TELCO challenge: Learning and managing the network behavior
|
|
|
- Samson Wiggins
- 10 years ago
- Views:
Transcription
1 TELCO challenge: Learning and managing the network behavior M.Sc. Ljupco Vangelski CEO, Scope Innovations Kiril Oncevski NOC, ISP Neotel Skopje
2 Presentation overview Challenges for the modern network monitoring Traditional approach vs. Machine learning approach Modeling the network behavior Anomaly detection Putting it all together in a system that works Visualization 2 2/28
3 About Scope Over the top service company Five founders, each with 6+ ICT experience & telco background Focused on open source product development and integration Particularly focused on monitoring solutions 3 3/28
4 About Neotel Established in 2004 as an Investment of Macedonian ICT company - NEOCOM and private Investors Offices in Skopje, but network and operations across whole country. NEOTEL employees 50+ Certification ISO 9001 and ISO /28
5 About Neotel Rely as much as possible on our own infrastructure: Dense Metro Ethernet network in Skopje Connection to 3 border crossings (Kosovo, Serbia, Bulgaria) 6 6/28
6 Goals of the project Investigate and evaluate an approach for modeling the network behavior Create better insight and better representation of existing data, for network monitoring Integrate a system which can be made available to Neotel's end users, for monitoring their own network activity 7 7/28
7 Challenges for the modern telcos Manage growth Consolidation Convergence Which should be my service domain? Make sure QoE and QoS are monitored... and guaranteed Change management 8 8/28
8 Modern network monitoring Netflow, sflow, packet capturing, Syslog, SNMP, Routing data What is there to be monitored? Where are we looking for anomalies? And this is only the operations (OSS). What about BSS integration? Fraud monitoring and BI? 9 9/28
9 Modern network monitoring Detailed network traffic statistics: Netflow Yes we all do that... but is it sufficient to describe the behavior of our customers? We don't only want to detect outages but changes of behavior which could affect the quality of user experience. From netflow to big data... where do ordinary netflow collectors usually fail? Fancy graphs, containing not much useful data apart from ports and transport protocol statistics 10 10/28
10 Traditional approach Multiple netflow probes, one collector dashboard Monitor packets, flows, bytes, pps, fps, bps, per protocols, TCP/UDP, ports and IP addresses Identify top talkers Detect DdoS and basic infections 11 11/28
11 How our system works? 1) Put everything in one box 2) Put it at the Service Provider premises for 15 days 3) Accept netflow and mirror ports 4) Learn the network behavior (Dynamic thresholds and seasonal parameters are created) 5) Integrate everything on a single dashboard with powerful graphing capabilities 6) Deal with alarms, deal with automatic traffic blocking 12 12/28
12 Modeling the network behavior What are the parameters and attributes? Seasonal behavior (weekdays / weekends / peak / off-peak hours) Introducing machine learning 13 13/28
13 Modeling the network behavior Why can't we use supervised machine learning? When can we use unsupervised machine learning? We let the system learn itself: Identify seasonal parameters Find clusters and dynamic thresholds 14 14/28
14 Anomaly detection Having the seasonal distinction helps in identifying different anomaly thresholds for different parameters at a different point in time Have the system model itself! We want the anomalous behavior to be part of a complete alert workflow with correlation 15 15/28
15 The frontend of the solution Using open source has huge advantages, particularly when adding new features, plugins and functionalities Nfsen for netflow aggregation Highcharts (JavaScript) for fancy frontend dashboard Nagios for alert the complete monitoring workflow + notifications ( , SNMP traps to NMS) Quagga for ebgp integration for black-holing potential attackers Python scripts for backend modeling and dynamic thresholds of the system (using PyCluster and SciPy libraries) 16 16/28
16 System diagram 17 17/28
17 Practical implementation System implemented in ISP Neotel Skopje, Macedonia 8Gbps traffic, 1 netflow source, sampling rate: 1 out of 1024 Learning period: 15 days Seasonal parameters (Monday to Friday): Night time01:00 08:00 Daytime normal activity 08:00 10:30 and 18:00 01:00 Daytime high activity: 10:30 18:00 System implemented on OpenStack cloud Debian server integrating: Nfsen, Highcharts, Nagios, Quagga 18 18/28
18 Netflow generator box What if we don't have netflow generator? We have tested netflow generator box sniffing data (from tap or port mirror) and generating netflow System: FreeBSD 9.0 Customized and optimized kernel for high network load ng_netflow netgraph kernel implementation of netflow (v5 and v9) Broadcom GbE adapters 1 cpu 4 x 2.4GHz (Xeon quadcore) Sniffing ~900mbps traffic and generating netflow with 20% cpu load 19 19/28
