Who s Doing What? Analyzing Ethernet LAN Traffic
|
|
|
- Robyn Anthony
- 10 years ago
- Views:
Transcription
1 by Paul Barry, Abstract A small collection of Perl modules provides the basic building blocks for the creation of a Perl-based Ethernet network analyzer. I present a network analyzer that captures local area network (LAN) traffic destined for the local domain name system (DNS) server and logs information on which IP addresses request which IP name resolutions. The developed program can form the basis of any custom Ethernet LAN analyzer. 1 Introduction Plenty of tools can capture and analyze network traffic. On Ethernet local area networks (LAN), EtherPeek and Surveyor are heavy-hitting commercial offerings, whereas on Unix platforms, there is tcpdump and Ethereal. These are excellent tools that provide a large, and sometimes intimidating, set of features. At times, though, I need something else. Perhaps I need to analyze a new or custom protocol not allowed for by existing tools, or I need to process each captured chunk of network traffic. In these cases, I need a programming language that can talk to the LAN. I could always use C. On Unix platforms, the libpcap library provides an Ethernet packet-capturing programming interface written in C and is used by both tcpdump and Ethereal, but dropping down to C takes too much time when I am in a hurry. 2 Perl and CPAN to the rescue! The Comprehensive Perl Archive Network (CPAN) has a number of module interfaces to libpcap. My favourite is Tim Potter s Net::Pcap which is a blow-for-blow mapping of the libpcap interface into its Perl equivalent. To make the most of Net::Pcap I have to study the pcap documentation and this is very tough going. Thankfully, Tim provides a companion module, Net::PcapUtils, which abstracts all the nitty-gritty details of Net::Pcap into a very small collection of functions and methods. When combined with his NetPacket module which can decode and encode a growing collection of network packets, Net::PcapUtils forms the basis of an network analyzer. The NetPacket module can decode raw Ethernet frames, Internet Protocol (IP) datagrams, Unix Domain Protocol (UDP) datagrams and Transmission Control Protocol (TCP) segments, which corresponds to the three lower levels of the TCP/IP Reference Model: the Host-to-Network, Network, and Transport Layers, respectively. NetPacket does not handle the final, topmost layer, the Application Layer. 18
2 3 Who s Doing What? The Who s Doing What (wdw) program in code listing 1 captures and processes details of the IP addresses which are resolving IP names against the local DNS server. In addition to displaying the results on screen as they happen, it logs each request to a file. On lines 5 and 6, I define two constants, DNS PORT and HOWMANY. The DNS PORT is the standard protocol port number for DNS, and HOWMANY is the default number of packets to capture. On line 14, I declare and define a global variable, $num processed, which I use to record the number of packets I process. My first programming language was Pascal which explains the definition of my subroutines before I actually use them. I explain these later. On line 59, I set the number of packets to process. If I do not provide a command line argument, I use the value of HOWMANY. Immediately upon setting $count, I remember its initial value in $rem count because my while loop, starting on line 76, changes the value of $count. On line 61, I call the Net::PcapUtils::open function which places the Ethernet card into promiscuous mode for packet capturing. The two parameters to open specify the protocol filter DNS uses UDP and the maximum amount of data to capture for each packet 1500 bytes is the maximum payload size on Ethernet networks. If open succeeds, $pkt descriptor is reference to a valid packet capture descriptor. If it fails it returns an error message which I check for this on line 65. On error I display an appropriate error message and then exit. On line 71, I open the log file in append mode and on line 74 I timestamp it at the beginning of the run. On line 79, I send the output from got a packet to this file. The while loop on lines 76 to 81 is the guts of the program. With each iteration, I call the Net::PcapUtils::next subroutine with my packet capture descriptor in $pkt descriptor. This subroutine waits for a UDP packet