BLT: Bi-Layer Tracing of HTTP and TCP/IP

نویسنده

  • Anja Feldmann
چکیده

We describe BLT, a tool for extracting full HTTP level as well as TCP level traces via packet monitoring. This paper presents the software architecture that allows us to collect traces continuously, online, and at any point in the network. The software has been used to extract extensive traces within AT&T WorldNet since spring 1997 as well as at AT&T Labs-Research. BLT offers a much richer alternative to Web proxy logs, client logs, and Web server logs due to the accuracy of the timestamps, the level of details available by considering several protocol layers (TCP/IP and HTTP events), and its non intrusive way of gathering data. Traces gathered using BLT have provided the foundation of several Web performance studies[15], [27], [13], [17], [22], [23].

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Kernel HTTPS/TCP/IP stack for HTTP DDoS mitigation

Application layer HTTP DDoS attacks are usually mitigated by HTTP accelerators or HTTP load balancers. However, Linux socket interface used by the software doesn’t provide reasonable performance for extreme loads caused by DDoS attacks. Thus, HTTP accelerators are starting to bypass an OS and to use user space TCP/IP stacks. This paper discusses the drawbacks of the bypassing technique and expl...

متن کامل

Characterization of performance of TCP/IP over PPP and ATM over asymmetric links

The objective of this paper is to characterize and analyze the performance of TCP/IP when used over point-to-point protocol (PPP) and asynchronous transfer mode (ATM) over asymmetric links. This will allow us to gain insight into this new protocol architecture used in the asymmetric digital subscriber line (ADSL) access network and investigate the related quality of service (QoS) issues. Using ...

متن کامل

Internet - Draft HTTP Upgrade June 1999

This memo applies the Upgrade mechanism in HTTP/1.1 to employ Transport Layer Security (TLS) over an existing TCP connection. This allows unsecured and secured traffic to share the same well known port (in this case, http: at 80 rather than https: at 443). This also enables "virtual hosting," by allowing a single HTTP + TLS server to disambiguate traffic intended for several hostnames at a sing...

متن کامل

Hiding out in plaintext : covert messaging with bitwise summations

vi CHAPTER 1. GENERAL INTRODUCTION 1 1.1 Problem Statement 1 1.2 Thesis Organization 1 1.3 Overview of Network Covert Channels 2 1.4 Overview of Information Hiding in TCP/IP 3 1.5 Network Layer 5 1.5.1 Do not Fragment Bit 5 1.5.2 IP Identification Field 6 1.5.3 IP Header Checksum 6 1.5.4 ICMP Data 6 1.6 Transport Layer 7 1.6.1 TCP Time Stamps 7 1.6.2 Sequence and Acknowledgment Fields 9 1.7 Act...

متن کامل

Practical Development and Deployment of Covert Communication in Ipv4

Steganography is the science of hiding information or transmitting secret messages in a given host carrier for the purpose of enhancing value through undetectable covers. The paper focuses on the existent methods used with ipv4 and studies the various algorithms. Transfer of data over the internet crosses the different layers of the TCP and IP protocols. Each layer has its own characteristics, ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:
  • Computer Networks

دوره 33  شماره 

صفحات  -

تاریخ انتشار 2000