Clumps, Hoops, and Bubbles How Akamai Maps the Net Compressed

Total Page:16

File Type:pdf, Size:1020Kb

Clumps, Hoops, and Bubbles How Akamai Maps the Net Compressed The National Security Agency’s Review of Emerging Technologies 6 £n Î U Óä£ä Clumps, Hoops, and Bubbles How Akamai Maps the Net Compressed Sensing and Network Monitoring Revealing Social Networks of Spammers Challenges in Internet Geolocation NSA’s Review of Emerging Technologies The Letter from the Editor Next Wave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ÀHOGV 7R H[SODLQ WKH GLIIHUHQFH EHWZHHQ WRPRJUDSK\ DQG PDSSLQJ KHUH DUH WZR VLPSOH GHÀQLWLRQV 1HWZRUN WRPRJUDSK\ LV WKH VWXG\ RI D QHWZRUN·V LQWHUQDO FKDUDFWHULVWLFV XVLQJ LQIRUPDWLRQ GHULYHG IURP HQGSRLQW GDWD 1HWZRUN PDSSLQJ LV WKH VWXG\ RI WKH SK\VLFDO FRQQHFWLYLW\ RI WKH ,QWHUQHW GHWHUPLQLQJ ZKDW VHUYHUV DQG RSHUDWLQJ V\VWHPV DUH UXQQLQJ DQG ZKHUH $ GHHSHU H[SODQDWLRQ RI WRPRJUDSK\ IROORZV )RU D ORQJHU GLVFXVVLRQ RI PDSSLQJ SOHDVH VHH WKH DUWLFOH ´0DSSLQJ 2XW )DVWHU 6DIHU 1HWZRUNVµ 1HWZRUN WRPRJUDSK\ LV JHQHUDOO\ RI WZR W\SHV³ERWK RI WKHP PDVVLYH LQYHUVH SUREOHPV 7KH ÀUVW W\SH XVHV HQGWRHQG GDWD WR HVWLPDWH OLQNOHYHO FKDUDFWHULVWLFV 7KLV IRUP RI WRPRJUDSK\ RIWHQ LV DFWLYH LQ QDWXUH XVLQJ PDQ\ SLQJV WUDFHURXWHV DQG RWKHU PDSSLQJ WRROV WR REWDLQ WKH QHFHVVDU\ GDWD 'XH WR WKH ODUJH DPRXQW RI XQGHVLUDEOH WUDIÀF H[SHULHQFHG E\ PDQ\ QHWZRUNV URXWHUV RU RWKHU QHWZRUN HTXLSPHQW PD\ QRW UHVSRQG WR SLQJ RU WUDFHURXWH UHTXHVWV 7KLV GHÀFLHQF\ KDV OHG WR D VHFRQG IRUP RI QHWZRUN WRPRJUDSK\ WKDW LV VRPHWLPHV FDOOHG LQIHUHQWLDO QHWZRUN WRPRJUDSK\ 7KLV IRUP RI QHWZRUN WRPRJUDSK\ XVHV LQGLYLGXDO URXWHU RU QRGHOHYHO PHDVXUHPHQWV WR UHFRYHU SDWKOHYHO LQIRUPDWLRQ 7KLV GDWD FDQ EH REWDLQHG SDVVLYHO\ DQG LW GRHV QRW FUHDWH D WUDIÀF EXUGHQ WKDW KDV WKH SRWHQWLDO WR FKDQJH WKH ORJLFDO QHWZRUN VWUXFWXUH 7KH VWXG\ RI QHWZRUN WRPRJUDSK\ LQFOXGHV QHWZRUN WRSRORJ\ ERWK ORJLFDO DQG SK\VLFDO WKH RULJLQGHVWLQDWLRQ WUDIÀF PDWUL[ DQG TXDOLW\ RI VHUYLFH SDUDPHWHUV VXFK DV ORVV UDWHV RU GHOD\ FKDUDFWHULVWLFV $FFXUDWH DQG WLPHO\ LQIRUPDWLRQ DERXW WUDIÀF Á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´&RPSUHVVHG 6HQVLQJ DQG 1HWZRUN 0RQLWRULQJµ IRU H[DPSOH UHJDUGLQJ TXHVWLRQ QXPEHU IRXU DERYH 0DQ\ PRUH TXHVWLRQV DULVH LQ WKH VWXG\ RI QHWZRUN PDSSLQJ DQG PHDVXUHPHQW 7KH 100& VHULHV KDV EHHQ D KXJH VXFFHVV ZLWK SDUWLFLSDQWV IURP GLIIHUHQW FRXQWULHV IHGHUDO DJHQFLHV XQLYHUVLWLHV DQG LQGXVWU\ 100& ZLOO EH KHOG $XJXVW DW 0F*LOO 8QLYHUVLW\ LQ 0RQWUHDO &DQDGD The graph that appears on the cover of this issue of The Next Wave shows the router level connectivity of the Internet as measured by The Next Wave is published to disseminate significant technical the Internet Mapping Project. advancements in telecommunications and information technologies. The work is being commercially Mentions of company names or commercial products do not imply developed by Lumeta Corporation. endorsement by the US government. Articles present views of the authors