메뉴 건너뛰기




Volumn 35, Issue 1, 2012, Pages 129-140

Improving the performance of passive network monitoring applications with memory locality enhancements

Author keywords

Intrusion detection systems; Locality buffering; Packet capturing; Passive network monitoring

Indexed keywords

COMPLEX ANALYSIS; CPU RESOURCES; CPU TIME; CRITICAL ISSUES; DATA LOCALITY; EXPERIMENTAL EVALUATION; GROWING DEMAND; INTRUSION DETECTION SYSTEMS; LARGE CLASS; LOCALITY BUFFERING; MEMORY LOCALITY; MONITORING APPLICATIONS; NETFLOWS; NETWORK LINKS; NETWORK MONITORING; NETWORK MONITORING SYSTEMS; NETWORK PACKETS; PACKET CAPTURING; PACKET LOSS RATES; PACKET PROCESSING; PASSIVE MONITORING; PASSIVE NETWORK MONITORING; PORT NUMBERS; REORDERED PACKETS; RUNTIME PERFORMANCE; TRAFFIC CHARACTERIZATION; TRAFFIC RATE;

EID: 81255157603     PISSN: 01403664     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.comcom.2011.08.003     Document Type: Article
Times cited : (16)

References (31)
  • 7
    • 1542343677 scopus 로고    scopus 로고
    • lawrence Berkeley Laboratory, Berkeley, CA. (software available from)
    • S. McCanne, C. Leres, V. Jacobson, libpcap, lawrence Berkeley Laboratory, Berkeley, CA. (software available from ).
    • Libpcap
    • McCanne, S.1    Leres, C.2    Jacobson, V.3
  • 8
    • 81255155097 scopus 로고    scopus 로고
    • Inside the linux packet filter
    • G. Insolvibile Inside the linux packet filter Linux Journal 94 2002
    • (2002) Linux Journal , vol.94
    • Insolvibile, G.1
  • 22
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • A.V. Aho, and M.J. Corasick Efficient string matching: an aid to bibliographic search Communications of the ACM 18 1975 333 340
    • (1975) Communications of the ACM , vol.18 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 24
    • 81255155096 scopus 로고    scopus 로고
    • Tcpreplay, .
  • 31
    • 67650434654 scopus 로고    scopus 로고
    • An architecture for exploiting multi-core processors to parallelize network intrusion prevention
    • R. Sommer, V. Paxson, and N. Weaver An architecture for exploiting multi-core processors to parallelize network intrusion prevention Concurrency and Computation: Practice and Experience 21 10 2009 1255 1279
    • (2009) Concurrency and Computation: Practice and Experience , vol.21 , Issue.10 , pp. 1255-1279
    • Sommer, R.1    Paxson, V.2    Weaver, N.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.