2010 IEEE Global Telecommunications Conference GLOBECOM 2010 2010
DOI: 10.1109/glocom.2010.5683161
|View full text |Cite
|
Sign up to set email alerts
|

A Tunnel-Aware Language for Network Packet Filtering

Abstract: While in computer networks the number of possible protocol encapsulations is growing day after day, network administrators face ever increasing difficulties in selecting accurately the traffic they need to inspect. This is mainly caused by the limited number of encapsulations supported by currently available tools and the difficulty to exactly specify which packets have to be analyzed, especially in presence of tunneled traffic. This paper presents a novel packet processing language that, besides Boolean filte… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2011
2011
2018
2018

Publication Types

Select...
3
2

Relationship

2
3

Authors

Journals

citations
Cited by 6 publications
(4 citation statements)
references
References 8 publications
(8 reference statements)
0
4
0
Order By: Relevance
“…The front-end compiler [18] takes the filtering expression expressed as a NetPFL [16] string and a NetPDL [15] protocol database to generate an in-memory representation of the pFSA filter. This code is then translated into NetIL code, a NetVM-specific assembly-like language.…”
Section: Methodsmentioning
confidence: 99%
“…The front-end compiler [18] takes the filtering expression expressed as a NetPFL [16] string and a NetPDL [15] protocol database to generate an in-memory representation of the pFSA filter. This code is then translated into NetIL code, a NetVM-specific assembly-like language.…”
Section: Methodsmentioning
confidence: 99%
“…The adoption of a mid-level assembly language helps making the NetVM general enough to be independent from any specific high-level language. In fact, NetIL can be an excellent target for several high-level languages, ranging from declarative (e.g., rule based such as NetPFL [9]) to imperative ones (e.g., C).…”
Section: Network Processing Elementmentioning
confidence: 99%
“…However, the capability to follow any possible encapsulation may result into slower processing (as the filtering code is forced to check for any possible encapsulation path) and this additional cost may not always be acceptable. A possible solution to this issue is provided by the NetPFL language [2], which allows to define packet filtering rules including which encapsulation paths have to be followed (e.g., ip in vlan in ethernet), without modifying the NetPDL protocol definitions.…”
Section: Introductionmentioning
confidence: 99%
“…While the NetPFL language is very flexible, so far only a partial implementation is available [2], which does not support the explicit filtering on protocol chains; consequently the possible optimizations were not taken into consideration at all. This paper extends the initial work by presenting an algorithm that can generate efficient filtering code based on NetPFL header chains, that can select traffic based on one or more encapsulation rules specified at run-time.…”
Section: Introductionmentioning
confidence: 99%