A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2005; you can also visit the original URL.
The file type is application/pdf
.
Filters
Using passive traces of application traffic in a network monitoring system
Proceedings. 13th IEEE International Symposium on High performance Distributed Computing, 2004.
We are developing the Wren bandwidth monitoring tool, which uses packet traces of existing application traffic to measure available bandwidth. ...
In this paper, we demonstrate that the principles supporting active bandwidth tools can be applied to passive traces of the LAN and WAN traffic generated by high-performance grid applications. ...
Acknowledgments We thank those who allowed us to use their hosts as platforms for our experiments: Nancy Miller (CMU), Brian Tierney (LBL), Kees Verstoep, Thilo Kielman and Andrew Tanenbaum (Vrije Universiteit ...
doi:10.1109/hpdc.2004.1323495
fatcat:qkfr7roumjgplgqgzq4h73yfsy
An Open Tracing System for P2P File Sharing Systems
2007
Second International Conference on Internet and Web Applications and Services (ICIW'07)
This paper describes the Open P2P tracing system which aims to improve the research community's understanding of P2P file sharing systems by providing continuous and up-todate traffic data which is anonymized ...
It is our hope that this open data set will grow over time into a resource capable of exposing trends in P2P network usage and promote research into the socio-technical factors that drive user behaviour ...
By connecting to the network as a Gnutella 'ultra-peer', a Direct Connect 'hub' or eDonkey 'server', a greater proportion of traffic can be captured using passive application-level monitoring. ...
doi:10.1109/iciw.2007.16
dblp:conf/iciw/HughesWL07
fatcat:bk3mgh7g7rgrxgkw6txorhlvga
Applying Principles of Active Available Bandwidth Algorithms to Passive TCP Traces
[chapter]
2005
Lecture Notes in Computer Science
In this paper, we describe our implementation of available bandwidth analysis using passive traces of TCP traffic and evaluate our approach using bursty traffic on a 100 Mb testbed. ...
As part of the Wren bandwidth monitoring tool, we are developing techniques that use single-sided packet traces of existing application traffic to measure available bandwidth. ...
To achieve the necessary accuracy and avoid intrusiveness, our passive monitoring system uses the Wren packet trace facility [3] to collect kernel-level traces of application traffic and analyzes the ...
doi:10.1007/978-3-540-31966-5_28
fatcat:jlrpu7qxsbfd3jthc2k5lzable
Tracking application network performance in home gateways
2013
2013 9th International Wireless Communications and Mobile Computing Conference (IWCMC)
In particular we study the feasibility of application performance tracking on home gateways, which involves both identification of active applications and monitoring their performance. ...
In this paper we outline an application performance optimization approach for home networks. ...
In the following we explain each module of this system in more detail: • Traffic Monitor, this module is composed of a modified version of the BISMark-passive [25] function to perform passive traffic ...
doi:10.1109/iwcmc.2013.6583719
dblp:conf/iwcmc/RegganiST13
fatcat:hw74nz56tnfo5c2jcuxf5vjxb4
A Robust Classifier for Passive TCP/IP Fingerprinting
[chapter]
2004
Lecture Notes in Computer Science
our Traces (YMMV)
-In Packet Traces, Distinguish Effects due to OS from Network Path -Intrusion Detection Systems [Taleck 03] -Serving OS-Specific Content• Fingerprinting a Section of the Network: Inferring ...
Background • Objective: Identify Properties of a Remote System over the Network • Grand Vision: Passively Determine TCP Implementation in Real Time [Paxson 97]
• Windows Dominates Hosts, but Linux hosts ...
doi:10.1007/978-3-540-24668-8_16
fatcat:wdeq7e2uqzf6diampoqb7a6pmi
Improving the Performance of Passive Network Monitoring Applications using Locality Buffering
2007
Proceedings of the ... International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems
In this paper, we present a novel approach for improving the performance of a large class of CPU and memory intensive passive network monitoring applications, such as intrusion detection systems, traffic ...
Our experimental evaluation shows that locality buffering improves significantly the performance of popular applications, such as the Snort IDS, which exhibits a 40% increase in the packet processing throughput ...
While passive monitoring has been traditionally used for relatively simple network traffic measurement and analysis applications, or just for gathering packet traces that are analyzed off-line, in recent ...
doi:10.1109/mascots.2007.28
dblp:conf/mascots/PapadogiannakisAPM07
fatcat:jhh77eadazfsfgu23hw7hs7kju
Packet-level traffic measurements from the sprint IP backbone
2003
IEEE Network
In this paper we describe a passive monitoring system designed to capture GPS synchronized packet level traffic measurements on OC-3, OC-12, and OC-48 links. ...
We present a set of results to both demonstrate the strength of the system and identify recent changes in Internet traffic characteristics. ...
RELATED WORK The challenges in designing a monitoring system for a comprehensive view of the network performance are (i) the collection of detailed traffic statistics, including application mixes and traffic ...
doi:10.1109/mnet.2003.1248656
fatcat:mul7n3jhdrh75eb6rpnuguee74
Reliable Network Traffic Collection for Network Characterization and User Behavior
2013
International Journal of Advanced Computer Science and Applications
The key contribution is to produce an accurate, reliable and high fidelity traffic traces as the valuable source of information in the passive traffic analysis approach. ...
