Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis.

Slides:



Advertisements
Similar presentations
Detecting Spam Zombies by Monitoring Outgoing Messages Zhenhai Duan Department of Computer Science Florida State University.
Advertisements

Computer Science Dr. Peng NingCSC 774 Adv. Net. Security1 CSC 774 Advanced Network Security Topic 7.3 Secure and Resilient Location Discovery in Wireless.
A Fast and Compact Method for Unveiling Significant Patterns in High-Speed Networks Tian Bu 1, Jin Cao 1, Aiyou Chen 1, Patrick P. C. Lee 2 Bell Labs,
Efficient Constraint Monitoring Using Adaptive Thresholds Srinivas Kashyap, IBM T. J. Watson Research Center Jeyashankar Ramamirtham, Netcore Solutions.
1 Chapter 7 Intrusion Detection. 2 Objectives In this chapter, you will: Understand intrusion detection benefits and problems Learn about network intrusion.
Fault-Tolerant Target Detection in Sensor Networks Min Ding +, Dechang Chen *, Andrew Thaeler +, and Xiuzhen Cheng + + Department of Computer Science,
1 Communication-Efficient Online Detection of Network-Wide Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan*
SIA: Secure Information Aggregation in Sensor Networks Bartosz Przydatek, Dawn Song, Adrian Perrig Carnegie Mellon University Carl Hartung CSCI 7143: Secure.
Business Continuity and DR, A Practical Implementation Mich Talebzadeh, Consultant, Deutsche Bank
Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei.
Intel Research Sketching Streams through the Net: Distributed Approximate Query Tracking (Joint work with Graham Cormode, Bell Labs) Minos Garofalakis.
CS514: Intermediate Course in Operating Systems Professor Ken Birman Vivek Vishnumurthy: TA.
1 In-Network PCA and Anomaly Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis § Michael Jordan* Anthony Joseph* Nina Taft § *UC Berkeley § Intel.
Murat Demirbas Youngwhan Song University at Buffalo, SUNY
Systems of Distributed Systems Module 2 -Distributed algorithms Teaching unit 3 – Advanced algorithms Ernesto Damiani University of Bozen Lesson 6 – Two.
1 A New Paradigm For Distributed Monitoring Ling Huang, Minos Garofalakis, Nina Taft and Anthony Joseph {minos.garofalakis,
Causality Interface  Declares the dependency that output events have on input events.  D is an ordered set associated with the min ( ) and plus ( ) operators.
Communication-Efficient Distributed Monitoring of Thresholded Counts Ram Keralapura, UC-Davis Graham Cormode, Bell Labs Jai Ramamirtham, Bell Labs.
Computer Science Lecture 11, page 1 CS677: Distributed OS Last Class: Clock Synchronization Logical clocks Vector clocks Global state.
Shivkumar KalyanaramanRensselaer Q1-1 ECSE-6600: Internet Protocols Quiz 1 Time: 60 min (strictly enforced) Points: 50 YOUR NAME: Be brief, but DO NOT.
Multi-Scale Analysis for Network Traffic Prediction and Anomaly Detection Ling Huang Joint work with Anthony Joseph and Nina Taft January, 2005.
1 Toward Sophisticated Detection With Distributed Triggers Ling Huang* Minos Garofalakis § Joe Hellerstein* Anthony Joseph* Nina Taft § *UC Berkeley §
Probabilistic Data Aggregation Ling Huang, Ben Zhao, Anthony Joseph Sahara Retreat January, 2004.
Lesson 13-Intrusion Detection. Overview Define the types of Intrusion Detection Systems (IDS). Set up an IDS. Manage an IDS. Understand intrusion prevention.
1 TVA: A DoS-limiting Network Architecture Xiaowei Yang (UC Irvine) David Wetherall (Univ. of Washington) Thomas Anderson (Univ. of Washington)
UNCLASSIFIED Secure Indirect Routing and An Autonomous Enterprise Intrusion Defense System Applied to Mobile ad hoc Networks J. Leland Langston, Raytheon.
