Hidden Network. Detecting Hidden Networks created with USB devices
Find Hidden Information on Your Network
-
Upload
incognito-software-inc -
Category
Documents
-
view
722 -
download
1
description
Transcript of Find Hidden Information on Your Network
![Page 1: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/1.jpg)
THE EASY WAY TO MEASURE, MONITOR, AND MONETIZE YOUR MOST PRECIOUS RESOURCE
Image: Flickr user mecookie http://www.flickr.com/photos/mecookie/3374589349/ CC Attribution License
FIND HIDDEN INFORMATION ON YOUR NETWORK
![Page 2: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/2.jpg)
Whether it’s subscriber usage information, congestion details, or hardware issues, knowing more about your network will help you provide better service and increase revenue…
YOUR NETWORK IS HIDING A GOLDMINE OF INFORMATION
Image: Flickr user s58y http://www.flickr.com/photos/s58y/5886685932/ CC Attribution License
![Page 3: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/3.jpg)
ARE YOU TAKING FULL ADVANTAGE OF THIS INFORMATION?
Image: Flickr user Colin_K www.flickr.com/photos/colinkinner/2200500024/ CC Attribution License
![Page 4: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/4.jpg)
WHEN USED CORRECTLY, NETWORK INTELLIGENCE IS WORTH ITS WEIGHT IN GOLD.
IT LETS YOU ENHANCE THE SUBSCRIBER EXPERIENCE AND HELP
YOU MAKE THE MOST OF YOUR EXISTING RESOURCES.
Image: Flickr user covilha http://www.flickr.com/photos/11139043@N00/1439804758/ CC Attribution License
![Page 5: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/5.jpg)
BUT FIRST, YOU NEED TO KNOW WHERE TO
DIG (AND HOW).
Image: Flickr user BigTallGuy http://www.flickr.com/photos/bigtallguy/498260191/ CC Attribution License
![Page 6: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/6.jpg)
MULTIPLE DATA SOURCES CAN HELP IN YOUR QUEST FOR THIS TREASURE IPDR
DPI
sFlow
SNMP
Image: Flickr user Tony Fischer Photography www.flickr.com/photos/tonythemisfit/3603754835 / CC Attribution License
![Page 7: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/7.jpg)
SO HOW DO YOU KNOW WHICH ONE IS RIGHT FOR YOU?
Image: Flickr user Steve A Johnson www.flickr.com/photos/artbystevejohnson/5650007134/ CC Attribution License
![Page 8: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/8.jpg)
THE PROSPECTOR: IPDR THINK OF INTERNET PROTOCOL DETAIL RECORD AS THE RUGGED HERO IN THE SEARCH FOR NETWORK INTELLIGENCE.
Image: Flickr user slopjop http://www.flickr.com/photos/slopjop/2148215556 / CC Attribution License
![Page 9: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/9.jpg)
• Streaming music • Browsing websites and checking email • Over-the-top video streaming • Peer-to-peer traffic • Other applications
IPDR CAN IDENTIFY RICH VEINS OF GOLD BY DISCOVERING HOW MUCH BANDWIDTH IS DEDICATED TO:
![Page 10: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/10.jpg)
IPDR: • Instructs the CMTS to gather and dispatch subscriber usage data for analysis
• Tracks down heavy users “over-mining” bandwidth
• Provides data that can assist with capacity planning
Image: Flickr user Randy Pertiet http://www.flickr.com/photos/34652102@N04/5059846582/ CC Attribution License
![Page 11: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/11.jpg)
USE IPDR DATA TO DECIDE WHETHER TO INVEST IN ADDITIONAL INFRASTRUCTURE, OFFER METERED PLANS, OR DEVELOP NEW SERVICE OFFERINGS.
BASE YOUR DECISIONS ON REAL USAGE PATTERNS TO PROVIDE A BETTER QUALITY OF SERVICE.
![Page 12: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/12.jpg)
THE ACCOMPLICE: SNMP
SIMPLE NETWORK MANAGEMENT PROTOCOL (SNMP) CAN PROVIDE VALUABLE INFORMATION ABOUT SERVICE QUALITY. LIKE MOST ACCOMPLICES, THOUGH, IT WORKS BEST IN PARTNERSHIP.
Image: Used with permission from Microsoft Corporation.
![Page 13: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/13.jpg)
This includes quantitative measures, like the numbers of bytes or packets sent and received through an interface on the network, and qualitative data, such as the number of dropped packets and re-transmissions.
SNMP ALLOWS YOU TO EXTRACT DATA FROM MOST NETWORKING EQUIPMENT
Image: Flickr user zhouxuan12345678 http://www.flickr.com/photos/53921113@N02/5645102295/ CC Attribution License
![Page 14: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/14.jpg)
BUT…
SNMP isn't very efficient when polling a CMTS for subscriber
information and can overtax the CMTS when used for this purpose.
SNMP is therefore best used for information about network health.
Image: Used with permission from Microsoft Corporation.
![Page 15: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/15.jpg)
Cross-reference SNMP network data, like device lease information, with IPDR subscriber usage information to create a complete overview of network traffic, right down to the individual CMTS or port.
Image: Flickr user S J Pinkney http://www.flickr.com/photos/spinkney/4742074137/ CC Attribution License
![Page 16: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/16.jpg)
THE BOUNTY HUNTER: DPI Deep packet inspection (DPI) is a protocol
that tracks down data for bandwidth monitoring and policy enforcement. It is
an application-based method that sits between the subscriber and the internet.
