Results 11 - 20
of
1,404
pktd: A Packet Capture and Injection Daemon
- In Proceedings of Passive and Active Measurement Workshop
, 2003
"... Administrators can be highly reluctant to run foreign measurement tools on their hosts because (a) such tools frequently require privileged execution in order to trans-mit customized measurement packets and/or to passively capture network traffic, and (b) the administrators lack mechanisms to contro ..."
Abstract
-
Cited by 5 (1 self)
- Add to MetaCart
Administrators can be highly reluctant to run foreign measurement tools on their hosts because (a) such tools frequently require privileged execution in order to trans-mit customized measurement packets and/or to passively capture network traffic, and (b) the administrators lack mechanisms
Libtrace: A Packet Capture and Analysis Library
"... This paper introduces libtrace, an open-source software library for reading and writing network packet traces. Libtrace offers performance and usability enhancements compared to other libraries that are currently used. We describe the main features of libtrace and demonstrate how the libtrace progra ..."
Abstract
-
Cited by 3 (1 self)
- Add to MetaCart
This paper introduces libtrace, an open-source software library for reading and writing network packet traces. Libtrace offers performance and usability enhancements compared to other libraries that are currently used. We describe the main features of libtrace and demonstrate how the libtrace
Wide Area Network Packet Capture and Analysis
, 2000
"... Permission is granted for noncommercial reproduction of the work for educational or research purposes. ..."
Abstract
- Add to MetaCart
Permission is granted for noncommercial reproduction of the work for educational or research purposes.
The BSD Packet Filter: A New Architecture for User-level Packet Capture
, 1992
"... Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose work-stations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be ..."
Abstract
- Add to MetaCart
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose work-stations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can
© Universiti Teknologi Malaysia THE OPTIMIZATION OF STEPPING STONE DETECTION: PACKET CAPTURING STEPS
, 2006
"... Abstract. This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and r ..."
Abstract
- Add to MetaCart
Abstract. This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection
Full Packet Capture and Offline Analysis on 1 and 10 Gb Networks
, 2006
"... full packet capture, 10 Gb/s network, driverdump This paper describes our experiences with implementing and using a network monitor built with commodity hardware and open source software to collect contiguous, multi-day, full packet traces from 1 and 10 Gb/s networks. The length of the traces is pri ..."
Abstract
-
Cited by 10 (1 self)
- Add to MetaCart
full packet capture, 10 Gb/s network, driverdump This paper describes our experiences with implementing and using a network monitor built with commodity hardware and open source software to collect contiguous, multi-day, full packet traces from 1 and 10 Gb/s networks. The length of the traces
Comparing and Improving Current Packet Capturing Solutions based on Commodity Hardware
- in Proceedings of the 10th Annual Conference on Internet Measurement (IMC ’10
, 2010
"... Capturing network traffic with commodity hardware has become a feasible task: Advances in hardware as well as software have boosted off-the-shelf hardware to performance levels that some years ago were the domain of expensive specialpurpose hardware. However, the capturing hardware still needs to be ..."
Abstract
-
Cited by 15 (3 self)
- Add to MetaCart
to be driven by a well-performing software stack in order to minimise or avoid packet loss. Improving the capturing stack of Linux and FreeBSD has been an extensively covered research topic in the past years. Although the majority of the proposed enhancements have been backed by evaluations, these have mostly
Performance Analysis of Packet Capture Methods in a 10 Gbps Virtualized Environment
"... Abstract—Network speeds are increasing and processor core counts rise while processor clock rates stagnate. This has led to both packet processing applications distributing their workload over several cores and virtualization of physical systems also using multiple cores. However, these two concepts ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
difference packet capture methods. We also discuss potential ideas to improve the performance of these virtual systems. Index Terms—network monitoring; performance evaluation; throughput; virtualization I.
Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing
"... Abstract — Capturing is the first step in intrusion detection system (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements are not ..."
Abstract
- Add to MetaCart
Abstract — Capturing is the first step in intrusion detection system (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements
Results 11 - 20
of
1,404