INTERNET CRITICALITIES Activation and deactivation of the emergency back-up network Fabrizio Cuccoli, Francesco Sermi RaSS CNIT UO Firenze.

Slides:



Advertisements
Similar presentations
Ethernet Switch Features Important to EtherNet/IP
Advertisements

Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
The SWING Project: status and closure of the project Bruno Zolesi. Istituto Nazionale di Geofisica e Vulcanologia.
System’s generalities and structure of the final report Cesidio Bianchi. INGV.
© 2007 Cisco Systems, Inc. All rights reserved.ICND1 v1.0—1-1 Building a Simple Network Exploring the Functions of Networking.
INGV-CNIT-NOA-EO Project presented in the ambit of CIPS program SWING Short Wave critical Infrastructure Network based on new Generation of.
Service QoE Monitoring in the Access Network Bart De Vleeschauwer Ghent University – IBBT-IMEC Department of Information Technology
H. 323 Chapter 4.
Chapter 19: Network Management Business Data Communications, 5e.
CIS : Network Management. Introduction Network, associated resources and distributed applications indispensable Complex systems —More things can.
Telecommunications Management /635 Network Management.
Network Management Basics Network management requirements OSI Management Functional Areas –Network monitoring: performance, fault, accounting –Network.
1 CHEP 2000, Roberto Barbera Roberto Barbera (*) Grid monitoring with NAGIOS WP3-INFN Meeting, Naples, (*) Work in collaboration with.
Identification of Critical Infrastructures in the Mediterranean Sea context and communications’ criticalities Irene Fiorucci Cesidio Bianchi Istituto Nazionale.
بسم اللّه الرّحمن الرّحیم. TCP/IP Protocol Suite لایه ‎ ها در پروتکل TCP/IP دقیقاً با مدل OSI تطابق ندارند. نسخه ‎ ی اصلی پروتکل TCP/IP با چهار لایه تعریف.
Chapter 19: Network Management Business Data Communications, 4e.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
1 ITC242 – Introduction to Data Communications Week 12 Topic 18 Chapter 19 Network Management.
Jacob Boston Josh Pfeifer. Definition of HyperText Transfer Protocol How HTTP works How Websites work GoDaddy.com OSI Model Networking.
Fault, Configuration, Performance Management
1 Pertemuan 09 Model Fungsional Matakuliah: H0372/Manajemen Jaringan Tahun: 2005 Versi: 1/0.
COE 342: Data & Computer Communications (T042) Dr. Marwan Abu-Amara Chapter 2: Protocols and Architecture.
Monitoring System Monitors Basics Monitor Types Alarms Actions RRD Charts Reports.
Agenda SNMP Review SNMP Manager Management Information Base (MIB)
Guide to TCP/IP, Third Edition Chapter 11: Monitoring and Managing IP Networks.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
DETERMINATION OF THE TOPOLOGY OF HIGH SURVIVAL HF RADIO COMMUNICATION NETWORK Andrea Abrardo.
 Network Management  Network Administrators Jobs  Reasons for using Network Management Systems  Analysing Network Data  Points that must be taken.
McGraw-Hill The McGraw-Hill Companies, Inc., 2000 SNMP Simple Network Management Protocol.
Rome, February 14, 2013 Status of the Project Report on the first year activities With the support of the Prevention, Preparedness and Consequence.
Chapter 2 Network Models Copyright © The McGraw-Hill Companies, Inc. Permission required for reproduction or display.
1.  TCP/IP network management model: 1. Management station 2. Management agent 3. „Management information base 4. Network management protocol 2.
Ebro Observatory, October 1st, 2013 Internet Failure and Physical Layer Architecture With the support of the Prevention, Preparedness and Consequence.
1 Kyung Hee University Prof. Choong Seon HONG Network Control.
Guide to TCP/IP, Third Edition
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public ITE PC v4.0 Chapter 1 1 Troubleshooting Your Network Networking for Home and Small Businesses.
Section 11.1 Identify customer requirements Recommend appropriate network topologies Gather data about existing equipment and software Section 11.2 Demonstrate.
Networks and Telecommunications
Lesson 24. Protocols and the OSI Model. Objectives At the end of this Presentation, you will be able to:
Common Devices Used In Computer Networks
Top-Down Network Design Chapter Nine Developing Network Management Strategies Oppenheimer.
Computers Are Your Future Tenth Edition Chapter 8: Networks: Communicating & Sharing Resources Copyright © 2009 Pearson Education, Inc. Publishing as Prentice.
A Mobile-IP Based Mobility System for Wireless Metropolitan Area Networks Chung-Kuo Chang; Parallel Processing, ICPP 2005 Workshops. International.
William Stallings Data and Computer Communications 7 th Edition Data Communications and Networks Overview Protocols and Architecture.
Lec4: TCP/IP, Network management model, Agent architectures
An Integrated QoS, Security and Mobility Framework for Delivering Ubiquitous Services Across All IP-based Networks Haitham Cruickshank University of Surrey.
Lec 3: Infrastructure of Network Management Part2 Organized by: Nada Alhirabi NET 311.
Event Management & ITIL V3
15-1 Networking Computer network A collection of computing devices that are connected in various ways in order to communicate and share resources.
Introduction to Network Basic 1. Agenda – - Internetworking Basic – - OSI Layer – - TCP/IP Model – - IP Addressing – - Subnetting & VLSM – - The Internal.
Computer Networks Performance Metrics. Performance Metrics Outline Generic Performance Metrics Network performance Measures Components of Hop and End-to-End.
SOS: Security Overlay Service Angelos D. Keromytis, Vishal Misra, Daniel Rubenstein- Columbia University ACM SIGCOMM 2002 CONFERENCE, PITTSBURGH PA, AUG.
1 Network Monitoring Mi-Jung Choi Dept. of Computer Science KNU
1 Network Management: SNMP The roots of education are bitter, but the fruit is sweet. - Aristotle.
Chapter 19: Network Management Business Data Communications, 4e.
NetPro-ITI Building a Simple Network. What Is a Network?
Network Management Protocols and Applications Cliff Leach Mike Looney Danny Mar Monty Maughon.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
1 by Behzad Akbari Fall 2008 In the Name of the Most High Network Management Applications.
Management of the LHCb Online Network Based on SCADA System Guoming Liu * †, Niko Neufeld † * University of Ferrara, Italy † CERN, Geneva, Switzerland.
Network management Network management refers to the activities, methods, procedures, and tools that pertain to the operation, administration, maintenance,
Company LOGO Network Management Architecture By Dr. Shadi Masadeh 1.
Topic 11 Network Management. SNMPv1 This information is specific to SNMPv1. When using SNMPv1, the snmpd agent uses a simple authentication scheme to.
Distributed Network Monitoring in the Wisconsin Advanced Internet Lab Paul Barford Computer Science Department University of Wisconsin – Madison Spring,
PART1 Data collection methodology and NM paradigms 1.
Network Monitoring Sebastian Büttrich, NSRC / IT University of Copenhagen Last edit: February 2012, ICTP Trieste
OPEN SOURCE NETWORK MANAGEMENT TOOLS
Chapter 19: Network Management
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Top-Down Network Design Chapter Nine Developing Network Management Strategies Copyright 2010 Cisco Press & Priscilla Oppenheimer.
Presentation transcript:

INTERNET CRITICALITIES Activation and deactivation of the emergency back-up network Fabrizio Cuccoli, Francesco Sermi RaSS CNIT UO Firenze

Outline 1) Reference Scenario and Network. 2) Most Reasonable Scenario. 3) Worst Case Scenario. 4) Characteristics of the SWING system. 5) Supervision of the Internet Links. 6) Simple Network Management Protocol. 7) Performance Monitoring and Management Tools 8) SWING Network Management System. 9) Reactivation of the Internet Links. 10) Considerations 2SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Reference Scenario and Network 3SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Most Reasonable Scenario 1/2 4SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 t 0 – Hackers undertakes a DoS attack to the Barcelona harbour facility. t 0 + 2m – The ECI of Barcelona detects the missing internet connection and reports an alert to its connected CGA located in Madrid via the SWING network. t m 30 s – After receiving the alert from Barcelona’s ECI, the SWING station in the CGA – Madrid begins a check among all its connected ECIs (Malaga and Valencia) and CGAs (Rome and Athens) to verify the status of internet connection for each of them. The interaction takes place via the SWING network. t m – All the connected ECIs, with the exception of the one located in Barcelona report a normal status of the internet connection. The treat is classified as “local”. t m 30 s – After about 8 minutes from its activation, the CGA in Madrid consolidates the HF link with the ECI in Barcelona, providing a safe basic connection via the SWING network.

