Cooperative Association for Internet Data Analysis CAIDA Activities TERENA – May 22, 2007 Colleen Shannon

Slides:



Advertisements
Similar presentations
The Messy World of Grey Literature in Cyber Security 8 th Grey Literature Conference 4-5 December 2006 New Orleans, Louisiana Patricia Erwin – I3P Senior.
Advertisements

The ICANN Experiment CainetCainet Andrew McLaughlin.
DRIVER Long Term Preservation for Enhanced Publications in the DRIVER Infrastructure 1 WePreserve Workshop, October 2008 Dale Peters, Scientific Technical.
University of Nevada, Reno Router-level Internet Topology Mapping CS790 Presentation Modified from Dr. Gunes slides by Talha OZ.
Maines Sustainability Solutions Initiative (SSI) Focuses on research of the coupled dynamics of social- ecological systems (SES) and the translation of.
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, Hari Balakrishnan MIT and Berkeley presented by Daniel Figueiredo Chord: A Scalable Peer-to-peer.
Sergei Komarov. DNS  Mechanism for IP hostname resolution  Globally distributed database  Hierarchical structure  Comprised of three components.
Presentation at WebEx Meeting June 15,  Context  Challenge  Anticipated Outcomes  Framework  Timeline & Guidance  Comment and Questions.
Abilene Transit Security Policy Joint Techs Summer ’05 Vancouver, BC, CA Steve Cotter Director, Network Services Steve Cotter Director,
Connect. Communicate. Collaborate Click to edit Master title style MODULE 1: perfSONAR TECHNICAL OVERVIEW.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Dave Jent, PI Luke Fowler, Co-PI Ron Johnson, Co-PI
1 IBM SanFrancisco Product Evaluation Negotiated Option Presentation By Les Beckford May 2001.
A a secure peering. RIB table dump by attributes in order to save space. References 1. RouteViews, 2. RIPE,
(Geneva, Switzerland, September 2014)
National Institute of Standards and Technology Computer Security Division Information Technology Laboratory Threat Information Sharing; Perspectives, Strategies,
Stephen S. Yau CSE , Fall Security Strategies.
Internet Quarantine: Requirements for Containing Self-Propagating Code David Moore et. al. University of California, San Diego.
Networks ∙ Services ∙ People John DYER TF-MSP Video Conference Community Procurement Support Building on the SPOT-ON Proposal Smart Procurement,
1 Network Topology Measurement Yang Chen CS 8803.
Network security policy: best practices
Join Our Research Efforts in CCAA to Improve Cybersecurity Robustness, Resiliency and Management in Enterprises Information Slides to Encourage Your Organization.
Routing Measurements Matt Zekauskas, ITF Meeting 2006-Apr-24.
TERENA News Update TERENA User Services related Activity IETF50, Minneapolis IETF User Services WG Yuri Demchenko, TERENA
Strategic Technology Planning for Nonprofits 2009 Pacific Northwest Digital Inclusion Summit David Forrester January 28, 2009.
Tanenbaum & Van Steen, Distributed Systems: Principles and Paradigms, 2e, (c) 2007 Prentice-Hall, Inc. All rights reserved DISTRIBUTED SYSTEMS.
Introduction to Honeypot, Botnet, and Security Measurement
User-Perceived Performance Measurement on the Internet Bill Tice Thomas Hildebrandt CS 6255 November 6, 2003.
BITS Proprietary and Confidential © BITS Security and Technology Risks: Risk Mitigation Activities of US Financial Institutions John Carlson Senior.
Measuring ISP Toplogies with Rocketfuel Neil Spring, Ratul Mahajan, and David Wetherall Presented By: David Deschenes March 25, 2003.
Research on design and implementation of Internet measurement infrastructure Lv Jun Aug 28, 2003.
FIDEMO 2009, Nov. 18 A Step Towards a Planet-scale Measurements Retrieval Infrastructure In this work, we propose to design an end-to-end path and delay.
AL-MAAREFA COLLEGE FOR SCIENCE AND TECHNOLOGY INFO 232: DATABASE SYSTEMS CHAPTER 1 DATABASE SYSTEMS (Cont’d) Instructor Ms. Arwa Binsaleh.
