Contact The DL Team Contact Us | Switch to tabbed view

top of pageABSTRACT

An abstract is not available.

top of pageAUTHORS



Author image not provided  Zili Meng

 Zili Meng's Homepage
 zilimatieee.org
Bibliometrics: publication history
Publication years2017-2018
Publication count3
Citation Count0
Available for download3
Downloads (6 Weeks)11
Downloads (12 Months)241
Downloads (cumulative)429
Average downloads per article143.00
Average citations per article0.00
View colleagues of Zili Meng


Author image not provided  Jun Bi

 homepage
 junbiattsinghua.edu.cn
Bibliometrics: publication history
Publication years1999-2019
Publication count116
Citation Count165
Available for download58
Downloads (6 Weeks)401
Downloads (12 Months)4,462
Downloads (cumulative)23,505
Average downloads per article405.26
Average citations per article1.42
View colleagues of Jun Bi


Author image not provided  Chen Sun
 c-sun14atmails.tsinghua.edu.cn
Bibliometrics: publication history
Publication years2016-2019
Publication count10
Citation Count12
Available for download10
Downloads (6 Weeks)80
Downloads (12 Months)995
Downloads (cumulative)4,885
Average downloads per article488.50
Average citations per article1.20
View colleagues of Chen Sun


Author image not provided  Shuhe Wang

No contact information provided yet.

Bibliometrics: publication history
Publication years2018-2019
Publication count3
Citation Count0
Available for download3
Downloads (6 Weeks)21
Downloads (12 Months)270
Downloads (cumulative)351
Average downloads per article117.00
Average citations per article0.00
View colleagues of Shuhe Wang


Author image not provided  Minhu Wang

No contact information provided yet.

Bibliometrics: publication history
Publication years2018-2018
Publication count1
Citation Count0
Available for download1
Downloads (6 Weeks)6
Downloads (12 Months)142
Downloads (cumulative)182
Average downloads per article182.00
Average citations per article0.00
View colleagues of Minhu Wang


Hongxin Hu Hongxin Hu

homepage
hongxihatclemson.edu
Bibliometrics: publication history
Publication years2007-2019
Publication count83
Citation Count513
Available for download54
Downloads (6 Weeks)724
Downloads (12 Months)7,736
Downloads (cumulative)34,766
Average downloads per article643.81
Average citations per article6.18
View colleagues of Hongxin Hu

top of pageREFERENCES

Note: OCR errors may be found in this Reference List extracted from the full text article. ACM has opted to expose the complete List rather than only correct and linked references.

 
1
Aaron Gember-Jacobson, Raajay Viswanathan, Chaithan Prakash, Robert Grandl, Junaid Khalid, Sourav Das, and Aditya Akella. 2014. OpenNF: Enabling innovation in network function control. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'14). ACM, 163--174.
 
2
DPDK Intel. 2018. Data Plane Development Kit. (2018). http://dpdk.org
 
3
S Kumar, M Tufail, S Majee, C Captari, and S Homma. 2015. Service function chaining use cases in data centers. IETF SFC WG (2015).
 
4
Yanfang Le, Hyunseok Chang, Sarit Mukherjee, Limin Wang, Aditya Akella, Michael M Swift, and TV Lakshman. 2017. UNO: uniflying host and smart NIC offload for flexible packet processing. In Proceedings of the 2017 Symposium on Cloud Computing (SoCC'17). ACM, 506--519.
 
5
Zili Meng, Jun Bi, Chen Sun, Haiping Wang, and Hongxin Hu. 2018. CoCo: Compact and Optimized Consolidation of Modularized Service Function Chains in NFV. In Proceedings of the 2018 International Conference on Communications (ICC'18). IEEE.
 
6
Netronome. 2018. Netronome Agilio CX Dual-Port 10 Gigabit Ethernet SmartNIC. (2018). http://www.colfaxdirect.com/store/pc/viewPrd.asp?idproduct=3017
 
7
Chen Sun, Jun Bi, Zhilong Zheng, Heng Yu, and Hongxin Hu. 2017. NFP: Enabling Network Function Parallelism in NFV. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'17). ACM, 43--56.

top of pageCITED BY

Citings are not available

top of pageINDEX TERMS

The ACM Computing Classification System (CCS rev.2012)

Note: Larger/Darker text within each node indicates a higher relevance of the materials to the taxonomic classification.

