By: Samuel Oswald Hunter Supervisor: Mr Barry Irwin

Slides:



Advertisements
Similar presentations
Monitoring and System Management in Distributed Environment (Hajautettujen Tietojärjestelmien Hallinta ja Valvonta) S Tietoverkkotekniikan diplomityöseminaari.
Advertisements

Dashboards Slide by ana’s presentation. Tired of these challenges? No centralized view of executive information from multiple functional areas and systems;
Facetted browsing of Swedish historical population statistics (SHiPS)
Networking Problems in Cloud Computing Projects. 2 Kickass: Implementation PROJECT 1.
Program Systems Institute RAS FLAME FunctionaL Active Monitoring Environment.
ClassBench: A Packet Classification Benchmark
Stealth Network Strategies: Offensive and Defensive Mark Loveless RAZOR Security BindView Corporation.
A flexible data processing and reporting system for packet capture files Ignus van Zyl (Iggy) Overlord Supervisor: Barry Irwin.
Copyright © 2005 Department of Computer Science CPSC 641 Winter WAN Traffic Measurements There have been several studies of wide area network traffic.
Internet Traffic Patterns Learning outcomes –Be aware of how information is transmitted on the Internet –Understand the concept of Internet traffic –Identify.
Data Sources Data Warehouse Analysis Results Data visualisation Analytical tools OLAP Data Mining Overview of Business Intelligence Data visualisation.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
GIS & GI Science Lecture 1. What is GIS Geographic Information Systems  Definitions  “A powerful set of tools for storing and retrieving at will, transforming.
Testing Intrusion Detection Systems: A Critic for the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory By.
1 WAN Measurements Carey Williamson Department of Computer Science University of Calgary.
Agent-based Dynamic Activity Planning and Travel Scheduling (ADAPTS) Model  ADAPTS scheduling process model: –Simulation of how activities are planned.
Distributed Data Analysis & Dissemination System (D-DADS) Prepared by Stefan Falke Rudolf Husar Bret Schichtel June 2000.
Georg-Christian Pranschke Supervisor: Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University AUTOMATED FIREWALL.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Using SAS® Information Map Studio
Enterprise Reporting Solution
Linux Networking and Security
A Virtual Honeypot Framework Niels Provos Google, Inc. The 13th USENIX Security Symposium, August 9–13, 2004 San Diego, CA Presented by: Sean Mondesire.
Management of the LHCb DAQ Network Guoming Liu * †, Niko Neufeld * * CERN, Switzerland † University of Ferrara, Italy.
Verify that timestamps for debugging and logging messages has been enabled. Verify the severity level of events that are being captured. Verify that the.
TOWARDS A FLEXIBLE DATA PROCESSING AND REPORTING STRUCTURE FOR PACKET CAPTURE FILES V 3.0.
Copyright 1999, S.D. Personick. All Rights Reserved. Telecommunications Networking II Lecture 34 Routing Algorithms Ref: Tanenbaum pp ;
Routing and Routing Protocols
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
Routing Security in Wireless Ad Hoc Networks Chris Zingraf, Charisse Scott, Eileen Hindmon.
Distributed Data Analysis & Dissemination System (D-DADS ) Special Interest Group on Data Integration June 2000.
CERN IT Department CH-1211 Genève 23 Switzerland t CERN IT Monitoring and Data Analytics Pedro Andrade (IT-GT) Openlab Workshop on Data Analytics.
Top-k Queries in Wireless Sensor Networks Amber Faucett, Dr. Longzhuang Li, In today’s world, wireless.
Characteristics of Internet Background Radiation ACM Internet Measurement Conference (IMC), 2004 Authors: Ruoming Pang, Vinod Yegneswaran, Paul Barford,
1 Scalability and Accuracy in a Large-Scale Network Emulator Nov. 12, 2003 Byung-Gon Chun.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
V4 traversal for IPv6 mobility protocols - Scenarios Mip6trans Design Team MIP6 and NEMO WGs, IETF 63.
Copyright © 2006, Oracle. All rights reserved Oracle Web Services Manager.
Big Data & Test Automation
Routing and Addressing in Next-Generation EnteRprises (RANGER)
Adobe Digital Marketing
Project JXTA By Jude Mercado.
Agenda – Morning Session
WP18, High-speed data recording Krzysztof Wrona, European XFEL
draft-white-i2rs-use-case-02
資料通訊與網路 教授: 吳照輝 助教: 鄺福全.
Craig Koorn Supervisors: Barry Irwin Alan Herbert
What contribution can automated reasoning make to e-Science?
Chapter 4: Routing Concepts
Routing.
DDoS Attack Detection under SDN Context
Adhoc and Wireless Sensor Networks
RF Gradient Data And Reporting Tools
CPSC 641: WAN Measurement Carey Williamson
File Transfer Issues with TCP Acceleration with FileCatalyst
Wireshark CSC8510 David Sivieri.
Carey Williamson Department of Computer Science University of Calgary
Power BI at Enterprise-Scale
By Seferash B Asfa Wossen Strayer University 3rd December 2003
Towards Unified Management
Autonomous Network Alerting Systems and Programmable Networks
Request for Comments(RFC) 3489
Routing.
WCF Data Services and Silverlight
Hao Hu, Luo Qi, Fazhi Qi IHEP 22 Mar. 2018
Overview: Chapter 2 Localization and Tracking
Ponder policy toolkit Jovana Balkoski, Rashid Mijumbi
Presentation transcript:

By: Samuel Oswald Hunter Supervisor: Mr Barry Irwin Automated Analysis and Aggregation of Packet Data over Distributed Network Telescopes By: Samuel Oswald Hunter Supervisor: Mr Barry Irwin

Background Project Background Network telescopes passively collect packet data. Packet data is filtered and added to a central database. Packet’s are then analysed according to pre-determined security metrics (more on these metrics later). Interactive and dynamic visual representation of data. Allow for representation of large amounts of data and grants the ability to observe finer details of that information. Fast, accurate and informative data traversal. Enables us to show trends. Background

Project Objectives Project Objectives Create a framework to aggregate packet data between network telescopes to a central management node. Management node will perform processing on incoming datasets to generate use full outputs such as: Real-time black hole lists (RBL). Border Gateway Protocol (BGP) maps. Create a dashboard application that can analyse and generate reports based on the collected packet data. Must generate automated periodic reports and visual representations of the packet analysis. Allow browsing of historical data and some ad-hoc queries.

Proposed Security Metrics Source to target geographical locations. Break down composition of protocols used (TCP, UDP, ICMP) Target and Source port numbers Density of packets (amount) captured over time. (Traffic Rates)

Approach and Development Further research in data visualization techniques Interactive and dynamic representation Security Metrics Research what other information can be determined How this information can be used Application Development Php Python Adobe AIR Ajax Flash Tools and Approach

Questions Questions