The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010.

Slides:



Advertisements
Similar presentations
TIED: A Cluster of One TIED: Trial Integration Environment DETER built on.
Advertisements

1 Computational Asset Description for Cyber Experiment Support using OWL Telcordia Contact: Marian Nodine Telcordia Technologies Applied Research
Module 13: Performance Tuning. Overview Performance tuning methodologies Instance level Database level Application level Overview of tools and techniques.
Module 5 - Switches CCNA 3 version 3.0 Cabrillo College.
Network Isolation Using Group Policy and IPSec Paula Kiernan Senior Consultant Ward Solutions.
The Experience Factory May 2004 Leonardo Vaccaro.
Networking Panel Jeannie Albrecht Williams College, Plush/Gush project Ivan Seskar Rutgers University, WINLAB/ORBIT project Steven Schwab Cobham Analytic.
Toward Replayable Research in Networking and Systems Eric Eide University of Utah, School of Computing May 25, 2010.
1 Experiments and Tools for DDoS Attacks Roman Chertov, Sonia Fahmy, Rupak Sanjel, Ness Shroff Center for Education and Research in Information Assurance.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Ch.6 - Switches CCNA 3 version 3.0.
1 GENI: Global Environment for Network Innovations Jennifer Rexford On behalf of Allison Mankin (NSF)
Integrated Scientific Workflow Management for the Emulab Network Testbed Eric Eide, Leigh Stoller, Tim Stack, Juliana Freire, and Jay Lepreau and Jay Lepreau.
Unified Modeling (Part I) Overview of UML & Modeling
© Copyright Eliyahu Brutman Programming Techniques Course.
1 Sonia Fahmy Ness Shroff Students: Roman Chertov Rupak Sanjel Center for Education and Research in Information Assurance and Security (CERIAS) Purdue.
Stephen S. Yau CSE , Fall Security Strategies.
High-Level Assessment Month Year
Architectural Design Establishing the overall structure of a software system Objectives To introduce architectural design and to discuss its importance.
Software Architecture. Agenda " Why architect? " What is architecture? " What does an architect do? " What principles guide the process of architecting?
New Challenges in Cloud Datacenter Monitoring and Management
Enterprise Architecture
IHP Im Technologiepark Frankfurt (Oder) Germany IHP Im Technologiepark Frankfurt (Oder) Germany ©
INFO 355Week #61 Systems Analysis II Essentials of design INFO 355 Glenn Booker.
Ekrem Kocaguneli 11/29/2010. Introduction CLISSPE and its background Application to be Modeled Steps of the Model Assessment of Performance Interpretation.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
S/W Project Management
UML - Development Process 1 Software Development Process Using UML (2)
THE GITB TESTING FRAMEWORK Jacques Durand, Fujitsu America | December 1, 2011 GITB |
SAMANVITHA RAMAYANAM 18 TH FEBRUARY 2010 CPE 691 LAYERED APPLICATION.
High Level Architecture Overview and Rules Thanks to: Dr. Judith Dahmann, and others from: Defense Modeling and Simulation Office phone: (703)
Testing Workflow In the Unified Process and Agile/Scrum processes.
Model-Driven Analysis Frameworks for Embedded Systems George Edwards USC Center for Systems and Software Engineering
SAM for Virtualizatio n Presenter Name. Virtualization: a key priority for business decision makers Technavio forecasts that the global virtualization.
Access Control for Federation of Emulab-based Network Testbeds Ted Faber, John Wroclawski 28 July 2008
Software Engineering Prof. Ing. Ivo Vondrak, CSc. Dept. of Computer Science Technical University of Ostrava
1 Computing Challenges for the Square Kilometre Array Mathai Joseph & Harrick Vin Tata Research Development & Design Centre Pune, India CHEP Mumbai 16.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
10/03/05 Johan Muskens ( TU/e Computer Science, System Architecture and Networking.
EMIST DDoS Experimental Methodology Alefiya Hussain January 31, 2006.
Nature Reviews/2012. Next-Generation Sequencing (NGS): Data Generation NGS will generate more broadly applicable data for various novel functional assays.
2.1 © 2004 Pearson Education, Inc. Exam Designing a Microsoft ® Windows ® Server 2003 Active Directory and Network Infrastructure Lesson 2: Examining.
LAMP: Bringing perfSONAR to ProtoGENI Martin Swany.
This poster has been developed with support from the CATIIS project Program doctoral interregional și transnațional de excelență în domeniile “Calculatoare.
Sponsored by the National Science Foundation Systematic Experimentation in GENI Sarah Edwards GENI Project Office.
Microsoft Management Seminar Series SMS 2003 Change Management.
11 CLUSTERING AND AVAILABILITY Chapter 11. Chapter 11: CLUSTERING AND AVAILABILITY2 OVERVIEW  Describe the clustering capabilities of Microsoft Windows.
MODEL-BASED SOFTWARE ARCHITECTURES.  Models of software are used in an increasing number of projects to handle the complexity of application domains.
Sample Presentation Headline REPRESENTATIVE SUBHEAD TO SUPPORT SUBJECT Presenter’s Name Presenter’s Title Presentation Date DeterLab A Tool for Cybersecurity.
Computer Simulation of Networks ECE/CSC 777: Telecommunications Network Design Fall, 2013, Rudra Dutta.
Company LOGO Network Architecture By Dr. Shadi Masadeh 1.
Resolve today’s IT management dilemma Enable generalist operators to localize user perceptible connectivity problems Raise alerts prioritized by the amount.
LECTURE 5 Nangwonvuma M/ Byansi D. Components, interfaces and integration Infrastructure, Middleware and Platforms Techniques – Data warehouses, extending.
Software Defined Networking BY RAVI NAMBOORI. Overview  Origins of SDN.  What is SDN ?  Original Definition of SDN.  What = Why We need SDN ?  Conclusion.
Interaction and Animation on Geolocalization Based Network Topology by Engin Arslan.
Instructor Materials Chapter 7: Network Evolution
SDN challenges Deployment challenges
Microsoft® System Center Virtual Machine Manager 2008
Systems Design.
Taming the Complexity of Artifact Reproducibility
Use Cases and Requirements for I2NSF_
Performance Load Testing Case Study – Agilent Technologies
Module 5 - Switches CCNA 3 version 3.0.
Model-Driven Analysis Frameworks for Embedded Systems
Computer Simulation of Networks
Software Defined Networking (SDN)
Network Architecture By Dr. Shadi Masadeh 1.
Comparison to existing state of security experimentation
Agenda The current Windows XP and Windows XP Desktop situation
Presentation transcript:

The Challenges of Repeatable Experiment Archiving – Lessons from DETER Stephen Schwab SPARTA, Inc. d.b.a. Cobham Analytic Solutions May 25, 2010

Overview of DETER DETER Highlights - 3 distributed clusters, ~500 nodes - Combination of DETER developed software and legacy Emulab DETER Capabilities - Federation - Security Experimentation Environment (SEER) - Templates Federator DRAGON WAIL DETER Plug-ins to configure federants Internet Emulab GMPLS SEER CEDL USERS Credentials EmulabGMPLS Provisioned Connectivity

DDoS Experiment on DETER (circa 2005) Background Traffic: REPLAY | NTCG | HARPOON HIGH FIDELITY TRAFFIC Topology: BUILDING-BLOCKS | JUNIPER ROUTER CORE REALISTIC CONNECTIVITY AND SCALE-DOWN Attack Traffic: DETER-INTEGRATED ATTACK SCRIPTING AUTOMATION OF VARIETY OF SCENARIOS UNDER STUDY Instrumentation: PACKET AND HOST STATISTICS CAPTURE | SPECTRAL ANALYSIS | METRICS CALCULATION | INTEGRATED VISUALIZATION SEER: TOOLBOX FOR RIGOROUS INVESTIGATION OF RESULTS CORE AS ATTACK TRAFFIC BACKGROUND TRAFFIC

Security Experiment Methodology & Tools (circa 2005) Experimenter’s select from a palette of predefined elements: Topology, Background and Attack Traffic, and Data Capture and Instrumentation Our Methodology frames standard, systematic questions that guide an experimenter in selecting and combining the right elements Experiment Automation increases repeatability and efficiency by integrating the process within the DETER testbed environment PALETTESs METHODOLOGY & GUIDANCE EXPERIMENT AUTOMATION TOPOLOGY TRAFFIC ATTACK DATA-CAPTURE ? … but this level of abstraction leads to major drawbacks DETER -- integrated workbench & tools for experimenters…

Worm/Botnet Experiment (2009) 831 Virtual Nodes on 63 Physical PCs

Experiment Specification Large and Complex Experiments are more suitably constructed by combining abstract elements modeling different aspects (topology, traffic, networking devices, etc.) with constraints on behavior Example of such an experiment on previous slide hand-crafted (e.g. hand-compiled) experiment from abstract elements

Initial Approach: Archiving it All Intuition drawn from analogy with physical (discovery) sciences… Record all aspects of experiment to ensure (ideal) reproducibility Software Artifacts being investigated (often the researcher’s new system!) Operating Environment (OS, standard software on clients, servers in experiment scenario, network routers, firewalls, etc.) Experiment & Test Infrastructure (initialization, control, data collection, data reduction, data analysis, data visualization, …) Hardware All end-systems and routers/switches All firmware All chips/chipset variants (Tulip 21140As are not Tulip 21140Es!) Procedures All scripts and manual interactions required to run the experiment … networked systems require large and growing (unbounded) detail to describe precisely… which ideal reproducibility would seem to demand

Challenges to Ideal Archiving Separating Invariants from Contingencies An experiment requires certain properties; these are the essence of the experiment But every configuration detail must be specified; these are contingencies – merely choices (perhaps important to record) Repeatability should be primarily defined with respect to explicit invariants Experiment Internals Publications do not capture full details because increasing complexity of software, hardware and networking technologies result in (exponential?) growth in description of these aspects Peer-review process does not provide incentives to capture full details (noted in other position papers) Funding agencies do not provide sufficient funding to do so (how much detail can, will and should be demanded? Where is the limit on returns for dollars invested?) Granularity of Reuse Individual researchers are interested in examining, studying and re-running different elements of any given experiment Experiments that archive everything do not clearly delineate the various pieces

Future DETER Capability & Vision DETER is developing the capability to Specify Experiments Declaratively Reason about the software (or hardware) alternatives that may be available to realize each element in a testbed Select implementations that are sufficient to perform the experiment correctly … and ensure detection of fidelity-loss through the use of monitored invariants Resolve global conflicts among local element to implementation mappings DETER vision is to foster Reuse through sharing of tools, technology, results & ideas among researchers … and to promote this vision by providing abstractions, models and elements that are supported by our experiment life-cycle framework and tools Facilitate individuals and researchers focused on specific topics to create their own abstractions, models and elements