2006
DOI: 10.1007/0-387-33406-8_34
|View full text |Cite
|
Sign up to set email alerts
|

Network Forensics on Packet Fingerprints

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
14
0

Year Published

2007
2007
2015
2015

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(14 citation statements)
references
References 8 publications
0
14
0
Order By: Relevance
“…We created our implementation of the HBF as an example of a current payload attribution method and include it in our comparisons in Section 5. The RBF's performance is comparable to that of the HBF and experimental results presented in [Cho et al 2006] show that RBF achieves low false positive rates only for small data reduction ratios (about 32:1).…”
Section: Attribution Systemsmentioning
confidence: 80%
See 3 more Smart Citations
“…We created our implementation of the HBF as an example of a current payload attribution method and include it in our comparisons in Section 5. The RBF's performance is comparable to that of the HBF and experimental results presented in [Cho et al 2006] show that RBF achieves low false positive rates only for small data reduction ratios (about 32:1).…”
Section: Attribution Systemsmentioning
confidence: 80%
“…The payload attribution methods presented in this section try to limit or completely eliminate (see Section 3.3) this negative effect. Alternative payload processing schemes, such as [Cho et al 2006;Gu et al 2007] perform partitioning of the payload at all possible starting offsets during the payload processing phase (which is basically similar to working on all n-grams of the payload) but it incurs a large overhead for processing speed and also storage requirements are multiplied.…”
Section: Methods For Payload Attributionmentioning
confidence: 99%
See 2 more Smart Citations
“…They introduced the idea of using Bloom filters to achieve a reduced size digest of the packet history which would support queries about whether any packet containing a certain payload excerpt has been seen; the reduction in data representation comes at the price of a manageable false positive rate in the queries. Subsequently a different group has offered a variant technique for the same problem [7].…”
Section: Introductionmentioning
confidence: 99%