Monitoring Network Bias

Slides:



Advertisements
Similar presentations
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Advertisements

High Speed Networks Budapest University of Technology and Economics High Speed Networks Laboratory Monitoring Network.
Network+ Guide to Networks, Fourth Edition
One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
1 Internet Networking Spring 2004 Tutorial 13 LSNAT - Load Sharing NAT (RFC 2391)
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin.
Progress Report 11/1/01 Matt Bridges. Overview Data collection and analysis tool for web site traffic Lets website administrators know who is on their.
Phalanx: Withstanding (?) Multimillion-Node (?) Botnets Paper by Colin Dixon, Thomas Anderson and Arvind Krishnamurthy NSDI ‘08 ?? by Mark Ison and Gergely.
Measurement and Diagnosis of Address Misconfigured P2P traffic Zhichun Li, Anup Goyal, Yan Chen and Aleksandar Kuzmanovic Lab for Internet and Security.
How Clients and Servers Work Together. Objectives Learn about the interaction of clients and servers Explore the features and functions of Web servers.
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
Unconstrained Endpoint Profiling (Googling the Internet)‏ Ionut Trestian Supranamaya Ranjan Aleksandar Kuzmanovic Antonio Nucci Northwestern University.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #12 LSNAT - Load Sharing NAT (RFC 2391)
 Proxy Servers are software that act as intermediaries between client and servers on the Internet.  They help users on private networks get information.
COMPUTER TERMS PART 1. COOKIE A cookie is a small amount of data generated by a website and saved by your web browser. Its purpose is to remember information.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
INTRODUCTION TO WEB DATABASE PROGRAMMING
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
1 One-Click Hosting Services: A File-Sharing Hideout Demetris Antoniades Evangelos P. Markatos ICS-FORTH Heraklion,
Databases and the Internet. Lecture Objectives Databases and the Internet Characteristics and Benefits of Internet Server-Side vs. Client-Side Special.
Chapter 16 The World Wide Web Chapter Goals Compare and contrast the Internet and the World Wide Web Describe general Web processing Describe several.
Chapter 10 Intro to Routing & Switching.  Upon completion of this chapter, you should be able to:  Explain how the functions of the application layer,
IDS Intrusion Detection Systems CERT definition: A combination of hardware and software that monitors and collects system and network information and analyzes.
PrimoGENI Tutorial Miguel Erazo, Neil Goldman, Nathanael Van Vorst, and Jason Liu Florida International University Other project participants: Julio Ibarra.
The Internet  Internet Hardware connected together Creates a massive worldwide network  Hardware Computers Communication lines  Interlinked collection.
1 Welcome to CSC 301 Web Programming Charles Frank.
Module 10: How Middleboxes Impact Performance
Unconstrained Endpoint Profiling Googling the Internet Ionut Trestian, Supranamaya Ranjan, Alekandar Kuzmanovic, Antonio Nucci Reviewed by Lee Young Soo.
NETWORKING FUNDAMENTALS. Network+ Guide to Networks, 4e2.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
#16 Application Measurement Presentation by Bobin John.
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Java’s networking capabilities are declared by the classes and interfaces of package java.net, through which Java offers stream-based communications that.
Practice Test Questions QUESTION 1 Which two actions must you perform to enable and use window scaling on a router? (Choose two.) A. Execute the.
1 © 1999, Cisco Systems, Inc. 1293_07F9_c1 LocalDirector Version3.1.
1 Chapter 1 INTRODUCTION TO WEB. 2 Objectives In this chapter, you will: Become familiar with the architecture of the World Wide Web Learn about communication.
CS299: Web Programming and Design Instructor: Dr. Fang (Daisy) Tang
Progress Apama Fundamentals
Introduction to Networks
LESSON Networking Fundamentals Understand TCP/IP.
The Intranet.
Web Concepts Lesson 2 ITBS2203 E-Commerce for IT.
Technologies and Applications
Monitoring Persistently Congested Internet Links
CISC103 Web Development Basics: Web site:
Ad-blocker circumvention System
Understand the OSI Model Part 2
Digital Forensics 2 Presented by : J.Silaa Lecture: FCI 30 Aug 2017
Working at a Small-to-Medium Business or ISP – Chapter 7
Introduction to Networks
Working at a Small-to-Medium Business or ISP – Chapter 7
Working at a Small-to-Medium Business or ISP – Chapter 7
6.6 Firewalls Packet Filter (=filtering router)
CS222 Web Programming Course Outline
Utilize Group Policy Terminal Server Settings
CISC103 Web Development Basics: Web site:
Transport Protocols Relates to Lab 5. An overview of the transport protocols of the TCP/IP protocol suite. Also, a short discussion of UDP.
Computer Communication & Networks
Working at a Small-to-Medium Business or ISP – Chapter 7
Peer-to-Peer (p2p) Systems
Pong: Diagnosing Spatio-Temporal Internet Congestion Properties
File Transfer Issues with TCP Acceleration with FileCatalyst
Local Worm Detection using Honeypots Justin Miller Jan 25, 2007
A tool for locating QoS failures on an Internet path
Network+ Guide to Networks, Fourth Edition
A Network Operating System Edited By Maysoon AlDuwais
INFORMATION TECHNOLOGY
ECE 4450:427/527 - Computer Networks Spring 2017
Snippet Engine as a Database Server
Unconstrained Endpoint Profiling (Googling the Internet)‏
Presentation transcript:

Monitoring Network Bias Gergely Biczok, Whitney Young, and Aleksandar Kuzmanovic Northwestern Networks Group (http://networks.cs.northwestern.edu) Supported by NSF CAREER Award No. 0746360 Motivation Other probes DNS hijacking of mistyped web addresses Blocking HTTP download of *.torrent files Can add newly discovered probes modularly Net Neutrality Openness vs. managing traffic Debate in public, struggle in legislation, war in the Internet ISPs are already installing middleboxes capable of degrading/changing/blocking popular applications We do not take sides… …but want to facilitate network accountability System Design Goal Develop an end-host based measurement system for detecting and exposing biased network behavior Methodology Main idea Collect reported/possible types of discriminatory ISP practices/middleboxes Reverse-engineer their operation to create probes that will likely trigger them (approximately emulate desired traffic pattern) Detect and locate biased network elements Filtering Port-based Signature-based Signature database compiled from open source tools, web search and packet traces Flow-pattern-based Spatial and temporal correlation of UDP and TCP flows specific to p2p applications Shaping Extensive shaping reported for p2p and encrypted traffic Compare HTTP/FTP data rates to SSL and BitTorrent (emulated) rates Back-to-back minute-long experiments Significant and consistent (across hosts from the same ISP) difference in data rates indicate the presence of shapers Locating middleboxes (filters and shapers) Repeat the same measurements between the same end-host and multiple specifically selected PlanetLab nodes Select servers that are “geographically” far away from each other minimizing the common segment of the paths If same phenomena are observed, middlebox is in the shared path segments Central Server Serves the main website Selects multiple PL nodes for given end-host Coordinates probing PL nodes Handles incoming reports and generate feedback to users PlanetLab Node If selected serves the Java applet to a Client Sends and receives probes to/from a Client via applet Sends a report to Central Server at the end of every measurement session Client Runs an applet in a web browser Sends and receives probes from multiple PL nodes Sends reports to PL nodes Displays results to the user in a browser Results and Future Work Implementation is ongoing Functions partly tested manually on small scale Experienced BT shaping on well seeded torrents (D/U: 30 KBps/5 KBps) vs. HTTP download (200 KBps) at a given ISP Signature-based filtering probes validated with open-source filtering software in a testbed Large-scale live measurement in the near future Upon collecting sufficient data we can draw a global map of biased network behavior