메뉴 건너뛰기




Volumn , Issue , 2013, Pages 19-24

FlowTags: Enforcing network-wide policies in the presence of dynamic middlebox actions

Author keywords

Middlebox; Network policy enforcement

Indexed keywords

APPLICATION SCENARIO; DYNAMIC TRAFFIC; MIDDLEBOXES; NETWORK INFRASTRUCTURE; NETWORK POLICY; PERFORMANCE DIAGNOSTICS; POLICY ENFORCEMENT; SECURITY AND PERFORMANCE;

EID: 84883696109     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2491185.2491203     Document Type: Conference Paper
Times cited : (171)

References (20)
  • 1
    • 84883660828 scopus 로고    scopus 로고
    • 2012 Cloud Networking Report. http://www.webtorials.com/content/2012/11/ 2012-cloud-networking-report.html.
    • (2012) Cloud Networking Report
  • 2
    • 84883702921 scopus 로고    scopus 로고
    • ONF Expands Scope
    • ONF Expands Scope; Drives Technical Work Forward. https://www. opennetworking.org/media/press-releases/564-onf-expands-scope-drives-technical- work-forward.
    • Drives Technical Work Forward
  • 3
    • 83455259548 scopus 로고    scopus 로고
    • Flow processing and the rise of commodity network hardware
    • Apr.
    • A. Greenlagh et al. Flow Processing and the Rise of Commodity Network Hardware. ACM CCR, Apr. 2009.
    • (2009) ACM CCR
    • Greenlagh, A.1
  • 6
    • 84870378856 scopus 로고    scopus 로고
    • Stratos: Virtual middleboxes as first-class entities
    • A. Gember et al. Stratos: Virtual Middleboxes as First-Class Entities. UW-Madison TR1771, 2012.
    • (2012) UW-Madison TR1771
    • Gember, A.1
  • 9
    • 85074798835 scopus 로고    scopus 로고
    • Header space analysis: Static checking for networks
    • P. Kazemian, G. Varghese, and N. McKeown. Header space analysis: static checking for networks. In Proc. NSDI, 2012.
    • (2012) Proc. NSDI
    • Kazemian, P.1    Varghese, G.2    McKeown, N.3
  • 11
    • 84876128556 scopus 로고    scopus 로고
    • Is it still possible to extend TCP?
    • M. Honda et al. Is it still possible to extend TCP? In Proc. IMC, 2011.
    • (2011) Proc. IMC
    • Honda, M.1
  • 13
    • 84870339501 scopus 로고    scopus 로고
    • A compiler and run-time system for network programming languages
    • C. Monsanto, N. Foster, R. Harrison, and D. Walker. A compiler and run-time system for network programming languages. In Proc. POPL, 2012.
    • (2012) Proc. POPL
    • Monsanto, C.1    Foster, N.2    Harrison, R.3    Walker, D.4
  • 15
    • 79953672829 scopus 로고    scopus 로고
    • Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software
    • J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In Proc. NDSS, 2005.
    • (2005) Proc. NDSS
    • Newsome, J.1    Song, D.2
  • 16
    • 0033295259 scopus 로고    scopus 로고
    • Bro: A system for detecting network intruders in real-time
    • V. Paxson. Bro: A system for detecting network intruders in real-time. In Computer Networks, pages 2435-2463, 1999.
    • (1999) Computer Networks , pp. 2435-2463
    • Paxson, V.1
  • 18
    • 84893766472 scopus 로고    scopus 로고
    • Network-wide deployment of intrusion detection and prevention systems
    • V. Sekar et al. Network-wide deployment of intrusion detection and prevention systems. In Proc. CoNext, 2010.
    • (2010) Proc. CoNext
    • Sekar, V.1
  • 19
    • 84883723982 scopus 로고    scopus 로고
    • Design and implementation of a consolidated middlebox architecture
    • V. Sekar et al. Design and implementation of a consolidated middlebox architecture. In Proc. NSDI, 2012.
    • (2012) Proc. NSDI
    • Sekar, V.1
  • 20
    • 84866513406 scopus 로고    scopus 로고
    • Making middleboxes someone else's problem: Network processing as a cloud service
    • J. Sherry et al. Making Middleboxes Someone Else's Problem: Network Processing as a Cloud Service. In Proc. SIGCOMM, 2012.
    • (2012) Proc. SIGCOMM
    • Sherry, J.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.