首页 > 最新文献

Annual ACM Workshop on Mining Network Data最新文献

英文 中文
Manifold learning visualization of network traffic data 网络流量数据的流形学习可视化
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080182
Neal Patwari, A. Hero, Adam Pacholski
When traffic anomalies or intrusion attempts occur on the network, we expect that the distribution of network traffic will change. Monitoring the network for changes over time, across space (at various routers in the network), over source and destination ports, IP addresses, or AS numbers, is an important part of anomaly detection. We present a manifold learning (ML)-based tool for the visualization of large sets of data which emphasizes the unusually small or large correlations that exist within the data set. We apply the tool to display anomalous traffic recorded by NetFlow on the Abilene backbone network. Furthermore, we present an online Java-based GUI which allows interactive demonstration of the use of the visualization method.
当网络上发生流量异常或入侵企图时,我们预计网络流量的分布将发生变化。监视网络随着时间的推移、跨空间(在网络中的各种路由器上)、源和目标端口、IP地址或AS号的变化,是异常检测的重要组成部分。我们提出了一个基于流形学习(ML)的工具,用于大型数据集的可视化,该工具强调数据集中存在的异常小或大的相关性。我们应用该工具来显示由NetFlow在阿比林骨干网上记录的异常流量。此外,我们提出了一个基于java的在线GUI,它允许对可视化方法的使用进行交互式演示。
{"title":"Manifold learning visualization of network traffic data","authors":"Neal Patwari, A. Hero, Adam Pacholski","doi":"10.1145/1080173.1080182","DOIUrl":"https://doi.org/10.1145/1080173.1080182","url":null,"abstract":"When traffic anomalies or intrusion attempts occur on the network, we expect that the distribution of network traffic will change. Monitoring the network for changes over time, across space (at various routers in the network), over source and destination ports, IP addresses, or AS numbers, is an important part of anomaly detection. We present a manifold learning (ML)-based tool for the visualization of large sets of data which emphasizes the unusually small or large correlations that exist within the data set. We apply the tool to display anomalous traffic recorded by NetFlow on the Abilene backbone network. Furthermore, we present an online Java-based GUI which allows interactive demonstration of the use of the visualization method.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125768527","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 47
ACAS: automated construction of application signatures ACAS:自动构建应用程序签名
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080183
P. Haffner, S. Sen, O. Spatscheck, Dongmei Wang
An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identified using well-known default server network-port numbers in the TCP or UDP headers. However this approach has become increasingly inaccurate. An alternate, more accurate technique is to use specific application-level features in the protocol exchange to guide the identification. Unfortunately deriving the signatures manually is very time consuming and difficult.In this paper, we explore automatically extracting application signatures from IP traffic payload content. In particular we apply three statistical machine learning algorithms to automatically identify signatures for a range of applications. The results indicate that this approach is highly accurate and scales to allow online application identification on high speed links. We also discovered that content signatures still work in the presence of encryption. In these cases we were able to derive content signature for unencrypted handshakes negotiating the encryption parameters of a particular connection.