Like all bounty hunters, its methods can be controversial.
Image: Flickr user zachd1_618 http://www.flickr.com/photos/zachd1_618/4851505872/ CC Attribution License
![Page 17: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/17.jpg)
DPI SCANS ALL TRAFFIC ON A NETWORK AND CREATES STATISTICS BASED ON SPECIFIC PARAMETERS.
DPI REVEALS THE DETAILS OF EVERY PACKET SENT ON THE NETWORK.
Image: Flickr user marfis75 www.flickr.com/photos/marfis75/6382976417/ CC Attribution License
![Page 18: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/18.jpg)
FOR EXAMPLE, THE DETAILS OF WHAT EMAILS ARE SENT TO WHOM, AND THE CONTENT CONTAINED.
AS A RESULT, MANY IN THE USER COMMUNITY HAVE REJECTED DPI OVER PRIVACY CONCERNS.
Image: Flickr user visualpanic www.flickr.com/photos/visualpanic/2246514490/ CC Attribution License
![Page 19: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/19.jpg)
DPI CAN BE MORE EXPENSIVE THAN OTHER BANDWIDTH MONITORING OPTIONS, SUCH AS IPDR, BECAUSE IT
REQUIRES REQUIRES ADDITIONAL HARDWARE.
Image: Flickr user Images of Money www.flickr.com/photos/59937401@N07/5475014890/ CC Attribution License
![Page 20: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/20.jpg)
The New Face in Town: sFlow A newer protocol called sFlow is now being used in smaller multi-dwelling, unit-based networking equipment, used in high density areas like apartments and student housing.
Like IPDR and DPI, sFLOW represents subscriber information and gives providers visibility into the network to understand where bandwidth is used.
Image: Flickr user jeremymates http://www.flickr.com/photos/jeremymates/3692426935/ CC Attribution License
![Page 21: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/21.jpg)
SO WHICH ONE IS RIGHT FOR YOU?
Image: Flickr user rexboggs5 http://www.flickr.com/photos/rexboggs5/8171683448/ CC Attribution License
![Page 22: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/22.jpg)
DIFFERENT DATA SOURCES WILL GIVE YOU INSIGHT INTO DIFFERENT ASPECTS OF YOUR NETWORK.
THERE MAY BE MORE THAN ONE ANSWER
Image: Flickr user Rusty Clark www.flickr.com/photos/rusty_clark/8161827144/ CC Attribution License
![Page 23: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/23.jpg)
THE KEY TO NETWORK INTELLIGENCE
COLLECTING DATA FROM MULTIPLE SOURCES, OVER REGULAR TIME INTERVALS, WILL GIVE YOU ENOUGH INFORMATION TO
CREATE A COMPLETE OVERVIEW OF YOUR NETWORK.
Image: Used with permission from Microsoft Corporation.
![Page 24: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/24.jpg)
Image: Used with permission from Microsoft Corporation.
![Page 25: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/25.jpg)
ANALYZE SUBSCRIBER CONSUMPTION PATTERNS TO OFFER SUBSCRIBERS NEW SERVICE BUNDLES, COMPLIMENTARY UPGRADES, AND A WIDER RANGE OF OFFERINGS.
YOU MAY EVEN BE ABLE TO CREATE CUSTOM PACKAGES BASED ON REAL USER TRENDS.
Image: Flickr user Bert Kaufmann http://www.flickr.com/photos/22746515@N02/4649517754/ CC Attribution License
![Page 26: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/26.jpg)
FAIR USE Many providers are now starting to implement some kind of chargeback or throttling model.
Keep in mind that some subscribers may not realize just how much bandwidth they are using.
Avoid bill shock by creating a web-based portal, where subscribers can see what applications use the most data, how much is consumed in a billing cycle, and find a way to mitigate their use.
Image: Used with permission from Microsoft Corporation.
![Page 27: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/27.jpg)
WHATEVER STRATEGY YOU CHOOSE, ACCURATE BANDWIDTH MONITORING TOOLS WILL GIVE YOU THE NETWORK INTELLIGENCE YOU NEED TO PUT YOU ON THE RIGHT PATH TO OFFER THE BEST CUSTOMER EXPERIENCE.
Image: Flickr user forestwander-nature-pictures http://www.flickr.com/photos/forestwander-nature-pictures/6242766617/ CC Attribution License
![Page 28: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/28.jpg)
BANDWIDTH IS ONLY FREE IN THE EYES OF THE CONSUMER.
You must be able to offer enough bandwidth to provide
high quality of service or your subscribers will desert you.
Image: Flickr user Moyan Brenn www.flickr.com/photos/aigle_dore/5951683083/ CC Attribution License
![Page 29: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/29.jpg)
SO MAKE THE MOST OF THE RESOURCES THAT YOU ALREADY HAVE.
MINE YOUR EXISTING NETWORK DATA TO OFFER THE BEST POSSIBLE USER EXPERIENCE –– AND CREATE A
SUSTAINABLE FUTURE FOR YOUR BUSINESS.
Image: Used with permission from Microsoft Corporation.
![Page 30: Find Hidden Information on Your Network](https://reader034.fdocuments.us/reader034/viewer/2022052522/54b78dc54a7959d7418b4599/html5/thumbnails/30.jpg)
WANT TO KNOW MORE? LEARN WHY BANDWIDTH IS SO IMPORTANT BY DOWNLOADING THE FREE WHITE PAPER HERE.
@incognito_sfwr
Incognito-software
www.incognito.com