then returns two values a scalar which represents the raw Ethernet packet, which I store in $packet, and a hash, which I do not need. I pass the raw Ethernet packet to got a packet, which also takes the log filehandle. The while loop iterates $count times. On lines 17 and 18, in got a packet, I assign the two parameters to $handle and $packet. I will append the results to the log file using $handle and use the contents of $packet to create a NetPacket::IP object. On lines 20 and 21, the NetPacket::Ethernet::eth strip subroutine removes the Ethernet frame from $packet and returns the IP datagram, and NetPacket::IP::decode extracts the IP data portion. The UDP datagram is in the data portion of the IP datagram. Once I have the UDP object, on line 19 I check if the destination port is the port stored in DNS PORT. If it is, on line 21 I assign the data portion of the UDP datagram to $dns packet. The NetPacket modules knows nothing of the protocols running at the Application Layer, the level of DNS. On line 28, I use the Net::DNS::Packet module to decode the data portion from the IP packet, then on line 29, I extract the DNS queries from that and store them One line 31, I iterate and process each DNS query. On line 33, I get the current query in stringified form, and on line 35 I skip queries that match in-addr.arpa since those relate to IP addresses, not names. The Perl Review ( 0, 6 ) 19
3 Lines 39 to 44 outputs the source and destination IP addresses together with the IP name to the screen and log-file. On line 46, I increment $num processed since I have processed the right sort of query. On lines 52 to 57, the display results subroutine prints a summary message that shows the number of packets processed, in $num processed, and the number of packets actually processed, in $outof. 1 #!/usr/bin/perl -w Code Listing 1: The Who s Doing What program 2 use 5.6.0; # Change to 5.006_000 if using Perl use strict; 4 5 use constant DNS_PORT => 53; 6 use constant HOWMANY => 100; 7 8 use Net::DNS::Packet; 9 use Net::PcapUtils; 10 use NetPacket::Ethernet qw( :strip ); 11 use NetPacket::IP; 12 use NetPacket::UDP; our $num_processed = 0; sub got_a_packet { 17 my $handle = shift; 18 my $packet = shift; my $ip_datagram = NetPacket::IP->decode( 21 NetPacket::Ethernet::eth_strip( $packet ) ); my $udp_datagram = NetPacket::UDP->decode( $ip_datagram->{data} ); if ( $udp_datagram->{dest_port} == DNS_PORT ) 26 { 27 my $dns_packet = $udp_datagram->{data}; 28 my $dns_decode = Net::DNS::Packet->new( \$dns_packet ); 29 = $dns_decode->question; foreach my $q ) 32 { 33 my $question = $q->string; unless ( $question =~ /in-addr\.arpa/ ) 36 { 37 $question =~ /^(.+)\tin/; print "$ip_datagram->{src_ip} -> "; 40 print "$ip_datagram->{dest_ip}: "; 41 print "$1\n"; 42 print $handle "$ip_datagram->{src_ip} -> "; 43 print $handle "$ip_datagram->{dest_ip}: "; 44 print $handle "$1\n"; $num_processed++; 47 } 48 } The Perl Review ( 0, 6 ) 20
4 49 } 50 } sub display_results { 53 my $outof = shift; print "\nprocessed $num_processed (out of $outof) "; 56 print "UDP datagrams carrying DNS.\n\n"; 57 } my $count = shift HOWMANY; 60 my $rem_count = $count; 61 my $pkt_descriptor = Net::PcapUtils::open( 62 FILTER => udp, 63 SNAPLEN => 1500 ); if (!ref( $pkt_descriptor ) ) 66 { 67 warn "Net::PcapUtils::open returned: $pkt_descriptor\n"; 68 exit; 69 } open WDW_FILE, ">>wdw_log.txt" 72 or die "Could not append to wdw_log.txt: $!\n"; print WDW_FILE "\n", scalar localtime, " - wdw BEGIN run.\n\n"; while ( $count ) 77 { 78 my ( $packet, %header ) = Net::PcapUtils::next( $pkt_descriptor ); 79 got_a_packet( *WDW_FILE, $packet ); 80 $count--; 81 } print WDW_FILE "\n", scalar localtime, " - wdw END run.\n"; 84 close WDW_FILE; display_results( $rem_count ); 4 Running wdw I login as root to run the wdw program because I need to put the Ethernet network interface card (NIC) into promiscuous mode, which is a restricted activity that only root can do. The default number of packets to capture is 100. I supply a single, positive integer argument to wdw on the command line if I want to capture a different number. The program output shows up on standard output and in the log file. I ran the program with fictitious IP addresses I already set up to create the sample in code listing 2. The address provides DNS to my fictitous local network. The Perl Review ( 0, 6 ) 21
