Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/3548606.3560606acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

A Scalable and Dynamic ACL System for In-Network Defense

Published: 07 November 2022 Publication History

Abstract

In-network/in-switch Access Control List (ACL) is an essential security component of modern networks. In high-speed networks, ACL rules are often placed in a switch's Ternary Content-Addressable Memory (TCAM) for timely ACL match-action and management (e.g. insertion and deletion). However, TCAM-based ACL systems are encountering an scalability issue owing to increasing demand on AI-powered autonomous defenses that detect and block attacks online, which inevitably derives finer-grained ACL rules. Existing solutions minimize the TCAM usage by partially offloading ACL matching into larger Static Random-Access Memory (SRAM) or customized hardware. Nevertheless, current SRAM-based solutions induce high management costs, especially a high rule-deployment latency, which delays time-sensitive defense actions. Also, the customized hardware approaches have its own scalability issue. To support autonomous defenses at a scale, in this paper, we propose an in-switch ACL system called PortCatcher, which breaks the trade-off between scalability and rule management latency. System-wise, we detach layer-4 port matching from TCAM for improving its memory efficiency. Algorithm-wise, we introduce a novel port (range) rule representation concept, called linear range map (LRM), which enables port (range) matching in SRAM-based hash tables. LRM guarantees not only fast and scalable port matching but also low-latency ACL management for timely defenses. With real-world ACL datasets, we show that PortCatcher saves 74%-90% TCAM space compared to state-of-the-art approaches by adding small overhead to SRAM (0.49 SRAM entry per ACL rule). Also, we deploy PortCatcher on a programmable switch to demonstrate that PortCatcher can serve 5-tuple rule matching at a line rate, where port rules are completely matched in SRAM. With a use case study, namely autonomous attack mitigation, we show that PortCatcher has a negligible rule management latency to block attack flows (i.e. 94.42% of rules deployed within 10 ms).