19 Visualization Highcharts is used as frontend to Nfsen JavaScript running on client side Providing flexible and powerful visualization Integrating also Nagios and Quagga statistics and information on a single interface Additional graphing capabilities in addition to Nfsen (rrdtool) 20 20/28
20 Visualization Bpp distribution over time (bytes-per-packet) 21 21/28
21 Visualization Top 5 src Ips with destinations 22 22/28
22 Visualization IP groups compared activity visualization 23 23/28
23 For the end customers The system is web based, Python + JavaScript (Highcharts) Customers can have insight in their network usage Submit requests for blocking traffic from a remote host Integrate with ticketing systems Customer should be able to submit a QoS/QoE problem and record of his current network behavior can be submitted as well. This allows for QoE issues to be addressed in a proper manner /28
24 Conclusion Based on open source tools (excluding Highcharts library) highly configurable and flexible Taking network monitoring to the next level: designing the system for the user Possible benefits for Neotel Future development: REST API for integration with other applications Integrating the application layer (pf layer-7 on FreeBSD) 27 27/28
25 Questions & answers Thank you for your time Ljupco Vangelski
NfSen Plugin Supporting The Virtual Network Monitoring
NfSen Plugin Supporting The Virtual Network Monitoring Vojtěch Krmíček [email protected] Pavel Čeleda [email protected] Jiří Novotný [email protected] Part I Monitoring of Virtual Network Environments
Network Monitoring Comparison
Network Monitoring Comparison vs Network Monitoring is essential for every network administrator. It determines how effective your IT team is at solving problems or even completely eliminating them. Even
Cheap and efficient anti-ddos solution
Cheap and efficient anti-ddos solution Who am I? Alexei Cioban Experience in IT 13 years CEO & Founder IT-LAB 7 years IT trainings 5 years 2 About company Year of foundation - 2007 12 employees www.it-lab.md
How To Set Up Foglight Nms For A Proof Of Concept
Page 1 of 5 Foglight NMS Overview Foglight Network Management System (NMS) is a robust and complete network monitoring solution that allows you to thoroughly and efficiently manage your network. It is
nfdump and NfSen 18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH
18 th Annual FIRST Conference June 25-30, 2006 Baltimore Peter Haag 2006 SWITCH Some operational questions, popping up now and then: Do you see this peek on port 445 as well? What caused this peek on your
ICND2 NetFlow. Question 1. What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring. B.
ICND2 NetFlow Question 1 What are the benefit of using Netflow? (Choose three) A. Network, Application & User Monitoring B. Network Planning C. Security Analysis D. Accounting/Billing Answer: A C D NetFlow
and reporting Slavko Gajin [email protected]
ICmyNet.Flow: NetFlow based traffic investigation, analysis, and reporting Slavko Gajin [email protected] AMRES Academic Network of Serbia RCUB - Belgrade University Computer Center ETF Faculty
Network Monitoring and Traffic CSTNET, CNIC
Network Monitoring and Traffic Analysis in CSTNET Chunjing Han Aug. 2013 CSTNET, CNIC Topics 1. The background of network monitoring 2. Network monitoring protocols and related tools 3. Network monitoring
Network Management & Monitoring Overview
Network Management & Monitoring Overview Unix & Network Management June 16-18 Papeete, French Polynesia Hervey Allen, Phil Regnauld Introduction This is a big topic... We'll try to respond to what you
CAREN NOC MONITORING AND SECURITY
CAREN CAREN Manager: Zarlyk Jumabek uulu 1-2 OCTOBER 2014 ALMATY, KAZAKHSTAN Copyright 2010 CAREN / Doc ID : PS01102014 / Address : Chui ave, 265a, Bishkek, The Kyrgyz Republic Tel: +996 312 900275 website:
Maintaining Non-Stop Services with Multi Layer Monitoring
Maintaining Non-Stop Services with Multi Layer Monitoring Lahav Savir System Architect and CEO of Emind Systems [email protected] www.emindsys.com The approach Non-stop applications can t leave on their
Monitoring backbone networks
R O N E N N M A N I A D U C A T I O E T W O R K Ro Net Edu Monitoring backbone networks Manuel Șubredu, Valeriu Vraciu RoEduNet Chișinău, September 9, 2014 Agenda Why? What? How? Tools? Facts! Why? A picture
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump
Network forensics 101 Network monitoring with Netflow, nfsen + nfdump www.enisa.europa.eu Agenda Intro to netflow Metrics Toolbox (Nfsen + Nfdump) Demo www.enisa.europa.eu 2 What is Netflow Netflow = Netflow
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA
Viete, čo robia Vaši užívatelia na sieti? Roman Tuchyňa, CSA What is ReporterAnalyzer? ReporterAnalyzer gives network professionals insight into how application traffic is impacting network performance.
