network visualization - the suny technology conference

83
Network Visualization Bill Kramp Finger Lakes Community College 2010 SUNY Technology Conference Copyright William Kramp 2010. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise, or to republish, requires written permission from the author.

Upload: others

Post on 04-Feb-2022

3 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Network Visualization - The SUNY Technology Conference

Network Visualization

Bill KrampFinger Lakes Community College

2010 SUNY Technology Conference

Copyright William Kramp 2010. This work is the intellectual property of the author. Permission is granted for this material to be shared for non-commercial, educational purposes, provided that this copyright statement appears on the reproduced materials and notice is given that the copying is by permission of the author. To disseminate otherwise, or to republish, requires written permission from the author.

Page 2: Network Visualization - The SUNY Technology Conference

Visualization Outline Viewing SNMP data Visualizing Latency NetFlow and sFlow Log file analysis Network drawings Google Maps

Network events SUNY traffic

Presenter
Presentation Notes
This presentation will discuss the different ways to visualize network data and log files. It will not discuss how to parse the raw data, since that is unique to each campus This presentation will show the different techniques available.
Page 3: Network Visualization - The SUNY Technology Conference

Reasons for visualization Images simpler to understand Can expose anomalies Reveal trends Provide historical references Improve aesthetics of reports

Presenter
Presentation Notes
Many reasons for visualization, it just depends on what works for you.
Page 4: Network Visualization - The SUNY Technology Conference

Visualization Tools Cacti Smokeping Scrutinizer Sparklines Graphviz Google API’s

Presenter
Presentation Notes
Software used to create the content for this presentation
Page 5: Network Visualization - The SUNY Technology Conference

SNMP Data Visualization Bits, bytes, and packets Errors Disk usage CPU and memory usage Temperature Humidity

Presenter
Presentation Notes
Some of the SNMP variables we can monitor
Page 6: Network Visualization - The SUNY Technology Conference

Latency using Smokeping Polls every 5 minutes Send 20 “pings” at each poll period Not limited to just ICMP pings:

HTTP and HTTPS DNS E-mail (SMTP) LDAP and Radius

Data collected: Distribution of the “ping” latency is recorded Records the number of lost “pings”

Presenter
Presentation Notes
Background information on Smokeping
Page 7: Network Visualization - The SUNY Technology Conference

FLCC Resource Monitoring

Presenter
Presentation Notes
Collect several hundred graphs of SNMP data at FLCC Publish top 24 SNMP and Latency graphs to a “dashboard” which anybody on campus can access Six of the 24 dashboard graphs shown here Top-right: Accuplacer Middle-Right: Saranac Bottom-right: Angel
Page 8: Network Visualization - The SUNY Technology Conference

Environment Visualization

Presenter
Presentation Notes
Monitor temperature and humidity in Equipment and server rooms at all sites
Page 9: Network Visualization - The SUNY Technology Conference

Victor Campus Center Traffic

Presenter
Presentation Notes
Point out 2M utilization by tunneled T1 circuit 10M used during the day by security cameras 8am – people start logging in, logged out by 5pm. Usage then doubles over night period when nobody is in the building. Increased bandwidth usage caused by security cameras when it gets dark. The dips about every hour during the night are when the “motion “ activated lights turn on for some reason.
Page 10: Network Visualization - The SUNY Technology Conference

[1]

THE GOODTHE BADAND THE UGLY

Page 11: Network Visualization - The SUNY Technology Conference

THE GOOD

[2]

Presenter
Presentation Notes
The folks from ITEC in Buffalo
Page 12: Network Visualization - The SUNY Technology Conference

Saranac - June 7, 2010

Presenter
Presentation Notes
HTTP pings for Saranac Median respone time is 33.9 ms with no lost HTTP pings (all green samples)
Page 13: Network Visualization - The SUNY Technology Conference

Angel - June 7, 2010

Presenter
Presentation Notes
HTTPS pings
Page 14: Network Visualization - The SUNY Technology Conference

