2011
DOI: 10.1007/978-3-642-20305-3_6
|View full text |Cite
|
Sign up to set email alerts
|

Monitoring of Tunneled IPv6 Traffic Using Packet Decapsulation and IPFIX (Short Paper)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
3
2

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(6 citation statements)
references
References 10 publications
0
6
0
Order By: Relevance
“…To perform a thorough inspection of tunneled traffic, we need to decapsulate packet headers of inner packets. We use the same flow-based framework as in [7] which has been further modified [8] to extract more detailed information from tunneled data. The main part of the framework is a plug-in which replaces input and processing parts of existing flow generator INVEA FlowMon Exporter [10].…”
Section: Methodology and Measurement Setupmentioning
confidence: 99%
See 1 more Smart Citation
“…To perform a thorough inspection of tunneled traffic, we need to decapsulate packet headers of inner packets. We use the same flow-based framework as in [7] which has been further modified [8] to extract more detailed information from tunneled data. The main part of the framework is a plug-in which replaces input and processing parts of existing flow generator INVEA FlowMon Exporter [10].…”
Section: Methodology and Measurement Setupmentioning
confidence: 99%
“…The overall statistics of IPv6 and tunneled traffic are mentioned. We provide a historical comparison to our previous measurement [7].…”
Section: Evaluation Of Ipv6 Adoptionmentioning
confidence: 99%
“…As studies closely related to this research, we introduce studies on observing and classifying traffic [1,2,6,[9][10][11][12][13][14][15], anomaly detection based primarily on traffic analysis [16][17][18][19][20][21][22][23][24][25][26][27][28][29][30], and traffic generation [31][32][33][34][35][36][37][38][39]. The taxonomy of traffic measurements and time-series traffic analyses, which are particularly relevant to this study, is presented in Table I.…”
Section: Related Workmentioning
confidence: 99%
“…To perform a thorough inspection of tunneled traffic of the IPv6 transition mechanisms, we need to decapsulate packet headers of inner packets. In [2], we extend the approach described in [19] and modify it to extract more detailed information from tunneled data. Resulting IP flow records provide us with information about the encapsulated source and destination addresses, ports and transport protocol, which is a common five-tuple used to distinguish individual flows.…”
Section: A Network Traffic Tunnelingmentioning
confidence: 99%