{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:41:39Z","timestamp":1766580099273,"version":"3.37.3"},"reference-count":220,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB2901305"],"award-info":[{"award-number":["2022YFB2901305"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"\u201cPioneer\u201d and \u201cLeading Goose\u201d Research and Development Program of Zhejiang Province","award":["2022C01085"],"award-info":[{"award-number":["2022C01085"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61902362","62172007"],"award-info":[{"award-number":["61902362","62172007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"Joint Funds of the National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["U20A20179"],"award-info":[{"award-number":["U20A20179"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Major Science and Technology Infrastructure Project of Zhijiang Laboratory"},{"DOI":"10.13039\/501100002383","name":"King Saud University, Riyadh, Saudi Arabia","doi-asserted-by":"publisher","award":["RSP2023R12"],"award-info":[{"award-number":["RSP2023R12"]}],"id":[{"id":"10.13039\/501100002383","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Commun. Surv. Tutorials"],"published-print":{"date-parts":[[2023]]},"DOI":"10.1109\/comst.2023.3265984","type":"journal-article","created":{"date-parts":[[2023,4,10]],"date-time":"2023-04-10T19:45:19Z","timestamp":1681155919000},"page":"1653-1704","source":"Crossref","is-referenced-by-count":30,"title":["Empowering Network Security With Programmable Switches: A Comprehensive Survey"],"prefix":"10.1109","volume":"25","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-0249-9664","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"first","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7958-9687","authenticated-orcid":false,"given":"Chunming","family":"Wu","sequence":"additional","affiliation":[{"name":"College of Computer Science and Technology, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7966-4488","authenticated-orcid":false,"given":"Xuan","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Information Engineering (College of Artificial Intelligence), Yangzhou University, Yangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"School of Electronics Engineering and Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6379-0244","authenticated-orcid":false,"given":"Dong","family":"Zhang","sequence":"additional","affiliation":[{"name":"College of Computer Science and Big Data, Fuzhou University, Fuzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8008-2805","authenticated-orcid":false,"given":"Haifeng","family":"Zhou","sequence":"additional","affiliation":[{"name":"College of Control Science and Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0761-4692","authenticated-orcid":false,"given":"Qiang","family":"Yang","sequence":"additional","affiliation":[{"name":"College of Electrical Engineering, Zhejiang University, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6636-0533","authenticated-orcid":false,"given":"Muhammad Khurram","family":"Khan","sequence":"additional","affiliation":[{"name":"Center of Excellence in Information Assurance, King Saud University, Riyadh, Saudi Arabia"}]}],"member":"263","reference":[{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2021.01.027"},{"key":"ref207","first-page":"194","article-title":"Covert messaging through TCP timestamps","author":"giffin","year":"2002","journal-title":"Proc PET"},{"key":"ref56","article-title":"A survey on data plane programming with P4: Fundamentals, advances, and applied research","author":"hauser","year":"2021","journal-title":"arXiv 2101 10632"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/ICON.2004.1409207"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3445968.3452092"},{"key":"ref205","first-page":"420","article-title":"TCP covert timing channels: Design and detection","author":"luo","year":"2008","journal-title":"Proc IEEE DSN"},{"key":"ref58","article-title":"Charting the security landscape of programmable dataplanes","author":"agape","year":"2018","journal-title":"arXiv 1807 00128"},{"key":"ref206","first-page":"173","article-title":"PHY covert channels: Can you see the idles?","author":"lee","year":"2014","journal-title":"Proc USENIX NSDI"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850761"},{"key":"ref203","first-page":"64","article-title":"Keyboards and covert channels","volume":"15","author":"shah","year":"2006","journal-title":"Proc Usenix Security"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10922-017-9423-2"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-87403-4_12"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3447868"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948115"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2910140"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030108"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958260"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/PERVASIVE.2015.7087183"},{"key":"ref211","first-page":"1","article-title":"Automated attack discovery in TCP congestion control using a model-guided approach","author":"jero","year":"2018","journal-title":"Proc NDSS"},{"key":"ref51","first-page":"1","article-title":"Ripple: A programmable, Decentralized link-flooding defense against adaptive adversaries","author":"xing","year":"2021","journal-title":"Proc Usenix Security"},{"key":"ref50","first-page":"171","article-title":"Metron: NFV service chains at the true speed of the underlying hardware","author":"katsikas","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"journal-title":"CVE-2020-3207","year":"2023","key":"ref218"},{"key":"ref45","first-page":"103","article-title":"Compiling