Visualisation of Networks 3Rd Year Software Engineering Project by David Gilbert Department of Computer Science, University of Durham 2005

Total Page:16

File Type:pdf, Size:1020Kb

Visualisation of Networks 3Rd Year Software Engineering Project by David Gilbert Department of Computer Science, University of Durham 2005 Visualisation of Networks 3rd Year Software Engineering Project by David Gilbert Department of Computer Science, University of Durham 2005 www.randomwire.com No part of the material offered has previously been submitted by the author for a degree in the University of Durham or in any other university. All the work presented here is the sole work of the author and no one else. 18,000 words approximately. 1 Abstract In this report we aim to explore the field of 'Information Visualisation' in relation to mapping interconnected structures (networks). We investigate the effectiveness of current methods and theories that guide the construction of visualisations. A review of the TCP/IP network protocol and possible topologies demonstrates the type and range of information available to be mapped. The prototype process model is followed to produce a design which is implemented to form a tool capable of connecting together multiple Linux tools for the purpose of collecting and visualising network data. Methods for evaluating visualisations are discussed to realise a set of evaluation criteria which are then set against a number of visualisation tools. Graphic output from these tools are discussed with relation to the knowledge we can gain from them. The OSI model is compared to our findings showing a clear relationship. Tools using external data sources are then evaluated to converge our knowledge of the domain. A static conceptual map of Durham is also created to demonstrate alternate forms of visualisation and in particular quasi geographic layout. 2 Contents 1 Background...................................................................................................................6 1.1 Problem Domain.......................................................................................................7 1.1.1 Human-Information Interaction..............................................................................7 1.1.2 Software Engineering Practices..............................................................................7 1.2 Terminology Used.....................................................................................................8 1.3 Objectives..............................................................................................................8 1.4 Deliverables............................................................................................................9 1.4.1 Minimum.........................................................................................................9 1.4.2 Intermediate....................................................................................................9 1.4.3 Advanced........................................................................................................9 1.5 Report Contents.......................................................................................................9 1.6 Time Plan..............................................................................................................9 2 Part A - Networks..........................................................................................................11 2.1 Introduction..........................................................................................................11 2.2 Background...........................................................................................................11 2.3 OSI Model & Header Composition.................................................................................12 2.4 Network Topologies.................................................................................................13 2.5 Address Classes......................................................................................................14 2.6 TCP/IP Utilities......................................................................................................14 2.6.1 Netstat..........................................................................................................15 2.6.2 Nmap ...........................................................................................................15 2.6.3 Ping..............................................................................................................15 2.6.4 Traceroute.....................................................................................................16 2.6.5 Whois............................................................................................................16 2.7 Mapping, Not Hacking...............................................................................................17 2.8 Summary..............................................................................................................17 2 Part B - Visualisation......................................................................................................18 2.9 Introduction..........................................................................................................18 2.10 Background..........................................................................................................18 2.11 Case Study 1 – The London Underground.......................................................................20 2.12 Case Study 2 – Lumeta Internet Mapping Project.............................................................20 2.13 Visualisation Techniques..........................................................................................21 2.13.1 Graph Theory.................................................................................................22 2.14 Summary.............................................................................................................27 3 Design........................................................................................................................28 3.1 Introduction..........................................................................................................28 3.2 Architecture Design.................................................................................................29 3.2.1 Data Flow.......................................................................................................30 3.3 System Interaction..................................................................................................32 3.4 Data Extraction......................................................................................................32 3.5 Database Format....................................................................................................33 3.6 Database Concurrency Control....................................................................................35 3.7 Technical Considerations...........................................................................................35 3.8 Design Rationale.....................................................................................................36 3.9 Summary..............................................................................................................37 4 