of Catalonia (UPC) Barcelona, Spain

More information

Chuck Cranor, Ted Johnson, Oliver Spatscheck

Chuck Cranor, Ted Johnson, Oliver Spatscheck Gigascope: How to monitor network traffic 5Gbit/sec at a time. Chuck Cranor, Ted Johnson, Oliver Spatscheck June, 2003 1 Outline Motivation Illustrative applications Gigascope features Gigascope technical

More information

SURVEY OF INTRUSION DETECTION SYSTEM

SURVEY OF INTRUSION DETECTION SYSTEM SURVEY OF INTRUSION DETECTION SYSTEM PRAJAPATI VAIBHAVI S. SHARMA DIPIKA V. ASST. PROF. ASST. PROF. MANISH INSTITUTE OF COMPUTER STUDIES MANISH INSTITUTE OF COMPUTER STUDIES VISNAGAR VISNAGAR GUJARAT GUJARAT

More information

Netflow Overview. PacNOG 6 Nadi, Fiji

Netflow Overview. PacNOG 6 Nadi, Fiji Netflow Overview PacNOG 6 Nadi, Fiji Agenda Netflow What it is and how it works Uses and Applications Vendor Configurations/ Implementation Cisco and Juniper Flow-tools Architectural issues Software, tools

More information

BITAG Publishes Report: Differentiated Treatment of Internet Traffic

BITAG Publishes Report: Differentiated Treatment of Internet Traffic 1550 Larimer Street, Suite 168 Denver, CO. 80202 BITAG Publishes Report: Differentiated Treatment of Internet Traffic Denver, CO (October 8, 2015): Today, the Broadband Internet Technical Advisory Group

More information

IPTV Traffic Monitoring System with IPFIX/PSAMP

IPTV Traffic Monitoring System with IPFIX/PSAMP IPTV Traffic Monitoring System with IPFIX/PSAMP Shingo Kashima NTT Information Sharing Platform Laboratories 3rd NMRG Workshop 2010 NTT Information Sharing Platform Laboratories Outline Introduction Motivation

More information

Observer Probe Family

Observer Probe Family Observer Probe Family Distributed analysis for local and remote networks Monitor and troubleshoot vital network links in real time from any location Network Instruments offers a complete line of software

More information

A Protocol Based Packet Sniffer

A Protocol Based Packet Sniffer Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,

More information

Nemea: Searching for Botnet Footprints

Nemea: Searching for Botnet Footprints Nemea: Searching for Botnet Footprints Tomas Cejka 1, Radoslav Bodó 1, Hana Kubatova 2 1 CESNET, a.l.e. 2 FIT, CTU in Prague Zikova 4, 160 00 Prague 6 Thakurova 9, 160 00 Prague 6 Czech Republic Czech

More information

Extensible Network Configuration and Communication Framework

Extensible Network Configuration and Communication Framework Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood Applied Research Laboratory Department of Computer Science and Engineering: Washington University in Saint Louis

More information

4 Internet QoS Management

4 Internet QoS Management 4 Internet QoS Management Rolf Stadler School of Electrical Engineering KTH Royal Institute of Technology stadler@ee.kth.se September 2008 Overview Network Management Performance Mgt QoS Mgt Resource Control

More information

Active Measurement Data Analysis Techniques

Active Measurement Data Analysis Techniques 3/27/2000: This work is an Authors version, and has been submitted for publication. Copyright may be transferred without further notice and the accepted version may then be posted by the publisher. Active

More information

Custom Load Shedding for Non-Cooperative Network Monitoring Applications

Custom Load Shedding for Non-Cooperative Network Monitoring Applications Custom Load Shedding for Non-Cooperative Network Monitoring Applications Pere Barlet-Ros, Gianluca Iannaccone, Josep Sanjuàs-Cuxart and Josep Solé-Pareta Universitat Politècnica de Catalunya (UPC), Barcelona,

More information

Network Monitoring and Traffic CSTNET, CNIC

Network Monitoring and Traffic CSTNET, CNIC Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring

More information

GN1 (GÉANT) Deliverable D13.2

GN1 (GÉANT) Deliverable D13.2 Contract Number: IST-2000-26417 Project Title: GN1 (GÉANT) Deliverable 13.2 Technology Roadmap for Year 3 Contractual Date: 31 July 2002 Actual Date: 16 August 2002 Work Package: WP8 Nature of Deliverable:

More information

A System for in-network Anomaly Detection

A System for in-network Anomaly Detection A System for in-network Anomaly Detection Thomas Gamer Institut für Telematik, Universität Karlsruhe (TH), Germany Abstract. Today, the Internet is used by companies frequently since it simplifies daily

