Tcpdump

14,000,000 Leading Edge Experts on the ideXlab platform

Scan Science and Technology

Contact Leading Edge Experts & Companies

Scan Science and Technology

Contact Leading Edge Experts & Companies

The Experts below are selected from a list of 633 Experts worldwide ranked by ideXlab platform

David Kotz - One of the best experts on this subject based on the ideXlab platform.

  • WiNMee 2010 Saluki: a High-Performance Wi-Fi Sniffing Program
    2012
    Co-Authors: Keren Tan, David Kotz
    Abstract:

    Abstract—Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over Tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone network was reduced to only 30 % of that in our previous implementation. In this paper, we introduce the design and the implementation details of this high-performance sniffing program, along with preliminary evaluation results. I

  • WiOpt - Saluki: A high-performance Wi-Fi sniffing program
    2010
    Co-Authors: Keren Tan, David Kotz
    Abstract:

    Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over Tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone network was reduced to only 30% of that in our previous implementation. In this paper, we introduce the design and the implementation details of this high-performance sniffing program, along with preliminary evaluation results.

  • Saluki: a High-Performance Wi-Fi Sniffing Program
    2010
    Co-Authors: Keren Tan, David Kotz
    Abstract:

    Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over Tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone network was reduced to only 30% of that in our previous implementation. In this paper, we introduce the design and the implementation details of this high-performance sniffing program, along with preliminary evaluation results.

Keren Tan - One of the best experts on this subject based on the ideXlab platform.

  • WiNMee 2010 Saluki: a High-Performance Wi-Fi Sniffing Program
    2012
    Co-Authors: Keren Tan, David Kotz
    Abstract:

    Abstract—Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over Tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone network was reduced to only 30 % of that in our previous implementation. In this paper, we introduce the design and the implementation details of this high-performance sniffing program, along with preliminary evaluation results. I

  • WiOpt - Saluki: A high-performance Wi-Fi sniffing program
    2010
    Co-Authors: Keren Tan, David Kotz
    Abstract:

    Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over Tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone network was reduced to only 30% of that in our previous implementation. In this paper, we introduce the design and the implementation details of this high-performance sniffing program, along with preliminary evaluation results.

  • Saluki: a High-Performance Wi-Fi Sniffing Program
    2010
    Co-Authors: Keren Tan, David Kotz
    Abstract:

    Building a campus-wide wireless LAN measurement system faces many efficiency, scalability and security challenges. To address these challenges, we developed a distributed Wi-Fi sniffing program called Saluki. Compared to our previous implementation and to other available sniffing programs, Saluki has the following advantages: (1) its small footprint makes it suitable for a resource-constrained Linux platform, such as those in commercial Wi-Fi access points; (2) the frame-capture rate increased more than three-fold over Tcpdump with minimal frame loss; (3) all traffic between this sniffer and the back-end server was secured using 128-bit encryption; and (4) the traffic load on the backbone network was reduced to only 30% of that in our previous implementation. In this paper, we introduce the design and the implementation details of this high-performance sniffing program, along with preliminary evaluation results.

Bernard P. Zeigler - One of the best experts on this subject based on the ideXlab platform.

  • Web Based Distributed Network Analyzer Using SES Over Service Oriented Architecture
    2013
    Co-Authors: Taekyu Kim, Chungman Seo, Bernard P. Zeigler
    Abstract:

    As the network uses, and especially the number of internet users, increases rapidly, an efficient system for managing large network traffic datasets becomes an important issue. Although there are several network traffic analysis tools such as Tcpdump, Ethereal, and other applications, these tools have weaknesses: limited size of files, command line execution, large memory and huge computational power requirement, and complications. In addition to these scalability limitations, both Tcpdump and Ethereal have a security issue. Files captured by these tools keep all the packet information such as IP addresses, port numbers, and packet sizes. As well as basic network traffic information, captured files contain secure information: user identification numbers (IDs) and passwords. Therefore, captured files should not allow to be leaked out. However, network analyses need to be performed outside target networks in some cases. The paper presents an approach to efficiently and quickly analyze large amount of network behaviors. This is achieved by applying System Entity Structure SES) theory. To speed up evaluation time, a webbased distributed simulation approach over Service Oriented Architecture (SOA) is applied. Discrete Event System Specification/Service Oriented Architecture (DEVS/SOA) is used to deploy workloads into multi-servers, increasing overall system performance. A web-based distributed simulation contains two fundamental processes: distributing and analyzing among loosely coupled models through message-passing methods. The distributed simulation