Implementation............................................................................................................38 4.1 Introduction..........................................................................................................38 4.2 Scripting Language Comparison...................................................................................39 4.3 Visualisation Tools Features.......................................................................................40 4.4 Visualisation Tools Criteria.........................................................................................41 4.5 Script List.............................................................................................................42 4.6 Script Interaction....................................................................................................43 4.7 Execution Example..................................................................................................44 4.8 Source Overview.....................................................................................................45 4.8.1 Pingscan.pl.....................................................................................................45 4.8.2 Tracenetwork.pl...............................................................................................45 4.8.3 Enumerate.pl..................................................................................................46 4.8.4 Nodeconvert.pl................................................................................................46 3 4.8.5 Discovertrace.pl...............................................................................................46 4.9 Technical Issues Encountered.....................................................................................47 4.9.1 Traceroute Efficiency........................................................................................47 4.9.2 Service Scanning..............................................................................................47 4.10 Testing...............................................................................................................48 4.11 Summary.............................................................................................................49 5 Evaluation...................................................................................................................50 5.1 Beyond Data..........................................................................................................50
Recommended publications
  • Useful Applications – Last Updated 8 Th March 2014
    A List of Useful Applications – Last updated 8 th March 2014 In the descriptions of the software the text in black is my comments. Text in dark blue preceded by 'What they say :-' is a quote from the website providing the software. Rating :- This is my own biased and arbitrary opinion of the quality and usefulness of the software. The rating is out of 5. Unrated = - Poor = Average = Good = Very Good = Essential = Open Office http://www.openoffice.org/ Very Good = Word processor, Spreadsheet, Drawing Package, Presentation Package etc, etc. Free and open source complete office suite, equivalent to Microsoft Office. Since the takeover of this project by Oracle development seems to have ground to a halt with the departure of many of the developers. Libre Office http://www.libreoffice.org/ Essential = Word processor, Spreadsheet, Drawing Package, Presentation Package etc, etc. Free and open source complete office suite, equivalent to Microsoft Office. This package is essentially the same as Open Office however it satisfies the open source purists because it is under the control of an open source group rather than the Oracle Corporation. Since the takeover of the Open Office project by Oracle many of the developers left and a lot of them ended up on the Libre Office project. Development on the Libre Office project is now ahead of Open Office and so Libre Office would be my preferred office suite. AbiWord http://www.abisource.com/ Good = If you don't really need a full office suite but just want a simple word processor then AbiWord might be just what you are looking for.
    [Show full text]
  • Software Analysis
    visEUalisation Analysis of the Open Source Software. Explaining the pros and cons of each one. visEUalisation HOW TO DEVELOP INNOVATIVE DIGITAL EDUCATIONAL VIDEOS 2018-1-PL01-KA204-050821 1 Content: Introduction..................................................................................................................................3 1. Video scribing software ......................................................................................................... 4 2. Digital image processing...................................................................................................... 23 3. Scalable Vector Graphics Editor .......................................................................................... 28 4. Visual Mapping. ................................................................................................................... 32 5. Configurable tools without the need of knowledge or graphic design skills. ..................... 35 6. Graphic organisers: Groupings of concepts, Descriptive tables, Timelines, Spiders, Venn diagrams. ...................................................................................................................................... 38 7. Creating Effects ................................................................................................................... 43 8. Post-Processing ................................................................................................................... 45 9. Music&Sounds Creator and Editor .....................................................................................
    [Show full text]
  • Measuring an IP Network in Situ
    Measuring an IP Network in situ Hal Burch May 6, 2005 CMU-CS-05-132 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Thesis Committee Bruce Maggs Gary L. Miller Srinivasan Seshan Steven Bellovin !c 2005, Hal Burch Some of this material is based upon work funded under a National Science Foundation Graduate Research Fellowship. Also partially funded by NSF Nets Grant CNF-0435382, ARPA Contract N00014-95-1-1246, and NSF NYI Award CCR-94-57766, with matching funds provided by NEC Research Institute and Sun Microsystems. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of any funding agency or organization. Keywords: networking measurement,network topology,graph drawing,tomography,traceback,IP aliasing,reverse traceroute,anonymous DNS Abstract The Internet, and IP networking in general, have become vital to the scientific community and the global economy. This growth has increased the importance of measuring and monitoring the Internet to ensure that it runs smoothly and to aid the design of future protocols and networks. To simplify network growth, IP networking is designed to be decentralized. This means that each router and each network needs and has only limited information about the Internet. One disadvantage of this design is that measurement systems are required in order to determine the behavior of the Internet as a whole. This thesis explores ways to measure five different aspects of the Internet. The first aspect considered is the Internet’s topology, the inter-connectivity of the Internet.
