{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:33Z","timestamp":1750220913226,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,12,9]],"date-time":"2019-12-09T00:00:00Z","timestamp":1575849600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1642150"],"award-info":[{"award-number":["1642150"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,12,9]]},"DOI":"10.1145\/3359789.3359843","type":"proceedings-article","created":{"date-parts":[[2019,11,22]],"date-time":"2019-11-22T18:41:59Z","timestamp":1574448119000},"page":"568-583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Coordinated dataflow protection for ultra-high bandwidth science networks"],"prefix":"10.1145","author":[{"given":"Vasudevan","family":"Nagendra","sequence":"first","affiliation":[{"name":"Stony Brook University"}]},{"given":"Vinod","family":"Yegneswaran","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Phillip","family":"Porras","sequence":"additional","affiliation":[{"name":"SRI International"}]},{"given":"Samir R","family":"Das","sequence":"additional","affiliation":[{"name":"Stony Brook University"}]}],"member":"320","published-online":{"date-parts":[[2019,12,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"100G DTN. 2017. https:\/\/fasterdata.es.net\/science-dmz\/DTN\/100g-dtn\/  100G DTN. 2017. https:\/\/fasterdata.es.net\/science-dmz\/DTN\/100g-dtn\/"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3143361.3143380"},{"key":"e_1_3_2_1_3_1","unstructured":"Amazon EC2. 2018. https:\/\/aws.amazon.com\/ec2\/  Amazon EC2. 2018. https:\/\/aws.amazon.com\/ec2\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Anonymized for Double-blind submission. [n. d.].  Anonymized for Double-blind submission. [n. d.]."},{"key":"e_1_3_2_1_5_1","unstructured":"Berkeley Lab 100G Intrusion Detection System. 2017. https:\/\/goo.gl\/xc61Zv  Berkeley Lab 100G Intrusion Detection System. 2017. https:\/\/goo.gl\/xc61Zv"},{"key":"e_1_3_2_1_6_1","unstructured":"Computing Support for ATLAS. 2018. https:\/\/www.bnl.gov\/atlas\/computing.php.  Computing Support for ATLAS. 2018. https:\/\/www.bnl.gov\/atlas\/computing.php."},{"key":"e_1_3_2_1_7_1","unstructured":"Congress Architecture. 2018. http:\/\/congress.readthedocs.io\/en\/latest\/architecture.html  Congress Architecture. 2018. http:\/\/congress.readthedocs.io\/en\/latest\/architecture.html"},{"key":"e_1_3_2_1_8_1","unstructured":"CVS GridFTP Vulnerability for attackers to gain privileges. 2017. http:\/\/www.cvedetails.com\/cve\/CVE-2012-3292\/  CVS GridFTP Vulnerability for attackers to gain privileges. 2017. http:\/\/www.cvedetails.com\/cve\/CVE-2012-3292\/"},{"key":"e_1_3_2_1_9_1","volume-title":"In Proceedings of ACM Supercomputing.","author":"Dart Eli","year":"2013","unstructured":"Dart , Eli and Rotman , Lauren and Tierney , Brian and Hester , Mary and Zurawski , Jason . 2013 . In Proceedings of ACM Supercomputing. Dart, Eli and Rotman, Lauren and Tierney, Brian and Hester, Mary and Zurawski, Jason. 2013. In Proceedings of ACM Supercomputing."},{"key":"e_1_3_2_1_10_1","unstructured":"Data Transfer Tools. 2017. http:\/\/fasterdata.es.net\/data-transfer-tools\/  Data Transfer Tools. 2017. http:\/\/fasterdata.es.net\/data-transfer-tools\/"},{"key":"e_1_3_2_1_11_1","volume-title":"How the World's Fastest Science Network Was Built","author":"EsNet","year":"2017","unstructured":"EsNet : How the World's Fastest Science Network Was Built . 2017 . https:\/\/esnetupdates.wordpress.com\/category\/100g\/ EsNet: How the World's Fastest Science Network Was Built. 2017. https:\/\/esnetupdates.wordpress.com\/category\/100g\/"},{"key":"e_1_3_2_1_12_1","volume-title":"Speeds up Science","author":"Breaks Down Barriers","year":"2015","unstructured":"ESnet's Science DMZ Breaks Down Barriers , Speeds up Science . 2015 . https:\/\/cs.lbl.gov\/news-media\/news\/2015\/esnet-science-dmz\/ ESnet's Science DMZ Breaks Down Barriers, Speeds up Science. 