Supercomputing Center Measurement and Performance Analysis of Supercomputing Traffic by FlowScan+ 2.0 Supercomputing Center of KISTI Kookhan Kim August.

Slides:



Advertisements
Similar presentations
NETFLOW & NETWORK-BASED APPLICATION RECOGNITION
Advertisements

Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
High Performance Research Network. Development Lab. / Supercomputing Center 1 Design of the Detection and Response System against DDoS attacks Yoonjoo.
E2E performance measurement
Characteristics of Network Traffic Flow Anomalies Paul Barford and David Plonka University of Wisconsin – Madison SIGCOMM IMW, 2001.
A Workflow Engine with Multi-Level Parallelism Supports Qifeng Huang and Yan Huang School of Computer Science Cardiff University
26/05/2004HEPIX, Edinburgh, May Lemon Web Monitoring Miroslav Šiket CERN IT/FIO
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
Good afternoon. My name is Marek Pawłowski
FlowScan at the University of Wisconsin-Madison Copyright Dave Plonka and Perry Brunelli, This work is the intellectual property of the authors.
Introduction to Network Analysis and Sniffer Pro
© 2010, Robert K. Moniot Chapter 1 Introduction to Computers and the Internet 1.
5/1/2006Sireesha/IDS1 Intrusion Detection Systems (A preliminary study) Sireesha Dasaraju CS526 - Advanced Internet Systems UCCS.
Web Server Administration
© 2006 Cisco Systems, Inc. All rights reserved. Implementing Secure Converged Wide Area Networks (ISCW) Module 6: Cisco IOS Threat Defense Features.
Network Analyzer Example
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Security Issues on Distributed Systems 7 August, 1999 S 1 Prepared by : Lorrien K. Y. Lau Student I.D. : August 1999 The Chinese University.
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
Netflow Overview PacNOG 6 Nadi, Fiji. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation –Cisco.
Experiences in Analyzing Network Traffic Shou-Chuan Lai National Tsing Hua University Computer and Communication Center Nov. 20, 2003.
1 Introduction to Web Development. Web Basics The Web consists of computers on the Internet connected to each other in a specific way Used in all levels.
INTRODUCTION TO WEB DATABASE PROGRAMMING
Flow tools APRICOT 2008 Network Management Taipei, Taiwan February 20-24, 2008.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
NetworkProtocols. Objectives Identify characteristics of TCP/IP, IPX/SPX, NetBIOS, and AppleTalk Understand position of network protocols in OSI Model.
Network Flow-Based Anomaly Detection of DDoS Attacks Vassilis Chatzigiannakis National Technical University of Athens, Greece TNC.
What is FORENSICS? Why do we need Network Forensics?
Broadband Communication Lab. Asymmetric Path Detection in BGP Routing 29 January, 2004 Eun Mi, Park Korea Univ. Dept. of Electronics and Computer Engineering.
1 Web Server Administration Chapter 1 The Basics of Server and Web Server Administration.
P.1Service Control Technologies for Peer-to-peer Traffic in Next Generation Networks Part2: An Approach of Passive Peer based Caching to Mitigate P2P Inter-domain.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Identifying Application Impacts on Network Design Designing and Supporting Computer.
Honeypot and Intrusion Detection System
POSTECH DP&NM Lab. Internet Traffic Monitoring and Analysis: Methods and Applications (1) 5. Passive Monitoring Techniques.
1 The Research on Analyzing Time- Series Data and Anomaly Detection in Internet Flow Yoshiaki HARADA Graduate School of Information Science and Electrical.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
AUTOMATION OF WEB-FORM CREATION - KINNERA ANGADI – MS FINAL DEFENSE GUIDANCE BY – DR. DANIEL ANDRESEN.
FlowScan at the University of Wisconsin Perry Brunelli, Network Services.
Detection Unknown Worms Using Randomness Check Computer and Communication Security Lab. Dept. of Computer Science and Engineering KOREA University Hyundo.
Linux Networking and Security
© 2010 Cisco Systems, Inc. All rights reserved. 1 CREATE Re-Tooling Exploring Protocols with Wireshark March 12, 2011 CREATE CATC and Ohlone College.
Graphing and statistics with Cacti AfNOG 11, Kigali/Rwanda.
LMA: Log Mail Analyzer Maurizio Aiello National Research Council Institute of Electronics and Telecommunications and Information.
Attack signatures derived from Metasploit Final Presentation E. Ramirez A. Zoghbi
Jennifer Rexford Princeton University MW 11:00am-12:20pm Measurement COS 597E: Software Defined Networking.
Chapter 2 The Internet Underlying Architecture. How the DNS works? DNS: Domain Name System Visiting a website: - Write the address - IP will use the address.
Project Requirements (NetFlow Generator) 정승화 분산 처리 및 네트워크 관리 연구실 포항 공과 대학교
Module 7: Advanced Application and Web Filtering.
Open-Eye Georgios Androulidakis National Technical University of Athens.
Interpreting Network Traffic Flows Bill Jensen, Paul Nazario and Perry Brunelli.
CCDA DESCRIBE THE METHODOLOGY USED TO DESIGN A NETWORK.
Cristian Estan, Garret Magin University of Wisconsin-Madison USENIX LISA, 17 December 2015 Interactive traffic analysis and visualization with Wisconsin.
Net Flow Network Protocol Presented By : Arslan Qamar.
1 Microsoft Windows 2000 Network Infrastructure Administration Chapter 4 Monitoring Network Activity.
Cisco Discovery Semester 1 Chapter 6 JEOPADY RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands RouterModesWANEncapsulationWANServicesRouterBasicsRouterCommands.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
POSTECH DP&NM Lab Detailed Design Document NetFlow Generator 정승화 DPNM Lab. in Postech.
1 Netflow Collection and Aggregation in the AT&T Common Backbone Carsten Lund.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
NetFlow Analyzer Best Practices, Tips, Tricks. Agenda Professional vs Enterprise Edition System Requirements Storage Settings Performance Tuning Configure.
Monitoring MIPv6 Traffic with IPFIX
Securing the Network Perimeter with ISA 2004
Flow tools APRICOT 2008 Network Management Taipei, Taiwan
CS222 Web Programming Course Outline
Chapter 8: Monitoring the Network
Introduction to Computer Concept
Hao Hu, Luo Qi, Fazhi Qi IHEP 22 Mar. 2018
Presentation transcript:

Supercomputing Center Measurement and Performance Analysis of Supercomputing Traffic by FlowScan+ 2.0 Supercomputing Center of KISTI Kookhan Kim August 28, 2003

Supercomputing Center 2 Contents Introduction FlowScan FlowScan+ 2.0 Traffic Measurement & Analysis Others

Supercomputing Center 3 Introduction We have various types supercomputers –NEC, IBM, Compaq, PC cluster Supercomputing traffics –All traffics to calculate many kinds of data, which is generated between supercomputers and every users Users would have authenticated and authorized ID Until now, we did’t try to measure supercomputing traffic and analyze them yet We want to know the characteristics of supercomputing traffics –who use it? –what applications & protocols used? –how much amount traffic generated? To meet these demands, we improved FlowScan

Supercomputing Center 4 What is FlowScan? FlowScan is a passive measurement tool drawing traffic graphs by analyzing network flows exported by routers and switches –NetFlow is exported CISCO routers and switches It was developed by Dave Plonka and managed by CAIDA ( Main modules - Perl scripts – cflowd (a flow collection engine) – flowscan (central process in the system) Our improvement focuses on this module – RRDtool (a visualization tool) Definition : Flow –An IP flow is a unidirectional series of IP packets of a given proto col, travelling between a source and destination, within a certain period of time.

Supercomputing Center 5 Enhanced FlowScan+ The goal –Make a good passive measurement tool The Motivations –Lack of traffic measurement tool that supports real time visualization and detailed traffic analysese on demand –To make user friendly tool, it can help everyone easy to use Why FlowScan? –An open source program –It has good graphing function on the web –But yet it does not support query interface Who is involved? –Supercomputing Center of KISTI –System Architecture Lab., Dept. of Computer Science, KAIST

Supercomputing Center 6 Flowscan Flow-Tools RRD Static graph DB Aggregation (15 min) Dynamic graph Link Query NetFlow v7 FlowScan Original Module Analysis Module (FlowScan+ 1.0) Visualization Module (FlowScan+ 2.0) Parsed Data FlowScan+ 2.0

Supercomputing Center 7 FlowScan+ Main Point FlowScan+ 1.0 –Use MySQL Store NetFlow Information into DB –Rawflows –Aggregated data –Query interface Access to the DB By Web Easy to use FlowScan+ 2.0 –Flow-tools NetFlow version problem –User Group Edit Small group, large group Divided by IP Class –Visualization of DB query result JAVA Servlet, jfreechart

Supercomputing Center 8 FlowScan+ 2.0 : NetFlow Versions NetFlow Version Comments 1Original 5Standard and most common 7 Specific to Cisco Catalyst 6500 and 7600 Series Switches Similar to Version 5, but does not include AS, interface, TCP Flag & TOS information 8 Choice of eleven aggregation schemes Reduces resource usage 9 Flexible, extensible file export format to enable easier support of additional fields & technologies; coming out now MPLS, Multicast, & BGP Next Hop

