{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T00:11:53Z","timestamp":1758845513988,"version":"3.44.0"},"reference-count":139,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T00:00:00Z","timestamp":1756166400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"funder":[{"DOI":"10.13039\/501100008441","name":"CYTED Ciencia y Tecnolog\u00eda para el Desarrollo","doi-asserted-by":"publisher","award":["519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580"],"award-info":[{"award-number":["519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580","519RT0580"]}],"id":[{"id":"10.13039\/501100008441","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2025,10]]},"DOI":"10.1007\/s10922-025-09970-9","type":"journal-article","created":{"date-parts":[[2025,8,26]],"date-time":"2025-08-26T04:46:59Z","timestamp":1756183619000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Cybersecurity Via Programmable Networks: Are We There Yet?"],"prefix":"10.1007","volume":"33","author":[{"given":"Sergio Armando","family":"Guti\u00e9rrez","sequence":"first","affiliation":[]},{"given":"Juan Felipe","family":"Botero","sequence":"additional","affiliation":[]},{"given":"Luis","family":"Fletscher","sequence":"additional","affiliation":[]},{"given":"Luciano Paschoal","family":"Gaspary","sequence":"additional","affiliation":[]},{"given":"Natalia","family":"Gaviria","sequence":"additional","affiliation":[]},{"given":"Eduardo","family":"Jacob","sequence":"additional","affiliation":[]},{"given":"Adrian","family":"Lara","sequence":"additional","affiliation":[]},{"given":"Jes\u00fas Arturo","family":"P\u00e9rez-D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Marco Antonio","family":"To","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,8,26]]},"reference":[{"key":"9970_CR1","unstructured":"MIT: Active Networks. http:\/\/www.sds.lcs.mit.edu\/darpa-activenet\/ (1997)"},{"key":"9970_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1109\/TSMCC.2003.818493","volume":"34","author":"J Smith","year":"2004","unstructured":"Smith, J., Nettles, S.: Active networking: One view of the past, present, and future. IEEE Trans. Syst. Man Cybern. Part C 34, 4\u201318 (2004). https:\/\/doi.org\/10.1109\/TSMCC.2003.818493","journal-title":"IEEE Trans. Syst. Man Cybern. Part C"},{"issue":"1","key":"9970_CR3","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1109\/COMST.1999.5340509","volume":"2","author":"K Psounis","year":"1999","unstructured":"Psounis, K.: Active networks: Applications, security, safety, and architectures. IEEE Commun. Surveys 2(1), 2\u201316 (1999). https:\/\/doi.org\/10.1109\/COMST.1999.5340509","journal-title":"IEEE Commun. Surveys"},{"key":"9970_CR4","doi-asserted-by":"crossref","unstructured":"Yang, L., Dantu, R., Anderson, T., Gopal, R.: Forwarding and control element separation (ForCES) framework. https:\/\/www.rfc-editor.org\/rfc\/rfc3746 (2004)","DOI":"10.17487\/rfc3746"},{"key":"9970_CR5","unstructured":"Vasseur, J. P., Farrel, A., Ash, G.: A path computation element (PCE)-based architecture. https:\/\/datatracker.ietf.org\/doc\/rfc4655\/ (2006)"},{"issue":"4","key":"9970_CR6","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1282427.1282382","volume":"37","author":"M Casado","year":"2007","unstructured":"Casado, M., Freedman, M.J., Pettit, J., Luo, J., McKeown, N., Shenker, S.: Ethane: Taking control of the enterprise. ACM SIGCOMM Comput. Commun. Rev. 37(4), 1\u201312 (2007)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"5","key":"9970_CR7","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/3371934.3371963","volume":"49","author":"M Casado","year":"2019","unstructured":"Casado, M., McKeown, N., Shenker, S.: From ethane to sdn and beyond. ACM SIGCOMM Comput. Commun. Rev. 49(5), 92\u201395 (2019)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"9970_CR8","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1145\/1355734.1355746","volume":"38","author":"N McKeown","year":"2008","unstructured":"McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., Turner, J.: Openflow: enabling innovation in campus networks. ACM SIGCOMM Comput. Commun. Rev. 38(2), 69\u201374 (2008)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"2","key":"9970_CR9","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2602204.2602219","volume":"44","author":"N Feamster","year":"2014","unstructured":"Feamster, N., Rexford, J., Zegura, E.: The road to sdn: an intellectual history of programmable networks. ACM SIGCOMM Comput. Commun. Rev. 44(2), 87\u201398 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"issue":"3","key":"9970_CR10","doi-asserted-by":"publisher","first-page":"1956","DOI":"10.1109\/COMST.2021.3060582","volume":"23","author":"N Anerousis","year":"2021","unstructured":"Anerousis, N., Chemouil, P., Lazar, A.A., Mihai, N., Weinstein, S.B.: The origin and evolution of open programmable networks and sdn. IEEE Commun. Surveys Tutorials 23(3), 1956\u20131971 (2021)","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"9970_CR11","unstructured":"ETSI. Network functions virtualisation: An introduction, benefits, enablers, challenges & call for action. In: White Paper, SDN and OpenFlow World Congress, p. 73 (2012)"},{"issue":"4","key":"9970_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3447868","volume":"54","author":"O Michel","year":"2021","unstructured":"Michel, O., Bifulco, R., Retvari, G., Schmid, S.: The programmable data plane: abstractions, architectures, algorithms, and applications. ACM Comput. Surveys (CSUR) 54(4), 1\u201336 (2021)","journal-title":"ACM Comput. Surveys (CSUR)"},{"issue":"1","key":"9970_CR13","doi-asserted-by":"publisher","first-page":"493","DOI":"10.1109\/SURV.2013.081313.00105","volume":"16","author":"A Lara","year":"2013","unstructured":"Lara, A., Kolasani, A., Ramamurthy, B.: Network innovation using openflow: A survey. IEEE Commun. Surveys Tutorials 16(1), 493\u2013512 (2013)","journal-title":"IEEE Commun. Surveys Tutorials"},{"issue":"9","key":"9970_CR14","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3556973","volume":"55","author":"A Liatifis","year":"2023","unstructured":"Liatifis, A., Sarigiannidis, P., Argyriou, V., Lagkas, T.: Advancing sdn from openflow to p4: A survey. ACM Comput. Surv. 55(9), 1\u201337 (2023)","journal-title":"ACM Comput. Surv."