期刊文献+

一种用于高效报文捕获引擎的异步算法 被引量:2

An Asynchronous Algorithm for High Performance Packet Capture Engine
下载PDF
导出
摘要 随着网络速度的增加,作为网络监测底层设施的报文捕获引擎暴露出性能上的不足.首先建立了报文接收的模型,分析了报文捕获的主要性能瓶颈--数据拷贝和上下文切换.为了避免上下文切换,提出了一种异步算法,称为"非对称剥夺条件下的追赶算法",它解决了临界段互斥访问的问题,并可以充分发挥异步工作的效率优势.模型分析和测试表明,基于这种算法设计和实现的报文捕获引擎可以大大减少上下文切换次数,具有很高的性能.
出处 《计算机研究与发展》 EI CSCD 北大核心 2006年第z2期94-99,共6页 Journal of Computer Research and Development
基金 国家自然科学基金项目(60573136) 国家"八六三"高技术研究发展计划基金项目(2005AA121570) 现代通信国家重点实验室基金项目(51436050605KG0102)
  • 相关文献

参考文献16

  • 1[1]K Keys,D Moore,R Koga,et al.The architecture of CoralReef:An Internet traffic monitoring software suite.PAM 2001 Workshop,Amsterdam,2001
  • 2[2]M Roesch.Snort-lightweight intrusion detection for networks.In:Proc of the 1999 LISA Conf.Berkeley,CA:USENIX Association,1999.229-238
  • 3[3]S McCanne,V Jacobson.The BSD packet filter:A new architecture for user-level packet capture.In:Proc of the Winter 1993 USENIX Conf.Berkeley,CA:USENIX Association,1993.259-270
  • 4[4]J C Moguland,K K Ramakrishnan.Eliminating receive livelock in an interrupt-driven kernel.ACM Trans on Computer Systems,1997,15(3):217-252
  • 5刘玉军,王宏,苏金树.网络实时监测技术[J].计算机应用研究,1999,16(12):31-33. 被引量:3
  • 6[6]K G Anagnostakis,S Ioannidis,S Miltchev,et al.Practical network applications on a lightweight active management environment.The 3rd IFIP Int'l Working Conf on Active Networks (IWAN),Philadelphia,2001
  • 7[7]D R Engler,M F Kaashoek.DPF:Fast,flexible message demultiplexing using dynamic code eneration.In:Proc of SIGCOMM.New York:ACM Press,1996.53-59
  • 8[8]K G Anagnostakis,M B Greenwald,S Ioannidis,et al.Open packet monitoring on FLAME:Safety,performance and applications.The 4th Int'l Working Conf on Active Networks (IWAN'02),Zurich,2002
  • 9[9]S Ioannidis,K G Anagnostakis,J Ioannidis,et al.xPF:Packet filtering for lowcost network monitoring.In:Proc of the IEEE Workshop on High-Performance Switching and Routing(HPSR).Piscataway,NJ:IEEE Press,2002.121-126
  • 10[10]Trung Nguyen,Willem de Bruijn,Mihai Cristea,et al.Scalable network monitors for high-speed links:A bottom-up approach.IPOM'04,Beijing,2004

二级参考文献32

  • 1D E Knuth.The Art of Computer programming Vol Ⅲ:Sorting and Searching[M]. Addison Wesley Publishing Company Inc,1973.
  • 2Ulf Lindqvist.On the Fundamentals of Analysis and Detection of Computer Misuse:[Ph D Thesis] [D]. Department of Computer Engineering,Chalmers University of Technology, 1999.
  • 3Sandeep Kumer.Classification and Detection of Computer Intrusions:[Ph D Thesis][D]. Purdue University, 1995.
  • 4Jean-Philippe Pouzol ,Mireille Ducasse.Handling Generic Intrusion Signatures Is Not Trival[A].Raid 2000[C].2000.
  • 5Mukherjee B,Heberlein T L,Levitt K N. Network Intrusion Detection[J]. IEEE Network, 1994,8(3):26-41.
  • 6Thomas H Ptacek,Timothy N Newsham.Insertion,Evasion,and Denial of Service:Eluding Network Intrusion Detection[M]. Secure Networks Inc,1998.
  • 7Hyper Ion.Watcher[J]. Phrack Magazine, 1998,8(53).
  • 8Martin Roesch. Snort Docment and Sourcecode[EB/OL]. http://www.snort.org,2001-05-12.
  • 9陈海涛.CLIPS正向推理机的设计与实现:[学士学位论文][D].长沙:国防科技大学,1999.
  • 10胡华平,陈海涛,张怡,基于代理的网络入侵检测系统基本原型的详细设计[Z]. 863项目验收材料之二,2001.

共引文献7

同被引文献10

引证文献2

二级引证文献1

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部