IX Data Collection- The Big Question? by Andrew Owens - NAPAfrica Protect. Connect. Grow.

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Takin Care of Business Emma Duncan Brampton Library.
ICANN Report Presented by: Dr Paul Twomey CEO and President LACNIC, Montevideo 31 March 2004.
Network Monitoring System In CSTNET Long Chun China Science & Technology Network.
MAPP - Overview. Three Keys to MAPP Strategic Thinking Community Driven Process Focus on the Local Public Health System.
Enhancing ICT development and connectivity in Africa Erik Habers Head of Cooperation EU Delegation Nairobi.
CENG 3331 Introduction to Telecommunications and Networks.
Building a case for interconnection and peering in Africa by Michele McCann - Teraco Protect. Connect. Grow.
Powered by SPS Strategic Products and Services spscom.com.
Technical Aspects of Peering Session 4. Overview Peering checklist/requirements Peering step by step Peering arrangements and options Exercises.
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Copyright © sFlow.org All Rights Reserved sFlow & Benefits Complete Network Visibility and Control You cannot control what you cannot see.
Network Management Overview IACT 918 July 2004 Gene Awyzio SITACS University of Wollongong.
Analysis of BGP Routing Tables
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
IXP & Neutral Colocation Symbiosis SAFNOG Data Centre definition In its simplest form, a data centre is a facility that houses IT equipment – Servers,
JANUARY 08, 2010 Cerf urges standards for cloud computing Management of cloud assets requires protocols, standards, and research, Internet.
Route Servers: What, Why, and How? Andy Davidson Allegro Networks / LONAP August 2014 Peer 2.0/SFO.
Peering, network sharing, interconnects Eckart Zollner September 2014.
Scaling IXPs Scalable Infrastructure Workshop. Objectives  To explain scaling options within the IXP  To introduce the Internet Routing Registry at.
TUTORIAL # 2 INFORMATION SECURITY 493. LAB # 4 (ROUTING TABLE & FIREWALLS) Routing tables is an electronic table (file) or database type object It is.
ISO Strategic Highlight and Innovation 9 July, 2015 A Successful Organization in 2020 INNOPROM /27.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
Innovative ITS services thanks to Future Internet technologies ITS World Congress Orlando, SS42, 18 October 2011.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Border Gateway Protocol Presented BY Jay Purohit & Rupal Jaiswal GROUP 9.
NetFlow: Digging Flows Out of the Traffic Evandro de Souza ESnet ESnet Site Coordinating Committee Meeting Columbus/OH – July/2004.
The University of Bolton School of Games Computing & Creative Technologies LCT2516 Network Architecture CCNA Exploration LAN Switching and Wireless Chapter.
BCNET Conference April 29, 2009 Andree Toonk BGPmon.net Prefix hijacking! Do you know who's routing your network? Andree Toonk
An Expansionary Approach towards the IPv6 Address Allocation Model Prof Dr Sureswaran Ramadass Director, NAv6. APRICOT 2010.
1 VNIX UPDATE VIETNAM NATIONAL INTERNET EXCHANGE (VNIX) Presented at APNIC Sep, 2005 in Hanoi, Vietnam by Tran Kien MINISTRY OF POSTS AND TELEMATICS.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
An IST Projecthttp:// Implementing IPFIX Luca Deri NETikos S.p.A.
Information Security 493. Lab # 4 (Routing table & firewalls) Routing tables is an electronic table (file) or database type object that is stored in a.
RAISE’s Future Kathy Atkinson Chief Executive. Is there a need for us? Positive endorsements in strategic review and recent annual survey Schizophrenic.
Internet2 Abilene & REN-ISAC Arbor Networks Peakflow SP Identification and Response to DoS Joint Techs Winter 2006 Albuquerque Doug Pearson.
Business and Finance Strategic Planning Agenda Introduction Overview: B&F Strategic Plan Discussion: B&F as one B&F Values with Behaviors.
CISC 849 : Applications in Fintech Jin Gu Dept of Computer & Information Sciences University of Delaware Cyber-security & Finance.
Benefits and Value of an IXP The IXP Value Proposition.
The Benefit and Need of Standard Contribution for IXPs Jan Stumpf System Engineer.
Why Civil Society should lobby and protect our right to use the Internet ISPA Internet Week, Thursday 12 September The Association for Progressive Communications.
Who and What is the RNF? What do we do? What can we offer? Our Stakeholders and Partners Why you should join? The leading non-profit Forum coordinating.
Application Protocol - Network Link Utilization Capability: Identify network usage by aggregating application protocol traffic as collected by a traffic.
NetFlow Analyzer Best Practices, Tips, Tricks. Agenda Professional vs Enterprise Edition System Requirements Storage Settings Performance Tuning Configure.
Market Engagement – security update
Scaling for Growth An African IXP’s Experience scaling for 100G.
“Introduction to Azure Security Center”
Deputy Executive Officer: Insurance Financial Services Board
Securing the Network Perimeter with ISA 2004
Riyadh Internet Exchange
We Care About Data Quality at IXPs
Dynam-IX: a Dynamic Interconnection eXchange
Working together to improve routing security for all
MANRS IXP Partnership Programme
The Power of Connected Streets
MANRS for IXPs Why we did it? What did we do?
மீன்’ பிடிப்போம்’.
The real-time Internet routing observatory
GENERAL INTRODUCTION TO ADVOCACY
Interconnection services UPDATE
YOUR text YOUR text YOUR text YOUR text
Peering Security DKNOG, March 14-15, 2019 Susan Forney and Walt Wollny
Multimedia Training Kit
The Sudanese IXP re-invented itself
Copenhagen, Denmak Bijal Sanghani
Internet eXchange Point Database Netnod Meeting– 2018
Cryptography and Network Security
Presentation transcript:

IX Data Collection- The Big Question? by Andrew Owens - NAPAfrica Protect. Connect. Grow.

Overview The Basics What Next? The Debate Con’s Pro’s The Question Community Driven Agenda

The Basics What you should be monitoring? Aggregate Traffic – Overall performance of exchange Per Interface Traffic – Per peer contribution Route Collector – Prefix Analysis, Debugging, Optimisation 3

What Next? Deeper traffic Analysis – sFlow, Netflow, jFlow, IPFIX Protocol Analysis Application Analysis Source and Destination Conversations*** Security Analysis Is it the IXP’s Job? 4

The Con’s Intellectual Property: Network data is the intellectual property of the members and an organisational asset. Trust: Will the IXP use data unethically? Security: Can the IXP securely store the data? Spying: Can this be considered as spying? 5

The Pro’s Stability: Identify bad traffic on the exchange Support: Help troubleshoot Strategic introductions: Ensuring the peers obtain maximum value from the exchange Visibility: Assist bi-lateral peers Security: Detection of security threats Marketing: Using data to promote the exchange Planning: Capacity planning 6

The Question? 7 Why would an exchange need that data? Is it a great value add? Resources: Providing smaller peers access to tools? Exchange Growth: Keep in touch with who peers are routing to?

CLICK HERE TO ADD PRESENTATION NAME 8 Thank you