Most Reasonable Scenario 2/2 5SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Worst Case Scenario 1/2 6SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 t m – The ECI – Palermo is under attack: it detects an interruption in the internet connection and via the HF link signals its status to the connected CGA in Rome. t 0 +1m 30 s– The Rome’s CGA receives the alert message from one of its ECIs and activates a check procedure among the connected nodes. t m 20 s – Also the ECIs in Naples and Patrasso experience a loss of internet- connection. In about one minute they both send an alert to their relative CGA. t m – The CGA – Athens is under attack. It submits to the other CGAs a request to activate the SWING network. t m 15s – Also the CGA in Rome, detecting a multiple alert form some of its ECIs, confirms the request of SWING activation. t m – All the nodes are connected via the SWING network while their broadband connection is inhibited.

Worst Case Scenario 2/2 7SWING Final Meeting | CNIT - Pisa, Italy13/12/2013

Characteristics of the SWING system 8SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 Hierarchical structure (each CGA monitors the relative ECIs); Simple design (it is an emergency system: fast activation, cheap stand-by status); System resilience (it needs to be operative when other systems are not); Scalability of the infrastructure (the definition of new node does not effect the functioning of the network).

Supervision of the Internet Links 9SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 Fault Management (detection, isolation and resolution of network faults); Configuration Management (configuring and adjusting a network); Accounting Management (tracking the usage of network resources); Performance Management (monitoring network utilization at various points in a network); Security Management (processes to make the network secure).

Simple Network Management Protocol 10SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 The SNMP is an internet-standard protocol for managing devices on IP networks. SNMP is made by 3 components: Network Management System (NMS); Managed device; Agent. The SNMP operates in the Application Layer of the Internet Protocol Suite (Layer 7 of the OSI model).

Perform. Monitoring & Managem. Tools 11SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 Active tools: ToolMetricsMeasurement approach pingdelay (RTT), lossICMP echo iperfachievable bandwidthpath flooding bingbandwidth capacity, loss RTT delay variable packet size tracerouteTopology, delay (RTT)varied TTL pathcharbandwidth capacity loss, delay (RTT) variable packet size netperfachievable bandwidthpath flooding Weather Maps – Multi Router Traffic Grapher (MRTG) Diagram; Nagios (an host and service monitor designed to detect network problems in advance respect the user); Passive tools:

SWING Network Management System 12SWING Final Meeting | CNIT - Pisa, Italy13/12/ Distributed Monitoring Server at each ECI site; - Central Monitoring Server at each CGA site.

Reactivation of the Internet links 13SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 The CGAs involved in the attack regularly carry out a sensing of the Internet connections for the relative ECIs. This is done through simple sensing procedure whose repetition frequency depends on the minimum latency for the broadband reactivation indicated by the customer. When the CGA senses the availability of the internet connection to one of the relative ECIs, it restores the broad band connection and disables the HF emergency link. The deactivation of the emergency HF link is subordinated to the restoration of the traditional internet connection. The restoration of the broad band connection takes place in a capillary way: from the external nodes to the inner CGAs ring. The SWING deactivation procedure must occur in a controlled fashion, by using specifically designed not-ambiguous end-of-message signals.

Final Considerations 14SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 The complete process required for the activation of the HF back-up network after a warning alert event has been considered assuming a realistic network configuration and two different potential terroristic attacks. The time needed to guarantee a safe basic internet connection via SWING to the node under attack has been estimated in less than 10 minutes from the triggering event. However the effective time required for a complete SWING activation/ deactivation will depend on the event sequence that triggered the SWING and on the complexity of the effective physical topology of the SWING network.

References 15SWING Final Meeting | CNIT - Pisa, Italy13/12/2013 [1] Technical Report N. 2, “Technical analysis of the communication problems related to the identification and designation of CIs in the interested area”, Swing project, Sep [2] Douglas R. Mauro and Kevin J. Schmidt, “Essential SNMP”, (1st ed.) Sebastopol, CA: O’Reilly & Associates, [3] “An Architecture for Describing Simple Network Management Protocol (SNMP) Management Frameworks”, IETF RFC 3411 [4] The MultiRouter Traffic Grapher Home Page, [5] Nagios Home Page,