Tracking Moving Objects in Anonymized Trajectories Nikolay Vyahhi 1, Spiridon Bakiras 2, Panos Kalnis 3, and Gabriel Ghinita 3 1 St. Petersburg State University.
A Routing Control Platform for Managing IP Networks Jennifer Rexford Princeton University
Department of Electronic Engineering City University of Hong Kong EE3900 Computer Networks Transport Protocols Slide 1 Transport Protocols.
Collaborating Against Common Enemies Sachin Katti Balachander Krishnamurthy and Dina Katabi AT&T Labs-Research & MIT CSAIL.
Lesson 1: Configuring Network Load Balancing
1 D-Trigger: A General Framework for Efficient Online Detection Ling Huang University of California, Berkeley.
TCP: Software for Reliable Communication. Spring 2002Computer Networks Applications Internet: a Collection of Disparate Networks Different goals: Speed,
1 Fault Tolerance in Collaborative Sensor Networks for Target Detection IEEE TRANSACTIONS ON COMPUTERS, VOL. 53, NO. 3, MARCH 2004.
New Challenges in Cloud Datacenter Monitoring and Management
Sensor Coordination using Role- based Programming Steven Cheung NSF NeTS NOSS Informational Meeting October 18, 2005.
MITACS-PINTS Prediction In Interacting Systems Project Leader : Michael Kouriztin.
COEN 252 Computer Forensics
PIC: Practical Internet Coordinates for Distance Estimation Manuel Costa joint work with Miguel Castro, Ant Rowstron, Peter Key Microsoft Research Cambridge.
Michael Ernst, page 1 Collaborative Learning for Security and Repair in Application Communities Performers: MIT and Determina Michael Ernst MIT Computer.
1 Impact of IT Monoculture on Behavioral End Host Intrusion Detection Dhiman Barman, UC Riverside/Juniper Jaideep Chandrashekar, Intel Research Nina Taft,
Computer Science Lecture 10, page 1 CS677: Distributed OS Last Class: Naming Name distribution: use hierarchies DNS X.500 and LDAP.
Intel Research Sketching Streams through the Net: Distributed Approximate Query Tracking Graham Cormode Bell Laboratories Minos Garofalakis.
Modeling the Pairwise Key Predistribution Scheme in the Presence of Unreliable Links.
Mapping Internet Sensors with Probe Response Attacks Authors: John Bethencourt, Jason Franklin, Mary Vernon Published At: Usenix Security Symposium, 2005.
1 LD-Sketch: A Distributed Sketching Design for Accurate and Scalable Anomaly Detection in Network Data Streams Qun Huang and Patrick P. C. Lee The Chinese.
Communication Paradigm for Sensor Networks Sensor Networks Sensor Networks Directed Diffusion Directed Diffusion SPIN SPIN Ishan Banerjee
1 Distributed Detection of Network-Wide Traffic Anomalies Ling Huang* XuanLong Nguyen* Minos Garofalakis § Joe Hellerstein* Michael Jordan* Anthony Joseph*
Minimizing Energy Consumption in Sensor Networks Using a Wakeup Radio Matthew J. Miller and Nitin H. Vaidya IEEE WCNC March 25, 2004.
A new Ad Hoc Positioning System 컴퓨터 공학과 오영준.
1 Distributed Databases BUAD/American University Distributed Databases.
Networks and Distributed Systems Mark Stanovich Operating Systems COP 4610.
1 D-Trigger: A General Framework for Efficient Online Detection Ling Huang* XuanLong Nguyen* Minos Garofalakis ◊ Joe Hellerstein* Michael Jordan* Anthony.
Network Computing Laboratory 1 Vivaldi: A Decentralized Network Coordinate System Authors: Frank Dabek, Russ Cox, Frans Kaashoek, Robert Morris MIT Published.
Jennifer Rexford Fall 2014 (TTh 3:00-4:20 in CS 105) COS 561: Advanced Computer Networks TCP.
The Problem of Location Determination and Tracking in Networked Systems Weikuan Yu, Hui Cao, and Vineet Mittal The Ohio State University.
DISTIN: Distributed Inference and Optimization in WSNs A Message-Passing Perspective SCOM Team
Intel and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. *Other.