},{"issue":"4","key":"9970_CR15","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1145\/2534169.2486011","volume":"43","author":"P Bosshart","year":"2013","unstructured":"Bosshart, P., Gibb, G., Kim, H.-S., Varghese, G., McKeown, N., Izzard, M., Mujica, F., Horowitz, M.: Forwarding metamorphosis: Fast programmable match-action processing in hardware for sdn. ACM SIGCOMM Comput. Commun. Rev. 43(4), 99\u2013110 (2013)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"9970_CR16","doi-asserted-by":"crossref","unstructured":"Chole, S., Fingerhut, A., Ma, S., Sivaraman, A., Vargaftik, S., Berger, A., Mendelson, G., Alizadeh, M., Chuang, S.-T., Keslassy, I., et al.: drmt: Disaggregated programmable switching. In: Proceedings of the Conference of the ACM Special Interest Group on Data Communication, pp. 1\u201314 (2017)","DOI":"10.1145\/3098822.3098823"},{"key":"9970_CR17","doi-asserted-by":"crossref","unstructured":"Sivaraman, A., Cheung, A., Budiu, M., Kim, C., Alizadeh, M., Balakrishnan, H., Varghese, G., McKeown, N., Licking, S.: Packet transactions: High-level programming for line-rate switches. In: Proceedings of the 2016 ACM SIGCOMM Conference, pp. 15\u201328 (2016)","DOI":"10.1145\/2934872.2934900"},{"key":"9970_CR18","unstructured":"Jose, L., Yan, L., Varghese, G., McKeown, N.: Compiling packet programs to reconfigurable switches. In: 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15), pp. 103\u2013115 (2015)"},{"key":"9970_CR19","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103561","volume":"212","author":"F Hauser","year":"2023","unstructured":"Hauser, F., H\u00e4berle, M., Merling, D., Lindner, S., Gurevich, V., Zeiger, F., Frank, R., Menth, M.: A survey on data plane programming with p4: Fundamentals, advances, and applied research. J. Netw. Comput. Appl. 212, 103561 (2023)","journal-title":"J. Netw. Comput. Appl."},{"key":"9970_CR20","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1016\/j.comcom.2021.01.027","volume":"170","author":"S Kaur","year":"2021","unstructured":"Kaur, S., Kumar, K., Aggarwal, N.: A review on p4-programmable data planes: Architecture, research efforts, and future directions. Comput. Commun. 170, 109\u2013129 (2021)","journal-title":"Comput. Commun."},{"issue":"3","key":"9970_CR21","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1145\/2656877.2656890","volume":"44","author":"P Bosshart","year":"2014","unstructured":"Bosshart, P., Daly, D., Gibb, G., Izzard, M., McKeown, N., Rexford, J., Schlesinger, C., Talayco, D., Vahdat, A., Varghese, G., et al.: P4: Programming protocol-independent packet processors. ACM SIGCOMM Comput. Commun. Rev. 44(3), 87\u201395 (2014)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"9970_CR22","unstructured":"P4 Language Consortium: P416 Language Specification. https:\/\/p4.org\/p4-spec\/docs\/P4-16-v1.0.0-spec.html (2022)"},{"key":"9970_CR23","unstructured":"Intel: Data Plane Development Kit (DPDK). https:\/\/www.dpdk.org\/ (2023)"},{"key":"9970_CR24","unstructured":"NETRONOME: NETRONOME Agilio SmartNICs. https:\/\/www.netronome.com\/products\/smartnic\/overview\/ (2023)"},{"key":"9970_CR25","unstructured":"P4 Language Consortium: Behavioral Model version 2 (BMv2). https:\/\/github.com\/p4lang\/behavioral-model (2015)"},{"issue":"5","key":"9970_CR26","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MM.2014.61","volume":"34","author":"N Zilberman","year":"2014","unstructured":"Zilberman, N., Audzevich, Y., Covington, G.A., Moore, A.W.: Netfpga sume: Toward 100 gbps as research commodity. IEEE Micro 34(5), 32\u201341 (2014)","journal-title":"IEEE Micro"},{"key":"9970_CR27","unstructured":"Intel: Barefoot Tofino 2. https:\/\/www.barefootnetworks.com\/products\/brief-tofino-2\/ (2023)"},{"key":"9970_CR28","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108800","volume":"207","author":"A AlSabeh","year":"2022","unstructured":"AlSabeh, A., Khoury, J., Kfoury, E., Crichigno, J., Bou-Harb, E.: A survey on security applications of p4 programmable switches and a stride-based vulnerability assessment. Comput. Netw. 207, 108800 (2022)","journal-title":"Comput. Netw."},{"key":"9970_CR29","doi-asserted-by":"crossref","unstructured":"Sanghi, A., Kadiyala, K.P., Tammana, P., Joshi, S.: Anomaly detection in data plane systems using packet execution paths. In: Proceedings of the ACM SIGCOMM 2021 Workshop on Secure Programmable Network Infrastructure, pp. 9\u201315 (2021)","DOI":"10.1145\/3472873.3472880"},{"key":"9970_CR30","unstructured":"Lapolli, \u00c2.C., Marques, J.A., Gaspary, L.P.: Offloading real-time ddos attack detection to programmable data planes. In: 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 19\u201327 (2019). IEEE"},{"key":"9970_CR31","doi-asserted-by":"publisher","first-page":"6376","DOI":"10.1109\/ACCESS.2023.3347332","volume":"12","author":"C Garz\u00f3n","year":"2024","unstructured":"Garz\u00f3n, C., R\u00edos-Guiral, S., Leal, E., Guti\u00e9rrez, S.A., Botero, J.F.: P4 cybersecurity solutions: Taxonomy and open challenges. IEEE Access 12, 6376\u20136399 (2024). https:\/\/doi.org\/10.1109\/ACCESS.2023.3347332","journal-title":"IEEE Access"},{"key":"9970_CR32","unstructured":"Cybersecurity & Network Security Solutions & Services: Fundamentals. https:\/\/www.rapid7.com\/fundamentals\/ (2023)"},{"key":"9970_CR33","unstructured":"National Institute of Standards and Technology: Glossary. https:\/\/csrc.nist.gov\/glossary\/ (2023)"},{"key":"9970_CR34","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1016\/j.comcom.2023.12.027","volume":"216","author":"VA Shirsath","year":"2024","unstructured":"Shirsath, V.A., Chandane, M.M., Lal, C., Conti, M.: Sparq: Syn protection using acyclic redundancy check and quartile range on p4 switches. Comput. Commun. 216, 283\u2013294 (2024)","journal-title":"Comput. Commun."},{"issue":"1","key":"9970_CR35","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1364\/JOCN.11.000A84","volume":"11","author":"F Paolucci","year":"2019","unstructured":"Paolucci, F., Civerchia, F., Sgambelluri, A., Giorgetti, A., Cugini, F., Castoldi, P.: P4 edge node enabling stateful traffic engineering and cyber security. J. Opt. Commun. Netw. 11(1), 84\u201395 (2019)","journal-title":"J. Opt. Commun. Netw."