-
2
-
-
84883290864
-
B4: Experience with a globally-deployed software defined WAN
-
Hong Kong, China
-
S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, M. Zhu, J. Zolla, U. Hozle, S. Stuart, and A. Vahdat, B4: Experience with a globally-deployed software defined WAN, in Proc. ACM SIGCOMM 2013 Conference on SIGCOMM, Hong Kong, China, 2013, pp. 3-14.
-
(2013)
Proc. ACM SIGCOMM 2013 Conference on SIGCOMM
, pp. 3-14
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhu, M.10
Zolla, J.11
Hozle, U.12
Stuart, S.13
Vahdat, A.14
-
3
-
-
85076687896
-
Ensuring connectivity via data plane mechanisms
-
presented at, Lombard, IL, USA
-
J.D. Liu, A. Panda, A. Singla, B. Godfrey, M. Schapira, and S. Shenker, Ensuring connectivity via data plane mechanisms, presented at 10th USENIX Symposium on Networked Systems Design and Implementation, Lombard, IL, USA, 2013.
-
(2013)
10th USENIX Symposium on Networked Systems Design and Implementation
-
-
Liu, J.D.1
Panda, A.2
Singla, A.3
Godfrey, B.4
Schapira, M.5
Shenker, S.6
-
4
-
-
84855202314
-
Datadriven network connectivity
-
New York, USA
-
J. D. Liu, B. H. Yan, S. Shenker, and M. Schapira, Datadriven network connectivity, in Proc.10th ACM Workshop on Hot Topics in Networks, New York, USA, 2011, p. 8.
-
(2011)
Proc.10th ACM Workshop on Hot Topics in Networks
, pp. 8
-
-
Liu, J.D.1
Yan, B.H.2
Shenker, S.3
Schapira, M.4
-
5
-
-
84900630296
-
-
Qihoo 360 Internet Security Center, Development trend of enterprise security in the internet ages
-
Qihoo 360 Internet Security Center, Development trend of enterprise security in the internet ages, http:// www.gartner.com/technology/mediaproducts/ pdfindex.jsp? g=Qihoo issue1, 2013.
-
(2013)
-
-
-
6
-
-
79960807470
-
NetSecu: A collaborative network security platform for in-network security
-
X. M. Chen, B. P. Mu, and C. Zhen, NetSecu: A collaborative network security platform for in-network security, in Proc. 3rd International Conference on Communications and Mobile Computing, Qingdao, China, 2011, pp. 59-64.
-
(2011)
Proc. 3rd International Conference on Communications and Mobile Computing Qingdao China
, pp. 59-64
-
-
Chen, X.M.1
Mu, B.P.2
Zhen, C.3
-
7
-
-
34547571798
-
Handling high speed traffic measurement using network processors
-
presented at, Guilin, China
-
D. H. Ruan, C. Lin, Z. Chen, and J. Ni, Handling high speed traffic measurement using network processors, presented at International Conference on Communication Technology, Guilin, China, 2006.
-
(2006)
International Conference on Communication Technology
-
-
Ruan, D.H.1
Lin, C.2
Chen, Z.3
Ni, J.4
-
8
-
-
47249143769
-
A fast multi-pattern matching algorithm for deep packet inspection on a network processor
-
presented at the, Xi'an, China
-
J. Ni, C. Lin, and Z. Chen, A fast multi-pattern matching algorithm for deep packet inspection on a network processor, presented at the IEEE International Conference on Parallel Processing, Xi'an, China, 2007.
