2012
DOI: 10.1145/2185376.2185382
|View full text |Cite
|
Sign up to set email alerts
|

Libtrace

Abstract: a c m s i g c o m m ABSTRACTThis paper introduces libtrace, an open-source software library for reading and writing network packet traces. Libtrace offers performance and usability enhancements compared to other libraries that are currently used. We describe the main features of libtrace and demonstrate how the libtrace programming API enables users to easily develop portable trace analysis tools without needing to consider the details of the capture format, file compression or intermediate protocol headers. W… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
6
0

Year Published

2013
2013
2023
2023

Publication Types

Select...
5
2
1

Relationship

1
7

Authors

Journals

citations
Cited by 43 publications
(6 citation statements)
references
References 3 publications
0
6
0
Order By: Relevance
“…Crypto-PAn [5] proposed by Fan et al is a prefix-preserving IP anonymization algorithms based on cryptography. It has been deployed, implemented, or extended by a wide range of NTA tools and services including CoralReef [32], FLAIM [33], NFDump [34], TCPmkpub [35], PktAnon [36], Libtrace [37], etc.…”
Section: Network Traffic Anonymizationmentioning
confidence: 99%
“…Crypto-PAn [5] proposed by Fan et al is a prefix-preserving IP anonymization algorithms based on cryptography. It has been deployed, implemented, or extended by a wide range of NTA tools and services including CoralReef [32], FLAIM [33], NFDump [34], TCPmkpub [35], PktAnon [36], Libtrace [37], etc.…”
Section: Network Traffic Anonymizationmentioning
confidence: 99%
“…The parameters that characterize the interference are the following: COD of the interference, interference TxRate, and interference frequency channel. All parameters are obtainable using the monitor mode of IEEE 802.11 interfaces [24] and packet tracing applications like libtrace [26] and tcpdump [27]. Extension to all Wi-Fi channels is feasible by periodic monitoring of all channels or by exploiting more WLAN interfaces at different locations of the network each operating on a single channel.…”
Section: Development Of the Modelmentioning
confidence: 99%
“…The interfaces are brought up to the monitor mode of the IEEE 802.11 standard [24] to accept all ongoing detectable packets. A packet sniffer application [26] is then executed to capture all packets. The radio tap header [24] of every received packet provides crucial physical and link layer parameters such as the RSSI, packet length, and transmission rate of the packet.…”
Section: Monitoring Of Wireless Environmentmentioning
confidence: 99%
“…The selected traffic trace was a continuous 10 days capture of residential DSL customer traffic from a New Zealand ISP (ISPDSL-1). The traffic trace was processed with the libtrace tool [209] to sample and split the traffic in 5 minute intervals, while measuring the average load in Mbps. Through this procedure eight traffic patterns were exported and were used to describe the load of a traffic demand for a 24 hour period.…”
Section: Simulation Environmentmentioning
confidence: 99%
“…The traffic demands were produced the same way as in [207]. Each traffic demand was constructed by traffic traces, which were captured from real DSL customer traffic of a New Zealand ISP [208] and then sampled with the libtrace tool [209] into 5 minute intervals. Each traffic demand randomly selected one of the produced samples, which were then multiplied by a randomized scale factor that was uniformly distributed between 0.2 and 1.2 to render each demand unique.…”
Section: Simulation Parametersmentioning
confidence: 99%