-
1
-
-
84981298323
-
OpenFlow: Enabling Innovation in Campus Networks
-
April
-
N. McKeown, T. Anderson, H. Balakrishnan, G. Parulkar, L. Peterson, J. Rexford, S. Shenker, and J. Turner, “OpenFlow: Enabling Innovation in Campus Networks, ” in Proceedings of ACM Computer Communications Review, April 2008.
-
(2008)
Proceedings of ACM Computer Communications Review
-
-
McKeown, N.1
Anderson, T.2
Balakrishnan, H.3
Parulkar, G.4
Peterson, L.5
Rexford, J.6
Shenker, S.7
Turner, J.8
-
3
-
-
70350656962
-
NOX: Towards an Operating System for Networks
-
July
-
N. Gude, T. Koponen, J. Pettit, B. Pfaff, M. Casado, N. McKeown, and S. Shenker, “NOX: Towards an Operating System for Networks, ” in Proceedings of ACM Computer Communications Review, July 2008.
-
(2008)
Proceedings of ACM Computer Communications Review
-
-
Gude, N.1
Koponen, T.2
Pettit, J.3
Pfaff, B.4
Casado, M.5
McKeown, N.6
Shenker, S.7
-
4
-
-
84937877542
-
-
FloodLight
-
FloodLight, “Open SDN controller, ” http://floodlight.openflowhub.org/.
-
Open SDN controller
-
-
-
6
-
-
85076908087
-
Can the Production Network Be the Testbed
-
R. Sherwood, G. Gibb, K.-K. Yap, G. Appenzeller, M. Casado, N. McKeown, and G. Parulkar, “Can the Production Network Be the Testbed, ” in Proceedings of the Usenix Symposium on Operating System Design and Implementation (OSDI), 2010.
-
(2010)
Proceedings of the Usenix Symposium on Operating System Design and Implementation (OSDI)
-
-
Sherwood, R.1
Gibb, G.2
Yap, K.-K.3
Appenzeller, G.4
Casado, M.5
McKeown, N.6
Parulkar, G.7
-
7
-
-
84883290864
-
B4: Experience with a Globally-deployed Software Defined WAN
-
S. Jain, A. Kumar, S. Mandal, J. Ong, L. Poutievski, A. Singh, S. Venkata, J. Wanderer, J. Zhou, M. Zhu, J. Zolla, U. Hölzle, S. Stuart, and A. Vahdat, “B4: Experience with a Globally-deployed Software Defined WAN, ” in Proceedings of ACM SIGCOMM, 2013.
-
(2013)
Proceedings of ACM SIGCOMM
-
-
Jain, S.1
Kumar, A.2
Mandal, S.3
Ong, J.4
Poutievski, L.5
Singh, A.6
Venkata, S.7
Wanderer, J.8
Zhou, J.9
Zhu, M.10
Zolla, J.11
Hölzle, U.12
Stuart, S.13
Vahdat, A.14
-
8
-
-
84893570087
-
Fresco: Modular composable security services for software-defined networks
-
February
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson, “Fresco: Modular composable security services for software-defined networks, ” in Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS'13), February 2013.
-
(2013)
Proceedings of the 20th Annual Network and Distributed System Security Symposium (NDSS'13)
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
9
-
-
85180550484
-
-
OpenFlowHub
-
OpenFlowHub, “BEACON, ” http://www.openflowhub.org/display/Beacon.
-
BEACON
-
-
-
10
-
-
84883696109
-
FlowTags: Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions
-
S. K. Fayazbakhsh, V. Sekar, M. Yu, and J. C. Mogul, “FlowTags: Enforcing Network-wide Policies in the Presence of Dynamic Middlebox Actions, ” in Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
-
-
Fayazbakhsh, S. K.1
Sekar, V.2
Yu, M.3
Mogul, J. C.4
-
11
-
-
84866512813
-
VeriFlow: Verifying Network-Wide Invariants in Real Time
-
A. Khurshid, W. Zhou, M. Caesar, and P. B. Godfrey, “VeriFlow: Verifying Network-Wide Invariants in Real Time, ” in Proceedings of ACM Sigcomm HotSDN Workshop, 2012.