top of pagePUBLICATION

Title SIGCOMM '18 Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos table of contents
Pages 63-65
Publication Date2018-08-07 (yyyy-mm-dd)
Funding Sources National Key R&D Program of China
National Science Foundation of China
National Training Program of Innovation and Entrepreneurship for Undergraduates
Tsinghua Initiative Research Program
Sponsor SIGCOMM ACM Special Interest Group on Data Communication
PublisherACM New York, NY, USA ©2018
ISBN: 978-1-4503-5915-3 doi>10.1145/3234200.3234215
Conference COMMACM SIGCOMM COMM logo
Overall Acceptance Rate 810 of 5,886 submissions, 14%
Year Submitted Accepted Rate
SIGCOMM '94 141 29 21%
SIGCOMM '95 143 30 21%
SIGCOMM '96 162 27 17%
SIGCOMM '97 213 24 11%
SIGCOMM '98 247 26 11%
SIGCOMM '99 190 24 13%
SIGCOMM '00 238 26 11%
SIGCOMM '01 252 23 9%
SIGCOMM '02 300 25 8%
SIGCOMM '03 319 34 11%
SIGCOMM '04 297 29 10%
SIGCOMM '05 255 27 11%
SIGCOMM '06 298 37 12%
SIGCOMM '07 258 35 14%
SIGCOMM '08 288 35 12%
SIGCOMM '09 267 27 10%
SIGCOMM '10 276 33 12%
SIGCOMM '11 223 32 14%
SIGCOMM '12 235 31 13%
SIGCOMM '13 246 38 15%
SIGCOMM '14 242 45 19%
SIGCOMM '15 242 40 17%
SIGCOMM '16 231 39 17%
SIGCOMM '19 102 62 61%
SIGCOMM '19 221 32 14%
Overall 5,886 810 14%

APPEARS IN
Networking

top of pageREVIEWS


Reviews are not available for this item
Computing Reviews logo

top of pageCOMMENTS

Be the first to comment To Post a comment please sign in or create a free Web account

top of pageTable of Contents

Proceedings of the ACM SIGCOMM 2018 Conference on Posters and Demos
Table of Contents
A Programmable Framework for Validating Data Planes
Pietro Bressana, Noa Zilberman, Robert Soulé
Pages: 1-3
doi>10.1145/3234200.3234220
Full text: PDFPDF

Due to the emerging trend of programmable network hardware, developers have begun to explore ways to accelerate various applications and services. As a result, there is a pressing need for new tools and techniques for debugging network devices. This ...
expand
Adaptive Network Security through Stream Machine Learning
Pavol Mulinka, Pedro Casas
Pages: 4-5
doi>10.1145/3234200.3234246
Full text: PDFPDF

Stream Machine Learning is rapidly gaining popularity within the network monitoring community as the big data produced by network devices and end-user terminals goes beyond the memory constraints of standard monitoring equipment. We consider a stream-based ...
expand
CircuitStart: A Slow Start For Multi-Hop Anonymity Systems
Christoph Döpmann, Florian Tschorsch
Pages: 6-8
doi>10.1145/3234200.3234211
Full text: PDFPDF

In order to improve the performance of anonymity networks like Tor, custom transport protocols have been proposed to efficiently deal with the multi-hop nature of such overlay networks. In this work, we tackle the issue of quickly, but safely, ramping ...
expand
CoFilter: A High-Performance Switch-Assisted Stateful Packet Filter
Jiamin Cao, Jun Bi, Yu Zhou, Cheng Zhang
Pages: 9-11
doi>10.1145/3234200.3234251
Full text: PDFPDF
Dynam-IX: a Dynamic Interconnection eXchange
Pedro Marcos, Marco Chiesa, Lucas Müller, Pradeeban Kathiravelu, Christoph Dietzel, Marco Canini, Marinho Barcellos
Pages: 12-14
doi>10.1145/3234200.3234218
Full text: PDFPDF
DynaShield: A Cost-Effective DDoS Defense Architecture
Shengbao Zheng, Xiaowei Yang
Pages: 15-17
doi>10.1145/3234200.3234232
Full text: PDFPDF
Enabling Dense Spatial Reuse in mmWave Networks
Suraj Jog, Jiaming Wang, Haitham Hassanieh, Romit Roy Choudhury
Pages: 18-20
doi>10.1145/3234200.3234241
Full text: PDFPDF

