Skip to main content
Log in

Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks

  • Letter
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

References

  1. Scarfone K, Mell P. Guide to intrusion detection and prevention systems (IDPS). NIST Spec Publ, 2007, 800: 94

    Google Scholar 

  2. Malathi V, Takehiro S, Molly B, et al. Network function virtualization: a survey. IEICE Trans, 2017, 100: 1978–1991

    Google Scholar 

  3. Mishra P, Pilli E S, Varadharajan V, et al. Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl, 2017, 77: 18–47

    Article  Google Scholar 

  4. Xiong W, Hu H P, Xiong N X, et al. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Inf Sci, 2014, 258: 403–415

    Article  MathSciNet  Google Scholar 

  5. Srikanth K, Sudipta S, Albert G, et al. The nature of data center traffic: measurements analysis. In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, Chicago, 2009. 202–208

  6. Kreutz D, Ramos F M V, Esteves Verissimo P, et al. Software-defined networking: a comprehensive survey. Proc IEEE, 2015, 103: 14–76

    Article  Google Scholar 

  7. Shin S, Wang H P, Gu G F. A first step toward network security virtualization: from concept to prototype. IEEE Trans Inform Forensic Secur, 2015, 10: 2236–2249

    Article  Google Scholar 

  8. Holger D, Anja F, Vern P, et al. Predicting the resource consumption of network intrusion detection systems. In: Proceedings of ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008. 135–154

  9. Lorenzo D C, Robin S, Somesh J. Beyond pattern matching: a concurrency model for stateful deep packet inspection. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 1378–1390

Download references

Acknowledgements

This work was supported by National Key R&D Program of China (Grant No. 2020YFB1804705), Industrial Internet Innovation and Development Project (2019) — Project of Time Sensitive Network (TSN) Technology based Programmable Logical Controller (PLC) (Grant No. TC190A449), the Key R&D Program of Zhejiang Province (Grant Nos. 2020C01077, 2021C01036), and Major Scientific Project of Zhejiang Lab (Grant No. 2018FD0ZX01).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Chunming Wu.

Supplementary File

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Xing, J., Wu, C., Zhou, H. et al. Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks. Sci. China Inf. Sci. 65, 189102 (2022). https://doi.org/10.1007/s11432-019-2731-7

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s11432-019-2731-7

Navigation