IEEE INFOCOM 2020 - IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS) 2020
DOI: 10.1109/infocomwkshps50562.2020.9162975
|View full text |Cite
|
Sign up to set email alerts
|

P4NIS: Improving network immunity against eavesdropping with programmable data planes

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
4
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(4 citation statements)
references
References 22 publications
0
4
0
Order By: Relevance
“…The studies in [118], [119] focus on privacy threat for IP addresses. Network immunity against eavesdropping has been considered in [120]. Mitigation of network covert channels have been investigated in [121].…”
Section: Other Security Applicationsmentioning
confidence: 99%
See 1 more Smart Citation
“…The studies in [118], [119] focus on privacy threat for IP addresses. Network immunity against eavesdropping has been considered in [120]. Mitigation of network covert channels have been investigated in [121].…”
Section: Other Security Applicationsmentioning
confidence: 99%
“…Liu et al [120] present a method using programmable data planes to improve network immunity against eavesdropping. The proposed method consists of three defense lines.…”
Section: Other Security Applicationsmentioning
confidence: 99%
“…e third line of defense adopts the existing encryption algorithm based on computational complexity. P4NIS (P4-based Network Immune Scheme) [59] is also proposed with a three-line defense solution to resist eavesdropping. Firstly, packets belonging to the same flow will be transmitted through different links.…”
Section: Information Hiding Nethidementioning
confidence: 99%
“…However, the implementation is limited as it only considers duplicate address detection. Finally, the authors of [12] propose a P4based network immune scheme against eavesdropping attacks. However, it is not applicable since the attackers can exploit the fixed forwarding as in [12].…”
Section: Security Solutions With P4mentioning
confidence: 99%