Taxonomy of distributed denial of service mitigation approaches for cloud computing

A Shameli-Sendi, M Pourzandi, M Fekih-Ahmed… - Journal of Network and …, 2015 - Elsevier
Cloud computing has a central role to play in meeting today׳ s business requirements.
However, Distributed Denial-of-Service (DDoS) attacks can threaten the availability of cloud …

Machine learning for computer systems and networking: A survey

ME Kanakis, R Khalili, L Wang - ACM Computing Surveys, 2022 - dl.acm.org
Machine learning (ML) has become the de-facto approach for various scientific domains
such as computer vision and natural language processing. Despite recent breakthroughs …

Gigabit rate packet pattern-matching using TCAM

F Yu, RH Katz, TV Lakshman - Proceedings of the 12th IEEE …, 2004 - ieeexplore.ieee.org
In today's Internet, worms and viruses cause service disruptions with enormous economic
impact. Current attack prevention mechanisms rely on end-user cooperation to install new …

Embark: Securely outsourcing middleboxes to the cloud

C Lan, J Sherry, RA Popa, S Ratnasamy… - 13th USENIX Symposium …, 2016 - usenix.org
It is increasingly common for enterprises and other organizations to outsource network
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …

TCAM Razor: A systematic approach towards minimizing packet classifiers in TCAMs

AX Liu, CR Meiners, E Torng - IEEE/ACM Transactions on …, 2009 - ieeexplore.ieee.org
Packet classification is the core mechanism that enables many networking services on the
Internet such as firewall packet filtering and traffic accounting. Using ternary content …

1 mb 0.41 µm² 2t-2r cell nonvolatile tcam with two-bit encoding and clocked self-referenced sensing

J Li, RK Montoye, M Ishii… - IEEE Journal of Solid-State …, 2013 - ieeexplore.ieee.org
This work demonstrates the first fabricated 1 Mb nonvolatile TCAM using 2-transistor/2-
resistive-storage (2T-2R) cells to achieve> 10× smaller cell size than SRAM-based TCAMs …

Packet-based network traffic classification using deep learning

HK Lim, JB Kim, JS Heo, K Kim… - … in Information and …, 2019 - ieeexplore.ieee.org
Recently, the advent of many network applications has led to a tremendous amount of
network traffic. A network operator must provide quality of service for each application on the …

A high throughput string matching architecture for intrusion detection and prevention

L Tan, T Sherwood - 32nd International Symposium on …, 2005 - ieeexplore.ieee.org
Network intrusion detection and prevention systems have emerged as one of the most
effective ways of providing security to those connected to the network, and at the heart of …

Gigabit ethernet adapter supporting the iSCSI and IPSEC protocols

JS Minami, RY Uyeshiro, MW Johnson, S Su… - US Patent …, 2009 - Google Patents
The invention is embodied in a gigabit Ethernet adapter. A system according to the invention
provides a compact hardware solution to handling high network communication speeds. In …

Packet classification algorithms: From theory to practice

Y Qi, L Xu, B Yang, Y Xue, J Li - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
During the past decade, the packet classification problem has been widely studied to
accelerate network applications such as access control, traffic engineering and intrusion …