and not necessarily those of NSA or the TNW staff. &UHGLW For more information, please contact us at [email protected] 3DWHQW V SHQGLQJ DQG FRS\ULJKW /XPHWD &RUSRUDWLRQ $OO ULJKWV UHVHUYHG CONTENTS FEATURES 0DSSLQJ 2XW )DVWHU 6DIHU 1HWZRUNV +RZ $NDPDL 0DSV WKH 1HW $Q ,QGXVWU\ 3HUVSHFWLYH &RPSUHVVHG 6HQVLQJ DQG 1HWZRUN 0RQLWRULQJ 5HYHDOLQJ 6RFLDO 1HWZRUNV RI 6SDPPHUV &KDOOHQJHV LQ ,QWHUQHW *HRORFDWLRQ RU :KHUH·V :DOGR 2QOLQH" &OXPSV +RRSV DQG %XEEOHV³0RYLQJ %H\RQG &OXVWHULQJ LQ WKH $QDO\VLV RI 'DWD Mapping Out Faster, Safer Networks Maps. We use them every day. Your GPS guides you to that new restaurant you’ve wanted to try. The information map in the mall points out where HERE is. Online gamers pull up battle maps to navigate virtual worlds. The social network of your friends and your friends’ friends weaves a cat’s cradle of intertwined relationships. Your computer files are stored in folders that are displayed hierarchically. Site maps lay out how web pages link up. And think how much easier life would be if you had a map of the labyrinth of telephone options you need to navigate—“Press 1 for hours and locations”…”Press 2 to report a problem”…”Press 3 for account information”— when you try to pay your electric bill over the phone. Maps don’t just show how things are connected. They can also identify trouble spots and weak points you need to be aware of. GPS maps are able to alert you to traffic tie ups due to accidents or lane closures so you can adjust your route. Your security system might display a floor plan that shows which windows and doors are unlocked so you can protect your property. Network mapping does the same things for the Internet, helping to direct traffic and expose vulnerabilities. Network mapping can happen at different layers of the Internet, including applications, routing, or physical infrastructure, or in different parts of the Internet. Because the Internet changes constantly, any map of any variety—there are many Internet maps and no two agree—addresses a moving target. 4 Mapping Out Faster, Safer Networks FEATURE Tracing network routes DGRSWHG WUDFHURXWH DV DQ HDV\ ZD\ WR H[SORLW QHWZRUN 1HWZRUN PDSV WUDFN WKH URXWHV LQIRUPDWLRQ YXOQHUDELOLWLHV ,W GLGQ·W WDNH F\EHUFULPLQDOV ORQJ SDFNHWV WDNH DFURVV DQ ,3 ,QWHUQHW SURWRFRO WR GLVFRYHU WKDW QRW RQO\ FDQ WKH XWLOLW\ EH XVHG WR QHWZRUN WR UHDFK D UHPRWH KRVW 1HWZRUN URXWLQJ LV ORFDWH D QHWZRUN·V ZHDN SRLQWV LQLWLDWLQJ WUDFHURXWH RSSRUWXQLVWLF DVVLJQLQJ SDFNHWV WR WKH ÀUVW DYDLODEOH IURP PXOWLSOH V\VWHPV FDQ ÁRRG D QHWZRUN WR ODXQFK URXWHU 7KLV DSSURDFK PHDQV WUDIÀF FDQ EH GLUHFWHG D GHQLDORIVHUYLFH DWWDFN DORQJ GLIIHUHQW SDWKV WR UHDFK D GHVWLQDWLRQ DQG The Internet Mapping Project WKH QXPEHU RI KRSV QHHGHG WR JHW WKHUH FDQ YDU\ 7UDFHURXWHV ZHUH LQLWLDOO\ XVHG E\ QHWZRUN 1HWZRUN PDSSLQJ PDNHV LW HDV\ WR YLVXDOL]H ZKDW DGPLQLVWUDWRUV WR WURXEOHVKRRW DQG WXQH ORFDO URXWHV DUH EHLQJ WDNHQ QHWZRUNV EXW WKH XWLOLW\ ZRXOG HYHQWXDOO\ EH 7KH WUDFHURXWH QHWZRUN