},{"key":"9970_CR36","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2024.111011","volume":"257","author":"A Mazloum","year":"2025","unstructured":"Mazloum, A., AlSabeh, A., Kfoury, E., Crichigno, J.: Security applications in p4: Implementation and lessons learned. Comput. Netw. 257, 111011 (2025)","journal-title":"Comput. Netw."},{"key":"9970_CR37","unstructured":"Yoo, S., Chen, X., Rexford, J.: $$\\{$$SmartCookie$$\\}$$: Blocking $$\\{$$Large-Scale$$\\}$$$$\\{$$SYN$$\\}$$ floods with a $$\\{$$Split-Proxy$$\\}$$ defense on programmable data planes. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 217\u2013234 (2024)"},{"issue":"6","key":"9970_CR38","doi-asserted-by":"publisher","first-page":"4019","DOI":"10.1109\/TDSC.2021.3116345","volume":"19","author":"D Ding","year":"2022","unstructured":"Ding, D., Savi, M., Siracusa, D.: Tracking normalized network traffic entropy to detect ddos attacks in p4. IEEE Trans. Dependable Secure Comput. 19(6), 4019\u20134031 (2022). https:\/\/doi.org\/10.1109\/TDSC.2021.3116345","journal-title":"IEEE Trans. Dependable Secure Comput."},{"key":"9970_CR39","unstructured":"Gonz\u00e1lez, L.A.Q., Castanheira, L., Marques, J.A., Schaeffer-Filho, A., Gaspary, L.P.: Bungee: An adaptive pushback mechanism for ddos detection and mitigation in p4 data planes. In: 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 393\u2013401 (2021). IEEE"},{"key":"9970_CR40","doi-asserted-by":"publisher","first-page":"54373","DOI":"10.1109\/ACCESS.2023.3275756","volume":"11","author":"B Goswami","year":"2023","unstructured":"Goswami, B., Kulkarni, M., Paulose, J.: A survey on p4 challenges in software defined networks: P4 programming. IEEE Access 11, 54373\u201354387 (2023)","journal-title":"IEEE Access"},{"key":"9970_CR41","doi-asserted-by":"crossref","unstructured":"Wang, W., Zhu, S., Wu, Z., Lu, L., Li, Z., Yang, H., Zhang, Y.: Radd: A real-time and accurate method for ddos detection based on in-network computing. In: ICC 2024-IEEE International Conference on Communications, pp. 3316\u20133321 (2024). IEEE","DOI":"10.1109\/ICC51166.2024.10622656"},{"issue":"11","key":"9970_CR42","doi-asserted-by":"publisher","first-page":"8021","DOI":"10.1002\/cpe.8021","volume":"36","author":"MJ Santos-Neto","year":"2024","unstructured":"Santos-Neto, M.J., Bordim, J.L., Alchieri, E.A., Ishikawa, E.: Ddos attack detection in sdn: Enhancing entropy-based detection with machine learning. Concurr Comput. Pract Exp. 36(11), 8021 (2024)","journal-title":"Concurr Comput. Pract Exp."},{"issue":"3","key":"9970_CR43","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1109\/TNSM.2020.3048265","volume":"18","author":"ADS Ilha","year":"2021","unstructured":"Ilha, A.D.S., Lapolli, A.C., Marques, J.A., Gaspary, L.P.: Euclid: A fully in-network, p4-based approach for real-time ddos attack detection and mitigation. IEEE Trans. Netw. Serv. Manage. 18(3), 3121\u20133139 (2021). https:\/\/doi.org\/10.1109\/TNSM.2020.3048265","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"5","key":"9970_CR44","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1109\/MNET.124.2200113","volume":"37","author":"W-X Liu","year":"2022","unstructured":"Liu, W.-X., Liang, C., Cui, Y., Cai, J., Luo, J.-M.: Programmable data plane intelligence: Advances, opportunities, and challenges. IEEE Netw. 37(5), 122\u2013128 (2022). https:\/\/doi.org\/10.1109\/MNET.124.2200113","journal-title":"IEEE Netw."},{"issue":"1","key":"9970_CR45","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3605153","volume":"56","author":"R Parizotto","year":"2023","unstructured":"Parizotto, R., Coelho, B.L., Nunes, D.C., Haque, I., Schaeffer-Filho, A.: Offloading machine learning to programmable data planes: A systematic survey. ACM Comput. Surv. 56(1), 1\u201334 (2023)","journal-title":"ACM Comput. Surv."},{"key":"9970_CR46","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2023.110162","volume":"239","author":"R Doriguzzi-Corin","year":"2024","unstructured":"Doriguzzi-Corin, R., Knob, L.A.D., Mendozzi, L., Siracusa, D., Savi, M.: Introducing packet-level analysis in programmable data planes to advance network intrusion detection. Comput. Netw. 239, 110162 (2024)","journal-title":"Comput. Netw."},{"key":"9970_CR47","unstructured":"Mac\u00edas, S.G., Gaspary, L.P., Botero, J.F.: Oracle: An architecture for collaboration of data and control planes to detect ddos attacks. In: 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 962\u2013967 (2021)"},{"key":"9970_CR48","doi-asserted-by":"publisher","first-page":"2555","DOI":"10.1109\/TNET.2024.3364757","volume":"32","author":"C Zheng","year":"2024","unstructured":"Zheng, C., Xiong, Z., Bui, T.T., Kaupmees, S., Bensoussane, R., Bernabeu, A., Vargaftik, S., Ben-Itzhak, Y., Zilberman, N.: Iisy: Hybrid in-network classification using programmable switches. IEEE\/ACM Trans. Network. 32, 2555\u20132570 (2024)","journal-title":"IEEE\/ACM Trans. Network."},{"issue":"1","key":"9970_CR49","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3579321","volume":"7","author":"M Chiesa","year":"2023","unstructured":"Chiesa, M., Verdi, F.L.: Network monitoring on multi-pipe switches. Proc. ACM Meas. Anal. Comput. Syst. 7(1), 1\u201331 (2023)","journal-title":"Proc. ACM Meas. Anal. Comput. Syst."