Network monitoring systems & tools
Network monitoring systems & tools Network & Service Monitoring tools Nagios server and service monitor Can monitor pretty much anything HTTP, SMTP, DNS, Disk space, CPU usage,... Easy to write new plugins
How To Create A Network Monitoring System (Flowmon) In Avea-Tech (For Free)
Network Traffic Performance & Security Monitoring Project proposal minimal project Orsenna;Invea-Tech FLOWMON PROBES 1000 & 100 Contents 1. Introduction... 2 1.1. General System Requirements... 2 1.2.
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag
Watch your Flows with NfSen and NFDUMP 50th RIPE Meeting May 3, 2005 Stockholm Peter Haag 2005 SWITCH What I am going to present: The Motivation. What are NfSen and nfdump? The Tools in Action. Outlook
Introduction to Network Monitoring and Management
Introduction to Network Monitoring and Management Jonathan Brewer Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International
Network Monitoring and Management Introduction to Networking Monitoring and Management
Network Monitoring and Management Introduction to Networking Monitoring and Management These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
One software solution to monitor your entire network, including devices, applications traffic and availability.
One software solution to monitor your entire network, including devices, applications traffic and availability. About Britannic Expert Integrators We are award winning specialists in IP communications,
Network Monitoring. Easy, failsafe, and complete visibility of your network. Our customers have the same view as our NOC technicians.
One software solution to monitor your entire network, including devices, applications, traffic, and availability. Network monitoring is the constant evaluation fo your systems performance within the IT
Report of Independent Auditors
Ernst & Young LLP Suite 3300 370 17th Street Denver, Colorado 80202-5663 Tel: +1 720 931 4000 Fax: +1 720 931 4444 www.ey.com Report of Independent Auditors To the Management of NTT America, Inc.: We have
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY
CISCO INFORMATION TECHNOLOGY AT WORK CASE STUDY: CISCO IOS NETFLOW TECHNOLOGY CISCO INFORMATION TECHNOLOGY SEPTEMBER 2004 1 Overview Challenge To troubleshoot capacity and quality problems and to understand
Flow Based Traffic Analysis
Flow based Traffic Analysis Muraleedharan N C-DAC Bangalore Electronics City [email protected] Challenges in Packet level traffic Analysis Network traffic grows in volume and complexity Capture and decode
A FAULT MANAGEMENT WHITEPAPER
ManageEngine OpManager A FAULT MANAGEMENT WHITEPAPER Fault Management Perception The common perception of fault management is identifying all the events. This, however, is not true. There is more to it
Network Management Deployment Guide
Smart Business Architecture Borderless Networks for Midsized organizations Network Management Deployment Guide Revision: H1CY10 Cisco Smart Business Architecture Borderless Networks for Midsized organizations
Service Description DDoS Mitigation Service
Service Description DDoS Mitigation Service Interoute, Walbrook Building, 195 Marsh Wall, London, E14 9SG, UK Tel: +800 4683 7681 Email: [email protected] Contents Contents 1 Introduction...3 2 An Overview...3
Gaining Operational Efficiencies with the Enterasys S-Series
Gaining Operational Efficiencies with the Enterasys S-Series Hi-Fidelity NetFlow There is nothing more important than our customers. Gaining Operational Efficiencies with the Enterasys S-Series Introduction
Cisco IOS Flexible NetFlow Technology
Cisco IOS Flexible NetFlow Technology Last Updated: December 2008 The Challenge: The ability to characterize IP traffic and understand the origin, the traffic destination, the time of day, the application
Network Management & Monitoring Overview
Network Management & Monitoring Overview PacNOG 6 November 17, 2009 Nadi, Fiji [email protected] Introduction This is a big topic... There are a lot of tools to choose from: - Open Source - Commercial -
The use of SNMP and other network management tools in UNINETT. Arne Øslebø [email protected] March 4, 2014
The use of SNMP and other network management tools in UNINETT Arne Øslebø [email protected] March 4, 2014 1 UNINETTs network GEANT 3 4 What is monitored? Link status Are all connections up? General
Cisco Bandwidth Quality Manager 3.1
Cisco Bandwidth Quality Manager 3.1 Product Overview Providing the required quality of service (QoS) to applications on a wide-area access network consistently and reliably is increasingly becoming a challenge.
