Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao
|
|
- Curtis Howard
- 5 years ago
- Views:
Transcription
1 Intelligent Network Management Using Graph Differential Anomaly Visualization Qi Liao
2 Network Management What is going on in the network? Public servers Private servers Wireless Users DMZ Applications Internet Enterprise Wired Users Data Central Michigan University 2
3 Security Management Needs of Network Manager Health check Situation awareness Accountability / Forensics Troubleshoot Challenges Huge amount of data Complexity Dynamics Gap: daily monitoring operational interpretation Central Michigan University 3
4 Network Anomaly Network anomaly is useful in many areas of network management. Some examples of easy anomalies Readings from sensor network DoS attack Port scanning Packet headers match a pattern More general (harder) anomalies Stealthy Less traffic Given only a time-series of network graphs, can we detect abnormal changes and find the underlying causes? 4
5 Graph Diff. Anomaly Visualization My network at time i My network at time j Spatial anomalies How similar / different? Temporal anomalies Central Michigan University 5
6 Differential Anomaly Visualization Graph differential anomaly visualization (DAV) framework Whole graphs Nodes and edges Communities (subgraphs) More tolerant to the dynamics of network. Effectively visualizes the dynamics and abnormal changes among the heterogeneous, time-series network graphs. 6
7 Monitoring Where, Who, and What Need finer granularity than raw network connectivity Two important enterprise network components Who (users) are responsible What (applications) are running on the network. CONTENT vs. CONTEXT Associated with each network connection Users, applications, parameters, file accesses, etc. Central Michigan University 7
8 Local Context Host Bigger picture: what is happening on the network Users Applications Central Michigan University 8
9 Traditional view 80,tcp 53,udp H H ,udp name.cmich.edu 4157,tcp H 2128,tcp 80,tcp H lab01.cps.cmich.edu 9875,tcp 79,tcp H R3208.orange.fr directory.cmich.edu Most existing tools show this view Web traffic in, web traffic out, DNS, Active Directory 9
10 Network flows Who and what? A IIS H 80,tcp qliao U A nessus U rmcfall A firefox 4157,tcp admin 80,tcp H U www U 9875,tcp lab01.cps.cmich.edu H R3208.orange.fr A apache Network Context Graphs
11 Data Collection Agent Gathers context from local hosts who (users), what (applications), when (time), where (hosts) Built-in system tools (free and robust) who, where what who, what, where when netstat ps lsof diff context Easy to deploy ( no change to existing systems) Lightweight CPU< 2% Bandwidth ( 1000 hosts: 240 Kbps = 0.2% of 100Mbps) Disk ( 1GB /host/year) Visual Analysis for the Enterprise Network Management and Security 11
12 HUA Graph View Graph controls Monitored hosts External Domains hops Apps Sort by degrees, weights, names Users Central Michigan University Node selection 12
13 Bipartite graphs The general HUA connectivity graphs can be separated into (multi-)bipartite graphs. src host dst host Central Michigan University 13
14 K-partite graphs Quadripartite graph Hosts Users Applications Hosts Infogain Critical path Central Michigan University 14
15 Local users (root) Similarity Graphs (app) # users bridges applications Ent. users (condor) Central Michigan University 15
16 Visual Analysis for Network Management Data mining / machine learning Automatic Algorithmic, analytic methods Visualization Manual interactive visual exploration Bring in domain knowledge from experienced managers. 16
17 Differential Anomaly Visualization What are the changes? What are the variance and invariance? How similar (different) from day-to-day network activities? What changes are normal / abnormal? How to quantify and visualize the evolution of changes? Dynamic and noisy data (hosts, users, applications) Differential Visualization Insights (variants, invariants, abnormal behaviors, root causes ) Central Michigan University 17
18 Hierarchical DAV (overview + context) Whole Graphs Nodes / Edges Communities Central Michigan University 18
19 Graph Diff. Anomaly Visualization My network at time i My network at time j Spatial anomalies How similar / different? Temporal anomalies Central Michigan University 19
20 Graph Properties Graph sizes Cluster coefficients Graph diameters Degree distributions Graph distances Graph variance scores Central Michigan University 20
21 Graph Similarity General graph isomorphism netscale Iss-node2 cclsun1 wizard Iss-node3 Iss-node4 Iss-node1 cclsun3 A more complex example Central Michigan University 21
22 Graph distance Edit distance: number of operations required to transform one into the other. Graph Edit Distance (GED) [Bunke07] to measure the graphs similarities. Maximum common subgraphs (MCS) based: d( g 1, g 2 ) 1 mcs( g max( g, g2), g ) Graph edit distance (GED) based: d( g 1, g 2 ) g 1 g 2 mcs( g g g , g 2 ) Central Michigan University 22
23 Expected Graphs (EG) Minimum common supergraphs (MCP) MCP / MCPP g 1 Maximum common subgraphs (MCS) = invariance MCS g 3 g 2 variance Median Graph (MG) 23
24 Differential visualization New (appear) Show / Hide Old (disappear) Spatio-temporal dynamics Invariance 24
25 Differential visualization Old (disappear) Old Invariance All (disappear) New (appear) Invariance 25
26 Link Anomalies Not exactly link prediction problem. Common neighbors assumption Known nodes only assumption Non-dynamic assumption Proof-of-concept Non-linear weighting frequency function N w( t) d t P( Li ), d N t, w( t) probability of i-th link to appear 1 i t 1 {0,1} whether i-th link appears at time t t (1 N ( ) e w t non-linear time weighting function Can take inputs from future link anomaly algorithms ) 26
27 Link Anomalies Visualization RED: Type-I anomaly: should appear but did not appear BLUE: Type-II anomaly: should not appear but appeared 27
28 Link Anomalies Visualization Should not appear Should appear 28
29 Link Anomalies Visualization Should appear 29
30 Community-based DAV Intermediate similarity metric COARSE Graph property changes Community membership changes Susceptible to the dynamics of graphs FINE Node / edge changes Balance of granularity and complexity 30
31 Intra-graph clusters visualization 2) httpd web 3) desk apps 1) firefox Walktrap [Pons:2006] 4) Condor research computing Central Michigan University 31
32 Temporal Community Evolution Finance/HR Finance/HR day i day i+1 U 1 U 2 U 1 U 2 botnets U 3 U 4 U 3 cluster cluster U 4 U 8 U 5 U 6 U 9 Sales Sales U 5 U 6 U 9 cluster cluster U 7 U 8 cluster U 7 cc3.irc.ru 32
33 Community-based DAV Graphs changes via community similarity Similar to Rand Index [Rand71] dist( C1, C2 Flexibility SS ) 1 SS SD DD DD DS Suitability for highly dynamic networks Nodes consistently belong to the same (or different) communities changes are normal Central Michigan University 33
34 Community-based DAV (example) Anomaly caused by a spike of community changes at time 8 and 9 Walktrap 34
35 Community-based DAV (MDS view) Nodes that are farther away indicate anomalous user behaviors C 8 C 9 C 10 Graph/communities C 0 C 11 35
36 Communities of a User Similarity Graph Time: 8 Condor community Grad students community 36
37 Communities of a User Similarity Graph Grad students community Time: 9 Users change community membership Condor community 37
38 Conclusion Network (security) management is hard. Large scale, heterogeneity, dynamics, complexity Anomaly detection and analysis is important yet challenging. We developed a novel hierarchical graph differential anomaly visualization (DAV) framework Combines automated graph data mining and manual exploration. At different levels: Graphs, Nodes/Edges, Communities Completeness Overview vs. Details-on-demand Exact changes vs. Dynamic churns Detection vs. root causes DAV: intelligent, time-efficient management alternative. 38
39 More info visit Thank You! 39
40 Questions 40
SaaS Providers. ThousandEyes for. Summary
USE CASE ThousandEyes for SaaS Providers Summary With Software-as-a-Service (SaaS) applications rapidly replacing onpremise solutions, the onus of ensuring a great user experience for these applications
More informationNetwork Performance Analysis System. White Paper
Network Performance Analysis System White Paper Copyright Copyright 2018 Colasoft. All rights reserved. Information in this document is subject to change without notice. No part of this document may be
More informationComprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System
