Proceedings of the 2007 SIGCOMM Workshop on Internet Network Management 2007
DOI: 10.1145/1321753.1321769
|View full text |Cite
|
Sign up to set email alerts
|

Towards real-time performance monitoring for encrypted traffic

Abstract: IP networks are increasingly carrying mission-critical applications with robust end-to-end network performance and reliability requirements. Network performance monitoring forms an essential component of critical IP network management functions such as troubleshooting, anomaly detection, and Service-Level-Agreement (SLA) compliance monitoring. However, privacy and security considerations are fueling the use of IP-level encryption techniques such as IPsec, which obscure important transport layer features that e… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2013
2013
2017
2017

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 14 publications
(10 reference statements)
0
2
0
Order By: Relevance
“…IPSec consists of a set of security protocols that provide security services for applications that use the Internet Protocol (IP) [1]. These protocols guarantee the secure transmission of data between systems in a networked environment.…”
Section: Secure Socketsmentioning
confidence: 99%
See 1 more Smart Citation
“…IPSec consists of a set of security protocols that provide security services for applications that use the Internet Protocol (IP) [1]. These protocols guarantee the secure transmission of data between systems in a networked environment.…”
Section: Secure Socketsmentioning
confidence: 99%
“…When the ciphertext reach their destination, then people use the same or different means to recover the original message. IP-level encryption involves using network-level features like packet size and interpacket timing to infer specific timing events, and aggregating measurements across short time intervals and related connections to derive final RTT estimates for network paths of interest [6] [1]. Encryption techniques has made the development of real-time secure transport system a breakthrough with the improvements of computer's performance and processing capacity in recent years.…”
Section: Introductionmentioning
confidence: 99%