Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Fabrice Tchakountio is active.

Publication


Featured researches published by Fabrice Tchakountio.


acm special interest group on data communication | 2001

Hash-based IP traceback

Alex C. Snoeren; Craig Partridge; Luis A. Sanchez; Christine E. Jones; Fabrice Tchakountio; Stephen T. Kent; W. Timothy Strayer

The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packets origin, wide-spread packet forwarding techniques such as NAT and encapsulation may obscure the packets true source. Techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion.We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past. We demonstrate that the system is effective, space-efficient (requiring approximately 0.5% of the link capacity per unit time in storage), and implementable in current or next-generation routing hardware. We present both analytic and simulation results showing the systems effectiveness.


IEEE ACM Transactions on Networking | 2002

Single-packet IP traceback

Alex C. Snoeren; Craig Partridge; Luis A. Sanchez; Christine E. Jones; Fabrice Tchakountio; Beverly Schwartz; Stephen T. Kent; W. Timothy Strayer

The design of the IP protocol makes it difficult to reliably identify the originator of an IP packet. Even in the absence of any deliberate attempt to disguise a packets origin, widespread packet forwarding techniques such as NAT and encapsulation may obscure the packets true source. Techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion. We present a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past. We demonstrate that the system is effective, space efficient (requiring approximately 0.5% of the link capacity per unit time in storage), and implementable in current or next-generation routing hardware. We present both analytic and simulation results showing the systems effectiveness.


darpa information survivability conference and exposition | 2001

Hardware support for a hash-based IP traceback

Luis A. Sanchez; Walter Clark Milliken; Alex C. Snoeren; Fabrice Tchakountio; Christine E. Jones; Stephen T. Kent; Craig Partridge; William Timothy Strayer

The Source Path Isolation Engine (SPIE) is a system capable of tracing a single IP packet to its point of origin or point of ingress into a network. SPIE supports tracing by scoring a few bits of unique information about each packet for a period of time as the packets traverse the network. Software implementations of SPIE can trace packets through networks comprised of slow-to-medium speed routers (up to OC-12), but higher-speed routers (OC-48 and faster) require hardware support. In this paper, we discuss these hardware design aspects of SPIE. Most of the hardware resides in a self-contained SPIE processing unit, which may be implemented in a line card form factor for insertion into the router itself or as a stand-alone unit that connects to the router through an external interface.


darpa information survivability conference and exposition | 2003

Traceback of single IP packets using SPIE

William Timothy Strayer; Christine E. Jones; Fabrice Tchakountio; Alex C. Snoeren; B. Schwartz; R.C. Clements; Matthew Condell; Craig Partridge

The design of the Internet protocol makes it difficult to reliably identify the originator of an IP packet. IP traceback techniques have been developed to determine the source of large packet flows, but, to date, no system has been presented to track individual packets in an efficient, scalable fashion. We present SPIE, the Source Path Isolation Engine, a hash-based technique for IP traceback that generates audit trails for traffic within the network, and can trace the origin of a single IP packet delivered by the network in the recent past.


military communications conference | 2007

Channel Access over Path Segments for Ultra Low Latency MANETs

Ram Ramanathan; Fabrice Tchakountio

While the capacity of Mobile Ad Hoc Networks (MANETs) has received considerable attention, the issue of end-to-end latency has been largely ignored. As military MANETs get larger and denser with an increasing number of end-to-end hops, the latency and jitter experienced by packets will be prohibitively high for existing and emerging real-time applications. We present and study a novel mechanism called CAPS (Channel Access over Path Segments) for reducing end-to-end latency. The key idea behind CAPS is to reserve the floor multiple hops (a path segment) at a time. This is accomplished by using multi-hop RTS and CTS frames that acquire the access rights for an entire segment toward the destination, with virtual carrier sense acting on a path basis. Our architecture also includes a cut-through physical layer that pipelines a bit stream through the receive and transmit chains. We present a numerical analysis of the relative performance gain from our ideas, complemented by a simulation-based analysis. Our study shows that, depending upon the parameters used, a 3x to 8x reduction in latency over current systems is possible.


darpa information survivability conference and exposition | 2003

SPIE demonstration: single packet traceback

William Timothy Strayer; Christine E. Jones; Fabrice Tchakountio; Alex C. Snoeren

SPIE, the Source Path Isolation Engine, is a DARPA-funded system for tracing single IP packets back through a network of instrumented routers or tap boxes that are associated with the routers. Historically, tracing individual packets by keeping packet logs at each router has required prohibitive amounts of memory; one of SPIEs key innovations is to reduce the memory requirement (down to 0.5% of link capacity) by storing only packet digests, that is, hashes of the packets rather than the packet itself. SPIE-enhanced routers maintain a cache of packet digests for recently forwarded traffic. If a packet is determined to be offensive by an intrusion detection system (or judged interesting by some other metric), a query is dispatched to the SPIE system that, in turn, queries routers for packet digests of the relevant time periods. ne results of this query are used in a simulated reverse-path flooding algorithm to build a highly reliable and accurate attack graph that identifies the packets source or sources.


world of wireless, mobile and multimedia networks | 2001

Tracking Highly Mobile Endpoints

Fabrice Tchakountio; Ram Ramanathan


workshop on mobile computing systems and applications | 2004

Anticipatory routing for highly mobile endpoints

Fabrice Tchakountio; Ram Ramanathan


IEEE ACM Transactions on Networking | 2002

IP Traceback to record packet digests traffic forwarded by the routers

Alex C. Snoeren; Craig Partridge; Luis A. Sanchez; Christine E. Jones; Fabrice Tchakountio; Beverly Schwartz; Stephen T. Kent; W. Timothy Strayer


Storage and Retrieval for Image and Video Databases | 2006

Design and implementation of a MIMO MAC protocol for ad hoc networking

Jason Redi; William J. Watson; Ram Ramanathan; Prithwish Basu; Fabrice Tchakountio; Michael Girone; Martha Steenstrup

Collaboration


Dive into the Fabrice Tchakountio's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge