21,056 Hits in 6.2 sec

The packer filter: an efficient mechanism for user-level network code

J. Mogul, R. Rashid, M. Accetta
1987 ACM SIGOPS Operating Systems Review  
The performance of user-level network code depends on the mechanism used to demultiplex received packets.  ...  Code to implement network protocols can be either inside the kernel of an operating system or in user-level processes.  ...  Acknowledgments Many people have used or worked on the packet filter implementation over the years; without their support and comments it would not be nearly as useful as it is.  ... 
doi:10.1145/37499.37505 fatcat:h3mmcj2ljfb3bh7cmmxxuirsgq

Pre-filters in-transit malware packets detection in the network

Ban Mohammed Khammas, Ismahani Ismail, M. N. Marsono
2019 TELKOMNIKA (Telecommunication Computing Electronics and Control)  
This network-based malware detection is achieved through a middle path for efficient processing of non-malware packets.  ...  The proposed technique has been tested and verified using multiple data sets (metamorphic malware, non-mutated malware, and UTM real traffic), this technique can detect most of malware packets in the network-based  ...  Figure 1 . 1 Mechanism of malware packet detected in the network Figure 2 . 2 Comparing the flow-level and packet-level detection capacity with and without metamorphic packets for day 1, day 2, and day  ... 
doi:10.12928/telkomnika.v17i4.12065 fatcat:ony4cgofqvbnxfbynq2jcz457q

Industrial Experience Report on the Formal Specification of a Packet Filtering Language Using the K Framework

Gurvan Le Guernic, Benoit Combemale, José A. Galindo
2017 Electronic Proceedings in Theoretical Computer Science  
This paper reports on an industrial experiment on using a tool-supported language specification framework (K) for the formal specification of the syntax and semantics of a filtering language having a complexity  ...  This experimentation aims at estimating, in a specific industrial setting, the difficulty and benefits of formally specifying a packet filtering language using a tool-supported formal approach.  ...  GPFL Context GPFL aims at expressing a wide variety of filters. Those filters can be placed at the level of network, interfaces, or even communication buses between electronic components.  ... 
doi:10.4204/eptcs.240.3 fatcat:jhhbu3ecgfhqdolcdfizltarra

Adaptive Early Packet Filtering for Defending Firewalls Against DoS Attacks

A. El-Atawy, E. Al-Shaer, T. Tran, R. Boutaba
2009 IEEE INFOCOM 2009 - The 28th Conference on Computer Communications  
An attacker with some information about the access-control list (ACL) deployed at a firewall or an intrusion detection and prevention system (IDS/IPS) can craft packets that will have maximum cost.  ...  Moreover, it is guaranteed that the technique will not add an overhead that will not be compensated by the gain in filtering time in the underlying filtering method.  ...  The technique is shown to provide an efficient filter for unwanted packets or easy to accept/reject packets based on the policy definition and the statistics of the incoming traffic.  ... 
doi:10.1109/infcom.2009.5062171 dblp:conf/infocom/El-AtawyATB09 fatcat:ocfptcxutzfzhlrgx3l36koaiu

The DARPA packet radio network protocols

J. Jubin, J.D. Tornow
1987 Proceedings of the IEEE  
In this paper we describe the current state of the DARPA packet radio network.  ...  Fully automated algorithms and protocols to organize, control, maintain, and move traffic through the packet radio network have been designed, implemented, and tested.  ...  ACKNOWLEDGMENT Many of our colleagues working on the packet radio program havecontributed to the ideas presented in this paper.  ... 
doi:10.1109/proc.1987.13702 fatcat:ua5scxqvt5hh3nawskadg3verq

Procuring the Anomaly Packets and Accountability Detection in the Network

V Laxman
2013 IOSR Journal of Computer Engineering  
Second, we model the most common protocols (IP, TCP, telnet, FTP, SMTP, HTTP) at the packet byte level to flag events (byte values) that have not been observed for a long time.  ...  First, we filter traffic to pass only the packets of most interest, e.g. the first few packets of incoming server requests.  ...  For each model, an anomaly score is computed, and the sum is assigned to the packet. The reason for modeling ports 0-255 is for ease of implementation.  ... 
doi:10.9790/0661-131134137 fatcat:mw4sfhchwjgf7hpjsxov3z5e2m

Dynamically extending the Corral with native code for high-speed packet processing

Herbert Bos, Bart Samwel, Ilja Booij
2006 Computer Networks  
We show how an active network environment was implemented and how this environment allows slow active code to control the code organisation of the fast path.  ...  Not only are active packets permitted to reconfigure predefined native components in the networking code, by using the safe programming model of the open kernel environment they are also able to load and  ...  Acknowledgements We are indebted to Lennert Buytenhek for helping to sort out some of the thornier issues in kernel hacking and Pieter Simoons for significantly improving the Corral code.  ... 
doi:10.1016/j.comnet.2006.04.019 fatcat:thfq3yhcrzgtlgi3pmu6iog5t4

