Proceedings of the SIGCOMM '22 Poster and Demo Sessions 2022
DOI: 10.1145/3546037.3546060
|View full text |Cite
|
Sign up to set email alerts
|

P4Pir

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
3
3

Relationship

1
5

Authors

Journals

citations
Cited by 7 publications
(2 citation statements)
references
References 13 publications
0
2
0
Order By: Relevance
“…In a single-switch deployment in previous work [5], it is assumed that collected traffic features are shared in digests to the control plane/server. In FLIP4, such data sharing step is avoided by introducing the FL method to share model parameters instead.…”
Section: Implementation a In-network Attack Detection And Model Mappingmentioning
confidence: 99%
See 1 more Smart Citation
“…In a single-switch deployment in previous work [5], it is assumed that collected traffic features are shared in digests to the control plane/server. In FLIP4, such data sharing step is avoided by introducing the FL method to share model parameters instead.…”
Section: Implementation a In-network Attack Detection And Model Mappingmentioning
confidence: 99%
“…Offloading attack detection services from the remote server/cloud to the network edge has been proposed as a means to provide prompt reaction [3,4]. The advent of programmable data planes and in-network ML inference have further driven possibilities for in-network attack detection [5]. Building upon programmable pipelines and P4 language, an ML inference process can be mapped to the data plane to directly make a detection decision along with packet forwarding.…”
Section: Introductionmentioning
confidence: 99%