References

[1]
2018. GitHub Survived the Biggest DDoS Attack Ever Recorded. https://bit.ly/3ByHVj8.
[2]
2019. ACL TCAM and LOUs in Catalyst 6500. https://bit.ly/3bgRQyF
[3]
2019. Catalyst 7000 Troubleshooting TechNotes. https://bit.ly/2RGC49z
[4]
2020. 10k Device Family - Switch Architecture Specification. Barefoot Networks.
[5]
2020. The P4 Language Consortium. https://github.com/p4lang/switch
[6]
2022. Cisco Nexus 3000 Series NX-OS Security Configuration Guide, Release 7.x. https://bit.ly/2RJPNfS
[7]
2022. Cisco Nexus 7000 Series NX-OS Security Configuration Guide. https: //bit.ly/3KqeTpG
[8]
Mahdi Abbasi, Hajar Rezaei, Varun G Menon, Lianyong Qi, and Mohammad R Khosravi. 2020. Enhancing the performance of flow classification in SDN-based intelligent vehicular networks. IEEE Transactions on Intelligent Transportation Systems 22, 7 (2020), 4141--4150.
[9]
Ahmed Abusnaina, Aminollah Khormali, DaeHun Nyang, Murat Yuksel, and Aziz Mohaisen. 2019. Examining the robustness of learning-based ddos detection in software defined networks. In 2019 IEEE Conference on Dependable and Secure Computing (DSC). IEEE, 1--8.
[10]
Intel Barefoot. Accessed August 8, 2022. Intel Intelligent Fabric Processors. https://www.intel.com/content/www/us/en/products/network-io/programmable-ethernet-switch.html
[11]
Intel Barefoot. Accessed August 8, 2022. Intel ® Tofino ? 3 Intelligent Fabric Processor. https://www.intel.com/content/dam/www/central-libraries/us/en/documents/product-brief-final-version-pdf.pdf
[12]
Diogo Barradas, Nuno Santos, Luís Rodrigues, Salvatore Signorello, Fernando M. V. Ramos, and André Madeira. 2021. FlowLens: Enabling Efficient Flow Classification for ML-based Network Security Applications. In 28th Annual Network and Distributed System Security Symposium, NDSS 2021, virtually, February 21-25, 2021. The Internet Society.
[13]
Ran Ben Basat, Gil Einziger, and Bilal Tayh. 2020. Cooperative Network-wide Flow Selection. In 28th IEEE International Conference on Network Protocols, ICNP 2020, Madrid, Spain, October 13-16, 2020. IEEE, 1--11.
[14]
A. Bremler-Barr, Y. Harchol, D. Hay, and Y. Hel-Or. 2018. Encoding Short Ranges in TCAM Without Expansion: Efficient Algorithm and Applications. IEEE/ACM Transactions on Networking 26, 2 (2018), 835--850.
[15]
Anat Bremler-Barr and Danny Hendler. 2012. Space-Efficient TCAM-Based Classification Using Gray Coding. IEEE Trans. Computers 61, 1 (2012), 18--30.
[16]
Xiaoqi Chen, Shir Landau Feibish, Mark Braverman, and Jennifer Rexford. 2020. BeauCoup: Answering Many Network Traffic Queries, One Memory Update at a Time. In SIGCOMM '20: Proceedings of the 2020 Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication, Virtual Event, USA, August 10-14, 2020, Henning Schulzrinne and Vishal Misra (Eds.). ACM, 226--239.
[17]
Y. Cheng and P. Wang. 2016. Scalable Multi-Match Packet Classification Using TCAM and SRAM. IEEE Trans. Comput. 65, 7 (2016), 2257--2269.
[18]
Catalin Cimpanu. 2020. AWS said it mitigated a 2.3 Tbps DDoS attack, the largest ever. https://zd.net/2YGSMJh.
[19]
Cisco. [n.d.]. Software-Defined Networking and Network Programmability: Use Cases for Defense and Intelligence Communities. https://bit.ly/33SBtnK
[20]
Graham Cormode and Shan Muthukrishnan. 2005. An improved data stream summary: the count-min sketch and its applications. Journal of Algorithms 55, 1 (2005), 58--75.
[21]
Levente Csikor, Dinil Mon Divakaran, Min Suk Kang, Attila Kőrösi, Balázs Sonkoly, Dávid Haja, Dimitrios P Pezaros, Stefan Schmid, and Gábor Rétvári. 2019. Tuple space explosion: A denial-of-service attack against a software packet clas- sifier. In Proceedings of the 15th International Conference on Emerging Networking Experiments And Technologies. 292--304.
[22]
Q. Dai and H. Li. 2018. An Advanced TCAM-SRAM Architecture for Ranges To- wards Minimizing Packet Classifiers. In Proceedings of the 20th IEEE International Conference on High Performance Computing and Communications. 158--163.
[23]
James Daly, Valerio Bruschi, Leonardo Linguaglossa, Salvatore Pontarelli, Dario Rossi, Jerome Tollet, Eric Torng, and Andrew Yourtchenko. 2019. Tuplemerge: Fast software packet processing for online packet classification. IEEE/ACM transactions on networking 27, 4 (2019), 1417--1431.
[24]
Dinhnguyen Dao, Rhongho Jang, Changhun Jung, David Mohaisen, and DaeHun Nyang. 2022. Minimizing Noise in HyperLogLog-Based Spread Estimation of Multiple Flows. In 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, DSN 2022, Baltimore, MD, USA, June 27-30, 2022. IEEE, 331--342.
