Reconsidering fragmentation and reassembly
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
IEEE/ACM Transactions on Networking (TON)
End-to-end congestion control for TCP-friendly flows with variable packet size
ACM SIGCOMM Computer Communication Review
Analysis of multi-player online game traffic based on self-similarity
NetGames '06 Proceedings of 5th ACM SIGCOMM workshop on Network and system support for games
Performance analysis of probabilistic packet marking in IPv6
Computer Communications
TCP Reassembler for Layer7-Aware Network Intrusion Detection/Prevention Systems
IEICE - Transactions on Information and Systems
A novel solution for IP spoofing attacks
ISP'07 Proceedings of the 6th WSEAS international conference on Information security and privacy
Deterministic packet marking with link signatures for IP traceback
Inscrypt'06 Proceedings of the Second SKLOIS conference on Information Security and Cryptology
APNOMS'06 Proceedings of the 9th Asia-Pacific international conference on Network Operations and Management: management of Convergence Networks and Services
Hi-index | 0.00 |
Fragmented IP traffic is a unique component of the overall mix of traffic on the Internet. Many assertions about the nature and extent of fragmented traffic are anecdotal rather than empirical. In this paper we examine the causes and attributes of measured fragment traffic and contrast those results with commonly cited beliefs. In particular, the effects of NFS, streaming media, networked video games, and tunneled traffic are quantified, and we estimate the prevalence of packet fragmentation due to improperly configured machines.To understand the prevalence, causes, and effects of fragmented IP traffic, we have collected and analyzed seven multi-day traces from three sources. These sources include a university commodity access link, a highly aggregated commercial exchange point, and a local NAP. Although there is no practical method of ascertaining whether any data provide a representative sample of all Internet traffic, we do include data sources that cover several different types of WANs with traffic from commercial entities, educational and research institutions, and large government facilities.