Accuplacer – June 7, 2010

Presenter
Presentation Notes
We use Accuplacer for placement testing of students. Used as a baseline for Angel and Saranac Did have external network issues involving Accuplacer a couple of years ago; Smokeping helped isolate the source.
Page 15: Network Visualization - The SUNY Technology Conference

THE BAD

[3]

Presenter
Presentation Notes
Back in September I was hit up about poor performance with the Internet, specifically Angel
Page 16: Network Visualization - The SUNY Technology Conference

Saranac - Sept. 15, 2009

Presenter
Presentation Notes
Problem reported about slow network response with Angel Checked Accuplace and Saranac to see if it was a site wide problem, or just Angel Current average for Saranac is about 33 ms, so we are much faster now the in September 2009
Page 17: Network Visualization - The SUNY Technology Conference

Angel - September 15, 2009

Presenter
Presentation Notes
HTTPS pings with a median of 1.4 seconds, but no lost packet requests, all green Usage of Angel had significantly increased since the previous year with four campuses, FLCC being one of them.
Page 18: Network Visualization - The SUNY Technology Conference

Angel - Sept. 16, 2009, AM

Presenter
Presentation Notes
Performance was fine over night, but the problem started to return in the morning after 8am.
Page 19: Network Visualization - The SUNY Technology Conference

AND THE UGLY

[4]

Page 20: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
The red milk crate at least keeps the enclosures up off the ground
Page 21: Network Visualization - The SUNY Technology Conference

Saranac Frontend – 9/23/2009

Presenter
Presentation Notes
During the Fall of 2010, ITEC was dealing with a cascade of bottlenecks Now I was getting complaints about Angel and Library with poor response times Everything looked fine on the surface Inset image is Saranac from September 15, 2009 These are repsonse times for the front-end servers, but not the backend database searches
Page 22: Network Visualization - The SUNY Technology Conference

Saranac Backend – 9/23/2009

Presenter
Presentation Notes
The median is just under one second, but it’s ping loss is almost 50% Scripted backend search with “strings” to monitor actual database search response times.
Page 23: Network Visualization - The SUNY Technology Conference

Saranac Backend – 9/28/2009

Presenter
Presentation Notes
Back to normal five days later. I was informed in January that this backend monitoring was causing performance problems with their database, so SUNYconnect wanted me to stop the monitoring. Developing alternatives to monitor backend response time without incurring problems for SUNYconnect’s database or application server.
Page 24: Network Visualization - The SUNY Technology Conference

Packetshaper Class Data

Presenter
Presentation Notes
Found the MIB for accessing PacketShaper class data which should help determine the actual bandwidth usage of Angel
Page 25: Network Visualization - The SUNY Technology Conference

SNMP Data Collection Tools Cacti, MRTG,

Open source VMware appliances available

Zenoss, GroundWork Monitor Open source with commercial extensions

Orion Network Monitoring (SolarWinds) Commercial

Page 26: Network Visualization - The SUNY Technology Conference

Smokeping - Latency Tool Open source (Integrated with Zenoss) http://oss.oetiker.ch/smokeping/ Probes:

Ping HTTP/HTTPS DNS SSH LDAP Radius SMTP

Page 27: Network Visualization - The SUNY Technology Conference

NetFlow and sFlow Traffic NetFlow

Developed by Cisco to document network flows by source and destination IP’s and ports. It also identifies the IP protocol and ingress interface

sFlow Similar to NetFlow with the data it collects,

but performs a statistical analysis and reports samples.