},{"key":"9970_CR50","doi-asserted-by":"crossref","unstructured":"Barradas, D., Santos, N., Rodrigues, L., Signorello, S., Ramos, F.M., Madeira, A.: Flowlens: Enabling efficient flow classification for ml-based network security applications. In: NDSS (2021)","DOI":"10.14722\/ndss.2021.24067"},{"key":"9970_CR51","doi-asserted-by":"crossref","unstructured":"Zhou, H., Gu, G.: Cerberus: Enabling efficient and effective in-network monitoring on programmable switches. In: 2024 IEEE Symposium on Security and Privacy (SP), pp. 4424\u20134439 (2024). IEEE","DOI":"10.1109\/SP54263.2024.00016"},{"key":"9970_CR52","unstructured":"Mirnajafizadeh, S.M.M., Sethuram, A.R., Mohaisen, D., Nyang, D., Jang, R.: Enhancing network attack detection with distributed and $$\\{$$In-Network$$\\}$$ data collection system. In: 33rd USENIX Security Symposium (USENIX Security 24), pp. 5161\u20135178 (2024)"},{"key":"9970_CR53","unstructured":"Liu, Z., Namkung, H., Nikolaidis, G., Lee, J., Kim, C., Jin, X., Braverman, V., Yu, M., Sekar, V.: Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric ddos attacks with programmable switches. In: USENIX Security Symposium, pp. 3829\u20133846 (2021)"},{"key":"9970_CR54","doi-asserted-by":"crossref","unstructured":"Li, R., Li, Q., Zhang, Y., Zhao, D., Xiao, X., Jiang, Y.: Genos: general in-network unsupervised intrusion detection by rule extraction. In: IEEE INFOCOM 2024-IEEE Conference on Computer Communications, pp. 561\u2013570 (2024). IEEE","DOI":"10.1109\/INFOCOM52122.2024.10621157"},{"issue":"1","key":"9970_CR55","doi-asserted-by":"publisher","first-page":"14976","DOI":"10.1038\/s41598-024-65721-x","volume":"14","author":"M Hussain","year":"2024","unstructured":"Hussain, M., Amin, R., Gantassi, R., Alshehri, A.H., Frnda, J., Raza, S.M.: Efficient handling of acl policy change in sdn using reactive and proactive flow rule installation. Sci. Rep. 14(1), 14976 (2024)","journal-title":"Sci. Rep."},{"key":"9970_CR56","doi-asserted-by":"crossref","unstructured":"Jung, C., Kim, S., Jang, R., Mohaisen, D., Nyang, D.: A scalable and dynamic acl system for in-network defense. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security, pp. 1679\u20131693 (2022)","DOI":"10.1145\/3548606.3560606"},{"key":"9970_CR57","doi-asserted-by":"publisher","first-page":"166675","DOI":"10.1109\/ACCESS.2024.3486034","volume":"12","author":"A Hirsi","year":"2024","unstructured":"Hirsi, A., Audah, L., Salh, A., Alhartomi, M.A., Ahmed, S.: Detecting ddos threats using supervised machine learning for traffic classification in software defined networking. IEEE Access 12, 166675\u2013166702 (2024)","journal-title":"IEEE Access"},{"key":"9970_CR58","doi-asserted-by":"publisher","first-page":"155859","DOI":"10.1109\/ACCESS.2020.3019330","volume":"8","author":"JA P\u00e9rez-D\u00edaz","year":"2020","unstructured":"P\u00e9rez-D\u00edaz, J.A., Valdovinos, I.A., Choo, K.-K.R., Zhu, D.: A flexible SDN-based architecture for identifying and mitigating low-rate DDoS attacks using machine learning. IEEE Access 8, 155859\u2013155872 (2020)","journal-title":"IEEE Access"},{"key":"9970_CR59","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2024.3484491","author":"H Kheddar","year":"2024","unstructured":"Kheddar, H., Dawoud, D.W., Awad, A.I., Himeur, Y., Khan, M.K.: Reinforcement-learning-based intrusion detection in communication networks: A review. IEEE Commun. Surveys Tutorials (2024). https:\/\/doi.org\/10.1109\/COMST.2024.3484491","journal-title":"IEEE Commun. Surveys Tutorials"},{"key":"9970_CR60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103444","volume":"205","author":"NM Yungaicela-Naula","year":"2022","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., P\u00e9rez-D\u00edaz, J.A., Carrera, D.F.: A flexible SDN-based framework for slow-rate DDoS attack mitigation by using deep reinforcement learning. J. Netw. Comput. Appl. 205, 103444 (2022). https:\/\/doi.org\/10.1016\/j.jnca.2022.103444","journal-title":"J. Netw. Comput. Appl."},{"key":"9970_CR61","doi-asserted-by":"publisher","first-page":"5781","DOI":"10.1109\/TNSM.2024.3439472","volume":"21","author":"B-H Oh","year":"2024","unstructured":"Oh, B.-H.: P4-based proactive monitoring scheme in software-defined networks. IEEE Trans. Netw. Service Manag. 21, 5781\u20135794 (2024)","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"9970_CR62","doi-asserted-by":"publisher","first-page":"897","DOI":"10.1109\/TNET.2024.3510638","volume":"33","author":"Y Feng","year":"2024","unstructured":"Feng, Y., Zhou, H., Liu, S., Chen, Z., Song, H., Liu, B.: Enhancing stateful processing in programmable data planes: Model and improved architecture. IEEE\/ACM Trans. Netw. 33, 897\u2013912 (2024)","journal-title":"IEEE\/ACM Trans. Netw."},{"issue":"1","key":"9970_CR63","first-page":"1257046","volume":"2021","author":"Y Gao","year":"2021","unstructured":"Gao, Y., Wang, Z.: A review of p4 programmable data planes for network security. Mob. Inf. Syst. 2021(1), 1257046 (2021)","journal-title":"Mob. Inf. Syst."},{"key":"9970_CR64","doi-asserted-by":"publisher","first-page":"42423","DOI":"10.1109\/ACCESS.2024.3373769","volume":"12","author":"J Saleem","year":"2024","unstructured":"Saleem, J., Islam, R., Islam, M.Z.: Darknet traffic analysis: A systematic literature review. IEEE Access 12, 42423\u201342452 (2024)","journal-title":"IEEE Access"},{"key":"9970_CR65","doi-asserted-by":"publisher","unstructured":"Calvo, P., Guevara-Coto, J., Lara, A.: Classifying and understanding tor traffic using tree-based models. In: 2020 IEEE Latin-American Conference on Communications (LATINCOM), pp. 1\u20136 (2020). https:\/\/doi.org\/10.1109\/LATINCOM50620.2020.9282317","DOI":"10.1109\/LATINCOM50620.2020.9282317"},{"key":"9970_CR66","doi-asserted-by":"publisher","unstructured":"Marques, J.A., Levchenko, K., Gaspary, L.P.: Responding to network failures at data-plane speeds with network programmability. In: NOMS 2023-2023 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u201310 (2023). https:\/\/doi.org\/10.1109\/NOMS56928.2023.10154329","DOI":"10.1109\/NOMS56928.2023.10154329"},{"key":"9970_CR67","doi-asserted-by":"publisher","first-page":"107297","DOI":"10.1109\/ACCESS.2024.3437203","volume":"12","author":"EF Kfoury","year":"2024","unstructured":"Kfoury, E.F., Choueiri, S., Mazloum, A., AlSabeh, A., Gomez, J., Crichigno, J.: A comprehensive survey on smartnics: Architectures, development models, applications, and research directions. IEEE Access 12, 107297\u2013107336 (2024)","journal-title":"IEEE Access"},{"issue":"1","key":"9970_CR68","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/s10922-023-09777-6","volume":"32","author":"SS Reddy","year":"2024","unstructured":"Reddy, S.S., Nishoak, K., Shreya, J., Reddy, Y.V., Venkanna, U.: A p4-based adversarial attack mitigation on machine learning models in data plane devices. J. Netw. Syst. Manage. 32(1), 5 (2024)","journal-title":"J. Netw. Syst. Manage."