High-Speed Network DDoS Attack Detection: A Survey

RMA Haseeb-Ur-Rehman, AHM Aman, MK Hasan… - Sensors, 2023 - mdpi.com
Having a large number of device connections provides attackers with multiple ways to attack
a network. This situation can lead to distributed denial-of-service (DDoS) attacks, which can …

Survey on Unified Threat Management (UTM) Systems for Home Networks

A Siddiqui, BP Rimal, M Reisslein… - … Surveys & Tutorials, 2024 - ieeexplore.ieee.org
Home networks increasingly support important networked applications with limited
professional network administration support, while sophisticated attacks pose enormous …

Reducing latency in virtual machines: Enabling tactile Internet for human-machine co-working

Z Xiang, F Gabriel, E Urbano… - IEEE Journal on …, 2019 - ieeexplore.ieee.org
Software-defined networking (SDN) and network function virtualization (NFV) processed in
multi-access edge computing (MEC) cloud systems have been proposed as critical …

Design and implementation of an intrusion detection system by using extended BPF in the Linux kernel

SY Wang, JC Chang - Journal of Network and Computer Applications, 2022 - Elsevier
An intrusion detection system (IDS) checks the content of headers and payload of packets to
detect intrusions from the network. It is an essential function for network security …

The rise of eBPF for non-intrusive performance monitoring

C Cassagnes, L Trestioreanu, C Joly… - NOMS 2020-2020 IEEE …, 2020 - ieeexplore.ieee.org
In this paper, we explain that container engines are strengthening their isolation
mechanisms. Therefore, non-intrusive monitoring becomes a must-have for the performance …

Xdp-based smartnic hardware performance acceleration for next-generation networks

P Salva-Garcia, R Ricart-Sanchez… - Journal of Network and …, 2022 - Springer
Next-generation networks are expected to combine advanced physical and digital
technologies in super-high-speed connected system infrastructures, gaining critical …

Demystifying the Performance of XDP BPF

O Hohlfeld, J Krude, JH Reelfs, J Rüth… - 2019 IEEE Conference …, 2019 - ieeexplore.ieee.org
High packet rates at≥ 10 GBit/s challenge the packet processing performance of network
stacks. A common solution is to offload (parts of) the user-space packet processing to other …

SYN flood defense in programmable data planes

D Scholz, S Gallenmüller, H Stubbe… - … of the 3rd P4 Workshop in …, 2020 - dl.acm.org
The SYN flood attack is a common attack strategy as part of Distributed Denial-of-Service,
which steadily becomes more frequent and of higher volume. To defend against SYN floods …

High-performance software load balancer for cloud-native architecture

JB Lee, TH Yoo, EH Lee, BH Hwang, SW Ahn… - IEEE …, 2021 - ieeexplore.ieee.org
Driven by increasing in the demand for cloud computing, cloud providers are constantly
seeking configuration mechanisms designed to simply install a reliable and easy-to-manage …

Verified programs can party: optimizing kernel extensions via post-verification merging

HC Kuo, KH Chen, Y Lu, D Williams… - Proceedings of the …, 2022 - dl.acm.org
Operating system (OS) extensions are more popular than ever. For example, Linux BPF is
marketed as a" superpower" that allows user programs to be downloaded into the kernel …