The proposed facility can run without stop for long time instead of one-shot periods, therefore, it can be used to draw a complete picture of network traffic that fully characterize the network and user ...
ACKNOWLEDGEMENT The initial design and implementation of this work has been conducted in the laboratory of NetCom, Universitat Pompeu Fabra, Barcelona, Spain. ...
doi:10.14569/ijacsa.2013.040241
fatcat:siyqrwvh3jazvmjz2qukbaqzga
Improving the performance of passive network monitoring applications with memory locality enhancements
2012
Computer Communications
Passive network monitoring is the basis for a multitude of systems that support the robust, efficient, and secure operation of modern computer networks. ...
This leads to a growing demand for more efficient passive network monitoring systems in which runtime performance becomes a critical issue. ...
We thank the anonymous reviewers for their valuable feedback on earlier versions of this paper. ...
doi:10.1016/j.comcom.2011.08.003
fatcat:quhbapnp7fd23b7gxgpqwod4ea
Transparent Optimization of Grid Server Selection With Real-Time Passive Network Measurements
2006
2006 3rd International Conference on Broadband Communications, Networks and Systems
In this paper we introduce a monitoring grid services proxy, which transparently monitors network performance and selects between several replica service providers. ...
At the same time, the increased level of abstraction reduces the opportunities available to the application for optimizing its performance by monitoring the system. ...
This work was performed, in part, using computational facilities at the College of William and Mary which were enabled by grants from Sun Microsystems, the National Science Foundation, and Virginia's Commonwealth ...
doi:10.1109/broadnets.2006.4374425
dblp:conf/broadnets/ZangrilliL06
fatcat:hqmr2dyolzgnfbampwusxdr7r4
SMARTxAC: a passive monitoring and analysis system for high‐speed networks
2006
Campus-Wide Information Systems
As a result of such an experience, a new traffic monitoring and analysis system, called SMARTxAC, has been developed at CCABA in joint work with the Supercomputing Center of Catalonia (CESCA). ...
SMARTxAC is an always-on passive monitoring and analysis system that operates at gigabit speeds without packet loss. ...
Acknowledgements This work is supported in part by the Supercomputing Center of Catalonia (CESCA), under the SMARTxAC agreement, and by the Spanish Ministry of Science and Technology, under contract TIC2002 ...
doi:10.1108/10650740610704144
fatcat:ckoyup3jdvbjrkhdzqmvbg2vby
Consequently, we claim that augmenting endsystems with in-band monitoring, creating an overlay of real-time 'traffic sensors' will provide a more complete view of the network, support sophisticated network ...
Understanding the effect of the network on individual applications' end-to-end performance requires data only available in the end-systems actually hosting applications. ...
The core of Anemone is to leverage control of the end-system to monitor traffic entering and exiting the network, and to combine this with knowledge of the dynamic topology gathered by passive monitoring ...
doi:10.1145/1080173.1080184
dblp:conf/minenet/MortierIB05
fatcat:qk3x4poxj5g4ha5vqk5lkbenhu
LOBSTER: A European Platform for Passive Network Traffic Monitoring
2008
Proceedings of the 4th International ICST Conference on Testbeds and Research Infrastructures for the Development of Networks and Communities
In this paper we present a concerted European Effort to improve our understanding of the Internet through the LOBSTER passive network traffic monitoring infrastructure. ...
of researchers and system administrators into reaching a better understanding of the kind of traffic that flows through their networks. ...
In DiMAPI, each flow is associated with a scope that defines a set of monitoring interfaces which are collectively used for network traffic monitoring. ...
doi:10.4108/tridentcom.2008.3153
dblp:conf/tridentcom/AntoniadesTPUPS08
fatcat:6elfemwx4vgbjpv62ypll5pv2m
Evaluation of Compression of Remote Network Monitoring Data Streams
2008
NOMS Workshops 2008 - IEEE Network Operations and Management Symposium Workshops
In this paper we investigate the effects of compression on network monitoring data streams that are transmitted from distributed network sensors back to a central infrastructure. ...
Network monitoring and measurement is an invaluable tool for comprehending, analyzing, managing, and optimizing performance and security of networked systems. ...
We would also like to thank the anonymous reviewers for their comments which helped improve the quality of this paper. ...
doi:10.1109/nomsw.2007.20
fatcat:txjs7txeerczzn5xho6tqek62a
Experiences with a continuous network tracing infrastructure
2005
Proceeding of the 2005 ACM SIGCOMM workshop on Mining network data - MineNet '05
We describe our experience in deploying and maintaining a multi-user system for continuous trace collection at a large regional ISP. ...
In this paper we discuss the requirements, challenges, and design of an effective traffic monitoring infrastructure for network research. ...
Acknowledgements We would like to thank Jim Pepin, Walter Prue, and Sanford George of Los Nettos, and Garrick Staples and Brian Yamaguchi of USC, for helping with the tracing infrastructure. ...
doi:10.1145/1080173.1080181
dblp:conf/minenet/HussainBPHPB05
fatcat:t6czr456xre3zgsgykfcxaqjy4
« Previous
Showing results 1 — 15 out of 20,556 results