-
1
-
-
84871288362
-
MCA2: Multi-core architecture for mitigating complexity attacks
-
Yehuda Afek, Anat Bremler-Barr, Yotam Harchol, David Hay, and Yaron Koral. MCA2: multi-core architecture for mitigating complexity attacks. In ANCS, pages 235-246, 2012.
-
(2012)
ANCS
, pp. 235-246
-
-
Afek, Y.1
Bremler-Barr, A.2
Harchol, Y.3
Hay, D.4
Koral, Y.5
-
2
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
Alfred V. Aho and Margaret J. Corasick. Efficient string matching: An aid to bibliographic search. Commun. of the ACM, 18(6):333-340, 1975.
-
(1975)
Commun. Of The ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
3
-
-
84920459792
-
-
The web information company
-
Alexa: The web information company, 2013. http://www.alexa.com/topsites.
-
(2013)
-
-
-
4
-
-
84871331372
-
xOMB: Extensible open middleboxes with commodity servers
-
James W. Anderson, Ryan Braud, Rishi Kapoor, George Porter, and Amin Vahdat. xOMB: extensible open middleboxes with commodity servers. In ANCS, pages 49-60, 2012.
-
(2012)
ANCS
, pp. 49-60
-
-
Anderson, J.W.1
Braud, R.2
Kapoor, R.3
Porter, G.4
Vahdat, A.5
-
5
-
-
2442457808
-
Time and area efficient pattern matching on FPGAs
-
Zachary K. Baker and Viktor K. Prasanna. Time and area efficient pattern matching on FPGAs. In FPGA, pages 223-232, 2004.
-
(2004)
FPGA
, pp. 223-232
-
-
Baker, Z.K.1
Prasanna, V.K.2
-
6
-
-
56749186238
-
A hybrid finite automaton for practical deep packet inspection
-
Michela Becchi and Patrick Crowley
-
Michela Becchi and Patrick Crowley. A hybrid finite automaton for practical deep packet inspection. In CoNEXT, page 1, 2007.
-
(2007)
CoNEXT
, pp. 1
-
-
-
7
-
-
77954026099
-
An improved algorithm to accelerate regular expression evaluation
-
Michela Becchi and Patrick Crowley
-
Michela Becchi and Patrick Crowley. An improved algorithm to accelerate regular expression evaluation. In ANCS, pages 145-154, 2007.
-
(2007)
ANCS
, pp. 145-154
-
-
-
8
-
-
84920384562
-
-
Blue coat packet shapper
-
Blue coat packet shapper. http://www.bluecoat.com/products/packetshaper.
-
-
-
-
9
-
-
80052761869
-
Space-time tradeoffs in software-based deep packet inspection
-
Anat Bremler-Barr, Yotam Harchol, and David Hay. Space-time tradeoffs in software-based deep packet inspection. In HPSR, pages 1-8, 2011.
-
(2011)
HPSR
, pp. 1-8
-
-
Bremler-Barr, A.1
Harchol, Y.2
Hay, D.3
-
10
-
-
84920399205
-
-
The Bro Network Security Monitor
-
The Bro Network Security Monitor. http://bro-ids.org.
-
-
-
-
11
-
-
84920474350
-
-
Check Point DLP software blade
-
CheckPoint. Check Point DLP software blade. http://www.checkpoint.com/products/dlp-software-blade/.11
-
-
-
-
12
-
-
84920448751
-
-
Clam AntiVirus
-
Clam AntiVirus. http://www.clamav.net.1
-
-
-
-
14
-
-
84920408383
-
-
Crossbeam. Virtualized security: The next generation of consolidation
-
Crossbeam. Virtualized security: The next generation of consolidation, 2012. http://www.computerlinks.ch/ FMS/14322.virtualized-security-en-.pdf.
-
(2012)
-
-
-
16
-
-
84883469564
-
-
introductory white paper
-
ETSI. Network functions virtualisation - introductory white paper, 2012. http://portal.etsi.org/NFV/NFV-White-Paper.pdf.