2015. https:\/\/cs.lbl.gov\/news-media\/news\/2015\/esnet-science-dmz\/"},{"volume-title":"Proceedings of USENIX OSDI.","year":"2006","key":"e_1_3_2_1_13_1","unstructured":"Experiences building planetlab , Proceedings of USENIX OSDI. 2006 . Peterson, Larry and Bavier, Andy and Fiuczynski, Marc E and Muir, Steve. Experiences building planetlab, Proceedings of USENIX OSDI. 2006. Peterson, Larry and Bavier, Andy and Fiuczynski, Marc E and Muir, Steve."},{"key":"e_1_3_2_1_14_1","unstructured":"Firewall TCP Performance with Science DMZ. 2017. https:\/\/fasterdata.es.net\/assets\/fasterdata\/Firewall-tcptrace.pdf  Firewall TCP Performance with Science DMZ. 2017. https:\/\/fasterdata.es.net\/assets\/fasterdata\/Firewall-tcptrace.pdf"},{"key":"e_1_3_2_1_15_1","unstructured":"High Energy Physics - Theory collaboration network. 2018. https:\/\/snap.stanford.edu\/data\/ca-HepTh.html  High Energy Physics - Theory collaboration network. 2018. https:\/\/snap.stanford.edu\/data\/ca-HepTh.html"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"Hong Chi-Yao and Kandula Srikanth and Mahajan Ratul and Zhang Ming and Gill Vijay and Nanduri Mohan and Wattenhofer Roger. 2013. Achieving high utilization with software-driven WAN ACM SIGCOMM CCR.  Hong Chi-Yao and Kandula Srikanth and Mahajan Ratul and Zhang Ming and Gill Vijay and Nanduri Mohan and Wattenhofer Roger. 2013. Achieving high utilization with software-driven WAN ACM SIGCOMM CCR.","DOI":"10.1145\/2486001.2486012"},{"key":"e_1_3_2_1_17_1","unstructured":"Intel Data Plane Development Kit. 2017. http:\/\/dpdk.org\/  Intel Data Plane Development Kit. 2017. http:\/\/dpdk.org\/"},{"key":"e_1_3_2_1_18_1","volume-title":"Min and others","author":"Jain Sushant","year":"2013","unstructured":"Jain , Sushant and Kumar , Alok and Mandal , Subhasree and Ong , Joon and Poutievski , Leon and Singh , Arjun and Venkata , Subbaiah and Wanderer , Jim and Zhou , Junlan and Zhu , Min and others . 2013 . B4: Experience with a globally-deployed software defined WAN, ACM SIGCOMM CCR. Jain, Sushant and Kumar, Alok and Mandal, Subhasree and Ong, Joon and Poutievski, Leon and Singh, Arjun and Venkata, Subbaiah and Wanderer, Jim and Zhou, Junlan and Zhu, Min and others. 2013. B4: Experience with a globally-deployed software defined WAN, ACM SIGCOMM CCR."},{"volume-title":"d.]. LMS: Label Management Service for intent-driven Cloud Management","author":"Joon-Myung Kang Jeongkeun Lee","key":"e_1_3_2_1_19_1","unstructured":"Joon-Myung Kang , Jeongkeun Lee , Vasudevan Nagendra , and Sujata Banerjee . [n. d.]. LMS: Label Management Service for intent-driven Cloud Management . In IFIP\/IEEE INM. Joon-Myung Kang, Jeongkeun Lee, Vasudevan Nagendra, and Sujata Banerjee. [n. d.]. LMS: Label Management Service for intent-driven Cloud Management. In IFIP\/IEEE INM."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836092"},{"key":"e_1_3_2_1_21_1","volume-title":"Proceedings of USENIX NSDI.","author":"Kim Hyojoon","year":"2015","unstructured":"Kim , Hyojoon and Reich , Joshua and Gupta , Arpit and Shahbaz , Muhammad and Feamster , Nick and Clark , Russ . 2015 . Kinetic: Verifiable Dynamic Network Control . In Proceedings of USENIX NSDI. Kim, Hyojoon and Reich, Joshua and Gupta, Arpit and Shahbaz, Muhammad and Feamster, Nick and Clark, Russ. 2015. Kinetic: Verifiable Dynamic Network Control. In Proceedings of USENIX NSDI."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3050227"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/eScience.2010.51"},{"key":"e_1_3_2_1_24_1","unstructured":"Michael DePhillips. 2018. Brookhaven National Laboratories Capabilities For Advanced Analyses Of Cyber Threats. https:\/\/www.bnl.gov\/isd\/documents\/86283.pdf  Michael DePhillips. 2018. Brookhaven National Laboratories Capabilities For Advanced Analyses Of Cyber Threats. https:\/\/www.bnl.gov\/isd\/documents\/86283.pdf"},{"key":"e_1_3_2_1_25_1","unstructured":"Microsoft Azure. 2018. https:\/\/azure.microsoft.com\/en-us\/  Microsoft Azure. 