Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.5555/1267303.1267305guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

The BSD packet filter: a new architecture for user-level packet capture

Published: 25 January 1993 Publication History

Abstract

Many versions of Unix provide facilities for user-level packet capture, making possible the use of general purpose workstations for network monitoring. Because network monitors run as user-level processes, packets must be copied across the kernel/user-space protection boundary. This copying can be minimized by deploying a kernel agent called a packet filter, which discards unwanted packets as early as possible. The original Unix packet filter was designed around a stack-based filter evaluator that performs sub-optimally on current RISC CPUs. The BSD Packet Filter (BPF) uses a new, register-based filter evaluator that is up to 20 times faster than the original design. BPF alson uses a straighforward buffering strategy that makes its overall performance up to 100 times faster than Sun's NIT running on the same hardware.

References

[1]
{1} Braden, R. T. A pseudo-machine for packet monitoring and statistics. In Proceedings of SIGCOMM '88 (Stanford, CA, Aug. 1988), ACM.
[2]
{2} Digital Equipment Corporation. packetfilter(4), Ultrix V4.1 Manual.
[3]
Griswold, R. E., and Griswold, M. T. The Icon Programming Language. Prentice Hall, Inc., Englewood Cliffs, NJ, 1983.
[4]
{4} Jacobson, V., Leres, C., and McCannee, S. The Tcpdump Manual Page. Lawrence Berkeley Laboratory, Berkeley, CA, June 1989.
[5]
{5} Leres, C. The Arpwatch Manual Page. Lawrence Berkeley Laboratory, Berkeley, CA, Sept. 1992.
[6]
{6} McCanne, S. The BPF Manual Page. Lawrence Berkeley Laboratory, Berkeley, CA, May 1991.
[7]
{7} Mogul, J. C. Efficient use of workstations for passive monitoring of local area networks. In Proceedings of SIGCOMM '90 (Philadelphia, PA, Sept. 1990), ACM.
[8]
{8} Mogul, J.C., Rashid, R. F., and Accetta, M. J. The packet filter: an efficient mechanism for user-level network code. In Proceedings of 11th Symposium on Operating Systems Principles (Austin, TX, Nov. 1987), ACM, pp. 39-51.
[9]
{9} Rice, S. P. iprof source code, May 1991. Brown University.
[10]
{10} Sun Microsystems Inc. NIT(4P): SunOS 4.1.1 Reference Manual. Mountain View, CA, Oct. 1990. Part Number: 800-5480-10.

Cited By

View all
  • (2024)SidekickProceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation10.5555/3691825.3691924(1813-1830)Online publication date: 16-Apr-2024
  • (2024)Multitenant in-network acceleration with SwitchVMProceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation10.5555/3691825.3691863(691-708)Online publication date: 16-Apr-2024
  • (2024)A Perfect Fit? - Towards Containers on MicrokernelsProceedings of the 10th International Workshop on Container Technologies and Container Clouds10.1145/3702637.3702957(1-6)Online publication date: 2-Dec-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
USENIX'93: Proceedings of the USENIX Winter 1993 Conference Proceedings on USENIX Winter 1993 Conference Proceedings
January 1993
52 pages

Publisher

USENIX Association

United States

Publication History

Published: 25 January 1993

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)SidekickProceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation10.5555/3691825.3691924(1813-1830)Online publication date: 16-Apr-2024
  • (2024)Multitenant in-network acceleration with SwitchVMProceedings of the 21st USENIX Symposium on Networked Systems Design and Implementation10.5555/3691825.3691863(691-708)Online publication date: 16-Apr-2024
  • (2024)A Perfect Fit? - Towards Containers on MicrokernelsProceedings of the 10th International Workshop on Container Technologies and Container Clouds10.1145/3702637.3702957(1-6)Online publication date: 2-Dec-2024
  • (2024)Gradient: Gradual Compartmentalization via Object Capabilities Tracked in TypesProceedings of the ACM on Programming Languages10.1145/36897518:OOPSLA2(1135-1161)Online publication date: 8-Oct-2024
  • (2024)Developing Process Scheduling Policies in User Space with Common OS FeaturesProceedings of the 15th ACM SIGOPS Asia-Pacific Workshop on Systems10.1145/3678015.3680481(38-44)Online publication date: 4-Sep-2024
  • (2024)PeTAL: Ensuring Access Control Integrity against Data-only Attacks on LinuxProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3690184(2919-2933)Online publication date: 2-Dec-2024
  • (2024)Exemplary Determination of Cgroups-Based QoS Isolation for a Database WorkloadCompanion of the 15th ACM/SPEC International Conference on Performance Engineering10.1145/3629527.3652267(235-241)Online publication date: 7-May-2024
  • (2024)An Empirical Analysis of Common OCI Runtimes' Performance Isolation CapabilitiesProceedings of the 15th ACM/SPEC International Conference on Performance Engineering10.1145/3629526.3645044(60-70)Online publication date: 7-May-2024
  • (2023)SToRM: Smart ticket resolution steps recommendation in facilities managementProceedings of the Third International Conference on AI-ML Systems10.1145/3639856.3639887(1-7)Online publication date: 25-Oct-2023
  • (2023)AR Game Traffic Analysis: A Case of Pokemon Go in Flash Crowd EventProceedings of the 18th Asian Internet Engineering Conference10.1145/3630590.3630593(19-27)Online publication date: 12-Dec-2023
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media