Page 28: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
FLCC runs one licensed version which retains data beyond 24 hours, and allows inspection of FLOGS, which are the raw flows. Handles both NetFlow and sFlow traffic from my Brocade core routers (sFlow) and Packet Shaper (NetFlow). Supports up to five devices.
Page 29: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Traffic flow for the top item of previous slide, which is the tunneled T1 shown in an earlier slide with the security camera traffic.
Page 30: Network Visualization - The SUNY Technology Conference

Traffic flows with server

Presenter
Presentation Notes
Top Conversations using Scrutinizer Shows source and destination system name/IP and Port number.
Page 31: Network Visualization - The SUNY Technology Conference

NetFlow and sFlow Tools sFlow Developer Tools

http://www.sflow.org/developers/tools.php New NetFlow Collector (NNFC)

http://sourceforge.net/projects/nnfc/ Scrutinizer

Free version has restrictions Lancope

Commercial

Page 32: Network Visualization - The SUNY Technology Conference

Switch & Router Events Logins Configuration changes Environment changes:

Temperature alarms Fan speed changes

Port status changes Reboots

Presenter
Presentation Notes
I receive daily e-mails about logins, changes, etc. And the total number of events recorded for each switch and router. Each switch/router is different, and the number of events usually drop on weekends. If I logged into a switch three times, six events would be logged – 3 for login, and 3 for logging out. If a device rebooted 10 times on that switch, that could generate 30 events. The total events on that switch would be 36 for the day as an example. Had to keep a mental picture of previous days activity to know if things were getting better or worse
Page 33: Network Visualization - The SUNY Technology Conference

Sparklines Proposed by Edward Rolf Tufte

Statistician and Professor Emeritus of Yale “Small, intense, simple data words” [5] Provide a visual representation of data

without overpowering surrounding text.

Page 34: Network Visualization - The SUNY Technology Conference

Switch & Router Sparklines

Presenter
Presentation Notes
HTML page Sparklines small compared to MRTG, Cacti, or Smokeping png files Typical png files are 64 KB, while my Sparkline png files are about 280 bytes each Show past 14 days of event counts, with the 14-day highs and low, as well as the last reading (yesterdays) count of events Explanation of line for CDG01-A112-R1-NSW28-FGS-648: peak of 699 events for 14 days, with a low of 3 on the weekends. There were 409 events on June 8, 2010 Some devices have little activity while others show a lot.
Page 35: Network Visualization - The SUNY Technology Conference

Switch & Router Sparklines

Presenter
Presentation Notes
Bad port connections in two different labs (typical end of semester problems) Notice troughs on weekends when systems are never turned on or rebooted Red color code “alert” is triggered at 2000+ events (arbitrary number that works for FLCC)
Page 36: Network Visualization - The SUNY Technology Conference

Switch & Router Sparklines

Presenter
Presentation Notes
Second line shows an gradual increase over two weeks with no dips over the weekends, but has not tripped the 2000 event marker. Wireless AP was doing warm reboots, but otherwise functioning – no complaints from wireless users. No errors on the port and the controller management didn’t report any problems Removed power for a clean boot of the wireless AP, which cleared the problem.
Page 37: Network Visualization - The SUNY Technology Conference

Sparkline HTML Table Code <td>CDG01-A112-R1-NSW28-FGS-

648</td> <td><img src="images/CDG01-A112-

R1-NSW28-FGS-648.png" alt="Data: 465 441 699 3 3 3 525 493 453 499 3 3 467 409"></td>

<td>699</td> <td>3</td> <td>409</td>

Presenter
Presentation Notes
Raw HTML code which shows the raw data of the 14 days in the ALT tag.
Page 38: Network Visualization - The SUNY Technology Conference

Sparkline Tools Sparkline PHP Graphing Library

http://sparkline.org/ Python version

http://www.xml.com/pub/a/2005/06/22/sparklines.html

Perl version http://search.cpan.org/~rjp/GD-Graph-

sparklines/

Page 39: Network Visualization - The SUNY Technology Conference

Log File Analysis Use visualization to summarize activity

at the “20,000 foot” level. Zero in on activity that is suspicious or

different. Use it to audit firewall rules and server

activity.

