Stephanie Clarke Investigation and implementation of a network monitoring system in an academic College environment: Presentation.

Slides:



Advertisements
Similar presentations
You wish to offer your guests access to the internet?
Advertisements

Intrusion Detection Systems By: William Pinkerton and Sean Burnside.
Introduction to Network Analysis and Sniffer Pro
Nada Abdulla Ahmed.  SmoothWall Express is an open source firewall distribution based on the GNU/Linux operating system. Designed for ease of use, SmoothWall.
1 William Lee Duke University Department of Electrical and Computer Engineering Durham, NC Analysis of a Campus-wide Wireless Network February 13,
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
70-290: MCSE Guide to Managing a Microsoft Windows Server 2003 Environment Chapter 11: Monitoring Server Performance.
(NHA) The Laboratory of Computer Communication and Networking Network Host Analyzer.
Lesson 19: Configuring Windows Firewall
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Institute of Technology, Sligo Dept of Computing Semester 3, version Semester 3 Chapter 3 VLANs.
Maintaining and Updating Windows Server 2008
70-291: MCSE Guide to Managing a Microsoft Windows Server 2003 Network Chapter 14: Troubleshooting Windows Server 2003 Networks.
Database Administration Chapter 16. Need for Databases  Data is used by different people, in different departments, for different reasons  Interpretation.
Computerised Maintenance Management Systems
Virtual LANs. VLAN introduction VLANs logically segment switched networks based on the functions, project teams, or applications of the organization regardless.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Internet/Intranet firewall security – policy, architecture and transaction services Written by Ray Hunt This presentation will Examines Policies that influence.
© 2013 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Strategies in Linux Platforms and.
Information Systems CS-507 Lecture 40. Availability of tools and techniques on the Internet or as commercially available software that an intruder can.
PROGRAMMING LANGUAGES The Study of Programming Languages.
1 Network Statistic and Monitoring System Wayne State University Division of Computing and Information Technology Information Technology.
Research on cloud computing application in the peer-to-peer based video-on-demand systems Speaker : 吳靖緯 MA0G rd International Workshop.
1 The SpaceWire Internet Tunnel and the Advantages It Provides For Spacecraft Integration Stuart Mills, Steve Parkes Space Technology Centre University.
Selecting a Topic. Introduction l In this presentation we will: l Introduce the process of selection of a topic; l Consider the contents of a research.
by Marc Comeau. About A Webmaster Developing a website goes far beyond understanding underlying technologies Determine your requirements.
COEN 252 Computer Forensics
Analyzing Reliability and Validity in Outcomes Assessment (Part 1) Robert W. Lingard and Deborah K. van Alphen California State University, Northridge.
Managing Windows Server 2008 R2 Lesson 2. Objectives.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Automatic Software Testing Tool for Computer Networks ADD Presentation Dudi Patimer Adi Shachar Yaniv Cohen
COEN 252 Computer Forensics Collecting Network-based Evidence.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
FIREWALLS Vivek Srinivasan. Contents Introduction Need for firewalls Different types of firewalls Conclusion.
Module 4: Planning, Optimizing, and Troubleshooting DHCP
A Web Based Workorder Management System for California Schools.
*Note: If you would like to view the transcript of the audio, click Notes in the upper right section of the screen. Main Window The Training Interface.
Doc.: IEEE 802 ec-12/0006r0 Submission Liaison presentation to SC6 regarding Internet Security Date: 2012-February-13 Authors: IEEE 802 LiaisonSlide 1.
Present :Arezoo Mollahasani. Step 1  Define your server connection Open MySQL WorkBench and click New Server Instance on the right of the window.
 Jaden Terry.  To obtain privacy and protect data from other people. o Businesses Customer/Employee information Credit card numbers To gain a competitive.
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
1 HoneyNets. 2 Introduction Definition of a Honeynet Concept of Data Capture and Data Control Generation I vs. Generation II Honeynets Description of.
NETWORKING COMPONENTS Buddy Steele Assignment 3, Part 1 CECS-5460: Summer 2014.
Database Administration
SIP working group IETF#70 Essential corrections Keith Drage.
Search Engine using Web Mining COMS E Web Enhanced Information Mgmt Prof. Gail Kaiser Presented By: Rupal Shah (UNI: rrs2146)
Module 10: Windows Firewall and Caching Fundamentals.
Information Security Dashboard Senior Design Spring 2008 Brian Rappach.
Computerised Maintenance Management Systems
Library Online Resource Analysis (LORA) System Introduction Electronic information resources and databases have become an essential part of library collections.
J. Liebeher (modified by M. Veeraraghavan) 1 Introduction Complexity of networking: An example Layered communications The TCP/IP protocol suite.
#16 Application Measurement Presentation by Bobin John.
Tool Support for Testing Classify different types of test tools according to their purpose Explain the benefits of using test tools.
SMOOTHWALL FIREWALL By Nitheish Kumarr. INTRODUCTION  Smooth wall Express is a Linux based firewall produced by the Smooth wall Open Source Project Team.
SemiCorp Inc. Presented by Danu Hunskunatai GGU ID #
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
© 2003, Cisco Systems, Inc. All rights reserved. 2-1 Campus Network Design.
The Perfect Linux Security Firewalls. Introduction of Linux Firewall Security Linux Firewall is very stable, protect our system from malware, system performance.
Lecture 11. Switch Hardware Nowadays switches are very high performance computers with high hardware specifications Switches usually consist of a chassis.
IT Audit for non-IT auditors Cornell Dover Assistant Auditor General 31 March 2013.
 1- Definition  2- Helpdesk  3- Asset management  4- Analytics  5- Tools.
Software Project Configuration Management
Top 5 Open Source Firewall Software for Linux User
Click to edit Master subtitle style
Parts of an Academic Paper
Virtual LANs.
IS3440 Linux Security Unit 9 Linux System Logging and Monitoring
OPS235: Configuring a Network Using Virtual Machines – Part 2
COMPLETE BUSINESS TEXTING SOLUTION
Presentation transcript:

Stephanie Clarke Investigation and implementation of a network monitoring system in an academic College environment: Presentation

Introduction (1) St Catharine’s College, Cambridge has a diverse user population, many with their own computers on the network St Catharine’s College, Cambridge has a diverse user population, many with their own computers on the network The Computer Office has little control over privately-owned computers The Computer Office has little control over privately-owned computers Remote hostels make on-site visits time consuming Remote hostels make on-site visits time consuming

Introduction (2) IP addresses are allocated to individual students but conflicts do arise IP addresses are allocated to individual students but conflicts do arise Not all users obey the rules, particularly regarding traffic levels Not all users obey the rules, particularly regarding traffic levels In the survey of users for this project most supported having restrictions on either traffic levels and/or content In the survey of users for this project most supported having restrictions on either traffic levels and/or content

The need for this project Users need a stable, reliable network Users need a stable, reliable network In order to manage the network effectively it is important to obtain timely information about problems In order to manage the network effectively it is important to obtain timely information about problems Although some basic information is available there is a need for a system to easily provide access to relevant information Although some basic information is available there is a need for a system to easily provide access to relevant information

General design options ‘Monitoring’ is a wide-ranging term ‘Monitoring’ is a wide-ranging term The literature search revealed a variety of options The literature search revealed a variety of options Commercial and freeware tools are available Commercial and freeware tools are available Some researchers have written tools aimed at specific tasks Some researchers have written tools aimed at specific tasks The survey of system administrators for this project revealed that many monitored in some way but there was little consensus about how The survey of system administrators for this project revealed that many monitored in some way but there was little consensus about how

Design chosen A succinct daily report would be generated highlighting matters of particular interest A succinct daily report would be generated highlighting matters of particular interest More detailed data would be logged for reference More detailed data would be logged for reference

Aspects of the report (1) The report would include: The report would include: –Information about users creating more than 500Mb in total (incoming + outgoing) in a day –Information about users in the top 20 traffic generators using KaZaA, Napster or Gnutella –Traffic on certain ports –Warnings about IP conflicts

Aspects of the report (2) And also: And also: –A database of all IP addresses seen on the network, with corresponding MAC addresses and hostnames –Traffic graphs for all Ethernet switch ports –Other items of note

Aspects of the report (3) The ‘Other items of note’ requirement was open-ended, and ultimately included: The ‘Other items of note’ requirement was open-ended, and ultimately included: –First-time connections seen that day –IP/MAC address pairs reappearing after 6 months or more –MAC address mismatches

Limitations of available options No available tool would do exactly what was wanted No available tool would do exactly what was wanted The solution was to use a selection of tools to gather the data and to write scripts to interrogate this data and generate the reports The solution was to use a selection of tools to gather the data and to write scripts to interrogate this data and generate the reports

Implementation A self-contained system sitting on the edge of the network A self-contained system sitting on the edge of the network Linux was chosen as the operating system, being free and suitable for the task Linux was chosen as the operating system, being free and suitable for the task Different scripts were used in the generation of different aspects of the report, for robustness and ease of maintenance Different scripts were used in the generation of different aspects of the report, for robustness and ease of maintenance Scripts were written in Perl Scripts were written in Perl

Data generation tools (1) Arpwatch provided the raw data for use in creating the database and the sections on first-time connections, IP conflicts, IP/MAC address pairs reappearing after 6 months or more and MAC address mismatches Arpwatch provided the raw data for use in creating the database and the sections on first-time connections, IP conflicts, IP/MAC address pairs reappearing after 6 months or more and MAC address mismatches Mrtg was used to create the traffic graphs Mrtg was used to create the traffic graphs

Data generation tools (2) Data on the top 20 traffic generators in College - available from the University of Cambridge - was interrogated for details on users creating more than 500Mb, those using KaZaA, Napster or Gnutella, and those using certain ports Data on the top 20 traffic generators in College - available from the University of Cambridge - was interrogated for details on users creating more than 500Mb, those using KaZaA, Napster or Gnutella, and those using certain ports The Data Protection Act 1998 prevented more detailed port traffic analysis The Data Protection Act 1998 prevented more detailed port traffic analysis

User interface Presented as a password-protected website Presented as a password-protected website Menus added for ease of use Menus added for ease of use Previous reports can be reached if required Previous reports can be reached if required

Evaluation The system provides information in a convenient format that was previously unavailable or difficult and time consuming to obtain The system provides information in a convenient format that was previously unavailable or difficult and time consuming to obtain Problem detection and resolution is now much easier Problem detection and resolution is now much easier The system has additional benefits beyond those originally envisaged The system has additional benefits beyond those originally envisaged

Unexpected results The system threw up some surprising information, including: The system threw up some surprising information, including: –The number of IP conflicts that arise is higher than was previously supposed –The load varies widely between switches and is not always distributed in the pattern previously supposed

Future possibilities The system has potential for future expansion The system has potential for future expansion Some tweaks to the system would make it even better, including: Some tweaks to the system would make it even better, including: –Adding the dates an entry is first seen and most recently seen to the database –Adding the hostname to the ‘first seen’ section of the report

Conclusions The project resulted in a robust, easy-to- use system The project resulted in a robust, easy-to- use system The information it provides makes it a valuable asset to the College The information it provides makes it a valuable asset to the College The system will also be of assistance in planning future improvements to the network The system will also be of assistance in planning future improvements to the network