A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Filters
From Active to Passive: Progress in Testing of Internet Routing Protocols
[chapter]
Formal Techniques for Networked and Distributed Systems
This paper presents our efforts to test Internet routing protocols with both the active testing and the passive testing. ...
Meanwhile, a passive testing is introduced to test, analyze and manage routing protocols in production field, capable of performing the conformance test, the interoperability test and the performance test ...
Another important advance is that the active testing and the passive testing are combined, which helps us in the effort to cover all features of routing protocols in our test. ...
doi:10.1007/0-306-47003-9_7
fatcat:57jaavn6o5g6hizfahp2lgld5a
Passively measuring TCP round-trip times
2013
Communications of the ACM
In some cases ICMP traffic is deprioritized, dropped completely, or routed over a different path to TCP traffic. ...
This information, if utilized, carries some distinct operational advantages for services and applications: hosts do not need to launch out-of-band Internet Control Message Protocol (ICMP) echo requests ...
By way of example, in Figure 1 , time progresses from top to bottom, and the horizontal lines indicate real-time incrementing (for example, in milliseconds). ...
doi:10.1145/2507771.2507781
fatcat:qcckcuwlczbg3ewhha7azs33ne
Passive IP Trace back using Border Gateway Protocol (BGP)
2019
VOLUME-8 ISSUE-10, AUGUST 2019, REGULAR ISSUE
Many routed protocols like IP and IPv6 are responsible to transmit the data traffic across remote network. ...
Another factor in allocating logical address is to identify the physical address of the host in the local network. It is mandatory to allocate the IP address to transmit the data in the network. ...
Sassy Approach Our approach is a redux from the existing passive IP trace back. The routing protocol we are using here is BGP (Border Gateway protocol) [10] . ...
doi:10.35940/ijitee.i3247.0789s319
fatcat:x5t77ddpvbf4hiqp3h6fx4bnge
Passive visual fingerprinting of network attack tools
2004
Proceedings of the 2004 ACM workshop on Visualization and data mining for computer security - VizSEC/DMSEC '04
This paper examines the dramatic visual fingerprints left by a wide variety of popular network attack tools in order to better understand the specific methodologies used by attackers as well as the identifiable ...
The techniques used are entirely passive in nature and virtually undetectable by the attackers. ...
The views expressed in this article are those of the authors and do not reflect the official policy or position of the United States Military Academy, the Department of the Army, the Department of Defense ...
doi:10.1145/1029208.1029216
dblp:conf/vizsec/ContiA04
fatcat:kz4fivxqarfcpa3dfp5wn4zzlq
Toward Active and Passive Confidentiality Attacks On Cryptocurrency Off-Chain Networks
[article]
2020
arXiv
pre-print
In particular, we identify two threats, related to an active and a passive adversary. ...
The second is a timing attack: the adversary discovers how close the destination of a routed payment actually is, by acting as a passive man-in-the middle and analyzing the time deltas between sent messages ...
In particular, we consider the Lightning Network as a case study and present two attacks, an active one and a passive one. ...
arXiv:2003.00003v1
fatcat:omqermvee5bqhbdj2gho4lte6m
Passive Detection of Nat Routers and Client Counting
[chapter]
2006
IFIP Advances in Information and Communication Technology
Network Address Translation (NAT) routers pose challenges to individuals and organizations attempting to keep untrusted hosts off their networks, especially with the proliferation of wireless NAT routers ...
Residential NAT routers also create problems for Internet Service Provider (ISP) taps by law enforcement by concealing network clients behind cable or DSL modems. ...
This progression is very similar to that of the client itself: it simply involves counting up from a relatively high port number as each new source port from a client is used. ...
doi:10.1007/0-387-36891-4_19
fatcat:44qhaq5n6rc3bhmlylm2nqyb2y
Passive internet measurement: Overview and guidelines based on experiences
2010
Computer Communications
Due to its versatility, flexibility and fast development, the modern Internet is far from being well understood in its entirety. ...
Technical issues range from handling the vast amounts of network data to timing and synchronization issues. ...
Even if active measurement offers some possibilities that passive approaches cannot provide, in this paper only passive measurement is considered, which is best suitable for analysis of Internet backbone ...
doi:10.1016/j.comcom.2009.10.021
fatcat:uriasdlwuvbgfjmjpyonamskdy
Passive Optical Networks Progress: A Tutorial
2020
Electronics
For many years, passive optical networks (PONs) have received a considerable amount of attraction regarding their potential for providing broadband connectivity to almost every citizen, especially in remote ...