Towards Smart and Intelligent SDN Controller
Towards Smart and Intelligent SDN Controller - Through the Generic, Extensible, and Elastic Time Series Data Repository (TSDR) YuLing Chen, Dell Inc. Rajesh Narayanan, Dell Inc. Sharon Aicler, Cisco Systems
Security Toolsets for ISP Defense
Security Toolsets for ISP Defense Backbone Practices Authored by Timothy A Battles (AT&T IP Network Security) What s our goal? To provide protection against anomalous traffic for our network and it s customers.
Network Management & Monitoring Overview
Network Management & Monitoring Overview Advanced cctld Workshop September, 2008, Holland What is network management? System & Service monitoring Reachability, availability Resource measurement/monitoring
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools
Case Study: Instrumenting a Network for NetFlow Security Visualization Tools William Yurcik* Yifan Li SIFT Research Group National Center for Supercomputing Applications (NCSA) University of Illinois at
Best of Breed of an ITIL based IT Monitoring. The System Management strategy of NetEye
Best of Breed of an ITIL based IT Monitoring The System Management strategy of NetEye by Georg Kostner 5/11/2012 1 IT Services and IT Service Management IT Services means provisioning of added value for
The ntop Project: Open Source Network Monitoring
The ntop Project: Open Source Network Monitoring Luca Deri 1 Agenda 1. What can ntop do for me? 2. ntop and network security 3. Integration with commercial protocols 4. Embedding ntop 5. Work in
PANDORA FMS NETWORK DEVICES MONITORING
NETWORK DEVICES MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS can monitor all the network devices available in the market, like Routers, Switches, Modems, Access points,
The Value of Flow Data for Peering Decisions
The Value of Flow Data for Peering Decisions Hurricane Electric IPv6 Native Backbone Massive Peering! Martin J. Levy Director, IPv6 Strategy Hurricane Electric 22 nd August 2012 Introduction Goal of this
Technology Highlights Of. (Medusa)
Technology Highlights Of CQCloud s NG-SIEM (Medusa) Table of Contents 1. Genesis of Medusa 2. Philosophy of Medusa 3. Medusa At a Glance 4. Medusa Overview 5. Benefits 6. Implementations 1 1. Genesis of
The Purview Solution Integration With Splunk
The Purview Solution Integration With Splunk Integrating Application Management and Business Analytics With Other IT Management Systems A SOLUTION WHITE PAPER WHITE PAPER Introduction Purview Integration
How NOC manages and controls inter-domain traffic? 5 th tf-noc meeting, Dubrovnik [email protected]
How NOC manages and controls inter-domain traffic? 5 th tf-noc meeting, Dubrovnik [email protected] Agenda Inter-domain traffic: o how does NOC monitor and control it? Common case as example: new BGP
Network Monitoring. Review of Software
Network Monitoring Review of Software Components Network Discovery Availability monitoring Alerting system Service Monitoring Network Performance Asset Control Version Control Configuration Management
Network Monitoring and Management NetFlow Overview
Network Monitoring and Management NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
Network Monitoring. Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
Network Monitoring Sebastian Büttrich, [email protected] NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste http://creativecommons.org/licenses/by-nc-sa/3.0/ Agenda What is network
PANDORA FMS NETWORK DEVICE MONITORING
NETWORK DEVICE MONITORING pag. 2 INTRODUCTION This document aims to explain how Pandora FMS is able to monitor all network devices available on the marke such as Routers, Switches, Modems, Access points,
Network Performance Monitoring at Minimal Capex
Network Performance Monitoring at Minimal Capex Some Cisco IOS technologies you can use to create a high performance network Don Thomas Jacob Technical Marketing Engineer About ManageEngine Network Servers
Extending Network Visibility by Leveraging NetFlow and sflow Technologies
Extending Network Visibility by Leveraging and sflow Technologies This paper shows how a network analyzer that can leverage and sflow technologies can provide extended visibility into enterprise networks
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
Take the NetFlow Challenge!
