data analysis in terabit ethernet trafÞc - ccc event blog · data analysis in terabit ethernet...

73
Data Analysis in Terabit Ethernet Traffic Lars Weiler <[email protected]> 27th Chaos Communication Congress 2010-12-28

Upload: lekhuong

Post on 22-Apr-2018

214 views

Category:

Documents


0 download

TRANSCRIPT

Monitoringvs.

Surveillance

Data MediationLayer Deeper View

DataMediationLayer

TelephoneOperator

jemstone/flickrhttp://www.flickr.com/photos/jemstone/11631878

Network BusTechnologie

Just connect…

mika/flickrhttp://www.flickr.com/photos/mika/2100204327/

FullDuplexwith

OpticalFiber

SplittingLight

shazoor/flickrhttp://www.flickr.com/photos/shazoor/4813943143/

Switched Port Analyzer (SPAN)

Data Analysis

Data Analysis

Data Analysis

Data Analysis

Data Analysis

Data Analysis

Data Analysis

Data Analysis

Black Box

Data Analysis

Black Box

Data Analysis

Black Box

Data MediationLayer

Black Box

Let’s have a look into the box

kevinsteele/flickrhttp://www.flickr.com/photos/kevinsteele/3007479711/

Manipulation

iluetkeb/flickrhttp://www.flickr.com/photos/iluetkeb/2595137371/

Identify theVendors

Intelligent Data Access Solutions

Secure Access | Complete Visiblity

All product images, brands, trademarks and logos are the property of their respective owners and holders and

are used for descriptive purposes only where possible

jeffeaton/flickrjeffeaton/flickr

jeffeaton/flickrjeffeaton/flickr

Costs

Test Equipment

free-stock/flickrhttp://www.flickr.com/photos/free-stock/4791385567/

Benefits

vs.

Surveillance

Monitoring

mogwai_83/flickrhttp://www.flickr.com/photos/mogwai_83/3022261893/

Monitoring

exacq/flickrhttp://www.flickr.com/photos/exacq/1224729974/

Surveillance

Filter List

keepthebyte/flickrhttp://www.flickr.com/photos/keepthebyte/298432485/

Analysis ofUnencrypted Data

Analysis ofUnencrypted Data

Analysis ofUnencrypted Data

Analysis ofEncrypted Data

Encrypted Datawith SSL Terminator

Encrypted Datawith SSL Terminator

Alice

Bob

Oscar

Lawful Interception withoutData Retention

Oscar

Alice

Bob

Oscar

Lawful Interception withoutData Retention

Oscar

Alice

Bob

Oscar

Lawful Interception withoutData Retention

Alice

Bob

Oscar

Lawful Interception withoutData Retention

Deeper View

Content or Filter List?

keepthebyte/flickrhttp://www.flickr.com/photos/keepthebyte/298432485/

publish9/flickrhttp://www.flickr.com/photos/publish9/3495637145/

What ismore

interesting?

Filter Listsare storedon the device

Serial Line andBootloader for Rescue!

WebGUI

Security

Monitoringvs.

Surveillance

Data MediationLayer Deeper View

Que

stio

ns? T

hanks foryour attention!