Deep Packet Filtering Mechanism for Secure Internetworks

Hyun Woo Kim and Eun
2021 Turkish Journal of Computer and Mathematics Education  
In this paper, we propose a Deep Packet Filtering Mechanism (DPFM) to analyze and filter malicious data packets moving between network environments.  ...  In the past, research on filters to prevent malicious packets from entering the network by converting packets into data at the sending and receiving destinations and analyzing their purpose and maliciousness  ...  We propose Filter Mechanism (DPFM). DPFM analyzes the behavior of malicious packets on the network and extracts information about the network as a sequence.  ... 
doi:10.17762/turcomat.v12i6.1956 fatcat:cpvos7ec55ghvba5yf6fz2p47u

Design of the Ouroboros packet network [article]

Dimitri Staessens, Sander Vrijders
2020 arXiv   pre-print
complete model for the organization of -- and relationships between -- different mechanisms in a computer network.  ...  Recently, a recursive model for computer networks was proposed, which organizes networks in layers that conceptually provide the same mechanisms through a common interface.  ...  We would like to thank Francesco Salvestrini and Vincenzo Maffione for discussions on RINA and their invaluable insights into implementation and performance issues for network stacks.  ... 
arXiv:2001.09707v1 fatcat:a7rtz5oahrec5o27klf3hyuome

On the radio capacity of tdma and cdma for broadband wireless packet communications

S.V. Krishnamurthy, A.S. Acampora, M. Zorzi
2003 IEEE Transactions on Vehicular Technology  
users which can be admitted to the system while maintaining some desired Qualityof-Service level.  ...  The objective is to determine whether the capacity advantages claimed for circuit-switched CDMA still apply in a packet-switched environment, where the natural time diversity of bursty transmission may  ...  If there are p users in the network, each would transmit with an effective rate of d & d § d S e f q packets per frame.  ... 
doi:10.1109/tvt.2002.807230 fatcat:uvmorscwhnftpiqnkeb5wve7gy

Understanding GPRS: the GSM packet radio service

Brahim Ghribi, Luigi Logrippo
2000 Computer Networks  
The General Packet Radio Service (GPRS), a data extension of the mobile telephony standard GSM, is emerging as the first true packet-switched architecture to allow mobile subscribers to benefit from high-speed  ...  A high-level description of the GPRS system is given with emphasis on services and architectural aspects.  ...  Acknowledgment We are grateful to Motorola Canada and to NSERC for partial funding of this research, and to Laurent Andriantsiferana for many useful discussions.  ... 
doi:10.1016/s1389-1286(00)00127-4 fatcat:dy7iby7xqbayjpv7bskmq6ph24

The Token Based Switch: Per-Packet Access Authorisation to Optical Shortcuts [chapter]

Mihai-Lucian Cristea, Leon Gommans, Li Xu, Herbert Bos
2007 Lecture Notes in Computer Science  
TBS is fast and safe and uses the latest network processor generation (Intel IXP2850) and the Fairly Fast Packet Filter software framework.  ...  TBS helps high-performance computing and grid applications that require high bandwidth links between grid nodes to bypass the regular Internet for authorised packets by establishing shortcuts on network  ...  The authors wish to thank to Harry Wijshoff and Dejan Kostic for their feedback and Lennert Buytenhek for his advice and support.  ... 
doi:10.1007/978-3-540-72606-7_81 fatcat:fp5ojnvrijc43jg76k4jxvzugu

Building Covert Channels over the Packet Reordering Phenomenon

A. El-Atawy, E. Al-Shaer
2009 IEEE INFOCOM 2009 - The 28th Conference on Computer Communications  
New modes of communication have shown themselves to be needed for more secure and private types of data.  ...  In this paper, we propose using the packet reordering phenomenon as the media to carry a hidden channel.  ...  Evading detection will give hackers an edge and pushes detection mechanisms to their limit. Covert channels over network traffic has been around for years.  ... 
doi:10.1109/infcom.2009.5062143 dblp:conf/infocom/El-AtawyA09 fatcat:4szmpr5szrdqlnieyg5tdptcya

The Organization of Computer Resources into a Packet Radio Network

R. Kahn
1977 IRE Transactions on Communications Systems  
The packet radio network described in this paper is I) an extension of the basic Hawaii work to a geographically distributed system involving the use of repeaters to achieve area coverage beyond line of  ...  An overview of the packet radio system concept is given in this paper.  ...  Surface acoustic wave technology is a viable current choice for matched filtering in the receiver. 3) The provision of authentication and antispoof mechanisms. 4) The use of system protocols that include  ... 
doi:10.1109/tcom.1977.1093714 fatcat:cjjincuh7fdatfda6odhml5tkm

Design and implementation of a framework for creating portable and efficient packet-processing applications

Olivier Morandi, Fulvio Risso, Silvio Valenti, Paolo Veglia
2008 Proceedings of the 7th ACM international conference on Embedded software - EMSOFT '08  
It is a common belief that using a virtual machine for portable executions of data-plane packet-processing applications would introduce too many penalties in terms of performance, because of the assumed  ...  This paper describes the architecture of a runtime environment and a compiler infrastructure for the Network Virtual Machine (NetVM), showing that the portability of packetprocessing programs can be achieved  ...  ACKNOWLEDGEMENTS The authors wish to thank Marco Bergero and Pierluigi Rolando for the contribution they have given respectively in the development of the NetVM runtime environment and of the optimization  ... 
doi:10.1145/1450058.1450091 dblp:conf/emsoft/MorandiRVV08 fatcat:jleeuytcufafvllqfdkqbu7qfy
« Previous Showing results 1 — 15 out of 21,056 results