5 Code Listing 2: wdw output > : > : > : > : > : search.cpan.org > : > : > : glasnost.itcarlow.ie > : > : > : Processed 11 (out of 100) UDP datagrams carrying DNS. On line 1 of code listing 2, the misspelling of prel instead of perl, causes the lookup to fail. The client program, upon failing to lookup tried to resolve the name as if it were a host on the local internet domain, itcarlow.ie. This accounts for the rather long hostname on line 2. 5 Conclusion Any half-decent network manager (or sysadmin) will tell me the information logged by wdw is more than likely logged by my DNS server. It is easy for most Perl programmers to write a quick program to extract the data items of interest from the DNS log. However, wdw displays the data as it happens, whereas instead of after-the-fact. I can also use this as the basis of more complicated real-time analyzers. 6 References The pcap(3) manual page. Module documentation - NetPacket, Net::Pcap, Net::PcapUtils, and Net::DNS. Tim Potter s modules - Michael Fuhr s Net::DNS website - Internet RFCs: 1034 and 1035 for the original DNS standards. Programming the Network with Perl, chapter 2, by Paul Barry. John Wiley & Sons Limited, 2002, ISBN libpcap library - wdw source code - barryp/wdw.tar.gz The Perl Review ( 0, 6 ) 22
6 7 About the Author Paul Barry lectures in Computer Networking and Systems Administration at The Institute of Technology, Carlow in Ireland. Paul is the author of Programming the Network with Perl (Wiley, 2002). He occasionally writes for Linux Journal magazine and web site. The Perl Review ( 0, 6 ) 23
Network Layers. CSC358 - Introduction to Computer Networks
Network Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined Data Exchange Between Application Processes TCP Connection-Setup
Data Communication Networks and Converged Networks
Data Communication Networks and Converged Networks The OSI Model and Encapsulation Layer traversal through networks Protocol Stacks Converged Data/Telecommunication Networks From Telecom to Datacom, Asynchronous
Network-Oriented Software Development. Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2
Network-Oriented Software Development Course: CSc4360/CSc6360 Instructor: Dr. Beyah Sessions: M-W, 3:00 4:40pm Lecture 2 Topics Layering TCP/IP Layering Internet addresses and port numbers Encapsulation
Application. Transport. Network. Data Link. Physical. Network Layers. Goal
Layers Goal Understand how application processes set up a connection and exchange messages. Understand how addresses are determined 1 2 Data Exchange Between Processes TCP Connection-Setup Between Processes
Ethereal: Getting Started
Ethereal: Getting Started Computer Networking: A Topdown Approach Featuring the Internet, 3 rd edition. Version: July 2005 2005 J.F. Kurose, K.W. Ross. All Rights Reserved Tell me and I forget. Show me
Introduction to Analyzer and the ARP protocol
Laboratory 6 Introduction to Analyzer and the ARP protocol Objetives Network monitoring tools are of interest when studying the behavior of network protocols, in particular TCP/IP, and for determining
Firewall Testing. Cameron Kerr Telecommunications Programme University of Otago. May 16, 2005
Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract Writing a custom firewall is a complex task, and is something that requires a significant amount of
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
Sniffer s Network Packet Analyzer. Basics
Sniffer s Network Packet Analyzer Basics Sniffer Network Analysis Range of techniques that network engineers and designers employ to study the properties of networks, including connectivity, capacity and
EKT 332/4 COMPUTER NETWORK
UNIVERSITI MALAYSIA PERLIS SCHOOL OF COMPUTER & COMMUNICATIONS ENGINEERING EKT 332/4 COMPUTER NETWORK LABORATORY MODULE LAB 2 NETWORK PROTOCOL ANALYZER (SNIFFING AND IDENTIFY PROTOCOL USED IN LIVE NETWORK)
EE984 Laboratory Experiment 2: Protocol Analysis
EE984 Laboratory Experiment 2: Protocol Analysis Abstract This experiment provides an introduction to protocols used in computer communications. The equipment used comprises of four PCs connected via a
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS
6. INTRODUCTION TO THE LABORATORY: SOFTWARE TOOLS 6.1. Wireshark network sniffer Wireshark (originally called Ethereal) is a freeware network sniffer. A sniffer investigates and analyzes network traffic.