[25]
Rohan Doshi, Noah Apthorpe, and Nick Feamster. 2018. Machine learning ddos detection for consumer internet of things devices. In 2018 IEEE Security and Privacy Workshops (SPW). IEEE, 29--35.
[26]
Cristian Estan and George Varghese. 2002. New directions in traffic measurement and accounting. In Proceedings of the 2002 conference on Applications, technologies, architectures, and protocols for computer communications. 323--336.
[27]
Philippe Flajolet and G Nigel Martin. 1985. Probabilistic counting algorithms for data base applications. Journal of computer and system sciences 31, 2 (1985), 182--209.
[28]
Qun Huang, Xin Jin, Patrick P. C. Lee, Runhui Li, Lu Tang, Yi-Chao Chen, and Gong Zhang. 2017. SketchVisor: Robust Network Measurement for Software Packet Processing. In ACM SIGCOMM 2017. ACM, 113--126.
[29]
Muhammad Ibrar, Lei Wang, Gabriel-Miro Muntean, Aamir Akbar, Nadir Shah, and Kaleem Razzaq Malik. 2021. PrePass-Flow: A Machine Learning based technique to minimize ACL policy violation due to links failure in hybrid SDN. Computer Networks 184 (2021), 107706.
[30]
Rhongho Jang, DaeHong Min, Seongkwang Moon, David Mohaisen, and DaeHun Nyang. 2020. SketchFlow: Per-Flow Systematic Sampling Using Sketch Saturation Event. In IEEE INFOCOM 2020. IEEE, 1339--1348.
[31]
Hossein Hadian Jazi, Hugo Gonzalez, Natalia Stakhanova, and Ali A Ghorbani. 2017. Detecting HTTP-based application layer DoS attacks on web servers in the presence of sampling. Computer Networks 121 (2017), 25--36.
[32]
Xin Jin, Xiaozhou Li, Haoyu Zhang, Nate Foster, Jeongkeun Lee, Robert Soulé, Changhoon Kim, and Ion Stoica. 2018. Netchain: Scale-free sub-rtt coordination. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 35--49.
[33]
Min Suk Kang, Soo Bum Lee, and Virgil D. Gligor. 2013. The Crossfire Attack. In Proceedings of the IEEE Symposium on Security and Privacy, SP. IEEE Computer Society, 127--141.
[34]
Qiao Kang, Lei Xue, Adam Morrison, Yuxin Tang, Ang Chen, and Xiapu Luo. 2020. Programmable In-Network Security for Context-aware BYOD Policies. In 29th USENIX Security Symposium (USENIX Security 20). 595--612.
[35]
Georgios P Katsikas, Tom Barbette, Dejan Kostic, Rebecca Steinert, and Gerald Q Maguire Jr. 2018. Metron:{NFV} service chains at the true speed of the underlying hardware. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18). 171--186.
[36]
Naga Praveen Katta, Mukesh Hira, Changhoon Kim, Anirudh Sivaraman, and Jennifer Rexford. 2016. HULA: Scalable Load Balancing Using Programmable Data Planes. In Proceedings of the Symposium on SDN Research, SOSR 2016, Santa Clara, CA, USA, March 14 - 15, 2016, Brighten Godfrey and Martín Casado (Eds.). ACM, 10.
[37]
Y. Kim, H. Ahn, S. Kim, and D. Jeong. 2009. A High-Speed Range-Matching TCAM for Storage-Efficient Packet Classification. IEEE Transactions on Circuits and Systems I: Regular Papers 56, 6 (2009), 1221--1230.
[38]
Abhishek Kumar, Minho Sung, Jun Xu, and Jia Wang. 2004. Data streaming algorithms for efficient and accurate estimation of flow size distribution. ACM SIGMETRICS PER 32, 1 (2004), 177--188.
[39]
Abhishek Kumar and Jun (Jim) Xu. 2006. Sketch Guided Sampling - Using On- Line Estimates of Flow Size for Adaptive Data Collection. In INFOCOM 2006. IEEE.
[40]
Karthik Lakshminarayanan, Anand Rangarajan, and Srinivasan Venkatachary. 2005. Algorithms for advanced packet classification with ternary CAMs. In Proceedings of the ACM SIGCOMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Roch Guérin, Ramesh Govindan, and Greg Minshall (Eds.). ACM, 193--204.
[41]
Wenjun Li, Xianfeng Li, Hui Li, and Gaogang Xie. 2018. Cutsplit: A decision- tree combining cutting and splitting for scalable packet classification. In IEEE INFOCOM 2018-IEEE Conference on Computer Communications. IEEE, 2645--2653.
[42]
Yuliang Li, Rui Miao, Changhoon Kim, and Minlan Yu. 2016. FlowRadar: A Better NetFlow for Data Centers. In NSDI 2016. USENIX Association, 311--324.
[43]
A. X. Liu, C. R. Meiners, and E. Torng. 2010. TCAM Razor: A Systematic Approach Towards Minimizing Packet Classifiers in TCAMs. IEEE/ACM Transactions on Networking 18, 2 (2010), 490--500.
[44]
Zaoxing Liu, Ran Ben-Basat, Gil Einziger, Yaron Kassner, Vladimir Braverman, Roy Friedman, and Vyas Sekar. 2019. Nitrosketch: Robust and general sketch-based monitoring in software switches. In ACM SIGCOMM 2019. 334--350.
[45]
Zaoxing Liu, Antonis Manousis, Gregory Vorsanger, Vyas Sekar, and Vladimir Braverman. 2016. One sketch to rule them all: Rethinking network flow monitoring with univmon. In ACM SIGCOMM 2016. 101--114.
