Proceedings of the Australasian Computer Science Week Multiconference 2016
DOI: 10.1145/2843043.2843047
|View full text |Cite
|
Sign up to set email alerts
|

A network forensics tool for precise data packet capture and replay in cyber-physical systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
12
0

Year Published

2016
2016
2023
2023

Publication Types

Select...
3
1
1

Relationship

0
5

Authors

Journals

citations
Cited by 12 publications
(12 citation statements)
references
References 7 publications
0
12
0
Order By: Relevance
“…In the group number column of Table 3, the left-hand side shows the result of the algorithms in [25], [26], [31], and the right-hand side shows those from our ITRM. The result shows that group [2] does not appear on the left-hand side because the value in group [0] is 68.2% (227847/333732) of the sum of the volume of the packet, which leads to the value in group [1] being much smaller than 111244 and group [2] is ''starved''. In contrast, ITRM aggregates the servers correctly into three groups.…”
Section: B Multi-way Number Partitioning Experimentsmentioning
confidence: 99%
See 1 more Smart Citation
“…In the group number column of Table 3, the left-hand side shows the result of the algorithms in [25], [26], [31], and the right-hand side shows those from our ITRM. The result shows that group [2] does not appear on the left-hand side because the value in group [0] is 68.2% (227847/333732) of the sum of the volume of the packet, which leads to the value in group [1] being much smaller than 111244 and group [2] is ''starved''. In contrast, ITRM aggregates the servers correctly into three groups.…”
Section: B Multi-way Number Partitioning Experimentsmentioning
confidence: 99%
“…Network traffic replay that can be used for any purpose in networking provides a powerful tool for network security experiments [1]- [4]. By capturing traffic from live networks and replaying it in a test environment, traffic replays can generate the background traffic in network testbeds [5]- [7] and reproduce real network scenarios in cyber ranges [8]- [12].…”
Section: Introductionmentioning
confidence: 99%
“…Network forensics also necessitates traffic data collection, since it can provide raw data to analyze and reveal valuable information [16]. For example, Parry et al [17] points out that any forensic investigator needs to have the ability to collect the required data and find important and critical information from collected data in order to understand an anomaly. Therefore, efficient data collection becomes the basis of network forensics.…”
Section: ) Network Forensicsmentioning
confidence: 99%
“…Data Acquisition and Generation (DAG) cards are data capture cards that were designed to capture network packets [17]. Normally, they are especially effective in capturing packets in large-scale high-speed networks.…”
Section: C: Dag Cardsmentioning
confidence: 99%
See 1 more Smart Citation