-
(2012)
Network Functions Virtualisation
-
-
-
17
-
-
84893360247
-
-
Seyed Kaveh Fayazbakhsh In HotMiddlebox
-
Seyed Kaveh Fayazbakhsh, Michael K Reiter, and Vyas Sekar. Verifiable network function outsourcing: requirements, challenges, and roadmap. In HotMiddlebox, pages 25-30, 2013.
-
(2013)
Michael K Reiter, and Vyas Sekar. Verifiable Network Function Outsourcing: Requirements, Challenges, and Roadmap.
, pp. 25-30
-
-
-
18
-
-
84883696109
-
FlowTags: Enforcing network-Wide policies in the presence of dynamic middlebox actions
-
Seyed Kaveh Fayazbakhsh, Vyas Sekar, Minlan Yu, and Jeffrey C. Mogul. FlowTags: enforcing network-wide policies in the presence of dynamic middlebox actions. In HotSDN, pages 19-24, 2013.
-
(2013)
HotSDN
, pp. 19-24
-
-
Fayazbakhsh, S.K.1
Sekar, V.2
Yu, M.3
Mogul, J.C.4
-
19
-
-
84874514209
-
An improved DFA for fast regular expression matching
-
Domenico Ficara, Stefano Giordano, Gregorio Procissi, Fabio Vitucci, Gianni Antichi, and Andrea Di Pietro. An improved DFA for fast regular expression matching. Computer Communication Review, 38(5):29-40, 2008.
-
(2008)
Computer Communication Review
, vol.38
, Issue.5
, pp. 29-40
-
-
Ficara, D.1
Giordano, S.2
Procissi, G.3
Vitucci, F.4
Antichi, G.5
Di Pietro, A.6
-
20
-
-
84898980350
-
-
October
-
Open Networking Foundation. Openflow switch specification version 1.4.0, October 2013. https://www.opennetworking.org/images/stories/ downloads/sdn-resources/onf-specifications/ openflow/openflow-spec-v1.4.0.pdf.
-
(2013)
Openflow Switch Specification Version 1.4.0
-
-
-
21
-
-
70350764027
-
Efficient IP-address lookup with a shared forwarding table for multiple virtual routers
-
Jing Fu and Jennifer Rexford
-
Jing Fu and Jennifer Rexford. Efficient IP-address lookup with a shared forwarding table for multiple virtual routers. In CoNEXT, page 21, 2008.
-
(2008)
CoNEXT
, pp. 21
-
-
-
22
-
-
84883295383
-
Stratos: A network-aware orchestration layer for middleboxes in the cloud
-
abs/1305.0209
-
Aaron Gember, Anand Krishnamurthy, Saul St. John, Robert Grandl, Xiaoyang Gao, Ashok Anand, Theophilus Benson, Aditya Akella, and Vyas Sekar. Stratos: A network-aware orchestration layer for middleboxes in the cloud. CoRR, abs/1305.0209, 2013.
-
(2013)
CoRR
-
-
Gember, A.1
Krishnamurthy, A.2
St John, S.3
Grandl, R.4
Gao, X.5
Anand, A.6
Benson, T.7
Akella, A.8
Sekar, V.9
-
23
-
-
84870344450
-
Prathmesh Prabhu, Zainab Ghadiyali, and Aditya Akella. Toward Software-defined Middlebox Networking
-
Aaron Gember, Prathmesh Prabhu, Zainab Ghadiyali, and Aditya Akella. Toward software-defined middlebox networking. In HotNets, pages 7-12, 2012.
-
(2012)
HotNets
, pp. 7-12
-
-
Gember, A.1
-
24
-
-
84866519169
-
Outsourcing network functionality
-
Glen Gibb, Hongyi Zeng, and Nick Mckeown. Outsourcing network functionality. In HotSDN, pages 73-78, 2012.
-
(2012)
HotSDN
, pp. 73-78
-
-
Gibb, G.1
Zeng, H.2
Mckeown, N.3
-
25
-
-
84904431142
-
Software defined monitoring of application protocols
-
Lukas Kekely, Viktor Pus, and Jan Korenek. Software defined monitoring of application protocols. In INFOCOM, pages 1725-1733, 2014.