[46]
Zaoxing Liu, Hun Namkung, Georgios Nikolaidis, Jeongkeun Lee, Changhoon Kim, Xin Jin, Vladimir Braverman, Minlan Yu, and Vyas Sekar. 2021. Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric ddos attacks with programmable switches. In 30th USENIX Security Symposium (USENIX Security 21).
[47]
Soumya Maity, Padmalochan Bera, and SK Ghosh. 2012. Policy based acl configu- ration synthesis in enterprise networks: A formal approach. In 2012 International Symposium on Electronic System Design (ISED). IEEE, 314--318.
[48]
C. R. Meiners, A. X. Liu, and E. Torng. 2011. Topological Transformation Ap- proaches to TCAM-Based Packet Classification. IEEE/ACM Transactions on Networking 19, 1 (2011), 237--250.
[49]
C. R. Meiners, A. X. Liu, and E. Torng. 2012. Bit Weaving: A Non-Prefix Approach to Compressing Packet Classifiers in TCAMs. IEEE/ACM Transactions on Networking 20, 2 (2012), 488--500.
[50]
Sebastiano Miano, Fulvio Risso, Mauricio Vásquez Bernal, Matteo Bertrone, and Yunsong Lu. 2021. A framework for eBPF-based network functions in an era of microservices. IEEE Transactions on Network and Service Management 18, 1 (2021), 133--151.
[51]
Rui Miao, Hongyi Zeng, Changhoon Kim, Jeongkeun Lee, and Minlan Yu. 2017. SilkRoad: Making Stateful Layer-4 Load Balancing Fast and Cheap Using Switch- ing ASICs. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication, SIGCOMM 2017, Los Angeles, CA, USA, August 21-25, 2017. ACM, 15--28.
[52]
Rui Miao, Hongyi Zeng, Changhoon Kim, Jeongkeun Lee, and Minlan Yu. 2017. Silkroad: Making stateful layer-4 load balancing fast and cheap using switching asics. In Proceedings of the Conference of the ACM Special Interest Group on Data Communication. 15--28.
[53]
Yisroel Mirsky, Tomer Doitshman, Yuval Elovici, and Asaf Shabtai. 2018. Kitsune: an ensemble of autoencoders for online network intrusion detection. NDSS (2018).
[54]
Edgecore Networks. 2020. WEDGE 100BF-32X. https://bit.ly/2YDeyv2.
[55]
D. Nyang and D. Shin. 2016. Recyclable Counter With Confinement for Real-Time Per-Flow Measurement. IEEE/ACM Trans. Netw. 24, 5 (2016), 3191--3203.
[56]
Alon Rashelbach, Ori Rottenstreich, and Mark Silberstein. 2020. A computational approach to packet classification. In Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication. 542--556.
[57]
Ori Rottenstreich and Isaac Keslassy. 2010. Worst-Case TCAM Rule Expansion. In INFOCOM 2010. 29th IEEE International Conference on Computer Communications, Joint Conference of the IEEE Computer and Communications Societies, 15-19 March 2010, San Diego, CA, USA. IEEE, 456--460.
[58]
O. Rottenstreich, I. Keslassy, A. Hassidim, H. Kaplan, and E. Porat. 2016. Optimal In/Out TCAM Encodings of Ranges. IEEE/ACM Transactions on Networking 24, 1 (2016), 555--568.
[59]
Vyas Sekar, Michael K Reiter, Walter Willinger, Hui Zhang, Ramana Rao Kompella, and David G Andersen. 2008. cSamp: A system for network-wide flow monitoring. (2008).
[60]
Stefan Seufert and Darragh O'Brien. 2007. Machine Learning for Automatic Defence Against Distributed Denial of Service Attacks. In Proceedings of IEEE International Conference on Communications, ICC. IEEE, 1217--1222.
[61]
Iman Sharafaldin, Arash Habibi Lashkari, and Ali A Ghorbani. 2018. Toward gen- erating a new intrusion detection dataset and intrusion traffic characterization. In ICISSp. 108--116.
[62]
Anirudh Sivaraman, Changhoon Kim, Ramkumar Krishnamoorthy, Advait Dixit, and Mihai Budiu. 2015. Dc. p4: Programming the forwarding plane of a data-center switch. In Proceedings of the 1st ACM SIGCOMM Symposium on Software Defined Networking Research. 1--8.
[63]
Jared M. Smith and Max Schuchard. 2018. Routing Around Congestion: Defeating DDoS Attacks and Adverse Network Conditions via Reactive BGP Routing. In Proceedings of the IEEE Symposium on Security and Privacy, SP. IEEE Computer Society, 599--617.
[64]
E. Spitznagel, D. Taylor, and J. Turner. 2003. Packet classification using ex- tended TCAMs. In 11th IEEE International Conference on Network Protocols, 2003. Proceedings. 120--131.
[65]
Robert H. Morris Sr. 1978. Counting Large Numbers of Events in Small Registers. Commun. ACM 21, 10 (1978), 840--842.
[66]
Venkatachary Srinivasan, George Varghese, Subhash Suri, and Marcel Waldvogel. 1998. Fast and Scalable Layer Four Switching. In Proceedings of the ACM SIG- COMM Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, Gerald Neufeld, Gary S. Delp, Jonathan Smith, and Martha Steenstrup (Eds.). ACM, 191--202.