Millimeter Wave (mmWave) networks can deliver multi-Gbps wireless links that use extremely narrow directional beams. This provides us with a new way to exploit spatial reuse in order to scale network throughput. In this work, we present MilliNet, the ...
expand
Equivalence and its applications to network verification
Dragos Dumitrescu, Radu Stoenescu, Matei Popovici, Lorina Negreanu, Costin Raiciu
Pages: 21-23
doi>10.1145/3234200.3234224
Full text: PDFPDF
Fast Congestion Control in RDMA-based Datacenter Networks
Jaichen Xue, Muhammad Usama Chaudhry, Balajee Vamanan, T. N. Vijaykumar, Mithuna Thottethodi
Pages: 24-26
doi>10.1145/3234200.3234216
Full text: PDFPDF
Fine-Grained, Multi-Domain Network Resource Abstraction as a Fundamental Primitive to Enable High-Performance, Collaborative Data Sciences
Qiao Xiang, J. Jensen Zhang, X. Tony Wang, Y. Jace Liu, Chin Guok, Franck Le, John MacAuley, Harvey Newman, Y. Richard Yang
Pages: 27-29
doi>10.1145/3234200.3234208
Full text: PDFPDF

Recently, a number of multi-domain network resource information and reservation systems have been developed and deployed, driven by the demand and substantial benefits of providing predictable network resources. A major lacking of such systems, however, ...
expand
Flowtree: Enabling Distributed Flow Summarization at Scale
Said Jawad Saidi, Damien Foucard, Georgios Smaragdakis, Anja Feldmann
Pages: 30-32
doi>10.1145/3234200.3234225
Full text: PDFPDF

NetFlow and IPFIX raw flow captures are insightful yet, due to their large volume, challenging to timely analyze and query. In particular, if these captures span long time periods or are collected at remote locations, storing or transferring them for ...
expand
High speed adaptive rack-scale fabrics
Omer S. Sella, Andrew W. Moore, Noa Zilberman
Pages: 33-35
doi>10.1145/3234200.3234227
Full text: PDFPDF

Rack-scale systems contain thousands of densely packed connected components. While a data center may accommodate a fully provisioned network, rack-scale systems demand a more compact and versatile network that would even up within a heavily populated ...
expand
High-Fidelity Interdomain Routing Experiments
Brivaldo Junior, Ronaldo A. Ferreira, Ítalo Cunha, Brandon Schlinker, Ethan Katz-Bassett
Pages: 36-38
doi>10.1145/3234200.3241324
Full text: PDFPDF

The PEERING research platform lets researchers exchange actual BGP routes and traffic with hundreds of networks. To date, several researchers have used PEERING to perform interdomain routing experiments. However, PEERING's original design sends experiment ...
expand
Immersion on the Edge: A Cooperative Framework for Mobile Immersive Computing
Zeqi Lai, Yong Cui, Ziyi Wang, Xiaoyu Hu
Pages: 39-41
doi>10.1145/3234200.3234201
Full text: PDFPDF
In-band Network Function Telemetry
Jianzhe Liang, Jun Bi, Yu Zhou, Cheng Zhang
Pages: 42-44
doi>10.1145/3234200.3234236
Full text: PDFPDF
KeySched: Timeslot-based Hot Key Scheduling for Load Balancing in Key-Value Store
Heng Yu, Jun Bi, Chen Sun
Pages: 45-47
doi>10.1145/3234200.3234248
Full text: PDFPDF
Modeling IP-to-IP Communication using the Weighted Stochastic Block Model
Patrick Kalmbach, Lion Gleiter, Johannes Zerwas, Andreas Blenk, Wolfgang Kellerer, Stefan Schmid
Pages: 48-50
doi>10.1145/3234200.3234245
Full text: PDFPDF

The vision of self-driving networks integrates network measurements with network control. Processing data for each of the network control tasks separately might be prohibitive due to the large volume and waste of computational resources. In this work ...
expand
Filtering Spoofed IP Traffic Using Switching ASICs
Jiasong Bai, Jun Bi, Menghao Zhang, Guanyu Li
Pages: 51-53
doi>10.1145/3234200.3234205
Full text: PDFPDF
Observing Network Handovers with Multipath TCP
Quentin De Coninck, Olivier Bonaventure
Pages: 54-56
doi>10.1145/3234200.3234214
Full text: PDFPDF