Presenter
Presentation Notes
Needed a better way to analyze firewall logs to pick out anomalies in the traffic
Page 40: Network Visualization - The SUNY Technology Conference

Log File Visualization Source (on left) Destination (middle)

14 US IP addresses 1 United Kingdom IP

184 connections

Destination port Number and protocol Green = permitted Red = blocked

Presenter
Presentation Notes
January 15, 2010 activity for a network server Used Graphviz, open source tools, to graph log data
Page 41: Network Visualization - The SUNY Technology Conference

Scripting to generate the different graphs:1) grep "src=172\.19\.12\." dot-20100115.log | ./graph-prep.pl –c | ./dot- prep.pl | dot -Tpng -o EZproxy.png 2) grep "src=172\.19\.12\." dot-20100115.log | ./ graph-prep.pl -c -e GB -t 32 | ./dot-prep.pl | dot -Tpng -o EZproxy-32.png 3) grep "src=172\.19\.12\." dot-20100115.log | ./ graph-prep.pl -c -e US -t 16 | ./dot-prep.pl | dot -Tpng -o EZproxy-16.png

Presenter
Presentation Notes
Filtering of data to isolate the server using “grep”, and then processing to classify by country codes. Can specify how to group the source and destination IP’s by different size masks: 8, 16, 32, 22, etc.
Page 42: Network Visualization - The SUNY Technology Conference

Graphviz “dot” format grep "src=172\.19\.12\." dot-20100115.log |./graph-prep.pl -c -e GB -t 32|./dot-prep.pl Script generated by dot-prep.pl for the Graphviz dot application:

digraph GRAPH_0 {

edge [ arrowhead=open ];graph [ rankdir=LR ];node [

fontsize=11,fillcolor=white,style=filled,shape=ellipse ];

"172.19.12.0" -> "194.66.22.38" -> "80/tcp" [label=184]"172.19.12.0" -> "US" -> "80/tcp" [label=1619]"172.19.12.0" [ shape=ellipse, fillcolor=orange ]"80/tcp" [ shape=box, style=filled, fillcolor=green ]}

Presenter
Presentation Notes
This shows the complete text to create the drawing. A good way to learn the format is to code the small drawings by hand and play with them before scripting.
Page 43: Network Visualization - The SUNY Technology Conference

Passed and blocked traffic Source on left Middle destination

subnets aggregated to /8

Outbound traffic Blocked “violation”

traffic colored Red Egress filters for

Windows ports, SMTP, TFTP and others.

Presenter
Presentation Notes
Small image of larger file that shows blocked and passed traffic
Page 44: Network Visualization - The SUNY Technology Conference

Skype Activity Udp connections Different socket

numbers used Uses countries

around the globe US and Canada

networks most used

Presenter
Presentation Notes
Skype traffic Here is a glimpse of the activity seen from a single PC using hundreds of different UDP ports to systems in countries around the world. “CA“ equals Canada There is a lot of activity even when the person is not using it – new policy is to turn Skype off when not using it.
Page 45: Network Visualization - The SUNY Technology Conference

Analysis of log filesSource Node Event Node Destination

NodeUse Case

Source address Destination Address Destination Port Port scan identification

Source address None Destination Address Detecting horizontal machine scans

Source address Destination Port Destination Address Horizontal scans on same port

Source address Action - blocked or permitted

Destination Port Firewall rule set validation

Destination Port Source address Action Identify machines that probe firewall rule set

[6]

Presenter
Presentation Notes
Different ways of viewing data to identify network activity Book listed in resources
Page 46: Network Visualization - The SUNY Technology Conference

Network Drawings

Presenter
Presentation Notes
http://www.computerhistory.org/internet_history/full_size_images/1969_4-node_map.gif Four original nodes of ARPA net: STI (Stanford Research Institute, UC Santa Barbara, UC Los Angeles, Utah
Page 47: Network Visualization - The SUNY Technology Conference

Redundant Brocade Routers

Presenter
Presentation Notes
Two active10-Gbps interfaces per router 21 active 1-Gbps SX-optic interfaces per router 44 1-Gbps copper connections per router
Page 48: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Standard Visio drawing. Doesn’t include copper connections Still a busy drawing without many details – hard to add any more switches to it. Information like port settings, room, rack, etc missing from drawing
Page 49: Network Visualization - The SUNY Technology Conference

