We are very proud to announce that we have been awarded a SME instrument (Phase 1) grant by the European Commission. These projects are in line with the efforts of the European Commission to find “Europe’s next innovation leaders”.
These days have been hectic as we (Talaia Networks) helped organize, together with researchers from UPC-BarcelonaTech, the 7th International Workshop on Traffic Monitoring and Analysis (TMA-2015). Our Chairman Pere Barlet will kickstart the workshop with an opening speech next Thursday 23rd, 9:30am.
TMA has come a long way since its first edition. It was co-located with IFIP Networking in 2009, European Wireless Conference in 2011, Passive and Active Measurement Conference (PAM) in 2010 and 2012. It is a well-established workshop by now, and it has broadened its scope to all aspects related to network measurements, covering the entire network stack, up to the application layer. Topics of relevance to the workshop thus include: the measurement of cloud services, content distribution networks, social networks, and mobile applications and data centers, as well as other topics traditionally explored within the research comunity, such as traffic classification, anomaly detection, network performance evaluation and traffic analysis.
We at Talaia often receive questions on the mechanics of traffic classification engines and the accuracy of deep packet inspection products. Traffic classification refers to the identification of the layer 7 application responsible for network traffic. Traffic classification is traditionally achieved using deep packet inspection (DPI). In essence, this means matching traffic patterns that are known to belong to certain applications to packet contents. That is, capturing data packets, examining their contents, and checking if they conform to a known network protocol. A Comparison of Popular DPI Engines for Traffic Classification
As you may or may not know, we commercialize a product called Talaia. Very simply put, it is a network visibility solution that receives traffic summaries from routers via a protocol called NetFlow, and from this information it builds the picture of what is happening in customer networks.
One of our customers found that one individual had been running for months an illicit Bitcoin mining operation that pumped his employer’s electricity bill to pocket some Bitcoin. This post explains how Talaia was able to flag this activity (and how it can do the same for you).