Packet capture

Results: 167



#Item
51Internet / Forwarding plane / Packet capture / Transmission Control Protocol / Firewall / Network address translation / Network packet / Internet Protocol / Packet Processing / Computer network security / Computing / Network architecture

I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks Nikhil Handigol† , Brandon Heller† , Vimalkumar Jeyakumar† , David Mazi`eres, Nick McKeown {nikhilh,brandonh}@cs.stanford.edu, {

Add to Reading List

Source URL: www.scs.stanford.edu

Language: English - Date: 2014-08-24 01:21:36
52Computer forensics / Security / FireEye /  Inc. / StorNext File System / Deep packet capture / Electronic commerce / Hierarchical storage management / Packet capture / Network forensics / Computing / Computer network security / Computer security

SOLUTION BRIEF FireEye and Quantum Combine ‘Flight Data Recorder’ for your Network with High-speed Scale-out Storage

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:10:57
53Computer forensics / Security / FireEye /  Inc. / StorNext File System / Deep packet capture / Electronic commerce / Hierarchical storage management / Packet capture / Network forensics / Computing / Computer network security / Computer security

SOLUTION BRIEF FireEye and Quantum Combine ‘Flight Data Recorder’ for your Network with High-speed Scale-out Storage

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-05-01 03:10:57
54Pcap / Packet capture / Transmission Control Protocol / GTK+ / Software / Computing / Computer network security

10 Gbit Line Rate Packet-to-Disk Using n2disk Background Storing the entire raw traffic is required for:

Add to Reading List

Source URL: infocom.di.unimi.it

Language: English - Date: 2013-04-29 06:32:34
55Cyberwarfare / Transmission Control Protocol / Firewall / Pcap / Packet capture / Tcpdump / Traffic flow / Denial-of-service attack / National Energy Research Scientific Computing Center / Software / Computer network security / Computing

Building a Time Machine for Efficient Recording and Retrieval of High-Volume Network Traffic Stefan Kornexl Vern Paxson Holger Dreger TU M¨unchen ICSI / LBNL TU M¨unchen Abstract There are times when it would be extrao

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2005-08-11 15:51:44
56Computing / OpenFlow / Malware / Packet capture / Threat / Firewall / Computer security / Computer network security / Cyberwarfare / Security

Stop Infections Inside the Network Perimeter FireSphere Threat Isolator, powered by the HP VAN SDN Controller Empowers global visibility and security with dynamic device isolation, internal packet capture and granular tr

Add to Reading List

Source URL: www.iboss.com

Language: English - Date: 2015-04-20 16:16:24
57System software / Berkeley Packet Filter / Firewall / Packet capture / Netfilter / Packet switching / Filter / Transmission Control Protocol / Packet Processing / Computing / Computer network security / Network architecture

Enhancing Network Intrusion Detection With Integrated Sampling and Filtering Jose M. Gonzalez and Vern Paxson International Computer Science Institute Berkeley, California, USA , / ve

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2006-07-08 02:15:00
58Network architecture / Network intrusion detection system / Denial-of-service attack / Intrusion detection system / Packet capture / Firewall / Router / Packet loss / Network forensics / Computer network security / Computing / Software

Enriching Network Security Analysis with Time Travel Gregor Maier Robin Sommer Holger Dreger

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-30 11:46:33
59Computing / Network intrusion detection system / Snort / Intrusion detection system / Pcap / Transmission Control Protocol / Packet analyzer / Traffic flow / Packet capture / Software / Computer network security / System software

Predicting the Resource Consumption of Network Intrusion Detection Systems Holger Dreger1 , Anja Feldmann2, Vern Paxson3,4 , and Robin Sommer4,5 1 Siemens AG, Corporate Technology 2 Deutsche Telekom Labs / TU Berlin 3 U

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-06-14 01:31:02
60Transmission Control Protocol / Packet Processing / Intrusion prevention system / Packet loss / Network switch / CPU cache / Snort / Network processor / Packet capture / Computer network security / Computing / Firewall

Shunting: A Hardware/Software Architecture for Flexible, High-Performance Network Intrusion Prevention Jose M Gonzalez Vern Paxson

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2007-09-08 20:27:32
UPDATE