Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.

Slides:



Advertisements
Similar presentations
Using Network Virtualization Techniques for Scalable Routing Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton University.
Advertisements

Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
11/20/09 ONR MURI Project Kick-Off 1 Network-Level Monitoring for Tracking Botnets Nick Feamster School of Computer Science Georgia Institute of Technology.
Grand Challenges in Networking Nick Feamster CS 7001.
Wenke Lee and Nick Feamster Georgia Tech Botnet and Spam Detection in High-Speed Networks.
Path Splicing with Network Slicing
Network Virtualization Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton NSF NeTS-FIND PI Meeting.
Challenges in Making Tomography Practical
Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Using VINI to Test New Network Protocols Murtaza Motiwala, Georgia Tech Andy Bavier, Princeton University Nick Feamster, Georgia Tech Santosh Vempala,
Network Support for Accountability Nick Feamster Georgia Tech Collaborative Response with David Andersen (CMU), Hari Balakrishnan (MIT), Scott Shenker.
Spamming with BGP Spectrum Agility Anirudh Ramachandran Nick Feamster Georgia Tech.
Characterizing VLAN-Induced Sharing in a Campus Network
Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
Campus Testbed for Network Management and Operations Nick Feamster Georgia Tech Joint with Ankur Nayak, Russ Clark, Ron Hutchins, Campus OIT Also input.
Improving Internet Availability with Path Splicing Nick Feamster Georgia Tech.
Network-Based Spam Filtering Anirudh Ramachandran Nick Feamster Georgia Tech.
My Experience Writing an NSF NeTS FIND Proposal Nick Feamster Georgia Tech.
Multihoming and Multi-path Routing
Network-Based Spam Filtering Nick Feamster Georgia Tech Joint work with Anirudh Ramachandran and Santosh Vempala.
Network Support for Sharing. 2 CABO: Concurrent Architectures are Better than One No single set of protocols or functions –Different applications with.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
The Datapository Dave Andersen, CMU James Moss, CMU Nick Feamster, Georgia Tech
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Network Security Highlights Nick Feamster Georgia Tech.
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
1 Network-Level Spam Detection Nick Feamster Georgia Tech.
Network Operations Research Nick Feamster
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Network Security Highlights Nick Feamster Georgia Tech.
A Narrow Waist for Multipath Routing Murtaza Motiwala Bilal Anwer, Mukarram bin Tariq David Andersen, Nick Feamster.
Multihoming and Multi-path Routing
1 Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Multihoming and Multi-path Routing CS 7260 Nick Feamster January
NDN in Local Area Networks Junxiao Shi The University of Arizona
Four myths about GENI (and one recommendation) Constantine Dovrolis College of Computing Georgia Tech.
Network+ Guide to Networks, Fourth Edition
1 In VINI Veritas: Realistic and Controlled Network Experimentation Jennifer Rexford with Andy Bavier, Nick Feamster, Mark Huang, and Larry Peterson
Understanding the Network-Level Behavior of Spammers Anirudh Ramachandran Nick Feamster.
1 GENI: Global Environment for Network Innovations Jennifer Rexford Princeton University
1 GENI: Global Environment for Network Innovations Jennifer Rexford On behalf of Allison Mankin (NSF)
Network Security: Spam Nick Feamster Georgia Tech CS 6250 Joint work with Anirudh Ramachanrdan, Shuang Hao, Santosh Vempala, Alex Gray.
Tesseract A 4D Network Control Plane
The Future of Internet Research Scott Shenker (on behalf of many networking collaborators)
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
The Future of the Internet Jennifer Rexford ’91 Computer Science Department Princeton University
Backbone Support for Host Mobility: A Joint ORBIT/VINI Experiment Jennifer Rexford Princeton University Joint work with the ORBIT team (Rutgers) and Andy.
1 Authors: Anirudh Ramachandran, Nick Feamster, and Santosh Vempala Publication: ACM Conference on Computer and Communications Security 2007 Presenter:
Fighting Spam, Phishing and Online Scams at the Network Level Nick Feamster Georgia Tech with Anirudh Ramachandran, Shuang Hao, Nadeem Syed, Alex Gray,
Network+ Guide to Networks, Fourth Edition Chapter 1 An Introduction to Networking.
S T A N F O R D U N I V E R S I T Y I N F O R M A T I O N T E C H N O L O G Y S E R V I C E S C o m m u n i c a t i o n S e r v i c e s July 12,
Speaker:Chiang Hong-Ren Botnet Detection by Monitoring Group Activities in DNS Traffic.
Sponsored by the National Science Foundation Research & Experiments on GENI GENI CC-NIE Workshop NSF Mark Berman, Mike Zink January 7,
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
CSC8320. Outline Content from the book Recent Work Future Work.
Vytautas Valancius, Nick Feamster, Akihiro Nakao, and Jennifer Rexford.
Spamming Botnets: Signatures and Characteristics Yinglian Xie, Fang Yu, Kannan Achan, Rina Panigrahy, Geoff Hulten, and Ivan Osipkov. SIGCOMM, Presented.
Understanding the Network-Level Behavior of Spammers Author: Anirudh Ramachandran, Nick Feamster SIGCOMM ’ 06, September 11-16, 2006, Pisa, Italy Presenter:
Understanding the network level behavior of spammers Published by :Anirudh Ramachandran, Nick Feamster Published in :ACMSIGCOMM 2006 Presented by: Bharat.
Tracking Malicious Regions of the IP Address Space Dynamically.
UNIT 2 LESSON 4 CS PRINCIPLES. OBJECTIVES Students will be able to: Describe the redundancy of routing between two points on the Internet. Send messages.
NOX: Towards an Operating System for Networks
CS 268: Computer Networking
Four myths about GENI (and one recommendation)
DDoS Attack Detection under SDN Context
Network+ Guide to Networks, Fourth Edition
Layering and the TCP/IP protocol Suite
Presentation transcript:

Research Summary Nick Feamster

The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground up (architecture) –Once the network is running (diagnosis) –In the face of malice (security)

Research Approach Observe real-world problem (visit the trenches) Gather data, insight, etc. Propose principled approach Build system Deploy in practice (tech transfer)

Architecture: Path Splicing Problem: How to use multiple paths to a destination to improve availability? t s Compute multiple forwarding trees per destination. Allow packets to switch slices midstream. Motiwala et al., Path Splicing, SIGCOMM, August 2008

Architecture: AIP Problem: Many network security problems and point solutions Solution: Make many existing security mechanisms easier by changing address format Key idea: Addresses are self-certifying –A hosts address is the public key Andersen et al., Accountable Internet Architecture, SIGCOMM, August 2008

Real-Time Diagnosis Coordinated analysis of routing announcements Causality analysis in network traffic Coordinated end-to-end probes (network tomography) Huang et al., Exposing Routing Problems with Network-Wide Analysis, SIGMETRICS, June 2007 Tariq et al., Answering What-if Deployment and Configuration Questions with WISE, SIGCOMM, August 2008 Huang et al., Practical Issues with Using Network Tomography for Fault Diagnosis

Malice: Spam Filtering Problem: Distinguishing spam from ham. (Content filters are evadable, heavyweight) Solution: Track sender behavior. Host Recipient Query for IP sender, with sending pattern SpamTracker Similarity Spam Score Clusters with known association with spamming Traditional Keyword Spam Filter SpamTracker Legitimate Mail Spam Wide-Area Internet ?? Behavioral Analysis of Spam Activity ISP reporting … Regional Net Admin ? X Ok X Ramachandran et al., Undersanding the Network-Level Behavior of Spammers, SIGCOMM, August 2006 Ramachandran et al., Filtering Spam with Behavioral Blacklisting, CCS, October 2007

Summary Concrete Problem DataPrincipled Approach Results Improving availability when networks fail ISP Topologies and Failure Data Ground up approach: Path Splicing Benefit shown in simulation; now building on VINI Faster diagnosis of network problems Traffic, routing, measurements Derive causal explanations with coordinated analysis Algorithms adopted by AOL, Google, Thomson, etc. Spam filteringSpam, routing, blacklist lookups Analyze behavior, not content Deployed system, adoption by Cisco/Ironport

Principled Redesign of How Networks are Operated

Problem Many network network management tasks Today: Many solutions require operator vigilance, hacks, magic, etc. Can we make these tasks easier using a principled approach? –Recent trends of programmable networking may help

Approach Exploit recent trends in programmable networks (OpenFlow, VINI, etc.) –Deploy algorithms, protocols from earlier work –Bring the papers to practice Two ways to deploy –Testbeds (VINI, GENI) –OpenFlow-enabled campus and enterprise networks (Georgia Tech will be one; working with OIT on this) Developing the deployment platforms has its own research challenges, which I am working on as well (GENI/VINI)

One Idea: Outsourcing Network Management Lots of independently operated networks –Each with view of network traffic –Including home networks (a known large source of unwanted traffic) –Many cannot afford their own network administrator! Lots of distributed inference algorithms –For example: SpamTracker, WISE Use output from distributed inference to control network elements across many networks

PECASE Award 20 NSF CAREER Awardees per year, across all sciences For contributions to network management and operations, particularly in helping to secure the nations cyberinfrastructure