More information

A Study of Network Security Systems

A Study of Network Security Systems A Study of Network Security Systems Ramy K. Khalil, Fayez W. Zaki, Mohamed M. Ashour, Mohamed A. Mohamed Department of Communication and Electronics Mansoura University El Gomhorya Street, Mansora,Dakahlya

More information

VoIP QoS on low speed links

VoIP QoS on low speed links Ivana Pezelj Croatian Academic and Research Network - CARNet J. Marohni a bb 0 Zagreb, Croatia Ivana.Pezelj@CARNet.hr QoS on low speed links Julije Ožegovi Faculty of Electrical Engineering, Mechanical

More information

Facility Usage Scenarios

Facility Usage Scenarios Facility Usage Scenarios GDD-06-41 GENI: Global Environment for Network Innovations December 22, 2006 Status: Draft (Version 0.1) Note to the reader: this document is a work in progress and continues to

More information

How To Monitor Bandwidth On A Computer Network

How To Monitor Bandwidth On A Computer Network Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I sinha@live.in, II nishant@desidoc.drdo.in

More information

Improving Quality of Service

Improving Quality of Service Improving Quality of Service Using Dell PowerConnect 6024/6024F Switches Quality of service (QoS) mechanisms classify and prioritize network traffic to improve throughput. This article explains the basic

More information

NSC 93-2213-E-110-045

NSC 93-2213-E-110-045 NSC93-2213-E-110-045 2004 8 1 2005 731 94 830 Introduction 1 Nowadays the Internet has become an important part of people s daily life. People receive emails, surf the web sites, and chat with friends

More information

A Passive Method for Estimating End-to-End TCP Packet Loss

A Passive Method for Estimating End-to-End TCP Packet Loss A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se

More information

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) Version: Modified By: Date: Approved By: Date: 1.0 Michael Hawkins October 29, 2013 Dan Bowden November 2013 Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed) 01.1 Purpose

More information

How To Provide Qos Based Routing In The Internet

How To Provide Qos Based Routing In The Internet CHAPTER 2 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 22 QoS ROUTING AND ITS ROLE IN QOS PARADIGM 2.1 INTRODUCTION As the main emphasis of the present research work is on achieving QoS in routing, hence this

More information

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT

STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT STANDPOINT FOR QUALITY-OF-SERVICE MEASUREMENT 1. TIMING ACCURACY The accurate multi-point measurements require accurate synchronization of clocks of the measurement devices. If for example time stamps

More information

QAME Support for Policy-Based Management of Country-wide Networks

QAME Support for Policy-Based Management of Country-wide Networks QAME Support for Policy-Based Management of Country-wide Networks Clarissa C. Marquezan, Lisandro Z. Granville, Ricardo L. Vianna, Rodrigo S. Alves Institute of Informatics Computer Networks Group Federal

More information

Network Management and Monitoring Software

Network Management and Monitoring Software Page 1 of 7 Network Management and Monitoring Software Many products on the market today provide analytical information to those who are responsible for the management of networked systems or what the

More information

Fail-Safe IPS Integration with Bypass Technology

Fail-Safe IPS Integration with Bypass Technology Summary Threats that require the installation, redeployment or upgrade of in-line IPS appliances often affect uptime on business critical links. Organizations are demanding solutions that prevent disruptive

More information

NetFlow Analysis with MapReduce

NetFlow Analysis with MapReduce NetFlow Analysis with MapReduce Wonchul Kang, Yeonhee Lee, Youngseok Lee Chungnam National University {teshi85, yhlee06, lee}@cnu.ac.kr 2010.04.24(Sat) based on "An Internet Traffic Analysis Method with

More information

Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware

Packet Capture in 10-Gigabit Ethernet Environments Using Contemporary Commodity Hardware Packet Capture in 1-Gigabit Ethernet Environments Using Contemporary Commodity Hardware Fabian Schneider Jörg Wallerich Anja Feldmann {fabian,joerg,anja}@net.t-labs.tu-berlin.de Technische Universtität

More information

Monitoring high-speed networks using ntop. Luca Deri <deri@ntop.org>

Monitoring high-speed networks using ntop. Luca Deri <deri@ntop.org> Monitoring high-speed networks using ntop Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:

More information

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw

Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) james@cert.org.tw Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) james@cert.org.tw 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring

More information

Service Definition. Internet Service. Introduction. Product Overview. Service Specification

Service Definition. Internet Service. Introduction. Product Overview. Service Specification Service Definition Introduction This Service Definition describes Nexium s from the customer s perspective. In this document the product is described in terms of an overview, service specification, service

More information

Cisco Application Networking for BEA WebLogic

Cisco Application Networking for BEA WebLogic Cisco Application Networking for BEA WebLogic Faster Downloads and Site Navigation, Less Bandwidth and Server Processing, and Greater Availability for Global Deployments What You Will Learn To address