  • Web-based Distributed Network Analyzer using a System Entity Structure over a Service-oriented Architecture
    SIMULATION, 2009
    Co-Authors: Taekyu Kim, Chungman Seo, Bernard P. Zeigler
    Abstract:

    As a network’s uses, and especially the number of internet users, increases rapidly, an efficient system for managing large-network traffic datasets becomes an important issue. Although there are several network traffic analysis tools, such as Tcpdump, Ethereal, and other applications, these tools have weaknesses, namely the limited size of files, the use of command line execution, the large memory and huge computational power requirements. In addition to these scalability limitations, both Tcpdump and Ethereal have security issues. Files captured by these tools keep all of the packet information, such as internet protocol (IP) addresses, port numbers, and packet sizes. As well as basic network traffic information, the captured files contain secure information: user identification numbers (IDs) and passwords. Therefore, the captured files should not be allowed to be leaked out. However, network analyses need to be performed outside the target networks in some cases. This paper presents an approach to efficiently and quickly analyze a large number of network behaviors. This is achieved by applying System Entity Structure (SES) theory. To speed up evaluation time, a web-based distributed simulation approach over Service-oriented Architecture (SOA) is applied. Discrete Event System Specification/Service-oriented Architecture (DEVS/SOA) is used to deploy workloads into multi-servers, increasing overall system performance. A web-based distributed simulation contains two fundamental processes: distributing and analyzing among loosely coupled models through message-passing methods. The distributed simulation — allocating distributing models inside networks and assigning analyzing models outside networks — also allows the analysis of network behaviors out of networks while keeping important information secured.

  • Ontology/data engineering based distributed simulation over service oriented architecture for network behavior analysis
    2008
    Co-Authors: Bernard P. Zeigler, Taekyu Kim
    Abstract:

    As network uses increase rapidly and high quality-of-service (QoS) is required, efficient network managing methods become important. Many previous studies and commercial tools of network management systems such as Tcpdump, Ethereal, and other applications have weaknesses: limited size of files, command line execution, and large memory and huge computational power requirement. Researchers struggle to find fast and effective analyzing methods to save maintenance budgets and recover from systematic problems caused by the rapid increment of network traffic or intrusions. The main objective of this study is to propose an approach to deal with a large amount of network behaviors being quickly and efficiently analyzed. We study an ontology/data engineering methodology based network analysis system. We design a behavior, which represents network traffic activity and network packet information such as IP addresses, protocols, and packet length, based on the System Entity Structure (SES) methodology. A significant characteristic of SES, a hierarchical tree structure, enables systems to access network packet information quickly and efficiently. Also, presenting an automated system design is the secondary purpose of this study. Our approach shows adaptive awareness of pragmatic frames (contexts) and makes a network traffic analysis system with high throughput and a fast response time that is ready to respond to user applications. We build models and run simulations to evaluate specific purposes, i.e., analyzing network protocols use, evaluating network throughput, and examining intrusion detection algorithms, based on Discrete Event System Specification (DEVS) formalism. To study speed up, we apply a web-based distributed simulation methodology. DEVS/Service Oriented Architecture (DEVS/SOA) facilitates deploying workloads into multi-servers and consequently increasing overall system performance. In addition to the scalability limitations, both Tcpdump and Ethereal have a security issue. As well as basic network traffic information, captured files by these tools contain secure information: user identification numbers and passwords. Therefore, captured files should not allow to be leaked out. However, network analyses need to be performed outside target networks in some cases. The distributed simulation—allocating distributing models inside networks and assigning analyzing models outside networks—also allows analysis of network behaviors out of networks while keeping important information secured.

Taekyu Kim - One of the best experts on this subject based on the ideXlab platform.