2018. https:\/\/azure.microsoft.com\/en-us\/"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of USENIX NSDI.","author":"Monsanto Christopher","year":"2013","unstructured":"Monsanto , Christopher and Reich , Joshua and Foster , Nate and Rexford , Jennifer and Walker , David . 2013 . Composing Software-defined Networks . In Proceedings of USENIX NSDI. Monsanto, Christopher and Reich, Joshua and Foster, Nate and Rexford, Jennifer and Walker, David. 2013. Composing Software-defined Networks. In Proceedings of USENIX NSDI."},{"key":"e_1_3_2_1_27_1","volume-title":"14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)","author":"Franck Le","year":"2017","unstructured":"Murad Kablan and Azzam Alsudais and Eric Keller and Franck Le . 2017 . Stateless Network Functions: Breaking the Tight Coupling of State and Processing , 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17) . Murad Kablan and Azzam Alsudais and Eric Keller and Franck Le. 2017. Stateless Network Functions: Breaking the Tight Coupling of State and Processing, 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI 17)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2810103.2813639"},{"key":"e_1_3_2_1_29_1","unstructured":"National research and education network. 2018. https:\/\/en.wikipedia.org\/wiki\/National_research_and_education_network  National research and education network. 2018. https:\/\/en.wikipedia.org\/wiki\/National_research_and_education_network"},{"key":"e_1_3_2_1_30_1","unstructured":"Open vSwitch with DPDK Overview. 2017. https:\/\/software.intel.com\/en-us\/articles\/open-vswitch-with-dpdk-overview  Open vSwitch with DPDK Overview. 2017. https:\/\/software.intel.com\/en-us\/articles\/open-vswitch-with-dpdk-overview"},{"key":"e_1_3_2_1_31_1","volume-title":"Open Virtual Switch","author":"OVS","year":"2017","unstructured":"OVS : Open Virtual Switch . 2017 . https:\/\/www.openvswitch.org\/ OVS: Open Virtual Switch. 2017. https:\/\/www.openvswitch.org\/"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41284-4_21"},{"key":"e_1_3_2_1_33_1","unstructured":"Penn state Minimum Security Baseline. 2017. http:\/\/www.rn.psu.edu\/wp-content\/uploads\/sites\/4349\/2016\/01\/Minimum-Security-Baseline-v004.pdf  Penn state Minimum Security Baseline. 2017. http:\/\/www.rn.psu.edu\/wp-content\/uploads\/sites\/4349\/2016\/01\/Minimum-Security-Baseline-v004.pdf"},{"key":"e_1_3_2_1_34_1","unstructured":"Performant Endpoint Visibility. 2017. https:\/\/osquery.io\/docs\/tables\/  Performant Endpoint Visibility. 2017. https:\/\/osquery.io\/docs\/tables\/"},{"key":"e_1_3_2_1_35_1","volume-title":"Draw your policies for OpenStack service","author":"Policy Canvas","year":"2018","unstructured":"Policy Canvas : Draw your policies for OpenStack service . 2018 . https:\/\/www.openstack.org\/assets\/presentation-media\/20160428-PolicyCanvas-OpenStackSummitAustin-print.pdf Policy Canvas: Draw your policies for OpenStack service. 2018. https:\/\/www.openstack.org\/assets\/presentation-media\/20160428-PolicyCanvas-OpenStackSummitAustin-print.pdf"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787506"},{"key":"e_1_3_2_1_37_1","unstructured":"PSUtils 5.2.2. 2017. https:\/\/pypi.python.org\/pypi\/psutil\/  PSUtils 5.2.2. 2017. https:\/\/pypi.python.org\/pypi\/psutil\/"},{"key":"e_1_3_2_1_38_1","unstructured":"Science DMZ ECAR - WG Technology Spotlight. 2017. https:\/\/library.educause.edu\/~\/media\/files\/library\/2015\/11\/erb1511.pdf  Science DMZ ECAR - WG Technology Spotlight. 2017. https:\/\/library.educause.edu\/~\/media\/files\/library\/2015\/11\/erb1511.pdf"},{"key":"e_1_3_2_1_39_1","unstructured":"Science DMZ Security - Firewalls vs. Router ACLs. 2017. https:\/\/fasterdata.es.net\/science-dmz\/science-dmz-security\/  Science DMZ Security - Firewalls vs. Router ACLs. 2017. https:\/\/fasterdata.es.net\/science-dmz\/science-dmz-security\/"},{"key":"e_1_3_2_1_40_1","volume-title":"IDS Load Balancer & Science DMZ","author":"SciPass","year":"2017","unstructured":"SciPass : IDS Load Balancer & Science DMZ . 