SlideShare uma empresa Scribd logo
1 de 55
Hands On WithAmazon Web ServicesStirTrek 2011May 2011 Rob Gillen Cloud Computing Research rob@gillenfamily.net
Today	 Introduction Amazon Web Services Offerings EC2, S3, SQS, SDB and other TLAs Discussion of recent AWS Outage Applications on AWS Questions
Who am I? Software development background 11+ Years with Planet: Senior Developer/Solutions Architect  Federal, Commercial, Foreign, Non-Profit 4+ Years at Oak Ridge National Laboratory Software Solutions Architect Cloud Computing/HPC Research
AWS Products Elastic Compute Cloud Elastic Map Reduce Auto Scaling Cloud Front SimpleDB Relational Database Service Simple Storage Svc Elastic Block Storage Simple Queue Service Simple Notification Service CloudWatch Virtual Private Cloud Elastic Load Balancing Import/Export
Amazon S3 Concepts Objects: Opaque data to be stored (1 byte … 5 Gigabytes) Authentication and access controls Buckets: Object container – any number of objects 100 buckets per account / buckets are “owned” Keys: Unique object identifier within bucket Up to 1024 bytes long Flat object storage model Standards-Based Interfaces: REST and  SOAP URL-Addressability – every object has a URL
Amazon SQS Concepts Queues: Named message container Persistent Messages: Up to 256KB of data per message Peek / Lock access model Scalable: Unlimited number of queues per account Unlimited number of messages per queue
Amazon EC2 Concepts Amazon Machine Image (AMI): Bootable root disk Pre-defined or user-built Catalog of user-built AMIs OS: Fedora, Centos, Gentoo, Debian, Ubuntu, Windows Server App Stack: LAMP, mpiBLAST, Hadoop Instance: Running copy of an AMI Launch in less than 2 minutes Start/stop programmatically Network Security Model: Explicit access control Security groups Inter-service bandwidth is free
EBS Boot vs. S3 Boot S3 (original) Image copied from S3 to Ephemeral disks Lower IO charges during runtime Target: farm of identical machines EBS (newer) Auto Saving (sort of) Performance Ephemeral disks not used Potential higher IO charges Target: single machines Be certain you understand Shutdown & Termination and the ramifications of such
Tooling Command Line Browser Plug-ins 3rd Party Tools Broad SDK Support AWS Management Console
CloudBerry Explorer
AWS Management Console
Stock Windows Instances
Machine Setup Walkthrough
What Happened Incorrect Network Change == Replication Storm for EC2 “Affected Availability Zone” Actually affected *multiple* AZs (initially) "Each availability zone runs on its own physically distinct, independent infrastructure, and is engineered to be highly reliable. Common points of failures like generators and cooling equipment are not shared across Availability Zones. Additionally, they are physically separate, such that even extremely uncommon disasters such as fires, tornados or flooding would only affect a single Availability Zone."  http://aws.amazon.com/ec2/faqs/#How_isolated_are_Availability_Zones_from_one_another
Regions and AZs
My AZ != Your AZ
Fallout Survivors NetFlix (Chaos Monkey) SmugMug (Avoids EBS) Recovery.gov, Treasury.gov, others ShareThis Casualties Reddit, Foursquare, Quora, Hootsuite OpenEI.org
Building Blocks for HA Use Elastic IP Addresses for consistent and re-mappable routes Use multiple Amazon EC2 Availability Zones Replicate data across multiple Azs Example: Amazon RDS in Multi-AZ mode Use Amazon EBS for persistent file systems Take EBS snapshots and use S3 for backup
Build Loosely-Coupled Systems Use independent components Design everything as a black box Load balance and scale clusters Think about graceful degradation Use queues to isolate components
Articles of Interest Amazon: http://aws.amazon.com/message/65648/ ShareThis: http://blog.sharethis.com/2011/04/27/aws-outage-sharethis-survives/ http://tipsforsocialmedia.blogspot.com/2011/04/amazon-ec2-troubles-bring-down-reddit.html EC2 Disabled http://ec2disabled.com/ Medical Malpractice https://forums.aws.amazon.com/thread.jspa?threadID=65649 NetFlix http://techblog.netflix.com/2011/04/lessons-netflix-learned-from-aws-outage.html http://techblog.netflix.com/2010/12/5-lessons-weve-learned-using-aws.html
Cloud Applications
Computer Forensics
Forensic Toolkit 3 Cloud Formation Define deployment environment Bill on Behalf Of Selectable Instance Size
Challenge – What to do with mounds of data? What is in there? Are there any threats? What am I missing? How do I connect the “dots”? How do I find the relevant information I need?
Trees Forest Can’t See the for the Traditionally, search methods are used to find information at high volume levels But, those methods won’t get you here easily
Keyword Methods Document 1 The Army needs sensor technology to help find improvised explosive devices Vector Space Model Term List Army Sensor Technology Help Find Improvise Explosive  Device ORNL  develop  homeland  Defense Mitre  won  contract  Weight Terms Document 2 ORNL has developed sensor technology for homeland defense Document 3 Mitre has won a contract to develop homeland defense sensors for explosive devices An index into the document list Term Frequency – Inverse Document Frequency
Textual Clustering Vector Space Model Cluster Analysis Similarity Matrix D1 D2 D3 Documents to Documents Most similar documents TFIDF Euclidean distance Time Complexity O(n2Log n)
Example: Sign of the Crescent1 41 Short intelligence reports about a multi-prong terrorist attack Example: Report Date: 1 April, 2003. FBI: Abdul Ramazi is the owner of the Select Gourmet Foods shop in Springfield Mall, Springfield, VA. [Phone number 703-659-2317]. First Union National Bank lists Select Gourmet Foods as holding account number 1070173749003. Six checks totaling $35,000 have been deposited in this account in the past four months and are recorded as having been drawn on accounts at the Pyramid Bank of Cairo,  Egypt and the Central Bank of Dubai, United Arab Emirates. Both of these banks have just been listed as possible conduits in money laundering schemes 1Intelligence Analysis Case Study by F. J. Hughes, Joint Military Intelligence College
Piranha Cluster View Report Date: 1 April, 2003. FBI: Abdul Ramazi is the owner of the Select Gourmet Foods shop in Springfield Mall, Springfield, VA. [Phone number 703-659-2317]. First Union National Bank lists Select Gourmet Foods as holding account number 1070173749003. Six checks totaling $35,000 have been deposited in this account in the past four months and are recorded as having been drawn on accounts at the Pyramid Bank of Cairo,  Egypt and the Central Bank of Dubai, United Arab Emirates. Both of these banks have just been listed as possible conduits in money laundering schemes
Term network with document links 1) Report Date: 1 April, 2003. FBI: Abdul Ramaziis the owner of the Select Gourmet Foods shop in Springfield Mall, Springfield, VA. [Phone number 703-659-2317]. First Union National Bank lists Select Gourmet Foods as holding account number 1070173749003. Six checks totaling $35,000 have been deposited in this account in the past four months and are recorded as having been drawn on accounts at the Pyramid Bank of Cairo,  Egypt and the Central Bank of Dubai, United Arab Emirates. Both of these banks have just been listed as possible conduits in money laundering schemes.
Split Tree Over Nodes/Queues
Fault Tolerance
Component Overview
Topics Queue Interactions Blob Interactions Simple DB Interactions
Q & A rob@gillenfamily.net http://rob.gillenfamily.net Please Rate This Talk: http://spkr8.com/t/7409