XWLOLW\ ZDV LQWURGXFHG DSSOLHG RQ D PXFK ODUJHU VFDOH $V WKH :RUOG :LGH RQ 8QL[ RSHUDWLQJ V\VWHPV LQ WR PDS QHWZRUN :HE UDSLGO\ JUHZ LQ SRSXODULW\ GXULQJ WKH V WUDIÀF 9DULDQWV RI WKH WUDFHURXWH SURJUDP DUH XVHG WKH QHHG IRU D ZRUOGZLGH PDS ZDV UHDOL]HG (IIRUWV RQ RWKHU RSHUDWLQJ V\VWHPV³WUDFHFHUW DQG SLQJ WR PDS QHWZRUN WUDIÀF JOREDOO\ EHJDQ LQ HDUQHVW XWLOLWLHV DUH XVHG RQ :LQGRZV RSHUDWLQJ V\VWHPV ZLWK WKH ,QWHUQHW 0DSSLQJ 3URMHFW VWDUWHG E\ %LOO DQG WUDFHSDWK LV WKH QHWZRUN WRRO XVHG RQ FXUUHQW &KHVZLFN DQG +DO %XUFK DW %HOO /DEV LQ /LQX[ LQVWDOODWLRQV (YHU\ GD\ IRU HLJKW \HDUV WKH SURMHFW UHFRUGHG 1HWZRUN WHFKQLFLDQV XVH WKH WUDFHURXWH XWLOLW\ WUDFHURXWHV IRU WULOOLRQV RI SDFNHWV WUDYHOLQJ DFURVV WR WURXEOHVKRRW QHWZRUN SUREOHPV .QRZLQJ D KXQGUHGV RI WKRXVDQGV RI ,3 QHWZRUNV 7KH QHWZRUN SDFNHW·V WUDFHURXWH FDQ KHOS LGHQWLI\ IDLOHG URXWHUV PDS WKDW HPHUJHG SDLQWHG D SLFWXUH UHVHPEOLQJ D RU ÀUHZDOOV WKDW DUH REVWUXFWLQJ WUDIÀF 7UDFHURXWH VN\ ÀOOHG ZLWK ÀUHZRUNV RQ WKH )RXUWK RI -XO\ 6HH FDQ DOVR EH XVHG IRU SHQHWUDWLRQ WHVWLQJ WR KXQW IRU WKH FRYHU LPDJH IRU DQ H[DPSOH QHWZRUN HQWU\ SRLQWV WKDW FRXOG SRVH D VHFXULW\ ULVN 1RZ PDQDJHG E\ WKH /XPHWD &RUSRUDWLRQ +DFNHUV DUH HVSHFLDOO\ LQWHUHVWHG LQ ÀQGLQJ ZKLFK VSXQ RII IURP %HOO /DEV LQ WKH ,QWHUQHW EDFN GRRUV LQWR QHWZRUNV DQG WKH\ KDYH UHDGLO\ 0DSSLQJ 3URMHFW FRQWLQXHV WR FKDUW WKH EDFN URDGV The Next Wave Vol 18 No 3 2010 5 DQG WKRURXJKIDUHV RI ,QWHUQHW WUDIÀF 7KH JRDO RI WKH Address space SURMHFW KDV EHHQ WR SURYLGH JOREDO QHWZRUN YLVLELOLW\ $V HQWHUSULVHV DQG JRYHUQPHQW DJHQFLHV WU\ WKURXJK WKH DFFXUDWH PHDVXUHPHQW RI IRXU IDFWRUV WR EDODQFH WKH IRUFHV IRU QHWZRUN FKDQJH ZLWK WKH QHWZRUN WRSRORJ\ DGGUHVV VSDFH OHDNV UHTXLUHPHQWV IRU ULVN PDQDJHPHQW DQG FRPSOLDQFH DQG GHYLFH ÀQJHUSULQWV ,QGHSHQGHQW GLVFRYHU\ LQLWLDWLYHV ,7 VHFXULW\ PDQDJHUV DUH IDFHG ZLWK WKH SURFHVVHV DUH XVHG WR UHYHDO WKHVH IRXU FRPSRQHQWV IRUPLGDEOH WDVN RI VHFXULQJ ZKDW WKH\ DUHQ·W HYHQ WKDW GHÀQH D QHWZRUN DZDUH RI 7KH VROXWLRQ OLHV SDUWO\ LQ GLVFRYHULQJ DOO RI D QHWZRUN·V HQWLWLHV³WKRVH WKDW DUH DXWKRUL]HG DV Network topology ZHOO DV WKRVH WKDW DUH XQDXWKRUL]HG 1HWZRUN KRVW 1HWZRUN WRSRORJ\ GHVFULEHV WKH ÁRZ RI GLVFRYHU\ LV XVHG WR FRQGXFW D FHQVXV RI ,3 DGGUHVVHV QHWZRUN WUDIÀF DQG WKH ERWWOHQHFNV WKDW VORZ LW DFURVV SURWRFROV DQG UHYHDO NQRZQ DQG SUHYLRXVO\ GRZQ $ FRPSXWHU·V QHWZRUN GLVFRYHU\ VHWWLQJ XQGHWHFWHG QHWZRUN HQWLWLHV +RVW GLVFRYHU\ LV RQH DIIHFWV ZKHWKHU LW FDQ VHH RWKHU FRPSXWHUV RQ WKH RI WKH HDUOLHVW SKDVHV RI QHWZRUN UHFRQQDLVVDQFH QHWZRUN RU EH VHHQ E\ WKHP $ FRPSXWHU FDQ $GGUHVV
Recommended publications
  • A Brief Introduction to Unix-2019-AMS