Internet Drivers License CSS411/BIS421 Computing Technology & Public Policy Mark Kochanski Spring 2010.
Honeypot and Intrusion Detection System
Understanding the Network-Level Behavior of Spammers Best Student Paper, ACM Sigcomm 2006 Anirudh Ramachandran and Nick Feamster Ye Wang (sando)
March 26, 2003The Navigo Project Hans C. Masing, The University of Michigan Lance D. Speelmon, Indiana University An IMS and OKI Compliant Open Source.
The Legislative Library of Ontario’s Ontario Documents Repository Road to Partnership.
NDIIPP The Next Phase Meg Williams Associate General Counsel The Library of Congress.
Institute of Food Technologists (IFT) myIFT.org Overview Paul D. Grassman Director, Information Services September 2003.
The Network Performance Advisor J. W. Ferguson NLANR/DAST & NCSA.
The Ethics of Internet Research Rebecca Eynon, Jenny Fry and Ralph Schroeder Oxford Internet Institute, University of Oxford
NREL is a national laboratory of the U.S. Department of Energy, Office of Energy Efficiency and Renewable Energy, operated by the Alliance for Sustainable.
MOME MOME: An advanced measurement meta-repository IPS-MoMe Workshop, Warsaw, Poland March 14, 2005 Felix Strohmeier Authors:
Advanced Networking Lab. Given two IP addresses, the estimation algorithm for the path and latency between them is as follows: Step 1: Map IP addresses.
INTERACTIVE ANALYSIS OF COMPUTER CRIMES PRESENTED FOR CS-689 ON 10/12/2000 BY NAGAKALYANA ESKALA.
Fisheries Oceanography Collaboration Software Donald Denbo NOAA/PMEL-UW/JISAO Presented by Nancy Soreide NOAA/PMEL AMS 2002/IIPS 10.3.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
The UCSD Network Telescope A Real-time Monitoring System for Tracking Internet Attacks Stefan Savage David Moore, Geoff Voelker, and Colleen Shannon Department.
Network Measurement Tools ESnet Site Coordinators Meeting 26 April 2000 Tracie Monk, UCSD/SDSC/CAIDA -
Working Group #4: Network Security Best Practices September 12, 2012 Presenter: Rod Rasmussen, Internet Identity WG #4 Co-Chair.
Frankfurt (Germany), 6-9 June 2011 Iiro Rinta-Jouppi – Sweden – RT 3c – Paper 0210 COMMUNICATION & DATA SECURITY.
Advanced Networks: The Past and the Future – The Internet2 Perspective APAN 7 July 2004, Cairns, Australia Douglas Van Houweling, President & CEO Internet2.
1 Secure Peer-to-Peer File Sharing Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, Hari Balakrishnan MIT Laboratory.
LOBSTER: Large Scale Monitoring of Broadband Internet Infrastructure Evangelos Markatos The LOBSTER Consortium Institute.
Security and Assurance in IT organization Name: Mai Hoang Nguyen Class: INFO 609 Professor: T. Rohm.
Internet2 Applications Group: Renater Group Presentation T. Charles Yun Internet2 Program Manager, Applications Group 30 October 2001.
Internet Protocol Addresses What are they like and how are the managed? Paul Wilson APNIC.
Data Mining Status and Risks Dr. Gregory Newby UNC-Chapel Hill
NCP Info DAY, Brussels, 23 June 2010 NCP Information Day: ICT WP Call 7 - Objective 1.3 Internet-connected Objects Alain Jaume, Deputy Head of Unit.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Agenda Past & Present Who we are & what we do Activities Challenges.
DNS Domain Name System By Alexandros Zampas B101 Coursework The Technology Context.
1  Carnegie Mellon University Overview of the CERT/CC and the Survivable Systems Initiative Andrew P. Moore CERT Coordination Center.
Grid Services for Digital Archive Tao-Sheng Chen Academia Sinica Computing Centre
Intrusion Tolerant Architectures
Evaluation of a Large-Scale Topology Discovery Aglorithm
Detection and Analysis of Threats to the Energy Sector (DATES)
Bird of Feather Session
“Detective”: Integrating NDT and E2E piPEs
Presentation transcript:

Cooperative Association for Internet Data Analysis CAIDA Activities TERENA – May 22, 2007 Colleen Shannon

Cooperative Association for Internet Data Analysis What is CAIDA? Cooperative Association for Internet Data Analysis Goals include measuring and understanding the global Internet. Develop measurement and analysis tools Collect and provide Internet data: topology, header traces, routing, network security, DNS Visualization of the network

Cooperative Association for Internet Data Analysis Outline Macroscopic Topology Measurement Routing DNS Security COMMONS Data Collection, Curation, and Distribution –DatCat: the Internet Measurement Data Catalog Tools

Cooperative Association for Internet Data Analysis Macroscopic Topology Measurement (Brad Huffaker, Young Hyun) Skitter project continues: daily traceroute- like measurements to ~500,000 locations New active measurement infrastructure: Archipelago (Ark) –Architecture supports: Coordinated measurements (e.g. team probing) Shared use of a common measurement infrastructure Security measures to ensure responsible use and data integrity

Cooperative Association for Internet Data Analysis Routing (Dima Krioukov) Realistic topology generation –dK series graphs can generate topologies that satisfy a series of graph properties AS Adjacencies –Traceroute-based matrix of Internet AS-level graph AS Relationships, Classification, and Taxonomy –AS adjacencies annotated with information such as inferred customers and providers and IP address space

Cooperative Association for Internet Data Analysis Domain Name System (DNS) (Duane Wessels, Marina Fomenkov) DNS Surveys –Open resolvers (recursive name resolution to folks outside their administrative domain) –Cache poisoning (incorrect referrals for important domains) –Nameserver software prevalence RTT measurements to DNS root and gTLD servers

Cooperative Association for Internet Data Analysis Current Security Research (David Moore, Colleen Shannon) Nyxem/Blackworm/KamaSutra/MyWife – Spamscatter Botnet Economics Worm Risk Analysis Anomaly Detection

Cooperative Association for Internet Data Analysis Internet ID Consumption IPv4 address space

Cooperative Association for Internet Data Analysis COMMONS (k claffy) Cooperative Measurement and Modeling of Open Networked Systems Problems: –Infrastructure financial crisis –Data acquisition crisis –Struggle for survival for emerging community/municipal wireless network Solution: Cooperative national backbone connecting community and municipal networks –Low-cost access for community wireless networks via shared network resources –Implicit support (and consent) for measurement activities

Cooperative Association for Internet Data Analysis CAIDA Datasets Freely available datasets Academic / Non-profit access datasets For-profit use: sponsor dataset creation –Join CAIDA: –US organizations: use PREDICT

Cooperative Association for Internet Data Analysis Day in the Life of the Internet At-least annual measurement with as many networks participating as possible Most recent: January 9-10, 2007 –7 DNS participants (C root, F root, K root, M root, AS112, B ORSN, M ORSN) –5 network participants (WIDE, KAIST, POSTTECH, AMPATH, CAIDA) To join future DITL data collections,

Cooperative Association for Internet Data Analysis Freely Available Data The following datasets are available to anyone who wishes to use them: –AS Adjacencies –Router Adjacencies –Code-Red Worm –Witty Worm –AS Relationships –AS Rank –AS Taxonomy

Cooperative Association for Internet Data Analysis Data available for non-profit use The following datasets are available to academic, government, and non-profit researchers: –Raw macroscopic topology traces (skitter) –OC48 peering point data –Denial-of-service attack backscatter (TOCS, , 2006) –Witty Worm –DNS root/gTLD RTT data

Cooperative Association for Internet Data Analysis Internet Measurement Data Catalog

Cooperative Association for Internet Data Analysis DatCat Goals (1) to facilitate searching for and sharing of data among researchers –Index as much as possible, including datasets not publicly available –DatCat doesn’t store any network data itself

Cooperative Association for Internet Data Analysis DatCat Goals (2) to enhance documentation of datasets via a public annotation system –Easy place for anyone (not just the dataset creator) to provide additional information –Persistent reference that stays with the dataset (not a footnote in a paper)

Cooperative Association for Internet Data Analysis DatCat Goals (3) to advance network science by promoting reproducible research –Test new technologies on consistent datasets to compare apples with apples

Cooperative Association for Internet Data Analysis DatCat lets you… Find data for research/engineering Annotate datasets to note features, background information, or bugs Cite data Contribute data (coming soon!)

