Survey on unified threat management (UTM) systems for home networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

[HTML][HTML] High-speed network ddos attack detection: A survey

RMA Haseeb-Ur-Rehman, AHM Aman, MK Hasan… - Sensors, 2023 - mdpi.com
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …

Reducing latency in virtual machines: Enabling tactile Internet for human-machine co-working

Z **ang, F Gabriel, E Urbano… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
Software-defined networking (SDN) and network function virtualization (NFV) processed in
multi-access edge computing (MEC) cloud systems have been proposed as critical …

Design and implementation of an intrusion detection system by using extended BPF in the Linux kernel

SY Wang, JC Chang - Journal of Network and Computer Applications, 2022 - Elsevier
An intrusion detection system (IDS) checks the content of headers and payload of packets to
detect intrusions from the network. It is an essential function for network security …

The rise of eBPF for non-intrusive performance monitoring

C Cassagnes, L Trestioreanu, C Joly… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we explain that container engines are strengthening their isolation
mechanisms. Therefore, non-intrusive monitoring becomes a must-have for the performance …

{EPF}: Evil packet filter

D **, V Atlidakis, VP Kemerlis - 2023 USENIX Annual Technical …, 2023 - usenix.org
The OS kernel is at the forefront of a system's security. Therefore, its own security is crucial
for the correctness and integrity of user applications. With a plethora of bugs continuously …

Tigger: A database proxy that bounces with user-bypass

M Butrovich, K Ramanathan, J Rollinson… - Proceedings of the …, 2023 - dl.acm.org
Developers often deploy database-specific network proxies whereby applications connect
transparently to the proxy instead of directly connecting to the database management …

Demystifying the Performance of XDP BPF

O Hohlfeld, J Krude, JH Reelfs, J Rüth… - 2019 IEEE Conference …, 2019 - ieeexplore.ieee.org
High packet rates at≥ 10 GBit/s challenge the packet processing performance of network
stacks. A common solution is to offload (parts of) the user-space packet processing to other …

Xdp-based smartnic hardware performance acceleration for next-generation networks

P Salva-Garcia, R Ricart-Sanchez… - Journal of Network and …, 2022 - Springer
Next-generation networks are expected to combine advanced physical and digital
technologies in super-high-speed connected system infrastructures, gaining critical …

SYN flood defense in programmable data planes

D Scholz, S Gallenmüller, H Stubbe… - … of the 3rd P4 Workshop in …, 2020 - dl.acm.org
The SYN flood attack is a common attack strategy as part of Distributed Denial-of-Service,
which steadily becomes more frequent and of higher volume. To defend against SYN floods …