-
(2012)
Proceedings of ACM Sigcomm HotSDN Workshop
-
-
Khurshid, A.1
Zhou, W.2
Caesar, M.3
Godfrey, P. B.4
-
12
-
-
85180551993
-
-
VArmour, http://www.varmour.com/.
-
VArmour
-
-
-
13
-
-
84910659073
-
Rosemary: A robust, secure, and high-performance network operating system
-
S. Shin, Y. Song, T. Lee, S. Lee, J. Chung, P. Porras, V. Yegneswaran, J. Noh, and B. B. Kang, “Rosemary: A robust, secure, and high-performance network operating system, ” in Proceedings of the ACM SIGSAC Conference on Computer Communications Security, ser. CCS, 2014.
-
(2014)
Proceedings of the ACM SIGSAC Conference on Computer Communications Security, ser. CCS
-
-
Shin, S.1
Song, Y.2
Lee, T.3
Lee, S.4
Chung, J.5
Porras, P.6
Yegneswaran, V.7
Noh, J.8
Kang, B. B.9
-
15
-
-
84866518191
-
A Security Enforcement Kernel for OpenFlow Networks
-
P. Porras, S. Shin, V. Yegneswaran, M. Fong, M. Tyson, and G. Gu, “A Security Enforcement Kernel for OpenFlow Networks, ” in Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN), 2012.
-
(2012)
Proceedings of the ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking (HotSDN)
-
-
Porras, P.1
Shin, S.2
Yegneswaran, V.3
Fong, M.4
Tyson, M.5
Gu, G.6
-
16
-
-
84945273945
-
I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks
-
N. Handigol, B. Heller, V. Jeyakumar, D. Mazieres, and N. McKeown, “I Know What Your Packet Did Last Hop: Using Packet Histories to Troubleshoot Networks, ” in Proceedings of the Usenix Symposium on Operating System Design and Implementation, 2014.
-
(2014)
Proceedings of the Usenix Symposium on Operating System Design and Implementation
-
-
Handigol, N.1
Heller, B.2
Jeyakumar, V.3
Mazieres, D.4
McKeown, N.5
-
17
-
-
84866494980
-
Where is the debugger for my software-defined network?
-
ACM
-
N. Handigol, B. Heller, V. Jeyakumar, D. Maziéres, and N. McKeown, “Where is the debugger for my software-defined network?” in Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN'12. ACM, 2012.
-
(2012)
Proceedings of the First Workshop on Hot Topics in Software Defined Networks, ser. HotSDN'12
-
-
Handigol, N.1
Heller, B.2
Jeyakumar, V.3
Maziéres, D.4
McKeown, N.5
-
18
-
-
85077055075
-
Ofrewind: Enabling record and replay troubleshooting for networks
-
USENIX Association
-
A. Wundsam, D. Levin, S. Seetharaman, and A. Feldmann, “Ofrewind: Enabling record and replay troubleshooting for networks, ” in Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference, ser. USENIXATC'11. USENIX Association, 2011.
-
(2011)
Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference, ser. USENIXATC'11
-
-
Wundsam, A.1
Levin, D.2
Seetharaman, S.3
Feldmann, A.4
-
20
-
-
84857550070
-
Protocol buffers: Google's data interchange format
-
[Online]. Available
-
K. Varda, “Protocol buffers: Google's data interchange format, ” Google, Tech. Rep., 2008. [Online]. Available: http://google-opensource.blogspot.com/2008/07/protocol-buffers-googles-data.html
-
(2008)
Google, Tech. Rep
-
-
Varda, K.1
-
21
-
-
85061529860
-
BotHunter: Detecting Malware Infection Through IDS-driven Dialog Correlation
-
G. Gu, P. Porras, V. Yegneswaran, M. Fong, and W. Lee, “BotHunter: Detecting Malware Infection Through IDS-driven Dialog Correlation, ” in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, 2007.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium
-
-
Gu, G.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Lee, W.5
-
22
-
-
82155174788
-
The nature of datacenter traffic: Measurements and analysis
-
S. Kandula, S. Sengupta, A. Greenberg, and P. Patel, “The nature of datacenter traffic: Measurements and analysis, ” in In Proceedings of Usenix/ACM IMC, 2009.