BASIC ANALYSIS OF TCP/IP NETWORKS
BASIC ANALYSIS OF TCP/IP NETWORKS INTRODUCTION Communication analysis provides powerful tool for maintenance, performance monitoring, attack detection, and problems fixing in computer networks. Today networks
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015
CS168 Computer Networks Jannotti Project 4: IP over DNS Due: 11:59 PM, Dec 14, 2015 Contents 1 Introduction 1 2 Components 1 2.1 Creating the tunnel..................................... 2 2.2 Using the
TCP/IP Fundamentals. OSI Seven Layer Model & Seminar Outline
OSI Seven Layer Model & Seminar Outline TCP/IP Fundamentals This seminar will present TCP/IP communications starting from Layer 2 up to Layer 4 (TCP/IP applications cover Layers 5-7) IP Addresses Data
Hands-on Network Traffic Analysis. 2015 Cyber Defense Boot Camp
Hands-on Network Traffic Analysis 2015 Cyber Defense Boot Camp What is this about? Prerequisite: network packet & packet analyzer: (header, data) Enveloped letters inside another envelope Exercises Basic
Introduction To Computer Networking
Introduction To Computer Networking Alex S. 1 Introduction 1.1 Serial Lines Serial lines are generally the most basic and most common communication medium you can have between computers and/or equipment.
Detecting Threats in Network Security by Analyzing Network Packets using Wireshark
1 st International Conference of Recent Trends in Information and Communication Technologies Detecting Threats in Network Security by Analyzing Network Packets using Wireshark Abdulalem Ali *, Arafat Al-Dhaqm,
A Research Study on Packet Sniffing Tool TCPDUMP
A Research Study on Packet Sniffing Tool TCPDUMP ANSHUL GUPTA SURESH GYAN VIHAR UNIVERSITY, INDIA ABSTRACT Packet sniffer is a technique of monitoring every packet that crosses the network. By using this
TCP/IP Networking An Example
TCP/IP Networking An Example Introductory material. This module illustrates the interactions of the protocols of the TCP/IP protocol suite with the help of an example. The example intents to motivate the
UPPER LAYER SWITCHING
52-20-40 DATA COMMUNICATIONS MANAGEMENT UPPER LAYER SWITCHING Gilbert Held INSIDE Upper Layer Operations; Address Translation; Layer 3 Switching; Layer 4 Switching OVERVIEW The first series of LAN switches
CET442L Lab #2. IP Configuration and Network Traffic Analysis Lab
CET442L Lab #2 IP Configuration and Network Traffic Analysis Lab Goals: In this lab you will plan and implement the IP configuration for the Windows server computers on your group s network. You will use
Domain Name System (DNS) Fundamentals
Domain Name System (DNS) Fundamentals Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Lecture 2-ter. 2. A communication example Managing a HTTP v1.0 connection. G.Bianchi, G.Neglia, V.Mancuso
Lecture 2-ter. 2 A communication example Managing a HTTP v1.0 connection Managing a HTTP request User digits URL and press return (or clicks ). What happens (HTTP 1.0): 1. Browser opens a TCP transport
Packet Sniffing and Spoofing Lab