packet programs to reconfigurable switches","author":"jose","year":"2015","journal-title":"Proc USENIX NSDI"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934900"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472889"},{"journal-title":"CVE-2020-3513","year":"2023","key":"ref216"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472937"},{"journal-title":"CVE-2020-3416","year":"2023","key":"ref217"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521329"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/EISIC.2016.048"},{"key":"ref41","first-page":"1","article-title":"P4SC: Towards high-performance service function chain implementation on the P4-capable device","author":"chen","year":"2019","journal-title":"Proc IFIP\/IEEE im"},{"key":"ref215","first-page":"2039","article-title":"NetWarden: Mitigating network covert channels while preserving performance","author":"xing","year":"2020","journal-title":"Proc Usenix Security"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486011"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2009.5198826"},{"key":"ref43","first-page":"323","article-title":"Design and implementation of a consolidated middlebox architecture","author":"sekar","year":"2012","journal-title":"Proc USENIX NSDI"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832535"},{"key":"ref49","first-page":"371","article-title":"Cetus: Releasing P4 programmers from the chore of trial and error compiling","author":"li","year":"2022","journal-title":"Proc USENIX NSDI"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2017.02.007"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431320"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66399-9_8"},{"key":"ref4","first-page":"1","article-title":"Jaqen: A high-performance switch-native approach for detecting and mitigating volumetric DDoS attacks with programmable switches","author":"liu","year":"2021","journal-title":"Proc Usenix Security"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2020.24007"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ANTS47819.2019.9118071"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2019.8888057"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626310"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544269"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132764"},{"journal-title":"Intel Tofino3","year":"2023","key":"ref34"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"ref36","first-page":"35","article-title":"NetChain: Scale-free sub-RTT coordination","author":"jin","year":"2018","journal-title":"Proc USENIX NSDI"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00025"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2019.2896848"},{"journal-title":"Barefoot tofino","year":"2023","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.01.021"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"ref38","first-page":"823","article-title":"Scaling hardware accelerated network monitoring to concurrent and dynamic queries with *flow","author":"sonchack","year":"2018","journal-title":"Proc USENIX ATC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486026"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2553778"},{"journal-title":"Service Function Chaining Use Cases In Data Centers","year":"2015","author":"kumar","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626317"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815423"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2013.6461197"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2871313"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934897"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098826"},{"key":"ref29","first-page":"459","article-title":"ClickOS and the art of network function virtualization","author":"martins","year":"2014","journal-title":"Proc USENIX NSDI"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098823"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/948112.948116"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2006.890133"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/3314148.3314356"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259414"},{"journal-title":"Gurobi Optimizer","year":"2023","key":"ref96"},{"journal-title":"DDoS Attack Trends for 2022 Q1","year":"2023","key":"ref127"},{"journal-title":"sFlow","year":"2023","key":"ref99"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM42981.2021.9488732"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405879"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.17487\/RFC7513"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP49622.2020.9259384"},{"key":"ref134","first-page":"55","article-title":"DroPPPP: A P4 approach to mitigating DoS attacks in SDN","author":"simsek","year":"2019","journal-title":"Proc WISA"},{"journal-title":"CPLEX","year":"2023","key":"ref95"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3704"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405869"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497921"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.17487\/rfc2267"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/GLOBECOM42002.2020.9322112"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/IPCCC50635.2020.9391530"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2019.2894308"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/3365609.3365849"},{"journal-title":"Ddos Attack on Github","year":"2023","key":"ref137"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3281411.3281436"},{"key":"ref138","first-page":"19","article-title":"Offloading