Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Ignacio Bermudez is active.

Publication


Featured researches published by Ignacio Bermudez.


international conference on computer communications | 2013

Exploring the cloud from passive measurements: The Amazon AWS case

Ignacio Bermudez; Stefano Traverso; Marco Mellia; Maurizio Matteo Munafo

This paper presents a characterization of Amazons Web Services (AWS), the most prominent cloud provider that offers computing, storage, and content delivery platforms. Leveraging passive measurements, we explore the EC2, S3 and CloudFront AWS services to unveil their infrastructure, the pervasiveness of content they host, and their traffic allocation policies. Measurements reveal that most of the content residing on EC2 and S3 is served by one Amazon datacenter, located in Virginia, which appears to be the worst performing one for Italian users. This causes traffic to take long and expensive paths in the network. Since no automatic migration and load-balancing policies are offered by AWS among different locations, content is exposed to the risks of outages. The CloudFront CDN, on the contrary, shows much better performance thanks to the effective cache selection policy that serves 98% of the traffic from the nearest available cache. CloudFront exhibits also dynamic load-balancing policies, in contrast to the static allocation of instances on EC2 and S3. Information presented in this paper will be useful for developers aiming at entrusting AWS to deploy their contents, and for researchers willing to improve cloud design.


IEEE Transactions on Network and Service Management | 2014

A Distributed Architecture for the Monitoring of Clouds and CDNs: Applications to Amazon AWS

Ignacio Bermudez; Stefano Traverso; Maurizio Matteo Munafo; Marco Mellia

Clouds and CDNs are systems that tend to separate the content being requested by users from the physical servers capable of serving it. From the network point of view, monitoring and optimizing performance for the traffic they generate are challenging tasks, given that the same resource can be located in multiple places, which can, in turn, change at any time. The first step in understanding cloud and CDN systems is thus the engineering of a monitoring platform. In this paper, we propose a novel solution that combines passive and active measurements and whose workflow has been tailored to specifically characterize the traffic generated by cloud and CDN infrastructures. We validate our platform by performing a longitudinal characterization of the very well known cloud and CDN infrastructure provider Amazon Web Services (AWS). By observing the traffic generated by more than 50 000 Internet users of an Italian Internet Service Provider, we explore the EC2, S3, and CloudFront AWS services, unveiling their infrastructure, the pervasiveness of web services they host, and their traffic allocation policies as seen from our vantage points. Most importantly, we observe their evolution over a two-year-long period. The solution provided in this paper can be of interest for the following: 1) developers aiming at building measurement tools for cloud infrastructure providers; 2) developers interested in failure and anomaly detection systems; and 3) third-party service-level agreement certificators who can design systems to independently monitor performance. Finally, we believe that the results about AWS presented in this paper are interesting as they are among the first to unveil properties of AWS as seen from the operator point of view.


Computer Communications | 2016

Towards automatic protocol field inference

Ignacio Bermudez; Alok Tongaonkar; Marios Iliofotou; Marco Mellia; Maurizio Matteo Munafo

Security tools have evolved dramatically in the recent years to combat the increasingly complex nature of attacks. However, these tools need to be configured by experts that understand network protocols thoroughly to be effective. In this paper, we present a system called FieldHunter, which automatically extracts fields and infers their types. This information is invaluable for security experts to keep pace with the increasing rate of development of new network applications and their underlying protocols. FieldHunter relies on collecting application messages from multiple sessions. Then, it performs field extraction and inference of their types by taking into consideration statistical correlations between different messages or other associations with meta-data such as message length, client or server IP addresses. We evaluated FieldHunter on real network traffic collected in ISP networks from three different continents. FieldHunter was able to extract security relevant fields and infer their types for well documented network protocols (such as DNS and MSNP) as well as protocols for which the specifications are not publicly available (such as SopCast). Further, we developed a payload-based anomaly detection system for industrial control systems using FieldHunter. The proposed system is able to identify industrial devices behaving oddly, without any previous knowledge of the protocols being used.


2015 IFIP Networking Conference (IFIP Networking) | 2015

Automatic protocol field inference for deeper protocol understanding

Ignacio Bermudez; Alok Tongaonkar; Marios Iliofotou; Marco Mellia; Maurizio Matteo Munafo

Security tools have evolved dramatically in the recent years to combat the increasingly complex nature of attacks, but to be effective these tools need to be configured by experts that understand network protocols thoroughly. In this paper we present FieldHunter, which automatically extracts fields and infers their types; providing this much needed information to the security experts for keeping pace with the increasing rate of new network applications and their underlying protocols. FieldHunter relies on collecting application messages from multiple sessions and then applying statistical correlations is able to infer the types of the fields. These statistical correlations can be between different messages or other associations with meta-data such as message length, client or server IPs. Our system is designed to extract and infer fields from both binary and textual protocols. We evaluated FieldHunter on real network traffic collected in ISP networks from three different continents. FieldHunter was able to extract security relevant fields and infer their nature for well documented network protocols (such as DNS and MSNP) as well as protocols for which the specifications are not publicly available (such as SopCast) and from malware such as (Ramnit).


internet measurement conference | 2012

DNS to the rescue: discerning content and services in a tangled web

Ignacio Bermudez; Marco Mellia; Maurizio Matteo Munafo; Ram Keralapura; Antonio Nucci


IEEE Journal on Selected Areas in Communications | 2011

Investigating Overlay Topologies and Dynamics of P2P-TV Systems: The Case of SopCast

Ignacio Bermudez; Marco Mellia; Michela Meo


international conference on peer-to-peer computing | 2011

Passive characterization of sopcast usage in residential ISPs

Ignacio Bermudez; Marco Mellia; Michela Meo


conference on online social networks | 2015

Identifying Personal Information in Internet Traffic

Yabing Liu; Han Hee Song; Ignacio Bermudez; Alan Mislove; Mario Baldi; Alok Tongaonkar


Archive | 2012

Discerning web content and services based on real-time DNS tagging

Ram Keralapura; Marco Mellia; Ignacio Bermudez; Antonio Nucci


Archive | 2016

AUTOMATIC PARSING OF BINARY-BASED APPLICATION PROTOCOLS USING NETWORK TRAFFIC

Ignacio Bermudez; Marios Iliofotou; Marco Mellia; Ram Keralapura; Maurizio Matteo Munafo

Collaboration


Dive into the Ignacio Bermudez's collaboration.

Top Co-Authors

Avatar

Han Hee Song

University of Texas at Austin

View shared research outputs
Top Co-Authors

Avatar

Maurizio Matteo Munafo

Polytechnic University of Turin

View shared research outputs
Top Co-Authors

Avatar

Alan Mislove

Northeastern University

View shared research outputs
Top Co-Authors

Avatar

Yabing Liu

Northeastern University

View shared research outputs
Researchain Logo
Decentralizing Knowledge