2017 . https:\/\/globalnoc.iu.edu\/sdn\/scipass.html SciPass: IDS Load Balancer & Science DMZ. 2017. https:\/\/globalnoc.iu.edu\/sdn\/scipass.html"},{"volume-title":"Mogul","year":"2014","key":"e_1_3_2_1_41_1","unstructured":"Seyed Kaveh Fayazbakhsh and Luis Chiang and Vyas Sekar and Minlan Yu and Jeffrey C . Mogul . 2014 . Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. In Proceedings of USENIX NSDI. Seyed Kaveh Fayazbakhsh and Luis Chiang and Vyas Sekar and Minlan Yu and Jeffrey C. Mogul. 2014. Enforcing Network-Wide Policies in the Presence of Dynamic Middlebox Actions using FlowTags. In Proceedings of USENIX NSDI."},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of ISOC NDSS.","author":"Shin Seungwon","year":"2013","unstructured":"Shin , Seungwon and Porras , Phillip A and Yegneswaran , Vinod and Fong , Martin W and Gu , Guofei and Tyson , Mabry . 2013 . FRESCO: Modular Composable Security Services for Software-Defined Networks . In Proceedings of ISOC NDSS. Shin, Seungwon and Porras, Phillip A and Yegneswaran, Vinod and Fong, Martin W and Gu, Guofei and Tyson, Mabry. 2013. FRESCO: Modular Composable Security Services for Software-Defined Networks. In Proceedings of ISOC NDSS."},{"key":"e_1_3_2_1_43_1","unstructured":"The Risks of Not Deploying IPv6 in the R&E Community. 2017. https:\/\/esnetupdates.wordpress.com\/2012\/05\/21\/the-risks-of-not-deploying-ipv6-in-the-re-community-2\/  The Risks of Not Deploying IPv6 in the R&E Community. 2017. https:\/\/esnetupdates.wordpress.com\/2012\/05\/21\/the-risks-of-not-deploying-ipv6-in-the-re-community-2\/"},{"key":"e_1_3_2_1_44_1","unstructured":"UCSC 100 Gbps Science DMZ. 2015. https:\/\/meetings.internet2.edu\/media\/medialibrary\/2015\/09\/30\/20151005-Smith-RECommSciDMZ.pdf  UCSC 100 Gbps Science DMZ. 2015. https:\/\/meetings.internet2.edu\/media\/medialibrary\/2015\/09\/30\/20151005-Smith-RECommSciDMZ.pdf"},{"key":"e_1_3_2_1_45_1","unstructured":"UW Madison IT Security Baseline For Research and Academic Computing. 2017. https:\/\/aci.wisc.edu\/wp-content\/uploads\/2014\/07\/IT-Security-Baseline-for-Research-and-Academic-Computing-v1.pdf  UW Madison IT Security Baseline For Research and Academic Computing. 2017. https:\/\/aci.wisc.edu\/wp-content\/uploads\/2014\/07\/IT-Security-Baseline-for-Research-and-Academic-Computing-v1.pdf"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2017.23200"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098830"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25141-2_8"},{"volume-title":"Proceedings of ACM CoNEXT.","author":"Zhang Wei","key":"e_1_3_2_1_49_1","unstructured":"Zhang , Wei and Hwang , Jinho and Rajagopalan , Shriram and Ramakrishnan , K.K . and Wood, Timothy. 2016. Flurries: Countless Fine-Grained NFs for Flexible Per-Flow Customization , Proceedings of ACM CoNEXT. Zhang, Wei and Hwang, Jinho and Rajagopalan, Shriram and Ramakrishnan, K.K. and Wood, Timothy. 2016. Flurries: Countless Fine-Grained NFs for Flexible Per-Flow Customization, Proceedings of ACM CoNEXT."}],"event":{"name":"ACSAC '19: 2019 Annual Computer Security Applications Conference","acronym":"ACSAC '19","location":"San Juan Puerto Rico USA"},"container-title":["Proceedings of the 35th Annual Computer Security Applications Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359843","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359843","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3359789.3359843","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:45:04Z","timestamp":1750203904000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3359789.3359843"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,12,9]]},"references-count":49,"alternative-id":["10.1145\/3359789.3359843","10.1145\/3359789"],"URL":"https:\/\/doi.org\/10.1145\/3359789.3359843","relation":{},"subject":[],"published":{"date-parts":[[2019,12,9]]},"assertion":[{"value":"2019-12-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}