Analysis of methods and means of realization of packet filtering for deep analyz-ing of network packets
Keywords:
мережевий пакетний фільтр, аналіз трафіку, класифікація мережевої взаємодії, апаратний комплекс аналізуAbstract
The samples of usage of packet filters for tasks of prioritizing certain types of network traffic in order to maintain service layer arguments on high level are described in the paper. The possibility of application of open software for implementation of the same aims is estimated.References
1. OpenDPI — carrier-grade DPI bandwidth management solutions, 2011 / [Електронний ресурс]. — Режим доступу :
http://www.ipoque.com/en/news-events/press-center/press-releases/2010/ipoque-open-kick-off-ipoque%E2%80%99s-open-source-dpi.
2. Hummel S. Network Performance and Optimization Guide: The Essential Network Performance / S. Hummel // CreateSpace
Independent Publishing. — Toronto, October 26, 2013. — Р. 111—113.
3. Network Processor Design / [H. Haldun, A. Mark, Z. Peter, P. Crowley] // Issues and Practices, Volume. — October 18,
2002. — Р. 21—25.
4. Burin W. A General Approach for Efficiently Accelerating Software-based Dynamic Filters / W. Burin // Proc. 19th Network
and Distributed System Security Symposium (NDSS). — San Diego, CA, USA, February 2012. — Р. 37—38.
5. Jeremy C. The Openbsd Pf Packet Filter / С. Jeremy // Reed Media Services — New–York, August 18, 2006. — Р. 12—16.
6. O'Neill T. Use Packet Filtering to Monitor 10 Gigabit Networks with Gigabit Tools / T. O'Neill // Alastair Hartrup, July
28, 2008. — Р. 55—59.
7. Serpanos D. Architecture of Network Systems Computer / D. Serpanos, W. Tilman // Security Magazine, February 2,
2011. — Р. 44—45.
8. Varghese G. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices / G. Varghese //
Security Magazine, December 29, 2004. — Р. 91—96.
9. Yang B. Packet classification algorithms: From theory to practice, Proc. / B. Yang, Y. Xue, J. Li // INFOCOM, 2009. —
Р. 11—15.
10. KVM : The linux virtual machine monitor / [A. Kivity, Y. Kamay, D. Laor, U. Lublin] // Linux Symposium, Magazine,
2007. — Р. 56—61.
11. Martin L. Programming with libpcap — sniffing the network from our own application, Hakin / L. Martin // Computer
Security Magazine, 2008. — Р. 66—71.
12. Moore A. Architecture of a network monitor / A. Moore, J. Hall // PAM’03, 2003. — Р. 9—11.
http://www.ipoque.com/en/news-events/press-center/press-releases/2010/ipoque-open-kick-off-ipoque%E2%80%99s-open-source-dpi.
2. Hummel S. Network Performance and Optimization Guide: The Essential Network Performance / S. Hummel // CreateSpace
Independent Publishing. — Toronto, October 26, 2013. — Р. 111—113.
3. Network Processor Design / [H. Haldun, A. Mark, Z. Peter, P. Crowley] // Issues and Practices, Volume. — October 18,
2002. — Р. 21—25.
4. Burin W. A General Approach for Efficiently Accelerating Software-based Dynamic Filters / W. Burin // Proc. 19th Network
and Distributed System Security Symposium (NDSS). — San Diego, CA, USA, February 2012. — Р. 37—38.
5. Jeremy C. The Openbsd Pf Packet Filter / С. Jeremy // Reed Media Services — New–York, August 18, 2006. — Р. 12—16.
6. O'Neill T. Use Packet Filtering to Monitor 10 Gigabit Networks with Gigabit Tools / T. O'Neill // Alastair Hartrup, July
28, 2008. — Р. 55—59.
7. Serpanos D. Architecture of Network Systems Computer / D. Serpanos, W. Tilman // Security Magazine, February 2,
2011. — Р. 44—45.
8. Varghese G. Network Algorithmics: An Interdisciplinary Approach to Designing Fast Networked Devices / G. Varghese //
Security Magazine, December 29, 2004. — Р. 91—96.
9. Yang B. Packet classification algorithms: From theory to practice, Proc. / B. Yang, Y. Xue, J. Li // INFOCOM, 2009. —
Р. 11—15.
10. KVM : The linux virtual machine monitor / [A. Kivity, Y. Kamay, D. Laor, U. Lublin] // Linux Symposium, Magazine,
2007. — Р. 56—61.
11. Martin L. Programming with libpcap — sniffing the network from our own application, Hakin / L. Martin // Computer
Security Magazine, 2008. — Р. 66—71.
12. Moore A. Architecture of a network monitor / A. Moore, J. Hall // PAM’03, 2003. — Р. 9—11.
Downloads
-
PDF (Українська)
Downloads: 235
Abstract views: 120
How to Cite
[1]
K. S. Dieiev and Y. V. Boiko, “Analysis of methods and means of realization of packet filtering for deep analyz-ing of network packets”, Вісник ВПІ, no. 6, pp. 84–90, Dec. 2014.
Issue
Section
Information technologies and computer sciences
License
Authors who publish with this journal agree to the following terms:
- Authors retain copyright and grant the journal right of first publication.
- Authors are able to enter into separate, additional contractual arrangements for the non-exclusive distribution of the journal's published version of the work (e.g., post it to an institutional repository or publish it in a book), with an acknowledgment of its initial publication in this journal.
- Authors are permitted and encouraged to post their work online (e.g., in institutional repositories or on their website) prior to and during the submission process, as it can lead to productive exchanges, as well as earlier and greater citation of published work (See The Effect of Open Access).