2022
DOI: 10.1109/tifs.2022.3142995
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic Network Security Function Enforcement via Joint Flow and Function Scheduling

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 12 publications
(1 citation statement)
references
References 49 publications
0
1
0
Order By: Relevance
“…It performs detection according to the traffic replicated by routers through port mirroring [17], which ensures that the system will not interfere with the traffic forwarding. After identifying encrypted malicious traffic, it can cooperate with the existing on-path malicious traffic defenses [48], [49], [88] to throttle the detected traffic. To perform detection on encrypted traffic, we cannot parse and analyze application layer headers and payloads.…”
Section: Threat Model and Design Goalsmentioning
confidence: 99%
“…It performs detection according to the traffic replicated by routers through port mirroring [17], which ensures that the system will not interfere with the traffic forwarding. After identifying encrypted malicious traffic, it can cooperate with the existing on-path malicious traffic defenses [48], [49], [88] to throttle the detected traffic. To perform detection on encrypted traffic, we cannot parse and analyze application layer headers and payloads.…”
Section: Threat Model and Design Goalsmentioning
confidence: 99%