A control plane enabling automated and fully adaptive network traffic monitoring with eBPF

S Magnani, F Risso, D Siracusa - IEEE Access, 2022 - ieeexplore.ieee.org
… As a consequence, in a deployment scenario with strong safety requirements in which
user… The network traffic is composed by simple TCP SYN packets of total size equal to 60 B …

Online monitoring of tcp throughput limitations

S Bauer, K Holzinger, B Jaeger… - … and Management …, 2020 - ieeexplore.ieee.org
tool to analyze the throughput limitation of TCP flows in real-time, ie, while the tool observes
traffic on a network … of the Layer 4 protocol TCP, which provides reliable data transmission to …

Elastic and reliable bandwidth reservation based on distributed traffic monitoring and control

X Zhang, T Wang - IEEE Transactions on Parallel and …, 2022 - ieeexplore.ieee.org
… load brought to the network and the monitoring server is also … bandwidth reservation cannot
provide reliable bandwidth … depending on TCP-based congestion control because TCP-…

A comprehensive overview of TCP congestion control in 5G networks: Research challenges and future perspectives

J Lorincz, Z Klarin, J Ožegović - Sensors, 2021 - mdpi.com
networks, the main protocol used to ensure reliable communications is the transmission
control protocol (TCP… of the connection is estimated through the regular monitoring of the ACKs …

[HTML][HTML] A new perspective towards the development of robust data-driven intrusion detection for industrial control systems

A Ayodeji, Y Liu, N Chao, L Yang - Nuclear engineering and technology, 2020 - Elsevier
… in monitoring CPS network data traffic. However, utilizing shared devices exposed the traditional
opacity common in legacy CPS control… on process control and monitoring systems could …

Can multipath TCP Be robust to cyber attacks? A measuring study of MPTCP with active queue management algorithms

Y Cao, R Ji, L Ji, M Bao, L Tao… - … Communication Networks, 2021 - Wiley Online Library
… severe threats to network services. This article introduces six classic queue management
algorithms: DropTail, RED, FRED, REM, BLUE, and FQ. In a multihomed network environment, …

Improve the Security of Industrial Control System: A Fine-Grained Classification Method for DoS Attacks on Modbus/TCP

H Zhang, Y Min, S Liu, H Tong, Y Li, Z Lv - Mobile Networks and …, 2023 - Springer
… Systems(ICS), Modbus plays a momentous role in the function of monitoring and controlling
… of the TCP protocol, Modbus/TCP enables connection-oriented and reliable control. However…

Trident: Efficient and practical software network monitoring

X Hu, Y Xiang, Y Li, B Qiu, K Wang… - Tsinghua Science and …, 2021 - ieeexplore.ieee.org
… to monitor network events at Google end hosts. SketchVisor[15] realizes a robust software …
udp, icmp, and tcp can be compressed, and the port field of udp and tcp can be compressed. …

Traffic monitoring and abnormality detection methods for decentralized distributed networks

D Ageyev, T Radivilova, O Mulesa… - … Distributed Networks, 2022 - Springer
… not reliable enough … network traffic anomalies and intrusions is proposed, which is based
on the use of a number of statistical, correlation and informational parameters of network traffic

Scalable tcp throughput limitation monitoring

S Bauer, F Wiedner, B Jaeger… - … Network Management …, 2021 - ieeexplore.ieee.org
… Due to providing reliable data transmission, TCP is the used Layer 4 protocol for … TCP
throughput in real-world Internet traffic. We present a linearly scalable framework to monitor TCP