• Non ci sono risultati.

Network Traffic Measurements

N/A
N/A
Protected

Academic year: 2021

Condividi "Network Traffic Measurements"

Copied!
30
0
0

Testo completo

(1)

GTTI – Riunione Annuale 2017 Premio per Tesi di Dottorato Udine, 21-23 Giugno

Network Traffic Measurements

Applications to Internet Services and Security

Enrico BOCCHI

CERN, IT-Storage

(2)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Research Scope

2

Users producing and

consuming content Different types of devices

High bandwidth access Ubiquitous connectivity

• Photo backup on

from tablets and smartphones

• Documents editing on

• Video publishing and sharing on

Outbound Traffic

• Web search and information retrieval

• Mobile Apps download

• Video streaming

Inbound Traffic

• Harming users’ privacy

• Threatening data confidentiality

• Exposing identities to malicious adversaries

Unsolicited Traffic

(3)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Research Scope

Communication networks collect users’ traffic exchanged with websites, Internet services, cloud-based applications, etc.

3

 Understand and characterize users’ activities

 Assess performance of Internet services

 Identify and troubleshoot

network impairments

(4)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Passive Measurements

4

Passive Probe Raw Data

Deploy Passive Probes

Collect Network

Measurements

(5)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Active Measurements

5

Raw Data Active Probe

Collect Network Measurements

Instruct

Active Probes

Control Info

(6)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Data Processing Workflow

6

Da ta Flow

Build a repository of measurements either via passive captures or active probing

Detection Configuration Visualization

Applications

Filtering

Storage Analytics

Query, filter, and aggregate data

to access the measurements of interest

Apply suitable techniques to interpret data

e.g., machine learning, statistics, data mining, etc.

(7)

Research Topics

(8)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Research Topics

8

• Photo backup on

from tablets and smartphones

• Documents editing on

• Video publishing and sharing on

Outbound Traffic

• Web search and information retrieval

• Mobile Apps download

• Video streaming

Inbound Traffic

• Harming users’ privacy

• Threatening data confidentiality

• Exposing identities to malicious adversaries

Unsolicited Traffic

(9)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Research Topics

9

Research Topic

Research Objectives Traffic

Type

Employed Methodologies

OutboundUnsolicitedInbound

Personal Cloud Storage

Malware Detection

Web Quality of Experience

Monitoring and benchmarking of personal cloud storage services 1. Understanding of typical usage 2. Benchmarking of performance 3. Detection of advanced capabilities

Understanding differences between HTTP/1 and /2 from user standpoint 1. Survey on QoE metrics for Web 2. Collection of 4,000+ MOS grades 3. Impact of Carrier Grade NAT

i. Passive Traffic Measurements ii. Active Traffic Measurements a. Large-scale Data Analysis b. Reverse Engineering c. Ad-hoc Testbed Design

i. Passive Traffic Measurements a. Data Mining

b. Machine Learning c. Data Classification

i. Active Traffic Measurements ii. Passive Traffic Measurements a. Ad-hoc Testbed Design

b. Statistics

Automatic detection and

classification of malicious activities 1. Characterization of malware

2. Graphical representation of security incidents

(10)

Personal Cloud Storage

(11)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Cloud Storage Services

Personal cloud storage services are customary among Internet users

 Synchronization among multiple devices

 Collaborative work and document editing

 Content sharing with friends and colleagues

Market is crowded by offers

 Providing a significant amount of free storage

 Relying on ad-hoc protocols and designs

11

(12)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Cloud Storage Services

12

Passive

Measurements

Active

Measurements

 What is the typical usage of these services?

 What is the workload they have to face?

 Are mobile devices popular?

 Is there a dependency between workload and device type used?

 How is synchronization tackled?

 Do clients implement advanced capabilities?

 How long does it take to synchronize devices?

(13)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Passive Characterization

13

1 month of real traffic recorded

20,000 households, residential customers located in Europe

 Subscribers with ADSL (20Mb/s) or FTTH (100Mb/s) lines

Passive Probe

ISP Point of Presence

Public Internet

Households

(14)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Usage Patterns per Device Type

Focus on

14

Households Upload (GB) Download (GB) Volume (GB)

PC Client 2,196 462 980 1442

Mobile App 1,628 180 51 231

Web Interface 3,823 38 177 215

Total 5,020 680 1,208 1,888

(15)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Usage Patterns per Device Type

Focus on

15

Households Upload (GB) Download (GB) Volume (GB)

PC Client 2,196 462 980 1442

Mobile App 1,628 180 51 231

Web Interface 3,823 38 177 215

Total 5,020 680 1,208 1,888

3,581 households access the Web Interface

to consume direct links Mobile devices store photos and videos

on the cloud

PCs have to download the content produced

by other devices

(16)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Typical Workloads

Storage sessions: Merge storage flows overlapped in time

 Uploads

50% are in the 1÷10MB range for mobile devices – photo and video backup

Small for PC clients: 70% carry less than 1MB

16

(17)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Typical Workloads

Storage sessions: Merge storage flows overlapped in time

 Downloads

PC clients download more bytes – bootstrap synchronization

Web access CDF is biased toward 50kB – picture thumbnails

17

(18)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Typical Workloads

Storage sessions: Merge storage flows overlapped in time

 Downloads

PC clients download more bytes – bootstrap synchronization

Web access CDF is biased toward 50kB – picture thumbnails

18

TAKEAWAY

Usage patterns differ according to the device type

 PC clients dominate in download to keep the local folder synchronized

 Mobile and Web access are used for specific tasks

(19)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Cloud Storage Services

19

Passive

Measurements

Active

Measurements

 What is the typical usage of these services?

 What is the workload they have to face?

 Are mobile devices popular?

 Is there a dependency between workload and device type used?

 How is synchronization tackled?

 Do clients implement advanced capabilities?

 How long does it take to synchronize devices?

(20)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Active Measurements

How is synchronization tackled?

 How long does it take to synchronize devices?

20

(21)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Active Measurements

How is synchronization tackled?

 How long does it take to synchronize devices?

21

TestPC Upload

FTP server

Applications under test

1. Workload Testing Application

2. Upload 3. Download TestPC Download

FTP server Applications

under test

Workload

Upload Starts

T

Start-up

T

Upload

T

Propag

Download Ends

T

Download

Traffic capture

Cloud

Providers

(22)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Active Measurements

Workloads

22

T

Start-up

T

Upload

T

Propag

T

Download

Time Workload

Generation

Upload Starts

Download Starts

Upload Ends

Download Ends

Start up Upload (TestPC Upload)

Download (TestPC Download)

Propagation

Files Binary Text Total Size Replicas

1 1 - 100 kB -

1 1 - 1 MB -

1 1 - 20 MB -

100 50 50 1 MB -

365 194 171 87 MB 97 (5.4 MB)

312 172 140 77 MB 136 (5.5 MB)

(23)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Synchronization Delay

23

Several workloads

 Single file, 1MB

(24)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Synchronization Delay

24

Several workloads

 Single file, 1MB

Wuala and Cloud Drive are

severely limited by implementation choices

ownCloud takes more than

10s to synchronize 1MB

(25)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Synchronization Delay

25

Several workloads

 Single file, 1MB

 Realistic – 365 Files

194 binary, 171 text

87MB total size

97 files replicated

(5.4MB)

(26)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Synchronization Delay

26

ownCloud takes more than

10s to synchronize 1MB

Several workloads

 Single file, 1MB

 Realistic – 365 Files

194 binary, 171 text

87MB total size

97 files replicated (5.4MB)

Horizon and ownCloud

perform poorly with

complex workloads

Box requires 10x time

compared to best services

Mega is the most reactive,

with very low start-up time

(27)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Synchronization Delay

27

ownCloud takes more than

10s to synchronize 1MB

Box requires 10x time

compared to best services

Several workloads

 Single file, 1MB

 Realistic – 365 Files

194 binary, 171 text

87MB total size

97 files replicated (5.4MB)

TAKEAWAY

 Client implementation changes according to the storage provider

Performance is impacted by (i) client capabilities, (ii) protocol design

Strong dependency with workload used

(28)

Conclusions

(29)

Introduction Methodology Research

Topics Cloud Storage Conclusions

Conclusions

 Focus on users’ perceived performance, experience, security following a measurement-based approach

Identification of performance bottlenecks for service improvement

Quality of experience assessment for end-users

Automatic detection of malicious activities

 Combine diverse measurements techniques to gain full visibility on the network traffic

Active measurements through ad-hoc testbed deployment

Large-scale passive data collection and post-processing

 Achieve a complete understanding and extract knowledge from network activities leveraging various techniques

E.g., data science, machine learning, statistics, etc.

29

(30)

Enrico Bocchi

GTTI – Riunione Annuale 2017 Udine, 21-23 Giugno

Network Traffic Measurements

Applications to Internet Services

and Security

Riferimenti

Documenti correlati

Ions Radially Bound: NO binding in direction of B Þ static electric quadrupole field is needed. to obtain

Because of its mission, one of the critical issues that WLCG has to face is the provision of a Grid storage service that allows for dynamic space allocation, the negotiation of

Come esempio di questa archi- tettura si può citare il cluster IBM Power-5, in cui le aree di scambio dati che permettono velocità di accesso comprese tra i 60 ed i 90

If that insert causes a collision and returns with the data, the node will pass the data back to the upstream inserter and again behave as if a request had been made (i.e. cache

La virtualizzazione permette una riduzione dei costi andando a diminuire le risorse fisiche e ottimizzando quelle software, risulta quindi banale utilizzare sistemi di

Abbiamo sviluppato un nuovo modulo con tecnologia shingled in collaborazione con l’area di ricerca e sviluppo della casa madre tedesca per venire incontro alle sempre più

As an illustrative example, let us look at the solution adopted at CERN: about 450 ATA disk servers are used to serve about 650 TB of data using about 8000 disks spinning in

SCSI has historically been the hard drive style of choice for enterprise applications. Multiple hard drives can be daisy-chained off a single SCSI con- nection. Fibre Channel is