-
(2007)
IEEE International Conference on Parallel Processing
-
-
Ni, J.1
Lin, C.2
Chen, Z.3
-
9
-
-
42549117244
-
AntiWorm NPU-based parallel bloom filters in Giga-Ethernet LAN
-
DOI 10.1109/ICC.2006.255083, 4024478, 2006 IEEE International Conference on Communications, ICC 2006
-
Z. Chen, C. Lin, J. Ni, D.H. Ruan, B. Zheng, Y. X. Jiang, X. H. Peng, Y. Wang, A. A. Luo, B. Zhu, Y. Yue, and F. Y. Ren, AntiWorm NPU-based parallel bloom filters for TCP/IP content processing in giga-Ethernet LAN, in Proc. the IEEE International Conference on Communications, 2006, pp. 2118-2123. (Pubitemid 351575544)
-
(2006)
IEEE International Conference on Communications
, vol.5
, pp. 2118-2123
-
-
Chen, Z.1
Lin, C.2
Ni, J.3
Ruan, D.-H.4
Zheng, B.5
Tan, Z.-X.6
Jiang, Y.-X.7
Peng, X.-H.8
Luo, A.-A.9
Zhu, B.10
Yue, Y.11
Wang, Y.12
Ungsunan, P.13
Ren, F.-Y.14
-
10
-
-
33751426666
-
AntiWorm NPU-based parallel bloom filters for TCP/IP content processing in Giga-Ethernet LAN
-
DOI 10.1109/LCN.2005.31, 1550959, Proceedings - The IEEE Conference on Local Computer Networks - 30th Anniversary, LCN 2005
-
Z. Chen, C. Lin, J. Ni, D. H. Ruan, B. Zheng, Y. X. Jiang, and F. Y. Ren, AntiWorm NPU-based parallel bloom filters for TCP/IP content processing in Giga-Ethernet LAN, in Proc. the IEEE International Conference on Local Computer Networks, Sydney, Australia, 2005, pp. 748- 755. (Pubitemid 44815678)
-
(2005)
Proceedings - Conference on Local Computer Networks, LCN
, vol.2005
, pp. 748-755
-
-
Chen, Z.1
Lin, C.2
Ni, J.3
Ruan, D.-H.4
Zheng, B.5
Jiang, Y.-X.6
Peng, X.-H.7
Wang, Y.8
Luo, A.-A.9
Zhu, B.10
Yue, Y.11
Ren, F.-Y.12
-
11
-
-
84893570087
-
FRESCO: Modular composable security services for software-defined networks
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. F. Gu, and M. Tyson, FRESCO: Modular composable security services for software-defined networks, presented at Network and Distributed Security Symposium, 2013.
-
(2013)
Presented at Network and Distributed Security Symposium
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.F.5
Tyson, M.6
-
12
-
-
84900667129
-
-
2008
-
L7 filter project, http://l7-filter.sourceforge.net/Pattern- HOWTO, 2008.
-
-
-
-
13
-
-
84999424855
-
CSamp: A system for network-wide flow monitoring
-
V. Sekar, M. K. Reiter, W. Willinger, H. Zhang, R. R. Kompella, and D. G. Andersen, cSamp: A system for network-wide flow monitoring, in Proc. 5th USENIX Symposium on Networked Systems Design and Implementation, San Francisco, USA, 2008, pp. 233-246.
-
(2008)
Proc. 5th USENIX Symposium on Networked Systems Design and Implementation San Francisco USA
, pp. 233-246
-
-
Sekar, V.1
Reiter, M.K.2
Willinger, W.3
Zhang, H.4
Kompella, R.R.5
Andersen, D.G.6
-
14
-
-
84883735924
-
A slick control plane for network middleboxes
-
Hong Kong, China
-
B. Anwer, T. Benson, N. Feamster, D. Levin, and J. Rexford, A slick control plane for network middleboxes, in Proc. Association for Computing Machinery, Hong Kong, China, 2013, pp. 147-148.
-
(2013)
Proc. Association for Computing Machinery
, pp. 147-148
-
-
Anwer, B.1
Benson, T.2
Feamster, N.3
Levin, D.4
Rexford, J.5
-
15
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
Hong Kong, China
-
Z. A. Qazi, C. C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu, SIMPLE-fying middlebox policy enforcement using SDN, in Proc. Association for Computing Machinery, Hong Kong, China, 2013, pp. 27-38.
-
(2013)
Proc. Association for Computing Machinery
, pp. 27-38
-
-
Qazi, Z.A.1
Tu, C.C.2
Chiang, L.3
Miao, R.4
Sekar, V.5
Yu, M.6
-
16
-
-
84866345800
-
LiveSec: Towards effective security management in large-scale production networks
-
Macau, China
-
K. Wang, Y. Qi, B. Yang, Y. Xue, and J. Li, LiveSec: Towards effective security management in large-scale production networks, in Proc. IEEE 32nd International Conference on Distributed Computing SystemsWorkshops, Macau, China, 2012, pp. 451-460.
