TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using.

Slides:



Advertisements
Similar presentations
Multihoming and Multi-path Routing
Advertisements

Saif Bin Ghelaita Director of Technologies & Standards TRA UAE
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
Chapter 19: Computer and Network Security Techniques Business Data Communications, 6e.
5-Network Defenses Dr. John P. Abraham Professor UTPA.
Authored by: Rachit Rastogi Computer Science & Engineering Deptt., College of Technology, G.B.P.U.A. & T., Pantnagar.
Building Your Own Firewall Chapter 10. Learning Objectives List and define the two categories of firewalls Explain why desktop firewalls are used Explain.
Access Control for Networks Problems: –Enforce an access control policy Allow trust relationships among machines –Protect local internet from outsiders.
This work is supported by the National Science Foundation under Grant Number DUE Any opinions, findings and conclusions or recommendations expressed.
Improved TCAM-based Pre-Filtering for Network Intrusion Detection Systems Department of Computer Science and Information Engineering National Cheng Kung.
Network Access Management Trends in IT Applications for Management Prepared by: Ahmed Ibrahim S
NetFlow Analyzer Drilldown to the root-QoS Product Overview.
Design and Implementation of a Server Director Project for the LCCN Lab at the Technion.
FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. 6 Packet Filtering By Whitman, Mattord, & Austin© 2008 Course Technology.
Deep Packet Inspection with Regular Expression Matching Min Chen, Danny Guo {michen, CSE Dept, UC Riverside 03/14/2007.
Intrusion Prevention System Group 6 Mu-Hsin Wei Renaud Moussounda Group 6 Mu-Hsin Wei Renaud Moussounda.
Department Of Computer Engineering
Network Topology. Cisco 2921 Integrated Services Router Security Embedded hardware-accelerated VPN encryption Secure collaborative communications with.
Faten Yahya Ismael.  It is technology creates a network that is physically public, but virtually it’s private.  A virtual private network (VPN) is a.
FIREWALL TECHNOLOGIES Tahani al jehani. Firewall benefits  A firewall functions as a choke point – all traffic in and out must pass through this single.
Halifax, 31 Oct – 3 Nov 2011ICT Accessibility For All High Intelligent Network (Smart Pipe) Yuqing CHEN CCSA Document No: GSC16-PLEN-75 Source: CCSA Contact:
Networking Components Christopher Biles LTEC Assignment 3.
Hafez Barghouthi. Model for Network Access Security (our concern) Patrick BoursAuthentication Course 2007/20082.
Market Analysis Decision Group.
Enhancement of IPTV using a Wireless Sensor Network Sandeep Kakumanu,Sriram Lakshmanan, and Raghupathy Sivakumar GNAN Research Group Georgia Institute.
Part VII: Special Topics Introduction to Business 3e 18 Copyright © 2004 South-Western. All rights reserved. Using Information Technology.
Hacker Zombie Computer Reflectors Target.
Firewalls Paper By: Vandana Bhardwaj. What this paper covers? Why you need a firewall? What is firewall? How does a network firewall interact with OSI.
OV Copyright © 2013 Logical Operations, Inc. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
UNIVERSITY OF PATRAS Department of Electrical & Computer Engineering Wireless Telecommunications Laboratory M. Tsagkaropoulos “Securing.
OV Copyright © 2011 Element K Content LLC. All rights reserved. Network Security  Network Perimeter Security  Intrusion Detection and Prevention.
CSCI 530 Lab Intrusion Detection Systems IDS. A collection of techniques and methodologies used to monitor suspicious activities both at the network and.
Network and Perimeter Security Paula Kiernan Senior Consultant Ward Solutions.
1 Topic 2: Lesson 3 Intro to Firewalls Summary. 2 Basic questions What is a firewall? What is a firewall? What can a firewall do? What can a firewall.
Parallel Processing Steve Terpe CS 147. Overview What is Parallel Processing What is Parallel Processing Parallel Processing in Nature Parallel Processing.
Kiew-Hong Chua a.k.a Francis Computer Network Presentation 12/5/00.
Rev A Mikko Suominen Enhancing System Capacity and Robustness by Optimizing Software Architecture in a Real-time Multiprocessor Environment.
Network security Product Group 2 McAfee Network Security Platform.
Securing the Network Infrastructure. Firewalls Typically used to filter packets Designed to prevent malicious packets from entering the network or its.
Module 7: Advanced Application and Web Filtering.
5 Firewalls in VoIP Selected Topics in Information Security – Bazara Barry.
Microsoft ISA Server 2000 Presented by Ricardo Diaz Ryan Fansa.
1 Firewall Rules. 2 Firewall Configuration l Firewalls can generally be configured in one of two fundamental ways. –Permit all that is not expressly denied.
ITGS Network Architecture. ITGS Network architecture –The way computers are logically organized on a network, and the role each takes. Client/server network.
CellSDN: Software-Defined Cellular Core networks Xin Jin Princeton University Joint work with Li Erran Li, Laurent Vanbever, and Jennifer Rexford.
Authors: Danhua Guo 、 Guangdeng Liao 、 Laxmi N. Bhuyan 、 Bin Liu 、 Jianxun Jason Ding Conf. : The 4th ACM/IEEE Symposium on Architectures for Networking.
I NTRUSION P REVENTION S YSTEM (IPS). O UTLINE Introduction Objectives IPS’s Detection methods Classifications IPS vs. IDS IPS vs. Firewall.
Firewalls A brief introduction to firewalls. What does a Firewall do? Firewalls are essential tools in managing and controlling network traffic Firewalls.
Decision Group April 2010 Market Analysis. Agenda  Market  DPI/DPC Market Size  Market Segments  Forensic Solution Market  Competitors  Decision.
© ITT Educational Services, Inc. All rights reserved.Page 1 IS3220 Information Technology Infrastructure Security Class Agenda 1  Learning Objectives.
Networking Components Assignment 3 Corbin Watkins.
Regan Little. Definition Methods of Screening Types of Firewall Network-Level Firewalls Circuit-Level Firewalls Application-Level Firewalls Stateful Multi-Level.
Juniper Networks Mobile Security Solution Nosipho Masilela COSC 356.
Deep Packet Inspection. Definition Uses Privacy Concerns Neutrality Concerns.
NSA 240 Overview For End Users. 2 New Challenges To Solve  Threats Are Increasing  Web 2.0 & SaaS  Impacts to servers, users & networks  Threats go.
A Classification for Access Control List To Speed Up Packet-Filtering Firewall CHEN FAN, LONG TAN, RAWAD FELIMBAN and ABDELSHAKOUR ABUZNEID Department.
Windows Vista Configuration MCTS : Advanced Networking.
Firewalls. Overview of Firewalls As the name implies, a firewall acts to provide secured access between two networks A firewall may be implemented as.
LONG TERM EVOLUTION DANISH HASRAT (091042) DEEPAK SINGH (091043) GAURAV THAWANI (091052) NILESH SINGH (091079)
Network Processing Systems Design
Some Great Open Source Intrusion Detection Systems (IDSs)
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Different Traffic Management Techniques for Mobile Broadband Networks
CONNECTING TO THE INTERNET
Firewalls.
CS580 Special Project: IOS Firewall Setup using CISCO 1600 router
Firewall.
IP Control Gateway (IPCG)
FIREWALL.
Presentation transcript:

TASHKENT UNIVERSITY OF INFORMATION TECHNOLOGIES Lesson №18 Telecommunication software design for analyzing and control packets on the networks by using DPI-technology

INTRODUCTION Wireless and fixed network broadband service providers face the challenge of increasing return on investment in the face of increasing infrastructure costs to keep up with unprecedented data demand by subscribers while opportunities for increasing revenues remain elusive. Service providers are faced with unprecedented demand for more and higher speed bandwidth in the face of new applications, increased video use, and subscriber growth. Service providers need an awareness of the applications that use IP in order to provide the key roles of security and fairness and DPI is the cornerstone in enabling those through informed decisions.

Topicality of the subject Within increasing number of Internet users, different problems are going up on the networks. The main problems on the communication networks are quality of service, network security and traffic management on the today’s point. The decision of these problems is connected with deep packet inspection technology, which analyses data packets in “depth”. Also, security of communication systems defines with DPI. Using DPI aplications allow security services, like control, blocking unwanted accesses, removing malicious packets, distinguish viruses and other services for avoiding from threads to service providers and network users. In detail, network providers can protect and control their network with DPI. Developing and implementing DPI security solutions in Uzbekistan improve the national infrastructure of information and communication society. After realizing Electron-government in Uzbekistan DPI takes main role in control and management information resources and supports reliable and secure communication. Because of reasons defined above now DPI systems are actual issue in the global telecommunication market. Researchers are working to development new methods to improve the performance of deep packet inspection applications. Therefore, this work is devoted to development of security solution for IP-based packet networks by using DPI.

The range of Packet Inspection by DPI

Deep Packet Inspection implementation

Packet inspection model and algorithm

Deep Packet Inspection software architecture

Deep Packet Inspection software in Windows OS

Deep Packet Inspection software in Windows OS Connections and object status window

Reports window of DPI software

Protocol inspection results

Threats of unregistrated users to system

The performance of software

Comparison of DPI vs non-DPI system performances

Results of testing system Results present, attempts to connect to system and threats to system increase depends on the time, effective performance of system goes down because of unregistrated attempts to connect. Testing results shows that software performance remains around 50% - 60% after a half hour. Testing results show, Linux DPI filter application works better then Windows application. The performance of Linux DPI application is higher and packet inspection, filtering processes are faster in local machine.

Conclusion In research on this thesis, I used deep packet inspection techniques, algorithms and requirements. DPI requirements specify the packet inspection function on the entire packet content rather than just the header. To keep up with high speed packet processing in existing networks, I proposed and used deep packet inspection schemes that are, optimized for new technologies such as Static Pattern Content Matching, Regular Expression Pattern Matching and multi- core processors. Algorithms, I used in that work both on packet headers and packet payload. The developed DPI system is in a cohesive and flexible architecture that can perform high rate packet scanning and inspecting against thousands of sophisticated patterns. So, consistent with this thesis, the tasks have been solved: analyzed of DPI solutions for networks security in ip-based communication networks; analyzed of deep packet inspection methods and algorithms; developed algorithm and program for DPI security system in different operation systems; explained experimental analyses taken from real network with DPI software.

Conclusion Nowadays DPI systems able to deal with high packet incoming rate, can handle such load of traffic with increase in the classification completeness. Additionally, such modifications empower DPI systems, in order to provide ISPs with a wider view of what is passing through their network, aggregating a great amount of traffic information. In this dissertation, I explained high speed packet processing algorithms for new services such as network intrusion detection, high speed firewalls and developed own DPI security software for server. These DPI applications can reconfigure on demand and may add thousands of known protocol patterns for rapid scanning and analyzing data packets.

THANK YOU FOR YOUR ATTENTION!