Mais conteúdo relacionado

Semelhante a Hands On with Amazon Web Services (StirTrek)

Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...
Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...
Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...
ActiveState
 
iConect Corporate Overview
iConect Corporate OverviewiConect Corporate Overview
iConect Corporate Overview
cpindell
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
LaticiaGrissomzz
 

Semelhante a Hands On with Amazon Web Services (StirTrek) (20)

On the personalization of event-based systems
On the personalization of event-based systems On the personalization of event-based systems
On the personalization of event-based systems
 
Cloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit GiriCloud security best practices in AWS by: Ankit Giri
Cloud security best practices in AWS by: Ankit Giri
 
Css- 2nd quarter.pptx
Css- 2nd quarter.pptxCss- 2nd quarter.pptx
Css- 2nd quarter.pptx
 
Sec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.comSec 572 Education Specialist-snaptutorial.com
Sec 572 Education Specialist-snaptutorial.com
 
SEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.comSEC 572 Inspiring Innovation / tutorialrank.com
SEC 572 Inspiring Innovation / tutorialrank.com
 
Sec 572 Education Organization / snaptutorial.com
Sec 572  Education Organization / snaptutorial.comSec 572  Education Organization / snaptutorial.com
Sec 572 Education Organization / snaptutorial.com
 
Sec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.comSec 572 Effective Communication - tutorialrank.com
Sec 572 Effective Communication - tutorialrank.com
 
Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...
Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...
Python & Finance: US Government Mandates, Financial Modeling, and Other Snake...
 
