{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,17]],"date-time":"2025-09-17T16:34:24Z","timestamp":1758126864424},"reference-count":33,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,6,7]],"date-time":"2021-06-07T00:00:00Z","timestamp":1623024000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,6,7]]},"DOI":"10.1109\/hpsr52026.2021.9481849","type":"proceedings-article","created":{"date-parts":[[2021,8,24]],"date-time":"2021-08-24T20:47:56Z","timestamp":1629838076000},"page":"1-7","source":"Crossref","is-referenced-by-count":9,"title":["High Performance Network Metadata Extraction Using P4 for ML-based Intrusion Detection Systems"],"prefix":"10.1109","author":[{"given":"Nicholas","family":"Gray","sequence":"first","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Katharina","family":"Dietz","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Michael","family":"Seufert","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]},{"given":"Tobias","family":"Hossfeld","sequence":"additional","affiliation":[{"name":"University of W&#x00FC;rzburg,W&#x00FC;rzburg,Germany"}]}],"member":"263","reference":[{"journal-title":"sysstat project","year":"0","key":"ref33"},{"journal-title":"dpdk-burst-replay project","year":"0","key":"ref32"},{"journal-title":"tcpreplay project","year":"0","key":"ref31"},{"journal-title":"Emerging Threats rule documentation","year":"0","key":"ref30"},{"journal-title":"Tofino Series","year":"0","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s12083-017-0630-0"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1186\/s42400-019-0038-7"},{"journal-title":"Scikit-Learn","article-title":"Scikit-learn project","year":"0","key":"ref13"},{"article-title":"Performance evaluation in high-speed networks by the example of intrusion detection","year":"2018","author":"lukaseder","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/DRCN.2015.7149025"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.07.001"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2012.6254301"},{"key":"ref18","first-page":"83","article-title":"Apunet: Revitalizing {GPU} as packet processing accelerator","author":"go","year":"2017","journal-title":"14th USENIX Symposium on Networked Systems Design and Implementation NSDI 17)"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.3390\/electronics9010059"},{"journal-title":"RFC 3692","year":"0","key":"ref28"},{"key":"ref4","article-title":"In-band network telemetry via programmable dataplanes","author":"kim","year":"2015","journal-title":"ACM SIGCOMM"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190558"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jisa.2019.102426"},{"journal-title":"Suricata IDS","article-title":"Suricata project","year":"0","key":"ref6"},{"journal-title":"ISCX 2012 dataset","year":"0","key":"ref29"},{"journal-title":"Specification Version 2 0","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2018.2851072"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2015.2477041"},{"journal-title":"Checkpoint 2020 Security Report","year":"0","key":"ref2"},{"journal-title":"Language Specification","year":"0","key":"ref9"},{"journal-title":"Cisco Annual Internet Report (2018&#x2013;2023)","year":"0","key":"ref1"},{"key":"ref20","first-page":"973","article-title":"hxdp: Efficient software packet processing on {FPGA} nics","author":"brunella","year":"2020","journal-title":"OSDI 2020 14th USENIX Symposium on Operating Systems Design and Implementation"},{"key":"ref22","article-title":"Sequential zeroing: Online heavy-hitter detection on programmable hardware","author":"turkovic","year":"2020","journal-title":"2020 IFIP Networking Conference (Networking) Networking"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3289602.3293924"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICIN48450.2020.9059327"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/NFV-SDN47374.2019.9040044"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICC40277.2020.9149043"}],"event":{"name":"2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)","start":{"date-parts":[[2021,6,7]]},"location":"Paris, France","end":{"date-parts":[[2021,6,10]]}},"container-title":["2021 IEEE 22nd International Conference on High Performance Switching and Routing (HPSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9481789\/9481790\/09481849.pdf?arnumber=9481849","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,8,2]],"date-time":"2022-08-02T23:58:34Z","timestamp":1659484714000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9481849\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,6,7]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/hpsr52026.2021.9481849","relation":{},"subject":[],"published":{"date-parts":[[2021,6,7]]}}}