111,68 €
124,09 €
-10% with code: EXTRA
Performance evaluation of a field programmable gate array-based system for detecting and tracking peer-to-peer protocols on a gigabit ethernet network
Performance evaluation of a field programmable gate array-based system for detecting and tracking peer-to-peer protocols on a gigabit ethernet network
111,68
124,09 €
  • We will send in 10–14 business days.
The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA. The goals of this research are to evaluate the performance of the TRAPP-2 system as a solution to detect and track malicious packets traversing a gigabit Ethernet network. The TRAPP-2 system detects a BitTorrent, Session Initiation Protocol (SIP), or Domain Name System (DNS) packet, extracts the payload, compares the data against a hash list, and if the packet is suspicious, logs the entire packet…
  • SAVE -10% with code: EXTRA

Performance evaluation of a field programmable gate array-based system for detecting and tracking peer-to-peer protocols on a gigabit ethernet network (e-book) (used book) | bookbook.eu

Reviews

Description


The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA. The goals of this research are to evaluate the performance of the TRAPP-2 system as a solution to detect and track malicious packets traversing a gigabit Ethernet network. The TRAPP-2 system detects a BitTorrent, Session Initiation Protocol (SIP), or Domain Name System (DNS) packet, extracts the payload, compares the data against a hash list, and if the packet is suspicious, logs the entire packet for future analysis. Results show that the TRAPP-2 system captures 95.56% of BitTorrent, 20.78% of SIP INVITE, 37.11% of SIP BYE, and 91.89% of DNS packets of interest while under a 93.7% network utilization (937 Mbps). For another experiment, the contraband hash list size is increased from 1,000 to 131,072,000 unique items. The experiment reveals that each doubling of the hash list size results in a mean increase of approximately 16 central processing unit cycles. These results demonstrate the TRAPP-2 system's ability to detect traffic of interest under a saturated network utilization while maintaining large contraband hash lists.

EXTRA 10 % discount with code: EXTRA

111,68
124,09 €
We will send in 10–14 business days.

The promotion ends in 18d.08:06:43

The discount code is valid when purchasing from 10 €. Discounts do not stack.

Log in and for this item
you will receive 1,24 Book Euros!?
  • Author: Brennon D Thomas
  • Publisher:
  • ISBN-10: 1249584051
  • ISBN-13: 9781249584056
  • Format: 18.9 x 24.6 x 0.8 cm, softcover
  • Language: English English


The TRacking and Analysis for Peer-to-Peer 2 (TRAPP-2) system is developed on a Xilinx ML510 FPGA. The goals of this research are to evaluate the performance of the TRAPP-2 system as a solution to detect and track malicious packets traversing a gigabit Ethernet network. The TRAPP-2 system detects a BitTorrent, Session Initiation Protocol (SIP), or Domain Name System (DNS) packet, extracts the payload, compares the data against a hash list, and if the packet is suspicious, logs the entire packet for future analysis. Results show that the TRAPP-2 system captures 95.56% of BitTorrent, 20.78% of SIP INVITE, 37.11% of SIP BYE, and 91.89% of DNS packets of interest while under a 93.7% network utilization (937 Mbps). For another experiment, the contraband hash list size is increased from 1,000 to 131,072,000 unique items. The experiment reveals that each doubling of the hash list size results in a mean increase of approximately 16 central processing unit cycles. These results demonstrate the TRAPP-2 system's ability to detect traffic of interest under a saturated network utilization while maintaining large contraband hash lists.

Reviews

  • No reviews
0 customers have rated this item.
5
0%
4
0%
3
0%
2
0%
1
0%
(will not be displayed)