Custom Query (1408 matches)

Filters
 
Or
 
  
 
Columns

Show under each result:


Results (55 - 57 of 1408)

Ticket Resolution Summary Owner Reporter
#1325 fixed Dynamic Virtual Router Failure Recovery peter.stickney@bbn.com xuan.liu@mail.umkc.edu
Description

Demo description paragraph (three sentence minimum):

In this demo, I will show a dynamic virtual router failure recovery by using a standby virtual router in the virtual network environment using GENI testbed. I will show the heuristic algorithm that select an optimal standby virtual router from a few preserved virtual standby virtual routers, by considering two criteria (i.e. geographical distance and VM load on the physical host).

List of equipment that will need AC connections (e.g. laptop, switch, monitor): One monitor, one VGA cable.

Just put in the number of connections needed if your demo description already lists equipment.

Total number of wired network connections (sum standard IP and VLAN connections): one wired network connection.

Number of wired layer 2 VLANs (if any): N/A

Specify VLAN number, if known, approximate bandwidth, and whether tagged or untagged. N/A

Number of wireless network connections (include required bandwidth if significant): One wireless network connection. No specific requirement on the bandwidth, but it should be easily connect VMs on the remote GENI racks, as well as Flack/labwiki page.

Number of static addresses needed (if any):

Monitor (y/n, specify VGA or DVI): Specify resolution only if your software has resolution restrictions.

Number of posters (max size poster boards are 30" x 40"): 2 poster boards, if possible. Otherwise, 1 30" x 40" poster board is fine.

Special requests: Include any specific network connectivity needs (e.g. VLANs to a particular GENI location, projects you'd like to be near, etc.)

#1332 fixed Middleware for Hadoop-in-a-Hybrid-Cloud peter.stickney@bbn.com xuan.liu@mail.umkc.edu
Description

Demo description paragraph (three sentence minimum): A middleware for Hadoop-in-a-Hybrid-Cloud

MapReduce is a programming model for processing and generating large data sets, and Hadoop, a MapReduce implementation, is a good tool to handle Big Data. Cloud computing with its ubiquitous characteristic, on demand and dynamic resource provisioning at low cost has potential to be the environment to treat big data. However, using Hadoop on the cloud spends time and requires technical knowledge from users. The hybrid cloud leverages these requirements, because it’s necessary to evaluate the resources in private cloud and, if necessary, obtain and prepare on-demand resources in the public cloud. Moreover, the simultaneous management of private and public domains requires an appropriate model that combines performance with minimal cost. We propose an architecture to make the orchestration of Hadoop applications in hybrid clouds. The core of the model consists of a web portal for submissions, an orchestration engine and an execution services factory. Through these three components it’s possible to automate the preparation of a cross-domain cluster, performing the provisioning of files involved, managing the execution of the application, and making the results available to the user.

List of equipment that will need AC connections (e.g. laptop, switch, monitor): Laptop with AC power plug IEC 60906-1 (http://en.wikipedia.org/wiki/IEC_60906-1).

Total number of wired network connections (sum standard IP and VLAN connections): 1 (standard wired network)

Number of wired layer 2 VLANs (if any): 0 Specify VLAN number, if known, approximate bandwidth, and whether tagged or untagged.

Number of wireless network connections (include required bandwidth if significant): 1

Number of static addresses needed (if any): 0

Monitor (y/n, specify VGA or DVI): y, VGA. Specify resolution only if your software has resolution restrictions.

Number of posters (max size poster boards are 30" x 40"): 30" x 40".

Special requests: none. Include any specific network connectivity needs (e.g. VLANs to a particular GENI location, projects you'd like to be near, etc.)

#1374 fixed Demo Registration - GEC 22 peter.stickney@bbn.com xmountr@ju.edu
Description

Demo Title: Experimentation of SDN-Supported Collaborative DDoS Attack Detection and Containment

One-sentence layman's description:

This demo shows a collaborative monitoring and correlation approach to mitigate the effects of the surge in network traffic of a flooding Denial of Service attack that can cause loss of service for legitimate sites.

Who should see this demo?

Attendees interested in Cybersecurity attack detection, and mitigation techniques.

Demo description paragraph(s): “Elevator speech” description that identifies (a) what you are demonstrating and (b) why it is important. This description may be used for advance publicity and to help attendees identify the demonstrations they wish to see.

Software-defined networking (SDN) and OpenFlow offer great support to dynamically adapt a network and to access data on different network layers as needed. Such advantages have been driving recent research efforts to develop new security applications and services. However, most studies on attack detection and containment have not really differentiated their solutions from the traditional ones, without fully taking advantage of the unique capabilities provided by SDN. Moreover, even if some of these studies provide interesting visions of what can be achieved, they stop short of presenting realistic application scenarios and experimental results. We present a novel attack detection and containment approach that is coordinated by distributed network monitors and controllers/correlators centralized on an SDN OpenFlow Virtual Switch (OVS). With different views and information availability, these elements collaboratively detect signature constituents of an attack that possess different characteristics of scale and detail. Therefore, this approach is able to not only quickly issue an alert against potential threats followed by careful verification for high accuracy, but also balance the workload on the OVS. We apply the proposed approach to TCP SYN flood attacks using Global Environment for Network Innovations (GENI). This realistic experimentation has provided us with insightful findings helpful to our goal toward a systematic methodology of SDN-supported attack detection and containment. First, we have demonstrated through experimentation the scalability of our collaborative scheme. Second, we have studied how the combination of alerts by the monitor and deep packet inspection by the correlator, can increase the speed and accuracy of attack identification. Our experiments, in the context of a small to medium corporate network, have demonstrated the effectiveness and scalability of the SDN-supported detection and containment approach..

List of equipment that will need AC connections (e.g. laptop, switch, monitor): Laptop and a monitor.

Total number of wired network connections (sum standard IP and VLAN connections):

One wired network connection.

Number of wired layer 2 VLANs (if any):

One VLAN for single network connection

Specify VLAN number, if known, approximate bandwidth, and whether tagged or untagged.

Any number (including VLAN 1)

Number of wireless network connections (include required bandwidth if significant):

N/A

Number of static addresses needed (if any):

N/A

Monitor (y/n, specify VGA or DVI):

VGA Monitor with minimal of resolution of 1440x900 or 1280x1024

Number of posters (max size poster boards are 30" x 40"):

One

Special requests: Include any specific network connectivity needs (e.g. VLANs to a particular GENI location, projects you'd like to be near, etc.)

Note: See TracQuery for help on using queries.