The final straw

Presenter
Presentation Notes
A development in the past five years has complicated the use of Visio to document the network architecture.
Page 50: Network Visualization - The SUNY Technology Conference

VMware Clusters

Presenter
Presentation Notes
Ten ports per server; redundancy for: management, vMotion, iSCSI with 4 ports for vm data. Three servers currently in clusters with room for fourth Dual HP LeftHand SAN’s
Page 51: Network Visualization - The SUNY Technology Conference

Spreadsheet of connections

Presenter
Presentation Notes
Had to switch to solely documenting the network in a spreadsheet. Difficult to visualize the physical network connections
Page 52: Network Visualization - The SUNY Technology Conference

Graph Visualization (Graphviz)

Presenter
Presentation Notes
Shows network connections between racks, but not any servers or storage area networks (SANs) Could automate some of the process by using Foundry Discovery Protocol, which works just like Cisco CDP. Vmware can be configured to support CDP Visualization of the spreadsheet detected errors in the document, and exposed redundancy that was missing in the network design.
Page 53: Network Visualization - The SUNY Technology Conference

Router rack, Rack 9, Servers

Presenter
Presentation Notes
This drawings shows the connections between racks, and connections to the SAN and serves on the rack with their port numbers
Page 54: Network Visualization - The SUNY Technology Conference

BC/DR Planning

egrep -v "SAN|SRV|B392“ Connections.csv |egrep -v "D359|C428|B373|B330" | \./parse7.pl |dot -Tpng -o BCDR_Plan_with_no_main_Equipment_Room.png

Presenter
Presentation Notes
Visualization can be used to see what would happen if primary data center is destroyed. Filtering of spreadsheet will leave relevant data to draw remaining network closets. Original drawing is very large with 24 closets + Data Center If primary data center is destroyed, 15 of the data closets are disabled. “Egrep” command removes references to the data center, SAN and servers (SRV), and some other closets that are not needed. Administration and core offices will remain online. Kirk Anne from Geneseo presenting on table top DR drills in this room at 2:15 pm today
Page 55: Network Visualization - The SUNY Technology Conference

Google Maps Google Maps Google Charts Google Docs Google Data Protocol Thematic Mapping

Presenter
Presentation Notes
Thematic mapping was developed by Born Sandvik. It shows relationships between data and geo-locations.
Page 56: Network Visualization - The SUNY Technology Conference

FLCC Event Visualization Data source:

Canandaigua firewall log files Inbound activity only Anti-Virus events IDS Alerts Period - Month of May 2010 Who were the top three global sources

(countries) for these events?

Page 57: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
US #1 with 7496 events
Page 58: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Canada #2 with 3835
Page 59: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
South Korea 3rd with 511
Page 60: Network Visualization - The SUNY Technology Conference

Thematic Mapping Google Maps API

Requires key from Google for URL Thematic Mapping API

http://api.thematicmapping.org/tmapi-0.1.js Country Border Coordinates

worldborders.js Google Docs Spreadsheet

Country code, Country name, value

Page 61: Network Visualization - The SUNY Technology Conference

Google Docs SpreadsheetISO Country Value

KH Cambodia 6

JM Jamaica 7

GB United Kingdom

137

AT Austria 29

Presenter
Presentation Notes
Small sample of the data used for the Thematic map
Page 62: Network Visualization - The SUNY Technology Conference

SUNY Thematic Prism Map

Presenter
Presentation Notes
Prism map with Google charts While working on the presentation a couple of months ago, I had this thought to show network traffic by SUNY campus Gave the task to my student aid at the time, Kyle Bagshaw, to perform a little research: List of SUNY schools, with CIDR’s, coordinates, and FAFSA code Now a college employee, hired as a part-time Network Technician
Page 63: Network Visualization - The SUNY Technology Conference

SUNY Network Traffic Data source:

Canandaigua firewall logs Inbound and outbound connections

10 day sample period: May 24 – May 28, 2010 May 31 – June 4, 2010

Source of SUNY network ranges

Page 64: Network Visualization - The SUNY Technology Conference

Primary source of CIDR’s Google (or other search engines)?

Nope, too much work Doesn’t clearly identify address ranges Was used to identify 3 campus networks

Nmap or ping scans? Nope, unethical and probably illegal

ARIN.net American Registry for Internet Numbers

Presenter
Presentation Notes
Classless Inter-Domain Routing (CIDR)
Page 65: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Had to scale the network activity to keep things in perspective. Event counts between 0 and 10K were multiplied by 100, colored yellow Event counts between 10K and 1M were multiplied by 10, colored orange Event counts above 1M were not altered, colored red
Page 66: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Next slides zoom in to view SUNY campus traffic by connections
Page 67: Network Visualization - The SUNY Technology Conference
Page 68: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
FLCC is in red System Administration (orange) in Albany ITEC (orange) in Buffalo
Page 69: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Incorporated the use of Google charts. This shows 47 connections between FLCC and Purchase for the 10-day sample Graph shows the distribution of services for those 47 connections
Page 70: Network Visualization - The SUNY Technology Conference
Page 71: Network Visualization - The SUNY Technology Conference
Page 72: Network Visualization - The SUNY Technology Conference
Page 73: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
Noticed UDP traffic on port 137 between FLCC and Westchester Inbound and outbound traffic is combined, so we can’t tell the direction Accepted and blocked traffic is also counted
Page 74: Network Visualization - The SUNY Technology Conference

Port 137/udp to Westchester # grep "167.206.248.55" local7 |grep "137/udp" Apr 26 10:11:10 date=2010-04-26 time=10:11:10

devname=CDG01-3-R2-FW1-H5-Pri1000A device_id=FGT1KA3607502555 log_id=0022013001 type=traffic subtype=violation pri=warning vd=root SN=309686452 duration=0 user=N/A group=N/A rule=31 policyid=31 proto=17 service=137/udp app_type=N/A status=deny src=Exchange srcname=Exchange dst=167.206.248.55 dstname=167.206.248.55 src_int="port1" dst_int="port2" sent=0 rcvd=0 src_port=137 dst_port=137 vpn="N/A" tran_ip=0.0.0.0 tran_port=0

Presenter
Presentation Notes
Raw log file event show that the port 137 activity was flagged as a violation and no packets were sent or received.
Page 75: Network Visualization - The SUNY Technology Conference
Page 76: Network Visualization - The SUNY Technology Conference
Presenter
Presentation Notes
SUNY FAFSA codes
Page 77: Network Visualization - The SUNY Technology Conference

FLCC Event KML File Format<Placemark>

<name>Alfred University 561</name><description><![CDATA[<img

src='http://chart.apis.google.com/chart?cht=p3&amp;chd=t:0.36,5.53,0.53,0.18,0.53,22.64,20.86,1.07,0.36,47.59,0.18,0.18&amp;chs=300x100&amp;chf=bg,s,ffffff00&amp;chco=FF7800&amp;chl=12851/udp|25/tcp|3415/udp|36630/tcp|42893/udp|443/tcp|53/udp|55928/udp|6618/tcp|80/tcp|9149/tcp|9149/udp'>]]></description>

<styleUrl>#defaultStyles</styleUrl><Style><PolyStyle><color>dc01f7ff</color></PolyStyle></Style><Polygon>

<extrude>1</extrude><tessellate>1</tessellate><altitudeMode>absolute</altitudeMode><outerBoundaryIs>

<LinearRing><coordinates>-77.747,42.265,56100 -77.767,42.272,56100 -

77.787,42.265,56100 -77.795,42.245,56100 -77.787,42.225,56100 -77.767,42.218,56100 -77.747,42.225,56100 -77.739,42.245,56100 -77.747,42.265,56100

