A survey on encrypted network traffic analysis applications, techniques, and countermeasures

E Papadogiannaki, S Ioannidis - ACM Computing Surveys (CSUR), 2021 - dl.acm.org
The adoption of network traffic encryption is continually growing. Popular applications use
encryption protocols to secure communications and protect the privacy of users. In addition …

Fast packet processing: A survey

D Cerović, V Del Piccolo, A Amamou… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
The exponential growth of data traffic, which is not expected to stop anytime soon, brought
about a vast amount of advancements in the networking field. Latest network interfaces …

The case for in-network computing on demand

Y Tokusashi, HT Dang, F Pedone, R Soulé… - Proceedings of the …, 2019 - dl.acm.org
Programmable network hardware can run services traditionally deployed on servers,
resulting in orders-of-magnitude improvements in performance. Yet, despite these …

A malicious network traffic detection model based on bidirectional temporal convolutional network with multi-head self-attention mechanism

S Cai, H Xu, M Liu, Z Chen, G Zhang - Computers & Security, 2024 - Elsevier
The increasingly frequent network intrusions have brought serious impacts to the production
and life, thus malicious network traffic detection has received more and more attention in …

A high performance scalable fuzzy based modified Asymmetric Heterogene Multiprocessor System on Chip (AHt-MPSOC) reconfigurable architecture

AP Raveendran, JA Alzubi, R Sekaran… - Journal of Intelligent …, 2022 - content.iospress.com
This Ensuing generation of FPGA circuit tolerates the combination of lot of hard and soft
cores as well as devoted accelerators on a chip. The Heterogene Multi-Processor System …

Automatic Parallelization of Software Network Functions

F Pereira, FMV Ramos, L Pedrosa - 21st USENIX Symposium on …, 2024 - usenix.org
Software network functions (NFs) trade-off flexibility and ease of deployment for an
increased challenge of performance. The traditional way to increase NF performance is by …

Network intrusion detection in encrypted traffic

E Papadogiannaki, G Tsirantonakis… - 2022 IEEE Conference …, 2022 - ieeexplore.ieee.org
Traditional signature-based intrusion detection systems inspect packet headers and
payloads to report any malicious or abnormal traffic behavior that is observed in the network …

[HTML][HTML] Acceleration of intrusion detection in encrypted network traffic using heterogeneous hardware

E Papadogiannaki, S Ioannidis - Sensors, 2021 - mdpi.com
More than 75% of Internet traffic is now encrypted, and this percentage is constantly
increasing. The majority of communications are secured using common encryption protocols …

[图书][B] Heterogeneous computing architectures: Challenges and vision

O Terzo, K Djemame, A Scionti, C Pezuela - 2019 - books.google.com
Heterogeneous Computing Architectures: Challenges and Vision provides an updated
vision of the state-of-the-art of heterogeneous computing systems, covering all the aspects …

Multiple pattern matching for network security applications: Acceleration through vectorization

C Stylianopoulos, M Almgren, O Landsiedel… - Journal of Parallel and …, 2020 - Elsevier
As both new network attacks emerge and network traffic increases in volume, the need to
perform network traffic inspection at high rates is ever increasing. The core of many security …