Algorithms and Tools for Anonymization of the Internet Traffic
|
|
|
- John Hutchinson
- 10 years ago
- Views:
Transcription
1 Algorithms and Tools for Anonymization of the Internet Traffic Tanjila Farah Communication Networks Laboratory School of Engineering Science Simon Fraser University
2 Roadmap Introduction Collection of network traffic Anonymization fields, algorithms, and tools Anonym tool Conclusion, future work, and references February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 2
3 Roadmap Introduction Collection of network traffic Anonymization fields, algorithms, and tools Anonym tool Conclusion, future work, and references February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 3
4 Motivation Internet is the easiest and the fastest medium for communication Measurement, characterization, and classification of Internet traces help network security Real-time network analysis relies on collection of trace logs Sharing traces may reveal the network architecture, user identity, and user information February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 4
5 Anonymization Modifies network traces to protect user identity Removes the ability to identify the connection between two end-users Preserves the usefulness of the datasets Considers the type of analysis that may be performed Considers the requirements of the company sharing the datasets February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 5
6 Contributions Developed code in gawk to parse pcap and mrt input files Anonym tool: developed the tool developed the IPv6 address anonymization technique implemented data analysis and visualization options validated the tool performance MRT : Multi-threaded Routing Toolkit PCAP: Packet Capture gawk: GNU AWK February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 6
7 Roadmap Introduction Collection of network traffic Anonymization fields, algorithms, and tools Anonym tool Conclusion, future work, and references February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 7
8 Collection of network traffic Internet is a collection of ASes exchanging information and delivering data Process of delivering data creates network traffic Network performance and QoS rely on network traffic characteristics Analyzing and understanding the network traffic helps ensure network security and QoS Network traffic collection helps: traffic engineering discovering the Internet topology analyzing network security AS : Autonomous System QoS: Quality of Service February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 8
9 Role of traffic engineering Network troubleshooting: deals with issues that disrupt or degrade the performance of a network: incorrect network address assignments and network anomalies Protocol debugging: analyzes the existing and new protocols and performance of applications to determine required improvements Workload characterization: examines the growth of network traffic volume due to new applications, protocols, and increasing number of users February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 9
10 Role of traffic engineering (cont.) Network performance evaluation: estimates the network QoS by measuring traffic throughput and response time Capacity planning: deals with network planning and managing by measuring bandwidth usage and availability February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 10
11 Discovering the Internet topology Discovering the Internet topology is important for: simulating deployed networks managing networks mapping a network to determine location of the nearest servers and ISPs designing and implementing new topology-aware protocols and algorithms ISP: Internet Service Provider February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 11
12 Network security analysis Monitors policies adopted by network administrators to prevent the intruders from misusing the network It encompasses: determining abnormal events: anomalies, attacks, and viruses testing network firewalls controlling access and network usage February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 12
13 Network trace collection BCNET: British Columbia's advance communication network collected data are private and are only shared with the CNL data are collected in the pcap format Cooperative Association for Internet Data Analysis (CAIDA): collects, monitors, and visualizes various Internet data collected data are public data are collected in pcap and text formats CNL: Communication Networks Laboratory February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 13
14 Network trace collection Route Views: project at the University of Oregon provides data and tools to the network administrators collected data are public data are collected in the mrt format Réseaux IP Européens (RIPE): supports network operators in Europe, Middle East, Asia, and Africa collected data are public data are collected in the mrt format February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 14
15 Roadmap Introduction Collection of network traffic Anonymization fields, algorithms, and tools Anonym tool Conclusion, future work, and references February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 15