Solution Brief HDX Insight powered by Citrix Comprehensive Citrix HDX visibility powered by NetScaler Management and Analytics System HDX Insight is the only tool in the market that provides endto-end
More informationInterdomain Routing Design for MobilityFirst
Interdomain Routing Design for MobilityFirst October 6, 2011 Z. Morley Mao, University of Michigan In collaboration with Mike Reiter s group 1 Interdomain routing design requirements Mobility support Network
More informationCE693: Adv. Computer Networking
CE693: Adv. Computer Networking L-10 Wireless Broadcast Fall 1390 Acknowledgments: Lecture slides are from the graduate level Computer Networks course thought by Srinivasan Seshan at CMU. When slides are
More informationvrealize Operations Management Pack for NSX for vsphere 2.0
vrealize Operations Management Pack for NSX for vsphere 2.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationCONGA: Distributed Congestion-Aware Load Balancing for Datacenters
CONGA: Distributed Congestion-Aware Load Balancing for Datacenters By Alizadeh,M et al. Motivation Distributed datacenter applications require large bisection bandwidth Spine Presented by Andrew and Jack
More informationIntroduction Challenges with using ML Guidelines for using ML Conclusions
Introduction Challenges with using ML Guidelines for using ML Conclusions Misuse detection Exact descriptions of known bad behavior Anomaly detection Deviations from profiles of normal behavior First proposed
More informationUsing Diagnostic Tools
Using Diagnostic Tools The Tools System Diagnostics page on the INVESTIGATE view provides several diagnostic tools that help troubleshoot various kinds of network problems and process monitors. Tech Support
More informationCitrix NetScaler Traffic Management
Citrix NetScaler Traffic Management CNS220; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler experience, this course is best suited for individuals who
More informationMcAfee Network Security Platform 9.2
Revision B McAfee Network Security Platform 9.2 (9.2.7.9-9.2.7.10 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationNetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led
NetScaler for Apps and Desktops CNS-222; 5 Days; Instructor-led Course Description Designed for students with little or no previous NetScaler, NetScaler Gateway or Unified Gateway experience, this course
More informationVMware Identity Manager Connector Installation and Configuration (Legacy Mode)
VMware Identity Manager Connector Installation and Configuration (Legacy Mode) VMware Identity Manager This document supports the version of each product listed and supports all subsequent versions until
More informationNetwork Layer: Routing
Network Layer: Routing The Problem A B R 1 R 2 R 4 R 3 Goal: for each destination, compute next hop 1 Lecture 9 2 Basic Assumptions Trivial solution: Flooding Dynamic environment: links and routers unreliable:
More informationThousandEyes for. Application Delivery White Paper
ThousandEyes for Application Delivery White Paper White Paper Summary The rise of mobile applications, the shift from on-premises to Software-as-a-Service (SaaS), and the reliance on third-party services
More informationMAD 12 Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation. Midori Kato, Kenjiro Cho, Michio Honda, Hideyuki Tokuda
MAD 12 Monitoring the Dynamics of Network Traffic by Recursive Multi-dimensional Aggregation Midori Kato, Kenjiro Cho, Michio Honda, Hideyuki Tokuda 1 Background Traffic monitoring is important to detect
More informationTowards Systematic Design of Enterprise Networks
Towards Systematic Design of Enterprise Networks Geoffrey Xie Naval Postgraduate School In collaboration with: Eric Sung, Xin Sun, and Sanjay Rao (Purdue Univ.) David Maltz (MSR) Copyright 2008 AT&T. All
More informationVendor: Citrix. Exam Code: 1Y Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions. Version: Demo
Vendor: Citrix Exam Code: 1Y0-253 Exam Name: Implementing Citrix NetScaler 10.5 for App and Desktop Solutions Version: Demo QUESTION 1 A Citrix Administrator needs to configure a single virtual server
More informationNetAlly. Application Advisor. Distributed Sites and Applications. Monitor and troubleshoot end user application experience.