SEED Labs Packet Sniffing and Spoofing Lab 1 Packet Sniffing and Spoofing Lab Copyright c 2014 Wenliang Du, Syracuse University. The development of this document is/was funded by the following grants from
Introduction to Wireshark Network Analysis
Introduction to Wireshark Network Analysis Page 2 of 24 Table of Contents INTRODUCTION 4 Overview 4 CAPTURING LIVE DATA 5 Preface 6 Capture Interfaces 6 Capture Options 6 Performing the Capture 8 ANALYZING
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Overview of Computer Networks
Overview of Computer Networks Client-Server Transaction Client process 4. Client processes response 1. Client sends request 3. Server sends response Server process 2. Server processes request Resource
Craig Pelkie Bits & Bytes Programming, Inc. [email protected]
Craig Pelkie Bits & Bytes Programming, Inc. [email protected] The Basics of IP Packet Filtering Edition IPFILTER_20020219 Published by Bits & Bytes Programming, Inc. Valley Center, CA 92082 [email protected]
Make a folder named Lab3. We will be using Unix redirection commands to create several output files in that folder.
CMSC 355 Lab 3 : Penetration Testing Tools Due: September 31, 2010 In the previous lab, we used some basic system administration tools to figure out which programs where running on a system and which files
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I)
Lecture (02) Networking Model (TCP/IP) Networking Standard (OSI) (I) By: Dr. Ahmed ElShafee ١ Dr. Ahmed ElShafee, ACU : Fall 2015, Networks II Agenda Introduction to networking architecture Historical
Firewall Stateful Inspection of ICMP
The feature addresses the limitation of qualifying Internet Control Management Protocol (ICMP) messages into either a malicious or benign category by allowing the Cisco IOS firewall to use stateful inspection
Chapter 9. IP Secure
Chapter 9 IP Secure 1 Network architecture is usually explained as a stack of different layers. Figure 1 explains the OSI (Open System Interconnect) model stack and IP (Internet Protocol) model stack.
Flow Analysis Versus Packet Analysis. What Should You Choose?
Flow Analysis Versus Packet Analysis. What Should You Choose? www.netfort.com Flow analysis can help to determine traffic statistics overall, but it falls short when you need to analyse a specific conversation
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
Internet Working 5 th lecture. Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004
5 th lecture Chair of Communication Systems Department of Applied Sciences University of Freiburg 2004 1 43 Last lecture Lecture room hopefully all got the message lecture on tuesday and thursday same
Wireshark Lab: Assignment 1w (Optional)
Tell me and I forget. Show me and I remember. Involve me and I understand. Chinese proverb 2005-21012, J.F Kurose and K.W. Ross, All Rights Reserved Wireshark Lab: Assignment 1w (Optional) One s understanding
Lab 1: Packet Sniffing and Wireshark
Introduction CSC 5991 Cyber Security Practice Lab 1: Packet Sniffing and Wireshark The first part of the lab introduces packet sniffer, Wireshark. Wireshark is a free opensource network protocol analyzer.
