Taxonomy of distributed denial of service mitigation approaches for cloud computing
Cloud computing has a central role to play in meeting today׳ s business requirements.
However, Distributed Denial-of-Service (DDoS) attacks can threaten the availability of cloud …
However, Distributed Denial-of-Service (DDoS) attacks can threaten the availability of cloud …
Machine learning for computer systems and networking: A survey
Machine learning (ML) has become the de-facto approach for various scientific domains
such as computer vision and natural language processing. Despite recent breakthroughs …
such as computer vision and natural language processing. Despite recent breakthroughs …
Gigabit rate packet pattern-matching using TCAM
In today's Internet, worms and viruses cause service disruptions with enormous economic
impact. Current attack prevention mechanisms rely on end-user cooperation to install new …
impact. Current attack prevention mechanisms rely on end-user cooperation to install new …
Embark: Securely outsourcing middleboxes to the cloud
It is increasingly common for enterprises and other organizations to outsource network
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …
processing to the cloud. For example, enterprises may outsource firewalling, caching, and …
TCAM Razor: A systematic approach towards minimizing packet classifiers in TCAMs
Packet classification is the core mechanism that enables many networking services on the
Internet such as firewall packet filtering and traffic accounting. Using ternary content …
Internet such as firewall packet filtering and traffic accounting. Using ternary content …
1 mb 0.41 µm² 2t-2r cell nonvolatile tcam with two-bit encoding and clocked self-referenced sensing
This work demonstrates the first fabricated 1 Mb nonvolatile TCAM using 2-transistor/2-
resistive-storage (2T-2R) cells to achieve> 10× smaller cell size than SRAM-based TCAMs …
resistive-storage (2T-2R) cells to achieve> 10× smaller cell size than SRAM-based TCAMs …
Packet-based network traffic classification using deep learning
Recently, the advent of many network applications has led to a tremendous amount of
network traffic. A network operator must provide quality of service for each application on the …
network traffic. A network operator must provide quality of service for each application on the …
A high throughput string matching architecture for intrusion detection and prevention
Network intrusion detection and prevention systems have emerged as one of the most
effective ways of providing security to those connected to the network, and at the heart of …
effective ways of providing security to those connected to the network, and at the heart of …
Gigabit ethernet adapter supporting the iSCSI and IPSEC protocols
JS Minami, RY Uyeshiro, MW Johnson, S Su… - US Patent …, 2009 - Google Patents
The invention is embodied in a gigabit Ethernet adapter. A system according to the invention
provides a compact hardware solution to handling high network communication speeds. In …
provides a compact hardware solution to handling high network communication speeds. In …
Packet classification algorithms: From theory to practice
During the past decade, the packet classification problem has been widely studied to
accelerate network applications such as access control, traffic engineering and intrusion …
accelerate network applications such as access control, traffic engineering and intrusion …