wanted: tool for traffic generation / characteristics / monitoring

2015-10-01 Thread Matthias Flittner
Dear colleagues, Currently we are looking for a magic tool with which it is possible to generate specific (realistic) traffic patterns between client and server to analyze (monitor) traffic characteristics (jitter, delay, inter arrival times, etc.). It would be good if that wanted tool is not onl

wanted: tool for traffic generation / characteristics / monitoring

2015-10-01 Thread Matthias Flittner
(KIT) Institute of Telematics Matthias Flittner, M.Sc. Kaiserstr. 12 Building 20.20; Room 365 76131 Karlsruhe, Germany Phone: +49 721 608-46416 Fax: +49 721 608-46789 Mobile: +49 176 21940967 Email: matthias.flitt...@kit.edu Web: http://www.kit.edu/ KIT – University of the State of Baden

Re: Recommendations for DDOS detection software?

2010-04-23 Thread Matthias Flittner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hello Major, You could do this easly with http://www.snort.org/ . regards, matthias -BEGIN PGP SIGNATURE- Version: GnuPG v1.4.10 (MingW32) Comment: Using GnuPG with Mozilla - http://enigmail.mozdev.org/ iQEcBAEBAgAGBQJL0Zg7AAoJEIZn8Rym6s4AzdI

Off-Topic: use laptop only as USB power supply

2010-05-20 Thread Matthias Flittner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi there, I'm not sure if anyone out there has an answer to this insane question: But is it possible to use my laptop only has power supply via usb for my mobile phone. Yes you heard right: I don't want to boot an operating system I only want to charge

Literatur hint needed

2010-06-16 Thread Matthias Flittner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hi Folks, I'm searching an fundamental book about how to (inter)connect two networks. It should be about how to connect your business network in a secure and reliable way to the internet. The book should contain some theoretical basics and common used

Re: Literatur hint needed

2010-06-16 Thread Matthias Flittner
-BEGIN PGP SIGNED MESSAGE- Hash: SHA1 Hey Jens, thanks for your fast answer. > "The Illustrated Network: How TCP/IP Works in a Modern Network" > (ISBN-13: 978-0123745415) should cover this topic. Yes this book covers a lot but I need one which should help me to build an secure transfer poi

POC amazon dot de or dot com

2010-07-21 Thread Matthias Flittner
Hi folks, Can someone from amazon dot de or dot com onlineshop contact me off-list regarding some abuse or rather anomolies with my account? Thanks a lot. I would be appreciate if someone could assist me. best regards, -FliTTi signature.asc Description: OpenPGP digital signature

Re: just seen my first IPv6 network abuse scan, is this the start for more?

2010-09-03 Thread Matthias Flittner
Hi, > Since recently we noticed "Neighbour table overflow" warnings from > the kernel on a lot of Linux machines. As this was very annoying for > us and our customers I started to dump traffic and tried to find the > cause. sounds for me as an typicall IPv6 DoS attack. (see RFC3756) Sheng Jiang h

Re: just seen my first IPv6 network abuse scan, is this the start for more?

2010-09-03 Thread Matthias Flittner
> However this scan was from a external host. The only traffic I saw on > the subnet was normal/valid NA lookups from the router towards an > increasing IPv6-address (starting with ::1, then ::2 etc). On the > router side I clearly saw the icmp traffic from the source doing a > scan on these destin