2022
DOI: 10.1007/s10922-022-09687-z
|View full text |Cite
|
Sign up to set email alerts
|

XDP-Based SmartNIC Hardware Performance Acceleration for Next-Generation Networks

Abstract: Next-generation networks are expected to combine advanced physical and digital technologies in super-high-speed connected system infrastructures, gaining critical operation competitiveness of improved efficiency, productivity and quality of services. Towards a fully digital and connected world, these platforms will enable infrastructure virtualization and support of edge processing, making emerging sectors, such as Industry 4.0, ready to exploit its full potentials. Nevertheless, the fast growth of data-centri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
7
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 12 publications
(7 citation statements)
references
References 26 publications
0
7
0
Order By: Relevance
“…By combining the discriminative power of machine learning algorithms with the rule-based decision-making of expert systems, these models can provide real-time threat mitigation with a nuanced understanding of complex attack scenarios. The research by authors in [28] exemplifies the efficacy of such hybrid frameworks, demonstrating their potential to offer a more holistic defense against a broad spectrum of cyber threats [23]. As cyber adversaries continually evolve their tactics, the versatility of hybrid models stands out, offering a promising avenue for fortifying NGFWs and adapting to the dynamic nature of modern cybersecurity challenges [32].…”
Section: Hybrid Modelsmentioning
confidence: 97%
See 1 more Smart Citation
“…By combining the discriminative power of machine learning algorithms with the rule-based decision-making of expert systems, these models can provide real-time threat mitigation with a nuanced understanding of complex attack scenarios. The research by authors in [28] exemplifies the efficacy of such hybrid frameworks, demonstrating their potential to offer a more holistic defense against a broad spectrum of cyber threats [23]. As cyber adversaries continually evolve their tactics, the versatility of hybrid models stands out, offering a promising avenue for fortifying NGFWs and adapting to the dynamic nature of modern cybersecurity challenges [32].…”
Section: Hybrid Modelsmentioning
confidence: 97%
“…Behavioral analysis, in the context of NGFWs, involves the continuous monitoring and learning of normal network behavior, enabling the identification of anomalies indicative of malicious activities [23]. By adopting reinforcement learning, the authors in [28] harness the power of iterative decision-making processes, allowing NGFWs to adapt and learn from changing network dynamics over time [12]. This approach not only enhances the accuracy of threat detection but also facilitates a more adaptive and responsive defense mechanism against novel and emerging threats [12].…”
Section: Behavioral Analysismentioning
confidence: 99%
“…In this context, the need to integrate network acceleration technologies is perhaps even more compelling than in cloud data centers. In the telco ecosystem, the literature on NFV (see Section I-A) already explored the adoption of software and hardware acceleration technologies to reduce the virtualization overhead [10], [52]. However, as we previously discussed, this integration is not considered an option available as a service to general-purpose applications.…”
Section: B An Emerging Trend: the Cloud Continuummentioning
confidence: 99%
“…In the networking domain, these devices can effectively execute compute-intensive operations, such as protocol processing, much faster than general-purpose processors, by removing the bottleneck of software-based protocol implementations and by allowing application developers to leverage the full potential of modern network links. Also in this case, different approaches can either retain the flexibility and isolation of in-kernel networking [52] or adopt a kernelbypassing solution for the sake of performance (Fig. 4d).…”
Section: A Introduction To Network Accelerationmentioning
confidence: 99%
“…This decision will depend on multiple factors, in particular, the state of the network at any given time, the type of rule to be enforced and the number of rules currently enforced in every datapath technology. For example, in a use case were a drop rule is desired to be optimised, we will prioritise speed of execution, choosing datapath technologies located at the lowest point in the software stack, such as XDP [12]. Another example in the same scenario, taking into account other criteria such as having a lot of rules enforced in XDP, we could optimise the insertion of a new rule using a faster one such as Open vSwitch (OVS) [13].…”
Section: Introductionmentioning
confidence: 99%