Sec 572 Effective Communication / snaptutorial.com
Sec 572  Effective Communication / snaptutorial.comSec 572  Effective Communication / snaptutorial.com
Sec 572 Effective Communication / snaptutorial.com
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
Sec 572 Enhance teaching / snaptutorial.com
Sec 572  Enhance teaching / snaptutorial.comSec 572  Enhance teaching / snaptutorial.com
Sec 572 Enhance teaching / snaptutorial.com
 
Sensorpedia
SensorpediaSensorpedia
Sensorpedia
 
Hacking CEH cheat sheet
Hacking  CEH cheat sheetHacking  CEH cheat sheet
Hacking CEH cheat sheet
 
Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq Implementing a comprehensive application security progaram - Tawfiq
Implementing a comprehensive application security progaram - Tawfiq
 
iConect Corporate Overview
iConect Corporate OverviewiConect Corporate Overview
iConect Corporate Overview
 
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
Lab-4 Reconnaissance and Information Gathering         A hacker.docxLab-4 Reconnaissance and Information Gathering         A hacker.docx
Lab-4 Reconnaissance and Information Gathering  A hacker.docx
 
Stopping zero day threats
Stopping zero day threatsStopping zero day threats
Stopping zero day threats
 
Hacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdfHacking - CEH Cheat Sheet Exercises.pdf
Hacking - CEH Cheat Sheet Exercises.pdf
 
Semantic Security : Authorization on the Web with Ontologies
Semantic Security : Authorization on the Web with OntologiesSemantic Security : Authorization on the Web with Ontologies
Semantic Security : Authorization on the Web with Ontologies
 
Bodleian Library's DAMS system
Bodleian Library's DAMS systemBodleian Library's DAMS system
Bodleian Library's DAMS system
 

Mais de Rob Gillen

A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2
Rob Gillen
 
A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1
Rob Gillen
 
Intro to GPGPU Programming with Cuda
Intro to GPGPU Programming with CudaIntro to GPGPU Programming with Cuda
Intro to GPGPU Programming with Cuda
Rob Gillen
 

Mais de Rob Gillen (20)

CodeStock14: Hiding in Plain Sight
CodeStock14: Hiding in Plain SightCodeStock14: Hiding in Plain Sight
CodeStock14: Hiding in Plain Sight
 
What's in a password
What's in a password What's in a password
What's in a password
 
How well do you know your runtime
How well do you know your runtimeHow well do you know your runtime
How well do you know your runtime
 
Software defined radio and the hacker
Software defined radio and the hackerSoftware defined radio and the hacker
Software defined radio and the hacker
 
So whats in a password
So whats in a passwordSo whats in a password
So whats in a password
 
Hiding in plain sight
Hiding in plain sightHiding in plain sight
Hiding in plain sight
 
DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?DevLink - WiFu: You think your wireless is secure?
DevLink - WiFu: You think your wireless is secure?
 
You think your WiFi is safe?
You think your WiFi is safe?You think your WiFi is safe?
You think your WiFi is safe?
 
Anatomy of a Buffer Overflow Attack
Anatomy of a Buffer Overflow AttackAnatomy of a Buffer Overflow Attack
Anatomy of a Buffer Overflow Attack
 
Intro to GPGPU with CUDA (DevLink)
Intro to GPGPU with CUDA (DevLink)Intro to GPGPU with CUDA (DevLink)
Intro to GPGPU with CUDA (DevLink)
 
AWS vs. Azure
AWS vs. AzureAWS vs. Azure
AWS vs. Azure
 
A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2A Comparison of AWS and Azure - Part2
A Comparison of AWS and Azure - Part2
 
A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1A Comparison of AWS and Azure - Part 1
A Comparison of AWS and Azure - Part 1
 
Intro to GPGPU Programming with Cuda
Intro to GPGPU Programming with CudaIntro to GPGPU Programming with Cuda
Intro to GPGPU Programming with Cuda
 
Windows Azure: Lessons From The Field
Windows Azure: Lessons From The FieldWindows Azure: Lessons From The Field
Windows Azure: Lessons From The Field
 