TM Scrutinizer NetFlow and sflow Analysis Scrutinizer is a NetFlow and sflow analyzer that provides another layer of cyber threat detection and incredibly detailed network utilization information about
SolarWinds Certified Professional. Exam Preparation Guide
SolarWinds Certified Professional Exam Preparation Guide Introduction The SolarWinds Certified Professional (SCP) exam is designed to test your knowledge of general networking management topics and how
VCS Monitoring and Troubleshooting Using Brocade Network Advisor
VCS Monitoring and Troubleshooting Using Brocade Network Advisor Brocade Network Advisor is a unified network management platform to manage the entire Brocade network, including both SAN and IP products.
Edge Configuration Series Reporting Overview
Reporting Edge Configuration Series Reporting Overview The Reporting portion of the Edge appliance provides a number of enhanced network monitoring and reporting capabilities. WAN Reporting Provides detailed
Delivering actionable service knowledge
Delivering actionable service knowledge Converged Infrastructure Monitoring and Management (CIM 2 ) Delivering actionable service knowledge Converged Infrastructure Monitoring & Management (CIM 2 ) from
How To Use Mindarray For Business
Minder Network Performance Monitoring Monitor everything about your Network performance Discover, visualize and monitor your complete IT Infrastructure in less than an hour. Mindarray s Minder is a powerful
Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard. January 2009. Cristian Velciov. [email protected] (+40) 721 250246
Analyzed compe.tors Cisco RadWare Top Layer RioRey IntruGuard January 2009 Cristian Velciov [email protected] (+40) 721 250246 Andrisoft Solution WANGuard Platform is an enterprise-grade Linux-based software
ZABBIX. An Enterprise-Class Open Source Distributed Monitoring Solution. Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009
ZABBIX An Enterprise-Class Open Source Distributed Monitoring Solution Takanori Suzuki MIRACLE LINUX CORPORATION October 22, 2009 Outline Biography ZABBIX New release ZABBIX 1.8 Activity in Japan Biography
PRTG NETWORK MONITOR. Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come.
PRTG NETWORK MONITOR Installed in Seconds. Configured in Minutes. Masters Your Network for Years to Come. PRTG Network Monitor is... NETWORK MONITORING Network monitoring continuously collects current
DDoS Attacks. An open-source recipe to improve fast detection and automate mitigation techniques
DDoS Attacks An open-source recipe to improve fast detection and automate mitigation techniques Vicente De Luca Sr. Network Engineer [email protected] AS21880 / AS61186 Introduction Tentative to solve:
TPAf KTl Pen source. System Monitoring. Zenoss Core 3.x Network and
Zenoss Core 3.x Network and System Monitoring A step-by-step guide to configuring, using, and adapting this free Open Source network monitoring system Michael Badger TPAf KTl Pen source I I flli\ I I community
Get Your FIX: Flow Information export Analysis and Visualization
Get Your FIX: Flow Information export Analysis and Visualization Joint Techs Workshop, Madison, Wisconsin, July 19, 2006 Dave Plonka [email protected] Division of Information Technology, Computer Sciences
How To Monitor Bandwidth On A Computer Network
Bandwidth Monitoring Tools Abhishek Sinha [I], Nishant Kumar [II] I Department of Computer Science and Engg.,SSIET, DeraBassi (Punjab), II Scientist, DESIDOC (DRDO) I [email protected], II [email protected]
Data Analysis Load Balancer
Data Analysis Load Balancer Design Document: Version: 1.0 Last saved by Chris Small April 12, 2010 Abstract: The project is to design a mechanism to load balance network traffic over multiple different
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík
Network Security Monitoring and Behavior Analysis Pavel Čeleda, Petr Velan, Tomáš Jirsík {celeda velan jirsik}@ics.muni.cz Part I Introduction P. Čeleda et al. Network Security Monitoring and Behavior
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
Connecting North Carolina s Future Today. Application Monitoring: ClassScape Case Study. NCSU Centennial Networking Lab
Connecting North Carolina s Future Today Application Monitoring: ClassScape Case Study John Bass NCSU Centennial Networking Lab Carla S. Hunt MCNC 1 Overview About MCNC and the School Connectivity Initiative
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be.