流量到应用程序的精确映射对于广泛的网络管理和测量任务非常重要。Internet应用程序传统上是使用TCP或UDP报头中众所周知的默认服务器网络端口号来标识的。然而,这种方法变得越来越不准确。另一种更精确的技术是在协议交换中使用特定的应用程序级特性来指导识别。不幸的是,手动生成签名非常耗时且困难。本文探讨了从IP流量有效载荷内容中自动提取应用签名的方法。特别地,我们应用了三种统计机器学习算法来自动识别一系列应用程序的签名。结果表明,该方法具有较高的准确性,可用于高速链路上的在线应用识别。我们还发现,在存在加密的情况下,内容签名仍然有效。在这些情况下,我们能够为协商特定连接的加密参数的未加密握手导出内容签名。
{"title":"ACAS: automated construction of application signatures","authors":"P. Haffner, S. Sen, O. Spatscheck, Dongmei Wang","doi":"10.1145/1080173.1080183","DOIUrl":"https://doi.org/10.1145/1080173.1080183","url":null,"abstract":"An accurate mapping of traffic to applications is important for a broad range of network management and measurement tasks. Internet applications have traditionally been identified using well-known default server network-port numbers in the TCP or UDP headers. However this approach has become increasingly inaccurate. An alternate, more accurate technique is to use specific application-level features in the protocol exchange to guide the identification. Unfortunately deriving the signatures manually is very time consuming and difficult.In this paper, we explore automatically extracting application signatures from IP traffic payload content. In particular we apply three statistical machine learning algorithms to automatically identify signatures for a range of applications. The results indicate that this approach is highly accurate and scales to allow online application identification on high speed links. We also discovered that content signatures still work in the presence of encryption. In these cases we were able to derive content signature for unencrypted handshakes negotiating the encryption parameters of a particular connection.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"48 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115240431","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 429
Learning-based anomaly detection in BGP updates 基于学习的BGP更新异常检测
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080189
Jian Zhang, J. Rexford, J. Feigenbaum
Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet's interdomain-routing system. In this paper, we propose an instance-learning framework that identifies anomalies based on deviations from the "normal" BGP-update dynamics for a given destination prefix and across prefixes. We employ wavelets for a systematic, multi-scaled analysis that avoids the "magic numbers" (e.g., for grouping related update messages) needed in previous approaches to BGP-anomaly detection. Our preliminary results show that the update dynamics are generally consistent across prefixes and time. Only a few prefixes differ from the majority, and most prefixes exhibit similar behavior across time. This small set of abnormal prefixes and time intervals may be further examined to determine the source of anomalous behavior. In particular, we observe that many of the unusual prefixes are unstable prefixes that experience frequent routing changes.
检测异常bgp路由通告对于提高Internet域间路由系统的安全性和鲁棒性至关重要。在本文中,我们提出了一个实例学习框架,该框架基于对给定目的地前缀和跨前缀的“正常”bgp更新动态的偏差来识别异常。我们使用小波进行系统的、多尺度的分析,避免了以前的bp异常检测方法中需要的“幻数”(例如,用于分组相关更新消息)。我们的初步结果表明,更新动态在不同的前缀和时间通常是一致的。只有少数前缀与大多数前缀不同,大多数前缀在不同时间表现出相似的行为。这一小组异常前缀和时间间隔可以进一步检查,以确定异常行为的来源。特别是,我们观察到许多不寻常的前缀都是经历频繁路由更改的不稳定前缀。
{"title":"Learning-based anomaly detection in BGP updates","authors":"Jian Zhang, J. Rexford, J. Feigenbaum","doi":"10.1145/1080173.1080189","DOIUrl":"https://doi.org/10.1145/1080173.1080189","url":null,"abstract":"Detecting anomalous BGP-route advertisements is crucial for improving the security and robustness of the Internet's interdomain-routing system. In this paper, we propose an instance-learning framework that identifies anomalies based on deviations from the \"normal\" BGP-update dynamics for a given destination prefix and across prefixes. We employ wavelets for a systematic, multi-scaled analysis that avoids the \"magic numbers\" (e.g., for grouping related update messages) needed in previous approaches to BGP-anomaly detection. Our preliminary results show that the update dynamics are generally consistent across prefixes and time. Only a few prefixes differ from the majority, and most prefixes exhibit similar behavior across time. This small set of abnormal prefixes and time intervals may be further examined to determine the source of anomalous behavior. In particular, we observe that many of the unusual prefixes are unstable prefixes that experience frequent routing changes.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"46 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"117104178","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 70
Fast and accurate traffic matrix measurement using adaptive cardinality counting 使用自适应基数计数快速准确的流量矩阵测量
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080185
M. Cai, Jianping Pan, Yu-Kwong Kwok, K. Hwang
Traffic matrix (TM) can be used to detect, identify, and trace network anomaly caused by DDoS attacks and worm outbreaks. To detect network anomaly as early as possible, we need to obtain TM in a fast and accurate manner. Many existing TM estimation techniques are found not sufficient for this purpose due to their high overhead or low accuracy. We propose a cardinality-based TM measurement approach with an adaptive counting algorithm to produce both packetlevel and flow-level TM, which is well-suited for TM-based anomaly detection on a network basis. Our results show that the approach can obtain TM in almost real-time (once very 10 seconds) with low average relative error (less than 5%). Our approach has low processing, storage and communication overhead, e.g. software implementation can support OC-192 line speed. It can also be implemented in a passive mode and deployed incrementally without changing current routing infrastructure.