Amazon Web Services for the .NET Developer
Amazon Web Services for the .NET DeveloperAmazon Web Services for the .NET Developer
Amazon Web Services for the .NET Developer
 
05561 Xfer Research 02
05561 Xfer Research 0205561 Xfer Research 02
05561 Xfer Research 02
 
05561 Xfer Research 01
05561 Xfer Research 0105561 Xfer Research 01
05561 Xfer Research 01
 
05561 Xfer Consumer 01
05561 Xfer Consumer 0105561 Xfer Consumer 01
05561 Xfer Consumer 01
 
Cloud Storage Upload Tests 02
Cloud Storage Upload Tests 02Cloud Storage Upload Tests 02
Cloud Storage Upload Tests 02
 

Último

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Último (20)

Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 

Hands On with Amazon Web Services (StirTrek)

  • 1. Hands On WithAmazon Web ServicesStirTrek 2011May 2011 Rob Gillen Cloud Computing Research rob@gillenfamily.net
  • 2. Today Introduction Amazon Web Services Offerings EC2, S3, SQS, SDB and other TLAs Discussion of recent AWS Outage Applications on AWS Questions
  • 3. Who am I? Software development background 11+ Years with Planet: Senior Developer/Solutions Architect Federal, Commercial, Foreign, Non-Profit 4+ Years at Oak Ridge National Laboratory Software Solutions Architect Cloud Computing/HPC Research
  • 4. AWS Products Elastic Compute Cloud Elastic Map Reduce Auto Scaling Cloud Front SimpleDB Relational Database Service Simple Storage Svc Elastic Block Storage Simple Queue Service Simple Notification Service CloudWatch Virtual Private Cloud Elastic Load Balancing Import/Export
  • 5. Amazon S3 Concepts Objects: Opaque data to be stored (1 byte … 5 Gigabytes) Authentication and access controls Buckets: Object container – any number of objects 100 buckets per account / buckets are “owned” Keys: Unique object identifier within bucket Up to 1024 bytes long Flat object storage model Standards-Based Interfaces: REST and SOAP URL-Addressability – every object has a URL
  • 6. Amazon SQS Concepts Queues: Named message container Persistent Messages: Up to 256KB of data per message Peek / Lock access model Scalable: Unlimited number of queues per account Unlimited number of messages per queue
  • 7. Amazon EC2 Concepts Amazon Machine Image (AMI): Bootable root disk Pre-defined or user-built Catalog of user-built AMIs OS: Fedora, Centos, Gentoo, Debian, Ubuntu, Windows Server App Stack: LAMP, mpiBLAST, Hadoop Instance: Running copy of an AMI Launch in less than 2 minutes Start/stop programmatically Network Security Model: Explicit access control Security groups Inter-service bandwidth is free
  • 8. EBS Boot vs. S3 Boot S3 (original) Image copied from S3 to Ephemeral disks Lower IO charges during runtime Target: farm of identical machines EBS (newer) Auto Saving (sort of) Performance Ephemeral disks not used Potential higher IO charges Target: single machines Be certain you understand Shutdown & Termination and the ramifications of such
  • 9. Tooling Command Line Browser Plug-ins 3rd Party Tools Broad SDK Support AWS Management Console
  • 14.
  • 15.
  • 16.
  • 17.
  • 18.
  • 19.
  • 20.
  • 21.
  • 22.
  • 23.
  • 24.
  • 25.
  • 26.
  • 27.
  • 28.
  • 29.
  • 30. What Happened Incorrect Network Change == Replication Storm for EC2 “Affected Availability Zone” Actually affected *multiple* AZs (initially) "Each availability zone runs on its own physically distinct, independent infrastructure, and is engineered to be highly reliable. Common points of failures like generators and cooling equipment are not shared across Availability Zones. Additionally, they are physically separate, such that even extremely uncommon disasters such as fires, tornados or flooding would only affect a single Availability Zone."  http://aws.amazon.com/ec2/faqs/#How_isolated_are_Availability_Zones_from_one_another
  • 32. My AZ != Your AZ
  • 33. Fallout Survivors NetFlix (Chaos Monkey) SmugMug (Avoids EBS) Recovery.gov, Treasury.gov, others ShareThis Casualties Reddit, Foursquare, Quora, Hootsuite OpenEI.org
  • 34. Building Blocks for HA Use Elastic IP Addresses for consistent and re-mappable routes Use multiple Amazon EC2 Availability Zones Replicate data across multiple Azs Example: Amazon RDS in Multi-AZ mode Use Amazon EBS for persistent file systems Take EBS snapshots and use S3 for backup
