scholarly journals Pairing Wi-Fi and Bluetooth MAC addresses through passive packet capture

Author(s):  
Edoardo Longo ◽  
Alessandro E. C. Redondi ◽  
Matteo Cesana
Keyword(s):  
2013 ◽  
Vol 278-280 ◽  
pp. 946-949
Author(s):  
Hai Feng Guo

Proposed a way to UPD flow and UPD system ideology. The system is considered the one-way characteristics of UDP flow in the backbone of the network, used the WinPcap packet capture technology. The system including network packet captures module, packet replay module, packets spell flow module, UDP analysis module, while using the map template classes in stl, improved the performance of UDP packets through a comparison function with efficient custom;Contrast to the data characteristics under the complex network environment, the system adopts the step-by-step small tools design way to facilitate the system to expand new analysis function. Through the three sets of data : a backbone data sets and two DARPA1999 data sets, it can be seen that the overall development of UDP data flow is expanding the network bandwidth , and small UDP flows is more.The quicker network bandwidth development, the shorter the UDP flows average time.


2000 ◽  
Vol 10 (03n04) ◽  
pp. 159-171
Author(s):  
KHAIRI ASHOUR MOHAMED ◽  
LÁSZLÓ PAP

This paper is concerned with the performance analysis of frequency-hopped packet radio networks with random spatial distribution of users. Depending on their relative energies, hits may either cause errors, erasures, or be ineffective. Combined error and erasure Reed Solomon decoding is used. Two types of hopping patterns are considered, namely random and one-coincidence patterns. Using a novel technique of the joint probability generating functions of the so called effective interference vectors, general closed form expressions for packet capture probabilities are derived. Numerical results indicate that, depending on the coding rate and traffic levels, larger values of the throughput can be achieved by using either error only or erasure only decoding.


Author(s):  
Chris Sanders ◽  
Jason Smith
Keyword(s):  

2017 ◽  
Vol 27 (03n04) ◽  
pp. 1750010 ◽  
Author(s):  
Amedeo Sapio ◽  
Mario Baldi ◽  
Fulvio Risso ◽  
Narendra Anand ◽  
Antonio Nucci

Traffic capture and analysis is key to many domains including network management, security and network forensics. Traditionally, it is performed by a dedicated device accessing traffic at a specific point within the network through a link tap or a port of a node mirroring packets. This approach is problematic because the dedicated device must be equipped with a large amount of computation and storage resources to store and analyze packets. Alternatively, in order to achieve scalability, analysis can be performed by a cluster of hosts. However, this is normally located at a remote location with respect to the observation point, hence requiring to move across the network a large volume of captured traffic. To address this problem, this paper presents an algorithm to distribute the task of capturing, processing and storing packets traversing a network across multiple packet forwarding nodes (e.g., IP routers). Essentially, our solution allows individual nodes on the path of a flow to operate on subsets of packets of that flow in a completely distributed and decentralized manner. The algorithm ensures that each packet is processed by n nodes, where n can be set to 1 to minimize overhead or to a higher value to achieve redundancy. Nodes create a distributed index that enables efficient retrieval of packets they store (e.g., for forensics applications). Finally, the basic principles of the presented solution can also be applied, with minimal changes, to the distributed execution of generic tasks on data flowing through a network of nodes with processing and storage capabilities. This has applications in various fields ranging from Fog Computing, to microservice architectures and the Internet of Things.


Author(s):  
Jana Uramova ◽  
Pavel Segec ◽  
Marek Moravcik ◽  
Jozef Papan ◽  
Tomas Mokos ◽  
...  
Keyword(s):  

2007 ◽  
Author(s):  
Kaori Maeda ◽  
Masahide Ishino ◽  
Eitaro Kohno ◽  
Takashi Kishida

Sign in / Sign up

Export Citation Format

Share Document