real-time DDoS attack detection to programmable data planes","author":"lapolli","year":"2019","journal-title":"Proc IFIP\/IEEE im"},{"key":"ref88","first-page":"90","article-title":"P4NFV: An NFV architecture with flexible data plane reconfiguration","author":"he","year":"2018","journal-title":"Proc IEEE CNSM"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149310"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1145\/3426744.3431329"},{"journal-title":"DDoS Attack in AWS","year":"2020","key":"ref136"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050234"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149043"},{"journal-title":"Data-Plane Development Kit","year":"2023","key":"ref81"},{"key":"ref145","article-title":"Me love (SYN-) cookies: SYN flood mitigation in programmable data planes","author":"scholz","year":"2020","journal-title":"arXiv 2003 03221"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICCCN.2017.8038396"},{"key":"ref142","doi-asserted-by":"crossref","first-page":"84a","DOI":"10.1364\/JOCN.11.000A84","article-title":"P4 Edge node enabling stateful traffic engineering and cyber security","volume":"11","author":"paolucci","year":"2019","journal-title":"IEEE\/OSA Journal of Optical Communications and Networking"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2999572.2999607"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165336"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3048265"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3073597"},{"journal-title":"eBPF","year":"2023","key":"ref80"},{"journal-title":"p4c","year":"2023","key":"ref79"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592600"},{"journal-title":"Apache Thrift","year":"2023","key":"ref78"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472892"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"journal-title":"P4-Hlir","year":"2023","key":"ref75"},{"key":"ref104","first-page":"311","article-title":"FlowRadar: A better NetFlow for data centers","author":"li","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934892"},{"key":"ref105","first-page":"398","article-title":"Efficient computation of frequent and top-k elements in data streams","author":"metwally","year":"2005","journal-title":"Proc ICDT"},{"journal-title":"BMv2","year":"2023","key":"ref77"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787472"},{"journal-title":"P4C-BM","year":"2023","key":"ref76"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref71","first-page":"1","article-title":"Composing software defined networks","author":"monsanto","year":"2013","journal-title":"Proc USENIX NSDI"},{"key":"ref111","first-page":"29","article-title":"Software defined traffic measurement with OpenSketch","author":"yu","year":"2013","journal-title":"Proc USENIX NSDI"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626291"},{"key":"ref73","first-page":"87","article-title":"CoVisor: A compositional hypervisor for software-defined networks","author":"jin","year":"2015","journal-title":"Proc USENIX NSDI"},{"key":"ref72","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/2578855.2535862","article-title":"NetKAT: Semantic foundations for networks","volume":"49","author":"monsanto","year":"2014","journal-title":"ACM SIGPLAN Notices"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183759"},{"key":"ref68","first-page":"1","article-title":"In-band network telemetry via programmable dataplanes","author":"kim","year":"2015","journal-title":"Proc ACM Sigcomm"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/3229543.3229545"},{"key":"ref67","first-page":"71","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"Proc USENIX NSDI"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/3139645.3139648"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934887"},{"key":"ref115","first-page":"991","article-title":"LightGuardian: A full-visibility, lightweight, in-band telemetry system using Sketchlets","author":"zhao","year":"2021","journal-title":"Proc USENIX NSDI"},{"journal-title":"STRIDE-Based Model","year":"2023","key":"ref63"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934886"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836099"},{"key":"ref65","first-page":"117","article-title":"The design and implementation of open vSwitch","author":"pfaff","year":"2015","journal-title":"Proc USENIX NSDI"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2022.108800"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405865"},{"key":"ref123","first-page":"1027","article-title":"Toward nearly-zero-error sketching via compressive sensing","author":"huang","year":"2021","journal-title":"Proc USENIX NSDI"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2017.2689819"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3746"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737383"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544247"},{"journal-title":"What Is BYOD and Why Is It Important?","year":"2023","key":"ref169"},{"journal-title":"Market Reports","year":"2023","key":"ref170"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1109\/ICNP.2018.00066"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1109\/MILCOM.2018.8599726"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2015.23263"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/2508859.2516684"},{"journal-title":"Next generation security with VMware NSX and Palo alto networks VM-series","year":"2013","key":"ref173"},{"key":"ref174","first-page":"6","article-title":"BeyondCorp: A new approach to enterprise security","volume":"39","author":"ward","year":"2014","journal-title":"The Magazine of USENIX and