-
1
-
-
85180772994
-
-
Broadcom of-dpa overview. http://www.broadcom.com/collateral/pb/ OF-DPA-PB100-R.pdf.
-
Broadcom of-dpa overview
-
-
-
2
-
-
85180808413
-
-
Broadcom open nsl. https://github.com/Broadcom-Switch/OpenNSL.
-
Broadcom open nsl
-
-
-
4
-
-
85180758499
-
-
[Online]. Available: http://www. pica8.com/documents/pica8-datasheet-48x1gbe-p3290-p3295.pdf
-
“Pica 8 p3290 data sheet,” http://www.pica8.com/documents/pica8- datasheet-48x1gbe-p3290-p3295.pdf. [Online]. Available: http://www. pica8.com/documents/pica8-datasheet-48x1gbe-p3290-p3295.pdf
-
Pica 8 p3290 data sheet
-
-
-
6
-
-
85180800216
-
-
“Ryu,” http://osrg.github.io/ryu/.
-
Ryu
-
-
-
7
-
-
84864052119
-
-
[Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdnresources onf-specifications/openflow/openflow-spec-v1.3.2.pdf
-
(2012) Openflow switch specification v1. 3.0. https://www. opennetworking.org/images/stories/downloads/sdn-resources/onfspecifications/ openflow/openflow-spec-v1.3.2.pdf. [Online]. Available: https://www.opennetworking.org/images/stories/downloads/sdnresources/ onf-specifications/openflow/openflow-spec-v1.3.2.pdf
-
(2012)
Openflow switch specification v1. 3.0
-
-
-
8
-
-
84907016321
-
-
“Floodlight,” http://floodlight.openflowhub.org, 2013.
-
(2013)
Floodlight
-
-
-
9
-
-
85180764191
-
-
“Hping 3,” http://www.hping.org/hping3.html, 2014.
-
(2014)
Hping 3
-
-
-
10
-
-
84970909892
-
-
“Open network linux,” http://opennetlinux.org, 2014.
-
(2014)
Open network linux
-
-
-
11
-
-
85067201541
-
-
“Open vswitch,” http://openvswitch.org, 2014.
-
(2014)
Open vswitch
-
-
-
12
-
-
0002160090
-
Active Bridging
-
D. S. Alexander, M. Shaw, S. M. Nettles, and J. M. Smith, “Active Bridging,” in Proc. ACM SIGCOMM, 1997.
-
(1997)
Proc. ACM SIGCOMM
-
-
Alexander, D. S.1
Shaw, M.2
Nettles, S. M.3
Smith, J. M.4
-
13
-
-
78149309101
-
Switch- Blade: A Platform for Rapid Deployment of Network Protocols on Programmable Hardware
-
M. B. Anwer, M. Motiwala, M. b. Tariq, and N. Feamster, “Switch- Blade: A Platform for Rapid Deployment of Network Protocols on Programmable Hardware,” in Proc. ACM SIGCOMM, 2010.
-
(2010)
Proc. ACM SIGCOMM
-
-
Anwer, M. B.1
Motiwala, M.2
Tariq, M. b.3
Feamster, N.4
-
14
-
-
84905861611
-
P4: Programming Protocol-independent Packet Processors
-
July
-
P. Bosshart, D. Daly, G. Gibb, M. Izzard, N. McKeown, J. Rexford, C. Schlesinger, D. Talayco, A. Vahdat, G. Varghese, and D. Walker, “P4: Programming Protocol-independent Packet Processors,” SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 87-95, July 2014.
-
(2014)
SIGCOMM Comput. Commun. Rev
, vol.44
, Issue.3
, pp. 87-95
-
-
Bosshart, P.1
Daly, D.2
Gibb, G.3
Izzard, M.4
McKeown, N.5
Rexford, J.6
Schlesinger, C.7
Talayco, D.8
Vahdat, A.9
Varghese, G.10
Walker, D.11
-
15
-
-
79955041204
-
Lightweight ddos flooding attack detection using nox/openflow
-
IEEE
-
R. Braga, E. Mota, and A. Passito, “Lightweight ddos flooding attack detection using nox/openflow,” in Local Computer Networks (LCN), 2010 IEEE 35th Conference on. IEEE, 2010, pp. 408-415.
