Application-level traceroute: Adopting mimetic mechanisms to increase discovery capabilities
Autor: | Valerio Luconi, Chiara Caiazza, Enrico Gregori, Alessio Vecchio, Francesco Mione |
---|---|
Přispěvatelé: | Università degli Studi di Firenze = University of Florence [Firenze] (UNIFI), Istituto di Informatica e Telematica (IIT-CNR), Consiglio Nazionale delle Ricerche [Roma] (CNR), University of Pisa - Università di Pisa, Dipartimento di Ingegneria dell'Informazione [Pisa], Marco Di Felice, Enrico Natalizio, Raffaele Bruno, Andreas Kassler, TC 6, WG 6.2 |
Jazyk: | angličtina |
Rok vydání: | 2019 |
Předmět: |
Internet
business.industry Computer science ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKS 020206 networking & telecommunications 02 engineering and technology [INFO.INFO-NI]Computer Science [cs]/Networking and Internet Architecture [cs.NI] 020204 information systems traceroute 0202 electrical engineering electronic engineering information engineering The Internet [INFO]Computer Science [cs] business TCP Host (network) Protocol (object-oriented programming) Computer network Block (data storage) |
Zdroj: | International Conference on Wired/Wireless Internet Communication-WWIC, pp. 66–77, Bologna, 2019 info:cnr-pdr/source/autori:Caiazza C.; Gregori E.; Luconi V.; Mione F.; Vecchio A./congresso_nome:International Conference on Wired%2FWireless Internet Communication-WWIC/congresso_luogo:Bologna/congresso_data:2019/anno:2019/pagina_da:66/pagina_a:77/intervallo_pagine:66–77 Lecture Notes in Computer Science 17th International Conference on Wired/Wireless Internet Communication (WWIC) 17th International Conference on Wired/Wireless Internet Communication (WWIC), Jun 2019, Bologna, Italy. pp.66-77, ⟨10.1007/978-3-030-30523-9_6⟩ Lecture Notes in Computer Science ISBN: 9783030305222 WWIC |
DOI: | 10.1007/978-3-030-30523-9_6⟩ |
Popis: | Part 2: Security and Network Management; International audience; Traceroute is a popular network diagnostic tool used for discovering the Internet path towards a target host. Besides network diagnostic, in the last years traceroute has been used by researchers to discover the topology of the Internet. Some network administrators, however, configure their networks to not reply to traceroute probes or to block them (e.g. by using firewalls), preventing traceroute from providing details about the internal structure of their networks. In this paper we present camouflage traceroute (camotrace), a traceroute-like tool aimed at discovering Internet paths even when standard traceroute is blocked. To this purpose, camotrace mimics the behavior of a popular TCP-based application-level protocol. We show preliminary results that confirm that camotrace is able to obtain additional information compared to standard traceroute. |
Databáze: | OpenAIRE |
Externí odkaz: |