Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -r flag, which causes it to read from a saved packet file rather than to read packets from a network interface. In all cases, only packets that match expression will be processed by tcpdump. Tcpdump will, if not run with the -c flag, continue capturing packets until it is interrupted by a SIGINT signal (generated, for example, by typing your interrupt character, typically control-C) or a SIGTERM signal (typically generated with the kill(1) command); if run with the -c flag, it will capture packets until it is interrupted by a SIGINT or SIGTERM signal or the specified number of packets have been processed.

References in zbMATH (referenced in 22 articles )

Showing results 1 to 20 of 22.
Sorted by year (citations)

1 2 next

  1. Casleton, Emily; Osthus, Dave; van Buren, Kendra: Imputation for multisource data with comparison and assessment techniques (2018)
  2. Hu, Hao; Liu, Yuling; Yang, Yingjie; Zhang, Hongqi; Zhang, Yuchen: New insights into approaches to evaluating intention and path for network multistep attacks (2018)
  3. Sait, Saad Y.; Bhandari, Akshay; Khare, Shreya; James, Cyriac; Murthy, Hema A.: Multi-level anomaly detection: relevance of big data analytics in networks (2015)
  4. Di Battista, Giuseppe; Squarcella, Claudio; Nagele, Wolfgang: How to visualize the K-root name server (2012)
  5. Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore J.: On the infeasibility of modeling polymorphic shellcode re-thinking the role of learning in intrusion detection systems (2010) ioport
  6. Xi, Bowei; Chen, Hui; Cleveland, William S.; Telkamp, Thomas: Statistical analysis and modeling of Internet VoIP traffic for network engineering (2010)
  7. Antonello, Rafael; Fernandes, Stênio; Moreira, Josilene; Cunha, Paulo; Kamienski, Carlos; Sadok, Djamel: Traffic analysis and synthetic models of second life (2009) ioport
  8. Freire, Emanuel Pacheco; Ziviani, Artur; Salles, Ronaldo Moreira: On metrics to distinguish skype flows from HTTP traffic (2009) ioport
  9. Jeong, Yeonsik; Kakumanu, Sandeep; Tsao, Cheng-Lin; Sivakumar, Raghupathy: Voip over Wi-Fi networks: performance analysis and acceleration algorithms (2009) ioport
  10. Wu, Yu-Sung; Apte, Vinita; Bagchi, Saurabh; Garg, Sachin; Singh, Navjot: Intrusion detection in voice over IP environments (2009) ioport
  11. årnes, André; Haas, Paul; Vigna, Giovanni; Kemmerer, Richard A.: Using a virtual security testbed for digital forensic reconstruction. (2007) ioport
  12. Ilie, Dragos; Popescu, Adrian: Statistical models for Gnutella signaling traffic (2007)
  13. Miu, Allen; Balakrishnan, Hari; Koksal, Can Emre: Multi-radio diversity in wireless networks (2007) ioport
  14. Pandey, Nirved; Sharma, G. K.: Startup comparison for message passing libraries with DTM on linux clusters (2007) ioport
  15. Santhi Thilagam, P.; Ananthanarayana, V. S.: Extraction and optimization of fuzzy association rules using multi-objective genetic algorithm (2007) ioport
  16. Shon, Taeshik; Moon, Jongsub: A hybrid machine learning approach to network anomaly detection (2007) ioport
  17. Bhole, Yogesh; Popescu, Adrian: Measurement and analysis of HTTP traffic (2006) ioport
  18. Galloway, Alexander R.: “Carnivore personal edition”: exploring distributed data surveillance (2006) ioport
  19. Duffield, Nick: Sampling for passive internet measurement: a review (2004)
  20. Agarwala, Sandip; Poellabauer, Christian; Kong, Jiantao; Schwan, Karsten; Wolf, Matthew: System-level resource monitoring in high-performance computing environments (2003)

1 2 next