13,306 Hits in 8.1 sec

From Active to Passive: Progress in Testing of Internet Routing Protocols [chapter]

Jianping Wu, Yixin Zhao, Xia Yin
Formal Techniques for Networked and Distributed Systems  
This paper presents our efforts to test Internet routing protocols with both the active testing and the passive testing.  ...  Meanwhile, a passive testing is introduced to test, analyze and manage routing protocols in production field, capable of performing the conformance test, the interoperability test and the performance test  ...  Another important advance is that the active testing and the passive testing are combined, which helps us in the effort to cover all features of routing protocols in our test.  ... 
doi:10.1007/0-306-47003-9_7 fatcat:57jaavn6o5g6hizfahp2lgld5a

Passively measuring TCP round-trip times

Stephen D. Strowes
2013 Communications of the ACM  
In some cases ICMP traffic is deprioritized, dropped completely, or routed over a different path to TCP traffic.  ...  This information, if utilized, carries some distinct operational advantages for services and applications: hosts do not need to launch out-of-band Internet Control Message Protocol (ICMP) echo requests  ...  By way of example, in Figure 1 , time progresses from top to bottom, and the horizontal lines indicate real-time incrementing (for example, in milliseconds).  ... 
doi:10.1145/2507771.2507781 fatcat:qcckcuwlczbg3ewhha7azs33ne

Passive IP Trace back using Border Gateway Protocol (BGP)

Many routed protocols like IP and IPv6 are responsible to transmit the data traffic across remote network.  ...  Another factor in allocating logical address is to identify the physical address of the host in the local network. It is mandatory to allocate the IP address to transmit the data in the network.  ...  Sassy Approach Our approach is a redux from the existing passive IP trace back. The routing protocol we are using here is BGP (Border Gateway protocol) [10] .  ... 
doi:10.35940/ijitee.i3247.0789s319 fatcat:x5t77ddpvbf4hiqp3h6fx4bnge

Passive visual fingerprinting of network attack tools

Gregory Conti, Kulsoom Abdullah
2004 Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security - VizSEC/DMSEC '04  
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attackers as well as the identifiable  ...  The techniques used are entirely passive in nature and virtually undetectable by the attackers.  ...  The views expressed in this article are those of the authors and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense  ... 
doi:10.1145/1029208.1029216 dblp:conf/vizsec/ContiA04 fatcat:kz4fivxqarfcpa3dfp5wn4zzlq

Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks [article]

Utz Nisslmueller, Klaus-Tycho Foerster, Stefan Schmid, Christian Decker
2020 arXiv   pre-print
In particular, we identify two threats, related to an active and a passive adversary.  ...  The second is a timing attack: the adversary discovers how close the destination of a routed payment actually is, by acting as a passive man-in-the middle and analyzing the time deltas between sent messages  ...  In particular, we consider the Lightning Network as a case study and present two attacks, an active one and a passive one.  ... 
arXiv:2003.00003v1 fatcat:omqermvee5bqhbdj2gho4lte6m

Passive Detection of Nat Routers and Client Counting [chapter]

Kenneth Straka, Gavin Manes
2006 IFIP Advances in Information and Communication Technology  
Network Address Translation (NAT) routers pose challenges to individuals and organizations attempting to keep untrusted hosts off their networks, especially with the proliferation of wireless NAT routers  ...  Residential NAT routers also create problems for Internet Service Provider (ISP) taps by law enforcement by concealing network clients behind cable or DSL modems.  ...  This progression is very similar to that of the client itself: it simply involves counting up from a relatively high port number as each new source port from a client is used.  ... 
doi:10.1007/0-387-36891-4_19 fatcat:44qhaq5n6rc3bhmlylm2nqyb2y

Passive internet measurement: Overview and guidelines based on experiences

Wolfgang John, Sven Tafvelin, Tomas Olovsson
2010 Computer Communications  
Due to its versatility, flexibility and fast development, the modern Internet is far from being well understood in its entirety.  ...  Technical issues range from handling the vast amounts of network data to timing and synchronization issues.  ...  Even if active measurement offers some possibilities that passive approaches cannot provide, in this paper only passive measurement is considered, which is best suitable for analysis of Internet backbone  ... 
doi:10.1016/j.comcom.2009.10.021 fatcat:uriasdlwuvbgfjmjpyonamskdy

Passive Optical Networks Progress: A Tutorial

Tomas Horvath, Petr Munster, Vaclav Oujezsky, Ning-Hai Bao
2020 Electronics  
For many years, passive optical networks (PONs) have received a considerable amount of attraction regarding their potential for providing broadband connectivity to almost every citizen, especially in remote  ...  PONs can also support a new class of applications, such as accurate time transfer or distributed fiber sensing and follow new trends in open networking.  ...  Acknowledgments: Tomas would like to give thanks to Ales Buksa for his support at the University in memorial.  ... 
doi:10.3390/electronics9071081 fatcat:zdyxeck7ubaazp7ismomo6gux4