16 Anonymization fields Network traffic logs include data packet headers, which contain various fields: time-stamp IP addresses MAC addresses packet length protocol (2013) Summary of anonymization best practice techniques [Online]. Available: IP : Internet Protocol MAC: Media Access Control February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 16
17 Anonymization algorithms Black marker: deletes all the information or replaces the information by a fixed value Time IP Length Time IP Length Enumeration: sorts the dataset, chooses a value higher then the first value, and adds the value to all data points Length Length February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 17
18 Anonymization algorithms (cont.) Precision degradation: removes the most precise components of a data field Prefix-preserving: if two IP addresses share the first n bits then their anonymized IP addresses will also share the first n bits IP un-anonymized IP anonymized February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 18
19 Anonymization algorithms (cont.) Random shift: shifts each data point by adding a random number Packet length un-anonymized Packet length anonymized Truncation: deletes the n least significant bits from an IP or MAC address MAC address Cisco_e7:a1:c0 (00:1b:0d:e7:a1:c0) JuniperN_3e:ba:bd(78:19:f7:3e:ba:bd) Anonymized MAC address Cisco_0:0:0 (00:1b:0d:0:0:0) JuniperN_0:0:0(78:19:f7:0:0:0) February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 19
20 Anonymization algorithms (cont.) Reverse truncation: deletes the n most significant bits from an IP or MAC address MAC address Cisco_e7:a1:c0 (00:1b:0d:e7:a1:c0) JuniperN_3e:ba:bd (78:19:f7:3e:ba:bd) Anonymized MAC address Cisco_e7:a1:c0 (0:0:0:e7:a1:c0) JuniperN_3e:ba:bd (0:0:0:3e:ba:bd) February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 20
21 Anonymization tools Cryptography based Prefix-preserving Anonymization: Crypto-PAn Anontool Framework for Log Anonymization and Information Management: FLAIM February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 21
22 Crypto-PAn Properties of Crypto-PAn: one-to-one mapping prefix-preserving anonymization consistent across traces cryptography-based Input Time IP address Output Time IP address February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 22
23 Anontool Anontool supports per-field anonymization Supports log files: pcap, netflow v5, and netflow v9 Four-step anonymization process: cooking function assembles the flows according to protocols filtering function distinguishes the flows according to protocol and determine policy for anonymization anonymization function anonymizes the fields according to policy un-cooking function re-assembles the flows in the original format February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 23
24 FLAIM Supports an XML based policy Parsing modules are written based on the XML policy Supports log files: pcap, iptable, nfdump, and pacct FLAIM architecture consists of a module and a core: the module provides policies to identify type of the log file the core loads libraries responsible for anonymization XML: Extensible Markup Language February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 24
25 Roadmap Introduction Collection of network traffic Anonymization fields, algorithms, and tools Anonym tool Conclusion, future work, and references February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 25
26 Anonym tool: functions Parses pcap and mrt files Anonymization options: black marker, prefix-preserving, reverse-truncation, precision degradation, random shift, and truncation Data analysis options: volume (bytes), volume (packets), volume curve fitting, throughput, empirical distribution, packet length distribution, protocol distribution, boxplot, and PDF and CDF curve fitting February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 26
27 Anonym tool: functions Options for the K-S test: determines if a dataset matches a tested distribution provide options to test: normal, gamma, Weibull, exponential, Rayleigh, and lognormal distributions Additional options: display anonymization results and analysis graphs clear and upload new file save figures and anonymization results B. Vujicic, C. Hao, and Lj. Trajković, Prediction of traffic in a public safety network, in Proc. IEEE International Symposium on Circuits and Systems (ISCAS' 06), Kos, Greece, May 2006, pp K-S: Kolmogorov-Smirnov February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 27
28 Data analysis options We analyzed the effect of anonymization on the dataset by using the analysis options implemented in the Anonym tool February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 28
29 Data analysis option: volume Number of bits or packets per second Identifies the pattern of traffic flow through a network Shown are BGP, TCP, and UDP traffic volume: Un-anonymized dataset May September 2012 BCNET Anonymized dataset May September 2012 BCNET TCP: Transmission Control Protocol BGP: Border Gateway Protocol UDP: User Datagram Protocol February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 29
30 Data analysis option: volume Statistics of packet length: an enumeration algorithm is applied to the dataset Statistics Un-anonymized dataset (bits) Minimum Maximum 1,514 1,614 Anonymized dataset (bits) Mean Median Standard deviation February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 30
