• Keine Ergebnisse gefunden

Network Security and Measurement

N/A
N/A
Protected

Academic year: 2022

Aktie "Network Security and Measurement"

Copied!
1
0
0

Wird geladen.... (Jetzt Volltext ansehen)

Volltext

(1)

Network Security and Measurement Assignment 03

HAW Hamburg WS 2020

Prof. Dr. Thomas Schmidt, Raphael Hiesgen, M.Sc. Deadline: November 25, 2020

When approaching large datasets it is helpful to preprocess data to simplify analysis later on.

Read through all three exercises before starting. Even though we will only process data for one day (due to time constrains) consider that for a representative analysis it might be necessary to analyze one month or even one year of data.

1. WIDE Traffic Repository

WIDE is a project that runs major parts of the Internet in Japan. It provides several traffic traces (https://mawi.wide.ad.jp/mawi/), which we want to study. For privacy reasons, the dumps do not include the application header (i.e., payload of the transport header). Furthermore, all IP addresses are anonymized, but the anonymization preserves the original IP prefix.

Data: MAWI data is located inshared-data/mawi. Use the first 15-minute file for May 11. It is cut into minute-long slices inshared-data/mawi/05/in-minutes.

Tools: tshark, dpkt, scapy, pandas, ...

(a) Calculate and visualize the number of bytes and packets per minute.

(b) Calculate and visualize the distribution of packets and bytes per flow.

2. Port-based Classification

In most cases ports tell a lot about the mix of services and applications in use. What port do you expect to see most?

(a) Implement a script to classify packets based on their ports.

(b) Give an overview of the services in use for each layer (network layer, transport layer, and potential application layer). Rank them by popularity in terms of bytes and packets.

(c) Compare your results to the findings inDistilling the Internets Application Mix from Packet-Sampled Traffic (Richter et al., IMC’13).

3. Client vs. Server

Throughout the Internet most communication happens between clients and servers. Dis- tinguishing between them gives a clearer view of the traffic and helps understand specific phenomenons that might only affect one them (e.g., reachability and traffic mix).

(a) Design an approach to group the data by server and clients.

(b) Implement your approach, show results, and discuss limitations.

1

Referenzen

ÄHNLICHE DOKUMENTE

To extend this simplicity, ChemRxiv is developing a tool to allow authors to send their preprint to a journal submission system in two clicks. Authors can smoothly transition

A scenario is a description of a series of interactions between a player and a virtual character for one-to-one communication skills training, where at each step the player is

– Making it work for a different data type (including uncertain data)?. – Making it work on low powered devices – Explaining why it works

The instances have been derived from the Solomon instances for the vehicle routing problem with time windows (Solomon 1987), and in analogy to the original data, the Li and

They expressed sentiments of trust in their children’s teachers and schools, and they were eager to be shared partners who supported their children’s technology use for

The EuroQoL 5-Dimensions 5-Level questionnaire is a measure of Health-related quality of life and are presented as an index value scored using the Danish crosswalk

Man kann also keine perfekte (informationstheoretische) Sicherheit erreichen, wenn man viel Klartext mit einem kleinen Schl ¨ussel verschl ¨usseln will. Man kann aber

F ¨ur nicht perfekt sichere Systeme hat Shannon die folgenden Fragen untersucht (mehrfache Verschl ¨usselung mit dem gleichen Schl ¨ussel):?. 1. Wieviel Nebenschl ¨ussel gibt