    Brief Intro to Linux/Unix Brief Intro to Unix (contd) A Brief Introduction to o Brief History of Unix o Compilers, Email, Text processing o Basics of a Unix session o Image Processing Linux/Unix – AMS 2019 o The Unix File System Pete Pokrandt o Working with Files and Directories o The vi editor UW-Madison AOS Systems Administrator o Your Environment [email protected] o Common Commands Twitter @PTH1 History of Unix History of Unix History of Unix o Created in 1969 by Kenneth Thompson and Dennis o Today – two main variants, but blended o It’s been around for a long time Ritchie at AT&T o Revised in-house until first public release 1977 o System V (Sun Solaris, SGI, Dec OSF1, AIX, o It was written by computer programmers for o 1977 – UC-Berkeley – Berkeley Software Distribution (BSD) linux) computer programmers o 1983 – Sun Workstations produced a Unix Workstation o BSD (Old SunOS, linux, Mac OSX/MacOS) o Case sensitive, mostly lowercase o AT&T unix -> System V abbreviations 1 Basics of a Unix Login Session Basics of a Unix Login Session Basics of a Unix Login Session o The Shell – the command line interface, o Features provided by the shell o Logging in to a unix session where you enter commands, etc n Create an environment that meets your needs n login: username n Some common shells n Write shell scripts (batch files) n password: tImpAw$ n Define command aliases (this Is my password At work $) Bourne Shell (sh) OR n Manipulate command history IHateHaving2changeMypasswordevery3weeks!!! C Shell (csh) n Automatically complete the command
    [Show full text]
  • “Linux at the Command Line” Don Johnson of BU IS&T  We’Ll Start with a Sign in Sheet
    “Linux at the Command Line” Don Johnson of BU IS&T We’ll start with a sign in sheet. We’ll end with a class evaluation. We’ll cover as much as we can in the time allowed; if we don’t cover everything, you’ll pick it up as you continue working with Linux. This is a hands-on, lab class; ask questions at any time. Commands for you to type are in BOLD The Most Common O/S Used By BU Researchers When Working on a Server or Computer Cluster Linux is a Unix clone begun in 1991 and written from scratch by Linus Torvalds with assistance from a loosely-knit team of hackers across the Net. 64% of the world’s servers run some variant of Unix or Linux. The Android phone and the Kindle run Linux. a set of small Linux is an O/S core programs written by written by Linus Richard Stallman and Torvalds and others others. They are the AND GNU utilities. http://www.gnu.org/ Network: ssh, scp Shells: BASH, TCSH, clear, history, chsh, echo, set, setenv, xargs System Information: w, whoami, man, info, which, free, echo, date, cal, df, free Command Information: man, info Symbols: |, >, >>, <, ;, ~, ., .. Filters: grep, egrep, more, less, head, tail Hotkeys: <ctrl><c>, <ctrl><d> File System: ls, mkdir, cd, pwd, mv, touch, file, find, diff, cmp, du, chmod, find File Editors: gedit, nedit You need a “xterm” emulation – software that emulates an “X” terminal and that connects using the “SSH” Secure Shell protocol. ◦ Windows Use StarNet “X-Win32:” http://www.bu.edu/tech/support/desktop/ distribution/xwindows/xwin32/ ◦ Mac OS X “Terminal” is already installed Why? Darwin, the system on which Apple's Mac OS X is built, is a derivative of 4.4BSD-Lite2 and FreeBSD.
