A survey of moving target defenses for network security

S Sengupta, A Chowdhary, A Sabur… - … Surveys & Tutorials, 2020 - ieeexplore.ieee.org
Network defenses based on traditional tools, techniques, and procedures (TTP) fail to
account for the attacker's inherent advantage present due to the static nature of network …

A survey on controller placement in SDN

T Das, V Sridharan, M Gurusamy - … communications surveys & …, 2019 - ieeexplore.ieee.org
In recent years, Software Defined Networking (SDN) has emerged as a pivotal element not
only in data-centers and wide-area networks, but also in next generation networking …

Elastic sketch: Adaptive and fast network-wide measurements

T Yang, J Jiang, P Liu, Q Huang, J Gong… - Proceedings of the …, 2018 - dl.acm.org
When network is undergoing problems such as congestion, scan attack, DDoS attack, etc.,
measurements are much more important than usual. In this case, traffic characteristics …

Orchestrating virtualized network functions

F Bari, SR Chowdhury, R Ahmed… - … on Network and …, 2016 - ieeexplore.ieee.org
Middleboxes or network appliances like firewalls, proxies, and WAN optimizers have
become an integral part of today's ISP and enterprise networks. Middlebox functionalities …

The internet topology zoo

S Knight, HX Nguyen, N Falkner… - IEEE Journal on …, 2011 - ieeexplore.ieee.org
The study of network topology has attracted a great deal of attention in the last decade, but
has been hampered by a lack of accurate data. Existing methods for measuring topology …

SIMPLE-fying middlebox policy enforcement using SDN

ZA Qazi, CC Tu, L Chiang, R Miao, V Sekar… - Proceedings of the ACM …, 2013 - dl.acm.org
Networks today rely on middleboxes to provide critical performance, security, and policy
compliance capabilities. Achieving these benefits and ensuring that the traffic is directed …

CFR-RL: Traffic engineering with reinforcement learning in SDN

J Zhang, M Ye, Z Guo, CY Yen… - IEEE Journal on …, 2020 - ieeexplore.ieee.org
Traditional Traffic Engineering (TE) solutions can achieve the optimal or near-optimal
performance by rerouting as many flows as possible. However, they do not usually consider …

Flowtags: Enforcing network-wide policies in the presence of dynamic middlebox actions

SK Fayazbakhsh, V Sekar, M Yu… - Proceedings of the second …, 2013 - dl.acm.org
Past studies show that middleboxes are a critical piece of network infrastructure for providing
security and performance guarantees. Unfortunately, the dynamic and traffic-dependent …

Routing optimization with deep reinforcement learning in knowledge defined networking

Q He, Y Wang, X Wang, W Xu, F Li… - IEEE Transactions on …, 2023 - ieeexplore.ieee.org
Traditional routing algorithms cannot dynamically change network environments due to the
limited information for routing decisions. Meanwhile, they are prone to performance …

Design and implementation of a consolidated middlebox architecture

V Sekar, N Egi, S Ratnasamy, MK Reiter… - 9th USENIX Symposium …, 2012 - usenix.org
Network deployments handle changing application, workload, and policy requirements via
the deployment of specialized network appliances or “middleboxes”. Today, however …