Warning: Creating default object from empty value in /home/ict-forward/www-apps/wp-svn/wp-includes/ms-load.php on line 138
E2EMON 2008 & NOMS 2008 « The FORWARD project blog

E2EMON 2008 & NOMS 2008

On the 6th of April, the 6th IEEE Workshop on End-to-End Monitoring Techniques and Services (E2EMon 2008) took place at Salvador, da Bahia, Brazil. E2EMon is a workshop focusing on advances in end-to-end (e2e) monitoring technology, and particularly new distributed monitoring techniques for emerging technologies such as grid, overlay, peer-to-peer (p2p) and ad-hoc networks, e2e path measurements, and monitoring for security. At the workshop we exchanged ideas and experiences with other researchers, concerning the next-generation of monitoring systems.

The keynote speech was titled “Monitoring on the Next Generation Internet” and was presented by Philippe Owezarski (LAAS). Apart from the keynote speech 12 papers were presented consisting of 8 technical and 4 short papers. On behalf of the DCS laboratory of ICS FORTH we presented 3 papers, one technical and two short. The technical paper was titled “Evaluation of Compression of Remote Network Monitoring Data Streams” by Peter I. Politopoulos, Evangelos P. Markatos, Sotiris Ioannidis and the two short papers were titled “Monitoring Three National Research Networks for Eight Weeks: Observations and Implications” by Demetris Antoniades, Michalis Polychronakis, Nick Nikiforakis,and Evangelos P. Markatos and “When AppMon met Stager” by Nick Nikiforakis, Demetres Antoniades, Evangelos Markatos, Sotiris Ioannidis.

The E2EMon workshop was organized as a part of the much larger NOMS 2008 conference (Network Operations & Management Symposium) who’s main theme was “Pervasive Management for Ubiquitous Networks and Services”. Among many topics we attended sessions and panels about traffic analysis, DDoS and Intrusion Detection, Traffic Identification and Grid Performance. Some paper presentations that caught our attention were: “Alert prioritization in Intrusion Detection Systems”, “A Novel Approach to Bottleneck Analysis in Networks”, “Detecting Skype flows in Web traffic” (which is quite difficult since Skype traffic is encrypted) and “Toward Automated Application Signature Generation for Traffic Identification” (a method which can potentially relieve researchers of the cumbersome task of manual application signature creation for network-traffic characterization purposes). In various sessions we argued about the practicality and feasibility of the presented ideas as well as propose ways and methods of better performance and efficiency.

The four days of the workshop and the conference was time well spent since we had the chance to meet other people from around the globe interested in the same technical fields as we are and through the various discussions and sessions we caught a glimpse at how other people think and tackle with problems as opposed to our solutions and ways of thinking.

Leave a Reply