Reconsidering fragmentation and reassembly
PODC '98 Proceedings of the seventeenth annual ACM symposium on Principles of distributed computing
Inferring internet denial-of-service activity
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
An extensible probe architecture for network protocol performance measurement
Software—Practice & Experience
MultiQ: automated detection of multiple bottleneck capacities along a path
Proceedings of the 4th ACM SIGCOMM conference on Internet measurement
Tabu Marking Scheme for IP Traceback
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Workshop 17 - Volume 18
Full TCP/IP for 8-bit architectures
Proceedings of the 1st international conference on Mobile systems, applications and services
IP Easy-pass: a light-weight network-edge resource access control
IEEE/ACM Transactions on Networking (TON)
Mitigating denial of service attacks: a tutorial
Journal of Computer Security
Tabu marking scheme to speedup IP traceback
Computer Networks: The International Journal of Computer and Telecommunications Networking
On deterministic packet marking
Computer Networks: The International Journal of Computer and Telecommunications Networking
Analysis of internet backbone traffic and header anomalies observed
Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
Traffic volume analysis of a nation-wide eMule community
Computer Communications
Targeting spam control on middleboxes: Spam detection based on layer-3 e-mail content classification
Computer Networks: The International Journal of Computer and Telecommunications Networking
FAD and SPA: End-to-end link-level loss rate inference without infrastructure
Computer Networks: The International Journal of Computer and Telecommunications Networking
A dynamic signaling mechanism based on symbiotic packet processing
Computer Communications
On traffic characteristics of a broadband wireless internet access
NGI'09 Proceedings of the 5th Euro-NGI conference on Next Generation Internet networks
A hybrid scheme using packet marking and logging for IP traceback
International Journal of Internet Protocol Technology
Protecting SIP against very large flooding DoS attacks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Simple yet efficient, transparent airtime allocation for TCP in wireless mesh networks
Proceedings of the 6th International COnference
LISA'10 Proceedings of the 24th international conference on Large installation system administration
Fragmentation considered vulnerable: blindly intercepting and discarding fragments
WOOT'11 Proceedings of the 5th USENIX conference on Offensive technologies
Enhancing network intrusion detection with integrated sampling and filtering
RAID'06 Proceedings of the 9th international conference on Recent Advances in Intrusion Detection
Packet-level open-digest fingerprinting for spam detection on middleboxes
International Journal of Network Management
Fragmentation Considered Vulnerable
ACM Transactions on Information and System Security (TISSEC)
Hi-index | 0.00 |
Fragmented IP traffic is a poorly understood component of the overall mix of traffic on the Internet. Many assertions about the nature and extent of fragmented traffic are anecdotal rather than empirical. In this paper we examine the causes and attributes of measured fragment traffic, in particular, the effects of NFS, streaming media, networked video games, tunneled traffic, and the prevalence of packet fragmentation due to improperly configured machines.To understand the prevalence, causes, and effects of fragmented IP traffic, we have collected and analyzed seven multiday traces from four sources. These sources include a university commodity access link, two highly aggregated commercial exchange points, and a local NAP. Although there is no practical method of ascertaining whether any data provide a representative sample of all Internet traffic, we include data sources that cover several different types of WANs with traffic from commercial entities, educational and research institutions, and large government facilities.The dominant causes of fragmentation are streaming media and tunneled traffic. Although rumored to be the main impetus for IP packet fragmentation, NFS is not among the top ten causes.