-
(2009)
Proceedings of Usenix/ACM IMC
-
-
Kandula, S.1
Sengupta, S.2
Greenberg, A.3
Patel, P.4
-
23
-
-
84889062725
-
Avant-guard: Scalable and vigilant switch flow management in software-defined networks
-
S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “Avant-guard: Scalable and vigilant switch flow management in software-defined networks, ” in Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, ser. CCS, 2013.
-
(2013)
Proceedings of the 2013 ACM SIGSAC Conference on Computer Communications Security, ser. CCS
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
24
-
-
36949033604
-
Ethane: Taking Control of the Enterprise
-
M. Casado, M. J. Freedman, J. Pettit, J. Luo, N. McKeown, and S. Shenker, “Ethane: Taking Control of the Enterprise, ” in Proceedings of ACM SIGCOMM, 2007.
-
(2007)
Proceedings of ACM SIGCOMM
-
-
Casado, M.1
Freedman, M. J.2
Pettit, J.3
Luo, J.4
McKeown, N.5
Shenker, S.6
-
25
-
-
44249126961
-
SANE: A Protection Architecture for Enterprise Networks
-
M. Casado, T. Garfinkel, M. Freedman, A. Akella, D. Boneh, N. McKeowon, and S. Shenker, “SANE: A Protection Architecture for Enterprise Networks, ” in Proceedings of the Usenix Security Symposium, 2006.
-
(2006)
Proceedings of the Usenix Security Symposium
-
-
Casado, M.1
Garfinkel, T.2
Freedman, M.3
Akella, A.4
Boneh, D.5
McKeowon, N.6
Shenker, S.7
-
26
-
-
33750037341
-
A Clean Slate 4D Approach to Network Control and Management
-
A. Greenberg, G. Hjalmtysson, D. A. Maltz, A. Myers, J. Rexford, G. Xie, H. Yan, J. Zhan, and H. Zhang, “A Clean Slate 4D Approach to Network Control and Management, ” in Proceedings of ACM Computer Communications Review, 2005.
-
(2005)
Proceedings of ACM Computer Communications Review
-
-
Greenberg, A.1
Hjalmtysson, G.2
Maltz, D. A.3
Myers, A.4
Rexford, J.5
Xie, G.6
Yan, H.7
Zhan, J.8
Zhang, H.9
-
28
-
-
84865532010
-
DevoFlow: Cost-effective Flow Management for High Performance Enterprise Networks
-
J. C. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, A. R. Curtis, and S. Banerjee, “DevoFlow: Cost-effective Flow Management for High Performance Enterprise Networks, ” in Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets), 2010.
-
(2010)
Proceedings of the 10th ACM Workshop on Hot Topics in Networks (HotNets)
-
-
Mogul, J. C.1
Tourrilhes, J.2
Yalagandula, P.3
Sharma, P.4
Curtis, A. R.5
Banerjee, S.6
-
29
-
-
71949086200
-
Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security
-
E. Al-shaer, W. Marrero, A. El-atawy, and K. Elbadawi, “Network Configuration in A Box: Towards End-to-End Verification of Network Reachability and Security, ” in Proceedings of the IEEE International Conference on Network Protocols, 2009.
-
(2009)
Proceedings of the IEEE International Conference on Network Protocols
-
-
Al-shaer, E.1
Marrero, W.2
El-atawy, A.3
Elbadawi, K.4
-
30
-
-
25844500375
-
On Static Reachability Analysis of IP Networks
-
G. Xie, J. Zhan, D. Maltz, H. Zhang, A. Greenberg, G. Hjalmtysson, and J. Rexford, “On Static Reachability Analysis of IP Networks, ” in Proceeding of IEEE INFOCOM, 2005.
