Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- extended-abstractDecember 2024
Evolving Network Security in the Era of Network Programmability
CCS '24: Proceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications SecurityPages 5101–5103https://doi.org/10.1145/3658644.3690859Software-defined networking (SDN) is a centralized network architecture enabling dynamic, programmable, and flexible network management, which advances technologies like network security. However, it also introduces new vulnerabilities due to the ...
- research-articleMay 2024
DirectFaaS: A Clean-Slate Network Architecture for Efficient Serverless Chain Communications
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2759–2767https://doi.org/10.1145/3589334.3645333Serverless computing, also known as Function-as-a-Service (FaaS), triggers web applications in the form of function chains. It uses a central orchestrator to route all requests from end-users and internal functions. Such architecture simplifies ...
- research-articleNovember 2024
P3GNN: A Privacy-Preserving Provenance Graph-Based Model for Autonomous APT Detection in Software Defined Networking
AutonomousCyber '24: Proceedings of the Workshop on Autonomous CybersecurityPages 34–44https://doi.org/10.1145/3689933.3690836Software Defined Networking (SDN) has brought significant advancements in network management and programmability. However, this evolution has also heightened vulnerability to Advanced Persistent Threats (APTs), sophisticated and stealthy cyberattacks ...
- rfcAugust 2023
RFC 9437: Publish/Subscribe Functionality for the Locator/ID Separation Protocol (LISP)
This document specifies an extension to the Locator/ID Separation Protocol (LISP) control plane to enable Publish/Subscribe (PubSub) operation.
- research-articleMay 2023
MSNetViews: Geographically Distributed Management of Enterprise Network Security Policy
- Iffat Anjum,
- Jessica Sokal,
- Hafiza Ramzah Rehman,
- Ben Weintraub,
- Ethan Leba,
- William Enck,
- Cristina Nita-Rotaru,
- Bradley Reaves
SACMAT '23: Proceedings of the 28th ACM Symposium on Access Control Models and TechnologiesPages 121–132https://doi.org/10.1145/3589608.3593836Commercially-available software defined networking (SDN) technologies will play an important role in protecting the on-premises resources that remain as enterprises transition to zero trust architectures. However, existing solutions assume the entire ...
-
- posterMay 2022
Can You Still See Me?: Identifying Robot Operations Over End-to-End Encrypted Channels
WiSec '22: Proceedings of the 15th ACM Conference on Security and Privacy in Wireless and Mobile NetworksPages 298–300https://doi.org/10.1145/3507657.3529659Connected robots play a key role in automating industrial workflows. Robots can expose sensitive operational information to remote adversaries. Despite the use of end-to-end encryption, a passive adversary could fingerprint and reconstruct the entire ...
- abstractMarch 2021
FDP: A Teaching and Demonstration Platform for Networking
SIGCSE '21: Proceedings of the 52nd ACM Technical Symposium on Computer Science EducationPage 1376https://doi.org/10.1145/3408877.3439543Requesting https://www.wikipedia.org from your browser can start a small storm of exchanges between your device and name servers, caches and ultimately the Wikipedia servers. Data networking involves simple ideas---such as modular decomposition and path ...
- short-paperJanuary 2021
Applying load balancing algorithms for multiple access management on software-defined networking servers
EATIS '20: Proceedings of the 10th Euro-American Conference on Telematics and Information SystemsArticle No.: 39, Pages 1–5https://doi.org/10.1145/3401895.3402071With the increase in the volume of computer networks usage, effective management is becoming increasingly difficult. Software Defined Networks (SDN) have emerged to address this situation. The objective of this work is to demonstrate the benefits of ...
- posterMarch 2020
Load and Latency aware Cost Optimal Controller Placement in 5G Network using sNFV
HotMobile '20: Proceedings of the 21st International Workshop on Mobile Computing Systems and ApplicationsPage 106https://doi.org/10.1145/3376897.33791695th Generation of Mobile Networking (5G) is tar-geting to fulfil all the service demands of end users in acost effective manner. To provide optimum end-to-end network services within a resource restricted environment is really a challenging task. Tele-...
- posterDecember 2019
Throughput Enhancement with Overlay Network Virtualization Using Commodity Devices
UCC '19 Companion: Proceedings of the 12th IEEE/ACM International Conference on Utility and Cloud Computing CompanionPages 147–148https://doi.org/10.1145/3368235.3370929Overlay network virtualization provides virtual networks over IP networks. Building virtual networks over IP networks achieves high mobility to realize a multi-tenant network. Although the encapsulation protocol, such as VXLAN, is widely used to ...