Multipath TCP is a recent TCP extension that enables the usage of multiple networks for a single connection. Since September 2017, Apple has enabled Multipath TCP on iOS11 for all applications. The main dedicated use case of multipath usage resides in ...
expand
On the Potential of BGP Flowspec for DDoS Mitigation at Two Sources: ISP and IXP
Nico Hinze, Marcin Nawrocki, Mattijs Jonker, Alberto Dainotti, Thomas C. Schmidt, Matthias Wählisch
Pages: 57-59
doi>10.1145/3234200.3234209
Full text: PDFPDF
Operating a DNS-based Active Internet Observatory
Oliver Hohlfeld
Pages: 60-62
doi>10.1145/3234200.3234239
Full text: PDFPDF

The Internet is subject to constant evolution. Its improvement requires understanding its current properties, a perspective provided by measurement studies. A key challenge in broadly studying evolution is to i) cover multiple protocols ii) with longitudinal ...
expand
PAM: When Overloaded, Push Your Neighbor Aside!
Zili Meng, Jun Bi, Chen Sun, Shuhe Wang, Minhu Wang, Hongxin Hu
Pages: 63-65
doi>10.1145/3234200.3234215
Full text: PDFPDF
perfbench: A Tool for Predictability Analysis in Multi-Tenant Software-Defined Networks
Andreas Blenk, Arsany Basta, Laurenz Henkel, Johannes Zerwas, Wolfgang Kellerer, Stefan Schmid
Pages: 66-68
doi>10.1145/3234200.3234234
Full text: PDFPDF

Network Virtualization (NV) provides low resource costs and high utilization, while ensuring bandwidth isolation in the data plane. Software-Defined Networks (SDNs) are a particularly interesting technology to implement NV, as tenants maintain control ...
expand
Polyraptor: Embracing Path and Data Redundancy in Data Centres for Efficient Data Transport
Mohammed Alasmar, George Parisis, Jon Crowcroft
Pages: 69-71
doi>10.1145/3234200.3234222
Full text: PDFPDF

In this paper, we introduce Polyraptor, a novel data transport protocol that uses RaptorQ (RQ) codes and is tailored for one-to-many and many-to-one data transfer patterns, which are extremely common in modern data centres. Polyraptor builds on previous ...
expand
Poster: Towards a Collaborative and Retrospective Understanding of Security Events with Retro-Future
Calvin Ardi, John Heidemann, Gina Fisk, Mike Fisk, Christos Papadopoulos
Pages: 72-74
doi>10.1145/3234200.3234249
Full text: PDFPDF
RawPower: Deep Learning based Anomaly Detection from Raw Network Traffic Measurements
Gonzalo Marín, Pedro Casas, Germán Capdehourat
Pages: 75-77
doi>10.1145/3234200.3234238
Full text: PDFPDF

Machine learning models using deep architectures (i.e., deep learning) have gained path in recent years and have become state-of-the-art in many fields, including computer vision, speech recognition and natural language processing. However, when it comes ...
expand
Redundant Logic Elimination in Network Functions
Bangwen Deng, Wenfei Wu
Pages: 78-80
doi>10.1145/3234200.3234219
Full text: PDFPDF

In current NFV ecosystem, most software NFs delivered by NF vendors tend to be monolithic with multiple features. In runtime, an NF is configured with a subset of its features turned on/off. By our code analysis and primary test, we find that some of ...
expand
Revealing Hidden Hierarchical Heavy Hitters in network traffic
Salvator Galea, Andrew W. Moore, Gianni Antichi, Giuseppe Bianchi, Roberto Bifulco
Pages: 81-83
doi>10.1145/3234200.3234226
Full text: PDFPDF

The idea to enable advanced in-network monitoring functionality has been lately fostered by the advent of massive data-plane programmability. A specific example includes the detection of traffic aggregates with programmable switches, i.e., heavy hitters. ...
expand
Scalable Surface Reconstruction in the Mobile Edge
Dániel Varga, Sándor Laki
Pages: 84-86
doi>10.1145/3234200.3234243
Full text: PDFPDF

Various augmented and virtual reality (AR/VR) applications have emerged in the past years and their popularity are still increasing. Most of these applications work near real-time, posing low-latency requirements against the algorithms to be used. The ...
expand
SFP: Toward Interdomain Routing for SDN Networks
Qiao Xiang, Chin Guok, Franck Le, John MacAuley, Harvey Newman, Y. Richard Yang
Pages: 87-89
doi>10.1145/3234200.3234207
Full text: PDFPDF