Supercomputing Center 9 FlowScan+ 2.0 : Flow-tools NetFlow v5 & v7 have different PDU formats and do not correspond with including information Cflowd, main NetFlow collection module in the FlowScan, cannot collect NetFlow v7 We have to change NetFlow capture module Flow-tools replace cflowd as NetFlow v7 collection modules NetFlow v5NetFlow v7 FLOW index: 0xc7ffff router: src IP: dst IP: input ifIndex: 60 output ifIndex: 14 src port: 445 dst port: 2979 pkts: 6 bytes: 744 IP nexthop: start time: Thu May 15 15:10: end time: Thu May 15 15:10: protocol: 6 tos: 0x0 src AS: dst AS: src masklen: 16 dst masklen: 19 TCP flags: 0x1b (PUSH|SYN|FIN|ACK) engine type: 1 engine id: 10 FLOW index: 0xc7ffff router: src IP: dst IP: input ifIndex: 0 output ifIndex: 0 src port: 80 dst port: 3215 pkts: 6 bytes: 497 IP nexthop: start time: Mon May 12 18:41: end time: Mon May 12 18:41: protocol: 6 tos: 0x0 src AS: 0 dst AS: 0 src masklen: 0 dst masklen: 0 TCP flags: 0x0 engine type: 0 engine id: 0

Supercomputing Center 10 FlowScan+ 2.0 : User Grouping There is no way to veryfy user(id) of the Supercomputer –The user-related information is only IP address in the NetFlow –By this information, we can consider that “who is generating traffic user” If users always connect the supercomputer with same system, they have the same source/dest IP : it is no problem But they can log in with other systems in the same office or same building –So we takes a user grouping concept –If completely different place log in, it is impossible analysis user(id) from NetFlow Except from this siuation, we can verify supercomputing user with network IP of NetFlow

Supercomputing Center 11 FlowScan+ 2.0 : User Grouping Group name  group number Group ID  user ID or related information We have classified only C class IP - If one has many user ids - When we compare the traffic of a number of institutes with each others - We should aggregate its total traffics - Large grouping

Supercomputing Center 12 FlowScan+ 2.0 : Visualization In FlowScan+, improved by adding MySQL, has free DBMS based on the query interface to get flow information But results of query are text based information –difficulties to intuitive understand –It cannot display result plot as time sereis To support this, FlowScan+ 2.0 takes a visualization servlet

Supercomputing Center 13 FlowScan+ 2.0 : Visualization Visualization process & graph - The text result is only way that we can see the result of query interface until now - If we want to see the result of graphical plot as time passed - FlowScan+ 2.0 makes one more query into DB

Supercomputing Center 14 Traffic Measurement topology Ruby-8/80 Catayst6506 BaramTigerKordicKfddi2LionCisco7513 C6506 SUPER COMPUTERS H-NFS Si H-Opal H-Ruby IBM NEC COMPAQ FlowScan+ 2.0 PC Cluster C6506 Ruby-8/80 Catayst6506 NetFlow v7 export Our supercomputer is linked mesh type with 2 catalyst 6500 series switches NetFlow v7 export Drawing graph every 5min. Storing aggregated data & rawflows into BD every 15min.

Supercomputing Center 15 Top user (by Institute) InstituteBytes (MB) % KMA48, % Seoul National Univ. 11, % KISTI10, % Air Force9, % KAIST3, % Yonsei Univ.2, % ETS soft1, % Kyunhee Univ % Choongnam Univ % Pusan National Univ % FlowScan+ 2.0 – traffic analysis (2003/July/21 14:00 ~ /28 14:00) - 1 week measurement traffic - It is analyzed by large group - The pie graph draws again by the Excel sheets

Supercomputing Center 16 Application ServiceBytes (MB)% http547, % ftp491, % unknown115, % telnet2, % domain % FlowScan+ 2.0 – traffic analysis (2003/July/21 14:00 ~ /28 14:00) It shows a strange result, we cannot expect We want to know the cooupied portion by various applications –Involved in bio, physics, aerospace, chemistry and so on. But those are operated in the supercomputer –Those applications are installed in the supercomputers –Users log in the supercomputer by telnet and ftp –Transfer theirs data & Operate application from remote sites

Supercomputing Center 17 Other usage of FlowScan+ 2.0 Detection of Network abnormalities –Port scanning –Cord Red virus –NIMDA virus Mass mailing worm component –DDoS attack Some features between flow and traffic amount Byte : normal size traffic Flow : explosive increase Detection of emerging new applications –GRID applications, P2P applications and so on –If we should match new emerge application with defined its port number Decrease unknown traffic portion

Supercomputing Center 18 FlowScan+ of KISTI

Supercomputing Center 19 Conclusions FlowScan+ developed by KISTI & KAIST Characteristics of FlowScan+ 2.0 –Flow-tools NetFlow version problem. –Group edit It can be measure & analysis of traffics by each users –Visualization of results It makes graphical plot as time serise. Future Works –DB optimization to speed up –Installation packaging –More stability of flowscan –Aggregate merits of each versions

Supercomputing Center 20 Thank you for your attention Questions ?