pt360 FREE Tool Suite Networks are complicated. Network management doesn t have to be. pt360 FREE Tool Suite - At a Glance PacketTrap Networks November, 2009 PacketTrap's pt360 FREE Tool Suite consolidates
SapphireIMS 4.0 BSM Feature Specification
SapphireIMS 4.0 BSM Feature Specification v1.4 All rights reserved. COPYRIGHT NOTICE AND DISCLAIMER No parts of this document may be reproduced in any form without the express written permission of Tecknodreams
Ranch Networks for Hosted Data Centers
Ranch Networks for Hosted Data Centers Internet Zone RN20 Server Farm DNS Zone DNS Server Farm FTP Zone FTP Server Farm Customer 1 Customer 2 L2 Switch Customer 3 Customer 4 Customer 5 Customer 6 Ranch
NetFlow/IPFIX Various Thoughts
NetFlow/IPFIX Various Thoughts Paul Aitken & Benoit Claise 3 rd NMRG Workshop on NetFlow/IPFIX Usage in Network Management, July 2010 1 B #1 Application Visibility Business Case NetFlow (L3/L4) DPI Application
Introduction to Netflow
Introduction to Netflow Mike Jager Network Startup Resource Center [email protected] These materials are licensed under the Creative Commons Attribution-NonCommercial 4.0 International license (http://creativecommons.org/licenses/by-nc/4.0/)
WhatsUp Gold vs. Orion
Gold vs. Building the network management solution that will work for you is very easy with the Gold family just mix-and-match the Gold plug-ins that you need (WhatsVirtual, WhatsConnected, Flow Monitor,
An overview of traffic analysis using NetFlow
The LOBSTER project An overview of traffic analysis using NetFlow Arne Øslebø UNINETT [email protected] 1 Outline What is Netflow? Available tools Collecting Processing Detailed analysis security
CARENET-SE. NOC Tools Review. Communication System Design Summer 2010. Project team. Champion Björn Pehrson Coach Hans Eriksson
NOC Tools Review CARENET-SE Communication System Design Summer 2010 Project team IK2207 Alin Pastrama [email protected] Champion Björn Pehrson Coach Hans Eriksson IK2207 Annika Holmgren [email protected]
StableNet Enterprise. Automated IT Management & Business Service Assurance
StableNet Enterprise Automated IT Management & Business Service Assurance Our Strengths Innovation & Quality About Infosim Infosim is a leading manufacturer of automated Service Fulfillment and Service
Network Management & Monitoring
Network Management & Monitoring NetFlow Overview These materials are licensed under the Creative Commons Attribution-Noncommercial 3.0 Unported license (http://creativecommons.org/licenses/by-nc/3.0/)
DDoS Mitigation Techniques
DDoS Mitigation Techniques Ron Winward, ServerCentral CHI-NOG 03 06/14/14 Consistent Bottlenecks in DDoS Attacks 1. The server that is under attack 2. The firewall in front of the network 3. The internet
PROFESSIONAL SECURITY SYSTEMS
PROFESSIONAL SECURITY SYSTEMS Security policy, active protection against network attacks and management of IDP Introduction Intrusion Detection and Prevention (IDP ) is a new generation of network security
Open Source in Network Administration: the ntop Project
Open Source in Network Administration: the ntop Project Luca Deri 1 Project History Started in 1997 as monitoring application for the Univ. of Pisa 1998: First public release v 0.4 (GPL2) 1999-2002:
Beyond Monitoring Root-Cause Analysis
WHITE PAPER With the introduction of NetFlow and similar flow-based technologies, solutions based on flow-based data have become the most popular methods of network monitoring. While effective, flow-based
TDC s perspective on DDoS threats
TDC s perspective on DDoS threats DDoS Dagen Stockholm March 2013 Lars Højberg, Technical Security Manager, TDC TDC in Sweden TDC in the Nordics 9 300 employees (2012) Turnover: 26,1 billion DKK (2012)
NetFlow: What is it, why and how to use it? Miloš Zeković, [email protected]. ICmyNet Chief Customer Officer Soneco d.o.o.
NetFlow: What is it, why and how to use it?, [email protected] Soneco d.o.o. Serbia Agenda What is NetFlow? What are the benefits? How to deploy NetFlow? Questions 2 / 22 What is NetFlow? NetFlow
GeNiEnd2End Network 24/7 end-to-end Quality of Service Monitoring. 3. Performance OK
GeNiEnd2End Network 24/7 end-to-end Quality of Service Monitoring 1. 2. 3. Performance OK The visibility gap End users complaining about IT performance What do you think... how often are end user performance
Cisco NetFlow TM Briefing Paper. Release 2.2 Monday, 02 August 2004
Cisco NetFlow TM Briefing Paper Release 2.2 Monday, 02 August 2004 Contents EXECUTIVE SUMMARY...3 THE PROBLEM...3 THE TRADITIONAL SOLUTIONS...4 COMPARISON WITH OTHER TECHNIQUES...6 CISCO NETFLOW OVERVIEW...7
A SURVEY ON AUTOMATED SERVER MONITORING
A SURVEY ON AUTOMATED SERVER MONITORING S.Priscilla Florence Persis B.Tech IT III year SNS College of Engineering,Coimbatore. [email protected] Abstract This paper covers the automatic way of server
Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance
White Paper Redefine Network Visibility in the Data Center with the Cisco NetFlow Generation Appliance What You Will Learn Modern data centers power businesses through a new generation of applications,
RUGGEDCOM NMS. Monitor Availability Quick detection of network failures at the port and
RUGGEDCOM NMS is fully-featured enterprise grade network management software based on the OpenNMS platform. Specifically for the rugged communications industry, RNMS provides a comprehensive platform for
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE
E-Guide NETWORKING MONITORING BEST PRACTICES: SETTING A NETWORK PERFORMANCE BASELINE W hy the need for a baseline? A baseline is a set of metrics used in network performance monitoring to define the normal
Scalable and Reliable control and Management for SDN-based Large-scale Networks. CJK Workshop @ CFI2014 2014. 06.18.
Scalable and Reliable control and Management for SDN-based Large-scale Networks CJK Workshop @ CFI2014 2014. 06.18. Taesang Choi ETRI Traditional Control & Network Management Architecture NETWORK MANAGEMENT
FortiDDos Size isn t everything
FortiDDos Size isn t everything Martijn Duijm Director Sales Engineering April - 2015 Copyright Fortinet Inc. All rights reserved. Agenda 1. DDoS In The News 2. Drawing the Demarcation Line - Does One
Packet Sampling and Network Monitoring
Packet Sampling and Network Monitoring CERN openlab Monthly Technical Meeting 13 th November, 2007 Milosz Marian Hulboj [email protected] Ryszard Erazm Jurga [email protected] What is Network
Capacity Management Plan
Capacity Management Plan Hughes is selected for two categories to provide service: Fixed Satellite Services Small Office/Home Office (SOHO) services In the context of those two services categories, for
Introduction to Network Discovery and Identity
The following topics provide an introduction to network discovery and identity policies and data: Host, Application, and User Detection, page 1 Uses for Host, Application, and User Discovery and Identity
Benefits. Product Overview. There is nothing more important than our customers. DATASHEET
DATASHEET Security Information & Event Manager (SIEM) Compliance through Security Information and Event Management, Log Management, and Network Behavioral Analysis Product Overview Delivers fast, accurate