-
(2012)
Proc. IEEE 32nd International Conference on Distributed Computing Systems Workshops
, pp. 451-460
-
-
Wang, K.1
Qi, Y.2
Yang, B.3
Xue, Y.4
Li, J.5
-
17
-
-
84874242893
-
LiveCloud: A lucid orchestrator for cloud datacenters
-
Taipei, China
-
X. Wang, Z. Liu, Y. Qi, and J. Li, LiveCloud: A lucid orchestrator for cloud datacenters, in Proc. IEEE 4th International Conference on Cloud Computing Technology and Science, Taipei, China, 2012, pp. 341-348.
-
(2012)
Proc. IEEE 4th International Conference on Cloud Computing Technology and Science
, pp. 341-348
-
-
Wang, X.1
Liu, Z.2
Qi, Y.3
Li, J.4
-
18
-
-
84900664130
-
-
2013
-
VMWare Network security, http://www.vmware.com/ products/nsx/resources. html, 2013.
-
-
-
-
19
-
-
84900593117
-
-
2013
-
VMware NSX network virtualization platform, http://www.vmware.com/ products/nsx, 2013.
-
-
-
-
20
-
-
77953988606
-
UTM-CM: A practical control mechanism solution for UTM system
-
Shenzhen, China
-
Y. Zhang, F. Deng, Z. Chen, Y. B. Xue, and C. Lin, UTM-CM: A practical control mechanism solution for UTM system, in Proc. IEEE International Conference on Communications and Mobile Computing, Shenzhen, China, 2010, pp. 86-90.
-
(2010)
Proc. IEEE International Conference on Communications and Mobile Computing
, pp. 86-90
-
-
Zhang, Y.1
Deng, F.2
Chen, Z.3
Xue, Y.B.4
Lin, C.5
-
21
-
-
84900647186
-
-
2013
-
Bro, http://www.bro-ids.org, 2013.
-
-
-
-
22
-
-
84876982811
-
A collaborative botnets suppression system based on overlay network
-
F. Han, Z. Chen, H. Xu, H. Wang, and Y. Liang, A collaborative botnets suppression system based on overlay network, International Journal of Security and Networks, vol. 7, no. 4, pp. 211-219, 2012.
-
(2012)
International Journal of Security and Networks
, vol.7
, Issue.4
, pp. 211-219
-
-
Han, F.1
Chen, Z.2
Xu, H.3
Wang, H.4
Liang, Y.5
-
23
-
-
84876261368
-
Cloud computing-based forensic analysis for collaborative network security management system
-
Z. Chen, F. Han, J. Cao, X. Jiang, and S. Chen, Cloud computing-based forensic analysis for collaborative network security management system, Tsinghua Science and Technology, vol. 18, no. 1, pp. 40-50, 2013.
-
(2013)
Tsinghua Science and Technology
, vol.18
, Issue.1
, pp. 40-50
-
-
Chen, Z.1
Han, F.2
Cao, J.3
Jiang, X.4
Chen, S.5
-
24
-
-
81255143544
-
AC-suffix-tree: Buffer free string matching on out-of-sequence packets
-
IEEE Computer Society, Brooklyn, NY, USA
-
X. Chen, K. Ge, Z. Chen, and J. Li, AC-Suffix-Tree: Buffer free string matching on out-of-sequence packets, in Proc. 2011 ACM/IEEE Seventh Symposium on Architectures for Networking and Communications Systems, IEEE Computer Society, Brooklyn, NY, USA, 2011, pp. 36-44.
-
(2011)
Proc. 2011 ACM IEEE Seventh Symposium on Architectures for Networking and Communications Systems
, pp. 36-44
-
-
Chen, X.1
Ge, K.2
Chen, Z.3
Li, J.4
-
25
-
-
80053019503
-
LARX: Largescale antiphishing by retrospective data-exploring based on a cloud computing platform
-
Maui, HI, USA
-
T. Li, F. Han, S. Ding, and Z. Chen, LARX: Largescale antiphishing by retrospective data-exploring based on a cloud computing platform, in Proc. IEEE 20th International Conference on Computer Communications and Networks, Maui, HI, USA, 2011, pp. 1-5.