CS101 Lecture 19: Internetworking. What You ll Learn Today
CS101 Lecture 19: Internetworking Internet Protocol IP Addresses Routing Domain Name Services Aaron Stevens ([email protected]) 6 March 2013 What You ll Learn Today What is the Internet? What does Internet Protocol
Indian Institute of Technology Kharagpur. TCP/IP Part I. Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology
Indian Institute of Technology Kharagpur TCP/IP Part I Prof Indranil Sengupta Computer Science and Engineering Indian Institute of Technology Kharagpur Lecture 3: TCP/IP Part I On completion, the student
Wireshark Tutorial INTRODUCTION
Wireshark Tutorial INTRODUCTION The purpose of this document is to introduce the packet sniffer WIRESHARK. WIRESHARK would be used for the lab experiments. This document introduces the basic operation
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
Configuring Network Address Translation (NAT)
8 Configuring Network Address Translation (NAT) Contents Overview...................................................... 8-3 Translating Between an Inside and an Outside Network........... 8-3 Local and
NAT TCP SIP ALG Support
The feature allows embedded messages of the Session Initiation Protocol (SIP) passing through a device that is configured with Network Address Translation (NAT) to be translated and encoded back to the
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
Chapter 8 Monitoring and Logging
Chapter 8 Monitoring and Logging This chapter describes the SSL VPN Concentrator status information, logging, alerting and reporting features. It describes: SSL VPN Concentrator Status Active Users Event
This chapter describes how to set up and manage VPN service in Mac OS X Server.
6 Working with VPN Service 6 This chapter describes how to set up and manage VPN service in Mac OS X Server. By configuring a Virtual Private Network (VPN) on your server you can give users a more secure
Domain Name System (DNS) Session-1: Fundamentals. Ayitey Bulley [email protected]
Domain Name System (DNS) Session-1: Fundamentals Ayitey Bulley [email protected] Computers use IP addresses. Why do we need names? Names are easier for people to remember Computers may be moved between
Socket = an interface connection between two (dissimilar) pipes. OS provides this API to connect applications to networks. home.comcast.
Interprocess communication (Part 2) For an application to send something out as a message, it must arrange its OS to receive its input. The OS is then sends it out either as a UDP datagram on the transport
Lab 1: Network Devices and Technologies - Capturing Network Traffic
CompTIA Security+ Lab Series Lab 1: Network Devices and Technologies - Capturing Network Traffic CompTIA Security+ Domain 1 - Network Security Objective 1.1: Explain the security function and purpose of
Networking Test 4 Study Guide
Networking Test 4 Study Guide True/False Indicate whether the statement is true or false. 1. IPX/SPX is considered the protocol suite of the Internet, and it is the most widely used protocol suite in LANs.
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
Packet Capture. Document Scope. SonicOS Enhanced Packet Capture
Packet Capture Document Scope This solutions document describes how to configure and use the packet capture feature in SonicOS Enhanced. This document contains the following sections: Feature Overview
Candidates should attempt FOUR questions. All questions carry 25 marks.
UNIVERSITY OF ABERDEEN Exam 2010 Degree Examination in ES 3567 Communications Engineering 1B Xday X Notes: 9.00 a.m. 12 Noon (i) CANDIDATES ARE PERMITTED TO USE APPROVED CALCULATORS (II) CANDIDATES ARE
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop
Large-Scale TCP Packet Flow Analysis for Common Protocols Using Apache Hadoop R. David Idol Department of Computer Science University of North Carolina at Chapel Hill [email protected] http://www.cs.unc.edu/~mxrider
Introduction to Passive Network Traffic Monitoring
Introduction to Passive Network Traffic Monitoring CS459 ~ Internet Measurements Spring 2015 Despoina Antonakaki [email protected] Active Monitoring Inject test packets into the network or send packets
PROFESSIONAL. Node.js BUILDING JAVASCRIPT-BASED SCALABLE SOFTWARE. Pedro Teixeira WILEY. John Wiley & Sons, Inc.