NetAlly Application Advisor Monitor End User Experience for Local and Remote Users, Distributed Sites and Applications Part of the OptiView Management Suite (OMS) OMS provides the breadth of visibility
More informationCNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS
CNS-222EA - EARLY ACCESS: NETSCALER FOR APPS AND DESKTOPS The objective of this course is to provide the foundational concepts and teach the skills necessary to deploy, secure and manage a Citrix NetScaler
More informationPart 1: Introduction. Goal: Review of how the Internet works Overview
Part 1: Introduction Goal: Review of how the Internet works Overview Get context Get overview, feel of the Internet Application layer protocols and addressing Network layer / Routing Link layer / Example
More informationCLIENT AGENTS. Finally see exactly what each Wi-Fi client is experiencing without costly sensor overlays or cumbersome RF diagnostics
CLIENT AGENTS Finally see exactly what each Wi-Fi client is experiencing without costly sensor overlays or cumbersome RF diagnostics INTRODUCING VOYANCE CLIENT AGENTS Secure, configurable and deployed
More informationNetwork Analysis of Point of Sale System Compromises
Network Analysis of Point of Sale System Compromises Operation Terminal Guidance Chicago Electronic & Financial Crimes Task Force U.S. Secret Service Outline Background Hypothesis Deployment Methodology
More informationInstalling and Configuring VMware Identity Manager Connector (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.
Installing and Configuring VMware Identity Manager Connector 2018.8.1.0 (Windows) OCT 2018 VMware Identity Manager VMware Identity Manager 3.3 You can find the most up-to-date technical documentation on
More informationWireless Challenges : Computer Networking. Overview. Routing to Mobile Nodes. Lecture 25: Wireless Networking
Wireless Challenges 15-441: Computer Networking Lecture 25: Wireless Networking Force us to rethink many assumptions Need to share airwaves rather than wire Don t know what hosts are involved Host may
More informationDynamic Link Anomaly Analysis for Network Security Management
https://doi.org/10.1007/s10922-018-9478-8 Dynamic Link Anomaly Analysis for Network Security Management Tao Zhang 1 Qi Liao 1 Received: 4 August 2016 / Revised: 25 August 2018 / Accepted: 7 November 2018
More informationThe Case for Informed Transport Protocols
The Case for Informed Transport Protocols Stefan Savage Neal Cardwell Tom Anderson University of Washington Our position Wide-area network performance: is important is limited by inefficient congestion
More informationAbout Clients, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10. Monitor and Troubleshoot the Health of All Client Devices
About Clients, on page 1 Monitor and Troubleshoot the Health of All Client Devices, on page 1 Monitor and Troubleshoot the Health of a Client Device, on page 10 Trace the Path of a Device, on page 13 About
More informationA Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models
A Two-Layered Anomaly Detection Technique based on Multi-modal Flow Behavior Models Marc Ph. Stoecklin Jean-Yves Le Boudec Andreas Kind
More informationUnderstanding of basic networking concepts (routing, switching, VLAN, firewall functionality)
Citrix NetScaler for Apps and Desktops Day(s): 5 Course Code: CNS-222 Overview This course is designed specifically for students who have limited or no previous NetScaler experience. The content is based
More informationintelop Stealth IPS false Positive
There is a wide variety of network traffic. Servers can be using different operating systems, an FTP server application used in the demilitarized zone (DMZ) can be different from the one used in the corporate
More informationCS 268: Computer Networking. Taking Advantage of Broadcast
CS 268: Computer Networking L-12 Wireless Broadcast Taking Advantage of Broadcast Opportunistic forwarding Network coding Assigned reading XORs In The Air: Practical Wireless Network Coding ExOR: Opportunistic
More informationCase Study: Social Network Analysis. Part II