31 Data analysis option: volume curve fitting Run-sequence: displays a graphical representation of a dataset Fitting curves to a dataset: Fourier, Gaussian, Weibull, exponential, polynomial, and sum of sine distributions Un-anonymized dataset May September 2012 BCNET Anonymized dataset May September 2012 BCNET February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 31
32 Data analysis option: protocol distribution Provides an overview of various protocols occupancy in the network Classifies IP, UDP, TCP, ICMP, DNS, and BGP traffic Un-anonymized dataset May September 2012 BCNET Anonymized dataset May September 2012 BCNET ICMP: Internet Control Message Protocol DNS : Domain Name Service February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 32
33 Data analysis option: packet length distribution Displays the histogram plot of a dataset Indicates appropriate distribution model of a dataset Significant percentage of packets are 150 bytes for un-anonymized dataset and 250 bytes for anonymized dataset as shown: Un-anonymized dataset May September 2012 BCNET Anonymized dataset May September 2012 BCNET M. Fras, J. Mohorko, and Z. Cucej, A new goodness of fit test for histograms regarding network traffic packet size process, in Proc. International Conference on Advanced Technologies for Communications (ATC 2008), Hanoi, Vietnam, Oct. 2008, pp February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 33
34 Data analysis option: fitting PDFs and CDFs PDF and CDF indicate the probability that the structure of a dataset follow certain distribution Provides options to fit thirteen distributions to PDF and CDF distribution curves of a dataset Un-anonymized dataset Anonymized dataset M. Fras, J. Mohorko, and Z. Cucej, Packet size process modeling of measured self-similar network traffic with defragmentation method, in Proc. 15th International Conference on Systems, Signals and Image Processing (IWSSIP 08), Bratislava, Slovakia, June 2008, pp PDF: Probability Density Function CDF: Cumulative Distribution Function February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 34
35 Anonym tool: GUI Graphical user interface February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 35
36 Operational diagram Prefix-preserving option February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 36
37 Functions: code Call function for separating IPv4 and IPv6 flows iporder=[]; f=fopen(name); f4=fopen(name4,'w'); f6=fopen(name6,'w'); while 1 % For each line line = fgetl(f); if (strfind(line, ':')) iporder=[iporder 1]; fprintf(f6, '%s\n',line); else iporder=[iporder 0]; fprintf(f4, '%s\n',line); end if (feof(f)) break; end end fclose(f); fclose(f4); fclose(f6); [time4,ipv4source,ipv4destination,protocol4, ipv4pktlength] = ipv4decode(name4); [time6,ipv6s,ipv6d,protocol6,pktlength] = ipv6decode(name6); Call prefix-reserving-function to anonymize IPv4 v4source= 'v4scolumn.txt'; % Output of decoded IPv4 destination column v4destination='v4dcolumn.txt'; % This gives the size of the input file inputsize= size(ipv4source,1); % Time in defind zero because at this point we are not decoding the time data. This need to be fixed. % time=0; % Writing the output of IPv4 decode in a files v4scolumn.txt and v4dcolumn.txt. % Source and destination is writen in two files because Crypto-PAN takes % input as it this formate (time length, address) ipv4writefile (v4source,v4destination, time4, ipv4pktlength,ipv4source,ipv4destination,inputsize); v4sanonymized='v4sourceanonymized.txt'; % IPv4 source address anonymized v4danonymized='v4destinationanonymized.txt'; % IPv4 sdestination address anonymized [s,s]=dos(['cryto_run.exe ' v4source ' > ' v4sanonymized]); [s,s]=dos(['cryto_run.exe ' v4destination ' > ' v4danonymized]); February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 37
38 Functions: code Call prefix-preserving-function to anonymize IPv6 IPv4s=IPv6s(:,1:4); IPv4d=IPv6d(:,1:4); lines = size(ipv6s,1); namev4s='10outv4s.txt'; namev4d='10outv4d.txt'; time=0; ipv6toipv4writefile(namev4s,namev4d, time6, pktlength, IPv4s, IPv4d,lines ); namev4sout='10outv4sout.txt'; namev4dout='10outv4dout.txt'; [s,s]=dos(['cryto_run.exe ' namev4s ' > ' namev4sout]); [s,s]=dos(['cryto_run.exe ' namev4d ' > ' namev4dout]); [IPv4sout,IPv4dout, timeout, pktlengthout]=ipv4toipv6readfile(namev4sout, namev4dout, lines ); Anonymized IPv6 address output nameano='10outv6ano.txt'; writeipv6anon(time6,ipv6s,ipv6d,ipv4sout,ipv4dout,protocol6,pktle ngthout,nameano); Call precision-degradation-function to anonymize IPv4 flow time-stamps [IPv4source,IPv4destination, time4, ipv4pktlength]=ipv4readfile(v4sanonymized, v4danonymized, inputsize ); precision degradation timeanony4=fix(time4*100)/100; nameano='10outtimev4ano.txt'; writeipv4anon(timeanony4,ipv4source,ipv4destination,protocol4,ipv 4pktlength,nameano) [IPv4sout,IPv4dout, timeout, pktlengthout]=ipv4toipv6readfile(namev4sout, namev4dout, lines); precision degradation Call precision-degradation-function to anonymize IPv6 flow time-stamps [IPv4sout,IPv4dout, timeout, pktlengthout]=ipv4toipv6readfile(namev4sout, namev4dout, lines); timeanony6=fix(time6*100)/100; Anonymized IPv6 address output nameano='10outv6ano.txt'; writeipv6anon(timeanony6,ipv6s,ipv6d,ipv4sout,ipv4dout,protocol6,pktlengthout,nameano); February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 38