},{"key":"9970_CR69","doi-asserted-by":"crossref","unstructured":"Xiong, Z., Zilberman, N.: Do switches dream of machine learning? toward in-network classification. In: Proceedings of the 18th ACM Workshop on Hot Topics in Networks, pp. 25\u201333 (2019)","DOI":"10.1145\/3365609.3365864"},{"key":"9970_CR70","doi-asserted-by":"publisher","first-page":"6703","DOI":"10.1109\/TNSM.2024.3449889","volume":"21","author":"D Tang","year":"2024","unstructured":"Tang, D., Wang, X., Li, K., Yin, C., Liang, W., Zhang, J.: Fapm: A fake amplification phenomenon monitor to filter drdos attacks with p4 data plane. IEEE Trans. Netw. Service Manag. 21, 6703\u20136715 (2024)","journal-title":"IEEE Trans. Netw. Service Manag."},{"issue":"3","key":"9970_CR71","doi-asserted-by":"publisher","first-page":"3121","DOI":"10.1109\/TNSM.2020.3048265","volume":"18","author":"A Silveira Ilha","year":"2020","unstructured":"Silveira Ilha, A., Lapolli, A.C., Marques, J.A., Gaspary, L.P.: Euclid: A fully in-network, p4-based approach for real-time ddos attack detection and mitigation. IEEE Trans. Netw. Serv. Manage. 18(3), 3121\u20133139 (2020)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9970_CR72","doi-asserted-by":"crossref","unstructured":"Wu, J., Pan, H., Cui, P., Huang, Y., Zhou, J., He, P., Li, Y., Li, Z., Xie, G.: Patronum: In-network volumetric ddos detection and mitigation with programmable switches. In: European Symposium on Research in Computer Security, pp. 187\u2013207. Springer (2024)","DOI":"10.1007\/978-3-031-70903-6_10"},{"issue":"2","key":"9970_CR73","doi-asserted-by":"publisher","first-page":"1191","DOI":"10.1109\/TNSM.2021.3073597","volume":"18","author":"D Ding","year":"2021","unstructured":"Ding, D., Savi, M., Pederzolli, F., Campanella, M., Siracusa, D.: In-network volumetric ddos victim identification using programmable commodity switches. IEEE Trans. Netw. Serv. Manage. 18(2), 1191\u20131202 (2021)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9970_CR74","unstructured":"Gutierrez, S.A., Branch, J.W., Gaspary, L.P., Botero, J.F.: Watching smartly from the bottom: Intrusion detection revamped through programmable networks and artificial intelligence. CoRR (2021). ARxIV:2106.00239"},{"key":"9970_CR75","unstructured":"Namkung, H., Liu, Z., Kim, D., Sekar, V., Steenkiste, P.: $$\\{$$SketchLib$$\\}$$: Enabling efficient sketch-based monitoring on programmable switches. In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pp. 743\u2013759 (2022)"},{"key":"9970_CR76","doi-asserted-by":"publisher","first-page":"2773","DOI":"10.1109\/TNSM.2024.3382393","volume":"21","author":"M Seufert","year":"2024","unstructured":"Seufert, M., Dietz, K., Wehner, N., Gei\u00dfler, S., Sch\u00fcler, J., Wolz, M., Hotho, A., Casas, P., Ho\u00dffeld, T., Feldmann, A.: Marina: Realizing ml-driven real-time network traffic monitoring at terabit scale. IEEE Trans. Netw. Service Manag. 21, 2773\u20132790 (2024)","journal-title":"IEEE Trans. Netw. Service Manag."},{"key":"9970_CR77","unstructured":"Liu, Z., Namkung, H., Nikolaidis, G., Lee, J., Kim, C., Jin, X., Braverman, V., Yu, M., Sekar, V.: Jaqen: A $$\\{$$High-Performance$$\\}$$$$\\{$$Switch-Native$$\\}$$ approach for detecting and mitigating volumetric $$\\{$$DDoS$$\\}$$ attacks with programmable switches. In: 30th USENIX Security Symposium (USENIX Security 21), pp. 3829\u20133846 (2021)"},{"key":"9970_CR78","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Liu, Z., Wang, R., Yang, T., Li, J., Miao, R., Liu, P., Zhang, R., Jiang, J.: Cocosketch: High-performance sketch-based measurement over arbitrary partial key query. In: Proceedings of the 2021 ACM SIGCOMM 2021 Conference, pp. 207\u2013222 (2021)","DOI":"10.1145\/3452296.3472892"},{"key":"9970_CR79","doi-asserted-by":"publisher","first-page":"238","DOI":"10.1109\/MNET.2024.3368138","volume":"38","author":"H Zhu","year":"2024","unstructured":"Zhu, H., Jiang, W., Hong, Q., Guo, Z.: When in-network computing meets distributed machine learning. IEEE Netw. 38, 238\u2013246 (2024)","journal-title":"IEEE Netw."},{"key":"9970_CR80","doi-asserted-by":"crossref","unstructured":"Li, Z., Huang, J., Li, Y., Xu, A., Zhou, S., Liu, J., Wang, J.: A2tp: Aggregator-aware in-network aggregation for multi-tenant learning. In: Proceedings of the Eighteenth European Conference on Computer Systems, pp. 639\u2013653 (2023)","DOI":"10.1145\/3552326.3587436"},{"key":"9970_CR81","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/j.comcom.2022.11.004","volume":"198","author":"A Feng","year":"2023","unstructured":"Feng, A., Dong, D., Lei, F., Ma, J., Yu, E., Wang, R.: In-network aggregation for data center networks: A survey. Comput. Commun. 198, 63\u201376 (2023)","journal-title":"Comput. Commun."},{"key":"9970_CR82","unstructured":"Mustard, C., Ruffy, F., Gakhokidze, A., Beschastnikh, I., Fedorova, A.: Jumpgate: In-Network processing as a service for data analytics. In: 11th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 19). USENIX Association, Renton, WA (2019). https:\/\/www.usenix.org\/conference\/hotcloud19\/presentation\/mustard"},{"key":"9970_CR83","doi-asserted-by":"publisher","unstructured":"Sapio, A., Abdelaziz, I., Aldilaijan, A., Canini, M., Kalnis, P.: In-network computation is a dumb idea whose time has come. In: Proceedings of the 16th ACM Workshop on Hot Topics in Networks. HotNets \u201917, pp. 150\u2013156. Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3152434.3152461","DOI":"10.1145\/3152434.3152461"},{"key":"9970_CR84","doi-asserted-by":"publisher","unstructured":"Kohler, T., Mayer, R., D\u00fcrr, F., Maa\u00df, M., Bhowmik, S., Rothermel, K.: P4cep: Towards in-network complex event processing. In: Proceedings of the 2018 Morning Workshop on In-Network Computing. NetCompute \u201918, pp. 33\u201338. Association for Computing Machinery, New York, NY, USA (2018). https:\/\/doi.org\/10.1145\/3229591.3229593","DOI":"10.1145\/3229591.3229593"},{"key":"9970_CR85","unstructured":"Zheng, C., Xiong, Z., Bui, T.T., Kaupmees, S., Bensoussane, R., Bernabeu, A., Vargaftik, S., Ben-Itzhak, Y., Zilberman, N.: Iisy: Practical in-network classification. arXiv preprint arXiv:2205.08243 (2022)"},{"key":"9970_CR86","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2020.107763","volume":"186","author":"L Tan","year":"2021","unstructured":"Tan, L., Su, W., Zhang, W., Lv, J., Zhang, Z., Miao, J., Liu, X., Li, N.: In-band network telemetry: A survey. Comput. Netw. 186, 107763 (2021). https:\/\/doi.org\/10.1016\/j.comnet.2020.107763","journal-title":"Comput. Netw."