A Fine-Grained Embedded-Software-Network Detection Method

Article Preview

Abstract:

The continuous development of embedded technology has emerged an increasing demand of internet-based embedded software. The current existing tools only offer coarse-grained network detection, in other words, they don’t satisfy the refining detection standard for the convenience of developers. This paper begins with analysis into defects of the current network detection methods and tools with deep insight from the Netfilter of Linux kernel and protocol stack for packet processing technology, it then proposes a fine-grained network detection method, with which we build up an embedded-software-network detection tool for digital-home-appliances. The built tool can operate real-time and fine-grained monitoring. An experiment has been performed in the final section of the paper to prove the accuracy of the method.

You might also be interested in these eBooks

Info:

Periodical:

Key Engineering Materials (Volumes 474-476)

Pages:

454-459

Citation:

Online since:

April 2011

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2011 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Bao J, Xiang Z T, Min H S. The analysis of Network traffic based on Netfilter kernel[J]. Control and Automation Publication Group, 2009, volume 25(6-3): 60-62.

Google Scholar

[2] Zhao Y, Huang J M, Dong X G. Design and implementation of Network traffic monitoring system[J]. Computer Applications, 2004, volume 24: 32-33.

Google Scholar

[3] Rahman M, Ishwar Z, Khalib A, Ahmad R. B. Web-based Portable Network Traffic Monitoring System Based on Embedded Linux and SBC[J]. Proceedings of International Conference on Future Computer and Communication, 2009: 310-313.

DOI: 10.1109/icfcc.2009.14

Google Scholar

[4] Yong Yan, Yong Zhang, Depei Qian. Adaptive Sampling Measurement for High Speed Etwork Traffic Flow[J]. Proceedings of 5th International Conference on Wireless Communications, Networking and Mobile Computing, 2009: 401-405.

DOI: 10.1109/wicom.2009.5302469

Google Scholar

[5] Kim Myung-Sup, Kong Hun-Jeong, Hong Seong-Cheol. A Flow-based Method for Abnormal Network Traffic Detection[J]. IEEE Symposium Record on Network Operations and Management Symposium, 2004: 599-612.

DOI: 10.1109/noms.2004.1317747

Google Scholar

[6] Daniel P. Bovet, Marco Cesati. Understanding the Linux Kernel[M]. 3rd Edition, Beijing: O'Reilly, 2005: 400-410.

Google Scholar