Anemone: using end-systems as a rich network management platform

Enterprise networks contain hundreds, if not thousands, of cooperative end-systems. We advocate devoting a small fraction of their idle cycles, free disk space and network bandwidth to create Anemone, a platform for network management. In contrast to current approaches which rely on traffic statistics provided by network devices, Anemone combines end-system instrumentation with routing protocol collection to provide a semantically rich view of the network.

[1]  Michael Dahlin,et al.  A scalable distributed information management system , 2004, SIGCOMM.

[2]  George Varghese,et al.  Building a better NetFlow , 2004, SIGCOMM.

[3]  Roland Mortier The python routeing toolkit , 2001 .

[4]  Lee LaBarre,et al.  Common Management Information Services and Protocols for the Internet (CMOT and CMIP) , 1990, RFC.

[5]  Nasir D. Memon,et al.  ForNet: A Distributed Forensics Network , 2003, MMM-ACNS.

[6]  Marshall T. Rose,et al.  Management Information Base for network management of TCP/IP-based internets , 1990, RFC.

[7]  John S. Baras,et al.  MANDATE: MAnaging Networks Using DAtabase TEchnology , 1993, IEEE J. Sel. Areas Commun..

[8]  G. Weikum Querying the Internet with PIER , 2005 .

[9]  Larry L. Peterson,et al.  Sophia: an Information Plane for networked systems , 2004, Comput. Commun. Rev..

[10]  M. Kockelmans,et al.  Overview of IN and TMN harmonization , 1995 .

[11]  Yechiam Yemini,et al.  Managing Communication Networks by Monitoring Databases , 1991, IEEE Trans. Software Eng..

[12]  Somesh Jha,et al.  Global Intrusion Detection in the DOMINO Overlay System , 2004, NDSS.

[13]  John Moy,et al.  OSPF Version 2 , 1998, RFC.

[14]  Roch Glitho,et al.  Telecommunications management network: vision vs. reality , 1995, IEEE Commun. Mag..

[15]  Vinton G. Cerf IAB recommendations for the development of Internet network management standards , 1988, RFC.

[16]  Carsten Lund,et al.  Estimating flow distributions from sampled flow statistics , 2005, TNET.

[17]  Masum Z. Hasan,et al.  An active temporal model for network management databases , 1995, Integrated Network Management.

[18]  Benoit Claise,et al.  Cisco Systems NetFlow Services Export Version 9 , 2004, RFC.

[19]  Richard Mortier,et al.  Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.

[20]  Jaideep Srivastava,et al.  A Comparative Study of Anomaly Detection Schemes in Network Intrusion Detection , 2003, SDM.

[21]  Y. Yemini,et al.  NETMATE: A network management environment , 1991, IEEE Network.

[22]  Robbert van Renesse,et al.  Astrolabe: A robust and scalable technology for distributed system monitoring, management, and data mining , 2003, TOCS.

[23]  Keith McCloghrie,et al.  Introduction to version 2 of the Internet-standard Network Management Framework , 1993, RFC.

[24]  Ying-Dar Lin,et al.  Induction and Deduction for Autonomous Networks , 1993, IEEE J. Sel. Areas Commun..

[25]  Jon Postel,et al.  Internet Control Message Protocol , 1981, RFC.

[26]  John S. Heidemann,et al.  A framework for classifying denial of service attacks , 2003, SIGCOMM '03.