Network Measurement and Security Insights

Network Measurement and Security Insights
Slide Note
Embed
Share

Delve into the world of network measurement, SDN applications, and cybersecurity challenges. Explore intriguing questions, techniques like port scanning and DDoS attacks, and methods for measuring network traffic. Uncover the complexities and solutions for analyzing network behavior.

  • Network Security
  • Cybersecurity
  • SDN Applications
  • Network Measurement
  • Port Scanning

Uploaded on Mar 07, 2025 | 0 Views


Download Presentation

Please find below an Image/Link to download the presentation.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.If you encounter any issues during the download, it is possible that the publisher has removed the file from their server.

You are allowed to download the files provided on this website for personal or commercial use, subject to the condition that they are used lawfully. All files are the property of their respective owners.

The content on the website is provided AS IS for your information and personal use only. It may not be sold, licensed, or shared on other websites without obtaining consent from the author.

E N D

Presentation Transcript


  1. Measurement in Networks & SDN Applications

  2. Interesting Questions Who is sending a lot to a subnet? Heavy Hitters Is someone doing a port Scan? Is someone getting DDoS-ed? Who is getting traffic for a naughty website? How many people have downloaded from a naughty site? Which links have the most bytes

  3. Port Scan Try to find vulnerability in a host Idea scan all the ports on the host to see which are open A scan: a small hello packet to see if host responds After finding the open port you can perform other attacks

  4. DDoS Try to attack a host/server Make sure the server can t respond to anyone else Send it a bunch of traffic until out of memory Send it a bunch of traffic until no more bandwidth DoS: attack the server from one machine DDoS: attack the server from many machines Harder to defend against.

  5. How do we measure things? Switches count bytes/packets NetFlow/sFlow: # bytes/packets per flow To scale: samples packets and performs calculations based on samples. 1 in ever n packets Implications: don t see all packets. SNMP: # bytes/packets per link

  6. Interesting Questions Who is sending a lot to a subnet? Is someone doing a port Scan? Is someone getting DDoS-ed? Who is getting traffic for a naughty website? How many people have downloaded from a naughty site? Which links have the most bytes? Netflow SNMP

  7. Why cant questions be answered? When you sample you miss packets. Increasing the sampling rate leads to huge resource overheads. So can t answer questions: You miss the packets when you check sampling Is someone doing a port Scan? Is there a short lived connection from one server to many ports on another server? Is someone doing a DDoS? Is there a short lived connection from many servers to one?

  8. Solution. You don t want to sample because you miss stuff But you can t always process everything because it is hard to scale Use online streaming algorithms See OpenSketch for more

  9. What are SDN Applications?

  10. How we use the network Ensuring reachability: routing/forwarding traffic Bad things: loop-holes, blackholes

  11. How do we use the network Network Address Translation You have a small number of IP address; e.g. 1 But you want to have many devices; tablet/phone Each one needs it own IP address So you share them Internal IP 10.10.0.1 External IP 123.12.392.3 Internal IP 10.10.0.2 Port Internal IP 23 10.10.0.1 34 10.10.0.2

  12. How do we use the network Load balancing: make sure servers get equal number of requests

  13. How do we use the network Load balancing: make sure servers get equal number of requests

  14. Policy L.B. Security NAT Hub Physical View Network OS Veriflow|H.A.S.|Libra Invariant has been violated! There s a bug. What Next? Device State

  15. How are Networks managed

  16. How are Networks managed In a hierarchical manner With control delegated from top to bottom Resource delegated in a similar manner

  17. How can SDN support such delegation? Hierarchical capabilities. See more in the PANE paper.

Related


More Related Content