PONs can also support a new class of applications, such as accurate time transfer or distributed fiber sensing and follow new trends in open networking. ...
Acknowledgments: Tomas would like to give thanks to Ales Buksa for his support at the University in memorial. ...
doi:10.3390/electronics9071081
fatcat:zdyxeck7ubaazp7ismomo6gux4
Passive network forensics
2008
ACM SIGOPS Operating Systems Review
SOSP 2007 offered opportunities to learn about the state of the art in systems research through Work-in-Progress (WiP) presentations and through a Poster Session. ...
However after this point the shadow PC activities diverge from the usual PC behaviour. ...
A virtual machine implementing SVA achieves these goals by using a novel approach that exploits properties of existing memory pools in the kernel and by preserving the kernel's explicit control over memory ...
doi:10.1145/1368506.1368520
fatcat:mux57vw23naevdz4qqxrkz52aq
A System for Neuromotor Based Rehabilitation on a Passive Robotic Aid
2021
Sensors
In this paper, we show how the combination of robotic technologies with progress in exergaming methodologies may lead to the creation of new rehabilitation protocols favoring motor re-learning. ...
In the aging world population, the occurrence of neuromotor deficits arising from stroke and other medical conditions is expected to grow, demanding the design of new and more effective approaches to rehabilitation ...
According to the clinical picture's severity, the therapy carried out with robotic devices involves different protocols (passive, active, or active-assisted movements) [16, 33] . ...
doi:10.3390/s21093130
pmid:33946361
fatcat:vnvnpz46lrdavaypvlgy7cd7be
Inline Data Integrity Signals for Passive Measurement
[chapter]
2014
Lecture Notes in Computer Science
In passive network measurement, the quality of an observed traffic stream is obviously crucial to the quality of the results. ...
We evaluate this mechanism against controlled, induced error, and apply it to two data sets used in previous work. ...
This work was materially supported by the European Commission though the Seventh Framework Grant Agreement mPlane (FP7-318627); no endorsement of the work by the Commission is implied. Many thanks ...
doi:10.1007/978-3-642-54999-1_2
fatcat:pdyqunvv7fdkbjr3s34g5f23du
Passive Duplicate Address-Detection Schemes for On-Demand Routing Protocols in Mobile Ad Hoc Networks
2009
IEEE Transactions on Vehicular Technology
Generally, DAD schemes can be categorized into two classes: (a) active DAD and (b) passive DAD. In this paper, we focus on passive DAD schemes over ondemand ad hoc routing protocols. ...
Efficient DAD (Duplicate Address Detection) schemes should be devised to provide each node with its unique address in the network. ...
Since IP (Internet Protocol) is also used in MANETs, a unique IP address should be assigned to each node. ...
doi:10.1109/tvt.2009.2016208
fatcat:ko2zrxso6zci3ezx3tpby6ewom
Smart Tracking System for School Buses Using Passive RFID Technology to Enhance Child Safety
2013
Journal of Traffic and Logistics Engineering
To explore the technical feasibility of the proposed system, a set of tests were performed in the lab and with the public. ...
This research tested the applicability of radio frequency identification (RFID) technology in tracking and monitoring children during their trip to and from school on school busses. ...
Two types of RFID tags are in common usage: passive tags, which have no internal power supply and emit a radio frequency signal only in response to a query from a transponder, and active tags which are ...
doi:10.12720/jtle.1.2.191-196
fatcat:vdtlxcv7efhoxkhryvsko72gie
A machine learning approach to TCP state monitoring from passive measurements
2018
2018 Wireless Days (WD)
We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines. ...
We would like to thank the Research Infrastructure Services Group at the University of Oslo for the use of multicore cluster machines. Acknowledgements. ...
tested, and from 85.6% to 95.4% in an emulated setting. ...
doi:10.1109/wd.2018.8361713
dblp:conf/wd/HagosEYK18
fatcat:hmeh7nfa7bbwxnncel5xnyytim
Achieving Sender Anonymity in Tor against the Global Passive Adversary
2021
Applied Sciences
In this paper, we propose a new protocol extending Tor to achieve sender anonymity (and then relationship anonymity) in the most severe threat model, allowing a global passive adversary to monitor all ...
The experimental validation shows that the price we have to pay in terms of network performance is tolerable. ...
This paper considerably extends a work-in-progress paper [38] . Reference [38] just presented the rough idea underlying the protocol. ...
doi:10.3390/app12010137
fatcat:hgj3fmb44zaahlaaw7dz5hzuzm
« Previous
Showing results 1 — 15 out of 13,306 results