Interdomain routing using BGP is widely deployed and well understood. The deployment of SDN in BGP domain networks, however, has not been systematically studied. In this paper, we first show that the use-announcement inconsistency is a fundamental mismatch ...
expand
SN-FFC: Improving Survivability of LEO Satellite Network with Forward Fault Correction
Shaoqing Wang, Youjian Zhao, Hui Xie
Pages: 90-92
doi>10.1145/3234200.3234252
Full text: PDFPDF

Low Earth Orbit (LEO) Satellite network will suffer from heavy congestion under network faults such as node failure, which affects its survivability. Traffic engineering is the mechanism to solve such problem. In data-center wide area networks (DCWAN), ...
expand
The Case for a Rackless Data Center Network Architecture
Dingming Wu, Ang Chen, T. S. Eugene Ng
Pages: 93-95
doi>10.1145/3234200.3234233
Full text: PDFPDF
vNS: a modular programmable virtual network switch
Massimo Gallo, Fabio Pianese
Pages: 96-98
doi>10.1145/3234200.3234242
Full text: PDFPDF
A Fully Portable TCP Implementation Using XFSMs
Giuseppe Bianchi, Michael Welzl, Angelo Tulumello, Giacomo Belocchi, Marco Faltelli, Salvatore Pontarelli
Pages: 99-101
doi>10.1145/3234200.3234237
Full text: PDFPDF

XTRA (XFSM for TRAnsport) is a first step towards "code-once-port-everywhere" transport protocols. XTRA's platform-agnostic programming abstraction, based on an extended finite state machine formalization of a desired transport layer task, is amenable ...
expand
A large-scale demonstration of SDN-based handover management in IEEE 802.11 networks
Ensar Zeljkovic, Johann M. Marquez-Barja, Steven Latré
Pages: 102-104
doi>10.1145/3234200.3234223
Full text: PDFPDF

The density of Wi-Fi at professional environments, such as offices, is resulting in increased strain on the management of Wi-Fi networks, of which handovers are an essential part of. The centralized approach of SDN allows taking more intelligent decisions, ...
expand
A practical method for measuring Web above-the-fold time
Diego da Hora, Dario Rossi, Vassilis Christophides, Renata Teixeira
Pages: 105-107
doi>10.1145/3234200.3234221
Full text: PDFPDF

Page load time (PLT) is still the most common application Quality of Service (QoS) metric to estimate the Quality of Experience (QoE) of Web users. Yet, recent literature abounds with interesting proposals for alternative metrics (e.g., Above The Fold, ...
expand
Accelerating Linux Security with eBPF iptables
Matteo Bertrone, Sebastiano Miano, Fulvio Risso, Massimo Tumolo
Pages: 108-110
doi>10.1145/3234200.3234228
Full text: PDFPDF
BB-Gen: A Packet Crafter for P4 Target Evaluation
Fabricio Rodriguez, P. Gyanesh Kumar Patra, Levente Csikor, Christian Rothenberg, Péter Vörös Sándor Laki, Gergely Pongrácz
Pages: 111-113
doi>10.1145/3234200.3234229
Full text: PDFPDF

With P4 gaining traction to define datapath pipelines along auto-generated control plane APIs, the protocol-independence and increased flexibility add non-trivial hazards when it comes to functional and in-depth performance evaluation. P4-dependent workload ...
expand
Blockchain-based Decentralized Applications meet Multi-Administrative Domain Networking
Raphael Vicente Rosa, Christian Esteve Rothenberg
Pages: 114-116
doi>10.1145/3234200.3234217
Full text: PDFPDF

Envisioned 5G use cases arise challenges around the realization of inter-domain relationships beyond traditional Border Gateway Protocol (BGP) peering, e.g. end-to-end service deployments tailored to specific business needs (a.k.a. slices). Blockchain ...
expand
CLICK-UP: Towards Software Upgrades of Click-driven Stateful Network Elements
Junxiao Wang, Yuchen Huang, Heng Qi, Keqiu Li, Steve Uhlig
Pages: 117-119
doi>10.1145/3234200.3234206
Full text: PDFPDF
Controlling Drones from 5G Networks
János Czentye, János Dóka, Árpád Nagy, László Toka, Balázs Sonkoly, Róbert Szabó
Pages: 120-122
doi>10.1145/3234200.3234244
Full text: PDFPDF

Envisioned 5G applications are key drivers of the evolution of network and cloud architectures. These novel services pose several challenges on the underlying infrastructure in terms of latency, reliability or capacity, just to mention a few. Controlling ...
expand
Controlling Real Cloud Experiments from BGP to the Server (and Back)
Todd Arnold, Brandon Schlinker, Ítalo Cunha, Ethan Katz-Bassett
Pages: 123-125
doi>10.1145/3234200.3234247
Full text: PDFPDF

