Nick Feamster Research Interest: Networked Systems Arriving January 2006 Likely teaching CS 7260 in Spring 2005 Here off-and-on until then. Email works.

Slides:



Advertisements
Similar presentations
Presented by Nikita Shah 5th IT ( )
Advertisements

© 2007 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice Application Security and Testing.
Enterprise Network Troubleshooting Nick Feamster Georgia Tech (joint with Russ Clark, Yiyi Huang, Anukool Lakhina, Manas Khadilkar, Aditi Thanekar)
The World Wide Web and the Internet MIS XLM.B Jack G. Zheng May 13 th 2008.
Improving Internet Availability. Some Problems Misconfiguration Miscoordination Efficiency –Market efficiency –Efficiency of end-to-end paths Scalability.
Enterprise Network Troubleshooting Nick Feamster Georgia Tech (joint with Russ Clark, Yiyi Huang, Anukool Lakhina, Manas Khadilkar, Aditi Thanekar)
1 Diagnosing Network Disruptions with Network-wide Analysis Yiyi Huang, Nick Feamster, Anukool Lakhina*, Jim Xu College of Computing, Georgia Tech * Guavus,
Resonance: Dynamic Access Control in Enterprise Networks Ankur Nayak, Alex Reimers, Nick Feamster, Russ Clark School of Computer Science Georgia Institute.
Grand Challenges in Networking Nick Feamster CS 7001.
Data Mining Challenges for Network Management Nick Feamster, Georgia Tech Dave Andersen, CMU (joint with Jay Lepreau and Emulab)
Diagnosing Network Disruptions with Network-wide Analysis Yiyi Huang, Nick Feamster, Anukool Lakhina, Jim Xu College of Computing, Georgia Tech Boston.
Networking Research Nick Feamster CS Nick Feamster Ph.D. from MIT, Post-doc at Princeton this fall Arriving January 2006 –Here off-and-on until.
Improving Internet Availability with Path Splicing Nick Feamster Georgia Tech Joint work with Murtaza Motiwala and Santosh Vempala.
Data-Plane Accountability with In-Band Path Diagnosis Murtaza Motiwala, Nick Feamster Georgia Tech Andy Bavier Princeton University.
Research Summary Nick Feamster. The Big Picture Improving Internet availability by making networks easier to operate Three approaches –From the ground.
Internet Availability Nick Feamster Georgia Tech.
Accountable Internet Protocol David Andersen (CMU) Hari Balakrishnan (MIT) Nick Feamster (Georgia Tech) Scott Shenker (Berkeley)
Course Overview and Introduction CS 3251: Computer Networking I Nick Feamster Spring 2013.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations Teaching CS 7260 in Spring 2007 CS 7001 Mini-projects: –
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Cabo: Concurrent Architectures are Better than One Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton.
Nick Feamster Research: Network security and operations –Helping network operators run the network better –Helping users help themselves Lab meetings:
Network Operations Nick Feamster
Network Troubleshooting: rcc and Beyond Nick Feamster Georgia Tech (joint with Russ Clark, Yiyi Huang, Anukool Lakhina)
Network Security Highlights Nick Feamster Georgia Tech.
Network Operations Nick Feamster
Characterizing Home User Performance in Access Networks Srikanth Sundaresan (Ph.D. student) Nick Feamster (Assistant Professor) School of Computer Science.
Network Operations Research Nick Feamster
Path Splicing with Network Slicing Nick Feamster Murtaza Motiwala Santosh Vempala.
Theory Lunch. 2 Problem Areas Network Virtualization for Experimentation and Architecture –Embedding problems –Economics problems (markets, etc.) Network.
MINT: A Market for Internet Transit Nick Feamster Georgia Tech Joint work with Vytautas Valancius, Ramesh Johari, Vijay Vazirani.
Cabo: Concurrent Architectures are Better than One Nick Feamster, Georgia Tech Lixin Gao, UMass Amherst Jennifer Rexford, Princeton.
Network Security Highlights Nick Feamster Georgia Tech.
(Distributed) Denial of Service Nick Feamster CS 4251 Spring 2008.
Rocket Software, Inc. Confidential James Storey General Manager, OSS Unit Rocket Software APNOMS 2003: Managing Pervasive Computing and Ubiquitous Communications.
© 2005 Georgia Tech Warehouse Operations: Performance Assessment and Benchmarking.
Thomas Myrup Kristensen EU Internet Policy Director Microsoft Corporation
“The Internet in South East Asia” Sam Paltridge, OECD Organized by the International Telecommunication Union (ITU), hosted by the Post and Telegraph.
By Gavin & Saeed. Live broadcast on TV (BBC, CNN, E!, etc…) Official website ( Blogs Social networks (Facebook,
Introduction to TCP/IP, the Internet, IP Addressing, and Domain Name.
FACEBOOK- The world’s leading social networking site.
Management: Fault Detection and Troubleshooting Nick Feamster CS 7260 February 5, 2007.
Milena Mihail Theory Applications driving technology :  Th e Internet Phenomenon : - New Computational Paradigm  Biology, Genomics Theory is/has historically.
The Case for Drill-Ready Cloud Computing Vision Paper Tanakorn Leesatapornwongsa and Haryadi S. Gunawi 1.
ELOC Bank Table Top Exercise Executive Leadership of Cybersecurity Austin, TX December 3,
Cryptography: Keeping Your Information Safe. Information Assurance/Information Systems –What do we do? Keep information Safe Keep computers Safe –What.
By: Bryan Carey Randy Cook Richard Jost TOR: ANONYMOUS BROWSING.
Presented by C.SARITHA ( 07R91A0568) INTRUSION DETECTION SYSYTEM.
How the Internet Works Jon Crowcroft,
Bullet-Proofing Your Wireless Router By Steve Janss.
Presented by INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used?
Nick Feamster Interdomain Routing Correctness and Stability.
1 October 20-24, 2014 Georgian Technical University PhD Zaza Tsiramua Head of computer network management center of GTU South-Caucasus Grid.
1 Crashing the Net Steven M. Bellovin AT&T Labs Research
CPT 123 [299] Internet Skills Overview of the Internet Session One Class Notes DMWilliamson 1998.
-Tyler. Social/Ethical Concern Security -Sony’s Playstation Network (PSN) hacked in April Hacker gained access to personal information -May have.
Review 2 Chapters 7, 8, 9. 2  Define a network and its purpose.  Explain how communications technologies are used in our every day lives.  Understand.
The Internet The internet is simply a worldwide computer network that uses standardised communication protocols to transmit and exchange data.
Towards an Internet that “Never Fails” Hari Balakrishnan MIT Joint work with Nick Feamster, Scott Shenker, Mythili Vutukuru.
Reinventing Digital Identity Design Goals Product Overview Technology & Cryptography Overview Question & Answer.
INTRUSION DETECTION SYSYTEM. CONTENT Basically this presentation contains, What is TripWire? How does TripWire work? Where is TripWire used? Tripwire.
1 Executive Leadership of Cybersecurity Austin, TX December 3, 2014 ELOC Bank Table Top Exercise.
Bringing External Connectivity and Experimenters to GENI Nick Feamster Georgia Tech.
Matt Jennings.  What is DDoS?  Recent DDoS attacks  History of DDoS  Prevention Techniques.
Lecture 18 Page 1 CS 236 Online Prolog to Lecture 18 CS 236 On-Line MS Program Networks and Systems Security Peter Reiher.
Internet Strucure Internet structure: network of networks Question: given millions of access ISPs, how to connect them together? access.
COS 561: Advanced Computer Networks
Presentation transcript:

Nick Feamster Research Interest: Networked Systems Arriving January 2006 Likely teaching CS 7260 in Spring 2005 Here off-and-on until then. works well. CS 7001 Mini-projects posted: –

Internet Routing Large-scale: Thousands of autonomous networks Self-interest: Independent economic and performance objectives Comcast Abilene AT&T Level3 Georgia Tech The Internet

Problems Network Security –How to guarantee where traffic will or wont go? –How to counter Web censorship and surveillance? –What techniques are spammers using? Network Reliability and Troubleshooting –How can operators tell when theyve made mistakes? –How to protect the network from others? Connectivity at the network edge

Today: Reactive Operation Problems cause downtime Problems often not immediately apparent What happens if I tweak this policy…? ConfigureObserve Wait for Next Problem Desired Effect? Revert No Yes

Catastrophic Configuration Faults …a glitch at a small ISP… triggered a major outage in Internet access across the country. The problem started when MAI Network Services...passed bad router information from one of its customers onto Sprint. -- news.com, April 25, 1997 Microsoft's websites were offline for up to 23 hours...because of a [router] misconfiguration…it took nearly a day to determine what was wrong and undo the changes. -- wired.com, January 25, 2001 WorldCom Inc…suffered a widespread outage on its Internet backbone that affected roughly 20 percent of its U.S. customer base. The network problems…affected millions of computer users worldwide. A spokeswoman attributed the outage to "a route table issue." -- cnn.com, October 3, 2002 "A number of Covad customers went out from 5pm today due to, supposedly, a DDOS (distributed denial of service attack) on a key Level3 data center, which later was described as a route leak (misconfiguration). -- dslreports.com, February 23, 2004

Drive-By ISP More coverage: - Buy service - Charge passersby Challenges: - Privacy - Accounting How to get credit for opening my access point while preserving the privacy of those who use it?