Survey
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
* Your assessment is very important for improving the workof artificial intelligence, which forms the content of this project
Mapping and Visualizing the Internet Bill Cheswick, Hal Burch, and Steve Branigan Proceedings of 2000 USENIX Annual Technical Conference 元智資工所 系統實驗室 楊錫謦 2000/7/26 Outline • Introduction • Mapping • Layout • Future Work & Conclusion Introduction By discovering the path to all announced network on an Internet, we can build a good picture of the center of the Internet. Large intranets are hard to manage and offer many security problems. They discovered that mapping is a more useful pursuit for an intranet. Introduction(Cont.) The daily scanning of their mapping software allows us to detect log-term routing and connectivity changes on the Internet. Motivation - A map might be useful to know how connectivity changes before and during an attack on the Internet infrastructure. Mapping Their tracing data consists of paths from a test host towards a single host on a destination network. This technique only records an outgoing packet path – the incoming path is often different. Mapping, Not Hacking Layout They model the graph as a physical system. The standard model employed is spring attraction and electrical repulsion. A trick to more quickly compute a layout – replacing the electrical repulsive field with spring repulsion. The real optimization is laying out the graph one layer at a time. Future Work Scanning from multiple host – a more accurate map. volunteers to run their mapping IP tunneling better visualization tool Conclusion The mapping technology can reveal insights about large networks. The Internet maps have certainly excited the media. data collection