Networks and Distributed Systems Sarah Diesburg Operating Systems COP 4610.
Presented By: Mohammed Al-Mehdhar Presentation Outline Introduction Approaches Implementation Evaluation Conclusion Q & A.
Role Of Network IDS in Network Perimeter Defense.
A Protocol for Tracking Mobile Targets using Sensor Networks H. Yang and B. Sikdar Department of Electrical, Computer and Systems Engineering Rensselaer.
Dynamic Load Balancing Tree and Structured Computations.
Continuous Monitoring of Distributed Data Streams over a Time-based Sliding Window MADALGO – Center for Massive Data Algorithmics, a Center of the Danish.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
TBAS: Enhancing Wi-Fi Authentication by Actively Eliciting Channel State Information Muye Liu, Avishek Mukherjee, Zhenghao Zhang, and Xiuwen Liu Florida.
SketchVisor: Robust Network Measurement for Software Packet Processing
In the name of God.
Northwestern Lab for Internet and Security Technology (LIST) Yan Chen Department of Computer Science Northwestern University.
Mapping Internet Sensors With Probe Response Attacks
Presentation transcript:

Cumulative Violation For any window size  t  Communication-Efficient Tracking for Distributed Cumulative Triggers Ling Huang* Minos Garofalakis § Anthony Joseph* Nina Taft § *UC Berkeley § Intel Research Large Scale Distributed Monitoring Platform Purpose: Enhance distributed monitoring platforms with a distributed triggering capability. A set of distributed monitors Each produces ongoing time series signals Sends filtered signal to coordinator A coordinator Is aggregation, detection and coordination center Fires trigger if subset of nodes violates a threshold constraint Tell monitors what level of accuracy is needed in their reporting Examples Distributed monitors are IDS systems and coordinator is global log repository sitting inside security operations center in enterprise network. For enterprise and ISP IT teams: monitors on each link and coordinator pulls data into network operations center to monitor for hot spots, failures, attacks, and check when upgrades needed. We focus on sums of incoming time series: fire a trigger when the sum of monitored variable, across multiple machines, is too high. E.g., number of TCP connections, number of DNS transactions, traffic volume per port 80, etc. Problem Statement User Inputs: Constraint violation threshold: C Tolerable false alarm rate:  Tolerable missed detection rate:  Tolerable error zone around constraint:  Accrue penalty as bypass constraint C Let V(t,  ) be size of penalty, at time t, over past window  GOAL: fire trigger whenever penalty exceeds error tolerance, with required accuracy level AND with minimum communication overhead (monitor updates) Cumulative Triggers The  used is this corresponds to the beginning of most recent “busy” period Distributed Trigger Tracking Framework Reducing Communication Overhead Solution Approach Evaluation and Results How to lower communication overhead but still fire trigger accurately? Filter monitored signal, don’t update unless significant change occurred Key idea: when far away from trigger threshold, monitors can afford to be less accurate. Coordinator informs them when they can do this, and by how much. To lower communications costs, monitors should send as few signal updates as possible There is a discrepancy between the coordinator’s view of the global state and the actual global state. With fewer updates, the discrepancy increases. Need to manage the tradeoff: coordinator view needs to be accurate enough to as to fire the trigger with prescribed accuracy level while simultaneously keeping the communications overhead as low as possible Challenge Use queues at local monitors. Only send update when queue is full. Use queue at coordinator. Fire trigger when queue overflows. Problem: Size all the queues correctly so that triggers fire with desired accuracy level. Analytical solution: using M/M/1 and M/D/1 queue models, can solve explicitly for queue sizes. Adaptivity: Coordinator computes excess slack and distributes it to monitors adaptively, to resize their local queues. Less than 10% of original signal sent. A > 90% reduction in overhead! Can operate well when requirements on false alarms and missed detections are low. constraint threshold error tolerance false alarm rate missed detection rate user inputs original monitored time series filtered time series filtering parameters Deployed 200 SNORT sensors on Planetlab nodes. Evaluation carried out for following time series: “number of active TCP connections”