Architecture Update. Guest Host HOST COMPONENTS VERNIER Community Level: Connected Clusters User Node KB Super Node COMMUNITY MONITOR SERVLET WEB SERVER.

Slides:



Advertisements
Similar presentations
Diagnosing Performance Overheads in the Xen Virtual Machine Environment Aravind Menon Willy Zwaenepoel EPFL, Lausanne Jose Renato Santos Yoshio Turner.
Advertisements


System Center 2012 R2 Overview
Futures – Alpha Cloud Deployment and Application Management.
Tsunamis Detection The Mission  Tsunamis Detection can help to minimize loss of life and property from future tsunamis. Mission Introduction Mechanism.
Radko Zhelev, IPP BAS Generic Resource Framework for Cloud Systems 1 Generic Resource Framework for Cloud Systems.
VLab Web Application Architecture Xinyi Dong 10/1/
Chapter 15 Chapter 15: Network Monitoring and Tuning.
IT:Network:Applications VIRTUAL DESKTOP INFRASTRUCTURE.
1 Introduction to Load Balancing: l Definition of Distributed systems. Collection of independent loosely coupled computing resources. l Load Balancing.
TechNet and Community Tour - Dynamic IT Dynamic Desktop Deployment Level Advanced.
Build Test Integrat e Deploy Develop Languages Frameworks Cloud and Infra Data platforms.
Inferring the Topology and Traffic Load of Parallel Programs in a VM environment Ashish Gupta Peter Dinda Department of Computer Science Northwestern University.
L. Granado Cardoso, F. Varela, N. Neufeld, C. Gaspar, C. Haen, CERN, Geneva, Switzerland D. Galli, INFN, Bologna, Italy ICALEPCS, October 2011.
Automating Datacenter Using System Center 2012 Harpreet Singh Rana Consultant Microsoft Corporation MGT328.
1 Doctor Fault Management 18 May 2015 Ryota Mibu, NEC.
All Rights Reserved © Alcatel-Lucent | Dynamic Enterprise Tour – Safe NAC Solution | 2010 Protect your information with intelligent Network Access.
VIRTUALISATION OF HADOOP CLUSTERS Dr G Sudha Sadasivam Assistant Professor Department of CSE PSGCT.
Understanding and Managing WebSphere V5
Cost Effort Complexity Benefit Cloud Hosted Low Cost Agile Integrated Fully Supported.
Technology Overview. Confidential & Proprietary Information System Unit Server Two-way Satellite network System includes units and server Units have built.
31 January 2007Craig E. Ward1 Large-Scale Simulation Experimentation and Analysis Database Programming Using Java.
MOBILE CLOUD COMPUTING
B OTNETS T HREATS A ND B OTNETS DETECTION Mona Aldakheel
A Mobile-Agent-Based Performance-Monitoring System at RHIC Richard Ibbotson.
Network Administration. What is a Systems Administrator?  Person responsible for:  Setting up servers  Configuring the environment for web and other.
INSTALLING MICROSOFT EXCHANGE SERVER 2003 CLUSTERS AND FRONT-END AND BACK ‑ END SERVERS Chapter 4.
Contents 1.Introduction, architecture 2.Live demonstration 3.Extensibility.
IntroductionRelated work 2 Contents Publish/Subscribe middleware Conclusion and Future works.
Quasi-Static Binary Analysis Hassen Saidi. Quasi-Static Analysis in VERNIER Node level: –Quasi-static analysis is a detector of malicious and bad behavior.
The Path to Continuous Availability with Windows Server 2012 Luke Notley Technical Consultant – Red Ember WSV326.
The Grid System Design Liu Xiangrui Beijing Institute of Technology.
INTERNET AND ADHOC SERVICE DISCOVERY BY: NEHA CHAUDHARY.
Fast Crash Recovery in RAMCloud. Motivation The role of DRAM has been increasing – Facebook used 150TB of DRAM For 200TB of disk storage However, there.
Module 7: Advanced Application and Web Filtering.
GLIDEINWMS - PARAG MHASHILKAR Department Meeting, August 07, 2013.
Communications & Networks National 4 & 5 Computing Science.
Trusted Passages: Managing Trust Properties of Open Distributed Overlays Faculty: Mustaque Ahamad, Greg Eisenhauer, Wenke Lee and Karsten Schwan PhD Students:
Microsoft Confidential Automation Query, Manage and Configure Windows Azure resources (VMs, Cloud Services, Websites, Storage, Queues, Databases etc…)
Fault Detection Manager FDA Fault Recovery Manager Host VM OCCO InfoBroker CloudHandler ServiceComposer Application Create VM Deploy application Deploy.
Venus Project Brief Description. What It Do What Monitor Log Analyze Block Narrow Report Search Where Single stations Internet Gates Special Devices Web.
Office of Science U.S. Department of Energy Grid Security at NERSC/LBL Presented by Steve Chan Network, Security and Servers
Auditing Project Architecture VERY HIGH LEVEL Tanya Levshina.
Virtualized Execution Realizing Network Infrastructures Enhancing Reliability Application Communities PI Meeting Arlington, VA July 10, 2007.
+ Support multiple virtual environment for Grid computing Dr. Lizhe Wang.
Microsoft Virtual Academy Module 12 Managing Services with VMM and App Controller.
Interstage BPM v11.2 1Copyright © 2010 FUJITSU LIMITED INTERSTAGE BPM ARCHITECTURE BPMS.
Windows Server 2008 VSP Windows Kernel Applications Non- Hypervisor Aware OS Windows Server 2003, 2008 Windows Kernel VSC VMBus Emulation “Designed.
DataTAG is a project funded by the European Union CERN, 8 May 2003 – n o 1 / 10 Grid Monitoring A conceptual introduction to GridICE Sergio Andreozzi
2 Copyright © Oracle Corporation, All rights reserved. Basic Oracle Net Architecture.
Click to edit Master title style Sytel’s High Availability Strategy © 2012 Sytel Limited. All rights reservedVersion 2.5.
Oracle 10g Administration Oracle Server Introduction Copyright ©2006, Custom Training Institute.
Installation Guacamole Is a web application that provides access to desktop environments using remote desktop protocols (such as VNC or RDP); Installation.
Overview – SOE vAuto-Config
TrueSight Operations Management 11.0 Architecture
Introduction to Load Balancing:
Distributed Cache Dipl.-Ing. Damir Dobric Lead Architect daenet
TES 6.1 Agent Licensing Agents are licensed by Physical Servers
SharePoint disaster recovery as a service
TYPES OF SERVER. TYPES OF SERVER What is a server.
#01 Client/Server Computing
CIS 409Competitive Success/tutorialrank.com
CIS 409 Education for Service-- tutorialrank.com.
File Transfer Protocol
Scalable, distributed database system built on multicore systems
ExaO: Software Defined Data Distribution for Exascale Sciences
Pong: Diagnosing Spatio-Temporal Internet Congestion Properties
Managing Services with VMM and App Controller
Chapter 15: Network Monitoring and Tuning
#01 Client/Server Computing
Presentation transcript:

Architecture Update

Guest Host HOST COMPONENTS VERNIER Community Level: Connected Clusters User Node KB Super Node COMMUNITY MONITOR SERVLET WEB SERVER Situation Awareness Node EPIDEMIC BOT TRAFFIC Central Detection Node Guest TRAINING/ANALYSIS Analysis Node Multiple Node Roles

Guest Host HOST COMPONENTS User Node KB Super Node COMMUNITY MONITOR SERVLET WEB SERVER Situation Awareness Node EPIDEMIC BOT TRAFFIC Central Detection Node Guest TRAINING/ANALYSIS Analysis Node KB Super Node Situation Awareness Guest User Node Example Functional Overlay COMMUNITY MONITOR SERVLET WEB SERVER Situation Awareness Node

Guest Host HOST COMPONENTS User Node KB Super Node COMMUNITY MONITOR SERVLET WEB SERVER Situation Awareness Node EPIDEMIC BOT TRAFFIC Central Detection Node Guest TRAINING/ANALYSIS Analysis Node KB Super Node EPIDEMIC Central Detection Node Epidemic Detection Sample Functional Overlay 1.Anomaly reports from local Syzygy to central detector 2.Central Syzygy epidemic report published to Knowledge Base 3.User nodes receive report EPIDEMIC S S S

Guest Host HOST COMPONENTS User Node KB Super Node COMMUNITY MONITOR SERVLET WEB SERVER Situation Awareness Node EPIDEMIC BOT TRAFFIC Central Detection Node Guest TRAINING/ANALYSIS Analysis Node Configuration Diagnosis Sample Functional Overlay KB Super Node HOST COMPONENTS User Node C C C C C C C C 1.Sick node queries the continuously updated KB 2.Sick node posts demand query 3.User nodes reply 4.Sick node queries result

6 VERNIER User Node Level Guest HOST COMPONENTS Host Host Kernel AGENT GUARDIAN VM monitor Guest Kernel KERNEL AGENT USER LIB AGENT USER AGENT (Config) Apps Botswat Quasi-Static

7 Guest HOST COMPONENTS Host Host Kernel AGENT GUARDIAN VM monitor Guest Kernel KERNEL AGENT USER LIB AGENT USER AGENT (Config) Apps VERNIER User Node Level Local Coordinator PolicyState Configuration Execution Network Botswat Quasi-Static Detect Response Knowledge Sharing Diagnose

8 Guest HOST COMPONENTS Host Host Kernel AGENT GUARDIAN VM monitor Guest Kernel KERNEL AGENT USER LIB AGENT USER AGENT (Config) Apps VERNIER User Node Level Local Coordinator PolicyState Config Configuration Logger Diag & Resp Detect Updater Execution Syzygy Network Dynamic FW Rootkit Detect Component-specific Detect Response Knowledge Sharing Diagnose Model Botswat Quasi-Static Inter-component Q-S BotSwat