One of the impediments in performing Internet routing research is the lack of infrastructure capable of supporting experiments with both control and realism. Measurement and experimentation platforms provide minimal control over routing, limited connectivity, ...
expand
Design of SOCKS Version 6
Vladimir Olteanu, Dragoş Niculescu
Pages: 126-128
doi>10.1145/3234200.3234212
Full text: PDFPDF
Exploring various use cases for IPv6 Segment Routing
Fabien Duchene, Mathieu Jadin, Olivier Bonaventure
Pages: 129-131
doi>10.1145/3234200.3234213
Full text: PDFPDF

IPv6 Segment Routing (SRv6) is a modern version of source routing that is being standardised within the IETF to address a variety of use cases in ISP, datacenter and entreprise networks. Its inclusion in recent versions of the Linux kernel enables researchers ...
expand
Fair dropping for multi-resource fairness in software routers Extended Abstract
Vamsi Addanki, Leonardo Linguaglossa, James Roberts, Dario Rossi
Pages: 132-134
doi>10.1145/3234200.3234210
Full text: PDFPDF

We demonstrate that fair dropping is an effective means to realize fair sharing of bandwidth and CPU in a software router. Analysis underpinning the effectiveness of the proposed approach is presented elsewhere [1].
expand
FENDE: Marketplace and Federated Ecosystem for the Distribution and Execution of VNFs
Lucas Bondan, Muriel F. Franco, Alberto E. Schaeffer-Filho, Lisandro Z. Granville, Leonardo Marcuzzo, Cassiano A. D. S. Schneider, Carlos R. P. dos Santos, Giovanni Venâncio, Elias P. Duarte, Jr.
Pages: 135-137
doi>10.1145/3234200.3234235
Full text: PDFPDF

In this demo, we present FENDE: Marketplace and Federated Ecosystem for the Distribution and Execution of Virtualized Network Functions (VNFs) and for the creation of Service Function Chains (SFCs). The FENDE ecosystem enables the distribution of both ...
expand
High-speed per-flow software monitoring with limited resources
Tianzhu Zhang, Leonardo Linguaglossa, Massimo Gallo, Paolo Giaccone, Dario Rossi
Pages: 138-140
doi>10.1145/3234200.3234203
Full text: PDFPDF
Muses: Enabling Lightweight and Diversity for Learning Based Congestion Control
Wei Wang, Yiyang Shao, Kai Zheng
Pages: 141-143
doi>10.1145/3234200.3234202
Full text: PDFPDF
Overbooking Network Slices End-to-End: Implementation and Demonstration
Lanfranco Zanzi, Josep Xavier Salvat, Vincenzo Sciancalepore, Andres Garcia Saavedra, Xavier Costa-Perez
Pages: 144-146
doi>10.1145/3234200.3234230
Full text: PDFPDF

The novel network slicing paradigm allows service providers to open their infrastructure to new business players such as vertical industries. In this demo, we showcase the benefits of our proposed end-to-end network slicing orchestration solution that ...
expand
Policy Injection: A Cloud Dataplane DoS Attack
Levente Csikor, Christian Rothenberg, Dimitrios P. Pezaros, Stefan Schmid, László Toka, Gábor Rétvári
Pages: 147-149
doi>10.1145/3234200.3234250
Full text: PDFPDF

Enterprises continue to migrate their services to the cloud on a massive scale, but the increasing attack surface has become a natural target for malevolent actors. We show policy injection, a novel algorithmic complexity attack that enables a tenant ...
expand
ShadowP4: Building and Testing Modular Programs
Peng Zheng, Theophilus Benson, Chengchen Hu
Pages: 150-152
doi>10.1145/3234200.3234231
Full text: PDFPDF
Testing IDS using GENESIDS: Realistic Mixed Traffic Generation for IDS Evaluation
Felix Erlacher, Falko Dressler
Pages: 153-155
doi>10.1145/3234200.3234204
Full text: PDFPDF

Evaluating signature-based Network Intrusion Detection Systems (NIDS) is a necessary but in general difficult task. Often, live or recorded real-world traffic is used. However, real-world network traffic is often hard to come by at larger scale and the ...
expand

Powered by The ACM Guide to Computing Literature


The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2019 ACM, Inc.
Terms of Usage   Privacy Policy   Code of Ethics   Contact Us