流量矩阵(TM)用于检测、识别和跟踪由DDoS攻击和蠕虫爆发引起的网络异常。为了尽早发现网络异常,我们需要快速准确地获取TM。许多现有的TM估计技术由于其高开销或低精度而无法满足此目的。我们提出了一种基于基数的TM测量方法,并采用自适应计数算法来产生包级和流级TM,该方法非常适合于基于网络的基于TM的异常检测。结果表明,该方法几乎可以实时获得TM(每10秒一次),平均相对误差较小(小于5%)。我们的方法具有较低的处理、存储和通信开销,例如软件实现可以支持OC-192线路速度。它还可以以被动模式实现,并在不更改当前路由基础设施的情况下进行增量部署。
{"title":"Fast and accurate traffic matrix measurement using adaptive cardinality counting","authors":"M. Cai, Jianping Pan, Yu-Kwong Kwok, K. Hwang","doi":"10.1145/1080173.1080185","DOIUrl":"https://doi.org/10.1145/1080173.1080185","url":null,"abstract":"Traffic matrix (TM) can be used to detect, identify, and trace network anomaly caused by DDoS attacks and worm outbreaks. To detect network anomaly as early as possible, we need to obtain TM in a fast and accurate manner. Many existing TM estimation techniques are found not sufficient for this purpose due to their high overhead or low accuracy. We propose a cardinality-based TM measurement approach with an adaptive counting algorithm to produce both packetlevel and flow-level TM, which is well-suited for TM-based anomaly detection on a network basis. Our results show that the approach can obtain TM in almost real-time (once very 10 seconds) with low average relative error (less than 5%). Our approach has low processing, storage and communication overhead, e.g. software implementation can support OC-192 line speed. It can also be implemented in a passive mode and deployed incrementally without changing current routing infrastructure.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"71 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133755940","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 24
Detecting malicious network traffic using inverse distributions of packet contents 使用包内容的反向分布检测恶意网络流量
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080176
V. Karamcheti, D. Geiger, Z. Kedem, S. Muthukrishnan
We study the problem of detecting malicious IP traffic in the network early, by analyzing the contents of packets. Existing systems look at packet contents as a bag of substrings and study characteristics of its base distribution B where B(i) is the frequency of substring i.We propose studying the inverse distribution I where I(f) is the number of substrings that appear with frequency f. As we show using a detailed case study, the inverse distribution shows the emergence of malicious traffic very clearly not only in its "static" collection of bumps, but also in its nascent "dynamic" state when the phenomenon manifests itself only as a distortion of the inverse distribution envelope. We describe our probabilistic analysis of the inverse distribution in terms of Gaussian mixtures, our preliminary solution for discovering these bumps automatically. Finally, we briefly discuss challenges in analyzing the inverse distribution of IP contents and its applications.
