參考文獻 |
[1] X. Xu, J. Li, Y. Yang and F. Shen, "Toward Effective Intrusion Detection Using Log-Cosh Conditional Variational Autoencoder," IEEE Internet of Things Journal, vol. 8, no. 8, pp. 6187-6196, April, 2021, doi: 10.1109/JIOT.2020.3034621.
[2] M. Russo, N. Šrndić, and P. Laskov, "Detection of Illicit Cryptomining Using Network Metadata," EURASIP Journal on Information Security, vol. 2021, no. 1, pp. 1-20, 2021.
[3] M. Carugi and D. McDysan, "Service Requirements for Layer 3 Provider Provisioned Virtual Private Networks (PPVPNs)," RFC 4031, Apr. 2005.
[4] P. Bosshart et al., "P4: Programming Protocol-Independent Packet Processors," SIGCOMM Comput. Commun. Rev., vol. 44, no. 3, pp. 87-95, Jul. 2014, doi: 10.1145/2656877.2656890.
[5] B. Charyyev and M. H. Gunes, "Locality-Sensitive IoT Network Traffic Fingerprinting for Device Identification," IEEE Internet of Things Journal, vol. 8, no. 3, pp. 1272-1281, Feb, 2021, doi: 10.1109/JIOT.2020.3035087.
[6] J. Kotak and Y. Elovici, "Adversarial Attacks Against IoT Identification Systems," in IEEE Internet of Things Journal, vol. 10, no. 9, pp. 7868-7883, May, 2023, doi: 10.1109/JIOT.2022.3229906.
[7] T. Datta, N. Feamster, J. Rexford, and L. Wang, "SPINE: Surveillance Protection in the Network Elements," the 9th USENIX Workshop on Free and Open Communications on the Internet, 2019.
[8] N. McKeown et al., "OpenFlow: Enabling Innovation in Campus Networks," SIGCOMM Comput. Commun. Rev., vol. 38, no. 2, pp. 69-74, Apr, 2008, doi: 10.1145/1355734.1355746.
[9] ONF Solution Brief, "OpenFlow-Enabled SDN and Network Functions Virtualization," Open Netw. Found, vol. 17, pp. 1-12, 2014.
[10] "P4 Language Tutorial" Accessed on: May 23, 2023. [Online]. Available: https://docs.google.com/presentation/d/1zliBqsS8IOD4nQUboRRmF_19poeLLDLadD5zLzrTkVc/edit
[11] "P4: Programming Networks Forwarding Plane" Accessed on: May 23, 2023. [Online]. Available: https://www.volansys.com/blog/p4-programming-networks-forwarding-plane/
[12] J. S. da Silva, F. -R. Boyer, L. -O. Chiquette and J. M. P. Langlois, "Extern Objects in P4: an ROHC Header Compression Scheme Case Study," the 4th IEEE Conference on Network Softwarization and Workshops (NetSoft), Montreal, QC, Canada, pp. 517-522, 2018, doi: 10.1109/NETSOFT.2018.8460108.
[13] Y. Yuan et al., "Unlocking the Power of Inline Floating-Point Operations on Programmable Switches," the 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), Renton, WA, pp. 683-700, Apr. 2022.
[14] A. d. S. Ilha, Â. C. Lapolli, J. A. Marques and L. P. Gaspary, "Euclid: A Fully In-Network, P4-Based Approach for Real-Time DDoS Attack Detection and Mitigation," IEEE Transactions on Network and Service Management, vol. 18, no. 3, pp. 3121-3139, Sept. 2021, doi: 10.1109/TNSM.2020.3048265.
[15] F. Musumeci, A. C. Fidanci, F. Paolucci, F. Cugini, and M. Tornatore, "Machine-Learning-Enabled DDoS Attacks Detection in P4 Programmable Networks," Journal of Network and Systems Management, vol. 30, pp. 1-27, 2022.
[16] M. V. B. da Silva, J. A. Marques, L. P. Gaspary, and L. Z. Granville, "Identifying Elephant Flows Using Dynamic Thresholds in Programmable IXP Networks," Journal of Internet Services and Applications, vol. 11, pp. 1-12, 2020.
[17] L. X. Liao, H.-C. Chao, and M.-Y. Chen, "Intelligently Modeling, Detecting, and Scheduling Elephant Flows in Software Defined Energy Cloud: A Survey," Journal of Parallel and Distributed Computing, vol. 146, pp. 64-78, 2020.
[18] A. Sapio et al., "Scaling Distributed Machine Learning with In-Network Aggregation," the 18th USENIX Symposium on Networked Systems Design and Implementation (NSDI 21), pp. 785-808, Apr. 2021.
[19] F. Cugini, D. Scano, A. Giorgetti, A. Sgambelluri, L. De Marinis, P. Castoldi, and F. Paolucci, "Telemetry and AI-based Security P4 Applications for Optical Networks," Journal of Optical Communications and Networking, vol. 15, no. 1, pp. A1-A10, 2023
[20] D. Bhamare, A. Kassler, J. Vestin, M. A. Khoshkholghi, J. Taheri, T. Mahmoodi, P. Öhlén, and C. Curescu, "IntOpt: In-band Network Telemetry Optimization Framework to Monitor Network Slices Using P4," Computer Networks, vol. 216, pp. 109214, 2022.
[21] "Google Cloud using P4Runtime to build smart networks" Accessed on: May 23, 2023. [Online]. Available: https://cloud.google.com/blog/products/gcp/google-cloud-using-p4runtime-to-build-smart-networks
[22] "Cisco Locator ID Separation Protocol (LISP)" Accessed on May 23, 2023. [Online]. Available: https://networklessons.com/cisco/ccnp-encor-350-401/cisco-locator-id-separation-protocol-lisp
[23] K. Sun and Y. Kim, "LISP-based Hierarchical Service Mobility Management for the Tactical Edge Computing," 2020 International Conference on Information and Communication Technology Convergence (ICTC), Jeju, Korea, pp. 520-522, 2020, doi: 10.1109/ICTC49870.2020.9289539.
