Realtime robust malicious traffic detection via frequency domain analysis

C Fu, Q Li, M Shen, K Xu - Proceedings of the 2021 ACM SIGSAC …, 2021 - dl.acm.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

Paving the way for NFV acceleration: A taxonomy, survey and future directions

X Fei, F Liu, Q Zhang, H **, H Hu - ACM Computing Surveys (CSUR), 2020 - dl.acm.org
As a recent innovation, network functions virtualization (NFV)—with its core concept of
replacing hardware middleboxes with software network functions (NFs) implemented in …

UNO: Uniflying host and smart NIC offload for flexible packet processing

Y Le, H Chang, S Mukherjee, L Wang, A Akella… - Proceedings of the …, 2017 - dl.acm.org
Increasingly, smart Network Interface Cards (sNICs) are being used in data centers to
offload networking functions (NFs) from host processors thereby making these processors …

Griffin: Real-time network intrusion detection system via ensemble of autoencoder in SDN

L Yang, Y Song, S Gao, A Hu… - IEEE Transactions on …, 2022 - ieeexplore.ieee.org
Many efforts have been devoted to the development of efficient Network Intrusion Detection
System (NIDS) using machine learning approaches in Software-defined Network (SDN) …

DeepMatch: Practical deep packet inspection in the data plane using network processors

J Hypolite, J Sonchack, S Hershkop… - Proceedings of the 16th …, 2020 - dl.acm.org
Restricting data plane processing to packet headers precludes analysis of payloads to
improve routing and security decisions. DeepMatch delivers line-rate regular expression …

Frequency domain feature based robust malicious traffic detection

C Fu, Q Li, M Shen, K Xu - IEEE/ACM Transactions on …, 2022 - ieeexplore.ieee.org
Machine learning (ML) based malicious traffic detection is an emerging security paradigm,
particularly for zero-day attack detection, which is complementary to existing rule based …

{DFC}: Accelerating string pattern matching for network applications

B Choi, J Chae, M Jamshed, K Park… - 13th USENIX Symposium …, 2016 - usenix.org
Middlebox services that inspect packet payloads have become commonplace. Today,
anyone can sign up for cloudbased Web application firewall with a single click. These …

An elastic intrusion detection system for software networks

MA Lopez, DM Ferrazani Mattos… - Annals of …, 2016 - Springer
Internal users are the main causes of anomalous and suspicious behaviors in a
communication network. Even when traditional security middleboxes are present, internal …

Bolt: Scalable and cost-efficient multistring pattern matching with programmable switches

S Wang, M Zhang, G Li, C Liu, Z Wang… - … /ACM Transactions on …, 2022 - ieeexplore.ieee.org
Multi-string pattern matching is a crucial building block for many network security
applications and thus of great importance. Since every byte of a packet has to be inspected …

Network intrusion detection using hardware techniques: A review

R Abdulhammed, M Faezipour… - 2016 IEEE Long Island …, 2016 - ieeexplore.ieee.org
The increasing amount of network throughput and security threat makes intrusion detection
a major research problem. In the literature, intrusion detection has been approached by …