39 Validation tests Implementation of the Anonym tool was validated using various tests: Fields Anonym Anontool FLAIM Source Destination February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 39
40 The Anonym tool: results Per-field anonymizatoin results: Timestamp IPv4 and IPv6 Un-anonymized dataset 2001:4958:10:2::2 2001:4958:10:2::3 2001:4958:10:2::2 2001:4958:10:2:: Anonymized dataset 8:A7:10:2:0:0:0:2 8:A7:10:2:0:0:0:3 8:A7:10:2:0:0:0:2 8:A7:10:2:0:0:0: Packet length February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 40
41 Roadmap Introduction Collection of network traffic Anonymization fields, algorithms, and tools Anonym tool Conclusion, future work, and references February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 41
42 Conclusions The Anonym tool provides options to anonymize time, IPv4 and IPv6 addresses, MAC addresses, and packet length data Supports log files in mrt and pcap formats Provides options to analyze the datasets Provides options to apply the K-S test on the datasets Analysis of un-anonymized and anonymized datasets indicates insignificant variations February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 42
43 Future work The Anonym tool may be enhanced to support other log formats: netflow, iptable, and pccat Additional anonymization algorithms may be implemented: binning, hash, partitioning, permutation, and random noise addition Anonymization of additional fields may be implemented: port numbers, TCP window size, and IP ID number February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 43
44 References 1. P. Porras and V. Shmatikov, Large-scale collection and sanitization of network security data: risks and challenges, in Proc. Workshop on New Security Paradigms (NSPW '06), Germany, Oct. 2007, pp J. Xu, J. Fan, M. Ammar, and S. B. Moon, On the design and performance of prefix-preserving IP traffic trace anonymization, in Proc. 1st ACM SIGCOMM Workshop on Internet Measurement (IMW' 01), San Francisco, CA, USA, Nov. 2001, pp A. Slagell, J.Wang, and W. Yurcik, Network log anonymization: application of Crypto-PAn to Cisco netflows, in Proc. NSF/AFRL Workshop on Secure Knowledge Management (SKM '04), Buffalo, NY, USA, Sept. 2004, pp M. Foukarakis, D. Antoniades, S. Antonatos, and E. P. Markatos, Flexible and high-performance anonymization of netflow records using anontool, in Proc. Third International Workshop on the Value of Security through Collaboration (SECOVAL 07), Nice, France, Sept. 2007, pp D. Koukis, S. Antonatos, D. Antoniades, E. Markatos, and P. Trimintzios, A generic anonymization framework for network traffic, in Proc. IEEE International Conference on Communications (ICC' 06), Istanbul, Turkey, June 2006, vol. 5, pp A. Slagell, K. Lakkaraju, and K. Luo, FLAIM: a multi-level anonymization framework for computer and network logs, in Proc. 20th conference on Large Installation System Administration (LISA' 06), Washington, DC, USA, July 2006, pp M. Bishop, B. Bhumiratana, R. Crawford, and K. Levitt, How to sanitize data, in Proc. 13th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WETICE '04), Washington, DC, USA, June 2004, pp R. Crawford, M. Bishop, B. Bhumiratana, L. Clark, and K. Levitt, Sanitization models and their limitations, in Proc. Workshop on New Security Paradigms (NSPW '06), Germany, Mar. 2006, pp R. Pang, M., Allman, V. Paxson, and J. Lee, The devil and packet trace anonymization, ACM SIGCOMM, Aug. 2006, vol. 36, pp PRISM state of the art on data protection algorithms for monitoring systems. [Online]. Available: prism.eu/images/upload/deliverables/fp7-prism-wp3.1-d3.1.1-nal.pdf. February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 44
45 References 11. T. Farah, S. Lally, R. Gill, N. Al-Rousan, R. Paul, D. Xu, and Lj. Trajković, Collection of BCNET BGP traffic, in Proc. 23rd International Teletraffic Congress (ITC 11), San Francisco, CA, Sept. 2011, pp S. Lally, T. Farah, R. Gill, R. Paul, N. Al-Rousan, and Lj. Trajković, Collection and characterization of BCNET BGP traffic, in Proc IEEE Pacific Rim Conference on Communications, Computers and Signal Processing (PACRIM 11), Victoria, BC, Canada, Aug. 2011, pp S. Lau and Lj. Trajković, Analysis of traffic data from a hybrid satellite-terrestrial network, in Proc. Fourth Int. Conf. on Quality of Service in Heterogeneous Wired/Wireless Networks (QShine' 2007), Vancouver, BC, Canada, Aug. 2007, pp. 9:1-9: B. Vujicic, C. Hao, and Lj. Trajković, Prediction of traffic in a public safety network, in Proc. IEEE International Symposium on Circuits and Systems (ISCAS' 06), Kos, Greece, May 2006, pp N. Al-Rousan, S. Haeri, and Lj. Trajkovic, "Feature selection for classification of BGP anomalies using Bayesian models," in Proc. ICMLC 2012, Xi'an, China, July 2012, pp Lj. Trajković, Analysis of Internet topologies, Circuits and Systems Magazine, Sept. 2010, vol. 10, no. 3, pp M. Najiminaini, L. Subedi, and Lj. Trajković, Analysis of Internet topologies: a historical view, in Proc. IEEE International Symposium on Circuits and Systems (ISCAS 09), Taipei, Taiwan, May 2009, pp J. Chen and Lj. Trajković, Analysis of Internet topology data, in Proc. International Symposium on Circuits and Systems (ISCAS' 04), Vancouver, British Columbia, Canada, May 2004, vol. 4, pp (2013) BCNET. [Online]. Available: (2013) University of Oregon Route Views Project. [Online]. Available: (2013) RIPE (Reseaux IP Europeens). [Online]. Available: (2013) The Corporative Association for Internet Data Analysis. [Online]. Available: February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 45
