TCPDUMP

Tcpdump prints out a description of the contents of packets on a network interface that match the boolean expression. It can also be run with the -w flag, which causes it to save the packet data to a file for later analysis, and/or with the -r flag, which causes it to read from a saved packet file rather than to read packets from a network interface. In all cases, only packets that match expression will be processed by tcpdump. Tcpdump will, if not run with the -c flag, continue capturing packets until it is interrupted by a SIGINT signal (generated, for example, by typing your interrupt character, typically control-C) or a SIGTERM signal (typically generated with the kill(1) command); if run with the -c flag, it will capture packets until it is interrupted by a SIGINT or SIGTERM signal or the specified number of packets have been processed.


References in zbMATH (referenced in 20 articles )

Showing results 1 to 20 of 20.
Sorted by year (citations)

  1. Sait, Saad Y.; Bhandari, Akshay; Khare, Shreya; James, Cyriac; Murthy, Hema A.: Multi-level anomaly detection: relevance of big data analytics in networks (2015)
  2. Di Battista, Giuseppe; Squarcella, Claudio; Nagele, Wolfgang: How to visualize the K-root name server (2012)
  3. Song, Yingbo; Locasto, Michael E.; Stavrou, Angelos; Keromytis, Angelos D.; Stolfo, Salvatore J.: On the infeasibility of modeling polymorphic shellcode re-thinking the role of learning in intrusion detection systems (2010)
  4. Xi, Bowei; Chen, Hui; Cleveland, William S.; Telkamp, Thomas: Statistical analysis and modeling of Internet VoIP traffic for network engineering (2010)
  5. Antonello, Rafael; Fernandes, St^enio; Moreira, Josilene; Cunha, Paulo; Kamienski, Carlos; Sadok, Djamel: Traffic analysis and synthetic models of second life (2009)
  6. Freire, Emanuel Pacheco; Ziviani, Artur; Salles, Ronaldo Moreira: On metrics to distinguish skype flows from HTTP traffic (2009)
  7. Jeong, Yeonsik; Kakumanu, Sandeep; Tsao, Cheng-Lin; Sivakumar, Raghupathy: Voip over Wi-Fi networks: performance analysis and acceleration algorithms (2009)
  8. Wu, Yu-Sung; Apte, Vinita; Bagchi, Saurabh; Garg, Sachin; Singh, Navjot: Intrusion detection in voice over IP environments (2009)
  9. årnes, André; Haas, Paul; Vigna, Giovanni; Kemmerer, Richard A.: Using a virtual security testbed for digital forensic reconstruction. (2007)
  10. Ilie, Dragos; Popescu, Adrian: Statistical models for Gnutella signaling traffic (2007)
  11. Miu, Allen; Balakrishnan, Hari; Koksal, Can Emre: Multi-radio diversity in wireless networks (2007)
  12. Pandey, Nirved; Sharma, G.K.: Startup comparison for message passing libraries with DTM on linux clusters (2007)
  13. Santhi Thilagam, P.; Ananthanarayana, V.S.: Extraction and optimization of fuzzy association rules using multi-objective genetic algorithm (2007)
  14. Shon, Taeshik; Moon, Jongsub: A hybrid machine learning approach to network anomaly detection (2007)
  15. Bhole, Yogesh; Popescu, Adrian: Measurement and analysis of HTTP traffic (2006)
  16. Galloway, Alexander R.: “Carnivore personal edition”: exploring distributed data surveillance (2006)
  17. Duffield, Nick: Sampling for passive internet measurement: a review (2004)
  18. Agarwala, Sandip; Poellabauer, Christian; Kong, Jiantao; Schwan, Karsten; Wolf, Matthew: System-level resource monitoring in high-performance computing environments (2003)
  19. Northcut, Stephen; Novak, Judy: Intrusion detection systems (2001)
  20. Ritke, Ronn; Hong, Xiaoyan; Gerla, Mario: Contradictory relationship between Hurst parameter and queueing performance (extended version) (2001)