• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, X. (Chen, X..) [1] | Wu, C. (Wu, C..) [2] | Liu, X. (Liu, X..) [3] | Huang, Q. (Huang, Q..) [4] | Zhang, D. (Zhang, D..) [5] (Scholars:张栋) | Zhou, H. (Zhou, H..) [6] | Yang, Q. (Yang, Q..) [7] | Khan, M.K. (Khan, M.K..) [8]

Indexed by:

Scopus

Abstract:

With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-tomanage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security. IEEE

Keyword:

attack and defense Costs future research directions Middleboxes Network security programmable switches Runtime Security Servers Tutorials

Community:

  • [ 1 ] [Chen X.]College of Computer Science and Technology, Zhejiang University, Hangzhou, China
  • [ 2 ] [Wu C.]College of Computer Science and Technology, Zhejiang University, Hangzhou, China
  • [ 3 ] [Liu X.]College of Information Engineering (College of Artificial Intelligence), Yangzhou University, China
  • [ 4 ] [Huang Q.]School of Electronics Engineering and Computer Science, Peking University, Beijing, China
  • [ 5 ] [Zhang D.]College of Computer Science and Big Data, Fuzhou University, Fuzhou, China
  • [ 6 ] [Zhou H.]College of Control Science and Engineering, Zhejiang University, Hangzhou, China
  • [ 7 ] [Yang Q.]College of Electrical Engineering, Zhejiang University, Hangzhou, China
  • [ 8 ] [Khan M.K.]Center of Excellence in Information Assurance (CoEIA), King Saud University, Kingdom of Saudi Arabia

Reprint 's Address:

Email:

Show more details

Related Keywords:

Related Article:

Source :

IEEE Communications Surveys and Tutorials

ISSN: 1553-877X

Year: 2023

Issue: 3

Volume: 25

Page: 1-1

3 4 . 4

JCR@2023

3 4 . 4 0 0

JCR@2023

ESI HC Threshold:32

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 5

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Affiliated Colleges:

Online/Total:662/10060393
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1