PROFESSIONAL Node.js BUILDING JAVASCRIPT-BASED SCALABLE SOFTWARE Pedro Teixeira WILEY John Wiley & Sons, Inc. INTRODUCTION xxvii CHAPTER 1: INSTALLING NODE 3 Installing Node on Windows 4 Installing on
How To Monitor And Test An Ethernet Network On A Computer Or Network Card
3. MONITORING AND TESTING THE ETHERNET NETWORK 3.1 Introduction The following parameters are covered by the Ethernet performance metrics: Latency (delay) the amount of time required for a frame to travel
ESSENTIALS. Understanding Ethernet Switches and Routers. April 2011 VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK
VOLUME 3 ISSUE 1 A TECHNICAL SUPPLEMENT TO CONTROL NETWORK Contemporary Control Systems, Inc. Understanding Ethernet Switches and Routers This extended article was based on a two-part article that was
Troubleshooting Procedures for Cisco TelePresence Video Communication Server
Troubleshooting Procedures for Cisco TelePresence Video Communication Server Reference Guide Cisco VCS X7.2 D14889.01 September 2011 Contents Contents Introduction... 3 Alarms... 3 VCS logs... 4 Event
Zarząd (7 osób) F inanse (13 osób) M arketing (7 osób) S przedaż (16 osób) K adry (15 osób)
QUESTION NO: 8 David, your TestKing trainee, asks you about basic characteristics of switches and hubs for network connectivity. What should you tell him? A. Switches take less time to process frames than
Implementing Network Monitoring Tools
Section 1 Network Systems Engineering Implementing Network Monitoring Tools V.C.Asiwe and P.S.Dowland Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: [email protected]
Integration with CA Transaction Impact Monitor
Integration with CA Transaction Impact Monitor CA Application Delivery Analysis Multi-Port Monitor Version 10.1 This Documentation, which includes embedded help systems and electronically distributed materials,
How do I get to www.randomsite.com?
Networking Primer* *caveat: this is just a brief and incomplete introduction to networking to help students without a networking background learn Network Security. How do I get to www.randomsite.com? Local
Cover. White Paper. (nchronos 4.1)
Cover White Paper (nchronos 4.1) Copyright Copyright 2013 Colasoft LLC. All rights reserved. Information in this document is subject to change without notice. No part of this document may be reproduced
Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology
Distributed Network Traffic Monitoring and Analysis using Load Balancing Technology Soon-Hwa Hong, Jae-Young Kim, Bum-Rae Cho and James W. Hong Dept. of Computer Science and Engineering, Pohang Korea Email:
Chapter 14 Analyzing Network Traffic. Ed Crowley
Chapter 14 Analyzing Network Traffic Ed Crowley 10 Topics Finding Network Based Evidence Network Analysis Tools Ethereal Reassembling Sessions Using Wireshark Network Monitoring Intro Once full content
Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort
License Intrusion Detection and Prevention: Network and IDS Configuration and Monitoring using Snort This work by Z. Cliffe Schreuders at Leeds Metropolitan University is licensed under a Creative Commons
RF Monitor and its Uses
RF Monitor and its Uses Pradipta De [email protected] Outline RF Monitoring Basics RF Monitoring Installation Using RF Monitoring RF Monitoring on WRT54GS Extending RF Monitoring UDP Lite Comments on
The Barracuda Network Connector. System Requirements. Barracuda SSL VPN
Barracuda SSL VPN The Barracuda SSL VPN allows you to define and control the level of access that your external users have to specific resources inside your internal network. For users such as road warriors
Firewall Stateful Inspection of ICMP
The feature categorizes Internet Control Management Protocol Version 4 (ICMPv4) messages as either malicious or benign. The firewall uses stateful inspection to trust benign ICMPv4 messages that are generated
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Internetworking and IP Address
Lecture 8 Internetworking and IP Address Motivation of Internetworking Internet Architecture and Router Internet TCP/IP Reference Model and Protocols IP Addresses - Binary and Dotted Decimal IP Address
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN
How To - Configure Virtual Host using FQDN How To Configure Virtual Host using FQDN Applicable Version: 10.6.2 onwards Overview Virtual host implementation is based on the Destination NAT concept. Virtual
Host Fingerprinting and Firewalking With hping