More information

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module

CMA5000 SPECIFICATIONS. 5710 Gigabit Ethernet Module CMA5000 5710 Gigabit Ethernet Module SPECIFICATIONS General Description The CMA5710 Gigabit Ethernet application is a single slot module that can be used in any CMA 5000. The Gigabit Ethernet test module

More information

Cisco Integrated Services Routers Performance Overview

Cisco Integrated Services Routers Performance Overview Integrated Services Routers Performance Overview What You Will Learn The Integrated Services Routers Generation 2 (ISR G2) provide a robust platform for delivering WAN services, unified communications,

More information

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com

Web Traffic Capture. 5401 Butler Street, Suite 200 Pittsburgh, PA 15201 +1 (412) 408 3167 www.metronomelabs.com Web Traffic Capture Capture your web traffic, filtered and transformed, ready for your applications without web logs or page tags and keep all your data inside your firewall. 5401 Butler Street, Suite

More information

Avaya ExpertNet Lite Assessment Tool

Avaya ExpertNet Lite Assessment Tool IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...

More information

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR

DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Journal homepage: www.mjret.in DDOS WALL: AN INTERNET SERVICE PROVIDER PROTECTOR Maharudra V. Phalke, Atul D. Khude,Ganesh T. Bodkhe, Sudam A. Chole Information Technology, PVPIT Bhavdhan Pune,India maharudra90@gmail.com,

More information

Traffic Analyzer Based on Data Flow Patterns

Traffic Analyzer Based on Data Flow Patterns AUTOMATYKA 2011 Tom 15 Zeszyt 3 Artur Sierszeñ*, ukasz Sturgulewski* Traffic Analyzer Based on Data Flow Patterns 1. Introduction Nowadays, there are many systems of Network Intrusion Detection System

More information

APPENDIX 8 TO SCHEDULE 3.3

APPENDIX 8 TO SCHEDULE 3.3 APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE AGREEMENT APPENDI 8 TO SCHEDULE 3.3 TO THE COMPREHENSIVE INFRASTRUCTURE

More information

Internet Management and Measurements Measurements

Internet Management and Measurements Measurements Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?

More information

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design Learning Objectives Identify common misconceptions about firewalls Explain why a firewall

More information

Network congestion control using NetFlow

Network congestion control using NetFlow Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.

More information

Network Traffic Monitoring and Analysis

Network Traffic Monitoring and Analysis Event-based Network Traffic Monitoring In A Wide Area Network Katsuhisa ABE and Glenn Mansfield Keeni 19 Feb. 2005 Abstract Network monitoring is necessary to evaluate the performance and to ensure operational

More information

GR2000: a Gigabit Router for a Guaranteed Network

GR2000: a Gigabit Router for a Guaranteed Network Hitachi Review Vol. 48 (1999), No. 4 203 GR2000: a Gigabit Router for a Guaranteed Network Kazuo Sugai Yoshihito Sako Takeshi Aimoto OVERVIEW: Driven by the progress of the information society, corporate

More information

SiteCelerate white paper

SiteCelerate white paper SiteCelerate white paper Arahe Solutions SITECELERATE OVERVIEW As enterprises increases their investment in Web applications, Portal and websites and as usage of these applications increase, performance

More information

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu

Stability of QOS. Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Stability of QOS Avinash Varadarajan, Subhransu Maji {avinash,smaji}@cs.berkeley.edu Abstract Given a choice between two services, rest of the things being equal, it is natural to prefer the one with more

More information

Why sample when you can monitor all network traffic inexpensively?

Why sample when you can monitor all network traffic inexpensively? Why sample when you can monitor all network traffic inexpensively? endace power to see all europe P +44 1223 370 176 E eu@endace.com americas P +1 703 964 3740 E usa@endace.com asia pacific P +64 9 262

More information

Introducing FortiDDoS. Mar, 2013

Introducing FortiDDoS. Mar, 2013 Introducing FortiDDoS Mar, 2013 Introducing FortiDDoS Hardware Accelerated DDoS Defense Intent Based Protection Uses the newest member of the FortiASIC family, FortiASIC-TP TM Rate Based Detection Inline

More information

2 Technologies for Security of the 2 Internet

2 Technologies for Security of the 2 Internet 2 Technologies for Security of the 2 Internet 2-1 A Study on Process Model for Internet Risk Analysis NAKAO Koji, MARUYAMA Yuko, OHKOUCHI Kazuya, MATSUMOTO Fumiko, and MORIYAMA Eimatsu Security Incidents

More information

A Passive Network Appliance for Real-Time Network Monitoring

A Passive Network Appliance for Real-Time Network Monitoring A Passive Network Appliance for Real-Time Network Monitoring Michael J. Schultz, Ben Wun, and Patrick Crowley mjschultz@wustl.edu, bw6@cse.wustl.edu, pcrowley@wustl.edu Washington University in Saint Louis

More information