2014
DOI: 10.1109/jsac.2014.2358831
|View full text |Cite
|
Sign up to set email alerts
|

Stream-Oriented Network Traffic Capture and Analysis for High-Speed Networks

Abstract: Abstract-Intrusion detection, traffic classification, and other network monitoring applications need to analyze the captured traffic beyond the network layer to allow for connection-oriented analysis, and achieve resilience to evasion attempts based on TCP segmentation. Existing network traffic capture frameworks, however, provide applications with raw packets and leave complex operations like flow tracking and TCP stream reassembly to application developers. This gap, between what applications need and what s… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2015
2015
2019
2019

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(9 citation statements)
references
References 29 publications
0
9
0
Order By: Relevance
“…For example, Woods proposed to use a shared memory to exchange network data packets between kernel space and user space in order to avoid a large number of replication and interrupt operations, thus improving packet capture efficiency [66]. Papsadogiannakis et al [30] introduced a technique called subzero packet copy that can avoid copying uninteresting packets across different memory areas and another technique named prioritized packet loss that can be adapted to overload conditions by dropping the packets with lower priority. Moreover, they proposed a streamoriented network monitoring library named Stream capture library (Scap) based on the proposed two technologies.…”
Section: B: Improved Libpcapmentioning
confidence: 99%
See 2 more Smart Citations
“…For example, Woods proposed to use a shared memory to exchange network data packets between kernel space and user space in order to avoid a large number of replication and interrupt operations, thus improving packet capture efficiency [66]. Papsadogiannakis et al [30] introduced a technique called subzero packet copy that can avoid copying uninteresting packets across different memory areas and another technique named prioritized packet loss that can be adapted to overload conditions by dropping the packets with lower priority. Moreover, they proposed a streamoriented network monitoring library named Stream capture library (Scap) based on the proposed two technologies.…”
Section: B: Improved Libpcapmentioning
confidence: 99%
“…The use of the underlying NIC is inevitable for any kinds of traffic capture technologies. Network cards and corresponding software applications can be customized in order to achieve special purposes [2], [26], [29], [30]. Unfortunately, the capturing tools relying on standard NICs have several limitations.…”
Section: F: Network Interface Cardmentioning
confidence: 99%
See 1 more Smart Citation
“…Even after polymerization, there are still millions of flow records. Though only dealing with flow data, a central point of an operator would generate millions of records per second which will reach 30 billion per day [10][11][12][13] . Therefore, how to capture and store high arriving speed of packets and streams in real time is a major challenge.…”
Section: High-performance Packet/flow Capture Technologiesmentioning
confidence: 99%
“…This is a usual technique which has also been used in other works [29]. Note that if two different connections, possibly from a reincarnation, have the same source and destination IP address and TCP ports, then it is not possible to associate each segment to each particular connection.…”
Section: Seq=1 Length=5mentioning
confidence: 99%