},{"key":"9970_CR87","doi-asserted-by":"crossref","unstructured":"Zhao, Z., Li, Z., Song, Z., Zhang, F., Chen, B.: Rids: Towards advanced ids via rnn model and programmable switches co-designed approaches. In: IEEE INFOCOM 2024-IEEE Conference on Computer Communications, pp. 591\u2013600. IEEE (2024)","DOI":"10.1109\/INFOCOM52122.2024.10621290"},{"issue":"4","key":"9970_CR88","doi-asserted-by":"publisher","first-page":"4176","DOI":"10.1109\/TNSM.2022.3212913","volume":"19","author":"BM Xavier","year":"2022","unstructured":"Xavier, B.M., Guimar\u00e3es, R.S., Comarela, G., Martinello, M.: Map4: A pragmatic framework for in-network machine learning traffic classification. IEEE Trans. Netw. Serv. Manage. 19(4), 4176\u20134188 (2022)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"key":"9970_CR89","unstructured":"Jafri, S.U., Rao, S., Shrivastav, V., Tawarmalani, M.: Leo: Online $$\\{$$ML-based$$\\}$$ traffic classification at $$\\{$$Multi-Terabit$$\\}$$ line rate. In: 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), pp. 1573\u20131591 (2024)"},{"key":"9970_CR90","doi-asserted-by":"publisher","first-page":"112384","DOI":"10.1109\/ACCESS.2023.3323297","volume":"11","author":"S-Y Wang","year":"2023","unstructured":"Wang, S.-Y., Wu, Y.-H.: Supporting large random forests in the pipelines of a hardware switch to classify packets at 100 gbps line rate. IEEE Access 11, 112384\u2013112397 (2023)","journal-title":"IEEE Access"},{"key":"9970_CR91","doi-asserted-by":"crossref","unstructured":"Lerner, A., Zoni, D., Costa, P., Antichi, G.: Rethinking the switch architecture for stateful in-network computing. In: Proceedings of the 23rd ACM Workshop on Hot Topics in Networks, pp. 273\u2013281 (2024)","DOI":"10.1145\/3696348.3696897"},{"key":"9970_CR92","unstructured":"CIC datasets: Canadian Institute for Cybersecurity (2020). https:\/\/www.unb.ca\/cic\/datasets\/index.html Accessed 2020-09-29"},{"key":"9970_CR93","unstructured":"Community, N.-.: Network Simulator 2 (NS-2). http:\/\/nsnam.isi.edu\/nsnam\/"},{"key":"9970_CR94","unstructured":"NS-3-Team: Network Simulator 3 Website. http:\/\/www.nsnam.org (2015)"},{"key":"9970_CR95","unstructured":"OPNET: OPNET. https:\/\/opnetprojects.com\/opnet-network-simulator\/"},{"key":"9970_CR96","unstructured":"Team, O.: OMNET++. http:\/\/www.omnetpp.org"},{"key":"9970_CR97","unstructured":"Team, M.D.: Mathcad. https:\/\/www.mathcad.com\/"},{"issue":"1","key":"9970_CR98","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/j.entcs.2005.12.025","volume":"150","author":"L Hogie","year":"2006","unstructured":"Hogie, L., Bouvry, P., Guinand, F.: An overview of manets simulation. Electron. Notes Theor. Comput. Sci. 150(1), 81\u2013101 (2006). https:\/\/doi.org\/10.1016\/j.entcs.2005.12.025","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"9970_CR99","doi-asserted-by":"publisher","unstructured":"To, M.A., Cano, M., Biba, P.: Dockemu \u2013 a network emulation tool. In: 2015 IEEE 29th International Conference on Advanced Information Networking and Applications Workshops, pp. 593\u2013598 (2015). https:\/\/doi.org\/10.1109\/WAINA.2015.107","DOI":"10.1109\/WAINA.2015.107"},{"key":"9970_CR100","unstructured":"Zhou, G., Liu, Z., Fu, C., Li, Q., Xu, K.: An efficient design of intelligent network data plane. In: 32nd USENIX Security Symposium (USENIX Security 23), pp. 6203\u20136220 (2023)"},{"key":"9970_CR101","doi-asserted-by":"crossref","unstructured":"Sapio, A., Abdelaziz, I., Aldilaijan, A., Canini, M., Kalnis, P.: In-network computation is a dumb idea whose time has come. In: Proceedings of the 16th ACM Workshop on Hot Topics in Networks, pp. 150\u2013156 (2017)","DOI":"10.1145\/3152434.3152461"},{"issue":"1","key":"9970_CR102","doi-asserted-by":"publisher","first-page":"701","DOI":"10.1109\/COMST.2022.3213237","volume":"25","author":"S Kianpisheh","year":"2022","unstructured":"Kianpisheh, S., Taleb, T.: A survey on in-network computing: Programmable data plane and technology specific applications. IEEE Commun. Surv. Tutorials 25(1), 701\u2013761 (2022)","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"9970_CR103","unstructured":"Hogan, M., Landau-Feibish, S., Arashloo, M.T., Rexford, J., Walker, D.: Modular switch programming under resource constraints. In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pp. 193\u2013207 (2022)"},{"key":"9970_CR104","unstructured":"Yuan, Y., Alama, O., Fei, J., Nelson, J., Ports, D.R., Sapio, A., Canini, M., Kim, N.S.: Unlocking the power of inline $$\\{$$Floating-Point$$\\}$$ operations on programmable switches. In: 19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22), pp. 683\u2013700 (2022)"},{"key":"9970_CR105","unstructured":"Jose, M., Lazri, K., Fran ois, J., Festor, O.: Inrec: In-network real number computation. In: 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 358\u2013366 (2021)"},{"key":"9970_CR106","doi-asserted-by":"publisher","unstructured":"Ding, D., Savi, M., Siracusa, D.: Estimating logarithmic and exponential functions to track network traffic entropy in p4. In: NOMS 2020 - 2020 IEEE\/IFIP Network Operations and Management Symposium, pp. 1\u20139 (2020). https:\/\/doi.org\/10.1109\/NOMS47738.2020.9110257","DOI":"10.1109\/NOMS47738.2020.9110257"},{"issue":"12","key":"9970_CR107","doi-asserted-by":"publisher","first-page":"4918","DOI":"10.1109\/TPDS.2022.3208425","volume":"33","author":"P Cui","year":"2022","unstructured":"Cui, P., Pan, H., Li, Z., Zhang, P., Miao, T., Zhou, J., Guan, H., Xie, G.: Enabling in-network floating-point arithmetic for efficient computation offloading. IEEE Trans. Parallel Distrib. Syst. 33(12), 4918\u20134934 (2022). https:\/\/doi.org\/10.1109\/TPDS.2022.3208425","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"issue":"2","key":"9970_CR108","doi-asserted-by":"publisher","first-page":"1171","DOI":"10.1109\/COMST.2023.3344351","volume":"26","author":"C Zheng","year":"2024","unstructured":"Zheng, C., Hong, X., Ding, D., Vargaftik, S., Ben-Itzhak, Y., Zilberman, N.: In-network machine learning using programmable network devices: A survey. IEEE Commun. Surv. Tutorials 26(2), 