메뉴 건너뛰기




Volumn , Issue , 2014, Pages 271-282

Deep Packet inspection as a service

Author keywords

[No Author keywords available]

Indexed keywords

DEEP PACKET INSPECTION; DEEP PACKET INSPECTION (DPI); MIDDLEBOXES; QOS/QOE; ROUTE TRAFFIC;

EID: 84920438426     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/2674005.2674984     Document Type: Conference Paper
Times cited : (101)

References (52)
  • 1
    • 84871288362 scopus 로고    scopus 로고
    • MCA2: Multi-core architecture for mitigating complexity attacks
    • Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral. MCA2: multi-core architecture for mitigating complexity attacks. In ANCS, pages 235-246, 2012.
    • (2012) ANCS , pp. 235-246
    • Afek, Y.1    Bremler-Barr, A.2    Harchol, Y.3    Hay, D.4    Koral, Y.5
  • 2
    • 0016518897 scopus 로고
    • Efficient string matching: An aid to bibliographic search
    • Alfred V. Aho and Margaret J. Corasick. Efficient string matching: An aid to bibliographic search. Commun. of the ACM, 18(6):333-340, 1975.
    • (1975) Commun. Of The ACM , vol.18 , Issue.6 , pp. 333-340
    • Aho, A.V.1    Corasick, M.J.2
  • 3
    • 84920459792 scopus 로고    scopus 로고
    • The web information company
    • Alexa: The web information company, 2013. http://www.alexa.com/topsites.
    • (2013)
  • 4
    • 84871331372 scopus 로고    scopus 로고
    • xOMB: Extensible open middleboxes with commodity servers
    • James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat. xOMB: extensible open middleboxes with commodity servers. In ANCS, pages 49-60, 2012.
    • (2012) ANCS , pp. 49-60
    • Anderson, J.W.1    Braud, R.2    Kapoor, R.3    Porter, G.4    Vahdat, A.5
  • 5
    • 2442457808 scopus 로고    scopus 로고
    • Time and area efficient pattern matching on FPGAs
    • Zachary K. Baker and Viktor K. Prasanna. Time and area efficient pattern matching on FPGAs. In FPGA, pages 223-232, 2004.
    • (2004) FPGA , pp. 223-232
    • Baker, Z.K.1    Prasanna, V.K.2
  • 6
    • 56749186238 scopus 로고    scopus 로고
    • A hybrid finite automaton for practical deep packet inspection
    • Michela Becchi and Patrick Crowley
    • Michela Becchi and Patrick Crowley. A hybrid finite automaton for practical deep packet inspection. In CoNEXT, page 1, 2007.
    • (2007) CoNEXT , pp. 1
  • 7
    • 77954026099 scopus 로고    scopus 로고
    • An improved algorithm to accelerate regular expression evaluation
    • Michela Becchi and Patrick Crowley
    • Michela Becchi and Patrick Crowley. An improved algorithm to accelerate regular expression evaluation. In ANCS, pages 145-154, 2007.
    • (2007) ANCS , pp. 145-154
  • 8
    • 84920384562 scopus 로고    scopus 로고
    • Blue coat packet shapper
    • Blue coat packet shapper. http://www.bluecoat.com/products/packetshaper.
  • 9
    • 80052761869 scopus 로고    scopus 로고
    • Space-time tradeoffs in software-based deep packet inspection
    • Anat Bremler-Barr, Yotam Harchol, and David Hay. Space-time tradeoffs in software-based deep packet inspection. In HPSR, pages 1-8, 2011.
    • (2011) HPSR , pp. 1-8
    • Bremler-Barr, A.1    Harchol, Y.2    Hay, D.3
  • 10
    • 84920399205 scopus 로고    scopus 로고
    • The Bro Network Security Monitor
    • The Bro Network Security Monitor. http://bro-ids.org.
  • 11
    • 84920474350 scopus 로고    scopus 로고
    • Check Point DLP software blade
    • CheckPoint. Check Point DLP software blade. http://www.checkpoint.com/products/dlp-software-blade/.11
  • 12
    • 84920448751 scopus 로고    scopus 로고
    • Clam AntiVirus
    • Clam AntiVirus. http://www.clamav.net.1
  • 14
    • 84920408383 scopus 로고    scopus 로고
    • Crossbeam. Virtualized security: The next generation of consolidation
    • Crossbeam. Virtualized security: The next generation of consolidation, 2012. http://www.computerlinks.ch/ FMS/14322.virtualized-security-en-.pdf.
    • (2012)
  • 16
    • 84883469564 scopus 로고    scopus 로고
    • introductory white paper
    • ETSI. Network functions virtualisation - introductory white paper, 2012. http://portal.etsi.org/NFV/NFV-White-Paper.pdf.
    • (2012) Network Functions Virtualisation
  • 18
    • 84883696109 scopus 로고    scopus 로고