    [Show full text]
  • Recent Results in Network Mapping: Implications on Cybersecurity
    Recent Results in Network Mapping: Implications on Cybersecurity Robert Beverly, Justin Rohrer, Geoffrey Xie Naval Postgraduate School Center for Measurement and Analysis of Network Data (CMAND) July 27, 2015 DHS S&T Cyber Seminar R. Beverly, J. Rohrer, G. Xie (NPS) Advances in Network Mapping DHS S&T Cyber Seminar 1 / 50 Intro Outline 1 Intro 2 Background 3 Project 4 Recent Advances 5 Future R. Beverly, J. Rohrer, G. Xie (NPS) Advances in Network Mapping DHS S&T Cyber Seminar 2 / 50 Intro CMAND Lab CMAND Lab @ NPS Naval Postgraduate School Navy’s Research University Located in Monterey, CA '1500 students, military officers, foreign military, DoD civilians Center for Measurement and Analysis of Network Data 3 NPS professors, 2 NPS staff 1 PhD student, rotating cast of ∼ 5-8 Master’s students Collaborators: CAIDA, ICSI, MIT, Akamai, Cisco, Verisign, ::: Focus: Large-scale network measurement and data mining Network architecture and security R. Beverly, J. Rohrer, G. Xie (NPS) Advances in Network Mapping DHS S&T Cyber Seminar 3 / 50 Intro Output Select Recent Publications (bold DHS-supported): 1 Luckie, Beverly, Wu, Allman, Claffy, “Resilience of Deployed TCP to Blind Off-Path Attacks,” in ACM IMC 2015 2 Huz, Bauer, Claffy, Beverly, “Experience in using Mechanical Turk for Network Measurement,” in ACM C2BID 2015 3 Beverly, Luckie, Mosley, Claffy, “Measuring and Characterizing IPv6 Router Availability,” in PAM 2015 4 Beverly, Berger, “Server Siblings: Identifying Shared IPv4/IPv6 Infrastructure,” in PAM 2015 5 Alt, Beverly, Dainotti, “Uncovering Network Tarpits with Degreaser,” in ACSAC 2014 6 Craven, Beverly, Allman, “A Middlebox-Cooperative TCP for a non End-to-End Internet,” in ACM SIGCOMM 2014 7 Baltra, Beverly, Xie, “Ingress Point Spreading: A New Primitive for Adaptive Active Network Mapping,” in PAM 2014 R.
    [Show full text]
  • A Disjunctive Internet Cartographer∗
    DisCarte: A Disjunctive Internet Cartographer∗ Rob Sherwood Adam Bender Neil Spring University of Maryland University of Maryland University of Maryland [email protected] [email protected] [email protected] ABSTRACT 1. INTRODUCTION Internet topology discovery consists of inferring the inter-router Knowledge of the global topology of the Internet allows network connectivity (“links”) and the mapping from IP addresses to routers operators and researchers to determine where losses, bottlenecks, (“alias resolution”). Current topology discovery techniques use failures, and other undesirable and anomalous events occur. Yet TTL-limited “traceroute” probes to discover links and use direct this topology remains largely unknown: individual operators may router probing to resolve aliases. The often-ignored record route know their own networks, but neighboring networks are amorphous (RR) IP option provides a source of disparate topology data that clouds. The lack of precise global topology information hinders could augment existing techniques, but it is difficult to properly network diagnostics [42, 24, 15, 17], inflates IP path lengths [10, align with traceroute-based topologies because router RR imple- 39, 36, 43], reduces the accuracy of Internet models [46, 25, 16], mentations are under-standardized. Correctly aligned RR and trace- and encourages overlay networks to ignore the underlay [2, 27]. route topologies have fewer false links, include anonymous and Because network operators rarely publish their topologies, and hidden routers, and discover aliases for routers that do not respond the IP protocols have little explicit support for exposing the In- to direct probing. More accurate and feature-rich topologies ben- ternet’s underlying structure, researchers must infer the topology efit overlay construction and network diagnostics, modeling, and from measurement and observation.
