User menu

Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case

Bibliographic reference Drago, Idilio ; Hofstede, Rick ; Sadre, Ramin ; Sperotto, Anna ; Pras, Aiko. Measuring Cloud Service Health Using NetFlow/IPFIX: The WikiLeaks Case. In: Journal of Network and Systems Management, Vol. 23, no.1, p. 58-88 (2015)
Permanent URL http://hdl.handle.net/2078.1/156761
  1. Hajjat Mohammad, Sun Xin, Sung Yu-Wei Eric, Maltz David, Rao Sanjay, Sripanidkulchai Kunwadee, Tawarmalani Mohit, Cloudward bound : planning for beneficial migration of enterprise applications to the cloud, 10.1145/1851275.1851212
  2. Rish, I., Brodie, M., Odintsova, N., Ma, S., Grabarnik, G.: Real-Time Problem Determination in Distributed Systems Using Active Probing. In: Proceedings of the IEEE/IFIP Network Operations and Management Symposium, NOMS’04, pp. 133–146 (2004)
  3. Xu Kuai, Wang Feng, Wang Haiyan, Lightweight and Informative Traffic Metrics for Data Center Monitoring, 10.1007/s10922-011-9200-6
  4. Clarke Roger, How reliable is cloudsourcing? A review of articles in the technical media 2005–11, 10.1016/j.clsr.2011.11.010
  5. Gehlen, V., Finamore, A., Mellia, M., Munafò, M.M.: Uncovering the Big Players of the Web. In: Proceedings of the 4th International Conference on Traffic Monitoring and Analysis, TMA’12, pp. 15–28 (2012)
  6. Claise, B.: Cisco Systems NetFlow Services Export Version 9. RFC 3954 (Informational) (2004)
  7. Claise, B.: Specification of the IP flow information export (IPFIX) protocol for the exchange of IP traffic flow information. RFC 5101 (Standards Track) (2008)
  8. Garcia-Dorado J. L., Finamore A., Mellia M., Meo M., Munafo M., Characterization of ISP Traffic: Trends, User Habits, and Access Technology Impact, 10.1109/tnsm.2012.022412.110184
  9. Labovitz, C., Iekel-Johnson, S., McPherson, D., Oberheide, J., Jahanian, F.: Internet Inter-domain Traffic. In: Proceedings of the ACM SIGCOMM 2010 Conference, SIGCOMM’10, pp. 75–86 (2010)
  10. Mansfield-Devine Steve, Anonymous: serious threat or mere annoyance?, 10.1016/s1353-4858(11)70004-6
  11. Sommer, R., Feldmann, A.: NetFlow: Information Loss or Win? In: Proceedings of the 2nd ACM SIGCOMM Workshop on Internet Measurement, IMW’02, pp. 173–174 (2002)
  12. Paxson Vern, Bro: a system for detecting network intruders in real-time, 10.1016/s1389-1286(99)00112-7
  13. Duffield N., Lund C., Thorup M., Estimating flow distributions from sampled flow statistics, 10.1109/tnet.2005.852874
  14. Draper N., Guttman I., Bayesian Estimation of the Binomial Parameter, 10.1080/00401706.1971.10488827
  15. Tang, V.K.T., Sindler, R.B., Shirven, R.M.: Bayesian estimation of n in a binomial distribution. Tech. Rep. CRM 87–185, Center for Naval Analyses (1987)
  16. Tang, V.K.T., Sindler, R.B.: Confidence interval for parameter n in a binomial distribution. Tech. Rep. CRM 86–265, Center for Naval Analyses (1987)
  17. Finamore Alessandro, Mellia Marco, Meo Michela, Munafo Maurizio, Torino Politecnico, Rossi Dario, Experiences of Internet traffic monitoring with tstat, 10.1109/mnet.2011.5772055
  18. Haag, P.: Watch your flows with NfSen and NFDUMP. 50th RIPE Meeting. http://meetings.ripe.net/ripe-50/presentations (2005). Accessed June 2013
  19. Fullmer, M., Romig, S.: The OSU Flow-tools Package and CISCO NetFlow Logs. In: Proceedings of the 14th USENIX conference on System administration, LISA’00, pp. 291–304 (2000)
  20. Inacio, C.M., Trammell, B.: YAF: Yet Another Flowmeter. In: Proceedings of the 24th International Conference on Large Installation System Administration, LISA’10, pp. 1–16 (2010)
  21. MaxMind: GeoIP Organization. http://www.maxmind.com/en/organization (2013). Accessed June 2013
  22. Limmer, T., Dressler, F.: Flow-Based TCP Connection Analysis. In: Proceedings of the 2nd IEEE International Workshop on Information and Data Assurance, WIDA’09, pp. 376–383 (2009)
  23. Arlitt Martin, Williamson Carey, An analysis of TCP reset behaviour on the internet, 10.1145/1052812.1052823
  24. Fawcett Tom, An introduction to ROC analysis, 10.1016/j.patrec.2005.10.010
  25. van Rijsbergen, C.: Information Retrieval, 2 edn. Butterworth, London (1979)
  26. Lampert, R.T., Sommer, C., Munz, G., Dressler, F.: Vermont—A Versatile Monitoring Toolkit for IPFIX and PSAMP. In: Proceedings of the IEEE/IST Workshop on Monitoring, Attack Detection and Mitigation, MonAM’06 (2006)