Case Study: Social Network Analysis Part II https://sites.google.com/site/kdd2017iot/ Outline IoT Fundamentals and IoT Stream Mining Algorithms Predictive Learning Descriptive Learning Frequent Pattern
More informationWireless Sensor Architecture GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO
Wireless Sensor Architecture 1 GENERAL PRINCIPLES AND ARCHITECTURES FOR PUTTING SENSOR NODES TOGETHER TO FORM A MEANINGFUL NETWORK Mobile ad hoc networks Nodes talking to each other Nodes talking to some
More informationVirtualWisdom â ProbeNAS Brief
TECH BRIEF VirtualWisdom â ProbeNAS Brief Business Drivers and Business Value for VirtualWisdom Infrastructure is expensive, costly to maintain, and often difficult to scale. While transitioning to virtualized
More informationMcAfee Network Security Platform 9.2
McAfee Network Security Platform 9.2 (9.2.7.22-9.2.7.20 Manager-Virtual IPS Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationTwo-Tier Oracle Application
Two-Tier Oracle Application This tutorial shows how to use ACE to analyze application behavior and to determine the root causes of poor application performance. Overview Employees in a satellite location
More informationMcAfee Network Security Platform
Revision B McAfee Network Security Platform (8.1.7.5-8.1.3.43 M-series Release Notes) Contents About this release New features Enhancements Resolved issues Installation instructions Known issues Product
More informationIntroduction. Learning Network License Introduction
The following provides an introduction to installing the Cisco Stealthwatch Learning Network License (Learning Network License) platform, installing a controller on an ESXi host, and deploying an agent
More informationAlloc8 How to Guide: Adaptive Response
Alloc8 How to Guide: Adaptive Response Adaptive Response Rules Adaptive Response allows administrators to specify rules based on data transfer which dynamically populate Network Objects. These Dynamic
More informationUser Activities. These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc.
Executive Over view User Activities These reports give an overview of how your servers are being used, how many users connect, how many sessions you have etc. Session Log Summary This report helps you
More informationA Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks
A Hybrid Intrusion Detection System Of Cluster Based Wireless Sensor Networks An efficient intrusion detection framework in cluster-based wireless sensor networks Paper: A lightweight hybrid security framework
More informationvrealize Operations Management Pack for NSX for vsphere 3.5.0
vrealize Operations Management Pack for NSX for vsphere 3.5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationGoliath Technology Overview with MEDITECH Module
Customers # 324 Fortune 500 Goliath Technology Overview with MEDITECH Module In approximately one week, support tickets dropped by 25% z Our Customers were complaining about persistent slowness with Citrix.
More informationCisco CCNA (ICND1, ICND2) Bootcamp
Cisco CCNA (ICND1, ICND2) Bootcamp Course Duration: 5 Days Course Overview This five-day course covers the essential topics of ICND1 and ICND2 in an intensive Bootcamp format. It teaches students the skills
More informationThis shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict
1 This shows a typical architecture that enterprises use to secure their networks: The network is divided into a number of segments Firewalls restrict access between segments This creates a layered defense
More informationMcAfee Network Security Platform 8.3
8.3.7.28-8.3.7.6 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision B Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationMonitoring and diagnostics of data infrastructure problems in power engineering. Jaroslav Stusak, Sales Director CEE, Flowmon Networks
Monitoring and diagnostics of data infrastructure problems in power engineering Jaroslav Stusak, Sales Director CEE, Flowmon Networks 35,000 kilometers of electric power, which feeds around 740,000 clients...