通过分析报文内容,研究了网络中恶意IP流量的早期检测问题。现有系统将数据包内容视为一袋子字符串,并研究其基本分布B的特征,其中B(i)是子字符串i的频率。我们建议研究逆分布i,其中i (f)是频率f出现的子字符串的数量。正如我们使用详细的案例研究所示,逆分布非常清楚地显示了恶意流量的出现,不仅在其“静态”凸起集合中,而且,当这种现象仅仅表现为反向分布包络的扭曲时,它还处于新生的“动态”状态。我们用高斯混合描述了逆分布的概率分析,这是我们自动发现这些颠簸的初步解决方案。最后,我们简要讨论了分析IP内容逆分布及其应用所面临的挑战。
{"title":"Detecting malicious network traffic using inverse distributions of packet contents","authors":"V. Karamcheti, D. Geiger, Z. Kedem, S. Muthukrishnan","doi":"10.1145/1080173.1080176","DOIUrl":"https://doi.org/10.1145/1080173.1080176","url":null,"abstract":"We study the problem of detecting malicious IP traffic in the network early, by analyzing the contents of packets. Existing systems look at packet contents as a bag of substrings and study characteristics of its base distribution B where B(i) is the frequency of substring i.We propose studying the inverse distribution I where I(f) is the number of substrings that appear with frequency f. As we show using a detailed case study, the inverse distribution shows the emergence of malicious traffic very clearly not only in its \"static\" collection of bumps, but also in its nascent \"dynamic\" state when the phenomenon manifests itself only as a distortion of the inverse distribution envelope. We describe our probabilistic analysis of the inverse distribution in terms of Gaussian mixtures, our preliminary solution for discovering these bumps automatically. Finally, we briefly discuss challenges in analyzing the inverse distribution of IP contents and its applications.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"16 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"128499267","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 46
Experiences with a continuous network tracing infrastructure 具有连续网络跟踪基础设施的经验
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080181
Alefiya Hussain, G. Bartlett, Yuri Pryadkin, J. Heidemann, C. Papadopoulos, J. Bannister
One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data can provide valuable insight into the design and development of new protocols and applications. Although capture cards for high-speed links exist today, actually making the network traffic available for analysis involves more than just getting the packets off the wire, but also handling large and variable traffic loads, sanitizing and anonymizing the data, and coordinating access by multiple users. In this paper we discuss the requirements, challenges, and design of an effective traffic monitoring infrastructure for network research. We describe our experience in deploying and maintaining a multi-user system for continuous trace collection at a large regional ISP@. We evaluate the performance of our system and show that it can support sustained collection and processing rates of over 160--300Mbits/s.
网络研究中最紧迫的问题之一是缺乏来自isp的长期跟踪数据。互联网承载着巨大的容量和各种各样的数据;挖掘这些数据可以为新协议和应用程序的设计和开发提供有价值的见解。尽管目前存在用于高速链路的捕获卡,但实际上使网络流量可用于分析不仅仅涉及从线路上获取数据包,还涉及处理大型和可变的流量负载,对数据进行消毒和匿名化,以及协调多个用户的访问。本文讨论了网络研究中有效的流量监控基础设施的需求、挑战和设计。我们描述了在大型区域ISP@.部署和维护多用户系统以进行连续跟踪收集的经验我们评估了系统的性能,并表明它可以支持超过160—300Mbits/s的持续收集和处理速率。
{"title":"Experiences with a continuous network tracing infrastructure","authors":"Alefiya Hussain, G. Bartlett, Yuri Pryadkin, J. Heidemann, C. Papadopoulos, J. Bannister","doi":"10.1145/1080173.1080181","DOIUrl":"https://doi.org/10.1145/1080173.1080181","url":null,"abstract":"One of the most pressing problems in network research is the lack of long-term trace data from ISPs. The Internet carries an enormous volume and variety of data; mining this data can provide valuable insight into the design and development of new protocols and applications. Although capture cards for high-speed links exist today, actually making the network traffic available for analysis involves more than just getting the packets off the wire, but also handling large and variable traffic loads, sanitizing and anonymizing the data, and coordinating access by multiple users. In this paper we discuss the requirements, challenges, and design of an effective traffic monitoring infrastructure for network research. We describe our experience in deploying and maintaining a multi-user system for continuous trace collection at a large regional ISP@. We evaluate the performance of our system and show that it can support sustained collection and processing rates of over 160--300Mbits/s.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"151 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127286853","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 36
Role of machine learning in configuration management of ad hoc wireless networks 机器学习在自组织无线网络配置管理中的作用
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080191
Sung-eok Jeon, C. Ji
In this work, we show that machine learning, e.g., graphical models, plays an important role for the self-configuration of ad hoc wireless network. The role of such a learning approach includes a simple representation of complex dependencies in the network and a distributed algorithm which can adaptively find a nearly optimal configuration.