    [Show full text]
  • Edge-Aware Inter-Domain Routing for Realizing Next-Generation Mobility Services∗
    Edge-Aware Inter-Domain Routing for Realizing Next-Generation Mobility Services∗ Shreyasee Mukherjee, Shravan Sriram, Dipankar Raychaudhuri WINLAB, Rutgers University, North Brunswick, NJ 08902, USA Email: fshreya, sshravan, [email protected] Abstract—This work describes a clean-slate inter-domain rout- Emerging Internet requirements have motivated several ing protocol designed to meet the needs of the future mobile clean-slate Internet design projects such as Named Data Net- Internet. In particular, we describe the edge-aware inter-domain work (NDN) [4], XIA [5] and MobilityFirst [6]. Previously routing (EIR) protocol which provides new abstractions of aggregated-nodes (aNodes) and virtual-links (vLinks) for express- published works on these architectures have addressed mobil- ing network topologies and edge network properties necessary ity requirements at the intra-domain level [7], [8], but support to address next-generation mobility related routing scenarios for end-to-end mobility services across multiple networks which are inadequately supported by the border gateway protocol remains an important open problem. In this paper, we first (BGP) in use today. Specific use-cases addressed by EIR include motivate the need for clean-slate approaches to inter-domain, emerging mobility service scenarios such as multi-homing across WiFi and cellular, multipath routing over several access networks, and then describe the key features of a specific new design and anycast access from mobile devices to replicated cloud called EIR (edge-aware inter-domain routing) intended to services. Simulation results for protocol overhead are presented meet emerging requirements. The proposed protocol provides for a global-scale Caida topology, leading to an identification new abstractions for expressing network topology and edge of parameters necessary to obtain a good balance between network properties necessary to support a full range of mo- overhead and routing table convergence time.
    [Show full text]
  • Quick Start Guide
    Quick Start Guide REMOTE MANAGEMENT CARD RMCARD205 RMCARD305 The Remote Management Card allows a UPS system and environmental sensor to be managed, monitored, and configured. K01-0000449-00 INSTALLATION GUIDE Step 1. Hardware Installation RMCARD205 RMCARD305 1. Remove the two retaining screws of the expansion port cover, and then remove the cover. 2. Install the CyberPower Remote Management Card into the expansion port. 3. Re-install and tighten the retaining screws. 4. Connect the Ethernet cable to the Ethernet connector of the CyberPower Remote Management Card. 5. (Optional) To connect with the environmental sensor, use a RJ45 Ethernet cable. Connect one end to the Universal port on the RMCARD and the other end into the sensor. For further information, please refer to the ENVIROSENOR user’s manual. NOTE: The CyberPower Remote Management Card is a hot-swap device, so you do not need to turn off the UPS to install it. 1 Definitions for LED Indicators Link LED color Condition The Remote Management Card is not connected to Off the Network/ or the Remote Management Card power is off The Remote Management Card is connected to the On(Yellow) Network TX/RX LED color Off The Remote Management Card power is off On(Green) The Remote Management Card power is on - Receiving/transmitting data packet Flash - Reset finished Step 2. Configure the IP address for the CyberPower Remote Management Card. Method 1: Using the Power Device Network Utility Tool 1. Install the Power Device Network Utility tool available for download on the Network Power Management product web page at www.CyberPower.com.
    [Show full text]
  • A Technique for Network Topology Deception
    A Technique for Network Topology Deception Samuel T. Trassare Robert Beverly David Alderson Naval Postgraduate School Naval Postgraduate School Naval Postgraduate School Email: [email protected] Email: [email protected] Email: [email protected] Abstract—Civilian and military networks are continually topological deception may provide the perception of a network probed for vulnerabilities. Cyber criminals, and autonomous that resembles, or completely disguises, the underlying true botnets under their control, regularly scan networks in search network by varying attributes such as nodes, node count or of vulnerable systems to co-opt. Military and more sophisticated the redundancy and diversity of links between nodes. adversaries may also scan and map networks as part of re- connaissance and intelligence gathering. This paper focuses on For instance, the outward topology presented to an attacker adversaries attempting to map a network’s infrastructure, i.e., may be chosen to protect high-value nodes or links within the the critical routers and links supporting a network. We develop network. Thus we may cause the adversary to take specific a novel methodology, rooted in principles of military deception, actions, such as attacking highly fault-tolerant nodes that for deceiving a malicious traceroute probe and influencing the appear weak, or avoiding weak nodes that appear highly structure of the network as inferred by a mapping adversary. Our Linux-based implementation runs as a kernel module at fault-tolerant. The methodology accommodates any true input a border router to present a deceptive external topology. We topology, while the deceptive topology can be modified easily construct a proof-of-concept test network to show that a remote and frequently to further confound the adversarys efforts to adversary using traceroute to map a defended network can be identify vulnerabilities in the network infrastructure.