More informationScrutinizer Flow Analytics
Scrutinizer Flow Analytics TM Scrutinizer Flow Analytics Scrutinizer Flow Analytics is an expert system that highlights characteristics about the network. It uses flow data across dozens or several hundred
More informationMcAfee Network Security Platform
Revision B McAfee Network Security Platform (9.2.9.3-9.2.5.34 Manager-NS3500 Release Notes) Contents About this release New Features Resolved issues Installation instructions Known issues Product documentation
More informationHiTune. Dataflow-Based Performance Analysis for Big Data Cloud
HiTune Dataflow-Based Performance Analysis for Big Data Cloud Jinquan (Jason) Dai, Jie Huang, Shengsheng Huang, Bo Huang, Yan Liu Intel Asia-Pacific Research and Development Ltd Shanghai, China, 200241
More informationBayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination
Bayeux: An Architecture for Scalable and Fault Tolerant Wide area Data Dissemination By Shelley Zhuang,Ben Zhao,Anthony Joseph, Randy Katz,John Kubiatowicz Introduction Multimedia Streaming typically involves
More informationFlow Measurement. For IT, Security and IoT/ICS. Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018
Flow Measurement For IT, Security and IoT/ICS Pavel Minařík, Chief Technology Officer EMITEC, Swiss Test and Measurement Day 20 th April 2018 What is Flow Data? Modern method for network monitoring flow
More informationQoS Services with Dynamic Packet State
QoS Services with Dynamic Packet State Ion Stoica Carnegie Mellon University (joint work with Hui Zhang and Scott Shenker) Today s Internet Service: best-effort datagram delivery Architecture: stateless
More informationCNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT
ONE STEP AHEAD. CNS-220-1I: CITRIX NETSCALER TRAFFIC MANAGEMENT Designed for students with little or no previous NetScaler experience, this course is best suited for individuals who will be deploying or
More informationCNS-220-1I: Citrix NetScaler Traffic Management Essentials
CNS-220-1I: Citrix NetScaler Traffic Management Essentials Ready Informatica srl Per contattare il nostro servizio informazioni: 039 921 21 21 Per consultare il calendario corsi: http://www.ready.it/corsi.html
More informationIntrusion Detection -- A 20 year practice. Outline. Till Peng Liu School of IST Penn State University
Intrusion Detection -- A 20 year practice Peng Liu School of IST Penn State University Pennsylvania State Unviersity 1 Outline Motivation Intrusion Detection Techniques Intrusion Detection Products Some
More informationSD-Access Wireless: why would you care?
SD-Access Wireless: why would you care? CUWN Architecture - Centralized Overview Policy Definition Enforcement Point for Wi-Fi clients Client keeps same IP address while roaming WLC Single point of Ingress
More informationAMP-Based Flow Collection. Greg Virgin - RedJack
AMP-Based Flow Collection Greg Virgin - RedJack AMP- Based Flow Collection AMP - Analytic Metadata Producer : Patented US Government flow / metadata producer AMP generates data including Flows Host metadata
More informationMobilityFirst GSTAR: Generalized Storage Aware Routing
MobilityFirst GSTAR: Generalized Storage Aware Routing Samuel Nelson MobilityFirst Design Goals Design a future internet architecture that supports: Host and network mobility Diverse communication devices/entities/paradigms
More informationPaloalto Networks PCNSA EXAM
Page No 1 m/ Paloalto Networks PCNSA EXAM Palo Alto Networks Certified Network Security Administrator Product: Full File For More Information: /PCNSA-dumps 2 Product Questions: 50 Version: 8.0 Question:
More informationSIEM Overview with OSSIM Case Study. Mohammad Husain, PhD Cal Poly Pomona
SIEM Overview with OSSIM Case Study Mohammad Husain, PhD Cal Poly Pomona 1 SIEM SIEM = Security Information and Event Management Collects security information from multiple sources; internal and external
More informationExploring Cloud Security, Operational Visibility & Elastic Datacenters. Kiran Mohandas Consulting Engineer
Exploring Cloud Security, Operational Visibility & Elastic Datacenters Kiran Mohandas Consulting Engineer The Ideal Goal of Network Access Policies People (Developers, Net Ops, CISO, ) V I S I O N Provide
More informationNetwork Guide for Listen Everywhere
Network Guide for Listen Everywhere Overview: The Listen Everywhere (LE) System is designed to be used on pre-existing wireless networks and to be plug and play. However, it may be necessary to have an
More informationAd hoc and Sensor Networks Chapter 3: Network architecture
Ad hoc and Sensor Networks Chapter 3: Network architecture Holger Karl Computer Networks Group Universität Paderborn Goals of this chapter Having looked at the individual nodes in the previous chapter,
More informationConfiguring Cisco IOS IP SLA Operations
CHAPTER 58 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLA) on the switch. Cisco IP SLA is a part of Cisco IOS software that allows Cisco customers to analyze IP service levels
More informationvrealize Operations Management Pack for NSX for Multi-Hypervisor
vrealize Operations Management Pack for This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition. To check for more
More information(a) Which of these two conditions (high or low) is considered more serious? Justify your answer.
