References
- J. Novak., "Suricata TCP Evasions," Personal Blog, 2010 (http://www.packetstan.com/2010/09/ suricata-tcp-evasions.html).
- A. Pesterev, J. Strauss, N. Zeldovich, and R. T. Morris. "Improving network connection locality on multi-core systems," In Proceedings of the ACM European conference on Computer Systems (EuroSys), 2012.
- S. Han, S. Marshall, B.-G. Chun, and S. Ratnasamy. "MegaPipe: a new programming interface for scalable network I/O," In Proceedings of the USENIX conference on Operating Systems Design and Implementation (OSDI), 2012.
- E. Jung, S. Woo, M. Jamshed, H. Jung, S. Ihm, D. Han, K. Park. "mTCP: A Highly Scalable User-level TCP Stack for Multicore Systems," In Proceedings of the USENIX Symposium on Networked System Design and Implementation (NSDI), 2014.
- TCPDUMP. http://www.tcpdump.org.
- M. Roesch. "Snort - Lightweight Intrusion Detection for Networks," In Proceedings of the USENIX Systems Administration Conference (LISA), 1999.
- Y. Go, J. Won, D. Kune, E. Jung, Y. Kim, K. Park. "Gaining Control of Cellular Traffic Accounting by Spurious TCP Retransmission," In Proceedings of the 21st Annual Network and Distributed System Security Symposium (NDSS), 2014.
- Intel DPDK: Data Plane Development Kit. http:// dpdk.org/.
- S. Han, K. Jang, K. Park, and S. Moon . "PacketShader: a GPU-accelerated Software Router," In Proceedings of ACM SIGCOMM, 2010.
- L. Rizzo. "netmap: a novel framework for fast packet I/O,"In Proceedings of the USENIX conference on Annual Technical Conference (ATC), 2012.
- L. Deri. "Improving Passive Packet Capture: Beyond Device Polling," In Proceedings of the International System Administration and Network Engineering Conference (SANE), 2004.
- V. Sekar, N. Egi, S. Ratnasamy, M. K. Reiter, and G. Shi. "Design and Implementation of a Consolidated Middlebox Architecture,"In Proceedings of the USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2012.
- J. W. Anderson, R. Braud, R. Kapoor, G. Porter, and A. Vahdat. "xOMB: Extensible Open Middleboxes with Commodity Servers,"In Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems (ANCS), 2012.
- Suricata Intrusion Detection System. http://www. openinfosecfoundation.org/index.php/downloadsuricata.
- S. Woo, E. Jeong, S. Park, J. Lee, S. Ihm, and K.Park. "Comparison of caching strategies in modern cellular backhaul networks," In Proceedings of the Annual International Conference on Mobile Systems, Applications, and Services (MobiSys), 2013.
- M. Jamshed, J. Lee, S. Moon, I. Yun, D. Kim, S. Lee, Y. Yi, and K. Park. "Kargus: A Highly-scalable Software-based Intrusion Detection System,"In Proceedings of the 19th ACM Conference on Computer and Communications Security (CCS '12), 2012.
- K. Jang, S. Han, S. Han, S. Moon, and K. Park. "SSLShader: Cheap SSL Acceleration with Commodity Processors," In Proceedings of the 8th USENIX conference on Networked Systems Design and Implementation (NSDI), 2011.