What Data Do We Need and Why Do We Need It? Jim Pepin Chief Technology Officer University of Southern California.

Slides:



Advertisements
Similar presentations
1 An Update on Multihoming in IPv6 Report on IETF Activity IPv6 Technical SIG 1 Sept 2004 APNIC18, Nadi, Fiji Geoff Huston.
Advertisements

Data Mining Challenges for Network Management Nick Feamster, Georgia Tech Dave Andersen, CMU (joint with Jay Lepreau and Emulab)
The VPN-Alyzer When Collecting SNMP and Netflow isnt practical.
Security BoF: What Are The Community's Open Questions? Joe St Sauver, Ph.D. or Manager, Internet2 Nationwide Security.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 44 How Firewalls Work How Firewalls Work.
FIREWALLS. What is a Firewall? A firewall is hardware or software (or a combination of hardware and software) that monitors the transmission of packets.
Security and Privacy Issues in Wireless Communication By: Michael Glus, MSEE EEL
 Guarantee that EK is safe  Yes because it is stored in and used by hw only  No because it can be obtained if someone has physical access but this can.
K. Salah 1 Chapter 31 Security in the Internet. K. Salah 2 Figure 31.5 Position of TLS Transport Layer Security (TLS) was designed to provide security.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Computer Science Department Princeton University
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Measurement and Monitoring Nick Feamster Georgia Tech.
John Kristoff DePaul Security Forum Network Defenses to Denial of Service Attacks John Kristoff
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Vocabulary URL = uniform resource locator: web address protocol –set of rules that networked computers follow in order to share data and coordinate communications.
Bandwidth DoS Attacks and Defenses Robert Morris Frans Kaashoek, Hari Balakrishnan, Students MIT LCS.
INTRUSION DETECTION SYSTEM
A global, public network of computer networks. The largest computer network in the world. Computer Network A collection of computing devices connected.
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
“Creating Data Repositories..” Sanjay Rao ECE Dept, Purdue University.
NETWORKS – NETWORK FUNDAMENTALS. How do computers connect to each other? Wired vs. Wireless Network cards Special device on computer that lets the computer.
Trusted Computing, Peer-To-Peer Distribution, and the Economics of Pirated Entertainment Peter Scott Based on paper by S. E. Schechter, R. A. Greenstadt,
Lecturer: Ghadah Aldehim
What is FORENSICS? Why do we need Network Forensics?
1 Chapter 9 E- Security. Main security risks 2 (a) Transaction or credit card details stolen in transit. (b) Customer’s credit card details stolen from.
Data Security and Privacy in Academic Computing Terry Benzel Deputy Director Internet and Networked Systems Division Information Sciences Institute John.
Monitoring for network security and management Cyber Solutions Inc.
Happy Network Administrators  Happy Packets  Happy Users WIRED Position Statement Aman Shaikh AT&T Labs – Research October 16,
Web Page Design I Basic Computer Terms “How the Internet & the World Wide Web (www) Works”
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
Using Measurement Data to Construct a Network-Wide View Jennifer Rexford AT&T Labs—Research Florham Park, NJ
Firewalls Nathan Long Computer Science 481. What is a firewall? A firewall is a system or group of systems that enforces an access control policy between.
VIRTUAL PRIVATE NETWORK By: Tammy Be Khoa Kieu Stephen Tran Michael Tse.
Day 14 Introduction to Networking. Unix Networking Unix is very frequently used as a server. –Server is a machine which “serves” some function Web Server.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
Network Security Technologies CS490 - Security in Computing Copyright © 2005 by Scott Orr and the Trustees of Indiana University.
1 Intrusion Detection Methods “Intrusion detection is the process of identifying and responding to malicious activity targeted at computing and networking.
Network Measurement Tools ESnet Site Coordinators Meeting 26 April 2000 Tracie Monk, UCSD/SDSC/CAIDA -
NUOL Internet Application Services Midterm presentation 22 nd March, 2004.
1 UNIT 13 The World Wide Web Lecturer: Kholood Baselm.
1 CNT 4704 Analysis of Computer Communication Networks Cliff Zou Department of Electrical Engineering and Computer Science University of Central Florida.
An Update on Multihoming in IPv6 Report on IETF Activity RIPE IPv6 Working Group 22 Sept 2004 RIPE 49 Geoff Huston, APNIC.
Approaches to Multi6 An Architectural View of Multi6 proposals Geoff Huston March 2004.
1 Figure 10-4: Intrusion Detection Systems (IDSs) Actions  Alarms  Interactive analysis Manual event inspection of raw log file Pattern retrieval 
IPSec and TLS Lesson Introduction ●IPSec and the Internet key exchange protocol ●Transport layer security protocol.
Securing Data Transmission and Authentication. Securing Traffic with IPSec IPSec allows us to protect our network from within IPSec secures the IP protocol.
BY: CHRIS GROVES Privacy in the Voting Booth. Reason for Privacy Voters worry that their vote may be held against them in the future  People shouldn’t.
Research and Education Networking Information Sharing and Analysis Center REN-ISAC Doug Pearson Director, REN-ISAC
1 CDA 4527 Computer Communication Networking (not “analysis”) Prof. Cliff Zou School of Electrical Engineering and Computer Science University of Central.
UNIT 2 LESSON 4 CS PRINCIPLES. OBJECTIVES Students will be able to: Describe the redundancy of routing between two points on the Internet. Send messages.
Connection Technologies and IP Addressing CONNECTING TO THE INTERNET.
BUFFERZONE Advanced Endpoint Security Data Connectors-Charlotte January 2016 Company Confidential.
Lecture 17 Page 1 CS 236 Online Onion Routing Meant to handle issue of people knowing who you’re talking to Basic idea is to conceal sources and destinations.
ECE 374: Computer Networks & Internet Introduction Spring 2015 Prof. Michael Zink.
ECE 374: Computer Networks & Internet Introduction Spring 2012 Prof. Michael Zink.
Role Of Network IDS in Network Perimeter Defense.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
REN-ISAC Research and Education Networking Information Sharing and Analysis Center Doug Pearson REN-ISAC Director Internet2 Security WG BoF October 14,
K. Salah1 Security Protocols in the Internet IPSec.
1 UNIT 13 The World Wide Web. Introduction 2 Agenda The World Wide Web Search Engines Video Streaming 3.
1 UNIT 13 The World Wide Web. Introduction 2 The World Wide Web: ▫ Commonly referred to as WWW or the Web. ▫ Is a service on the Internet. It consists.
A Layered Solution to Cybersecurity Dr. Erfan Ibrahim Cyber-Physical Systems Security & Resilience Center National Renewable Energy Laboratory.
Advanced Endpoint Security Data Connectors-Charlotte January 2016
Module 3: Enabling Access to Internet Resources
Network Security Marshall Leitem 11/30/04
Computer Data Security & Privacy
Web Privacy Chapter 6 – pp 125 – /12/9 Y K Choi.
Panel on Network Data and Monitoring - The Abilene Network
An Update on Multihoming in IPv6 Report on IETF Activity
Computer Networks Protocols
Presentation transcript:

What Data Do We Need and Why Do We Need It? Jim Pepin Chief Technology Officer University of Southern California

Network Data: Research Depends on It Solutions depend on understanding the problem… Advances in many areas depend on analysis of real data Network Management: Traffic engineering, net design Network Control: Improving routing protocols High Performance: Better transport protocols Security: Tracking/stopping DoS and worm attacks Over 30% of papers in top networking conference (SIGCOMM’04) depended on data collected by others Most common providers: ISPs (e.g., ATT, Sprint, I2) Service Providers (e.g., Akamai) Individual campuses (e.g., UNC, UOregon, USC – some campuses give data only to local researchers)

Network Data: More than Just Packet Traces Some data more sensitive than others Dynamic routing information: routing protocol advertisements Static design information: Router configuration files, peering arrangements, policies Operational events: alarms, trouble tickets (very few sources of this important info!) Traffic logs: netflow records, packet header traces Application data: URLs, p2p filenames, DNS queries Tension – how much correlation to permit? Data that can be correlated across multiple sites most valuable in measuring network-wide events, e.g. worms Techniques for privacy anonymize and blur identity

Example of Data Provider DHS PREDICT DHS support for network research Not for operational use by DHS Major Players Peer review ground rules Generic sources for legitimate research LANDER Project Example of PREDICT supplier Joint project of USC-ISI networking division and USC/ISD Center for High Performance Computing and Communications –USC-HPCC is manager of WAN for USC/CIT/JPL. –ISI provides networking research background –HPCC provides data storage and computational resources –We work together on ground rules and MOUs –LANDER funds collection systems, support staff and disk/tape space

What is hard and easy LANDER ground rules Scrambled headers is primary product today Requires MOU with researcher No collection of data payloads. Working on very strict MOU for very limited use of non- scrambled header data for very select uses in very controlled environment. Build collection management system integrated with other PREDICT sites. How we do this Very close co-operation between ISI, ISD and university legal MOUs will be very clear and understandable for the researcher USC can reject any application USC will review any publication based on unscrambled headers and all work processing these headers will be done inside HPCC

Why would we do this The Internet needs to be studied and engineered What is the modern equivalent of Bell Labs for phone system? How did we get to where we are today? –Co-operation between researchers and operators. We can’t allow ourselves to have complete bunker mentality We need to be selective in what we provide, but in case of demonstrated need provide what is needed consistent with policies If we don’t do this no one will The risks can be managed if we take the time and effort to work with campus management (legal, CIOs etc) to mitigate Researchers can be brought into these discussions if cast correctly If we don’t study how the network works our ability to manage it will degrade to zero over time