Dividing the Pizza An Advanced Traffic Billing System An Advanced Traffic Billing System Christopher Lawrence Burke The University of Queensland.

Slides:



Advertisements
Similar presentations
THE FLEET MANAGER THAT NEVER SLEEPS. Vehicle Monitoring – The Reports.
Advertisements

© 2008 Cisco Systems, Inc. All rights reserved.Cisco ConfidentialPresentation_ID 1 Chapter 8: Monitoring the Network Connecting Networks.
CMPE 150- Introduction to Computer Networks 1 CMPE 150 Fall 2005 Lecture 25 Introduction to Computer Networks.
Detectability of Traffic Anomalies in Two Adjacent Networks Augustin Soule, Haakon Ringberg, Fernando Silveira, Jennifer Rexford, Christophe Diot.
BotMiner Guofei Gu, Roberto Perdisci, Junjie Zhang, and Wenke Lee College of Computing, Georgia Institute of Technology.
TCP/IP Protocol Suite 1 Chapter 5 Objectives Upon completion you will be able to: IP Addresses: Classless Addressing Understand the concept of classless.
Networking Theory (part 2). Internet Architecture The Internet is a worldwide collection of smaller networks that share a common suite of communication.
Network Architectures Week 3 Part 2. Comparing The Internet & OSI.
ANOMALY DETECTION AND CHARACTERIZATION: LEARNING AND EXPERIANCE YAN CHEN – MATT MODAFF – AARON BEACH.
Introduction. 2 What Is SmartFlow? SmartFlow is the first application to test QoS and analyze the performance and behavior of the new breed of policy-based.
A Signal Analysis of Network Traffic Anomalies Paul Barford, Jeffrey Kline, David Plonka, and Amos Ron.
Passive traffic measurement Capturing actual Internet packets in order to measure: –Packet sizes –Traffic volumes –Application utilisation –Resource utilisation.
Monitoring System Monitors Basics Monitor Types Alarms Actions RRD Charts Reports.
Check Disk. Disk Defragmenter Using Disk Defragmenter Effectively Run Disk Defragmenter when the computer will receive the least usage. Educate users.
Introduction to the Secure SMTP Server service. Secure SMTP server is a secure, reliable SMTP mail relay server for your outgoing mail. Secure SMTP service.
Using Argus Audit Trails to Enhance IDS Analysis Jed Haile Nitro Data Systems
Network Management: Accounting and Performance Strategies - Graphically Rich Book Network Management: Accounting and Performance Strategies by Benoit Claise.
DEMONSTRATION FOR SIGMA DATA ACQUISITION MODULES Tempatron Ltd Data Measurements Division Darwin Close Reading RG2 0TB UK T : +44 (0) F :
PacNOG 6: Nadi, Fiji Dealing with DDoS Attacks Hervey Allen Network Startup Resource Center.
KaZaA: Behind the Scenes Shreeram Sahasrabudhe Lehigh University
Document Number ETH West Diamond Avenue - Third Floor, Gaithersburg, MD Phone: (301) Fax: (301)
Name Resolution Domain Name System.
NetfFow Overview SANOG 17 Colombo, Sri Lanka. Agenda Netflow –What it is and how it works –Uses and Applications Vendor Configurations/ Implementation.
Copyright © 2002 OSI Software, Inc. All rights reserved. PI-NetFlow and PacketCapture Eric Tam, OSIsoft.
Routing Information Protocol (RIP). Intra-and Interdomain Routing An internet is divided into autonomous systems. An autonomous system (AS) is a group.
INTERNET DATA FLOW Created by David Whitchurch for ISDS 4120 Louisiana State University.
1. There are different assistant software tools and methods that help in managing the network in different things such as: 1. Special management programs.
Session 2 Security Monitoring Identify Device Status Traffic Analysis Routing Protocol Status Configuration & Log Classification.
© 2008 Ocean Data Systems Ltd - Do not reproduce without permission - exakom.com creation Dream Report O CEAN D ATA S YSTEMS O CEAN D ATA S YSTEMS The.