- research-articleNovember 2019
Specification-driven Moving Target Defense Synthesis
MTD'19: Proceedings of the 6th ACM Workshop on Moving Target DefensePages 13–24https://doi.org/10.1145/3338468.3356830Cyber agility enables cyber systems to defend proactively against sophisticated attacks by dynamically changing the system configuration parameters (called mutable parameters) in order to deceive adversaries from reaching their goals, disrupt the attack ...
- posterNovember 2019
Poster: SDN-based System to Filter Out DRDoS Amplification Traffic in ISP Networks
CCS '19: Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications SecurityPages 2645–2647https://doi.org/10.1145/3319535.3363277Distributed Reflected Denial of Service (DRDoS) attacks remain one of the most popular techniques to drain victim's network bandwidth. Despite the goal of disrupting network services of a particular victim, indirectly these attacks affect a large number ...
- short-paperMarch 2019
Enabling Dynamic Network Access Control with Anomaly-based IDS and SDN
SDN-NFVSec '19: Proceedings of the ACM International Workshop on Security in Software Defined Networks & Network Function VirtualizationPages 13–16https://doi.org/10.1145/3309194.3309199In the Software Defined Networking (SDN) and Network Function Virtualization (NFV) era, it is critical to enable dynamic network access control. Traditionally, network access control policies are statically predefined as router entries or firewall ...
- research-articleJanuary 2019
Seamless handover for video streaming over an SDN-based Aeronautical Communications Network
ACM SIGMETRICS Performance Evaluation Review (SIGMETRICS), Volume 46, Issue 3Pages 98–99https://doi.org/10.1145/3308897.3308943There have been increasing interests in applying Software Defined Networking (SDN) to aeronautical communications primarily for air traffic management purposes. From the service passenger communications' point of view, a major goal is to improve ...
- research-articleOctober 2018Best Paper
SkyCore: Moving Core to the Edge for Untethered and Reliable UAV-based LTE Networks
MobiCom '18: Proceedings of the 24th Annual International Conference on Mobile Computing and NetworkingPages 35–49https://doi.org/10.1145/3241539.3241549The advances in unmanned aerial vehicle (UAV) technology have empowered mobile operators to deploy LTE base stations (BSs) on UAVs, and provide on-demand, adaptive connectivity to hotspot venues as well as emergency scenarios. However, today's evolved ...
- research-articleOctober 2018
FlexStream: Towards Flexible Adaptive Video Streaming on End Devices using Extreme SDN
MM '18: Proceedings of the 26th ACM international conference on MultimediaPages 555–563https://doi.org/10.1145/3240508.3240676We present FlexStream, a programmable framework realized by implementing Software-Defined Networking (SDN) functionality on end devices. FlexStream exploits the benefits of both centralized and distributed components to achieve dynamic management of end ...
- research-articleOctober 2018
Wireless Interface Agent for SDN mmWave Multi-hop Networks: Design and Experimental Evaluation
mmNets '18: Proceedings of the 2nd ACM Workshop on Millimeter Wave Networks and Sensing SystemsPages 9–14https://doi.org/10.1145/3264492.3264495Millimeter wave (mmwave) communications will likely be an enabler for 5G due to its multi-gigabit per second throughput capabilities. Furthermore,mmWave communications will have to be integrated in a new redesigned network required by 5G to fulfill its ...
- short-paperMarch 2018
Internet Security Liberated via Software Defined Exchanges
SDN-NFV Sec'18: Proceedings of the 2018 ACM International Workshop on Security in Software Defined Networks & Network Function VirtualizationPages 19–22https://doi.org/10.1145/3180465.3180475With software defined networking and network function virtualization technologies, networks can be programmed to have customized processing and paths for different traffic at manageable costs and for massive numbers of applications. Now, picture a ...
- research-articleJanuary 2018
In-design Resilient SDN Control Plane and Elastic Forwarding Against Aggressive DDoS Attacks
MTD '18: Proceedings of the 5th ACM Workshop on Moving Target DefensePages 80–89https://doi.org/10.1145/3268966.3268968Using Software-defined Networks in wide area (SDN-WAN) has been strongly emerging in the past years. Due to scalability and economical reasons, SDN-WAN mostly uses an in-band control mechanism, which implies that control and data sharing the same ...
- research-articleNovember 2017
Resource Allocation in Software Defined Fog Vehicular Networks
DIVANet '17: Proceedings of the 6th ACM Symposium on Development and Analysis of Intelligent Vehicular Networks and ApplicationsPages 71–76https://doi.org/10.1145/3132340.3132357Vehicular network is an important application scenario of the fifth generation (5G) mobile communications. Due to the increasing number of vehicles and the users' various requirements, resource allocation problem in vehicular networks becomes more ...