바로가기 메뉴
본문내용 바로가기

SAP (NETWORK FORENSIC) PatronuX  >  Product & Service   >  Threat Intelligence

The life of a packet (The Competition)

  • DMA
    from NIC to
    memory
  • Wrapped
    in SKB
  • Sent to
    networking
    stack
  • Copied to
    user-space
  • Copied to file
    system, back to
    kernel-space
  • DMA from
    “page cache”
    to Disk