46 Acknowledgements Prof. Veselin Jungic, Chair Prof. Parvaneh Saeedi, Supervisor Prof. Emeritus Stephen Hardy, Examiner Prof. Ljiljana Trajković, Senior Supervisor February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 46
47 Acknowledgements Toby Wong, BCNET CNL mates Eva María Cavero Racaj, Universidad de Zaragoza February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 47
48 Thank You! February 26, 2013 Algorithms and Tools for Anonymization of the Internet Traffic 48
Anonym: A Tool for Anonymization of the Internet Traffic
Anonym: A Tool for Anonymization of the Internet Traffic Tanjila Farah and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada {tfarah, ljilja}@sfu.ca Abstract Collecting network
Analysis of Internet Topologies
Analysis of Internet Topologies Ljiljana Trajković [email protected] Communication Networks Laboratory http://www.ensc.sfu.ca/cnl School of Engineering Science Simon Fraser University, Vancouver, British
Analysis of Internet Topologies: A Historical View
Analysis of Internet Topologies: A Historical View Mohamadreza Najiminaini, Laxmi Subedi, and Ljiljana Trajković Communication Networks Laboratory http://www.ensc.sfu.ca/cnl Simon Fraser University Vancouver,
Anontool and NetFlow Anonymization Tools
Flexible and High-Performance Anonymization of NetFlow Records using Anontool Michalis Foukarakis, Demetres Antoniades, Spiros Antonatos, Evangelos P. Markatos Institute of Computer Science (ICS), Foundation
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure
Safely Sharing Data Between CSIRTs: The SCRUB* Security Anonymization Tool Infrastructure William Yurcik* Clay Woolam, Greg Hellings, Latifur Khan, Bhavani Thuraisingham University
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows
Network Log Anonymization: Application of Crypto-PAn to Cisco Netflows Adam Slagell, Jun Wang, William Yurcik National Center for Supercomputing Applications University of Illinois at Urbana-Champaign
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security
CANINE: A Combined Conversion and Anonymization Tool for Processing NetFlows for Security Abstract Yifan Li, Adam Slagell, Katherine Luo, William Yurcik National Center for Supercomputing Applications
Research on Errors of Utilized Bandwidth Measured by NetFlow
Research on s of Utilized Bandwidth Measured by NetFlow Haiting Zhu 1, Xiaoguo Zhang 1,2, Wei Ding 1 1 School of Computer Science and Engineering, Southeast University, Nanjing 211189, China 2 Electronic
Internet Firewall CSIS 4222. Packet Filtering. Internet Firewall. Examples. Spring 2011 CSIS 4222. net15 1. Routers can implement packet filtering
Internet Firewall CSIS 4222 A combination of hardware and software that isolates an organization s internal network from the Internet at large Ch 27: Internet Routing Ch 30: Packet filtering & firewalls
Application of Netflow logs in Analysis and Detection of DDoS Attacks
International Journal of Computer and Internet Security. ISSN 0974-2247 Volume 8, Number 1 (2016), pp. 1-8 International Research Publication House http://www.irphouse.com Application of Netflow logs in
Appmon: An Application for Accurate per Application Network Traffic Characterization
Appmon: An Application for Accurate per Application Network Traffic Characterization Demetres Antoniades 1, Michalis Polychronakis 1, Spiros Antonatos 1, Evangelos P. Markatos 1, Sven Ubik 2, Arne Øslebø
Obfuscation of sensitive data in network flows 1
Obfuscation of sensitive data in network flows 1 D. Riboni 2, A. Villani 1, D. Vitali 1 C. Bettini 2, L.V. Mancini 1 1 Dipartimento di Informatica,Universitá di Roma, Sapienza. E-mail: {villani, vitali,
Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records
1 Sharing Network Logs for Computer Forensics: A New Tool for the Anonymization of NetFlow Records Adam J Slagell, Yifan Li and Katherine Luo National Center for Supercomputing Applications University
An apparatus for P2P classification in Netflow traces
An apparatus for P2P classification in Netflow traces Andrew M Gossett, Ioannis Papapanagiotou and Michael Devetsikiotis Electrical and Computer Engineering, North Carolina State University, Raleigh, USA
Flow Analysis. Make A Right Policy for Your Network. GenieNRM
Flow Analysis Make A Right Policy for Your Network GenieNRM Why Flow Analysis? Resolve Network Managers Challenge as follow: How can I know the Detail and Real-Time situation of my network? How can I do
EFFECT OF TRANSFER FILE SIZE ON TCP-ADaLR PERFORMANCE: A SIMULATION STUDY
EFFECT OF TRANSFER FILE SIZE ON PERFORMANCE: A SIMULATION STUDY Modupe Omueti and Ljiljana Trajković Simon Fraser University Vancouver British Columbia Canada {momueti, ljilja}@cs.sfu.ca ABSTRACT Large
Internet Management and Measurements Measurements
Internet Management and Measurements Measurements Ramin Sadre, Aiko Pras Design and Analysis of Communication Systems Group University of Twente, 2010 Measurements What is being measured? Why do you measure?
Wharf T&T Limited DDoS Mitigation Service Customer Portal User Guide
Table of Content I. Note... 1 II. Login... 1 III. Real-time, Daily and Monthly Report... 3 Part A: Real-time Report... 3 Part 1: Traffic Details... 4 Part 2: Protocol Details... 5 Part B: Daily Report...
Visualization for Network Traffic Monitoring & Security
Visualization for Network Traffic Monitoring & Security Erwan ISIT/KYUSHU, Supélec 2006 Plan Visualization Visualization Host based Network based Between networks Other prototypes Pre-processing PGVis
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
HONE: Correlating Host activities to Network communications to produce insight
HONE: Correlating Host activities to Network communications to produce insight GLENN A. FINK, PH.D. Senior Scientist, Secure Cyber Systems SEAN STORY, PMP Project Manager, Software Engineering & Architectures
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks
Flexible Deterministic Packet Marking: An IP Traceback Scheme Against DDOS Attacks Prashil S. Waghmare PG student, Sinhgad College of Engineering, Vadgaon, Pune University, Maharashtra, India. [email protected]
Integrated Traffic Monitoring
61202880L1-29.1F November 2009 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of
Hadoop Technology for Flow Analysis of the Internet Traffic
Hadoop Technology for Flow Analysis of the Internet Traffic Rakshitha Kiran P PG Scholar, Dept. of C.S, Shree Devi Institute of Technology, Mangalore, Karnataka, India ABSTRACT: Flow analysis of the internet
Real-Time Analysis of CDN in an Academic Institute: A Simulation Study
Journal of Algorithms & Computational Technology Vol. 6 No. 3 483 Real-Time Analysis of CDN in an Academic Institute: A Simulation Study N. Ramachandran * and P. Sivaprakasam + *Indian Institute of Management
NetStream (Integrated) Technology White Paper HUAWEI TECHNOLOGIES CO., LTD. Issue 01. Date 2012-9-6
(Integrated) Technology White Paper Issue 01 Date 2012-9-6 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means
G.Vijaya kumar et al, Int. J. Comp. Tech. Appl., Vol 2 (5), 1413-1418
An Analytical Model to evaluate the Approaches of Mobility Management 1 G.Vijaya Kumar, *2 A.Lakshman Rao *1 M.Tech (CSE Student), Pragati Engineering College, Kakinada, India. [email protected]
NVisionIP: An Interactive Network Flow Visualization Tool for Security
NVisionIP: An Interactive Network Flow Visualization Tool for Security Kiran Lakkaraju William Yurcik Ratna Bearavolu Adam J. Lee National Center for Supercomputing Applications (NCSA) University of Illinois,
Signature-aware Traffic Monitoring with IPFIX 1
Signature-aware Traffic Monitoring with IPFIX 1 Youngseok Lee, Seongho Shin, and Taeck-geun Kwon Dept. of Computer Engineering, Chungnam National University, 220 Gungdong Yusonggu, Daejon, Korea, 305-764
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP
Intrusion Detection System Based Network Using SNORT Signatures And WINPCAP Aakanksha Vijay M.tech, Department of Computer Science Suresh Gyan Vihar University Jaipur, India Mrs Savita Shiwani Head Of
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool
Intrusion Detection System in Campus Network: SNORT the most powerful Open Source Network Security Tool Mukta Garg Assistant Professor, Advanced Educational Institutions, Palwal Abstract Today s society
Internet Traffic Measurement
Internet Traffic Measurement Internet Traffic Measurement Network Monitor Placement Measurement Analysis Tools Measurement Result Reporting Probing Mechanism Vantage Points Edge vs Core Hardware vs Software
Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee
Scalable NetFlow Analysis with Hadoop Yeonhee Lee and Youngseok Lee {yhlee06, lee}@cnu.ac.kr http://networks.cnu.ac.kr/~yhlee Chungnam National University, Korea January 8, 2013 FloCon 2013 Contents Introduction
NetFlow Aggregation. Feature Overview. Aggregation Cache Schemes
NetFlow Aggregation This document describes the Cisco IOS NetFlow Aggregation feature, which allows Cisco NetFlow users to summarize NetFlow export data on an IOS router before the data is exported to
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks
Performance Analysis of VoIP Codecs over Wi-Fi and WiMAX Networks Khaled Alutaibi and Ljiljana Trajković Simon Fraser University Vancouver, British Columbia, Canada E-mail: {kalutaib, ljilja}@sfu.ca Abstract
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX
Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX Martin Elich 1,3, Matěj Grégr 1,2 and Pavel Čeleda1,3 1 CESNET, z.s.p.o., Prague, Czech Republic 2 Brno University of Technology,
Web. Services. Web Technologies. Today. Web. Technologies. Internet WWW. Protocols TCP/IP HTTP. Apache. Next Time. Lecture #3 2008 3 Apache.
JSP, and JSP, and JSP, and 1 2 Lecture #3 2008 3 JSP, and JSP, and Markup & presentation (HTML, XHTML, CSS etc) Data storage & access (JDBC, XML etc) Network & application protocols (, etc) Programming
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Network congestion control using NetFlow
Network congestion control using NetFlow Maxim A. Kolosovskiy Elena N. Kryuchkova Altai State Technical University, Russia Abstract The goal of congestion control is to avoid congestion in network elements.
