Analysis and Research of BPF Filter Based on Libpcap

Article Preview

Abstract:

this paper analyzes and studies nature of BPF filter based on Libpcap, first of all, it analyzes location and structure of BPF filter in the Linux system kernel; secondly, it gives a detailed analysis of how BPF deals with filter described by a high-level language; finally, a filter described by a high-level language is presented, and a application program uses this filter to capture required network data packet.

You might also be interested in these eBooks

Info:

Periodical:

Advanced Materials Research (Volumes 655-657)

Pages:

1774-1778

Citation:

Online since:

January 2013

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2013 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Liu WenTao. Network security development packet in detail. Beijing: Publishing House of Electronics Industry, 2005.

Google Scholar

[2] Tang ZhengJun. The source code analysis that hacker invade protection system [M] Beijing: Machinery Industry Press, 2002.

Google Scholar

[3] Zhu YanHui. Windows firewall and network data packet capture technique [M] Beijing: Publishing House of Electronics Industry, 2002.

Google Scholar

[4] http://www.tcpdump.org/

Google Scholar

[5] Wang dian. Packet capture network billing system[J]. Hang zhou Electronic and Technology University learned journal, 2005.

Google Scholar

[6] Xie xi ren. Computer network(the fifth edition)[M]. Electronics Industry Press, 2009.

Google Scholar

[7] Politecnico di Torino. The winpcap manual and tutorial for winpcap 4.1, 2011.

Google Scholar

[8] Li chengzhong, zhang xin you. Computer network theory and design. Beijing: Higher Education Press, 2003.

Google Scholar

[9] Zhang jiong. Unix network programming technology and example analysis. Beijing: Tsinghua University Press, 2004.

Google Scholar

[10] Li de quan. Denial service attack[M]. Beijing: Electronics Industry Press, 2007.

Google Scholar