[67]
Vegesna SM Srinivasavarma and Shiv Vidhyut. 2020. A TCAM-based caching architecture framework for packet classification. ACM Transactions on Embedded Computing Systems (TECS) 20, 1 (2020), 1--19.
[68]
DE Taylor and JS Turner. 2004. ClassBench: a packet classification benchmark, WUCSE-2004-28. Technical Report. Saint Louis: Department of Computer Science Engineering, Washington University.
[69]
Bingchuan Tian, Xinyi Zhang, Ennan Zhai, Hongqiang Harry Liu, Qiaobo Ye, Chunsheng Wang, Xin Wu, Zhiming Ji, Yihong Sang, Ming Zhang, et al. 2019. Safely and automatically updating in-network ACL configurations with intent language. In Proceedings of the ACM Special Interest Group on Data Communication. 214--226.
[70]
Anees Ullah, Pedro Reviriego, et al. 2020. FlexTCAM: Beyond Memory Based TCAM Emulation on FPGAs. In 2020 IEEE Conference on Network Function Virtu- alization and Software Defined Networks (NFV-SDN). IEEE, 110--113.
[71]
Henry Wang. 2019. Algorithmic Longest Prefix Matching in Programmable Switch. https://patents.google.com/patent/US10511532B2/en
[72]
Shie-Yuan Wang, Hsien-Wen Hu, and Yi-Bing Lin. 2020. Design and Implementation of TCP-Friendly Meters in P4 Switches. IEEE/ACM Trans. Netw. 28, 4 (2020), 1885--1898.
[73]
Kyu-Young Whang, Brad T. Vander Zanden, and Howard M. Taylor. 1990. A Linear-Time Probabilistic Counting Algorithm for Database Applications. ACM Trans. Database Syst. 15, 2 (1990), 208--229.
[74]
Xin Wu, Daniel Turner, Chao-Chih Chen, David A Maltz, Xiaowei Yang, Lihua Yuan, and Ming Zhang. 2012. NetPilot: Automating datacenter network failure mitigation. In Proceedings of the ACM SIGCOMM 2012 conference on Applications, technologies, architectures, and protocols for computer communication. 419--430.
[75]
Jiarong Xing, Kuo-Feng Hsu, Yiming Qiu, H Yang, Hongyi Liu, and Ang Chen. 2021. Bedrock: Programmable Network Support for Secure RDMA Systems. In Proceedings of the 31th USENIX Security Symposium (USENIX Security'22). USENIX Association.
[76]
Jiarong Xing, Wenqing Wu, and Ang Chen. [n.d.]. Ripple: A Programmable, De- centralized Link-Flooding Defense Against Adaptive Adversaries. In 30th USENIX Security Symposium, USENIX Security 2021, August 11-13, 2021, Michael Bailey and Rachel Greenstadt (Eds.).
[77]
Hongli Xu, Shigang Chen, Qianpiao Ma, and Liusheng Huang. 2019. Lightweight Flow Distribution for Collaborative Traffic Measurement in Software Defined Networks. In 2019 IEEE Conference on Computer Communications, INFOCOM 2019, Paris, France, April 29 - May 2, 2019. IEEE, 1108--1116.
[78]
Kuai Xu, Zhi-Li Zhang, and Supratik Bhattacharyya. 2005. Reducing Unwanted Traffic in a Backbone Network. SRUTI 5 (2005), 9--15.
[79]
Tong Yang, Jie Jiang, Peng Liu, Qun Huang, Junzhi Gong, Yang Zhou, Rui Miao, Xiaoming Li, and Steve Uhlig. 2018. Elastic sketch: Adaptive and fast network- wide measurements. In Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication. 561--575.
[80]
Weiwen Yu, Srinivas Sivakumar, and Derek Pao. 2019. Pseudo-TCAM: SRAM- based architecture for packet classification in one memory access. IEEE Networking Letters 1, 2 (2019), 89--92.
[81]
Xiaoyong Yuan, Chuanhuang Li, and Xiaolin Li. 2017. DeepDefense: identifying DDoS attack via deep learning. In 2017 IEEE International Conference on Smart Computing (SMARTCOMP). IEEE, 1--8.
[82]
Xiaoyong Yuan, Chuanhuang Li, and Xiaolin Li. 2017. DeepDefense: Identifying DDoS Attack via Deep Learning. In Proceedings of the 2017 IEEE International Conference on Smart Computing. IEEE Computer Society, 1--8.
[83]
Menghao Zhang, Guanyu Li, Shicheng Wang, Chang Liu, Ang Chen, Hongxin Hu, Guofei Gu, Qianqian Li, Mingwei Xu, and Jianping Wu. 2020. Poseidon: Mitigating volumetric ddos attacks with programmable switches. In the 27th Network and Distributed System Security Symposium (NDSS 2020).
[84]
Peng Zhang, Xu Liu, Hongkun Yang, Ning Kang, Zhengchang Gu, and Hao Li. 2020. APKeep: Realtime Verification for Real Networks. In 17th USENIX Sympo- sium on Networked Systems Design and Implementation (NSDI 20). 241--255.
[85]
Shuyuan Zhang, Franjo Ivancic, Cristian Lumezanu, Yifei Yuan, Aarti Gupta, and Sharad Malik. 2014. An adaptable rule placement for software-defined networks. In 2014 44th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. IEEE, 88--99.
[86]
Jincheng Zhong and Shuhui Chen. 2021. Efficient multi-category packet classifi- cation using TCAM. Computer Communications 169 (2021), 1--10.