Distack. Towards Understanding the Global Behavior of DDoS Attacks A Framework for Distributed Attack Detection and Beyond
Distack Towards Understanding the Global Behavior of DDoS Attacks A Framework for and Beyond Thomas Gamer, Christoph P. Mayer, Martina Zitterbart 29. Aug 2008, EURECOM, France, (TH) Karlsruhe Institute
TRUFFLE Broadband Bonding Network Appliance. A Frequently Asked Question on. Link Bonding vs. Load Balancing
TRUFFLE Broadband Bonding Network Appliance A Frequently Asked Question on Link Bonding vs. Load Balancing 5703 Oberlin Dr Suite 208 San Diego, CA 92121 P:888.842.1231 F: 858.452.1035 [email protected]
VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring
VisFlowConnect-IP: A Link-Based Visualization of NetFlows for Security Monitoring William Yurcik National Center for Supercomputing Applications (NCSA) University of Illinois at Urbana-Champaign [email protected]
Assignment 6: Internetworking Due October 17/18, 2012
Assignment 6: Internetworking Due October 17/18, 2012 Our topic this week will be the notion of internetworking in general and IP, the Internet Protocol, in particular. IP is the foundation of the Internet
NetFlow use cases. ICmyNet / NetVizura. Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow use cases ICmyNet / NetVizura, [email protected] Soneco d.o.o. Serbia Agenda ICmyNet / NetVizura overview Use cases / case studies Statistics per exporter/interfaces Traffic Patterns NREN
Traffic Behavior Analysis with Poisson Sampling on High-speed Network 1
Traffic Behavior Analysis with Poisson Sampling on High-speed etwork Guang Cheng Jian Gong (Computer Department of Southeast University anjing 0096, P.R.China) Abstract: With the subsequent increasing
Linux MDS Firewall Supplement
Linux MDS Firewall Supplement Table of Contents Introduction... 1 Two Options for Building a Firewall... 2 Overview of the iptables Command-Line Utility... 2 Overview of the set_fwlevel Command... 2 File
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Network Monitoring On Large Networks. Yao Chuan Han (TWCERT/CC) [email protected]
Network Monitoring On Large Networks Yao Chuan Han (TWCERT/CC) [email protected] 1 Introduction Related Studies Overview SNMP-based Monitoring Tools Packet-Sniffing Monitoring Tools Flow-based Monitoring
Experimentation driven traffic monitoring and engineering research
Experimentation driven traffic monitoring and engineering research Amir KRIFA ([email protected]) 11/20/09 ECODE FP7 Project 1 Outline i. Future directions of Internet traffic monitoring and engineering
Ref: A. Leon Garcia and I. Widjaja, Communication Networks, 2 nd Ed. McGraw Hill, 2006 Latest update of this lecture was on 16 10 2010
IPv4 Addressing There are several non-profit organizations in the world that have the authority for assigning IP addresses to institutions that need access to the Internet. These organizations are (for
packet retransmitting based on dynamic route table technology, as shown in fig. 2 and 3.
Implementation of an Emulation Environment for Large Scale Network Security Experiments Cui Yimin, Liu Li, Jin Qi, Kuang Xiaohui National Key Laboratory of Science and Technology on Information System
ECE 578 Term Paper Network Security through IP packet Filtering
ECE 578 Term Paper Network Security through IP packet Filtering Cheedu Venugopal Reddy Dept of Electrical Eng and Comp science Oregon State University Bin Cao Dept of electrical Eng and Comp science Oregon
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Chapter 3. TCP/IP Networks. 3.1 Internet Protocol version 4 (IPv4)
Chapter 3 TCP/IP Networks 3.1 Internet Protocol version 4 (IPv4) Internet Protocol version 4 is the fourth iteration of the Internet Protocol (IP) and it is the first version of the protocol to be widely
Analysis of IP Network for different Quality of Service
2009 International Symposium on Computing, Communication, and Control (ISCCC 2009) Proc.of CSIT vol.1 (2011) (2011) IACSIT Press, Singapore Analysis of IP Network for different Quality of Service Ajith
CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER
PRODUCT BULLETIN NO. 2438 CISCO CONTENT SWITCHING MODULE SOFTWARE VERSION 4.1(1) FOR THE CISCO CATALYST 6500 SERIES SWITCH AND CISCO 7600 SERIES ROUTER NEW FEATURES New features of the Cisco Content Switching
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Index Terms Domain name, Firewall, Packet, Phishing, URL.