-
(2011)
Proc. IEEE 20th International Conference on Computer Communications and Networks
, pp. 1-5
-
-
Li, T.1
Han, F.2
Ding, S.3
Chen, Z.4
-
26
-
-
79960810107
-
A collaborative network security management system in metropolitan area network
-
Qingdao, China
-
B. Mu, X. Chen, and Z. Chen, A collaborative network security management system in metropolitan area network, in Proc. IEEE 3rd International Conference on Communications and Mobile Computing, Qingdao, China, 2011, pp. 45-50.
-
(2011)
Proc. IEEE 3rd International Conference on Communications and Mobile Computing
, pp. 45-50
-
-
Mu, B.1
Chen, X.2
Chen, Z.3
-
27
-
-
84900637022
-
-
Untangle open source appliance, 2013
-
Untangle open source appliance, https://gitorious.org/ untangle, 2013.
-
-
-
-
29
-
-
33749855170
-
Building an integrated security gateway: Mechanisms, performance evaluations, implementations, and research issues
-
Y. D. Lin, H. Y. Wei, and S. T. Yu, Building an integrated security gateway: Mechanisms, performance evaluations, implementations, and research issues, IEEE Communications Surveys & Tutorials, vol. 4, no. 1, pp. 2- 15, 2002.
-
(2002)
IEEE Communications Surveys & Tutorials
, vol.4
, Issue.1
, pp. 2-15
-
-
Lin, Y.D.1
Wei, H.Y.2
Yu, S.T.3
-
30
-
-
33947392597
-
Designing an integrated architecture for network content security gateways
-
Y. D. Lin, C. W. Jan, P. C. Lin, and Y. C. Lai, Designing an integrated architecture for network content security gateways, Computer, vol. 39, no. 11, pp. 66-72, 2006.
-
(2006)
Computer
, vol.39
, Issue.11
, pp. 66-72
-
-
Lin, Y.D.1
Jan, C.W.2
Lin, P.C.3
Lai, Y.C.4
-
31
-
-
84655164884
-
Session level flow classification by packet size distribution and session grouping
-
C. N. Lu, C. Y. Huang, Y. D. Lin, and Y. C. Lai, Session level flow classification by packet size distribution and session grouping, Computer Networks, vol. 56, no. 1, pp. 260-272, 2012.
-
(2012)
Computer Networks
, vol.56
, Issue.1
, pp. 260-272
-
-
Lu, C.N.1
Huang, C.Y.2
Lin, Y.D.3
Lai, Y.C.4
-
32
-
-
84900666511
-
-
US Patents US20070043738A1, February 22
-
D. Morris, J. Irwin, and R. Scott, Methods and systems for reputation based resource allocation for networking, US Patents US20070043738A1, February 22, 2007.
-
(2007)
Methods and Systems for Reputation Based Resource Allocation for Networking
-
-
Morris, D.1
Irwin, J.2
Scott, R.3
-
33
-
-
84900618976
-
-
2013
-
Xtables-addons, http://xtables-addons.sourceforge.net, 2013.
-
-
-
-
34
-
-
84900624710
-
-
2009
-
Snort-inline, http://snort-inline.sourceforge.net, 2009.
-
-
-
-
35
-
-
84900611923
-
-
2010
-
Snort, http://www.snort.org, 2010.
-
-
-
-
36
-
-
84867750819
-
Performance analysis of packet capture methods in a 10 Gbps virtualized environment
-
Munich, Germany
-
M. J. Schultz and P. Crowley, Performance analysis of packet capture methods in a 10 Gbps virtualized environment, in Proc. IEEE 21st International Conference on Computer Communications and Networks, Munich, Germany, 2012, pp. 1-8.
-
(2012)
Proc. IEEE 21st International Conference on Computer Communications and Networks
, pp. 1-8
-
-
Schultz, M.J.1
Crowley, P.2
-
37
-
-
82955186380
-
VPFRING: Towards wire-speed network monitoring using virtual machines
-
Berlin, Germany
-
A. Cardigliano, L. Deri, J. Gasparakis, and F. Fusco, vPFRING: Towards wire-speed network monitoring using virtual machines, in Proc. ACM SIGCOMM Conference on Internet Mearsurement Conference, Berlin, Germany, 2011, pp. 533-548.
-
(2011)
Proc. ACM SIGCOMM Conference on Internet Mearsurement Conference
, pp. 533-548
-
-
Cardigliano, A.1
Deri, L.2
Gasparakis, J.3
Fusco, F.4
|