CS140 Winter 2006 Final Exam Solutions (1) In class we talked about the link count in the inode of the Unix file system being incorrect after a crash. The reference count can either be either too high
More informationThe threat landscape is constantly
A PLATFORM-INDEPENDENT APPROACH TO SECURE MICRO-SEGMENTATION Use Case Analysis The threat landscape is constantly evolving. Data centers running business-critical workloads need proactive security solutions
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 50 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationMultidimensional Aggregation for DNS monitoring
Multidimensional Aggregation for DNS monitoring Jérôme François, Lautaro Dolberg, Thomas Engel jerome.francois@inria.fr 03/11/15 2 1 Motivation 2 Aggregation 3 MAM 4 DNS applications 5 DNS monitoring 6
More informationMcAfee Network Security Platform 8.3
8.3.7.86-8.3.7.56 Manager-Virtual IPS Release Notes McAfee Network Security Platform 8.3 Revision C Contents About this release New features Enhancements Resolved issues Installation instructions Known
More informationvrealize Operations Management Pack for NSX for vsphere 3.0
vrealize Operations Management Pack for NSX for vsphere 3.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new edition.
More informationSystem Specification
NetBrain Integrated Edition 7.1 System Specification Version 7.1a Last Updated 2018-09-04 Copyright 2004-2018 NetBrain Technologies, Inc. All rights reserved. Introduction NetBrain Integrated Edition features
More informationLecture 16: Network Layer Overview, Internet Protocol
Lecture 16: Network Layer Overview, Internet Protocol COMP 332, Spring 2018 Victoria Manfredi Acknowledgements: materials adapted from Computer Networking: A Top Down Approach 7 th edition: 1996-2016,
More informationCourse Objectives In this course, students can expect to learn how to:
CNS-222 Citrix NetScaler Essentials and Unified Gateway The objective of this course is to provide the foundational concepts and teach the skills necessary to deploy, secure and manage a Citrix NetScaler
More informationNetwork Security: Firewall, VPN, IDS/IPS, SIEM
Security: Firewall, VPN, IDS/IPS, SIEM Ahmet Burak Can Hacettepe University abc@hacettepe.edu.tr What is a Firewall? A firewall is hardware, software, or a combination of both that is used to prevent unauthorized
More informationWhat is Multicasting? Multicasting Fundamentals. Unicast Transmission. Agenda. L70 - Multicasting Fundamentals. L70 - Multicasting Fundamentals
What is Multicasting? Multicasting Fundamentals Unicast transmission transmitting a packet to one receiver point-to-point transmission used by most applications today Multicast transmission transmitting
More informationHP0-Y16. ProCurve Network Immunity Solutions. Download Full Version :
HP HP0-Y16 ProCurve Network Immunity Solutions Download Full Version : http://killexams.com/pass4sure/exam-detail/hp0-y16 Which challenges does a unified NIM + IDS deployment meet? (Select two.) A. Reducing
More informationIntra-domain Routing
Intra-domain Routing Outline Introduction to Routing Distance Vector Algorithm CS 640 1 Goal Build router forwarding tables in an internetwork using intra-domain routing protocols High level approach Distributed
More informationConfiguring Cisco IOS IP SLAs Operations
CHAPTER 39 This chapter describes how to use Cisco IOS IP Service Level Agreements (SLAs) on the switch. Cisco IP SLAs is a part of Cisco IOS software that allows Cisco customers to analyze IP service
More informationCitrix NetScaler Essentials and Unified Gateway
Course Code: CNS2221 Vendor: Citrix Course Overview Duration: 5 RRP: 2,690 Citrix NetScaler Essentials and Unified Gateway Overview Designed for students with little or no previous NetScaler, NetScaler
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.5.9 Manager-NS-series Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation instructions Known issues
More informationWhat is New in Cisco ACE 4710 Application Control Engine Software Release 3.1
What is New in Cisco ACE 4710 Application Control Engine Software Release 3.1 PB478675 Product Overview The Cisco ACE Application Control Engine 4710 represents the next generation of application switches
More informationMcAfee Network Security Platform 9.1