Cooperative Association for Internet Data Analysis DatCat Status DatCat available for public viewing since June 12, 2006 Contribution interface open to beta-testers 76,708 data items 6 TB of data 33 Collections and Publications –15 non-CAIDA Data Collections (26 total) –6 non-CAIDA Publications (7 total)

Cooperative Association for Internet Data Analysis DatCat Example

Cooperative Association for Internet Data Analysis DatCat Example

Cooperative Association for Internet Data Analysis Collaboration Current: –CRAWDAD: Community Resource for Archiving Wireless Data at Dartmouth –MOME/MOMENT –UCSD-CSE, ICSI Future: –Abilene Observatory –RouteViews

Cooperative Association for Internet Data Analysis Next Steps Currently testing programmatic contribution interface Add support for Papers (specialized collection) Add support for tools GUI contribution interface

Cooperative Association for Internet Data Analysis For more information DatCat: General questions and comments Announcements Contribution beta-test

Cooperative Association for Internet Data Analysis PREDICT Overview Protected REpository for the Defense of Infrastructure against Cyber Threats –Problems PREDICT solves –Challenges thus far

Cooperative Association for Internet Data Analysis Why PREDICT? Most researchers do not have access to the data needed to research solutions to current security problems on the Internet Getting data requires cultivating personal relationships/trust over years (out of scope for academia) Significant security and privacy problems with distributing data Collecting, curating, and distributing data is expensive Getting data doesn’t scale for researchers Giving data doesn’t scale for providers

Cooperative Association for Internet Data Analysis PREDICT Goals Collect high-quality, relevant data Provide a minimally-secured index of available data Provide a robust legal and procedural framework to ensure the legality of distribution and appropriate handling of data Note: near lack of technology involved…

Cooperative Association for Internet Data Analysis PREDICT Challenges Getting commercial providers to sign Memos of Agreement is near impossible because it requires official acknowledgement that data is collected. –Also, it involves smart lawyers whose job is to minimize corporate risk. Correctly handling privacy is challenging – there is a clear research need for non-anonymized data. Distribution of non-anonymized data is inherently orthogonal to preserving privacy. –Finding middle ground takes time. Minimize government access to data (FOIA, bad press, big brother) –No one wants the government to have the data. Not even the government. Is it legal to collect data from a network that you do not own? –Few (if any) case histories to work from

Cooperative Association for Internet Data Analysis Progress! First step will only include non-anonymized data from non-commercial providers Anonymization helps with privacy; up-front meetings with privacy advocates very helpful (“model government program”) Procedures and review structure to minimize government involvement while protecting government interests Extensive legal research/documentation to support legality of collecting and distributing network data

Cooperative Association for Internet Data Analysis CAIDA Tools Measurement and analysis –CoralReef –Scamper –NeTraMet –DSC Visualization –Walrus –Cuttlefish –Otter

Cooperative Association for Internet Data Analysis Otter Example: AS Connectivity Map

Cooperative Association for Internet Data Analysis Walrus Example: Code-Red Worm

Cooperative Association for Internet Data Analysis Cuttlefish Example: Blackworm Virus (live demo)

Cooperative Association for Internet Data Analysis For more information… CAIDA Research: – CAIDA Data: – DatCat: – CAIDA Tools –

Cooperative Association for Internet Data Analysis Contact Information Questions about this talk: –cshannon at caida.org Questions about CAIDA in general –Info at caida.org Questions about CAIDA data –Data-info at caida.org Questions about the Day in the Life of the Internet (DITL) project –Ditl-info at caida.org Questions about DatCat –Info at datcat.org –Contribute at datcat.org