-
(2014)
INFOCOM
, pp. 1725-1733
-
-
Kekely, L.1
Pus, V.2
Korenek, J.3
-
28
-
-
33750368839
-
Algorithms to accelerate multiple regular expressions matching for deep packet inspection
-
Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, and Jonathan Turner. Algorithms to accelerate multiple regular expressions matching for deep packet inspection. In SIGCOMM, pages 339-350, 2006.
-
(2006)
SIGCOMM
, pp. 339-350
-
-
Kumar, S.1
Dharmapurikar, S.2
Yu, F.3
Crowley, P.4
Turner, J.5
-
29
-
-
34547683816
-
Advanced algorithms for fast and scalable deep packet inspection
-
Sailesh Kumar, Jonathan Turner, and John Williams. Advanced algorithms for fast and scalable deep packet inspection. In ANCS, pages 81-92, 2006.
-
(2006)
ANCS
, pp. 81-92
-
-
Kumar, S.1
Turner, J.2
Williams, J.3
-
30
-
-
84864255134
-
A network in a laptop: Rapid prototyping for software-Defined networks
-
Bob Lantz, Brandon Heller, and Nick McKeown. A network in a laptop: Rapid prototyping for software-defined networks. In Hotnets-IX, pages 19:1-19:6, 2010.
-
(2010)
Hotnets-IX
, pp. 191-196
-
-
Lantz, B.1
Heller, B.2
McKeown, N.3
-
31
-
-
79952944364
-
Memory-efficient and scalable virtual routers using FPGA
-
Hoang Le, Thilan Ganegedara, and Viktor K Prasanna. Memory-efficient and scalable virtual routers using FPGA. In FPGA, pages 257-266, 2011.
-
(2011)
FPGA
, pp. 257-266
-
-
Le, H.1
Ganegedara, T.2
Prasanna, V.K.3
-
32
-
-
84958957354
-
Performance adaptation in real-time intrusion detection systems
-
Wenke Lee, João B. D. Cabrera, Ashley Thomas, Niranjan Balwalli, Sunmeet Saluja, and Yi Zhang. Performance adaptation in real-time intrusion detection systems. In RAID, pages 252-273, 2002.
-
(2002)
RAID
, pp. 252-273
-
-
Lee, W.1
Cabrera, J.B.D.2
Thomas, A.3
Balwalli, N.4
Saluja, S.5
Zhang, Y.6
-
33
-
-
85076292285
-
Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems
-
Chad R. Meiners, Jignesh Patel, Eric Norige, Eric Torng, and Alex X. Liu. Fast regular expression matching using small TCAMs for network intrusion detection and prevention systems. In USENIX Security, pages 8-8, 2010.
-
(2010)
USENIX Security
, pp. 8-8
-
-
Meiners, C.R.1
Patel, J.2
Norige, E.3
Torng, E.4
Liu, A.X.5
-
34
-
-
84920474304
-
-
ModSecurity. http://www.modsecurity.org.
-
-
-
-
36
-
-
84920475372
-
-
Big Switch Networks
-
Big Switch Networks. Big tap monitoring fabric, 2014. http://www.bigswitch.com/products/big-tap-monitoring-fabric.
-
(2014)
Big Tap Monitoring Fabric
-
-
-
37
-
-
84920457949
-
-
F5 Networks. Local traffic manager
-
F5 Networks. Local traffic manager. https: //f5.com/products/modules/local-traffic- manager.
-
-
-
-
39
-
-
84920391727
-
-
Personal communication with several networking and security companies
-
]Personal communication with several networking and security companies.
-
-
-
-
40
-
-
84920393201
-
-
Pox controller
-
Pox controller, 2013. http://www.noxrepo.org/pox/about- pox.
-
(2013)
-
-
-
41
-
-
84883284152
-
SIMPLE-fying middlebox policy enforcement using SDN
-
Zafar Ayyub Qazi, Cheng-Chun Tu, Luis Chiang, Rui Miao, Vyas Sekar, and Minlan Yu. SIMPLE-fying middlebox policy enforcement using SDN. In SIGCOMM, pages 27-38, 2013.
