{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T18:39:36Z","timestamp":1730227176481,"version":"3.28.0"},"reference-count":27,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1109\/icacci.2016.7732091","type":"proceedings-article","created":{"date-parts":[[2016,11,8]],"date-time":"2016-11-08T20:57:45Z","timestamp":1478638665000},"page":"478-483","source":"Crossref","is-referenced-by-count":1,"title":["Hiper-ping: Data plane based high performance packet generation bypassing kernel on \u00d786 based commodity systems"],"prefix":"10.1109","author":[{"given":"Aravind C","family":"Ajayan","sequence":"first","affiliation":[]},{"given":"P","family":"Prabaharan","sequence":"additional","affiliation":[]},{"given":"Manu R","family":"Krishnan","sequence":"additional","affiliation":[]},{"given":"Soumajit","family":"Pal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","article-title":"High speed network traffic analysis with commodity multi-core systems","author":"francesco","year":"2010","journal-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement"},{"key":"ref11","article-title":"nCap: Wire-speed packet capture and transmission","author":"luca","year":"2005","journal-title":"Workshop on End-to-End Monitoring Techniques and Services 2005"},{"journal-title":"Packet Processing Is Enhanced with Software from Intel DPDK","year":"0","key":"ref12"},{"journal-title":"Hping3 (8) - Linux Man Page Hping3(8) - Linux Man Page","year":"0","author":"salvatore","key":"ref13"},{"journal-title":"The Secret to 10 Million Concurrent Connections-The Kernel Is the Problem Not The Solution - High Scalability","year":"0","key":"ref14"},{"key":"ref15","first-page":"20","article-title":"Flow processing and the rise of commodity network hardware","volume":"2","author":"adam","year":"2009","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"ref16","first-page":"810","article-title":"High rate packets transmission on ethernet LAN using commodity hardware","volume":"3","author":"artur","year":"2006","journal-title":"IEEE Transactions on Nuclear Science 53"},{"key":"ref17","article-title":"Comparing and improving current packet capturing solutions based on commodity hardware","author":"lothar","year":"2010","journal-title":"Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement"},{"journal-title":"10 Gbit\/s Line Rate Packet Processing Using Commodity Hardware Survey and new Proposals(10 )","year":"0","author":"luigi","key":"ref18"},{"journal-title":"hugetlbpage Support in the Linux Kernel","year":"0","key":"ref19"},{"key":"ref4","first-page":"129","article-title":"Gamma and mpi\/gamma on gigabit ethernet","author":"giuseppe","year":"2000","journal-title":"Recent Advances in Parallel Virtual Machine and Message Passing Interface"},{"journal-title":"Juniper Networks How Many Packets per Second per Port Are Needed to Achieve Wire-Speed?","year":"0","key":"ref27"},{"key":"ref3","article-title":"Detecting SYN flooding attacks, INFOCOM 2002","volume":"3","author":"haining","year":"2002","journal-title":"Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies Proceedings IEEE"},{"key":"ref6","article-title":"Internet Protocol RFC 791","volume":"791","author":"jon","year":"1981","journal-title":"ARPANET Working group Requests for Comments"},{"key":"ref5","article-title":"Distributed Denial of Service: Taxonomies of Attacks, Tools, and Countermeasures","author":"specht","year":"2004","journal-title":"ISCA PDCS"},{"key":"ref8","article-title":"RFC 894: Standard for the transmission of IP datagrams over Ethernet networks","author":"charles","year":"1984","journal-title":"RFC IETF"},{"key":"ref7","first-page":"1","article-title":"Postel, Jon, and User Datagram Protocol","year":"1980","journal-title":"Rfc 768 User Datagram Protocol"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1997.601338"},{"key":"ref9","article-title":"Scalable, high performance ethernet forwarding with CuckooSwitch","author":"dong","year":"2013","journal-title":"Proceedings of the Ninth ACM Conference on Emerging Networking Experiments and Technologies"},{"key":"ref1","article-title":"Understanding the packet forwarding capability of general-purpose processors","author":"katerina","year":"2008","journal-title":"Technical Report IRB-TR-08-44 Intel Research Berkeley"},{"journal-title":"DPDK Boosts Packet Processing Performance and Throughput","year":"0","key":"ref20"},{"key":"ref22","first-page":"34","article-title":"NetVM: high performance and flexible networking using virtualization on commodity platforms","volume":"1","author":"jinho","year":"2015","journal-title":"IEEE Trans on Network and Service Management"},{"key":"ref21","article-title":"NetVM: high performance and flexible networking using virtualization on commodity platforms","author":"jinho","year":"2014","journal-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI'04)"},{"journal-title":"CA-1996-21 TCP SYN Flooding and IP Spoofing Attacks","year":"0","key":"ref24"},{"journal-title":"Intel Data Plane Development Kit Programmer's Guide","year":"0","key":"ref23"},{"journal-title":"Intel Ethernet Controller 1350 Datasheet","year":"0","key":"ref26"},{"journal-title":"CA-1996026 Denial-of-Service Attack via Ping","year":"0","key":"ref25"}],"event":{"name":"2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)","start":{"date-parts":[[2016,9,21]]},"location":"Jaipur, India","end":{"date-parts":[[2016,9,24]]}},"container-title":["2016 International Conference on Advances in Computing, Communications and Informatics (ICACCI)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7592392\/7732013\/07732091.pdf?arnumber=7732091","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2016,11,30]],"date-time":"2016-11-30T12:11:19Z","timestamp":1480507879000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7732091\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":27,"URL":"https:\/\/doi.org\/10.1109\/icacci.2016.7732091","relation":{},"subject":[],"published":{"date-parts":[[2016,9]]}}}