-
(2010)
Local Computer Networks (LCN), 2010 IEEE 35th Conference on
, pp. 408-415
-
-
Braga, R.1
Mota, E.2
Passito, A.3
-
16
-
-
80053141664
-
DevoFlow: Scaling Flow Management for Highperformance Networks
-
A. R. Curtis, J. C. Mogul, J. Tourrilhes, P. Yalagandula, P. Sharma, and S. Banerjee, “DevoFlow: Scaling Flow Management for Highperformance Networks,” in Proc. SIGCOMM, 2011.
-
(2011)
Proc. SIGCOMM
-
-
Curtis, A. R.1
Mogul, J. C.2
Tourrilhes, J.3
Yalagandula, P.4
Sharma, P.5
Banerjee, S.6
-
17
-
-
72249104877
-
Routebricks: exploiting parallelism to scale software routers
-
ACM
-
M. Dobrescu, N. Egi, K. Argyraki, B.-G. Chun, K. Fall, G. Iannaccone, A. Knies, M. Manesh, and S. Ratnasamy, “Routebricks: exploiting parallelism to scale software routers,” in Proceedings of the 22nd ACM SIGOPS. ACM, 2009, pp. 15-28.
-
(2009)
Proceedings of the 22nd ACM SIGOPS
, pp. 15-28
-
-
Dobrescu, M.1
Egi, N.2
Argyraki, K.3
Chun, B.-G.4
Fall, K.5
Iannaccone, G.6
Knies, A.7
Manesh, M.8
Ratnasamy, S.9
-
19
-
-
84891597780
-
Participatory networking: An api for application control of sdns
-
ACM
-
A. D. Ferguson, A. Guha, C. Liang, R. Fonseca, and S. Krishnamurthi, “Participatory networking: An api for application control of sdns,” in ACM SIGCOMM Computer Communication Review, vol. 43, no. 4. ACM, 2013, pp. 327-338.
-
(2013)
ACM SIGCOMM Computer Communication Review
, vol.43
, Issue.4
, pp. 327-338
-
-
Ferguson, A. D.1
Guha, A.2
Liang, C.3
Fonseca, R.4
Krishnamurthi, S.5
-
21
-
-
80053341773
-
Frenetic: A network programming language
-
N. Foster, R. Harrison, M. J. Freedman, C. Monsanto, J. Rexford, A. Story, and D. Walker, “Frenetic: A network programming language,” in Proc. ACM SIGPLAN International Conference on Functional Programming (ICFP), 2011.
-
(2011)
Proc. ACM SIGPLAN International Conference on Functional Programming (ICFP)
-
-
Foster, N.1
Harrison, R.2
Freedman, M. J.3
Monsanto, C.4
Rexford, J.5
Story, A.6
Walker, D.7
-
22
-
-
85075837457
-
Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection
-
G. Gu, R. Perdisci, J. Zhang, W. Lee et al., “Botminer: clustering analysis of network traffic for protocol-and structure-independent botnet detection,” in Proceedings of the 17th conference on Security symposium, 2008, pp. 139-154.
-
(2008)
Proceedings of the 17th conference on Security symposium
, pp. 139-154
-
-
Gu, G.1
Perdisci, R.2
Zhang, J.3
Lee, W.4
-
25
-
-
84893252020
-
Tiny packet programs for low-latency network control and monitoring
-
ACM
-
V. Jeyakumar, M. Alizadeh, C. Kim, and D. Mazi`eres, “Tiny packet programs for low-latency network control and monitoring,” in Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks. ACM, 2013, p. 8.
-
(2013)
Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks
, pp. 8
-
-
Jeyakumar, V.1
Alizadeh, M.2
Kim, C.3
D.4
Mazi5
-
26
-
-
78149289400
-
The nature of data center traffic: measurements & analysis
-
ACM
-
S. Kandula, S. Sengupta, A. Greenberg, P. Patel, and R. Chaiken, “The nature of data center traffic: measurements & analysis,” in Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference. ACM, 2009, pp. 202-208.