    • FlowTags: Enforcing network-Wide policies in the presence of dynamic middlebox actions
    • Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu, and Jeffrey C. Mogul. FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In HotSDN, pages 19-24, 2013.
    • (2013) HotSDN , pp. 19-24
    • Fayazbakhsh, S.K.1    Sekar, V.2    Yu, M.3    Mogul, J.C.4
  • 20
    • 84898980350 scopus 로고    scopus 로고
    • October
    • Open Networking Foundation. Openflow switch specification version 1.4.0, October 2013. https://www.opennetworking.org/images/stories/ downloads/sdn-resources/onf-specifications/ openflow/openflow-spec-v1.4.0.pdf.
    • (2013) Openflow Switch Specification Version 1.4.0
  • 21
    • 70350764027 scopus 로고    scopus 로고
    • Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
    • Jing Fu and Jennifer Rexford
    • Jing Fu and Jennifer Rexford. Efficient IP-address lookup with a shared forwarding table for multiple virtual routers. In CoNEXT, page 21, 2008.
    • (2008) CoNEXT , pp. 21
  • 23
    • 84870344450 scopus 로고    scopus 로고
    • Prathmesh Prabhu, Zainab Ghadiyali, and Aditya Akella. Toward Software-defined Middlebox Networking
    • Aaron Gember, Prathmesh Prabhu, Zainab Ghadiyali, and Aditya Akella. Toward software-defined middlebox networking. In HotNets, pages 7-12, 2012.
    • (2012) HotNets , pp. 7-12
    • Gember, A.1
  • 24
    • 84866519169 scopus 로고    scopus 로고
    • Outsourcing network functionality
    • Glen Gibb, Hongyi Zeng, and Nick Mckeown. Outsourcing network functionality. In HotSDN, pages 73-78, 2012.
    • (2012) HotSDN , pp. 73-78
    • Gibb, G.1    Zeng, H.2    Mckeown, N.3
  • 25
    • 84904431142 scopus 로고    scopus 로고
    • Software defined monitoring of application protocols
    • Lukas Kekely, Viktor Pus, and Jan Korenek. Software defined monitoring of application protocols. In INFOCOM, pages 1725-1733, 2014.
    • (2014) INFOCOM , pp. 1725-1733
    • Kekely, L.1    Pus, V.2    Korenek, J.3
  • 27
  • 28
    • 33750368839 scopus 로고    scopus 로고
    • Algorithms to accelerate multiple regular expressions matching for deep packet inspection
    • Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, and Jonathan Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In SIGCOMM, pages 339-350, 2006.
    • (2006) SIGCOMM , pp. 339-350
    • Kumar, S.1    Dharmapurikar, S.2    Yu, F.3    Crowley, P.4    Turner, J.5
  • 29
    • 34547683816 scopus 로고    scopus 로고
    • Advanced algorithms for fast and scalable deep packet inspection
    • Sailesh Kumar, Jonathan Turner, and John Williams. Advanced algorithms for fast and scalable deep packet inspection. In ANCS, pages 81-92, 2006.
    • (2006) ANCS , pp. 81-92
    • Kumar, S.1    Turner, J.2    Williams, J.3
  • 30
    • 84864255134 scopus 로고    scopus 로고
    • A network in a laptop: Rapid prototyping for software-Defined networks
    • Bob Lantz, Brandon Heller, and Nick McKeown. A network in a laptop: Rapid prototyping for software-defined networks. In Hotnets-IX, pages 19:1-19:6, 2010.
    • (2010) Hotnets-IX , pp. 191-196
    • Lantz, B.1    Heller, B.2    McKeown, N.3
  • 31
    • 79952944364 scopus 로고    scopus 로고
    • Memory-efficient and scalable virtual routers using FPGA
    • Hoang Le, Thilan Ganegedara, and Viktor K Prasanna. Memory-efficient and scalable virtual routers using FPGA. In FPGA, pages 257-266, 2011.
    • (2011) FPGA , pp. 257-266
    • Le, H.1    Ganegedara, T.2    Prasanna, V.K.3
  • 32
    • 84958957354 scopus 로고    scopus 로고
    • Performance adaptation in real-time intrusion detection systems
    • Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, and Yi Zhang. Performance adaptation in real-time intrusion detection systems. In RAID, pages 252-273, 2002.
    • (2002) RAID , pp. 252-273
    • Lee, W.1    Cabrera, J.B.D.2    Thomas, A.3    Balwalli, N.4    Saluja, S.5    Zhang, Y.6
  • 33
    • 85076292285 scopus 로고    scopus 로고
    • Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems
    • Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu. Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems. In USENIX Security, pages 8-8, 2010.