    [Show full text]
  • Benchmarking Virtual Network Mapping Algorithms Jin Zhu University of Massachusetts Amherst
    CORE Metadata, citation and similar papers at core.ac.uk Provided by ScholarWorks@UMass Amherst University of Massachusetts Amherst ScholarWorks@UMass Amherst Masters Theses 1911 - February 2014 2012 Benchmarking Virtual Network Mapping Algorithms Jin Zhu University of Massachusetts Amherst Follow this and additional works at: https://scholarworks.umass.edu/theses Part of the Systems and Communications Commons Zhu, Jin, "Benchmarking Virtual Network Mapping Algorithms" (2012). Masters Theses 1911 - February 2014. 970. Retrieved from https://scholarworks.umass.edu/theses/970 This thesis is brought to you for free and open access by ScholarWorks@UMass Amherst. It has been accepted for inclusion in Masters Theses 1911 - February 2014 by an authorized administrator of ScholarWorks@UMass Amherst. For more information, please contact [email protected]. VNMBENCH: A BENCHMARK FOR VIRTUAL NETWORK MAPPING ALGORITHMS A Thesis Presented by JIN ZHU Submitted to the Graduate School of the University of Massachusetts Amherst in partial fulfillment of the requirements for the degree of MASTER OF SCIENCE IN ELECTRICAL AND COMPUTER ENGINEERING September 2012 Electrical and Computer Engineering VNMBENCH: A BENCHMARK FOR VIRTUAL NETWORK MAPPING ALGORITHMS A Thesis Presented by JIN ZHU Approved as to style and content by: Tilman Wolf, Chair Weibo Gong, Member Aura Ganz, Member C.V.Hollot, Department Head Electrical and Computer Engineering ABSTRACT VNMBENCH: A BENCHMARK FOR VIRTUAL NETWORK MAPPING ALGORITHMS September 2012 Jin Zhu B.E, NANJING UNIVERSITY OF POSTS AND TELECOMMUNICATIONS M.S, UNIVERSITY OF MASSACHUSETTS AMHERST Directed by: Professor Tilman Wolf The network architecture of the current Internet cannot accommodate the deployment of novel network-layer protocols. To address this fundamental problem, network virtualization has been proposed, where a single physical infrastructure is shared among different virtual network slices.
    [Show full text]
  • Service Dependency Analysis Via TCP/UDP Port Tracing
    Brigham Young University BYU ScholarsArchive Theses and Dissertations 2015-06-01 Service Dependency Analysis via TCP/UDP Port Tracing John K. Clawson Brigham Young University - Provo Follow this and additional works at: https://scholarsarchive.byu.edu/etd Part of the Industrial Technology Commons BYU ScholarsArchive Citation Clawson, John K., "Service Dependency Analysis via TCP/UDP Port Tracing" (2015). Theses and Dissertations. 5479. https://scholarsarchive.byu.edu/etd/5479 This Thesis is brought to you for free and open access by BYU ScholarsArchive. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of BYU ScholarsArchive. For more information, please contact [email protected], [email protected]. Service Dependency Analysis via TCP/UDP Port Tracing John K. Clawson A thesis submitted to the faculty of Brigham Young University in partial fulfillment of the requirements for the degree of Master of Science Joseph J. Ekstrom, Chair Derek L. Hansen Kevin B. Tew School of Technology Brigham Young University June 2015 Copyright © 2015 John K. Clawson All Rights Reserved ABSTRACT Service Dependency Analysis via TCP/UDP Port Tracing John K. Clawson School of Technology, BYU Master of Science Enterprise networks are traditionally mapped via layers two or three, providing a view of what devices are connected to different parts of the network infrastructure. A method was developed to map connections at layer four, providing a view of interconnected systems and services instead of network infrastructure. This data was graphed and displayed in a web application. The information proved beneficial in identifying connections between systems or imbalanced clusters when troubleshooting problems with enterprise applications.