在这项工作中,我们证明了机器学习,例如图形模型,在自组织无线网络的自配置中起着重要作用。这种学习方法的作用包括网络中复杂依赖关系的简单表示和可以自适应地找到接近最优配置的分布式算法。
{"title":"Role of machine learning in configuration management of ad hoc wireless networks","authors":"Sung-eok Jeon, C. Ji","doi":"10.1145/1080173.1080191","DOIUrl":"https://doi.org/10.1145/1080173.1080191","url":null,"abstract":"In this work, we show that machine learning, e.g., graphical models, plays an important role for the self-configuration of ad hoc wireless network. The role of such a learning approach includes a simple representation of complex dependencies in the network and a distributed algorithm which can adaptively find a nearly optimal configuration.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"20 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"126692194","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 2
Shrink: a tool for failure diagnosis in IP networks 收缩:IP网络故障诊断工具
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080178
Srikanth Kandula, D. Katabi, J. Vasseur
Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneous causes like power outages. These faults are usually detected as failures of a set of dependent logical entities--the IP links affected by the failed components. We present Shrink, a tool for root cause analysis of network faults which, given a set of failed IP links, identifies the underlying cause of the faulty state. Shrink models the diagnosis problem as a Bayesian network. It has two main contributions. First, it effectively accounts for noisy measurement and inaccurate mapping between the IP and optical layers. Second, it has an efficient inference algorithm that finds the most likely failure causes in polynomial time and with bounded errors. We compare Shrink with two prior approaches and show that it substantially improves the performance.
IP网络中的故障有多种原因,如IP层一台或多台路由器故障、光纤断接、光层物理元件故障或断电等外部原因。这些故障通常被检测为一组相关逻辑实体的故障——受故障组件影响的IP链接。我们提出收缩,一个工具的根本原因分析的网络故障,给定一组失败的IP链路,确定故障状态的根本原因。Shrink将诊断问题建模为贝叶斯网络。它有两个主要贡献。首先,它有效地解决了噪声测量和IP层与光学层之间映射不准确的问题。其次,它有一个有效的推理算法,可以在多项式时间内找到最有可能的故障原因,并且误差有界。我们将收缩与之前的两种方法进行了比较,并表明它大大提高了性能。
{"title":"Shrink: a tool for failure diagnosis in IP networks","authors":"Srikanth Kandula, D. Katabi, J. Vasseur","doi":"10.1145/1080173.1080178","DOIUrl":"https://doi.org/10.1145/1080173.1080178","url":null,"abstract":"Faults in an IP network have various causes such as the failure of one or more routers at the IP layer, fiber-cuts, failure of physical elements at the optical layer, or extraneous causes like power outages. These faults are usually detected as failures of a set of dependent logical entities--the IP links affected by the failed components. We present Shrink, a tool for root cause analysis of network faults which, given a set of failed IP links, identifies the underlying cause of the faulty state. Shrink models the diagnosis problem as a Bayesian network. It has two main contributions. First, it effectively accounts for noisy measurement and inaccurate mapping between the IP and optical layers. Second, it has an efficient inference algorithm that finds the most likely failure causes in polynomial time and with bounded errors. We compare Shrink with two prior approaches and show that it substantially improves the performance.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127939065","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 212
Anemone: using end-systems as a rich network management platform 海葵:利用终端系统作为丰富的网络管理平台
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080184
R. Mortier, R. Isaacs, P. Barham
Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwidth to create Anemone, a platform for network management. In contrast to current approaches which rely on traffic statistics provided by network devices, Anemone combines end-system instrumentation with routing protocol collection to provide a semantically rich view of the network.
企业网络包含数百甚至数千个合作终端系统。我们提倡将他们的空闲周期、空闲磁盘空间和网络带宽的一小部分用于创建Anemone,一个网络管理平台。与目前依赖于网络设备提供的流量统计的方法相比,Anemone将终端系统仪表与路由协议收集相结合,以提供语义丰富的网络视图。
{"title":"Anemone: using end-systems as a rich network management platform","authors":"R. Mortier, R. Isaacs, P. Barham","doi":"10.1145/1080173.1080184","DOIUrl":"https://doi.org/10.1145/1080173.1080184","url":null,"abstract":"Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwidth to create Anemone, a platform for network management. In contrast to current approaches which rely on traffic statistics provided by network devices, Anemone combines end-system instrumentation with routing protocol collection to provide a semantically rich view of the network.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127750954","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
Greynets: a definition and evaluation of sparsely populated darknets 灰网:对人口稀少的暗网的定义和评估
Pub Date : 2005-08-22 DOI: 10.1145/1080173.1080177
W. Harrop, G. Armitage
Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise network operators. We introduce and evaluate the Greynet - a region of IP address space that is sparsely populated with 'darknet' addresses interspersed with active (or 'lit') IP addresses. Based on a small sample of traffic collected within a university campus network we saw that relatively sparse greynets can achieve useful levels of network scan detection.
