Realtime robust malicious traffic detection via frequency domain analysis
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
Paving the way for NFV acceleration: A taxonomy, survey and future directions
As a recent innovation, network functions virtualization (NFV)—with its core concept of
replacing hardware middleboxes with software network functions (NFs) implemented in …
replacing hardware middleboxes with software network functions (NFs) implemented in …
UNO: Uniflying host and smart NIC offload for flexible packet processing
Increasingly, smart Network Interface Cards (sNICs) are being used in data centers to
offload networking functions (NFs) from host processors thereby making these processors …
offload networking functions (NFs) from host processors thereby making these processors …
Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN
Many efforts have been devoted to the development of efficient Network Intrusion Detection
System (NIDS) using machine learning approaches in Software-defined Network (SDN) …
System (NIDS) using machine learning approaches in Software-defined Network (SDN) …
DeepMatch: Practical deep packet inspection in the data plane using network processors
Restricting data plane processing to packet headers precludes analysis of payloads to
improve routing and security decisions. DeepMatch delivers line-rate regular expression …
improve routing and security decisions. DeepMatch delivers line-rate regular expression …
Frequency domain feature based robust malicious traffic detection
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …
particularly for zero-day attack detection, which is complementary to existing rule based …
{DFC}: Accelerating string pattern matching for network applications
Middlebox services that inspect packet payloads have become commonplace. Today,
anyone can sign up for cloudbased Web application firewall with a single click. These …
anyone can sign up for cloudbased Web application firewall with a single click. These …
An elastic intrusion detection system for software networks
Internal users are the main causes of anomalous and suspicious behaviors in a
communication network. Even when traditional security middleboxes are present, internal …
communication network. Even when traditional security middleboxes are present, internal …
Bolt: Scalable and cost-efficient multistring pattern matching with programmable switches
Multi-string pattern matching is a crucial building block for many network security
applications and thus of great importance. Since every byte of a packet has to be inspected …
applications and thus of great importance. Since every byte of a packet has to be inspected …
Network intrusion detection using hardware techniques: A review
The increasing amount of network throughput and security threat makes intrusion detection
a major research problem. In the literature, intrusion detection has been approached by …
a major research problem. In the literature, intrusion detection has been approached by …