    [Show full text]
  • The ISO OSI Reference Model
    TheThe ISOISO OSIOSI ReferenceReference ModelModel Overview: OSI services Physical layer Data link layer Network layer Transport layer Session layer Presentation layer Application layer 3-1 Copyright © 2001 Trevor R. Grove OverviewOverview • Formal framework for computer-to- computer communications • Standardized by ISO • Layered organization: – services: what the layers do – interfaces: how to access (use) the services – protocols: private peer-to-peer messages • References: – Tanenbaum: Ch 1.3, 1.4, 1.6, 2.2, 2.4, 2.5, 3.1, 3.6, 5.1, 5.2, 5.4, 6.1, 6.2 – Kurose & Ross: Ch 5.1, 5.8, 5.9.2, 5.9, 5.10, 4.1, 4.2, 4.6, 5.6, 8.5, 3.1.1, 2.1.1, 2.1.2 3-2 Copyright © 2001 Trevor R. Grove TheThe bigbig picturepicture (Tanenbaum, pg 29) 3-3 Copyright © 2001 Trevor R. Grove ServicesServices •A service: – is a set of functions provided by a layer to its above layer – defines the operations a layer can perform on behalf of its users – service definition does not say how these operations are implemented • A protocol: – is a set of rules governing the format and meaning of the frames, packets or messages exchanged by the peer entities within a layer – implements a service •So: – any protocol that implements a given service can be used where required • network products & systems can change protocols at will provided the service definitions do not change 3-4 Copyright © 2001 Trevor R. Grove continued... • Functional aspects of OSI services: – connection-oriented (CO) vs. connectionless (CL) • two varieties of CO services: message stream and byte stream – reliable vs.
    [Show full text]
  • The Linux Command Line
    The Linux Command Line Second Internet Edition William E. Shotts, Jr. A LinuxCommand.org Book Copyright ©2008-2013, William E. Shotts, Jr. This work is licensed under the Creative Commons Attribution-Noncommercial-No De- rivative Works 3.0 United States License. To view a copy of this license, visit the link above or send a letter to Creative Commons, 171 Second Street, Suite 300, San Fran- cisco, California, 94105, USA. Linux® is the registered trademark of Linus Torvalds. All other trademarks belong to their respective owners. This book is part of the LinuxCommand.org project, a site for Linux education and advo- cacy devoted to helping users of legacy operating systems migrate into the future. You may contact the LinuxCommand.org project at http://linuxcommand.org. This book is also available in printed form, published by No Starch Press and may be purchased wherever fine books are sold. No Starch Press also offers this book in elec- tronic formats for most popular e-readers: http://nostarch.com/tlcl.htm Release History Version Date Description 13.07 July 6, 2013 Second Internet Edition. 09.12 December 14, 2009 First Internet Edition. 09.11 November 19, 2009 Fourth draft with almost all reviewer feedback incorporated and edited through chapter 37. 09.10 October 3, 2009 Third draft with revised table formatting, partial application of reviewers feedback and edited through chapter 18. 09.08 August 12, 2009 Second draft incorporating the first editing pass. 09.07 July 18, 2009 Completed first draft. Table of Contents Introduction....................................................................................................xvi
    [Show full text]
  • Unix Commands (09/04/2014)
    Unix Commands (09/04/2014) • Access control – login <login_name> – exit – passwd <login_name> – yppassswd <loginname> – su – • Login as Super user – su <login> • Login as user <login> • Root Prompt – [root@localhost ~] # • User Prompt – [bms@raxama ~] $ On Line Documentation – man <command/topic> – info <command/topic> • Working with directories – mkdir –p <subdir> ... {-p create all directories in path if not present} mkdir –p /2015/Jan/21/14 will create /2015, Jan, 21 & 14 in case any of these is absent – cd <dir> – rm -r <subdir> ... Man Pages • 1 Executable programs or shell commands • 2 System calls (functions provided by the kernel) • 3 Library calls (functions within program libraries) • 4 Special files (usually found in /dev) • 5 File formats and conventions eg /etc/passwd • 6 Games • 7 Miscellaneous (including macro packages and conventions), e.g. man(7), groff(7) • 8 System administration commands (usually only for root) • 9 Kernel routines [Non standard] – man grep, {awk,sed,find,cut,sort} – man –k mysql, man –k dhcp – man crontab ,man 5 crontab – man printf, man 3 printf – man read, man 2 read – man info Runlevels used by Fedora/RHS Refer /etc/inittab • 0 - halt (Do NOT set initdefault to this) • 1 - Single user mode • 2 - Multiuser, – without NFS (The same as 3, if you do not have networking) • 3 - Full multi user mode w/o X • 4 - unused • 5 - X11 • 6 - reboot (Do NOT set init default to this) – init 6 {Reboot System} – init 0 {Halt the System} – reboot {Requires Super User} – <ctrl> <alt> <del> • in tty[2-7] mode – tty switching • <ctrl> <alt> <F1-7> • In Fedora 10 tty1 is X.
    [Show full text]