(NetOS Meeting Randomlette) Christian Kreibich ICSI + Bro a.k.a. What I Did Last Summer.

Slides:



Advertisements
Similar presentations
Last Class: Clock Synchronization
Advertisements

Detecting Forged TCP Reset Packets Authors: Nicholas Weaver, Robin Sommer, Vern Paxon Presented by: Anuj Kalia, Shashank Gupta.
FEDERATED TEST-BEDS FOR LARGE SCALE INFRASTRUCTURE EXPERIMENTS.
Distributed Network Control for Optical Networks Presented by, Sree Rama Nomula
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Distributed Coloring in Õ(  log n) Bit Rounds COST 293 GRAAL and.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 16th Lecture Christian Schindelhauer.
By Tracey Windley and Jasper Nance Professor Herb Hess Kevin Buck 2006 ASEE Annual Conference 6/19/2006 Instant Data Gathering, Processing, and Display.
1 University of Freiburg Computer Networks and Telematics Prof. Christian Schindelhauer Wireless Sensor Networks 15th Lecture Christian Schindelhauer.
Computer Science Lecture 11, page 1 CS677: Distributed OS Last Class: Clock Synchronization Logical clocks Vector clocks Global state.
World Wide Wireless By Chip Bowman World Wide Wireless By Chip Bowman.
Chais, Feb. 2006Communities1 Mechanisms of Internet-based Collaborations Complex Network Analysis Approach Reuven Aviv, Chais Research Center & Department.
Bit Complexity of Breaking and Achieving Symmetry in Chains and Rings.
Scalable Secure Bidirectional Group Communication Yitao Duan and John Canny Berkeley Institute of Design Computer Science.
CS 1 – Introduction to Computer Science Introduction to the wonderful world of Dr. T Dr. Daniel Tauritz.
Intrusion Detection Systems. Definitions Intrusion –A set of actions aimed to compromise the security goals, namely Integrity, confidentiality, or availability,
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Sechang Son Computer Sciences Department University of Wisconsin-Madison Network Bandwidth Regulation.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Understanding the Host-to-Host Communications Model.
Intrusion Prevention, Detection & Response. IDS vs IPS IDS = Intrusion detection system IPS = intrusion prevention system.
Client – Server Architecture A Basic Introduction Kathleen R. Murray, Ph.D. May 2002.
The Internet is a vast network connecting computers all over the world
Chap 10 Routing and Addressing Andres, Wen-Yuan Liao Department of Computer Science and Engineering De Lin Institute of Technology
Shunting: Detecting and Blocking Network Attacks at Ultra-High SpeedsVern Paxson, Nicholas Weaver, and José María González Shunting: Detecting and Blocking.
Developing RFID Application In Supply Chain
Distributed Computing 5. Synchronization Shmuel Zaks ©
Matching TCP/IP Packet to Detect Stepping-stone Intrusion Jianhua Yang TSYS School of Computer Science Edward Bosworth Center for Information Assurance.
Fast Portscan Detection Using Sequential Hypothesis Testing Authors: Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan Publication: IEEE.
1 Accountability Politics and Quality in Higher Education New approaches for the 21 st Century ESRUC Conference – Atatürk University – ERZURUM May.28-30,
Building a Simple Serial Network © 2004 Cisco Systems, Inc. All rights reserved. Understanding the OSI Model INTRO v2.0—1-1.
The upcoming World Food Summit serves as an important opportunity to reconsider the primary importance of agriculture - and the amount to which the global.
University of Kaiserslautern Department of Computer Science Integrated Communication Systems ICSY Selection of Communication Services.
INTERNATIONALA CONFERENCE Security and Defence R&D Management: Policy, Concepts and Models R&D HUMAN CAPITAL POLICY ASSISTANT PROFESSOR KONSTANTIN POUDIN.
CSC Intro. to Computing Lecture 23: Networks.
A Framework for Packe Trace Manipulation Christian Kreibich.
1 What is the history of the Internet? ARPANET (Advanced Research Projects Agency Network) TCP/IP (Transmission Control Protocol/Internet Protocol) NSFNET.
Welcome to Public Libraries in Finland. It is owned by the City It is free, you do not need money You need no library card when you enter the building.