BDD for Implementation of Packet Filter Firewall and Detecting Phishing Websites Naresh Shende Vidyalankar Institute of Technology Prof. S. K. Shinde Lokmanya Tilak College of Engineering Abstract Packet
Integrated Traffic Monitoring
61202880L1-29.1E July 2008 Configuration Guide This configuration guide describes integrated traffic monitoring (ITM) and its use on ADTRAN Operating System (AOS) products. Including an overview of the
Packet Flow Analysis and Congestion Control of Big Data by Hadoop
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.456
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
2.2 Methods of Distributed Denial of Service Attacks. 2.1 Methods of Denial of Service Attacks
Distributed Denial of Service Attacks Felix Lau Simon Fraser University Burnaby, BC, Canada V5A 1S6 [email protected] Stuart H. Rubin SPAWAR Systems Center San Diego, CA, USA 92152-5001 [email protected]
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network
Performance Evaluation of VoIP Services using Different CODECs over a UMTS Network Jianguo Cao School of Electrical and Computer Engineering RMIT University Melbourne, VIC 3000 Australia Email: [email protected]
SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING. (1)Radi ROMANSKY
1 SPECIAL FEATURES OF TCP/IP NETWORK TRAFFIC AND PROBLEMS OF THE PROGRAM MONITORING (1)Radi ROMANSKY (1)Department of Computer Systems, Technical University Sofia e-mail address: [email protected] Bulgaria
modeling Network Traffic
Aalborg Universitet Characterization and Modeling of Network Shawky, Ahmed Sherif Mahmoud; Bergheim, Hans ; Ragnarsson, Olafur ; Wranty, Andrzej ; Pedersen, Jens Myrup Published in: Proceedings of 6th
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
A Passive Method for Estimating End-to-End TCP Packet Loss
A Passive Method for Estimating End-to-End TCP Packet Loss Peter Benko and Andras Veres Traffic Analysis and Network Performance Laboratory, Ericsson Research, Budapest, Hungary {Peter.Benko, Andras.Veres}@eth.ericsson.se
VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS. Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov, Kostadin Golev
International Journal "Information Technologies and Knowledge" Vol.2 / 28 181 VOIP TRAFFIC SHAPING ANALYSES IN METROPOLITAN AREA NETWORKS Rossitza Goleva, Mariya Goleva, Dimitar Atamian, Tashko Nikolov,
The ISP Column A monthly column on all things Internet
The ISP Column A monthly column on all things Internet Just How Good are You? Measuring Network Performance February 2003 Geoff Huston If you are involved in the operation of an IP network, a question
Outline. Outline. Outline
Network Forensics: Network Prefix Scott Hand September 30 th, 2011 1 What is network forensics? 2 What areas will we focus on today? Basics Some Techniques What is it? OS fingerprinting aims to gather
About Firewall Protection
1. This guide describes how to configure basic firewall rules in the UTM to protect your network. The firewall then can provide secure, encrypted communications between your local network and a remote
BT Internet Connect Global - Annex to the General Service Schedule
1. Definitions The following definitions apply, in addition to those in the General Terms and Conditions and the General Services Schedule. ARP means Address Resolution Protocol. Border Gateway Protocol
An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks
2011 International Conference on Network and Electronics Engineering IPCSIT vol.11 (2011) (2011) IACSIT Press, Singapore An Anomaly-Based Method for DDoS Attacks Detection using RBF Neural Networks Reyhaneh
Intelligent Worms: Searching for Preys
Intelligent Worms: Searching for Preys By Zesheng Chen and Chuanyi Ji ABOUT THE AUTHORS. Zesheng Chen is currently a Ph.D. Candidate in the Communication Networks and Machine Learning Group at the School
Network Based Intrusion Detection Using Honey pot Deception
Network Based Intrusion Detection Using Honey pot Deception Dr.K.V.Kulhalli, S.R.Khot Department of Electronics and Communication Engineering D.Y.Patil College of Engg.& technology, Kolhapur,Maharashtra,India.
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
MULTI WAN TECHNICAL OVERVIEW
MULTI WAN TECHNICAL OVERVIEW The Multi WAN feature will allow the service provider to load balanced all client TCP and UDP traffic only. It also provides redundancy for HA. Traffic that is load balanced:
NetFlow v9 Export Format
NetFlow v9 Export Format With this release, NetFlow can export data in NetFlow v9 (version 9) export format. This format is flexible and extensible, which provides the versatility needed to support new
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
Smart Queue Scheduling for QoS Spring 2001 Final Report
ENSC 833-3: NETWORK PROTOCOLS AND PERFORMANCE CMPT 885-3: SPECIAL TOPICS: HIGH-PERFORMANCE NETWORKS Smart Queue Scheduling for QoS Spring 2001 Final Report By Haijing Fang([email protected]) & Liu Tang([email protected])
Characteristics of Network Traffic Flow Anomalies
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka I. INTRODUCTION One of the primary tasks of network administrators is monitoring routers and switches for anomalous traffic
Protocol Rollback and Network Security
CSE 484 / CSE M 584 (Spring 2012) Protocol Rollback and Network Security Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, Dan Halperin, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee,
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
Network Layer: Network Layer and IP Protocol
1 Network Layer: Network Layer and IP Protocol Required reading: Garcia 7.3.3, 8.1, 8.2.1 CSE 3213, Winter 2010 Instructor: N. Vlajic 2 1. Introduction 2. Router Architecture 3. Network Layer Protocols
Monitor network traffic in the Dashboard tab
As a network analyzer (aka. packet sniffer & protocol analyzer), Capsa makes it easy for us to monitor and analyze network traffic in its intuitive and information-rich tab views. With Capsa's network
