{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:49:03Z","timestamp":1752983343500,"version":"3.41.0"},"reference-count":17,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2024,7,30]],"date-time":"2024-07-30T00:00:00Z","timestamp":1722297600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGCOMM Comput. Commun. Rev."],"published-print":{"date-parts":[[2024,7,30]]},"abstract":"<jats:p>Packet filtering has remained a key network monitoring primitive over decades, even as networking has continuously evolved. In this article we present the results of a survey we ran to collect data from the networking community, including researchers and practitioners, about how packet filtering is used. In doing so, we identify pain points related to packet filtering, and unmet needs of survey participants. Based on analysis of this survey data, we propose future research and development goals that would support the networking community.<\/jats:p>","DOI":"10.1145\/3711992.3711994","type":"journal-article","created":{"date-parts":[[2025,1,9]],"date-time":"2025-01-09T23:17:57Z","timestamp":1736464677000},"page":"2-9","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["A Survey on Packet Filtering"],"prefix":"10.1145","volume":"54","author":[{"given":"Nik","family":"Sultana","sequence":"first","affiliation":[{"name":"Illinois Institute of Technology"}]},{"given":"Hyunsuk","family":"Bang","sequence":"additional","affiliation":[{"name":"Illinois Institute of Technology"}]},{"given":"Elena","family":"Yulaeva","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]},{"given":"Ricky K. P.","family":"Mok","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]},{"given":"Kc","family":"Claffy","sequence":"additional","affiliation":[{"name":"CAIDA\/UC San Diego"}]},{"given":"Richard","family":"Mortier","sequence":"additional","affiliation":[{"name":"Cambridge University"}]}],"member":"320","published-online":{"date-parts":[[2025,1,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"2023. NSF FABRIC project announces groundbreaking high-speed network infrastructure expansion. https:\/\/learn.fabric-testbed.net\/knowledge-base\/nsf-fabric-project-announces-groundbreaking-high-speed-network-infrastructure-expansion\/. (2023)."},{"key":"e_1_2_1_2_1","unstructured":"2024. Corsaro 3: the Parallel Edition. https:\/\/github.com\/CAIDA\/corsaro3\/tree\/master. (2024). Accessed: 2024-02-26."},{"key":"e_1_2_1_3_1","unstructured":"2024. Data Plane Development Kit. https:\/\/www.dpdk.org\/. (2024). Accessed: 2024-02-26."},{"key":"e_1_2_1_4_1","unstructured":"2024. Juniper Networks mirror encapsulation (Jmirror). https:\/\/wiki.wireshark.org\/jmirror. (2024). Accessed: 2024-02-26."},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation (NSDI'18)","author":"Birkner R\u00fcdiger","year":"2018","unstructured":"R\u00fcdiger Birkner, Dana Drachsler-Cohen, Laurent Vanbever, and Martin Vechev. 2018. Net2Text: query-guided summarization of network forwarding behaviors. In Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation (NSDI'18). USENIX Association, USA, 609--623."},{"key":"e_1_2_1_6_1","volume-title":"Toutanova","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina N. Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. https:\/\/arxiv.org\/abs\/1810.04805"},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the 10th Conference on USENIX Security Symposium -","volume":"10","author":"Handley Mark","year":"2001","unstructured":"Mark Handley, Vern Paxson, and Christian Kreibich. 2001. Network intrusion detection: evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the 10th Conference on USENIX Security Symposium - Volume 10 (SSYM'01). USENIX Association, USA, 9."},{"key":"e_1_2_1_8_1","volume-title":"Advanced Data Mining and Applications: 6th International Conference, ADMA 2010, Proceedings, Part I (Lecture Notes in Computer Science)","volume":"6","author":"Kuusik R.","unstructured":"R. Kuusik and G. Lind. 2010. Some developments of determinacy analysis. In Advanced Data Mining and Applications: 6th International Conference, ADMA 2010, Proceedings, Part I (Lecture Notes in Computer Science), Vol. 6. Springer Berlin Heidelberg, Chongqing, China, 593--602. November 19-21."},{"key":"e_1_2_1_9_1","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1075\/plcp.2.14lue","article-title":"Determinacy form as the essence of language","volume":"2","author":"Luelsdorff Philip A.","year":"1996","unstructured":"Philip A. Luelsdorff and Sergej V. Chesnokov. 1996. Determinacy form as the essence of language. Prague Linguistic Circle Papers 2 (1996), 205--234.","journal-title":"Prague Linguistic Circle Papers"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/37499.37505"},{"volume-title":"The Art of Unix Programming","author":"Raymond Eric S","key":"e_1_2_1_11_1","unstructured":"Eric S Raymond. 2003. The Art of Unix Programming. Addison-Wesley Professional."},{"key":"e_1_2_1_12_1","volume-title":"2012 USENIX Annual Technical Conference (USENIX ATC 12)","author":"Rizzo Luigi","year":"2012","unstructured":"Luigi Rizzo. 2012. netmap: A Novel Framework for Fast Packet I\/O. In 2012 USENIX Annual Technical Conference (USENIX ATC 12). USENIX Association, Boston, MA, 101--112. https:\/\/www.usenix.org\/conference\/atc12\/technical-sessions\/presentation\/rizzo"},{"key":"e_1_2_1_13_1","unstructured":"Michael Smitasin. 2023. Network Tapping for Zeek: A Deep Dive. Presentation at ESnet's CI Engineering Lunch & Learn Series. (2023)."},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3300111.3300113"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3544216.3544227"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408792"},{"key":"e_1_2_1_17_1","volume-title":"Digital Age: Acquisition, Curation, and Dissemination of Spatial Cultural Heritage Data. 133--150.","author":"Zaslavsky Ilya","year":"2017","unstructured":"Ilya Zaslavsky, M. M. Burton, and T. E. Levy. 2017. A new approach to online visual analysis and sharing of archaeological surveys and image collections. In Heritage and Archaeology in the Digital Age: Acquisition, Curation, and Dissemination of Spatial Cultural Heritage Data. 133--150."}],"container-title":["ACM SIGCOMM Computer Communication Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711992.3711994","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711992.3711994","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:18:10Z","timestamp":1750295890000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711992.3711994"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,30]]},"references-count":17,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2024,7,30]]}},"alternative-id":["10.1145\/3711992.3711994"],"URL":"https:\/\/doi.org\/10.1145\/3711992.3711994","relation":{},"ISSN":["0146-4833"],"issn-type":[{"type":"print","value":"0146-4833"}],"subject":[],"published":{"date-parts":[[2024,7,30]]},"assertion":[{"value":"2025-01-09","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}