    [Show full text]
  • Petri Net-Based Graphical and Computational Modelling of Biological Systems
    bioRxiv preprint doi: https://doi.org/10.1101/047043; this version posted June 22, 2016. The copyright holder for this preprint (which was not certified by peer review) is the author/funder. All rights reserved. No reuse allowed without permission. Petri Net-Based Graphical and Computational Modelling of Biological Systems Alessandra Livigni1, Laura O’Hara1,2, Marta E. Polak3,4, Tim Angus1, Lee B. Smith2 and Tom C. Freeman1+ 1The Roslin Institute and Royal (Dick) School of Veterinary Studies, University of Edinburgh, Easter Bush, Edinburgh, Midlothian EH25 9RG, UK. 2MRC Centre for Reproductive Health, 47 Little France Crescent, Edinburgh, EH16 4TJ, UK, 3Clinical and Experimental Sciences, Sir Henry Wellcome Laboratories, Faculty of Medicine, University of Southampton, SO16 6YD, Southampton, 4Institute for Life Sciences, University of Southampton, SO17 1BJ, UK. Abstract In silico modelling of biological pathways is a major endeavour of systems biology. Here we present a methodology for construction of pathway models from the literature and other sources using a biologist- friendly graphical modelling system. The pathway notation scheme, called mEPN, is based on the principles of the process diagrams and Petri nets, and facilitates both the graphical representation of complex systems as well as dynamic simulation of their activity. The protocol is divided into four sections: 1) assembly of the pathway in the yEd software package using the mEPN scheme, 2) conversion of the pathway into a computable format, 3) pathway visualisation and in silico simulation using the BioLayout Express3D software, 4) optimisation of model parameterisation. This method allows reconstruction of any metabolic, signalling and transcriptional pathway as a means of knowledge management, as well as supporting the systems level modelling of their dynamic activity.
    [Show full text]
  • 7 Best Free Flowchart Tools for Windows
    2018. 6. 1. Pocket: 7 Best Free Flowchart Tools for Windows 7 Best Free Flowchart Tools for Windows By Joel Lee, www.makeuseof.com 6월 20일, 2017 Flowcharts aren’t just for engineers, programmers, and managers. Everyone can benet from learning how to make owcharts, most notably as a way to streamline your work and life, but even to break free from bad habits. The only problem is, what’s the best way to make a owchart? Plenty of top-notch owcharting apps exist, but they can get pricey. Microsoft Visio, the most popular option, is $300 (standalone) or $13 per month (on top of Oce 365). ConceptDraw Pro is $200. Edraw Max is $180. MyDraw is $70. Is it really necessary to spend so much on a owcharting tool? No! There are plenty of free options that are more than good enough, especially for non-business uses. You can either learn to create stunning owcharts in Microsoft Word How to Create Stunning Flowcharts With Microsoft Word How to Create Stunning Flowcharts With Microsoft Word Used with imagination, owcharts can simplify both your work or life. Why not try out a few owcharts with one of the easiest tools on hand – Microsoft Word. Read More if you already have it or use one of the following free Windows apps. Web-based apps have been intentionally excluded. 1. Dia Dia is a free and full-featured owchart app. It’s also entirely open source under the GPLv2 license, which is great if you adhere to open source philosophy. It’s powerful, extensible, and easy to use.
    [Show full text]
  • Cityehr – Electronic Health Records Using Open Health Informatics
    cityEHR – Electronic Health Records Using Open Health Informatics Mayo Clinic, 1907 Oxford University Hospital, 2014 Open Health Informatics cityEHR is an open source health records system developed using the principles of open health informatics Open source software Open standards Open system interfaces Open development processes Making Top Down Work for Us Top down approaches can crush the life out of the grass roots Not matched to requirements No stakeholder buy-in No innovation But top down can also mean giving freedom to do things locally that match exactly what is required Using Open Standards Properly Open standards can mean Everyone has to do everything in the same way Not matched to requirements No stakeholder buy-in No innovation But open standards can also mean giving freedom to do things locally in a way which will allow data exchange and functional interoperability with others cityEHR - Empowering The Twitter Knitter Freedom to meet local requirements Allow clinicians to create their own information models Easy to develop Do this using familiar tools such as spreadsheets Enforce open standards Blaine Cook Built on an architecture that uses Original Lead Architect, Twitter open standards for everything Doing his knitting at the XML Create an enterprise system Summer School, Oxford, 2010 Press a button to deploy an enterprise scale system cityEHR Platform • cityEHR is built using open source software • An enterprise-scale health records system • Following research at City University, London • Distributed under
    [Show full text]
  • ARENA: Asserting the Quality of Modeling Languages Information
    ARENA: Asserting the Quality of Modeling Languages Francisco de Freitas Vilar Morais Thesis to obtain the Master of Science Degree in Information Systems and Computer Engineering Supervisor: Prof. Alberto Manuel Rodrigues da Silva Examination Committee Chairperson: Prof. José Luís Brinquete Borbinha Supervisor: Prof. Alberto Manuel Rodrigues da Silva Member of the committee: Prof. André Ferreira Ferrão Couto e Vasconcelos July 2015 placeholder Em memória da minha avó Maria Amélia de Freitas Vilar e restantes familiares, pela força, exemplo e amor incondicional que sempre me deram. iii placeholder Acknowledgments I would like to thank my advisor, Prof. Alberto Silva, that supported and counselled me in ev- ery possible way. Without his knowledge on User-Interface and Business Process Modeling Languages, academic experience, commitment and perseverance, I couldn’t have structured, focused and developed this work. I must also thank my co-advisor, Mr. Andreas Schoknecht, for all the academic materials, drive and motivation that he has given me throughout this work while I was in Germany on the ERAS- MUS programme, as well as Prof. Jan Dietz, which contribution in ICEIS 2015 enlightened me to understand DEMO and its competing languages. This work was partially supported by the ARENA 2012 IBM Country Project, and by national funds through Fundação para a Ciência e a Tecnologia (FCT) with references UID/CEC/50021/2013 and EXCL/EEI- ESS/0257/2012 (DataStorm). I would also like to thank to my parents Maria José and António Manuel and my friends, for supporting me, giving me the strength to carry on and to remind me that hard work pays off.