  • Web Based Distributed Network Analyzer Using SES Over Service Oriented Architecture
    2013
    Co-Authors: Taekyu Kim, Chungman Seo, Bernard P. Zeigler
    Abstract:

    As the network uses, and especially the number of internet users, increases rapidly, an efficient system for managing large network traffic datasets becomes an important issue. Although there are several network traffic analysis tools such as Tcpdump, Ethereal, and other applications, these tools have weaknesses: limited size of files, command line execution, large memory and huge computational power requirement, and complications. In addition to these scalability limitations, both Tcpdump and Ethereal have a security issue. Files captured by these tools keep all the packet information such as IP addresses, port numbers, and packet sizes. As well as basic network traffic information, captured files contain secure information: user identification numbers (IDs) and passwords. Therefore, captured files should not allow to be leaked out. However, network analyses need to be performed outside target networks in some cases. The paper presents an approach to efficiently and quickly analyze large amount of network behaviors. This is achieved by applying System Entity Structure SES) theory. To speed up evaluation time, a webbased distributed simulation approach over Service Oriented Architecture (SOA) is applied. Discrete Event System Specification/Service Oriented Architecture (DEVS/SOA) is used to deploy workloads into multi-servers, increasing overall system performance. A web-based distributed simulation contains two fundamental processes: distributing and analyzing among loosely coupled models through message-passing methods. The distributed simulation

  • Web-based Distributed Network Analyzer using a System Entity Structure over a Service-oriented Architecture
    SIMULATION, 2009
    Co-Authors: Taekyu Kim, Chungman Seo, Bernard P. Zeigler
    Abstract:

    As a network’s uses, and especially the number of internet users, increases rapidly, an efficient system for managing large-network traffic datasets becomes an important issue. Although there are several network traffic analysis tools, such as Tcpdump, Ethereal, and other applications, these tools have weaknesses, namely the limited size of files, the use of command line execution, the large memory and huge computational power requirements. In addition to these scalability limitations, both Tcpdump and Ethereal have security issues. Files captured by these tools keep all of the packet information, such as internet protocol (IP) addresses, port numbers, and packet sizes. As well as basic network traffic information, the captured files contain secure information: user identification numbers (IDs) and passwords. Therefore, the captured files should not be allowed to be leaked out. However, network analyses need to be performed outside the target networks in some cases. This paper presents an approach to efficiently and quickly analyze a large number of network behaviors. This is achieved by applying System Entity Structure (SES) theory. To speed up evaluation time, a web-based distributed simulation approach over Service-oriented Architecture (SOA) is applied. Discrete Event System Specification/Service-oriented Architecture (DEVS/SOA) is used to deploy workloads into multi-servers, increasing overall system performance. A web-based distributed simulation contains two fundamental processes: distributing and analyzing among loosely coupled models through message-passing methods. The distributed simulation — allocating distributing models inside networks and assigning analyzing models outside networks — also allows the analysis of network behaviors out of networks while keeping important information secured.

  • Ontology/data engineering based distributed simulation over service oriented architecture for network behavior analysis
    2008
    Co-Authors: Bernard P. Zeigler, Taekyu Kim
    Abstract:

    As network uses increase rapidly and high quality-of-service (QoS) is required, efficient network managing methods become important. Many previous studies and commercial tools of network management systems such as Tcpdump, Ethereal, and other applications have weaknesses: limited size of files, command line execution, and large memory and huge computational power requirement. Researchers struggle to find fast and effective analyzing methods to save maintenance budgets and recover from systematic problems caused by the rapid increment of network traffic or intrusions. The main objective of this study is to propose an approach to deal with a large amount of network behaviors being quickly and efficiently analyzed. We study an ontology/data engineering methodology based network analysis system. We design a behavior, which represents network traffic activity and network packet information such as IP addresses, protocols, and packet length, based on the System Entity Structure (SES) methodology. A significant characteristic of SES, a hierarchical tree structure, enables systems to access network packet information quickly and efficiently. Also, presenting an automated system design is the secondary purpose of this study. Our approach shows adaptive awareness of pragmatic frames (contexts) and makes a network traffic analysis system with high throughput and a fast response time that is ready to respond to user applications. We build models and run simulations to evaluate specific purposes, i.e., analyzing network protocols use, evaluating network throughput, and examining intrusion detection algorithms, based on Discrete Event System Specification (DEVS) formalism. To study speed up, we apply a web-based distributed simulation methodology. DEVS/Service Oriented Architecture (DEVS/SOA) facilitates deploying workloads into multi-servers and consequently increasing overall system performance. In addition to the scalability limitations, both Tcpdump and Ethereal have a security issue. As well as basic network traffic information, captured files by these tools contain secure information: user identification numbers and passwords. Therefore, captured files should not allow to be leaked out. However, network analyses need to be performed outside target networks in some cases. The distributed simulation—allocating distributing models inside networks and assigning analyzing models outside networks—also allows analysis of network behaviors out of networks while keeping important information secured.

смирнов егор - One of the best experts on this subject based on the ideXlab platform.