Passive network forensics

John McHugh, Ron McLeod, Vagishwari Nagaonkar
2008 ACM SIGOPS Operating Systems Review  
SOSP 2007 offered opportunities to learn about the state of the art in systems research through Work-in-Progress (WiP) presentations and through a Poster Session.  ...  However after this point the shadow PC activities diverge from the usual PC behaviour.  ...  A virtual machine implementing SVA achieves these goals by using a novel approach that exploits properties of existing memory pools in the kernel and by preserving the kernel's explicit control over memory  ... 
doi:10.1145/1368506.1368520 fatcat:mux57vw23naevdz4qqxrkz52aq

A System for Neuromotor Based Rehabilitation on a Passive Robotic Aid

Marco Righi, Massimo Magrini, Cristina Dolciotti, Davide Moroni
2021 Sensors  
In this paper, we show how the combination of robotic technologies with progress in exergaming methodologies may lead to the creation of new rehabilitation protocols favoring motor re-learning.  ...  In the aging world population, the occurrence of neuromotor deficits arising from stroke and other medical conditions is expected to grow, demanding the design of new and more effective approaches to rehabilitation  ...  According to the clinical picture's severity, the therapy carried out with robotic devices involves different protocols (passive, active, or active-assisted movements) [16, 33] .  ... 
doi:10.3390/s21093130 pmid:33946361 fatcat:vnvnpz46lrdavaypvlgy7cd7be

Inline Data Integrity Signals for Passive Measurement [chapter]

Brian Trammell, David Gugelmann, Nevil Brownlee
2014 Lecture Notes in Computer Science  
In passive network measurement, the quality of an observed traffic stream is obviously crucial to the quality of the results.  ...  We evaluate this mechanism against controlled, induced error, and apply it to two data sets used in previous work.  ...  This work was materially supported by the European Commission though the Seventh Framework Grant Agreement mPlane (FP7-318627); no endorsement of the work by the Commission is implied. Many thanks  ... 
doi:10.1007/978-3-642-54999-1_2 fatcat:pdyqunvv7fdkbjr3s34g5f23du

Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks

Dongkyun Kim, Hong-Jong Jeong, C.K. Toh, Sutaek Oh
2009 IEEE Transactions on Vehicular Technology  
Generally, DAD schemes can be categorized into two classes: (a) active DAD and (b) passive DAD. In this paper, we focus on passive DAD schemes over ondemand ad hoc routing protocols.  ...  Efficient DAD (Duplicate Address Detection) schemes should be devised to provide each node with its unique address in the network.  ...  Since IP (Internet Protocol) is also used in MANETs, a unique IP address should be assigned to each node.  ... 
doi:10.1109/tvt.2009.2016208 fatcat:ko2zrxso6zci3ezx3tpby6ewom

Smart Tracking System for School Buses Using Passive RFID Technology to Enhance Child Safety

Khaled Shaaban, Abdelmoula Bekkali, Elyes Ben Hamida, Abdullah Kadri
2013 Journal of Traffic and Logistics Engineering  
To explore the technical feasibility of the proposed system, a set of tests were performed in the lab and with the public.  ...  This research tested the applicability of radio frequency identification (RFID) technology in tracking and monitoring children during their trip to and from school on school busses.  ...  Two types of RFID tags are in common usage: passive tags, which have no internal power supply and emit a radio frequency signal only in response to a query from a transponder, and active tags which are  ... 
doi:10.12720/jtle.1.2.191-196 fatcat:vdtlxcv7efhoxkhryvsko72gie

A machine learning approach to TCP state monitoring from passive measurements

Desta Haileselassie Hagos, Paal E. Engelstad, Anis Yazidi, Oivind Kure
2018 2018 Wireless Days (WD)  
We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines.  ...  We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines. Acknowledgements.  ...  tested, and from 85.6% to 95.4% in an emulated setting.  ... 
doi:10.1109/wd.2018.8361713 dblp:conf/wd/HagosEYK18 fatcat:hmeh7nfa7bbwxnncel5xnyytim

Achieving Sender Anonymity in Tor against the Global Passive Adversary

Francesco Buccafurri, Vincenzo De Angelis, Maria Francesca Idone, Cecilia Labrini, Sara Lazzaro
2021 Applied Sciences  
In this paper, we propose a new protocol extending Tor to achieve sender anonymity (and then relationship anonymity) in the most severe threat model, allowing a global passive adversary to monitor all  ...  The experimental validation shows that the price we have to pay in terms of network performance is tolerable.  ...  This paper considerably extends a work-in-progress paper [38] . Reference [38] just presented the rough idea underlying the protocol.  ... 
doi:10.3390/app12010137 fatcat:hgj3fmb44zaahlaaw7dz5hzuzm
« Previous Showing results 1 — 15 out of 13,306 results