    [Show full text]
  • CMU-CS-05-132.Pdf
    Measuring an IP Network in situ Hal Burch May 6, 2005 CMU-CS-05-132 School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy Thesis Committee Bruce Maggs Gary L. Miller Srinivasan Seshan Steven Bellovin c 2005, Hal Burch Some of this material is based upon work funded under a National Science Foundation Graduate Research Fellowship. Also partially funded by NSF Nets Grant CNF-0435382, ARPA Contract N00014-95-1-1246, and NSF NYI Award CCR-94-57766, with matching funds provided by NEC Research Institute and Sun Microsystems. Any opinions, findings, conclusions, or recommendations expressed in this publication are those of the author and do not necessarily reflect the views of any funding agency or organization. Keywords: networking measurement,network topology,graph drawing,tomography,traceback,IP aliasing,reverse traceroute,anonymous DNS Abstract The Internet, and IP networking in general, have become vital to the scientific community and the global economy. This growth has increased the importance of measuring and monitoring the Internet to ensure that it runs smoothly and to aid the design of future protocols and networks. To simplify network growth, IP networking is designed to be decentralized. This means that each router and each network needs and has only limited information about the Internet. One disadvantage of this design is that measurement systems are required in order to determine the behavior of the Internet as a whole. This thesis explores ways to measure five different aspects of the Internet. The first aspect considered is the Internet's topology, the inter-connectivity of the Internet.
    [Show full text]
  • Protocol Design in an Uncooperative Internet
    Protocol Design in an Uncooperative Internet Stefan R. Savage A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy University of Washington 2002 Program Authorized to Offer Degree: Computer Science and Engineering University of Washington Graduate School This is to certify that I have examined this copy of a doctoral dissertation by Stefan R. Savage and have found that it is complete and satisfactory in all respects, and that any and all revisions required by the final examining committee have been made. Co-Chairs of Supervisory Committee: Thomas E. Anderson Brian N. Bershad Reading Committee: Thomas E. Anderson Brian N. Bershad David J. Wetherall Date: c Copyright 2002 Stefan R. Savage In presenting this dissertation in partial fulfillment of the requirements for the Doctorial degree at the University of Washington, I agree that the Library shall make its copies freely available for inspection. I further agree that extensive copying of this thesis is allowable only for scholary purposes, consistent with “fair use” as prescribed in the U.S. Copyright Law. Requests for copying or reproduction of this dissertation may be referred to ProQuest Information and Learning, 300 North Zeeb Road, Ann Arbor, MI 48106-1346, to whom the author has granted “the right to reproduce and sell (a) copies of the manuscript in microform and/or (b) printed copies of the manuscript made from microform.” Signature Date University of Washington Abstract Protocol Design in an Uncooperative Internet by Stefan R. Savage Co-Chairs of Supervisory Committee Associate Professor Thomas E. Anderson Computer Science and Engineering Associate Professor Brian N.
