Implementation and Performance Analysis of SNMP on a TLS/TCP Base

نویسندگان

  • Xiaojiang Du
  • Mark A. Shayman
  • Moshe Rozenblit
چکیده

There is recent interest in exploring SNMP/TCP in addition to the current use of SNMP/UDP due to performance benefits for bulk transfer as well as to simplify management applications. If SNMP is implemented over TCP, then TLS is a natural choice for security. However, it must be demonstrated that the additional overhead associated with TLS is not excessive. We show this by implementing SNMP on a TLS/TCP base and measuring its performance experimentally. The results indicate that the overhead is not excessive; consequently SNMP/TLS/TCP appears to be a viable option for network management. Also our tests show that SNMP

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

RFC 5953 TLS Transport Model for SNMP August

This document describes a Transport Model for the Simple Network Management Protocol (SNMP), that uses either the Transport Layer Security protocol or the Datagram Transport Layer Security (DTLS) protocol. The TLS and DTLS protocols provide authentication and privacy services for SNMP applications. This document describes how the TLS Transport Model (TLSTM) implements the needed features of a S...

متن کامل

Using the z/OS SNMP MIB to Solve Performance Problems

THE new z/OS 1.2 TCP/IP stack introduces a greatly enhanced Simple Network Management Protocol (SNMP) Management Information Base (MIB) to allow the systems programmer to perform diagnostics for the TCP/IP stack and sessions. The SNMP MIB includes hundreds of variables to analyze the core Internet protocols: Internet Protocol (IP), Transmission Control Protocol (TCP), User Datagram Protocol (UD...

متن کامل

Detecting Bot Networks Based On HTTP And TLS Traffic Analysis

Abstract— Bot networks are a serious threat to cyber security, whose destructive behavior affects network performance directly. Detecting of infected HTTP communications is a big challenge because infected HTTP connections are clearly merged with other types of HTTP traffic. Cybercriminals prefer to use the web as a communication environment to launch application layer attacks and secretly enga...

متن کامل

Unordered Delivery in TLS-Encrypted TCP Connections

TCP and UDP offer markedly different transport semantics. However, increasingly, applications robust to the unreliability of UDP choose TCP because it is more likely to successfully navigate today’s Internet full of meddlesome middleboxes (ie. firewalls and NATs). The Transport Next Generation (Tng) project attempts to alleviate the logjam caused by this shifting of the Internet’s narrow-waist ...

متن کامل

Connection-Oriented DNS to Improve Privacy and Security (extended)

The Domain Name System (DNS) seems ideal for connectionless UDP, yet this choice results in challenges of eavesdropping that compromises privacy, source-address spoofing that simplifies denial-of-service (DoS) attacks on the server and third parties, injection attacks that exploit fragmentation, and reply-size limits that constrain key sizes and policy choices. We propose T-DNS to address these...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2001