Enhancing Network Visibility and Security with Advanced Port Scanning Techniques

R Abu Bakar, B Kijsirikul - Sensors, 2023 - mdpi.com
Network security is paramount in today's digital landscape, where cyberthreats continue to
evolve and pose significant risks. We propose a DPDK-based scanner based on a study on …

Caravan: Practical Online Learning of {In-Network}{ML} Models with Labeling Agents

Q Zhang, A Imran, E Bardhi, T Swamy… - … USENIX Symposium on …, 2024 - usenix.org
Recent work on in-network machine learning (ML) anticipates offline models to operate well
in modern networking environments. However, upon deployment, these models struggle to …

Marina: Realizing ML-Driven Real-Time Network Traffic Monitoring at Terabit Scale

M Seufert, K Dietz, N Wehner, S Geißler… - … on Network and …, 2024 - ieeexplore.ieee.org
Network operators require real-time traffic monitoring insights to provide high performance
and security to their customers. It has been shown that artificial intelligence and machine …

Sidekick:{In-Network} Assistance for Secure {End-to-End} Transport Protocols

G Yuan, M Sotoudeh, DK Zhang, M Welzl… - … USENIX Symposium on …, 2024 - usenix.org
In response to concerns about protocol ossification and privacy, post-TCP transport
protocols such as QUIC and Web-RTC include end-to-end encryption and authentication at …

Rosebud: Making fpga-accelerated middlebox development more pleasant

M Khazraee, A Forencich, GC Papen… - Proceedings of the 28th …, 2023 - dl.acm.org
We introduce an approach to designing FPGA-accelerated middleboxes that simplifies
development, debugging, and performance tuning by decoupling the tasks of hardware …

Towards Adaptive ML Traffic Processing Systems

J Hugon, G Nodet, A Busson, F Bronzino - Proceedings of the on …, 2023 - dl.acm.org
Machine learning techniques are a common solution used to solve a variety of network
management tasks. Often, a network administrator chooses the model to deploy based on …

CATO: End-to-End Optimization of ML-Based Traffic Analysis Pipelines

G Wan, S Liu, F Bronzino, N Feamster… - arXiv preprint arXiv …, 2024 - arxiv.org
Machine learning has shown tremendous potential for improving the capabilities of network
traffic analysis applications, often outperforming simpler rule-based heuristics. However, ML …

Triton: A Flexible Hardware Offloading Architecture for Accelerating Apsara vSwitch in Alibaba Cloud

X Li, X Jiang, Y Yang, L Chen, Y Wang… - Proceedings of the …, 2024 - dl.acm.org
Apsara vSwitch (AVS) is a per-host deployed forwarding component for instance network
connectivity in the Alibaba Cloud. To meet the growing performance demands, we …

Detecting VPN Traffic through Encapsulated TCP Behavior

M Hanlon, G Wan, A Ascheman… - Free and Open …, 2024 - petsymposium.org
Virtual Private Networks (VPNs) are increasingly being used to protect online users' privacy
and security. However, there is an ongoing arms race between censors that aim to detect …

Real-Time Symbolic Reasoning Framework for Cryptojacking Detection Based on Netflow-Plus Analysis

Z Yang, J Li, F Cui, JQ Liu, Y Cheng, XN Tang… - … on Information Security …, 2023 - Springer
Cryptojacking is a cybersecurity threat in which cybercriminals use unauthorized computing
resources for cryptocurrency mining. This kind of illegal activity is showing an intensifying …