{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:53:03Z","timestamp":1750308783308,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,26]],"date-time":"2010-02-26T00:00:00Z","timestamp":1267142400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,26]]},"DOI":"10.1145\/1741906.1741969","type":"proceedings-article","created":{"date-parts":[[2010,3,30]],"date-time":"2010-03-30T12:32:28Z","timestamp":1269952348000},"page":"273-278","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Bottleneck analysis and traffic congestion avoidance"],"prefix":"10.1145","author":[{"given":"M. A.","family":"Qadeer","sequence":"first","affiliation":[{"name":"Aligarh Muslim University, Aligarh, India"}]},{"given":"A. H.","family":"Khan","sequence":"additional","affiliation":[{"name":"Aligarh Muslim University, Aligarh, India"}]},{"given":"A. A.","family":"Habeeb","sequence":"additional","affiliation":[{"name":"Accenture Services Pvt. Ltd., Bangalore, India"}]},{"given":"M. A.","family":"Hafeez","sequence":"additional","affiliation":[{"name":"Areva T&amp;D India Ltd, Chennai, India"}]}],"member":"320","published-online":{"date-parts":[[2010,2,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Libpcap http:\/\/yuba.stanford.edu\/~casado\/pcap\/section1.html  Libpcap http:\/\/yuba.stanford.edu\/~casado\/pcap\/section1.html"},{"key":"e_1_3_2_1_2_1","first-page":"158","volume-title":"4th International Conference on Innovations in Information Technology, 2007","author":"Dabir A.","year":"2007","unstructured":"A. Dabir , A. Matrawy , \" Bottleneck Analysis of Traffic Monitoring Using Wireshark\" , 4th International Conference on Innovations in Information Technology, 2007 , IEEE Innovations '07, 18- -20 Nov. 2007 , Page(s): 158 -- 162 . A. Dabir, A. Matrawy, \"Bottleneck Analysis of Traffic Monitoring Using Wireshark\", 4th International Conference on Innovations in Information Technology, 2007, IEEE Innovations '07, 18--20 Nov. 2007, Page(s):158--162."},{"key":"e_1_3_2_1_3_1","volume-title":"IEEE Potentials","author":"Ansari S.","year":"2003","unstructured":"S. Ansari , Rajeev S. G. and Chandrasekhar H . S, \"Packet Sniffing: A brief Introduction \", IEEE Potentials , Dec 2002--Jan 2003 , Volume:21, Issue:5, pp:17--19. S. Ansari, Rajeev S. G. and Chandrasekhar H. S, \"Packet Sniffing: A brief Introduction\", IEEE Potentials, Dec 2002--Jan 2003, Volume:21, Issue:5, pp:17--19."},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. PAM 2000 Passive and Active Measurement Workshop (Apr.","author":"Cleary J.","year":"2000","unstructured":"J. Cleary , S. Donnelly , I. Graham , \" Design Principles for Accurate Passive Measurement\" , in Proc. PAM 2000 Passive and Active Measurement Workshop (Apr. 2000 ). J. Cleary, S. Donnelly, I. Graham, \"Design Principles for Accurate Passive Measurement\", in Proc. PAM 2000 Passive and Active Measurement Workshop (Apr. 2000)."},{"key":"e_1_3_2_1_5_1","volume-title":"An Interdisciplinary Approach to Designing Fast Networked Devices","author":"Varghese G.","year":"2005","unstructured":"G. Varghese , \" Network Algorithmic : An Interdisciplinary Approach to Designing Fast Networked Devices \", San Francisco, CA : Morgan Kaufmann , 2005 . Ryan Spangler, Packet Sniffer Detection with AntiSniff, University of Wisconsin -- Whitewater, Department of Computer and Network Administration, May 2003 G. Varghese, \"Network Algorithmic: An Interdisciplinary Approach to Designing Fast Networked Devices\", San Francisco, CA: Morgan Kaufmann, 2005. Ryan Spangler, Packet Sniffer Detection with AntiSniff, University of Wisconsin -- Whitewater, Department of Computer and Network Administration, May 2003"},{"volume-title":"Proceedings of the 2004 International Symposium on Applications and the Internet (SAINT'04)","author":"Trabelsi Zouheir","key":"e_1_3_2_1_6_1","unstructured":"Zouheir Trabelsi , Hamza Rahmani , Kamel Kaouech , Mounir Frikha , \" Malicious Sniffing System Detection Platform\" , Proceedings of the 2004 International Symposium on Applications and the Internet (SAINT'04) , IEEE Computer Society. Zouheir Trabelsi, Hamza Rahmani, Kamel Kaouech, Mounir Frikha, \"Malicious Sniffing System Detection Platform\", Proceedings of the 2004 International Symposium on Applications and the Internet (SAINT'04), IEEE Computer Society."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of World Academy of Science, Engineering and Technology","volume":"6","author":"Benattou M.","year":"2005","unstructured":"M. Benattou , K. Tamine , \"Intelligent agents for distributed intrusion detection system \", Proceedings of World Academy of Science, Engineering and Technology , vol. 6 , 2005 . M. Benattou, K. Tamine, \"Intelligent agents for distributed intrusion detection system\", Proceedings of World Academy of Science, Engineering and Technology, vol. 6, 2005."},{"volume-title":"Symbolic Cambridge Research Center","year":"1984","key":"e_1_3_2_1_8_1","unstructured":"Hornig, C., \"A Standard for the Transmission of IP Data grams over Ethernet Networks\", RFC-894 , Symbolic Cambridge Research Center , April 1984 . Hornig, C., \"A Standard for the Transmission of IP Data grams over Ethernet Networks\", RFC-894, Symbolic Cambridge Research Center, April 1984."