    • (2010) USENIX Security , pp. 8-8
    • Meiners, C.R.1    Patel, J.2    Norige, E.3    Torng, E.4    Liu, A.X.5
  • 34
    • 84920474304 scopus 로고    scopus 로고
    • ModSecurity. http://www.modsecurity.org.
  • 36
    • 84920475372 scopus 로고    scopus 로고
    • Big Switch Networks
    • Big Switch Networks. Big tap monitoring fabric, 2014. http://www.bigswitch.com/products/big-tap-monitoring-fabric.
    • (2014) Big Tap Monitoring Fabric
  • 37
    • 84920457949 scopus 로고    scopus 로고
    • F5 Networks. Local traffic manager
    • F5 Networks. Local traffic manager. https: //f5.com/products/modules/local-traffic- manager.
  • 39
    • 84920391727 scopus 로고    scopus 로고
    • Personal communication with several networking and security companies
    • ]Personal communication with several networking and security companies.
  • 40
    • 84920393201 scopus 로고    scopus 로고
    • Pox controller
    • Pox controller, 2013. http://www.noxrepo.org/pox/about- pox.
    • (2013)
  • 41
    • 84883284152 scopus 로고    scopus 로고
    • SIMPLE-fying middlebox policy enforcement using SDN
    • Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, and Minlan Yu. SIMPLE-fying middlebox policy enforcement using SDN. In SIGCOMM, pages 27-38, 2013.
    • (2013) SIGCOMM , pp. 27-38
    • Qazi, Z.A.1    Tu, C.-C.2    Chiang, L.3    Miao, R.4    Sekar, V.5    Yu, M.6
  • 43
    • 84893281460 scopus 로고    scopus 로고
    • Pico replication: A high availability framework for middleboxes
    • Shriram Rajagopalan, Dan Williams, and Hani Jamjoom. Pico replication: a high availability framework for middleboxes. In SoCC, pages 1:1-1:15, 2013.
    • (2013) SoCC , pp. 11-115
    • Rajagopalan, S.1    Williams, D.2    Jamjoom, H.3
  • 44
    • 85076716117 scopus 로고    scopus 로고
    • Split/merge: System support for elastic execution in virtual middleboxes
    • Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield. Split/merge: System support for elastic execution in virtual middleboxes. In NSDI, pages 227-240, 2013.
    • (2013) NSDI , pp. 227-240
    • Rajagopalan, S.1    Williams, D.2    Jamjoom, H.3    Warfield, A.4
  • 45
    • 84866514819 scopus 로고    scopus 로고
    • Design and implementation of a consolidated middlebox architecture
    • Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K Reiter, and Guangyu Shi. Design and implementation of a consolidated middlebox architecture. In NSDI, pages 24-38, 2012.
    • (2012) NSDI , pp. 24-38
    • Sekar, V.1    Egi, N.2    Ratnasamy, S.3    Reiter, M.K.4    Shi, G.5
  • 47
    • 84894550652 scopus 로고    scopus 로고
    • Making middleboxes someone Else's problem: Network processing as a cloud service
    • Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, and Vyas Sekar. Making middleboxes someone else's problem: network processing as a cloud service. In SIGCOMM, pages 13-24, 2012.
    • (2012) SIGCOMM , pp. 13-24
    • Sherry, J.1    Hasan, S.2    Scott, C.3    Krishnamurthy, A.4    Ratnasamy, S.5    Sekar, V.6
  • 48
    • 84920480681 scopus 로고    scopus 로고
    • Snort. http://www.snort.org.
  • 49
    • 77953317894 scopus 로고    scopus 로고
    • Building scalable virtual routers with trie braiding
    • Haoyu Song, Murali Kodialam, Fang Hao, and TV Lakshman. Building scalable virtual routers with trie braiding. In INFOCOM, pages 1-9, 2010.
    • (2010) INFOCOM , pp. 1-9
    • Song, H.1    Kodialam, M.2    Hao, F.3    Lakshman, T.V.4
  • 50
    • 84920436732 scopus 로고    scopus 로고
    • Sony Ericsson Latest Victim of SQL Injection Attack
    • Sony Ericsson Latest Victim of SQL Injection Attack, 2011. http://www.eweek.com/c/a/Security/Sony-Data-Breach-Was-Camouflaged-by-Anonymous-DDoS-Attack-807651.
    • (2011)
  • 52
    • 34547662263 scopus 로고    scopus 로고
    • Fast and memory-efficient regular expression matching for deep packet inspection
    • Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, and Randy H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS, pages 93-102, 2006.
    • (2006) ANCS , pp. 93-102
    • Fang, Y.1    Chen, Z.2    Diao, Y.3    Lakshman, T.V.4    Katz, R.H.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.