-
(2005)
Proceeding of IEEE INFOCOM
-
-
Xie, G.1
Zhan, J.2
Maltz, D.3
Zhang, H.4
Greenberg, A.5
Hjalmtysson, G.6
Rexford, J.7
-
33
-
-
34748874982
-
An Automated Framework for Validating Firewall Policy Enforcement
-
A. El-atawy, T. Samak, Z. Wali, E. Al-shaer, F. Lin, C. Pham, and S. Li, “An Automated Framework for Validating Firewall Policy Enforcement, ” Tech. Rep., 2007.
-
(2007)
Tech. Rep
-
-
El-atawy, A.1
Samak, T.2
Wali, Z.3
Al-shaer, E.4
Lin, F.5
Pham, C.6
Li, S.7
-
35
-
-
77955212375
-
Resonance: Dynamic Access Control for Enterprise Networks
-
A. Nayak, A. Reimers, N. Feamster, and R. Clark, “Resonance: Dynamic Access Control for Enterprise Networks, ” in Proceedings of the 1st ACM SIGCOMM WREN Workshop, 2009.
-
(2009)
Proceedings of the 1st ACM SIGCOMM WREN Workshop
-
-
Nayak, A.1
Reimers, A.2
Feamster, N.3
Clark, R.4
-
36
-
-
85013634872
-
A NICE Way to Test OpenFlow Applications
-
M. Canini, D. Venzano, P. Peresini, D. Kostic, and J. Rexford, “A NICE Way to Test OpenFlow Applications, ” in Proceedings of the Symposium on Network Systems Design and Implementation, 2012.
-
(2012)
Proceedings of the Symposium on Network Systems Design and Implementation
-
-
Canini, M.1
Venzano, D.2
Peresini, P.3
Kostic, D.4
Rexford, J.5
-
38
-
-
84883735924
-
A slick control plane for network middleboxes
-
B. Anwer, T. Benson, N. Feamster, D. Levin, and J. Rexford, “A slick control plane for network middleboxes, ” in Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2013.
-
(2013)
Proceedings of the Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
-
-
Anwer, B.1
Benson, T.2
Feamster, N.3
Levin, D.4
Rexford, J.5
-
39
-
-
84883284152
-
Simplefying middlebox policy enforcement using sdn
-
Z. A. Qazi, C.-C. Tu, L. Chiang, R. Miao, V. Sekar, and M. Yu, “Simplefying middlebox policy enforcement using sdn, ” in Proceedings of the ACM SIGCOMM Conference, 2013.
-
(2013)
Proceedings of the ACM SIGCOMM Conference
-
-
Qazi, Z. A.1
Tu, C.-C.2
Chiang, L.3
Miao, R.4
Sekar, V.5
Yu, M.6
-
40
-
-
85073558368
-
Virtual middelboxes as first-class entities in the cloud
-
A. Gember, A. Krishnamurthy, S. S. John, and A. Akella, “Virtual middelboxes as first-class entities in the cloud, ” in Proceedings of the Open Network Summit, 2012.
-
(2012)
Proceedings of the Open Network Summit
-
-
Gember, A.1
Krishnamurthy, A.2
John, S. S.3
Akella, A.4
-
41
-
-
78650109005
-
FlowChecker: Configuration Analysis and Verification of Federated Openflow Infrastructures
-
E. Al-Shaer and S. Al-Haj, “FlowChecker: Configuration Analysis and Verification of Federated Openflow Infrastructures, ” in Proceedings of the 3rd ACM SafeConfig Workshop, 2010.
-
(2010)
Proceedings of the 3rd ACM SafeConfig Workshop
-
-
Al-Shaer, E.1
Al-Haj, S.2
-
43
-
-
84907014880
-
Flowguard: Building robust firewalls for software-defined networks
-
H. Hu, W. Han, G.-J. Ahn, and Z. Zhao, “Flowguard: Building robust firewalls for software-defined networks, ” in Proceedings of the Third ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking, 2014.
-
(2014)
Proceedings of the Third ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking
-
-
Hu, H.1
Han, W.2
Ahn, G.-J.3
Zhao, Z.4
|