2002
DOI: 10.1007/3-540-36199-5_10
|View full text |Cite
|
Sign up to set email alerts
|

Open Packet Monitoring on FLAME: Safety, Performance, and Applications

Abstract: Abstract. Packet monitoring arguably needs the flexibility of open architectures and active networking. In earlier work we have implemented FLAME, an open monitoring system, that balanced flexibility and safety while attempting to achieve high performance by combining the use of a type-safe language, lightweight run-time checks, and fine-grained policy restrictions. We seek to understand the range of applications, workloads, and traffic, for which a safe, open, traffic monitoring architecture is practical. To … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2003
2003
2014
2014

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 16 publications
(17 citation statements)
references
References 26 publications
0
17
0
Order By: Relevance
“…That is, a node cannot be actively "on the lookout" for an arbitrary number of viruses without adversely affecting its performance. (Some experimental measurements of such real-world limits are given in [4]). Edge-routers are more likely to be constrained by high packet rates, and therefore limited in the amount of scanning they can perform.…”
Section: State Of Nodesmentioning
confidence: 98%
“…That is, a node cannot be actively "on the lookout" for an arbitrary number of viruses without adversely affecting its performance. (Some experimental measurements of such real-world limits are given in [4]). Edge-routers are more likely to be constrained by high packet rates, and therefore limited in the amount of scanning they can perform.…”
Section: State Of Nodesmentioning
confidence: 98%
“…The formula of HASH value is calculated as: HASHKEY = SrcIP + SrcPort + DstIP + DstPort (1) HASHKEY = DstIP + DstPort + SrcIP + SrcPort (2) Since a session is a two-way communication between a pair of hosts, Therefore formula (1) and formula (2) can be mapped to the same table entry of HASH table. According to the HASH value, it can be recovery the data which belong to one session.…”
Section: Bmentioning
confidence: 99%
“…Finally, be delivered to the application protocol analysis module, According to the different application layer protocol. Analyze and resolve High-level application protocol data [2] [3][4].…”
Section: Bmentioning
confidence: 99%
“…In the SANE architecture, KeyNote was used to limit the privileges of network users and their mobile code, by specifying the operations such code was allowed to perform on any particular active node. KeyNote was used in a similar manner in the FLAME architecture [25][26][27], and to provide an economy for resources in an active network [28].…”
Section: Micropayments: Microchecks and Filetellermentioning
confidence: 99%