Cited By

View all
  • (2024)Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installationScientific Reports10.1038/s41598-024-65721-x14:1Online publication date: 28-Jun-2024
  • (2023)Solving Distributed ACL Policies Under Complex Constraints with Graph Neural Networks2023 IEEE 31st International Conference on Network Protocols (ICNP)10.1109/ICNP59255.2023.10355624(1-12)Online publication date: 10-Oct-2023

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CCS '22: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security
November 2022
3598 pages
ISBN:9781450394505
DOI:10.1145/3548606
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 November 2022

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. dynamic management
  2. in-network acl
  3. low-latency defense
  4. scalable port (range) matching

Qualifiers

  • Research-article

Funding Sources

  • National Research Foundation of Korea (NRF) funded by the Ministry of Science and ICT
  • National Research Foundation of Korea (NRF) grant funded by the Korea government (MSIT)

Conference

CCS '22
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

Upcoming Conference

CCS '24
ACM SIGSAC Conference on Computer and Communications Security
October 14 - 18, 2024
Salt Lake City , UT , USA

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)323
  • Downloads (Last 6 weeks)9
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Efficient handling of ACL policy change in SDN using reactive and proactive flow rule installationScientific Reports10.1038/s41598-024-65721-x14:1Online publication date: 28-Jun-2024
  • (2023)Solving Distributed ACL Policies Under Complex Constraints with Graph Neural Networks2023 IEEE 31st International Conference on Network Protocols (ICNP)10.1109/ICNP59255.2023.10355624(1-12)Online publication date: 10-Oct-2023

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media