-
(2009)
Proceedings of the 9th ACM SIGCOMM conference on Internet measurement conference
, pp. 202-208
-
-
Kandula, S.1
Sengupta, S.2
Greenberg, A.3
Patel, P.4
Chaiken, R.5
-
27
-
-
0040291388
-
The click modular router
-
Aug
-
E. Kohler, R. Morris, B. Chen, J. Jannotti, and M. F. Kaashoek, “The click modular router,” ACM Trans. Comput. Syst., vol. 18, no. 3, pp. 263-297, Aug 2000.
-
(2000)
ACM Trans. Comput. Syst
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
Kaashoek, M. F.5
-
28
-
-
84857207112
-
Onix: A distributed control platform for large-scale production networks
-
T. Koponen, M. Casado, N. Gude, J. Stribling, L. Poutievski, M. Zhu, R. Ramanathan, Y. Iwata, H. Inoue, T. Hama et al., “Onix: A distributed control platform for large-scale production networks.” in OSDI, vol. 10, 2010, pp. 1-6.
-
(2010)
OSDI
, vol.10
, pp. 1-6
-
-
Koponen, T.1
Casado, M.2
Gude, N.3
Stribling, J.4
Poutievski, L.5
Zhu, M.6
Ramanathan, R.7
Iwata, Y.8
Inoue, H.9
Hama, T.10
-
30
-
-
84857255431
-
Revisiting traffic anomaly detection using software defined networking
-
Springer
-
S. A. Mehdi, J. Khalid, and S. A. Khayam, “Revisiting traffic anomaly detection using software defined networking,” in Recent Advances in Intrusion Detection. Springer, 2011, pp. 161-180.
-
(2011)
Recent Advances in Intrusion Detection
, pp. 161-180
-
-
Mehdi, S. A.1
Khalid, J.2
Khayam, S. A.3
-
32
-
-
84893274038
-
Silverline: preventing data leaks from compromised web applications
-
ACM
-
Y. Mundada, A. Ramachandran, and N. Feamster, “Silverline: preventing data leaks from compromised web applications,” in Proceedings of the 29th Annual Computer Security Applications Conference. ACM, 2013, pp. 329-338.
-
(2013)
Proceedings of the 29th Annual Computer Security Applications Conference
, pp. 329-338
-
-
Mundada, Y.1
Ramachandran, A.2
Feamster, N.3
-
34
-
-
84893570087
-
Fresco: Modular composable security services for software-defined networks
-
February
-
S. Shin, P. Porras, V. Yegneswaran, M. Fong, G. Gu, and M. Tyson, “Fresco: Modular composable security services for software-defined networks,” in Proc. Network and Distributed System Security Symposium (NDSS), February 2013.
-
(2013)
Proc. Network and Distributed System Security Symposium (NDSS)
-
-
Shin, S.1
Porras, P.2
Yegneswaran, V.3
Fong, M.4
Gu, G.5
Tyson, M.6
-
35
-
-
84889062725
-
AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-defined Networks
-
S. Shin, V. Yegneswaran, P. Porras, and G. Gu, “AVANT-GUARD: Scalable and Vigilant Switch Flow Management in Software-defined Networks,” in Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS), 2013.
-
(2013)
Proc. ACM SIGSAC Conference on Computer and Communications Security (CCS)
-
-
Shin, S.1
Yegneswaran, V.2
Porras, P.3
Gu, G.4
-
36
-
-
15944371835
-
-
A. Tirumala, F. Qin, J. Dugan, J. Ferguson, and K. Gibbs, “Iperf: The tcp/udp bandwidth measurement tool,” http://dast.nlanr.net/Projects.
-
Iperf: The tcp/udp bandwidth measurement tool
-
-
Tirumala, A.1
Qin, F.2
Dugan, J.3
Ferguson, J.4
Gibbs, K.5
-
37
-
-
78149339727
-
Scalable Flow-based Networking with DIFANE
-
M. Yu, J. Rexford, M. J. Freedman, and J. Wang, “Scalable Flow-based Networking with DIFANE,” in Proc. ACM SIGCOMM, 2010.
-
(2010)
Proc. ACM SIGCOMM
-
-
Yu, M.1
Rexford, J.2
Freedman, M. J.3
Wang, J.4
|