Prophet Address Allocation for Large Scale MANETs Matt W. Mutka Dept. of Computer Science & Engineering Michigan State University East Lansing, USA IEEE.
Rapid Content Distribution Using An Ordered Seeding Torrent Raja Naresh Dr. Javed Khan Media Communications Networking Research Lab Kent State University.
ACM SIGACT News Distributed Computing Column 9 Abstract This paper covers the distributed systems issues, concentrating on some problems related to distributed.
Collision-free Time Slot Reuse in Multi-hop Wireless Sensor Networks
A Framework for Packe Trace Manipulation Christian Kreibich.
INTELLIGENT SYSTEMS AND INFORMATION SOCIETY M. Gams Institut Jožef Stefan Ljubljana University.
1 Multiagent Teamwork: Analyzing the Optimality and Complexity of Key Theories and Models David V. Pynadath and Milind Tambe Information Sciences Institute.
1 Flexible, High-Speed Intrusion Detection Using Bro Vern Paxson Computational Research Division Lawrence Berkeley National Laboratory and ICSI Center.
Distributed Spanning Tree Center for Information Security Department of Computer Science University of Tulsa, Tulsa, OK
The Relation Between Speech Intelligibility and The Complex Modulation Spectrum Steven Greenberg International Computer Science Institute 1947 Center Street,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Community Clustering in Distributed Publish/Subscribe System Wei Li 1,2,Songlin Hu 1, Jintao Li 1, Hans-Arno Jacobsen 3 1 Institute of Computing Technology,
Jaroslaw Kutylowski 1 HEINZ NIXDORF INSTITUTE University of Paderborn Algorithms and Complexity Maintaining Communication Between an Explorer and a Base.
ETH Zurich – Distributed Computing Group Stephan Holzer 1ETH Zurich – Distributed Computing – Stephan Holzer Yvonne Anne Pignolet Jasmin.
Programming & Software Development Pathway Antonio Rangel 5 th Period.
Computer Networks Spring, 2011 Group Projects Guifeng Zheng.
Ethernet Basics – 7 IP Addressing. Introducing IP Addressing  IP address (TCP/IP address)  Not unique (but should be), user assigned  Layer 3  4 byte.
Preparing for Networking Events Standing out in the crowd for all the right reasons Kerry Kidwell-Slak Associate Director
Computer Security Course Syllabus 1 Computer Security Lecturer : H.Ben Othmen.
Options for Internet Access in Nigerian Tertiary Institutions Sunday A. Folayan General Data Engineering Services [SKANNET]
1 Connecting Schools: the Portuguese Experience Bad Nauheim 17 June 2003.
Scalable and Distributed GPS free positioning for Sensor Networks Rajagopal Iyengear and Biplab Sikdar IEEE International Conference on Communications.
Tiina Forsman SULATIS SEMINAR ON RESEARCHER MOBILITY IN COMPUTATIONAL SCIENCES Espoo, 10 November 2010 International Insitute for Applied Systems Analysis,
Libraries as Data-Centers for the Arts and Humanities
Social Studies Themes.
Learning Feature Mappings Using Evolutionary Computation
CPSC 641: WAN Measurement Carey Williamson
Department of Computer Science University of York
Nanotechnology/Nanoscience Education Connections
Networking Strategy for the Development of Quality Assurance and Accreditation Policy in Higher Education: A comparative study between Kingdom of Bahrain.
Carey Williamson Department of Computer Science University of Calgary
Speech Bubble Template
Presentation transcript:

(NetOS Meeting Randomlette) Christian Kreibich ICSI + Bro a.k.a. What I Did Last Summer

International Computer Science Institute  In Berkeley (yay!)  Affiliated with University  Institutions pay them lots of money so they can send people there  Finland, Germany, Spain, Switzerland,...  Networks group: weekly group meetings with free food (yay!)  Also: AI, Algorithms, Speech, Berkeley Center for Information Society  Bit over 100 people

International Computer Science Institute

Bro IDS  Network-based IDS, Paxson ‘99  Separation of mechanism from policy  Good: (lots), bad: grown, complex  Lots of momentum thanks to DOE money  Current work: distributed communication, global state, usability  Deployments: ICSI, LBL, TUM  Useful for traffic analysis: one-line connection summaries 