暗网经常被提议用来监视异常的外部流量,并且需要大量连续的未使用的IP地址块——这对于企业网络运营商来说并不总是可行的。我们介绍和评估灰网-一个区域的IP地址空间,是由“暗网”地址零星分布与活跃(或“点亮”)的IP地址。基于在大学校园网中收集的小流量样本,我们看到相对稀疏的灰网络可以达到有用的网络扫描检测水平。
{"title":"Greynets: a definition and evaluation of sparsely populated darknets","authors":"W. Harrop, G. Armitage","doi":"10.1145/1080173.1080177","DOIUrl":"https://doi.org/10.1145/1080173.1080177","url":null,"abstract":"Darknets are often proposed to monitor for anomalous, externally sourced traffic, and require large, contiguous blocks of unused IP addresses - not always feasible for enterprise network operators. We introduce and evaluate the Greynet - a region of IP address space that is sparsely populated with 'darknet' addresses interspersed with active (or 'lit') IP addresses. Based on a small sample of traffic collected within a university campus network we saw that relatively sparse greynets can achieve useful levels of network scan detection.","PeriodicalId":216113,"journal":{"name":"Annual ACM Workshop on Mining Network Data","volume":"11 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2005-08-22","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133247647","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
引用次数: 15
期刊
Annual ACM Workshop on Mining Network Data
全部 Acc. Chem. Res. ACS Applied Bio Materials ACS Appl. Electron. Mater. ACS Appl. Energy Mater. ACS Appl. Mater. Interfaces ACS Appl. Nano Mater. ACS Appl. Polym. Mater. ACS BIOMATER-SCI ENG ACS Catal. ACS Cent. Sci. ACS Chem. Biol. ACS Chemical Health & Safety ACS Chem. Neurosci. ACS Comb. Sci. ACS Earth Space Chem. ACS Energy Lett. ACS Infect. Dis. ACS Macro Lett. ACS Mater. Lett. ACS Med. Chem. Lett. ACS Nano ACS Omega ACS Photonics ACS Sens. ACS Sustainable Chem. Eng. ACS Synth. Biol. Anal. Chem. BIOCHEMISTRY-US Bioconjugate Chem. BIOMACROMOLECULES Chem. Res. Toxicol. Chem. Rev. Chem. Mater. CRYST GROWTH DES ENERG FUEL Environ. Sci. Technol. Environ. Sci. Technol. Lett. Eur. J. Inorg. Chem. IND ENG CHEM RES Inorg. Chem. J. Agric. Food. Chem. J. Chem. Eng. Data J. Chem. Educ. J. Chem. Inf. Model. J. Chem. Theory Comput. J. Med. Chem. J. Nat. Prod. J PROTEOME RES J. Am. Chem. Soc. LANGMUIR MACROMOLECULES Mol. Pharmaceutics Nano Lett. Org. Lett. ORG PROCESS RES DEV ORGANOMETALLICS J. Org. Chem. J. Phys. Chem. J. Phys. Chem. A J. Phys. Chem. B J. Phys. Chem. C J. Phys. Chem. Lett. Analyst Anal. Methods Biomater. Sci. Catal. Sci. Technol. Chem. Commun. Chem. Soc. Rev. CHEM EDUC RES PRACT CRYSTENGCOMM Dalton Trans. Energy Environ. Sci. ENVIRON SCI-NANO ENVIRON SCI-PROC IMP ENVIRON SCI-WAT RES Faraday Discuss. Food Funct. Green Chem. Inorg. Chem. Front. Integr. Biol. J. Anal. At. Spectrom. J. Mater. Chem. A J. Mater. Chem. B J. Mater. Chem. C Lab Chip Mater. Chem. Front. Mater. Horiz. MEDCHEMCOMM Metallomics Mol. Biosyst. Mol. Syst. Des. Eng. Nanoscale Nanoscale Horiz. Nat. Prod. Rep. New J. Chem. Org. Biomol. Chem. Org. Chem. Front. PHOTOCH PHOTOBIO SCI PCCP Polym. Chem.
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1