Host Fingerprinting and Firewalking With hping Naveed Afzal National University Of Computer and Emerging Sciences, Lahore, Pakistan Email: [email protected] Naveedafzal gmail.com Abstract: The purpose
Perl in a nutshell. First CGI Script and Perl. Creating a Link to a Script. print Function. Parsing Data 4/27/2009. First CGI Script and Perl
First CGI Script and Perl Perl in a nutshell Prof. Rasley shebang line tells the operating system where the Perl interpreter is located necessary on UNIX comment line ignored by the Perl interpreter End
Lab - Observing DNS Resolution
Objectives Part 1: Observe the DNS Conversion of a URL to an IP Address Part 2: Observe DNS Lookup Using the Nslookup Command on a Web Site Part 3: Observe DNS Lookup Using the Nslookup Command on Mail
Cisco Configuring Commonly Used IP ACLs
Table of Contents Configuring Commonly Used IP ACLs...1 Introduction...1 Prerequisites...2 Hardware and Software Versions...3 Configuration Examples...3 Allow a Select Host to Access the Network...3 Allow
Network Security CS 192
Network Security CS 192 Firewall Rules Department of Computer Science George Washington University Jonathan Stanton 1 Client Web Auth paper Today s topics Firewall Rules Jonathan Stanton 2 Required: Additional
Protocol Data Units and Encapsulation
Chapter 2: Communicating over the 51 Protocol Units and Encapsulation For application data to travel uncorrupted from one host to another, header (or control data), which contains control and addressing
Overview. Protocol Analysis. Network Protocol Examples. Tools overview. Analysis Methods
Overview Capturing & Analyzing Network Traffic: tcpdump/tshark and Wireshark EE 122: Intro to Communication Networks Vern Paxson / Jorge Ortiz / Dilip Anthony Joseph Examples of network protocols Protocol
Network Layer IPv4. Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS. School of Computing, UNF
Network Layer IPv4 Dr. Sanjay P. Ahuja, Ph.D. Fidelity National Financial Distinguished Professor of CIS School of Computing, UNF IPv4 Internet Protocol (IP) is the glue that holds the Internet together.
Network sniffing packet capture and analysis
Network sniffing packet capture and analysis October 2, 2015 Administrative submittal instructions answer the lab assignment s 13 questions in numbered list form, in a Word document file. (13 th response
Packet Sniffers. * Windows and Linux - Wireshark
Packet Sniffers The following are tools that are either built in to the software or freeware that can be obtained from the website indicated. They are used by the corresponding Operating Systems. * Windows
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol
Mobile IP Network Layer Lesson 02 TCP/IP Suite and IP Protocol 1 TCP/IP protocol suite A suite of protocols for networking for the Internet Transmission control protocol (TCP) or User Datagram protocol
Network sniffing packet capture and analysis
Network sniffing packet capture and analysis October 3, 2014 Administrative submittal instructions answer the lab assignment s 13 questions in numbered list form, in a Word document file. (13 th response
The Cisco IOS Firewall feature set is supported on the following platforms: Cisco 2600 series Cisco 3600 series
Cisco IOS Firewall Feature Set Feature Summary The Cisco IOS Firewall feature set is available in Cisco IOS Release 12.0. This document includes information that is new in Cisco IOS Release 12.0(1)T, including
PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server 2003 http://sourceforge.net/projects/pktfilter/
PktFilter A Win32 service to control the IPv4 filtering driver of Windows 2000/XP/Server 2003 http://sourceforge.net/projects/pktfilter/ Jean-Baptiste Marchand [email protected] Contents 1
10. Exercise: Automation in Incident Handling
107 10. Exercise: Automation in Incident Handling Main Objective Targeted Audience Total Duration Time Schedule Frequency The purpose of this exercise is to develop students abilities to create custom
Internet Packets. Forwarding Datagrams
Internet Packets Packets at the network layer level are called datagrams They are encapsulated in frames for delivery across physical networks Frames are packets at the data link layer Datagrams are formed
Transformation of honeypot raw data into structured data
Transformation of honeypot raw data into structured data 1 Majed SANAN, Mahmoud RAMMAL 2,Wassim RAMMAL 3 1 Lebanese University, Faculty of Sciences. 2 Lebanese University, Director of center of Research