1171\u20131200 (2024). https:\/\/doi.org\/10.1109\/COMST.2023.3344351","journal-title":"IEEE Commun. Surv. Tutorials"},{"key":"9970_CR109","unstructured":"Gonz lez, L.A.Q., Castanheira, L., Marques, J.A., Schaeffer-Filho, A., Gaspary, L.P.: Bungee: An adaptive pushback mechanism for ddos detection and mitigation in p4 data planes. In: 2021 IFIP\/IEEE International Symposium on Integrated Network Management (IM), pp. 393\u2013401 (2021)"},{"key":"9970_CR110","unstructured":"Lapolli, A.C., Adilson\u00a0Marques, J., Gaspary, L.P.: Offloading real-time ddos attack detection to programmable data planes. In: 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 19\u201327 (2019)"},{"key":"9970_CR111","unstructured":"P4Runtime: P4Runtime Specification (2024). https:\/\/p4lang.github.io\/p4runtime\/spec\/main\/P4Runtime-Spec.html Accessed 2024-08-31"},{"key":"9970_CR112","unstructured":"The Bot-IoT Dataset. https:\/\/research.unsw.edu.au\/projects\/bot-iot-dataset Accessed: 2021-11-05"},{"key":"9970_CR113","doi-asserted-by":"publisher","unstructured":"Petersen, E., Cotto, G., Antonio\u00a0To, M.: Dockemu 2.0: Evolution of a network emulation tool. In: 2019 IEEE 39th Central America and Panama Convention (CONCAPAN XXXIX), pp. 1\u20136 (2019). https:\/\/doi.org\/10.1109\/CONCAPANXXXIX47272.2019.8977002","DOI":"10.1109\/CONCAPANXXXIX47272.2019.8977002"},{"issue":"2","key":"9970_CR114","doi-asserted-by":"publisher","first-page":"2166","DOI":"10.1002\/nem.2166","volume":"32","author":"E Petersen","year":"2022","unstructured":"Petersen, E., Antonio To, M.: Docksdn: A hybrid container-based software-defined networking emulation tool. Int. J. Netw. Manage 32(2), 2166 (2022). https:\/\/doi.org\/10.1002\/nem.2166","journal-title":"Int. J. Netw. Manage"},{"key":"9970_CR115","doi-asserted-by":"publisher","first-page":"108495","DOI":"10.1109\/ACCESS.2021.3101650","volume":"9","author":"NM Yungaicela-Naula","year":"2021","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., Perez-Diaz, J.A.: SDN-based architecture for transport and application layer DDoS attack detection by using machine and deep learning. IEEE Access 9, 108495\u2013108512 (2021). https:\/\/doi.org\/10.1109\/ACCESS.2021.3101650","journal-title":"IEEE Access"},{"key":"9970_CR116","doi-asserted-by":"publisher","first-page":"637","DOI":"10.1016\/j.future.2023.08.007","volume":"149","author":"NM Yungaicela-Naula","year":"2023","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., P\u00e9rez-D\u00edaz, J.A.: Sdn\/nfv-based framework for autonomous defense against slow-rate ddos attacks by using reinforcement learning. Futur. Gener. Comput. Syst. 149, 637\u2013649 (2023). https:\/\/doi.org\/10.1016\/j.future.2023.08.007","journal-title":"Futur. Gener. Comput. Syst."},{"issue":"4","key":"9970_CR117","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/BF02283186","volume":"2","author":"M Sloman","year":"1994","unstructured":"Sloman, M.: Policy driven management for distributed systems. J. Netw. Syst. Manage. 2(4), 333\u2013360 (1994). https:\/\/doi.org\/10.1007\/BF02283186","journal-title":"J. Netw. Syst. Manage."},{"key":"9970_CR118","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-030-81961-3_14","volume-title":"Future Networks, Services and Management","author":"A Clemm","year":"2021","unstructured":"Clemm, A.: Intent-based network management. In: Toy, M. (ed.) Future Networks, Services and Management, pp. 383\u2013398. Springer, Cham (2021)"},{"key":"9970_CR119","doi-asserted-by":"crossref","unstructured":"Schnepf, N., Badonnel, R., Lahmadi, A., Merz, S.: Automated orchestration of security chains driven by process learning. In: Communication Networks and Service Management in the Era of Artificial Intelligence and Machine Learning, pp. 289\u2013319 (2021)","DOI":"10.1002\/9781119675525.ch12"},{"issue":"4","key":"9970_CR120","doi-asserted-by":"publisher","first-page":"2490","DOI":"10.1109\/TSC.2023.3242072","volume":"16","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Cui, L., Tso, F.P., Jia, W.: Compiling service function chains via fine-grained composition in the programmable data plane. IEEE Trans. Serv. Comput. 16(4), 2490\u20132502 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9970_CR121","unstructured":"Chen, X., Zhang, D., Wang, X., Zhu, K., Zhou, H.: P4sc: Towards high-performance service function chain implementation on the p4-capable device. In: 2019 IFIP\/IEEE Symposium on Integrated Network and Service Management (IM), pp. 1\u20139 (2019). IEEE"},{"issue":"3","key":"9970_CR122","doi-asserted-by":"publisher","first-page":"3465","DOI":"10.1109\/TNSM.2024.3353808","volume":"21","author":"Y Liu","year":"2024","unstructured":"Liu, Y., Zhang, J.: Service function chain embedding meets machine learning: Deep reinforcement learning approach. IEEE Trans. Netw. Serv. Manage. 21(3), 3465\u20133481 (2024)","journal-title":"IEEE Trans. Netw. Serv. Manage."},{"issue":"4","key":"9970_CR123","doi-asserted-by":"publisher","first-page":"2532","DOI":"10.1109\/TSC.2023.3237244","volume":"16","author":"X Zhang","year":"2023","unstructured":"Zhang, X., Cui, L., Tso, F.P., Li, Z., Jia, W.: Dapper: Deploying service function chains in the programmable data plane via deep reinforcement learning. IEEE Trans. Serv. Comput. 16(4), 2532\u20132544 (2023)","journal-title":"IEEE Trans. Serv. Comput."},{"key":"9970_CR124","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.109484","volume":"221","author":"M Pattaranantakul","year":"2023","unstructured":"Pattaranantakul, M., Vorakulpipat, C., Takahashi, T.: Service function chaining security survey: Addressing security challenges and threats. Comput. Netw. 221, 109484 (2023)","journal-title":"Comput. Netw."},{"issue":"4","key":"9970_CR125","doi-asserted-by":"publisher","first-page":"77","DOI":"10.1007\/s10922-023-09769-6","volume":"31","author":"LA Quintero Gonz\u00e1lez","year":"2023","unstructured":"Quintero Gonz\u00e1lez, L.A., Castanheira, L., Marques, J.A., Schaeffer-Filho, A.E., Paschoal Gaspary, L.: Bungee-ml: A cross-plane approach for a collaborative defense against ddos attacks. J. Netw. Syst. Manage. 31(4), 77 (2023). https:\/\/doi.org\/10.1007\/s10922-023-09769-6","journal-title":"J. Netw. Syst. Manage."