SAGE"},{"key":"ref171","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2016.23458"},{"key":"ref172","first-page":"595","article-title":"Programmable in-network security for context-aware BYOD policies","author":"kang","year":"2020","journal-title":"Proc Usenix Security"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059298"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2021.3136575"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/3341216.3342208"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1109\/HPSR.2018.8850752"},{"journal-title":"Nfp-4000 theory of operation","year":"2023","key":"ref189"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29011-4_5"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901886"},{"key":"ref184","first-page":"1","article-title":"MIMIQ: Masking IPs with migration in QUIC","author":"govil","year":"2020","journal-title":"Proc USENIX FOCI"},{"key":"ref185","first-page":"1","article-title":"Programmable in-network obfuscation of DNS traffic","author":"wang","year":"2021","journal-title":"Proc NDSS DNS Privacy Workshop"},{"key":"ref182","first-page":"1","article-title":"SPINE: Surveillance protection in the network elements","author":"datta","year":"2019","journal-title":"Proc USENIX FOCI"},{"key":"ref183","article-title":"Anonymizing masses: Practical light-weight anonymity at the network level","author":"moghaddam","year":"2019","journal-title":"arXiv 1911 09642"},{"journal-title":"State of IP Spoofing","year":"2023","key":"ref148"},{"journal-title":"Anatomy of A DNS DDoS Amplification Attack","year":"2023","key":"ref149"},{"key":"ref146","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059327"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948225"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185497"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062379"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2010.03.012"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185499"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1109\/NetSoft48620.2020.9165488"},{"key":"ref152","article-title":"P4K: A formal semantics of P4 and applications","author":"kheradmand","year":"2018","journal-title":"arXiv 1804 01468"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2019.8901882"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230548"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230582"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref166","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349314"},{"key":"ref167","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446764"},{"key":"ref164","first-page":"683","article-title":"Gauntlet: Finding bugs in compilers for programmable packet processing","author":"ruffy","year":"2020","journal-title":"Proc USENIX OSDI"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0054170"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1145\/3373360.3380843"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1996.566449"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934881"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405888"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2491185.2491223"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2377677.2377680"},{"key":"ref15","first-page":"1","article-title":"Onix: A distributed control platform for large-scale production networks","author":"koponen","year":"2010","journal-title":"Proc USENIX OSDI"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787501"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/MNET.2008.4626228"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2019.06.007"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2656877.2656890"},{"key":"ref19","first-page":"1","article-title":"CloudWatcher: Network security monitoring using OpenFlow in dynamic cloud networks (or: How to provide security monitoring as a service in clouds?)","author":"shin","year":"2012","journal-title":"Proc IEEE ICNP"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2015.7045396"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2926479"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2982859"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2014.61"},{"key":"ref199","doi-asserted-by":"publisher","DOI":"10.1109\/TCOMM.2019.2935047"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2016.2577301"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1109\/MCOM.2017.1600981"},{"key":"ref195","first-page":"271","article-title":"Hardware-accelerated cryptography for software-defined networks with P4","author":"malina","year":"2020","journal-title":"Proc SecITC"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1109\/JIOT.2020.3048842"},{"journal-title":"802 1AE MAC Security (MACsec)","year":"2023","key":"ref193"},{"key":"ref194","first-page":"691","article-title":"sRDMA&#x2014;Efficient NIC-based authentication and encryption for remote direct memory access","author":"taranov","year":"2020","journal-title":"Proc USENIX ATC"}],"container-title":["IEEE Communications Surveys &amp; Tutorials"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9739\/10226436\/10098550.pdf?arnumber=10098550","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,11]],"date-time":"2023-09-11T19:22:59Z","timestamp":1694460179000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10098550\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"references-count":220,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/comst.2023.3265984","relation":{},"ISSN":["1553-877X","2373-745X"],"issn-type":[{"type":"electronic","value":"1553-877X"},{"type":"electronic","value":"2373-745X"}],"subject":[],"published":{"date-parts":[[2023]]}}}