{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:21:32Z","timestamp":1725751292619},"reference-count":42,"publisher":"IEEE","license":[{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,1,3]],"date-time":"2024-01-03T00:00:00Z","timestamp":1704240000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2024,1,3]]},"DOI":"10.1109\/comsnets59351.2024.10427291","type":"proceedings-article","created":{"date-parts":[[2024,2,16]],"date-time":"2024-02-16T13:55:32Z","timestamp":1708091732000},"page":"953-961","source":"Crossref","is-referenced-by-count":0,"title":["Securing In-Network Fast Control Loop Systems from Adversarial Attacks"],"prefix":"10.1109","author":[{"given":"Harish S","family":"A","sequence":"first","affiliation":[{"name":"IIT Hyderabad,India"}]},{"given":"Divya","family":"Pathak","sequence":"additional","affiliation":[{"name":"IIT Hyderabad,India"}]},{"given":"Mahanth Kumar","family":"Valluri","sequence":"additional","affiliation":[{"name":"IIT Hyderabad,India"}]},{"given":"Sree Prathyush","family":"Chinta","sequence":"additional","affiliation":[{"name":"IIT Hyderabad,India"}]},{"given":"Amogh","family":"Bedarakota","sequence":"additional","affiliation":[{"name":"IIT Hyderabad,India"}]},{"given":"Rinku","family":"Shah","sequence":"additional","affiliation":[{"name":"IIIT Delhi,India"}]},{"given":"Praveen","family":"Tammana","sequence":"additional","affiliation":[{"name":"IIT Hyderabad,India"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544222"},{"key":"ref2","first-page":"267","article-title":"Closed-loop network performance monitoring and diagnosis with {SpiderMon}","volume-title":"19th USENIX Symposium on Networked Systems Design and Implementation (NSDI 22)","author":"Wang","year":"2022"},{"key":"ref3","first-page":"311","article-title":"{FlowRadar}: A better {NetFlow} for data centers","volume-title":"13th USENIX symposium on networked systems design and implementation (NSDI16)","author":"Li","year":"2016"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050228"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098824"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2890955.2890968"},{"key":"ref7","first-page":"161","article-title":"Blink: Fast connectivity recovery entirely in the data plane","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Holterbach","year":"2019"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483366"},{"key":"ref9","first-page":"701","article-title":"Contra: A programmable system for performance-aware routing","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Hsu","year":"2020"},{"key":"ref10","article-title":"Programmable in-network security for context-aware byod policies","author":"Kang","year":"2020","journal-title":"USENIX Security"},{"key":"ref11","article-title":"Netwarden: Mitigating network covert channels while preserving performance","author":"Xing","year":"2020","journal-title":"USENIX Security"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888057"},{"key":"ref13","first-page":"3829","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric ddos attacks with programmable switches","volume-title":"USENIX Security Symposium","author":"Liu","year":"2021"},{"key":"ref14","article-title":"Me love (syn-) cookies: Syn flood mitigation in programmable data planes","author":"Scholz","year":"2020","journal-title":"arXiv preprint"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405823"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059298"},{"key":"ref17","article-title":"Netcache: Balancing key-value stores with fast in-network caching","author":"J","year":"2017","journal-title":"ACM SOSP"},{"key":"ref18","first-page":"311","article-title":"{FlowRadar}: A better {NetFlow} for data centers","volume-title":"13th USENIX symposium on networked systems design and implementation (NSDI16)","author":"Li","year":"2016"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3600061.3600086"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365850"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/3472873.3472880"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.17"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120248"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_87"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615566"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2015.21"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2013.2272604"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM50824.2020.9269076"},{"volume-title":"Data Set for IMC 2010 Data Center Measurement","year":"2010","key":"ref30"},{"volume-title":"CAIDA Macroscopic Internet Topology Data Kit","year":"2010","key":"ref31"},{"volume-title":"P4 Behavioral model","year":"2023","key":"ref32"},{"volume-title":"Mininet - A network simulation","year":"2023","key":"ref33"},{"volume-title":"Python 3","year":"2023","key":"ref34"},{"volume-title":"scapy","year":"2023","key":"ref35"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3484266.3487370"},{"key":"ref37","first-page":"508","article-title":"Adversarial exploitation of p4 data planes","volume-title":"2021 IFIPIEEE International Symposium on Integrated Network Management (1M). IEEE","author":"Black","year":"2021"},{"key":"ref38","article-title":"Automated attack discovery in data plane systems","volume-title":"CSET@ USENIX Security Symposium","author":"Kang","year":"2019"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354235"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3306193"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2010.07.024"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.23919\/CNSM52442.2021.9615556"}],"event":{"name":"2024 16th International Conference on COMmunication Systems & NETworkS (COMSNETS)","start":{"date-parts":[[2024,1,3]]},"location":"Bengaluru, India","end":{"date-parts":[[2024,1,7]]}},"container-title":["2024 16th International Conference on COMmunication Systems &amp; NETworkS (COMSNETS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/10426746\/10426785\/10427291.pdf?arnumber=10427291","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,3]],"date-time":"2024-03-03T09:14:37Z","timestamp":1709457277000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10427291\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,1,3]]},"references-count":42,"URL":"https:\/\/doi.org\/10.1109\/comsnets59351.2024.10427291","relation":{},"subject":[],"published":{"date-parts":[[2024,1,3]]}}}