KYUNG HWA KIM HENNING SCHULZRINNE Internet Real-Time Lab Columbia University June 2011 Distributed Network Fault Diagnosis System DYSWIS (Do You See What.

Slides:



Advertisements
Similar presentations
NetServ Dynamic in-network service deployment Henning Schulzrinne (Columbia University) Srinivasan Seetharaman (Georgia Tech) Volker Hilt (Bell Labs)
Advertisements

Performance Testing - Kanwalpreet Singh.
Cs/ee 143 Communication Networks Chapter 6 Internetworking Text: Walrand & Parekh, 2010 Steven Low CMS, EE, Caltech.
P2P Distributed Fault Diagnosis for SIP Services Henning Schulzrinne, Kyung-Hwa Kim Dept. of Computer Science, Columbia University, New York, NY Kai Miao.
11 TROUBLESHOOTING Chapter 12. Chapter 12: TROUBLESHOOTING2 OVERVIEW  Determine whether a network communications problem is related to TCP/IP.  Understand.
CSCI 530 Lab Firewalls. Overview Firewalls Capabilities Limitations What are we limiting with a firewall? General Network Security Strategies Packet Filtering.
Module 5: Configuring Access for Remote Clients and Networks.
Extensible Networking Platform IWAN 2005 Extensible Network Configuration and Communication Framework Todd Sproull and John Lockwood
MCDST : Supporting Users and Troubleshooting a Microsoft Windows XP Operating System Chapter 13: Troubleshoot TCP/IP.
OSGi: Open Services Gateway Initiative Richard Chapman 5 Sept
Security Awareness: Applying Practical Security in Your World
Lesson 11-Virtual Private Networks. Overview Define Virtual Private Networks (VPNs). Deploy User VPNs. Deploy Site VPNs. Understand standard VPN techniques.
OCT1 Principles From Chapter One of “Distributed Systems Concepts and Design”
Kyung Hwa Kim Henning Schulzrinne Internet Real-Time Lab Columbia University October 2011 Distributed Network.
Managing Agent Platforms with the Simple Network Management Protocol Brian Remick Thesis Defense June 26, 2015.
Internet Real Time Laboratory Department of Computer Science Columbia University.
Lesson 14 – DESIGNING A NETWORK. Assessing Network needs Meeting Network needs OVERVIEW.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Lesson 1: Configuring Network Load Balancing
Internet Real Time (IRT) Lab at Columbia University Professor: Henning Schulzrinne Columbia University Presenter: Suman Srinivasan, PhD student
MCTS Guide to Microsoft Windows Server 2008 Network Infrastructure Configuration Chapter 11 Managing and Monitoring a Windows Server 2008 Network.
A Survey on Interfaces to Network Security
11 SYSTEMS ADMINISTRATION AND TERMINAL SERVICES Chapter 12.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
IT 210 The Internet & World Wide Web introduction.
Packet Filtering. 2 Objectives Describe packets and packet filtering Explain the approaches to packet filtering Recommend specific filtering rules.
Computer Security: Principles and Practice First Edition by William Stallings and Lawrie Brown Lecture slides by Lawrie Brown Chapter 8 – Denial of Service.
User-Perceived Performance Measurement on the Internet Bill Tice Thomas Hildebrandt CS 6255 November 6, 2003.
1 Automated Fault diagnosis in VoIP 31st March,2006 Vishal Kumar Singh and Henning Schulzrinne.
Using Windows Firewall and Windows Defender
Introduction to the Atlas Platform Mobile & Pervasive Computing Laboratory Department of Computer and Information Sciences and Engineering University of.