[24] K. Sun and Y. Kim, "Enhanced LISP Mapping System for Optimizing Service Path in Edge Computing Environment," IEEE Access, vol. 8, pp. 190559-190571, 2020, doi: 10.1109/ACCESS.2020.3031915.
[25] D. Farinacci, V. Fuller, D. Meyer, and D. Lewis, "The Locator/ID Separation Protocol (LISP)," RFC 6830, Jan, 2013.
[26] J. Sun et al., "Improving Bandwidth Utilization by Compressing Small-Payload Traffic for Vehicular Networks," International Journal of Distributed Sensor Networks, vol. 15, no. 4, pp. 1550147719843050, 2019.
[27] K. Sun, J. Lee and Y. Kim, "LISP-Based Control Plane for Service Connectivity in Multi-Cluster Cloud Systems," IEEE Access, vol. 10, pp. 24786-24796, 2022, doi: 10.1109/ACCESS.2022.3155113.
[28] "kubernetes" Accessed on June 20, 2023. [Online]. Available: https://kubernetes.io/
[29] "What are the differences between a digital signature, a MAC and a hash?" Accessed on May 23, 2023. [Online]. Available: https://crypto.stackexchange.com/questions/5646/what-are-the-differences-between-a-digital-signature-a-mac-and-a-hash
[30] B. Hinden and S. E. Deering, "Internet Protocol, Version 6 (IPv6) Specification," RFC 2460, Dec, 1998.
[31] H. Moghaddam and A. Mosenia, "Anonymizing Masses: Practical Light-weight Anonymity at the Network Level," arXiv preprint arXiv:1911.09642, 2019.
[32] Y. Govil, L. Wang, and J. Rexford, "MIMIQ: Masking IPs with Migration in QUIC," the 10th USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2020.
[33] G. Carlucci, L. De Cicco, and S. Mascolo, "HTTP over UDP: An Experimental Investigation of QUIC," the 30th Annual ACM Symposium on Applied Computing, Salamanca, Spain, pp. 609-614, April, 2015.
[34] J. Zhou, H. Li, Q. Wu, Z. Lai and J. Liu, "SR-TPP: Extending IPv6 Segment Routing to Enable Trusted and Private Network Paths," 2020 IEEE Symposium on Computers and Communications (ISCC), Rennes, France, pp. 1-6, 2020, doi: 10.1109/ISCC50000.2020.9219705.
[35] C. Filsfils, P. Camarillo, J. Leddy, D. Voyer, S. Matsushima, and Z. Li, "Segment Routing over IPv6 (SRv6) Network Programming," RFC 8986, Feb, 2021
[36] K. Kaur, M. Kaur, K. Kaur, and A. Madaan, "A Comparative Study of OSI and TCP/IP Models," International Journal of Engineering and Management Research, vol. 13, no. 2, pp. 127-135, 2023.
[37] "Protocol Numbers", Accessed on May 29, 2023. [Online]. Available: https://www.iana.org/assignments/protocol-numbers/protocol-numbers.xhtml
[38] L. Wang, H. Kim, P. Mittal, and J. Rexford, "Programmable In-network Obfuscation of DNS Traffic," NDSS: DNS Privacy Workshop, 2021.
[39] F. Mendel, V. Rijmen, D. Toz, and K. Varıcı, "Differential Analysis of the LED Block Cipher," Advances in Cryptology--ASIACRYPT 2012: 18th International Conference on the Theory and Application of Cryptology and Information Security, Beijing, China, pp. 190-207, Dec, 2012.
[40] S. Chen, R. Lampe, J. Lee, Y. Seurin, and J. Steinberger, "Minimizing the Two-Round Even-Mansour Cipher," Journal of Cryptology, vol. 31, pp. 1064-1119, 2018.
[41] I. Isewon, O. Adare, and J. Oyelade, "Implementation of a File Encryption Software ′Hyde′ using RIJNDAEL Algorithm (AES)," International Journal of Computer Science and Information Security (IJCSIS), vol. 20, no. 4, 2022.
[42] "BMv2", Accessed on June 2, 2023. [Online]. Available: https://github.com/p4lang/behavioral-model
[43] "p4-utils", Accessed on June 2, 2023. [Online]. Available: https://github.com/nsg-ethz/p4-utils
[44] "mininet", Accessed on June 2, 2023. [Online]. Available: http://mininet.org/
[45] "Scapy", Accessed on June 2, 2023. [Online]. Available: https://scapy.readthedocs.io/en/latest/
[46] "Ping", Accessed on June 12, 2023. [Online]. Available: https://www.man7.org/linux/man-pages/man8/ping.8.html
[47] "iperf3", Accessed on June 12, 2023. [Online]. Available: https://iperf.fr/
[48] "Intel Tofino 2", Accessed on June 8, 2023. [Online]. Available: https://www.intel.com/content/www/us/en/products/network-io/programmable-ethernet-switch/tofino-2-series.html
[49] G. C. Sankaran, K. M. Sivalingam and H. Gondaliya, "P4 and NetFPGA-Based Secure In-Network Computing Architecture for AI-Enabled Industrial Internet of Things," IEEE Internet of Things Journal, vol. 10, no. 4, pp. 2979-2994, Feb, 2023, doi: 10.1109/JIOT.2021.3125862.
[50] "SmartNICs with P4 support" Accessed on June 8, 2023. [Online]. Available: https://codilime.com/blog/smartnics-with-p4-support/ |