-
(2013)
SIGCOMM
, pp. 27-38
-
-
Qazi, Z.A.1
Tu, C.-C.2
Chiang, L.3
Miao, R.4
Sekar, V.5
Yu, M.6
-
42
-
-
84920457417
-
Network service header
-
February
-
Paul Quinn, Puneet Agarwal, Rajeev Manur, Rex Fernando, Jim Guichard, Surendra Kumar, Abhishek Chauhan, Michael Smith, Navindra Yadav, and Brad McConnell. Network service header. IETF Internet-Draft, February 2014. https: //datatracker.ietf.org/doc/draft-quinn-sfc- nsh.
-
(2014)
IETF Internet-Draft
-
-
Quinn, P.1
Agarwal, P.2
Manur, R.3
Fernando, R.4
Guichard, J.5
Kumar, S.6
Chauhan, A.7
Smith, M.8
Yadav, N.9
McConnell, B.10
-
43
-
-
84893281460
-
Pico replication: A high availability framework for middleboxes
-
Shriram Rajagopalan, Dan Williams, and Hani Jamjoom. Pico replication: a high availability framework for middleboxes. In SoCC, pages 1:1-1:15, 2013.
-
(2013)
SoCC
, pp. 11-115
-
-
Rajagopalan, S.1
Williams, D.2
Jamjoom, H.3
-
44
-
-
85076716117
-
Split/merge: System support for elastic execution in virtual middleboxes
-
Shriram Rajagopalan, Dan Williams, Hani Jamjoom, and Andrew Warfield. Split/merge: System support for elastic execution in virtual middleboxes. In NSDI, pages 227-240, 2013.
-
(2013)
NSDI
, pp. 227-240
-
-
Rajagopalan, S.1
Williams, D.2
Jamjoom, H.3
Warfield, A.4
-
45
-
-
84866514819
-
Design and implementation of a consolidated middlebox architecture
-
Vyas Sekar, Norbert Egi, Sylvia Ratnasamy, Michael K Reiter, and Guangyu Shi. Design and implementation of a consolidated middlebox architecture. In NSDI, pages 24-38, 2012.
-
(2012)
NSDI
, pp. 24-38
-
-
Sekar, V.1
Egi, N.2
Ratnasamy, S.3
Reiter, M.K.4
Shi, G.5
-
47
-
-
84894550652
-
Making middleboxes someone Else's problem: Network processing as a cloud service
-
Justine Sherry, Shaddi Hasan, Colin Scott, Arvind Krishnamurthy, Sylvia Ratnasamy, and Vyas Sekar. Making middleboxes someone else's problem: network processing as a cloud service. In SIGCOMM, pages 13-24, 2012.
-
(2012)
SIGCOMM
, pp. 13-24
-
-
Sherry, J.1
Hasan, S.2
Scott, C.3
Krishnamurthy, A.4
Ratnasamy, S.5
Sekar, V.6
-
48
-
-
84920480681
-
-
Snort. http://www.snort.org.
-
-
-
-
49
-
-
77953317894
-
Building scalable virtual routers with trie braiding
-
Haoyu Song, Murali Kodialam, Fang Hao, and TV Lakshman. Building scalable virtual routers with trie braiding. In INFOCOM, pages 1-9, 2010.
-
(2010)
INFOCOM
, pp. 1-9
-
-
Song, H.1
Kodialam, M.2
Hao, F.3
Lakshman, T.V.4
-
50
-
-
84920436732
-
-
Sony Ericsson Latest Victim of SQL Injection Attack
-
Sony Ericsson Latest Victim of SQL Injection Attack, 2011. http://www.eweek.com/c/a/Security/Sony-Data-Breach-Was-Camouflaged-by-Anonymous-DDoS-Attack-807651.
-
(2011)
-
-
-
52
-
-
34547662263
-
Fast and memory-efficient regular expression matching for deep packet inspection
-
Fang Yu, Zhifeng Chen, Yanlei Diao, T. V. Lakshman, and Randy H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS, pages 93-102, 2006.
-
(2006)
ANCS
, pp. 93-102
-
-
Fang, Y.1
Chen, Z.2
Diao, Y.3
Lakshman, T.V.4
Katz, R.H.5
|