Chapter 6: Packet Filtering
By : Himanshu Mishra Nimish Agarwal CPSC 624.  A system designed to prevent unauthorized access to or from a private network.  It must have at least.
GrIDS -- A Graph Based Intrusion Detection System For Large Networks Paper by S. Staniford-Chen et. al.
M i SMob i S Mob i Store - Mobile i nternet File Storage Platform Chetna Kaur.
Honeypot and Intrusion Detection System
Sungkyunkwan University (SKKU) Security Lab. A Framework for Security Services based on Software-Defined Networking Jaehoon (Paul) Jeong 1, Jihyeok Seo.
Module 10: Monitoring ISA Server Overview Monitoring Overview Configuring Alerts Configuring Session Monitoring Configuring Logging Configuring.
Module 4: Configuring ISA Server as a Firewall. Overview Using ISA Server as a Firewall Examining Perimeter Networks and Templates Configuring System.
Module 11: Remote Access Fundamentals
KuVS Fachgespräch NetServ: Deploying Customized Network Services on Demand Henning Schulzrinne, Jae Woo Lee & Suman Srinivasan Columbia University Joint.
P2P Distributed Fault Diagnosis for SIP Services Henning Schulzrinne, Kyung-Hwa Kim Dept. of Computer Science, Columbia University, New York, NY Kai Miao.
Packet Filtering Chapter 4. Learning Objectives Understand packets and packet filtering Understand approaches to packet filtering Set specific filtering.
Module 11: Implementing ISA Server 2004 Enterprise Edition.
Open Service Gateway Initiative (OSGi) Reporter : 林學灝 侯承育 1.
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
CE Operating Systems Lecture 3 Overview of OS functions and structure.
Network Security Chapter 11 powered by DJ 1. Chapter Objectives  Describe today's increasing network security threats and explain the need to implement.
Module 7: Advanced Application and Web Filtering.
Lesson 11: Configuring and Maintaining Network Security
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
Security fundamentals Topic 10 Securing the network perimeter.
Module 12: Responding to Security Incidents. Overview Introduction to Auditing and Incident Response Designing an Audit Policy Designing an Incident Response.
Module 10: Windows Firewall and Caching Fundamentals.
Background Real-time environmental monitoring is a field garnering an ever-increasing amount of attention. The ability for sensors to make and publish.
Protocol Requirements draft-bryan-p2psip-requirements-00.txt D. Bryan/SIPeerior-editor S. Baset/Columbia University M. Matuszewski/Nokia H. Sinnreich/Adobe.
Firewalls. Intro to Firewalls Basically a firewall is a barrier to keep destructive forces away from your computer network.
Linux Operations and Administration
Operated by Los Alamos National Security, LLC for NNSA U N C L A S S I F I E D Slide 1 Managing Network Threat Information  Giri Raichur, Network Services.
KYUNG-HWA KIM HENNING SCHULZRINNE 12/09/2008 INTERNET REAL-TIME LAB, COLUMBIA UNIVERSITY DYSWIS.
Alex Chee Daniel LaBare Mike Oster John Spann Bryan Unbangluang Collaborative Document Sharing In Conjunction With.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
Open source IP Address Management Software Review
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Securing the Network Perimeter with ISA 2004
Chapter 3: Windows7 Part 4.
Distributed Systems Bina Ramamurthy 4/22/2019 B.Ramamurthy.
Computer Networks Protocols
Presentation transcript:

KYUNG HWA KIM HENNING SCHULZRINNE Internet Real-Time Lab Columbia University June 2011 Distributed Network Fault Diagnosis System DYSWIS (Do You See What I See)

Motivation Today’s Internet  Wide variety of networks  Almost every application relies on Internet connectivity  Applications rely on the proper functioning of many parties Professional assistance is either unavailable or expensive  Users have no good way to know whom to call or what to try when things go wrong. Too many possible causes  Fault Symptom: Web access is slow  Possible causes: high packet loss, an overloaded residential Internet connection, IPv6-to-IPv4 failover, wide- area network problems, a misconguration in the NAT box, or a remote server problem. Existing approaches  Centralized system: difficult to know exact situation of end-users  End-user software: difficult to know what happens in network core system  We develop “End-user based Collaborative system”  Why collaboration?  To collect diverse information from different parts of the networks and infer the cause of failure.

DYSWIS Design Overview What is DYSWIS?  Distributed network fault detection and diagnosis framework  End-to-End  Collaboration of end-users  Crowdsourcing of diagnosis strategy  Which faults do we detect?  Faults on personal computing machines of end users  How to detect a fault?  Monitor and analyze network raw data  Declare a fault when suspicious behavior is detected  How to diagnose the fault?  Dynamic diagnosis Self probing Remote probing  Static diagnosis Distributed knowledge database

DYSWIS Design Overview  A Complete Framework  End-to-End  Collaboration  Crowdsourcing

Fault Detection GET RESP GET countGet++; Timeout Close Session Close Session Create Session Create Session RESP ==200 && countGet == countGet = 0; GET countGet = 1; RESP == 200 && countGet > countGet --; Fault GET countGet = 1; RESP RESP != Create fault Timeout Fault Timeout Fault Timeout Create fault Sample FSM – HTTP Session Packet flow data  Session-based  Collect flow of transaction

Searching Collaborative Nodes Local Node  A node currently diagnosing the faults Sister Node  A node sharing the same NAT device with the local node. Near Node  A node within the same subnet as the local node Far Node  A node located in any other subnets.

Searching Nodes Leveraging Key-Value system of DHT  Key  Network type (e.g. public, NAT)  Location (subnet information)  Value  IP address and port number of the collaborating node

Network connectivity? Can local nodes Connect to the Destination port? Can local nodes Connect to the Destination port? Connectivity Problem No Yes Can far nodes Connect to the Destination port? Can far nodes Connect to the Destination port? Server Problem Subnet Problem Yes No Go to another flow Yes Diagnosis Rule (Decision Tree)

Diagnosis Rule Using pre-defined ‘rules’ to invoke appropriate probing  Separate the policy from the mechanism  Create and modify diagnosis rules without re-compiling

Probing Active probing  The pre-obtained knowledge can be stale  Once probing is requested, the collaborative peers probe the faults dynamically in real time Probing request via XML-RPC

Crowdsourcing of diagnosis strategies Add new functionality  Creating probing modules  Open API  Any software developer can build and distribute a new module that handles new protocol or application  Need compile Modify or add diagnosis policy  Creating & Modifying Rules  Open Rules  Any user, developer, system administrators can build new customized rules for to diagnose new faults  No compile needed

Crowdsourcing Process 1. Investigate the fault scenario 2. Select probing modules 3. Create a decision tree 4. Write a diagnosis rule 5. Deploy and update

Use Cases Port Blocking

Flow Chart of Port Blocking Diagnosis  #1. Is the outbound port blocked?  #2. Is a local firewall running?  #3. Does the target sever block the local node?  #4. Other problems?

Use Cases DNS failure

DNS Failure  Diagnosis and Analysis

One-way RTP Diagnosis

Implementation (Modules) Java-based framework Libraries: Jess, AzDHT, Jpcap, etc.

Implementation (Flow)

Modularity OSGi technology Dynamic module system for Java  Modules loaded and unloaded at runtime  Bundle: self-contained JAR file with specific structure  Open-source implementations: Apache Felix, Eclipse Equinox Security and accounting  Security built on Java 2 Security model  Permission-based access control  No fine-grained control or accounting for CPU, storage, bandwidth  Can load native code with appropriate permission  Strict separation of bundles  Classpath set up by Bundle class loader  Inter-bundle communication only through published interfaces NetServ, [IRT Talk 2009], Jae Woo Lee

Web ServerEnd User OSGi technology OSGi Felix launcher Probing bundle Probing bundle Probing bundle Probing bundle Probing bundle Probing bundle DYSWIS main bundle DYSWIS Bundle Repository DYSWIS Bundle Repository DYSWIS Update bundle Polling

Screenshots

Issues Main Issues  Overhead of capturing packets  Inconvenient manual development process  How to evaluate?  Security and Privacy Next steps  DYSWIS with smartphone  Diagnose the Internet problems using mobile network  Secure DYSWIS  DYSWIS on Cloud Computing

Summary DYSWIS  Distributed network fault detection and diagnosis system  End-to-End  Automatic fault detection and diagnosis  User-friendly interface Collecting scenarios  Raw data, Survey, Flow data Implementation Design Factors  Modularity: OSGi technology  Separation: Rule technology  Extensibility: Open API and Rules Next strategies  Apply to various network fault situations  Cloud computing  Smartphone  Worm, virus, attack  Wireless