Big Data Works
From NORDUnet
views
comments
Related Media
"Big Data Works" presents perspectives on handling and analyzing large-scale network data. Gain insights from Brazil’s National R&E Network on leveraging monitoring data for aiding scientific research. Presenters from Restena and CIRCL from Luxembourg reveal how discarded “blackhole” traffic can uncover hidden security indicators and transform
defense strategies. Finally, CERN explains how HL-LHC’s upcoming tenfold data surge challenges Research and Education networks, introducing preparatory Data Challenges exercises.
In security, a blackhole is a place in the infrastructure where incoming traffic is silently discarded without informing the source, therefore the traffic does not reach its destination. The blackhole traffic, or otherwise called unwanted traffic, can be considered as worthless traffic - trash. However, this is far from being the case. That traffic may include interesting attack indicators or even information about incorrect technical configurations that may be used for reconnaissance, so finding attack vectors on a new victim.
The takeaway of this presentation is to raise awareness about the importance of careful configurations of devices by showing practical examples and to show some mitigation techniques to properly configure devices such that your config does not talk trash!
Speaker: Denim Latić (Fondation Restena)
HL-LHC network challenges
HL-LHC, the upgrade of the LHC accelerator coming on-line in 2030, will generate a much larger amount of data then today, which will heavily impact the load of the R&E networks. This presentation will describe the computing model, how data will move in the R&E networks, the major challenges that the R&E community will face and how we are preparing to tackle them.
Speaker: Edoardo Martelli (CERN)
defense strategies. Finally, CERN explains how HL-LHC’s upcoming tenfold data surge challenges Research and Education networks, introducing preparatory Data Challenges exercises.
Chair: Mihály Héder (SZTAKI)
Unlocking the Potential of Network Monitoring Data for Scientific Research
RNP provides internet connectivity across Brazil and generates vast monitoring and performance data. To support research, RNP has developed tools to make this data accessible accessible. This presentation will address two central questions: (i) In what ways can monitoring data from NRENs drive scientific research? and (ii) What actions can we take to foster scientific research using this data? In 2024, RNP embarked on a series of targeted studies and actions to explore and answer these questions. Our presentation will share key findings from this work, which have contributed to answering these questions and demonstrating the value of these initiatives.
Speakers: Gustavo Hermínio de Araújo (RNP), Prof. Jose Rezende (RNP)
It's all trash or not?RNP provides internet connectivity across Brazil and generates vast monitoring and performance data. To support research, RNP has developed tools to make this data accessible accessible. This presentation will address two central questions: (i) In what ways can monitoring data from NRENs drive scientific research? and (ii) What actions can we take to foster scientific research using this data? In 2024, RNP embarked on a series of targeted studies and actions to explore and answer these questions. Our presentation will share key findings from this work, which have contributed to answering these questions and demonstrating the value of these initiatives.
Speakers: Gustavo Hermínio de Araújo (RNP), Prof. Jose Rezende (RNP)
In security, a blackhole is a place in the infrastructure where incoming traffic is silently discarded without informing the source, therefore the traffic does not reach its destination. The blackhole traffic, or otherwise called unwanted traffic, can be considered as worthless traffic - trash. However, this is far from being the case. That traffic may include interesting attack indicators or even information about incorrect technical configurations that may be used for reconnaissance, so finding attack vectors on a new victim.
The takeaway of this presentation is to raise awareness about the importance of careful configurations of devices by showing practical examples and to show some mitigation techniques to properly configure devices such that your config does not talk trash!
Speaker: Denim Latić (Fondation Restena)
HL-LHC network challenges
HL-LHC, the upgrade of the LHC accelerator coming on-line in 2030, will generate a much larger amount of data then today, which will heavily impact the load of the R&E networks. This presentation will describe the computing model, how data will move in the R&E networks, the major challenges that the R&E community will face and how we are preparing to tackle them.
Speaker: Edoardo Martelli (CERN)
- Tags
-