9.1.7.15-9.1.3.4 Manager-M-series, Mxx30-series, XC Cluster Release Notes McAfee Network Security Platform 9.1 Revision A Contents About this release New features Enhancements Resolved issues Installation
More informationService Mesh and Microservices Networking
Service Mesh and Microservices Networking WHITEPAPER Service mesh and microservice networking As organizations adopt cloud infrastructure, there is a concurrent change in application architectures towards
More informationA10 HARMONY CONTROLLER
DATA SHEET A10 HARMONY CONTROLLER AGILE MANAGEMENT, AUTOMATION, ANALYTICS FOR MULTI-CLOUD ENVIRONMENTS PLATFORMS A10 Harmony Controller provides centralized agile management, automation and analytics for
More informationHow to Tame your VM: an Automated Control System for Virtualized Services
How to Tame your : an Automated Control System for Virtualized Services Akkarit Sangpetch Andrew Turner Hyong Kim asangpet@andrew.cmu.edu andrewtu@andrew.cmu.edu kim@ece.cmu.edu Department of Electrical
More informationVMware vfabric AppInsight Installation Guide
VMware vfabric AppInsight Installation Guide vfabric AppInsight 5.0 This document supports the version of each product listed and supports all subsequent versions until the document is replaced by a new
More informationGraphs and Isomorphisms
Graphs and Isomorphisms Discrete Structures (CS 173) Backyards of Old Houses in Antwerp in the Snow Van Gogh Madhusudan Parthasarathy, University of Illinois Proof techniques: Direct Contrapositive Disproving
More informationQuestion Bank. 4) It is the source of information later delivered to data marts.
Question Bank Year: 2016-2017 Subject Dept: CS Semester: First Subject Name: Data Mining. Q1) What is data warehouse? ANS. A data warehouse is a subject-oriented, integrated, time-variant, and nonvolatile
More informationthis security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities
INFRASTRUCTURE SECURITY this security is provided by the administrative authority (AA) of a network, on behalf of itself, its customers, and its legal authorities Goals * prevent or mitigate resource attacks
More informationAnanta: Cloud Scale Load Balancing. Nitish Paradkar, Zaina Hamid. EECS 589 Paper Review
Ananta: Cloud Scale Load Balancing Nitish Paradkar, Zaina Hamid EECS 589 Paper Review 1 Full Reference Patel, P. et al., " Ananta: Cloud Scale Load Balancing," Proc. of ACM SIGCOMM '13, 43(4):207-218,
More informationA Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync
A Real-world Demonstration of NetSocket Cloud Experience Manager for Microsoft Lync Introduction Microsoft Lync connects people everywhere as part of their everyday productivity experience. When issues
More informationIP SLAs Overview. Finding Feature Information. Information About IP SLAs. IP SLAs Technology Overview
This module describes IP Service Level Agreements (SLAs). IP SLAs allows Cisco customers to analyze IP service levels for IP applications and services, to increase productivity, to lower operational costs,
More information15-441: Computer Networking. Wireless Networking
15-441: Computer Networking Wireless Networking Outline Wireless Challenges 802.11 Overview Link Layer Ad-hoc Networks 2 Assumptions made in Internet Host are (mostly) stationary Address assignment, routing
More informationLessons Server Manager Roles Windows Server 2008 Features Active Directory Improvements
Course Syllabus Updating your Network Infrastructure and Active Directory Technology Skills to Windows Server 2008 This five-day instructor-led course provides students with the knowledge and skills to
More informationAPPLICATION ANALYTICS. Cross-stack analysis of the user experience for critical SaaS, unified communications and custom enterprise applications
USER APPLICATION ANALYTICS Cross-stack analysis of the user experience for critical SaaS, unified communications and custom enterprise applications USER APPLICATION ANALYTICS Nyansa user application analytics
More informationVoid main Technologies
SNO TITLE Domain 1. A Hybrid Approach for Detecting Automated Spammers in Twitter Data mining 2. A Key-Policy Attribute-Based Temporary Keyword Search scheme for Secure Storage 3. A Lightweight Secure
More informationsystems & research project
class 4 systems & research project prof. HTTP://DASLAB.SEAS.HARVARD.EDU/CLASSES/CS265/ index index knows order about the data data filtering data: point/range queries index data A B C sorted A B C initial
More information