    [Show full text]
  • An Entity Retrieval Model
    Searching Web Data: an Entity Retrieval Model Renaud Delbru Supervisor: Dr. Giovanni Tummarello Internal Examiner: Prof. Stefan Decker External Examiner: Dr. J´er^omeEuzenat External Examiner: Dr. Fabrizio Silvestri Dissertation submitted in pursuance of the degree of Doctor of Philosophy Digital Enterprise Research Institute Galway National University of Ireland, Galway / Ollscoil na hEireann,´ Gaillimh December 14, 2011 Abstract More and more (semi) structured information is becoming available on the Web in the form of documents embedding metadata (e.g., RDF, RDFa, Microformats and others). There are already hundreds of millions of such documents accessible and their number is growing rapidly. This calls for large scale systems providing effective means of searching and retrieving this semi-structured information with the ultimate goal of making it exploitable by humans and machines alike. This dissertation examines the shift from the traditional web doc- ument model to a web data object (entity) model and studies the challenges and issues faced in implementing a scalable and high per- formance system for searching semi-structured data objects on a large heterogeneous and decentralised infrastructure. Towards this goal, we define an entity retrieval model, develop novel methodologies for sup- porting this model, and design a web-scale retrieval system around this model. In particular, this dissertation focuses on the following four main aspects of the system: reasoning, ranking, indexing and querying. We introduce a distributed reasoning framework which is tolerant against low data quality. We present a link analysis approach for computing the popularity score of data objects among decentralised data sources. We propose an indexing methodology for semi-structured data which offers a good compromise between query expressiveness, query processing and index maintenance compared to other approaches.
    [Show full text]
  • Experiences with IDS and Honeypots
    Experiences with IDS and Honeypots Radoslav Bod´o,Michal Kostˇenec University of West Bohemia in Pilsen Laboratory for Computer Science email: fbodik,[email protected] March 26, 2012 1 Contents 1 Executive summary 4 2 Learning networking 5 2.1 Introduction . .5 2.2 Staying up-to-date . .5 2.3 Know your network . .5 2.4 Toolbox and skills . .5 3 IDS - a way to learn about attackers 6 3.1 Types of IDS . .6 3.2 Tested IDSs . .7 3.2.1 LaBrea . .7 3.2.2 Nepenthes . .8 3.2.3 Dionaea . .9 3.2.4 NetflowSearch . 10 3.2.5 Sshcrack . 11 3.2.6 Kipo . 11 3.2.7 Hihat . 12 3.2.8 Hihat: Tomcat and JBoss . 14 3.2.9 Apache RFI . 14 3.2.10 Other tested IDS . 17 3.2.11 Snort . 17 4 IDS for fun and profit 20 4.1 The Fun . 20 4.1.1 Backbone . 21 4.1.2 Dedicated VLAN and access port orchestration . 21 4.2 Mysphere2 and NetSpy . 22 4.3 The Profit . 24 5 Lessons learned 24 6 Conclusion 24 A Description of Published Data 27 B Examples and screenshots 29 B.1 labrea report.pl . 29 B.2 Web Interface to LaBrea Data . 30 B.3 nepe report2.pl . 30 B.4 Web Interface to Nepenthes Data . 32 B.5 apache rfi report.pl . 32 B.6 dbacl Bayes Classifier Categories . 34 B.7 DNS sinkhole . 35 B.8 WCCP testbed . 35 B.9 Mysphere2: User feedback example screenshots . 36 C Glosary 37 2 List of Figures 1 Aspects of IDS .
    [Show full text]
  • Networks.Pdf
    25 Computer Networks 25.1 Introduction::::::::::::::::::::::::::::::::::::::::::::::::: 763 Benefits of Visualizing Computer Networks 25.2 The Very Basics of Computer Networking :::::::::::::: 764 A Network Model • Interconnection Technologies • Routing and Routing Protocols • The Internet Structure • The User's Point of View 25.3 A Taxonomy of Visualization Methods and Tools ::::: 766 Visualized Data • Graph Drawing Conventions and Methodologies • Visualization Tools 25.4 Data Sources :::::::::::::::::::::::::::::::::::::::::::::::: 775 25.5 Visualization of the Internet :::::::::::::::::::::::::::::: 779 Giuseppe Di Battista 25.6 Visualization of an Internet Service Provider Network 785 Roma Tre University 25.7 Visualization of Local Networks:::::::::::::::::::::::::: 789 25.8 Visualization of Basic Internet Services and Specific Massimo Rimondini Network Contexts :::::::::::::::::::::::::::::::::::::::::: 792 Roma Tre University References :::::::::::::::::::::::::::::::::::::::::::::::::::::::::: 795 25.1 Introduction Communication systems are nowadays fundamental to support various applications, and this is especially true for computer networks as their utmost expression. Some examples include information interchange for critical operations, such as bank transfers or military data, as well as commonly used services such as the web, email, or streaming of multimedia contents. It is therefore essential to be able to ensure an uninterrupted and efficient operation of a computer network. However, the task of maintaining a computer network
    [Show full text]