Greg Van Dyne December 4, Agenda Introduction Technical Overview Protocols Demonstration Future Trends References.
Network Management Tool Amy Auburger. 2 Product Overview Made by Ipswitch Affordable alternative to expensive & complicated Network Management Systems.
Network Protocol Models and Architecture Networks and Protocols Prepared by: TGK First Prepared on: Last Modified on: Quality checked by: Copyright 2009.
IP Forwarding.
Intrusion Detection Prepared by: Mohammed Hussein Supervised by: Dr. Lo’ai Tawalbeh NYIT- winter 2007.
1 Firewalls G53ACC Chris Greenhalgh. 2 Contents l Attacks l Principles l Simple filters l Full firewall l Books: Comer ch
Network Security. 2 SECURITY REQUIREMENTS Privacy (Confidentiality) Data only be accessible by authorized parties Authenticity A host or service be able.
Addressing Issues David Conrad Internet Software Consortium.
Graphing and statistics with Cacti AfNOG 11, Kigali/Rwanda.
Wide-scale Botnet Detection and Characterization Anestis Karasaridis, Brian Rexroad, David Hoeflin In First Workshop on Hot Topics in Understanding Botnets,
© 2006 Cisco Systems, Inc. All rights reserved.1 Connection 7.0 Serviceability Reports Todd Blaisdell.
CINBAD CERN/HP ProCurve Joint Project on Networking 26 May 2009 Ryszard Erazm Jurga - CERN Milosz Marian Hulboj - CERN.
Charging for services over IP/ATM ACTS Project AC320 SUSIE Donal Morris Sherkin Technologies Ltd Tel:
Open-Eye Georgios Androulidakis National Technical University of Athens.
TCP/IP Protocol Suite 1 Chapter 10 Upon completion you will be able to: Internet Group Management Protocol Know the purpose of IGMP Know the types of IGMP.
1 Network Firewalls CSCI Web Security Spring 2003 Presented By Yasir Zahur.
Restricting Access in the network
Interpreting Network Traffic Flows Bill Jensen, Paul Nazario and Perry Brunelli.
ACCESS CONTROL LIST.
Bradley Cowie Supervised by Barry Irwin Security and Networks Research Group Department of Computer Science Rhodes University DATA CLASSIFICATION FOR CLASSIFIER.
1 12-Jan-16 OSI network layer CCNA Exploration Semester 1 Chapter 5.
1 Lecture 11 Routing in Virtual Circuit Networks Internet Addressing.
RIP Routing Protocol. 2 Routing Recall: There are two parts to routing IP packets: 1. How to pass a packet from an input interface to the output interface.
ITP 457 Network Security Networking Technologies III IP, Subnets & NAT.
“ is not to be used to pass on information or data. It should used only for company business!” – Memo from IBM Executive The Languages, Methods &
2009/6/221 BotMiner: Clustering Analysis of Network Traffic for Protocol- and Structure- Independent Botnet Detection Reporter : Fong-Ruei, Li Machine.
TCP/IP1 Address Resolution Protocol Internet uses IP address to recognize a computer. But IP address needs to be translated to physical address (NIC).
Run the on your PC to start the firmware configuration process Run IP Config Tool.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Access Control Lists Accessing the WAN – Chapter 5.
NetFlow Analyzer Best Practices, Tips, Tricks. Agenda Professional vs Enterprise Edition System Requirements Storage Settings Performance Tuning Configure.
4.3 Network Layer Logical Addressing
Solving Real-World Problems with Wireshark
Client-Server Model and Sockets
Routing Information Protocol (RIP)
Queuing Theory Queuing Theory.
Chapter 8: Monitoring the Network
Networking Theory (part 2)
Attendance Management software
Networking Theory (part 2)
Network programming Lecture 1 Prepared by: Dr. Osama Mokhtar.
Networking Theory (part 2)
Presentation transcript:

Dividing the Pizza An Advanced Traffic Billing System An Advanced Traffic Billing System Christopher Lawrence Burke The University of Queensland

Menu  Design  Inputs  Process  Outputs

Design - Overview A short analysis was done on the existing mechanisms for collecting traffic statistics and processing them into information used for billing. The existing system relied on several Excel spreadsheets, a lot of manual processing and produced results which were less than accurate. The following couple of slides show simplified versions of the existing and planned processes.

Design – The Process Customers and Peer Networkers Proxies Dialup Banks etc Providers (e.g. Optus) Technical Contacts (other ISPs, APNIC) Information Technology Services Data Collectors Standard Format Usage Data Raw Usage Data (various Formats) Traffic Billing Rates “Whois/DNS Data” Bills Specific Technical Data or Triggers Periodic Usage Data or Aggregates

Design – The System RAW DATA 15min Blocks Aggregate Processor Trigger Processor Aggregate Rules Trigger Rules Aggregate and Trigger Data Report Writer Networks Who Is Traffic Rates Bill Writer Customers Aggregates Triggers Bills

Inputs – Sources  Gateway Routers  HTTP Proxy Logs  Dial-in Quota Logs  Mirror Logs  Any chargeable traffic sink or source.

Inputs – Compression  200 flows/second  Raw router data of 200 bytes per flow  Around 1GByte/day of data  Several days of processing per month The University of Queensland traffic collection from just the gateway router was so large that some form of customised compression was needed.

Inputs – Record Format Source IP/Source Customer4 bytes Destination IP/Destination Customer4 bytes Byte Count4 bytes Source Port2 bytes Destination Port 2 bytes Duration of Flow in Minutes2 bytes Start of Flow in Minutes from start of file4 bits Protocol (e.g. UDP) 2 bits Source is IP/Destination is IP2 bits Bit mask of 8 traffic types (e.g. international) 8 bits The standard input data structure is a custom compressed format designed to allow a large quantity of data to be kept online. This 20 byte format can be compressed further … but this was thought sufficient for current requirements. The data structure assumes 15minute blocks.

Inputs – Collectors There should be one collector for each source or sink that is being monitored. The collectors are responsible for examining and translating the native format data (logs, router output) into 15 minute blocks of standard data format and feeding that data to the central processor.

Process - Overview The process needs to analyse the input data. In theory this is a single process – which must run through a list of rules and answer the questions posed by those rules. The outputs are the answers to those questions.

Process – 5 W’s and a H  Who  What  Why  When  Where  How The six universal questions

Process – When?  A Range of dates and times this rule is valid  How long a period should an aggregate be over, or should a trigger wait.  How often should aggregates be sent, or how many triggers events before someone is alerted.

Process – Where/Who?  Source and Destination IP address – list, range or net/mask.  Source and Destination customers for dynamically allocated address space.  Source and destination port – list, range or name.

Process – What/How?  What do we want to measure?  How do we want to measure it?  How do we want to trigger?  Number of packets?  Sum of bytes?  Trigger on certain number of packets?

Process – Why?  Why are we measuring or triggering?  Are we aggregating for a customer? If so which customer  Are we triggering for input into a monitoring system?

Process – Example Question  Start, Stop Date&Time e.g. 2-Jan-2001 to 2-Dec-2001  Period of sample e.g. 4 hourly  Frequency of Message e.g. every 6 periods  Source/Destination e.g. All   Source Port/Dest Port e.g. ftp  All  What to count e.g. bytes  How to count e.g. sum

Outputs - Overview  Aggregation – Sums, averages or just counts over time.  Triggers – Events that occur, too much traffic, too many connections etc.  Billing – Aggregation post processed adding customer detail and value. There are three basic types of outputs produced by this system they are:

Outputs - Aggregation  Personal s with usage data  Departmental weekly statements of activity.  Statistics and predictive analysis of trends in usage.  Protocol usage (e.g. FTP vs HTTP)  Service usage (e.g. how much use is the proxy getting)

Outputs - Triggers  Department warnings of prospective over use.  Warnings within 90 minutes of growing usage of particular ports or IP addresses (possible DOS attack developing).  Triggering can be done on the aggregate outputs – allowing warnings if daily usage is increasing beyond certain parameters.  Trigger on irresponsible or unacceptable usage by individual.

Outputs – Billing  Post processing of aggregate data combining network structure and ownership with traffic cost and optional commercial markup.  Optionally autmatically e- mail, fax and/or print based on billing periods.  Half period warning bills to prepare customer for likely costs.

Conclusion  Currently the router collector and part of the aggregate rules processor is working.  Although much of this system is still in the pipeline, the overall structure is very modular allowing each new step achieved to give immediate improvement on the existing system.  There is around 3 (wo)man- months work left to get much of what is presented here completed