• Complex
  • Title
  • Keyword
  • Abstract
  • Scholars
  • Journal
  • ISSN
  • Conference
成果搜索

author:

Chen, Xiang (Chen, Xiang.) [1] | Wu, Chunming (Wu, Chunming.) [2] | Liu, Xuan (Liu, Xuan.) [3] | Huang, Qun (Huang, Qun.) [4] | Zhang, Dong (Zhang, Dong.) [5] (Scholars:张栋) | Zhou, Haifeng (Zhou, Haifeng.) [6] | Yang, Qiang (Yang, Qiang.) [7] | Khan, Muhammad Khurram (Khan, Muhammad Khurram.) [8]

Indexed by:

EI Scopus SCIE

Abstract:

With the growth of network applications such as 5G and artificial intelligence, network security techniques, i.e., the techniques that detect various attacks (e.g., well-known denial-of-service (DDoS) attacks) and prevent production networks (e.g., data center networks) from being attacked, become increasingly essential for network management and have gained great popularity in the networking community. Generally, these techniques are built on proprietary hardware appliances, i.e., middleboxes, or the paradigm that combines both software-defined networking (SDN) and network function virtualization (NFV) to implement security functions. However, the techniques built on middleboxes are proven to be hard-to-manage, costly, and inflexible, thereby making them an out-of-date choice in network security. For the techniques built on SDN and NFV, they virtualize and softwarize security functions on commodity servers, leading to non-trivial performance degradation. Fortunately, the recent emergence of programmable switches brings new opportunities of empowering network security techniques with the characteristics of easy-to-manage, low cost, high flexibility, and Tbps-level performance. In this survey, we focus on this promising trend in network security. More precisely, this survey first presents the preliminaries of programmable switches, which are the primary driver of next-generation network security techniques. Next, we comprehensively review existing techniques built on programmable switches, classify these techniques, and discuss their background, motivation, design, implementation, and limitations case-by-case. Finally, we summarize open issues and future research directions in this promising research topic of network security.

Keyword:

attack and defense future research directions Network security programmable switches

Community:

  • [ 1 ] [Chen, Xiang]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310007, Peoples R China
  • [ 2 ] [Wu, Chunming]Zhejiang Univ, Coll Comp Sci & Technol, Hangzhou 310007, Peoples R China
  • [ 3 ] [Liu, Xuan]Yangzhou Univ, Coll Informat Engn, Coll Artificial Intelligence, Yangzhou 225127, Peoples R China
  • [ 4 ] [Liu, Xuan]Southeast Univ, Sch Comp Sci & Engn, Nanjing 211189, Peoples R China
  • [ 5 ] [Huang, Qun]Peking Univ, Sch Elect Engn & Comp Sci, Beijing 100871, Peoples R China
  • [ 6 ] [Zhang, Dong]Fuzhou Univ, Coll Comp Sci & Big Data, Fuzhou 350116, Peoples R China
  • [ 7 ] [Zhou, Haifeng]Zhejiang Univ, Coll Control Sci & Engn, Hangzhou 310007, Peoples R China
  • [ 8 ] [Yang, Qiang]Zhejiang Univ, Coll Elect Engn, Hangzhou 310007, Peoples R China
  • [ 9 ] [Khan, Muhammad Khurram]King Saud Univ, Ctr Excellence Informat Assurance, Riyadh 11362, Saudi Arabia

Reprint 's Address:

Show more details

Version:

Related Keywords:

Source :

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS

ISSN: 1553-877X

Year: 2023

Issue: 3

Volume: 25

Page: 1653-1704

3 4 . 4

JCR@2023

3 4 . 4 0 0

JCR@2023

JCR Journal Grade:1

CAS Journal Grade:1

Cited Count:

WoS CC Cited Count: 0

SCOPUS Cited Count: 2

ESI Highly Cited Papers on the List: 0 Unfold All

WanFang Cited Count:

Chinese Cited Count:

30 Days PV: 0

Online/Total:75/10045083
Address:FZU Library(No.2 Xuyuan Road, Fuzhou, Fujian, PRC Post Code:350116) Contact Us:0591-22865326
Copyright:FZU Library Technical Support:Beijing Aegean Software Co., Ltd. 闽ICP备05005463号-1