2013 IEEE 9th International Conference on Mobile Ad-Hoc and Sensor Networks 2013
DOI: 10.1109/msn.2013.95
|View full text |Cite
|
Sign up to set email alerts
|

Design and Research of Data Packets Transmission by Shared Memory Block Based on NDIS

Abstract: In the case of network applications become more common and computer network security issues become more prominent, intercepting and analyzing network packets is important. However, network environment traffic is large. How to intercept and analyze network packet effectively is a crucial issue. This paper research the process of NDIS intermediate driver capture packets in the Windows platform and propose a mode of shared memory blocks that transport data packets to the application layer software to analyze. Thi… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2023
2023

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 7 publications
0
1
0
Order By: Relevance
“…As the number of network subscribers and the scope of networks have increased, the economic benefits of data sharing have also grown. However, the expansion of the internet and computing technologies has led to an increase in challenges such as data snooping and hacking, where malicious attackers with hostile intentions towards certain data carry out harmful actions [10], [11]. These actions may include stealing or damaging the data, and therefore need to be prevented.…”
Section: Literature Reviewmentioning
confidence: 99%
“…As the number of network subscribers and the scope of networks have increased, the economic benefits of data sharing have also grown. However, the expansion of the internet and computing technologies has led to an increase in challenges such as data snooping and hacking, where malicious attackers with hostile intentions towards certain data carry out harmful actions [10], [11]. These actions may include stealing or damaging the data, and therefore need to be prevented.…”
Section: Literature Reviewmentioning
confidence: 99%