NetAssay: Providing new monitoring primitives for network operators

Sean Donovan, Nick Feamster

Research output: Chapter in Book/Report/Conference proceedingConference contribution

2 Scopus citations

Abstract

Home and business network operators have limited network statistics available over which management decisions can be made. Similarly, there are few triggered behaviors, such as usage or bandwidths cap for individual users, that are available. By looking at sources of traffic, based on Domain Name System (DNS) cues for content of particular web addresses or source Autonomous System (AS) of the traffic, network operators could create new and interesting rules for their network. NetAssay is a Software-Defined Networking (SDN)-based, network-wide monitoring and reaction framework. By integrating information from Border Gateway Protocol (BGP) and the Domain Name System, NetAssay is able to integrate formerly disparate sources of control information, and use it to provide better monitoring, more useful triggered events, and security benefits for network operators.

Original languageEnglish (US)
Title of host publicationSIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication
PublisherAssociation for Computing Machinery
Pages345-346
Number of pages2
ISBN (Print)9781450328364
DOIs
StatePublished - 2014
Event2014 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2014 - Chicago, IL, United States
Duration: Aug 17 2014Aug 22 2014

Publication series

NameSIGCOMM 2014 - Proceedings of the 2014 ACM Conference on Special Interest Group on Data Communication

Other

Other2014 ACM Conference on Special Interest Group on Data Communication, SIGCOMM 2014
CountryUnited States
CityChicago, IL
Period8/17/148/22/14

All Science Journal Classification (ASJC) codes

  • Computer Science Applications

Keywords

  • network management
  • network monitoring
  • software-defined networking

Fingerprint Dive into the research topics of 'NetAssay: Providing new monitoring primitives for network operators'. Together they form a unique fingerprint.

Cite this