},{"key":"9970_CR126","doi-asserted-by":"publisher","unstructured":"Soni, H., Rifai, M., Kumar, P., Doenges, R., Foster, N.: Composing dataplane programs with $$\\mu $$p4. In: Proceedings of the Annual Conference of the ACM Special Interest Group on Data Communication on the Applications, Technologies, Architectures, and Protocols for Computer Communication. SIGCOMM \u201920, pp. 329\u2013343. Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3387514.3405872","DOI":"10.1145\/3387514.3405872"},{"issue":"2","key":"9970_CR127","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1109\/MCOM.001.2100363","volume":"60","author":"G Bueno","year":"2022","unstructured":"Bueno, G., Saquetti, M., Rodrigues, P., Lamb, I., Gaspary, L., Luizelli, M.C., Zhani, M.F., Azambuja, J.R., Cordeiro, W.: Managing virtual programmable switches: Principles, requirements, and design directions. IEEE Commun. Mag. 60(2), 53\u201359 (2022). https:\/\/doi.org\/10.1109\/MCOM.001.2100363","journal-title":"IEEE Commun. Mag."},{"issue":"4","key":"9970_CR128","doi-asserted-by":"publisher","first-page":"2460","DOI":"10.1109\/COMST.2021.3102874","volume":"23","author":"M Zhu","year":"2021","unstructured":"Zhu, M., Anwar, A.H., Wan, Z., Cho, J.-H., Kamhoua, C.A., Singh, M.P.: A survey of defensive deception: Approaches using game theory and machine learning. IEEE Commun. Surv. Tutorials 23(4), 2460\u20132493 (2021). https:\/\/doi.org\/10.1109\/COMST.2021.3102874","journal-title":"IEEE Commun. Surv. Tutorials"},{"issue":"2","key":"9970_CR129","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1145\/1764873.1764886","volume":"40","author":"C Dovrolis","year":"2010","unstructured":"Dovrolis, C., Streelman, J.T.: Evolvable network architectures: What can we learn from biology? SIGCOMM Comput. Commun. Rev. 40(2), 72\u201377 (2010). https:\/\/doi.org\/10.1145\/1764873.1764886","journal-title":"SIGCOMM Comput. Commun. Rev."},{"key":"9970_CR130","doi-asserted-by":"publisher","unstructured":"Jacobs, A.S., Beltiukov, R., Willinger, W., Ferreira, R.A., Gupta, A., Granville, L.Z.: Ai\/ml for network security: The emperor has no clothes. In: Proceedings of the 2022 ACM SIGSAC Conference on Computer and Communications Security. CCS \u201922, pp. 1537\u20131551. Association for Computing Machinery, New York, NY, USA (2022). https:\/\/doi.org\/10.1145\/3548606.3560609","DOI":"10.1145\/3548606.3560609"},{"key":"9970_CR131","doi-asserted-by":"publisher","first-page":"106909","DOI":"10.1109\/ACCESS.2022.3211513","volume":"10","author":"JG Almaraz-Rivera","year":"2022","unstructured":"Almaraz-Rivera, J.G., Perez-Diaz, J.A., Cantoral-Ceballos, J.A., Botero, J.F., Trejo, L.A.: Toward the protection of IoT networks: Introducing the LATAM-DDoS-IoT dataset. IEEE Access 10, 106909\u2013106920 (2022). https:\/\/doi.org\/10.1109\/ACCESS.2022.3211513","journal-title":"IEEE Access"},{"key":"9970_CR132","unstructured":"I2T Research Group UPV\/EHU: Smart Networks for Everything (SmartNets4E) (2023). https:\/\/i2t.ehu.eus\/resources\/smartnets4e Accessed 2024-09-08"},{"key":"9970_CR133","doi-asserted-by":"publisher","first-page":"46820","DOI":"10.1109\/ACCESS.2023.3274577","volume":"11","author":"NM Yungaicela-Naula","year":"2023","unstructured":"Yungaicela-Naula, N.M., Vargas-Rosales, C., Perez-Diaz, J.A., Jacob, E., Martinez-Cagnazzo, C.: Physical assessment of an sdn-based security framework for ddos attack mitigation: Introducing the sdn-slowrate-ddos dataset. IEEE Access 11, 46820\u201346831 (2023). https:\/\/doi.org\/10.1109\/ACCESS.2023.3274577","journal-title":"IEEE Access"},{"key":"9970_CR134","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2022.103802","volume":"144","author":"A Atutxa","year":"2023","unstructured":"Atutxa, A., Astorga, J., Barcelo, M., Urbieta, A., Jacob, E.: Improving efficiency and security of iiot communications using in-network validation of server certificate. Comput. Ind. 144, 103802 (2023). https:\/\/doi.org\/10.1016\/j.compind.2022.103802","journal-title":"Comput. Ind."},{"key":"9970_CR135","unstructured":"Asterfusion: X308P-48Y-T, 48X25Gb, 8X100G P4-programmable switch with 3.3 Tbps Intel Tofino ASIC ,2X Marvell Octeon TX CN9670 DPUs)\" (2023). https:\/\/cloudswit.ch\/product\/48x25gb8x100gb-intel-tofino-p4-programmable-bare-metal-switch-asterfusion\/ Accessed 2024-09-08"},{"key":"9970_CR136","unstructured":"Frederic Loui, Sonja Filiposkas: GP4L in G ANT-5 project. https:\/\/internet2.edu\/wp-content\/uploads\/2023\/09\/20230920-LouiFiliposka-GP4L_in_GN5-1.pdf Accessed 2024-09-08 (2023)"},{"key":"9970_CR137","unstructured":"G ANT5-1 Project: GP4L documentation home. https:\/\/geant-netdev.gitlab-pages.pcss.pl\/gp4ldocs\/ Accessed 2024-09-08 (2024)"},{"key":"9970_CR138","unstructured":"Intel: Intel\u00ae. Tofino Products, PCN 827577-00, Product Discontinuance, Tofino End of Life (2024). https:\/\/www.intel.com\/content\/www\/us\/en\/content-details\/827577\/intel-tofino-products-pcn-827577-00-product-discontinuance-tofino-end-of-life.html Accessed 2024-09-08"},{"key":"9970_CR139","unstructured":"Broadcom: Explore NPL. https:\/\/nplang.org\/explore\/ Accessed 2024-09-08 (2020)"}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09970-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10922-025-09970-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-025-09970-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,9,25]],"date-time":"2025-09-25T09:04:28Z","timestamp":1758791068000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10922-025-09970-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,8,26]]},"references-count":139,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2025,10]]}},"alternative-id":["9970"],"URL":"https:\/\/doi.org\/10.1007\/s10922-025-09970-9","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"type":"print","value":"1064-7570"},{"type":"electronic","value":"1573-7705"}],"subject":[],"published":{"date-parts":[[2025,8,26]]},"assertion":[{"value":"23 May 2025","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2025","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"8 August 2025","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 August 2025","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}],"article-number":"95"}}