|
[1] Z. A. Qazi, J. Lee, T. Jin, G. Bellala, M. Arndt, and G. Noubir, “Applicationawareness in SDN,” in ACM SIGCOMM, 2013. [2] X. Yun, Y. Wang, Y. Zhang, and Y. Zhou, “A semanticsaware approach to the automated network protocol identification,” IEEE/ACM Transactions on Networking, vol. 24, no. 1, p. 583–595, Feb. 2016. [3] J. Zhang, X. Chen, Y. Xiang, W. Zhou, and J. Wu, “Robust network traffic classification,” IEEE/ACM Transactions on Networking, vol. 23, no. 4, pp. 1257–1270, 2015. [4] P. Poupart, Z. Chen, P. Jaini, F. Fung, H. Susanto, Yanhui Geng, Li Chen, K. Chen, and Hao Jin, “Online flow size prediction for improved network routing,” in IEEE ICNP, 2016. [5] Y. Huang, W. Shih, and J. Huang, “A classificationbased elephant flow detection method using application round on SDN environments,” in AsiaPacific Network Operations and Management Symposium (APNOMS), 2017. [6] Peng Xiao, Wenyu Qu, Heng Qi, Yujie Xu, and Zhiyang Li, “An efficient elephant flow detection with costsensitive in sdn,” in International Conference on Industrial Networks and Intelligent Systems, 2015. [7] S. Chao, K. C. Lin, and M. Chen, “Flow classification for softwaredefined data centers using stream mining,” IEEE Transactions on Services Computing, vol. 12, no. 1, pp. 105– 116, 2019. [8] J. Ashraf and S. Latif, “Handling intrusion and ddos attacks in software defined networks using machine learning techniques,” in National Software Engineering Conference, 2014.
[9] J. Bakker, B. Ng, W. K. G. Seah, and A. Pekar, “Traffic classification with machine learn- ing in a live network,” in IFIP/IEEE Symposium on Integrated Network and Service Man- agement (IM), 2019.
46
[10] A. Shukla, K. N. Hudemann, A. Hecker, and S. Schmid, “Runtime verification of P4 switches with reinforcement learning,” in ACM Workshop on Network Meets AI & ML, 2019.
[11] L. Freire, M. Neves, A. SchaefferFilho, and M. Barcellos, “POSTER: Finding vulnerabil- ities in P4 programs with assertionbased verification,” in ACM CCS, 2017.
[12] L. Freire, M. Neves, L. Leal, K. Levchenko, A. SchaefferFilho, and M. Barcellos, “Un- covering bugs in P4 programs with assertionbased verification,” in ACM SOSR, 2018.
[13] E. Cidon, S. Choi, S. Katti, and N. McKeown, “AppSwitch: Applicationlayer load bal- ancing within a software switch,” in ACM AsiaPacific Workshop on Networking (APNet),
2017. [14] N. K. Sharma, M. Liu, K. Atreya, and A. Krishnamurthy, “Approximating fair queueing on reconfigurable switches,” in USENIX NSDI, 2018. [15] Y. Li, R. Miao, C. Kim, and M. Yu, “FlowRadar: A better NetFlow for data centers,” in USENIX NSDI, 2016. [16] P. Vörös and A. Kiss, “Security middleware programming using P4,” in Human Aspects of Information Security, Privacy, and Trust, 2016. [17] R. Datta, S. Choi, A. Chowdhary, and Y. Park, “P4Guard: Designing P4 based firewall,” in IEEE MILCOM, 2018. [18] B. Lewis, M. Broadbent, and N. Race, “P4ID: P4 enhanced intrusion detection,” in IEEE
Conference on Network Function Virtualization and Software Defined Networks (NFV- SDN), 2019.
[19] R. Cohen, L. LewinEytan, J. S. Naor, and D. Raz, “Near optimal placement of virtual network functions,” in IEEE INFOCOM, 2015. [20] Y. Sang, B. Ji, G. R. Gupta, X. Du, and L. Ye, “Provably efficient algorithms for joint placement and allocation of virtual network functions,” in IEEE INFOCOM, 2017.
47
[21] R. Cziva, C. Anagnostopoulos, and D. P. Pezaros, “Dynamic, latencyoptimal vNF place- ment at the network edge,” in IEEE INFOCOM, 2018.
[22] D. Li, P. Hong, K. Xue, and j. Pei, “Virtual network function placement considering re- source optimization and SFC requests in cloud datacenter,” IEEE Transactions on Parallel
and Distributed Systems, vol. 29, no. 7, pp. 1664–1677, 2018. [23] B. Addis, D. Belabed, M. Bouet, and S. Secci, “Virtual network functions placement and routing optimization,” in IEEE CloudNet, 2015. [24] H. Feng, J. Llorca, A. M. Tulino, D. Raz, and A. F. Molisch, “Approximation algorithms for the NFV service distribution problem,” in IEEE INFOCOM, 2017. [25] Wei Wang, Ming Zhu, Xuewen Zeng, Xiaozhou Ye, and Yiqiang Sheng, “Malware traffic
classification using convolutional neural network for representation learning,” in Interna- tional Conference on Information Networking (ICOIN), 2017.
[26] “DeepTraffic dataset.” [Online]. Available: https://github.com/echowei/DeepTraffic/tree/ master/1.malware_traffic_classification [27] G. Hinton, O. Vinyals, and J. Dean, “Distilling the knowledge in a neural network,” in NIPS Deep Learning and Representation Learning Workshop, 2015. [Online]. Available: http://arxiv.org/abs/1503.02531
[28] S. H. Khan, M. Hayat, M. Bennamoun, F. Sohel, and R. Togneri, “Costsensitive learn- ing of deep feature representations from imbalanced data,” IEEE Transactions on Neural
Networks and Learning Systems, vol. 29, pp. 3573–3587, 2018. [29] L. Perron and V. Furnon, “Ortools,” Google. [Online]. Available: https://developers. google.com/optimization/
[30] M. Mitzenmacher, “The power of two choices in randomized load balancing,” IEEE Trans- actions on Parallel and Distributed Systems, vol. 12, no. 10, pp. 1094–1104, 2001.
|