Enhancing Network Visibility and Security with Advanced Port Scanning Techniques
Network security is paramount in today's digital landscape, where cyberthreats continue to
evolve and pose significant risks. We propose a DPDK-based scanner based on a study on …
evolve and pose significant risks. We propose a DPDK-based scanner based on a study on …
Triton: A Flexible Hardware Offloading Architecture for Accelerating Apsara vSwitch in Alibaba Cloud
X Li, X Jiang, Y Yang, L Chen, Y Wang… - Proceedings of the …, 2024 - dl.acm.org
Apsara vSwitch (AVS) is a per-host deployed forwarding component for instance network
connectivity in the Alibaba Cloud. To meet the growing performance demands, we …
connectivity in the Alibaba Cloud. To meet the growing performance demands, we …
Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale
Network operators require real-time traffic monitoring insights to provide high performance
and security to their customers. It has been shown that artificial intelligence and machine …
and security to their customers. It has been shown that artificial intelligence and machine …
Sidekick:{In-Network} Assistance for Secure {End-to-End} Transport Protocols
In response to concerns about protocol ossification and privacy, post-TCP transport
protocols such as QUIC and Web-RTC include end-to-end encryption and authentication at …
protocols such as QUIC and Web-RTC include end-to-end encryption and authentication at …
Rosebud: Making fpga-accelerated middlebox development more pleasant
M Khazraee, A Forencich, GC Papen… - Proceedings of the 28th …, 2023 - dl.acm.org
We introduce an approach to designing FPGA-accelerated middleboxes that simplifies
development, debugging, and performance tuning by decoupling the tasks of hardware …
development, debugging, and performance tuning by decoupling the tasks of hardware …
Detecting vpn traffic through encapsulated tcp behavior
M Hanlon, G Wan, A Ascheman… - Free and Open …, 2024 - petsymposium.org
Virtual Private Networks (VPNs) are increasingly being used to protect online users' privacy
and security. However, there is an ongoing arms race between censors that aim to detect …
and security. However, there is an ongoing arms race between censors that aim to detect …
A Survey on Packet Filtering
N Sultana, H Bang, E Yulaeva, RKP Mok… - ACM SIGCOMM …, 2025 - dl.acm.org
Packet filtering has remained a key network monitoring primitive over decades, even as
networking has continuously evolved. In this article we present the results of a survey we ran …
networking has continuously evolved. In this article we present the results of a survey we ran …
Towards Adaptive ML Traffic Processing Systems
Machine learning techniques are a common solution used to solve a variety of network
management tasks. Often, a network administrator chooses the model to deploy based on …
management tasks. Often, a network administrator chooses the model to deploy based on …
CATO: End-to-End Optimization of ML-Based Traffic Analysis Pipelines
Machine learning has shown tremendous potential for improving the capabilities of network
traffic analysis applications, often outperforming simpler rule-based heuristics. However, ML …
traffic analysis applications, often outperforming simpler rule-based heuristics. However, ML …
CARAVAN: practical online learning of in-network ML models with labeling agents
Recent work on in-network machine learning (ML) anticipates offline models to operate well
in modern networking environments. However, upon deployment, these models struggle to …
in modern networking environments. However, upon deployment, these models struggle to …