• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 11 - 20 of 1,404
Next 10 →

pktd: A Packet Capture and Injection Daemon

by Vern Paxson - In Proceedings of Passive and Active Measurement Workshop , 2003
"... Administrators can be highly reluctant to run foreign measurement tools on their hosts because (a) such tools frequently require privileged execution in order to trans-mit customized measurement packets and/or to passively capture network traffic, and (b) the administrators lack mechanisms to contro ..."
Abstract - Cited by 5 (1 self) - Add to MetaCart
Administrators can be highly reluctant to run foreign measurement tools on their hosts because (a) such tools frequently require privileged execution in order to trans-mit customized measurement packets and/or to passively capture network traffic, and (b) the administrators lack mechanisms

Libtrace: A Packet Capture and Analysis Library

by Shane Alcock, Perry Lorier, Richard Nelson
"... This paper introduces libtrace, an open-source software library for reading and writing network packet traces. Libtrace offers performance and usability enhancements compared to other libraries that are currently used. We describe the main features of libtrace and demonstrate how the libtrace progra ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
This paper introduces libtrace, an open-source software library for reading and writing network packet traces. Libtrace offers performance and usability enhancements compared to other libraries that are currently used. We describe the main features of libtrace and demonstrate how the libtrace

Wide Area Network Packet Capture and Analysis

by Proceedings Of The, Jon Meek, American Home, Products Corporation , 2000
"... Permission is granted for noncommercial reproduction of the work for educational or research purposes. ..."
Abstract - Add to MetaCart
Permission is granted for noncommercial reproduction of the work for educational or research purposes.

Packet Capturing Using the Linux Netfilter Framework

by Technische Universität München, Ivan Pronchev, Betreuer Dipl. inf, Fabian Schneider, Dipl. inf Holger Dreger , 2006
"... ..."
Abstract - Add to MetaCart
Abstract not found

The BSD Packet Filter: A New Architecture for User-level Packet Capture

by Steven Mccanney, Van Jacobsony , 1992
"... Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose work-stations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be ..."
Abstract - Add to MetaCart
Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose work-stations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can

© Universiti Teknologi Malaysia THE OPTIMIZATION OF STEPPING STONE DETECTION: PACKET CAPTURING STEPS

by Mohd Nizam Omar, Mohd Aizaini Maarof, Anazida Zainal , 2006
"... Abstract. This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection and r ..."
Abstract - Add to MetaCart
Abstract. This paper proposes an optimized packet capturing stone detection algorithm that can shorten the response time of overall response mechanism. The aim of the research is to improve the packet capturing step in stepping stone algorithm, thus, improve the response from overall detection

Full Packet Capture and Offline Analysis on 1 and 10 Gb Networks

by E. Anderson, M. Arlitt, E. Anderson, M. Arlitt , 2006
"... full packet capture, 10 Gb/s network, driverdump This paper describes our experiences with implementing and using a network monitor built with commodity hardware and open source software to collect contiguous, multi-day, full packet traces from 1 and 10 Gb/s networks. The length of the traces is pri ..."
Abstract - Cited by 10 (1 self) - Add to MetaCart
full packet capture, 10 Gb/s network, driverdump This paper describes our experiences with implementing and using a network monitor built with commodity hardware and open source software to collect contiguous, multi-day, full packet traces from 1 and 10 Gb/s networks. The length of the traces

Comparing and Improving Current Packet Capturing Solutions based on Commodity Hardware

by Lothar Braun, Er Didebulidze, Nils Kammenhuber, Georg Carle, Technische Universität München - in Proceedings of the 10th Annual Conference on Internet Measurement (IMC ’10 , 2010
"... Capturing network traffic with commodity hardware has become a feasible task: Advances in hardware as well as software have boosted off-the-shelf hardware to performance levels that some years ago were the domain of expensive specialpurpose hardware. However, the capturing hardware still needs to be ..."
Abstract - Cited by 15 (3 self) - Add to MetaCart
to be driven by a well-performing software stack in order to minimise or avoid packet loss. Improving the capturing stack of Linux and FreeBSD has been an extensively covered research topic in the past years. Although the majority of the proposed enhancements have been backed by evaluations, these have mostly

Performance Analysis of Packet Capture Methods in a 10 Gbps Virtualized Environment

by Michael J. Schultz, Patrick Crowley
"... Abstract—Network speeds are increasing and processor core counts rise while processor clock rates stagnate. This has led to both packet processing applications distributing their workload over several cores and virtualization of physical systems also using multiple cores. However, these two concepts ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
difference packet capture methods. We also discuss potential ideas to improve the performance of these virtual systems. Index Terms—network monitoring; performance evaluation; throughput; virtualization I.

Increasing the Efficiency of IDS Systems by Hardware Implementation of Packet Capturing

by Zeinab Latifi, Kamal Jamshidi, Ali Bohlooli
"... Abstract — Capturing is the first step in intrusion detection system (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements are not ..."
Abstract - Add to MetaCart
Abstract — Capturing is the first step in intrusion detection system (IDS). Having wire speed, omitting the OS from capturing process and no need for making a copy of packets from the system’s environment to the user’s environment are some of the system characteristics. If these requirements
Next 10 →
Results 11 - 20 of 1,404
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University