  27. Čeleda, P., Kováčik, M., Koníř, T., Krmíček, V., Špringl, P., Žádník, M.: FlowMon Probe. Tech. Rep., CESNET (2007)
  28. Deri, L.: nProbe: An Open Source NetFlow Probe for Gigabit Networks. In: Proceedings of the Terena, TNC’03 (2003)
  29. Zseby, T., Molina, M., Duffield, N., Niccolini, S., Raspall, F.: Sampling and Filtering Techniques for IP Packet Selection. RFC 5475 (Standards Track) (2009)
  30. Estan Cristian, Varghese George, New directions in traffic measurement and accounting, 10.1145/964725.633056
  31. Estan, C., Keys, K., Moore, D., Varghese, G.: Building a Better NetFlow. In: Proceedings of the ACM SIGCOMM 2004 Conference, SIGCOMM’04, pp. 245–256 (2004)
  32. Dropbox: DropboxOps. http://twitter.com/DropboxOps (2013). Accessed June 2013
  33. Twitter: Status. http://status.twitter.com (2013). Accessed June 2013
  34. Google: Apps Status Dashboard. http://www.google.com/appsstatus (2013). Accessed June 2013
  35. Drago, I., Mellia, M., Munafò, M.M., Sperotto, A., Sadre, R., Pras, A.: Inside Dropbox: Understanding Personal Cloud Storage Services. In: Proceedings of the 12th ACM Internet Measurement Conference, IMC’12, pp. 481–494 (2012)
  36. Pras, A., Sperotto, A., Moura, G.C.M., Drago, I., Barbosa, R.R.R., Sadre, R., de Oliveira Schmidt, R., Hofstede, R.: Attacks by “Anonymous” WikiLeaks Proponents not Anonymous. Tech. Rep. TR-CTIT-10-41, CTIT, University of Twente, Enschede (2010)
  37. Kossmann, D., Kraska, T., Loesing, S.: An Evaluation of Alternative Architectures for Transaction Processing in the Cloud. In: Proceedings of the ACM SIGMOD International Conference on Management of data, SIGMOD’10, pp. 579–590 (2010)
  38. Lenk, A., Menzel, M., Lipsky, J., Tai, S., Offermann, P.: What Are You Paying for? Performance Benchmarking for Infrastructure-as-a-Service Offerings. In: Proceedings of the 4th IEEE International Conference on Cloud Computing, CLOUD’11, pp. 484–491 (2011)
  39. Li, A., Yang, X., Kandula, S., Zhang, M.: CloudCmp: Comparing Public Cloud Providers. In: Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement, IMC’10, pp. 1–14 (2010)
  40. Meng, S., Iyengar, A.K., Rouvellou, I.M., Liu, L., Lee, K., Palanisamy, B., Tang, Y.: Reliable State Monitoring in Cloud Datacenters. In: Proceedings of the 5th IEEE International Conference on Cloud Computing, CLOUD’12, pp. 951–958 (2012)
  41. Meng, S., Liu, L.: Enhanced monitoring-as-a-service for effective cloud management. IEEE Trans. Comput. http://ieeexplore.ieee.org/xpl/articleDetails.jsp?tp=&arnumber=6231620&queryText%3DEnhanced+Monitoring-as-a-Service (2012)
  42. Hu Wenjin, Yang Tao, Matthews Jeanna N., The good, the bad and the ugly of consumer cloud storage, 10.1145/1842733.1842751
  43. Wang, G., Ng, T.E.: The Impact of Virtualization on Network Performance of Amazon EC2 Data Center. In: Proceedings of the 29th Conference on Information Communications, INFOCOM’10, pp. 1–9 (2010)
  44. Zhang Qi, Cheng Lu, Boutaba Raouf, Cloud computing: state-of-the-art and research challenges, 10.1007/s13174-010-0007-6
  45. Glatz, E., Dimitropoulos, X.: Classifying Internet One-Way Traffic. In: Proceedings of the 12th ACM Internet Measurement Conference, IMC’12, pp. 37–50 (2012)
  46. Schatzmann, D., Leinen, S., Kögel, J., Mühlbauer, W.: FACT: Flow-Based Approach for Connectivity Tracking. In: Proceedings of the 12th International Conference on Passive and Active Network Measurement, PAM’11, pp. 214–223 (2011)
  47. Caracas, A., Kind, A., Gantenbein, D., Fussenegger, S., Dechouniotis, D.: Mining Semantic Relations using NetFlow. In: Proceedings of the 3rd IEEE/IFIP International Workshop on Business-driven IT Management, BDIM’08, pp. 110–111 (2008)
  48. Bermudez, I., Mellia, M., Munafò, M.M., Keralapura, R., Nucci, A.: DNS to the Rescue: Discerning Content and Services in a Tangled Web. In: Proceedings of the 12th ACM Internet Measurement Conference, IMC’12, pp. 413–426 (2012)
  49. Quittek, J., Bryant, S., Claise, B., Aitken, P., Meyer, J.: Information Model for IP Flow Information Export. RFC 5102 (Standards Track) (2008)
  50. Trammell B, Boschi E, An introduction to IP flow information export (IPFIX), 10.1109/mcom.2011.5741152
  51. Lewis, D.D., Gale, W.A.: A Sequential Algorithm for Training Text Classifiers. In: Proceedings of the 17th annual international ACM SIGIR conference on research and development in information retrieval, SIGIR’94, pp. 3–12 (1994)