</coordinates></LinearRing>

</outerBoundaryIs></Polygon>

</Placemark>

Presenter
Presentation Notes
KML - Keyhole Markup Language, submitted by Google to the Open Geospatial Consortium Third field for coordinates is height – 561 times 100 because the value is under 10,000. Values of 10K to 1M multiplied by 10; no multiplication of values over 1M. Polygon needs to be drawn counter-clockwise
Page 78: Network Visualization - The SUNY Technology Conference

Raw Log File Entry Apr 30 00:00:00 date=2010-04-30 time=00:00:00

devname=CDG01-3-R2-FW1-H5-Pri1000A device_id=FGT1KA3607502555 log_id=0021010001 type=traffic subtype=allowed pri=notice vd=root SN=325802022 duration=180 user=N/A group=N/A rule=38 policyid=38 proto=17 service=53/udp app_type=N/A status=accept src=200.108.108.42 srcname=200.108.108.42 dst=192.156.234.143 dstname=192.156.234.143 src_int="port2" dst_int="V-CDG-DMZ2" sent=54 rcvd=233 sent_pkt=1 rcvd_pkt=1 src_port=11333 dst_port=53 vpn="N/A" tran_ip=172.29.3.1 tran_port=53 dir_disp=org tran_disp=dnat

Presenter
Presentation Notes
Fields used to generate Google maps Service: port number and protocol Source or destination IP Source and destination were handled separately, but “finished” code would handle them in a single pass
Page 79: Network Visualization - The SUNY Technology Conference

Processing Raw Data File grep "type=traffic" /2010/04/30/local7 |grep

'src_int=\"port2\"'|awk '{print $24,$21}'|sed 's/=/ /g'|awk '{print $2,$4}' > Data/Traffic_In-20100430.txt

Output to .txt file: 200.108.108.42 53/udp 70.100.187.110 443/tcp 67.247.158.233 80/tcp 72.5.23.2 53/udp 74.67.165.182 80/tcp

Presenter
Presentation Notes
Thos processes the large log file entries and parse them to to basic fields: source/destination IP and service
Page 80: Network Visualization - The SUNY Technology Conference

Isolating SUNY data and stats cat Data/* | ./IPtoSUNYsubnet.pl |sort|uniq -c|awk

'{print $2,$1,$3}'|./kmlprep.pl |./kmlbars.pl > SUNYbars-10days.kml

IPtoSUNYsubnet.pl output with sort and count: 1 002668 443/tcp 6 002668 53/udp 13 002668 80/tcp

Kmlprep.pl output: 002668 20 443/tcp=5.00,53/udp=30.00,80/tcp=65.00 002711 621

25/tcp=8.05,443/tcp=59.10,53/udp=21.26,80/tcp=11.59

Presenter
Presentation Notes
Correlation of source IP address to a SUNY campus CIDR with the appropriate FAFSA code assigned. Also sort and count unique FAFSA codes and services 002668 = Alfred University 002711 = Cornell
Page 81: Network Visualization - The SUNY Technology Conference

Demo’s Thematic Mappings Network Drawings Log Analysis

Page 82: Network Visualization - The SUNY Technology Conference

Visualization Resources Security Data Visualization

Conti, G. (2007). No Starch Press

Applied Security Visualization Marty, R. (2009). Addison Wesley

Atlas of Cyberspace Dodge, M. & Kitchin, R. (2001). Addison Wesley

Page 83: Network Visualization - The SUNY Technology Conference

References

[1] Removed from slides[2] http://www.itec.suny.edu/info/staff.htm[3] http://www.cnn.com/2009/SHOWBIZ/TV/12/25/charlie.sheen.arrested/[4] http://serverfault.com/questions/9345/worst-wiring-cabling-youve-seen[5] http://www.edwardtufte.com/bboard/q-and-a-fetch-msg?msg_id=0001OR&topic_id=1[6] Security Data Visualization. Conti, G. (2007). No Starch Press