End-user Based Network Measurement and Diagnosis

Slides:



Advertisements
Similar presentations
Issues of Security and Privacy in Networking in the CBA Karen Sollins Laboratory for Computer Science July 17, 2002.
Advertisements

Towards Unbiased End-to-End Network Diagnosis Name: Kwan Kai Chung Student ID: Date: 18/3/2007.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
1 Yan Chen Northwestern University Lab for Internet and Security Technology (LIST) in Northwestern.
High-Performance Network Anomaly/Intrusion Detection & Mitigation System (HPNAIDM) Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
An Algebraic Approach to Practical and Scalable Overlay Network Monitoring Yan Chen, David Bindel, Hanhee Song, Randy H. Katz Presented by Mahesh Balakrishnan.
Reverse Hashing for High-speed Network Monitoring: Algorithms, Evaluation, and Applications Robert Schweller 1, Zhichun Li 1, Yan Chen 1, Yan Gao 1, Ashish.
Tomography-based Overlay Network Monitoring and its Applications Joint work with David Bindel, Brian Chavez, Hanhee Song, and Randy H. Katz UC Berkeley.
1 A Suite of Schemes for User-level Network Diagnosis without Infrastructure Yao Zhao, Yan Chen Lab for Internet and Security Technology, Northwestern.
Efficient Hop ID based Routing for Sparse Ad Hoc Networks Yao Zhao 1, Bo Li 2, Qian Zhang 2, Yan Chen 1, Wenwu Zhu 3 1 Lab for Internet & Security Technology,
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Yan Chen Dept. of Computer Science Northwestern University Information Security Curriculum Development in Northwestern.
Overview Distributed vs. decentralized Why distributed databases
Towards a High-speed Router-based Anomaly/Intrusion Detection System (HRAID) Zhichun Li, Yan Gao, Yan Chen Northwestern.
Yao Zhao 1, Yan Chen 1, David Bindel 2 Towards Unbiased End-to-End Diagnosis 1.Lab for Internet & Security Tech, Northwestern Univ 2.EECS department, UC.
Ningning HuCarnegie Mellon University1 A Measurement Study of Internet Bottlenecks Ningning Hu (CMU) Joint work with Li Erran Li (Bell Lab) Zhuoqing Morley.
A DoS Resilient Flow-level Intrusion Detection Approach for High-speed Networks Yan Gao, Zhichun Li, Yan Chen Lab for Internet and Security Technology.
1 Network Intrusion Detection and Mitigation Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Department of Computer Science Northwestern.
Scalable and Deterministic Overlay Network Diagnosis Yao Zhao, Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer.
1 Towards Anomaly/Intrusion Detection and Mitigation on High-Speed Networks Yan Gao, Zhichun Li, Yan Chen Northwestern Lab for Internet and Security Technology.
1 Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
1 Network-based Intrusion Detection, Mitigation and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Chapter 1: Overview Lecturer: Alias Mohd Telecommunications Department Faculty of Electrical Engineering UTM SET 4573: Data Communication and Switching.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
1 HPNAIDM: the High-Performance Network Anomaly/Intrusion Detection and Mitigation System Yan Chen Lab for Internet & Security Technology (LIST) Department.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 The Internet and Its Uses Working at a Small-to-Medium Business or.
SCAN: a Scalable, Adaptive, Secure and Network-aware Content Distribution Network Yan Chen CS Department Northwestern University.
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
Security for the Optimized Link- State Routing Protocol for Wireless Ad Hoc Networks Stephen Asherson Computer Science MSc Student DNA Lab 1.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Network-based Intrusion Detection, Prevention and Forensics System 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Connecting, Monitoring and Securing Manufacturing Assets 1 Yan Chen Professor, EECS Department Director, Lab for Internet & Security Technology (LIST)
Review of the literature : DMND:Collecting Data from Mobiles Using Named Data Takashima Daiki Park Lab, Waseda University, Japan 1/15.
Inference, monitoring and recovery of large scale networks CSE Department PennState University Institute for Networking and Security Research Faculty:
EECS Divisional Presentation Computing, Algorithms and Applications May 25, 2006.
Yan Chen Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University
1 Network-based Intrusion Detection, Prevention and Forensics System Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Yan Chen, Hai Zhou Northwestern Lab for Internet and Security Technology (LIST) Dept. of Electrical Engineering and Computer Science Northwestern University.
Defending Against Internet Worms: A Signature-Based Approach Aurthors: Yong Tang, and Shigang Chen Publication: IEEE INFOCOM'05 Presenter : Richard Bares.
Anomaly/Intrusion Detection and Prevention in Challenging Network Environments 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
Anomaly/Intrusion Detection and Prevention in Challenging Network Environments 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern.
6.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 6: Designing.
Yan Chen Dept. of Electrical Engineering and Computer Science Northwestern University Spring Review 2008 Award # : FA Intrusion Detection.
Network-based and Attack-resilient Length Signature Generation for Zero-day Polymorphic Worms Zhichun Li 1, Lanjia Wang 2, Yan Chen 1 and Judy Fu 3 1 Lab.
Monitoring, Diagnosing, and Securing the Internet 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University Lab for.
Network-based Intrusion Detection, Prevention and Forensics System 1 Yan Chen Department of Electrical Engineering and Computer Science Northwestern University.
Northwestern Lab for Internet & Security Technology (LIST)
Yan Chen Northwestern Lab for Internet and Security Technology (LIST) Dept. of Computer Science Northwestern University
Problem: Internet diagnostics and forensics
The Internet and Its Uses
Zueyong Zhu† and J. William Atwood‡
Epidemic spreading in complex networks with degree correlations
Network-based Intrusion Detection, Prevention and Forensics System
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Lab for Internet and Security Technology Yan Chen
Early Measurements of a Cluster-based Architecture for P2P Systems
File Transfer Protocol
Yan Chen Department of Electrical Engineering and Computer Science
Northwestern Lab for Internet and Security Technology (LIST)
Yan Chen Lab for Internet & Security Technology (LIST)
Ananth I. Sundararaj Ashish Gupta Peter A. Dinda Prescience Lab
One-slide Research Overview
Dhruv Gupta EEC 273 class project Prof. Chen-Nee Chuah
Northwestern Lab for Internet and Security Technology (LIST)
Online Learning.
Computer Networks ARP and RARP
OpenSec:Policy-Based Security Using Software-Defined Networking
Introduction to Internet Worm
Presentation transcript:

End-user Based Network Measurement and Diagnosis Yan Chen Lab for Internet & Security Technology (LIST) Northwestern University http://list.cs.northwestern.edu

Collaborations with Microsoft Trustworthy Computing Curriculum Award 2004 (with co-PI Andrea Matwyshyn) Interdisciplinary Trustworthy Computing Curriculum Development Trustworthy Computing Curriculum Award 2005 (with three co-PIs in NU) Integrated Modular Trustworthy Computing Curriculum Development Attended the TwC Summit on 2005 and Faculty Summit on 2006 Interested in the New Faculty Fellowship

Network Anomaly/Intrusion Detection and Mitigation High-speed network traffic recording & analysis Online polymorphic worm signature generation Vulnerability analysis of 802.16 WiMAX protocols w/ formal methods Published in IEEE SSP, Infocom, SIGCOMM IMC, ICDCS

End-user Based Network Measurement and Diagnosis Maybe good fit for the Internet Technology and Services? 93 hours?

Two Types of Approaches Overlay network (P2P system) based Individual User based

Overlay Network Approach topology Overlay Network Operation Center measurements End hosts Suitable for overlay service providers, such as Akamai Scalable, accurate and adaptive to traffic/topology changes Published in SIGCOMM 2004, 2006 and to appear in Transaction on Networking For example, assume symmetric routing, the existing system has 6 paths, but only 4 links. Monitoring of 4 independent paths can solve the loss rates of all links, then we can compute the loss rate of other 2 paths. Basically, there is an NOC. The end hosts will measure the topology and send to NOC. NOC will select 4 paths to measure and instrument certain end hosts to do the measurement, and collect the results. Then it compute the loss rates of the basis set and infer the loss rates of all other paths. Assumptions: Break into 2 slides

Individual User Based Do not need any extra support Accurately separate the forward link loss and reverse link loss