  • 35. Build Loosely-Coupled Systems Use independent components Design everything as a black box Load balance and scale clusters Think about graceful degradation Use queues to isolate components
  • 36. Articles of Interest Amazon: http://aws.amazon.com/message/65648/ ShareThis: http://blog.sharethis.com/2011/04/27/aws-outage-sharethis-survives/ http://tipsforsocialmedia.blogspot.com/2011/04/amazon-ec2-troubles-bring-down-reddit.html EC2 Disabled http://ec2disabled.com/ Medical Malpractice https://forums.aws.amazon.com/thread.jspa?threadID=65649 NetFlix http://techblog.netflix.com/2011/04/lessons-netflix-learned-from-aws-outage.html http://techblog.netflix.com/2010/12/5-lessons-weve-learned-using-aws.html
  • 39. Forensic Toolkit 3 Cloud Formation Define deployment environment Bill on Behalf Of Selectable Instance Size
  • 40. Challenge – What to do with mounds of data? What is in there? Are there any threats? What am I missing? How do I connect the “dots”? How do I find the relevant information I need?
  • 41. Trees Forest Can’t See the for the Traditionally, search methods are used to find information at high volume levels But, those methods won’t get you here easily
  • 42. Keyword Methods Document 1 The Army needs sensor technology to help find improvised explosive devices Vector Space Model Term List Army Sensor Technology Help Find Improvise Explosive Device ORNL develop homeland Defense Mitre won contract Weight Terms Document 2 ORNL has developed sensor technology for homeland defense Document 3 Mitre has won a contract to develop homeland defense sensors for explosive devices An index into the document list Term Frequency – Inverse Document Frequency
  • 43. Textual Clustering Vector Space Model Cluster Analysis Similarity Matrix D1 D2 D3 Documents to Documents Most similar documents TFIDF Euclidean distance Time Complexity O(n2Log n)
  • 44. Example: Sign of the Crescent1 41 Short intelligence reports about a multi-prong terrorist attack Example: Report Date: 1 April, 2003. FBI: Abdul Ramazi is the owner of the Select Gourmet Foods shop in Springfield Mall, Springfield, VA. [Phone number 703-659-2317]. First Union National Bank lists Select Gourmet Foods as holding account number 1070173749003. Six checks totaling $35,000 have been deposited in this account in the past four months and are recorded as having been drawn on accounts at the Pyramid Bank of Cairo, Egypt and the Central Bank of Dubai, United Arab Emirates. Both of these banks have just been listed as possible conduits in money laundering schemes 1Intelligence Analysis Case Study by F. J. Hughes, Joint Military Intelligence College
  • 45. Piranha Cluster View Report Date: 1 April, 2003. FBI: Abdul Ramazi is the owner of the Select Gourmet Foods shop in Springfield Mall, Springfield, VA. [Phone number 703-659-2317]. First Union National Bank lists Select Gourmet Foods as holding account number 1070173749003. Six checks totaling $35,000 have been deposited in this account in the past four months and are recorded as having been drawn on accounts at the Pyramid Bank of Cairo, Egypt and the Central Bank of Dubai, United Arab Emirates. Both of these banks have just been listed as possible conduits in money laundering schemes
  • 46. Term network with document links 1) Report Date: 1 April, 2003. FBI: Abdul Ramaziis the owner of the Select Gourmet Foods shop in Springfield Mall, Springfield, VA. [Phone number 703-659-2317]. First Union National Bank lists Select Gourmet Foods as holding account number 1070173749003. Six checks totaling $35,000 have been deposited in this account in the past four months and are recorded as having been drawn on accounts at the Pyramid Bank of Cairo, Egypt and the Central Bank of Dubai, United Arab Emirates. Both of these banks have just been listed as possible conduits in money laundering schemes.
  • 47. Split Tree Over Nodes/Queues
  • 49.
  • 50.
  • 51.
  • 53.
  • 54. Topics Queue Interactions Blob Interactions Simple DB Interactions
  • 55. Q & A rob@gillenfamily.net http://rob.gillenfamily.net Please Rate This Talk: http://spkr8.com/t/7409