},{"key":"e_1_3_2_1_9_1","unstructured":"Kurose James &amp; Ross Keith \"Computer Networking\" Pearson Education 2005  Kurose James &amp; Ross Keith \"Computer Networking\" Pearson Education 2005"},{"key":"e_1_3_2_1_10_1","unstructured":"Libpcap http:\/\/wikepedia.com  Libpcap http:\/\/wikepedia.com"},{"key":"e_1_3_2_1_11_1","unstructured":"Sniffing FAQ http:\/\/www.robertgraham.com  Sniffing FAQ http:\/\/www.robertgraham.com"},{"key":"e_1_3_2_1_12_1","volume-title":"Volume","author":"Stevens Richard","year":"2001","unstructured":"Richard Stevens , \"TCP\/ IP Illustrated : Volume \", 2001 Richard Stevens, \"TCP\/IP Illustrated: Volume\", 2001"},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/www.wireshark.org (Aug 15","author":"Combs G.","year":"2007","unstructured":"G. Combs , \"Ethereal\" , http:\/\/www.wireshark.org (Aug 15 , 2007 ). G. Combs, \"Ethereal\", http:\/\/www.wireshark.org (Aug 15, 2007)."},{"key":"e_1_3_2_1_14_1","volume-title":"November 11","author":"Drury J.","year":"2000","unstructured":"J. Drury , \"Sniffers : What are they and how to protect from the \", November 11 , 2000 http:\/\/www.sans.org\/infosecFAQ\/switchednet\/sniffers.htm J. Drury, \"Sniffers: What are they and how to protect from the\", November 11, 2000 http:\/\/www.sans.org\/infosecFAQ\/switchednet\/sniffers.htm"},{"key":"e_1_3_2_1_15_1","unstructured":"\"What is a packet sniffer\" http:\/\/www.wisegeek.com\/what-is-a-packet-sniffer.htm  \"What is a packet sniffer\" http:\/\/www.wisegeek.com\/what-is-a-packet-sniffer.htm"},{"key":"e_1_3_2_1_16_1","unstructured":"LIBNET LIBNET Documentation http:\/\/libnet.sourceforge.net\/#docs.  LIBNET LIBNET Documentation http:\/\/libnet.sourceforge.net\/#docs."},{"key":"e_1_3_2_1_17_1","unstructured":"Stones Richard &amp; Matthew Neil \"Beginning Linux Programming\" Wrox Publishers 2004.  Stones Richard &amp; Matthew Neil \"Beginning Linux Programming\" Wrox Publishers 2004."},{"key":"e_1_3_2_1_18_1","volume-title":"Prentice Hall India","author":"Network UNIX","year":"2001","unstructured":"Stevens, Richard, \" UNIX Network Programming\" , Prentice Hall India , 2001 Stevens, Richard, \"UNIX Network Programming\", Prentice Hall India, 2001"},{"key":"e_1_3_2_1_19_1","unstructured":"Sniffer resources http:\/\/packetstorm.decepticons.org  Sniffer resources http:\/\/packetstorm.decepticons.org"},{"key":"e_1_3_2_1_20_1","unstructured":"Daiji Sanai \"Detection of Promiscuous Nodes Using ARP Packet\" http:\/\/www.securityfriday.com\/  Daiji Sanai \"Detection of Promiscuous Nodes Using ARP Packet\" http:\/\/www.securityfriday.com\/"},{"volume-title":"The BSD Packet Filter: A New Architecture for user level packet capture\", proceeding of 1993 Winter USENIX Technical Conference","author":"Cane S. M","key":"e_1_3_2_1_21_1","unstructured":"S. M Cane , and V. Jacobson , \" The BSD Packet Filter: A New Architecture for user level packet capture\", proceeding of 1993 Winter USENIX Technical Conference , San Diego, CA . S. M Cane, and V. Jacobson, \"The BSD Packet Filter: A New Architecture for user level packet capture\", proceeding of 1993 Winter USENIX Technical Conference, San Diego, CA."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ARES.2008.122"},{"key":"e_1_3_2_1_23_1","first-page":"171","volume-title":"Proc. Web Information Systems Engineering (Dec 3--6","author":"Shiyong Z.","year":"2001","unstructured":"Z. Shiyong , W. Chengrong , G. Wei , \"Network monitoring in broadband network \", in Proc. Web Information Systems Engineering (Dec 3--6 , 2001 , pp. 171 -- 177 ). Z. Shiyong, W. Chengrong, G. Wei, \"Network monitoring in broadband network\", in Proc. Web Information Systems Engineering (Dec 3--6, 2001, pp. 171--177)."}],"event":{"name":"ICWET '10: International Conference and Workshop on Emerging Trends in Technology","sponsor":["UNITECH Unitech Engineers, India","AICTE All India Council for Technical Education","SIGAI ACM Special Interest Group on Artificial Intelligence","SIGARCH ACM Special Interest Group on Computer Architecture"],"location":"Mumbai Maharashtra India","acronym":"ICWET '10"},"container-title":["Proceedings of the International Conference and Workshop on Emerging Trends in Technology"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741969","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1741906.1741969","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:22:45Z","timestamp":1750278165000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1741906.1741969"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,26]]},"references-count":23,"alternative-id":["10.1145\/1741906.1741969","10.1145\/1741906"],"URL":"https:\/\/doi.org\/10.1145\/1741906.1741969","relation":{},"subject":[],"published":{"date-parts":[[2010,2,26]]},"assertion":[{"value":"2010-02-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}