{"id":"https://openalex.org/W2057384247","doi":"https://doi.org/10.1109/cns.2013.6682721","title":"Scalable hardware monitors to protect network processors from data plane attacks","display_name":"Scalable hardware monitors to protect network processors from data plane attacks","publication_year":2013,"publication_date":"2013-10-01","ids":{"openalex":"https://openalex.org/W2057384247","doi":"https://doi.org/10.1109/cns.2013.6682721","mag":"2057384247"},"language":"en","primary_location":{"id":"doi:10.1109/cns.2013.6682721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2013.6682721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5067589103","display_name":"Kekai Hu","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Kekai Hu","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5010584113","display_name":"Harikrishnan Kumarapillai Chandrikakutty","orcid":null},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Harikrishnan Chandrikakutty","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5012168703","display_name":"Russell Tessier","orcid":"https://orcid.org/0000-0003-0591-7566"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Russell Tessier","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5082067982","display_name":"Tilman Wolf","orcid":"https://orcid.org/0000-0003-0449-0441"},"institutions":[{"id":"https://openalex.org/I24603500","display_name":"University of Massachusetts Amherst","ror":"https://ror.org/0072zz521","country_code":"US","type":"education","lineage":["https://openalex.org/I24603500"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tilman Wolf","raw_affiliation_strings":["Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA"],"affiliations":[{"raw_affiliation_string":"Department of Electrical and Computer Engineering, University of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]},{"raw_affiliation_string":"Dept. of Electr. & Comput. Eng., Univ. of Massachusetts, Amherst, MA, USA","institution_ids":["https://openalex.org/I24603500"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5067589103"],"corresponding_institution_ids":["https://openalex.org/I24603500"],"apc_list":null,"apc_paid":null,"fwci":1.4498,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.84287288,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"314","last_page":"322"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/network-processor","display_name":"Network processor","score":0.8318967819213867},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7997224926948547},{"id":"https://openalex.org/keywords/packet-processing","display_name":"Packet processing","score":0.6272597908973694},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.6142078042030334},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.6077204346656799},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.5785844326019287},{"id":"https://openalex.org/keywords/multi-core-processor","display_name":"Multi-core processor","score":0.5408599376678467},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.5341172814369202},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.5221850275993347},{"id":"https://openalex.org/keywords/networking-hardware","display_name":"Networking hardware","score":0.43647637963294983},{"id":"https://openalex.org/keywords/packet-forwarding","display_name":"Packet forwarding","score":0.43514540791511536},{"id":"https://openalex.org/keywords/denial-of-service-attack","display_name":"Denial-of-service attack","score":0.4317170977592468},{"id":"https://openalex.org/keywords/field-programmable-gate-array","display_name":"Field-programmable gate array","score":0.4182884395122528},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.3488665223121643},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.3207167983055115},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.28387022018432617},{"id":"https://openalex.org/keywords/the-internet","display_name":"The Internet","score":0.17319422960281372}],"concepts":[{"id":"https://openalex.org/C74366991","wikidata":"https://www.wikidata.org/wiki/Q2755335","display_name":"Network processor","level":3,"score":0.8318967819213867},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7997224926948547},{"id":"https://openalex.org/C2779581428","wikidata":"https://www.wikidata.org/wiki/Q7122997","display_name":"Packet processing","level":3,"score":0.6272597908973694},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.6142078042030334},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.6077204346656799},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.5785844326019287},{"id":"https://openalex.org/C78766204","wikidata":"https://www.wikidata.org/wiki/Q555032","display_name":"Multi-core processor","level":2,"score":0.5408599376678467},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.5341172814369202},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.5221850275993347},{"id":"https://openalex.org/C159631557","wikidata":"https://www.wikidata.org/wiki/Q1546066","display_name":"Networking hardware","level":2,"score":0.43647637963294983},{"id":"https://openalex.org/C120317029","wikidata":"https://www.wikidata.org/wiki/Q874048","display_name":"Packet forwarding","level":3,"score":0.43514540791511536},{"id":"https://openalex.org/C38822068","wikidata":"https://www.wikidata.org/wiki/Q131406","display_name":"Denial-of-service attack","level":3,"score":0.4317170977592468},{"id":"https://openalex.org/C42935608","wikidata":"https://www.wikidata.org/wiki/Q190411","display_name":"Field-programmable gate array","level":2,"score":0.4182884395122528},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.3488665223121643},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.3207167983055115},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.28387022018432617},{"id":"https://openalex.org/C110875604","wikidata":"https://www.wikidata.org/wiki/Q75","display_name":"The Internet","level":2,"score":0.17319422960281372}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cns.2013.6682721","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cns.2013.6682721","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 IEEE Conference on Communications and Network Security (CNS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":13,"referenced_works":["https://openalex.org/W1671758863","https://openalex.org/W1964391394","https://openalex.org/W1964825150","https://openalex.org/W1969953346","https://openalex.org/W1981737703","https://openalex.org/W2012170825","https://openalex.org/W2022748185","https://openalex.org/W2024398916","https://openalex.org/W2036079615","https://openalex.org/W2046209263","https://openalex.org/W2065933553","https://openalex.org/W2146966321","https://openalex.org/W2155750235"],"related_works":["https://openalex.org/W2752279300","https://openalex.org/W3192984318","https://openalex.org/W2294558967","https://openalex.org/W2022748185","https://openalex.org/W2156114432","https://openalex.org/W3004221938","https://openalex.org/W2324836335","https://openalex.org/W3026084273","https://openalex.org/W4214772975","https://openalex.org/W2054450214"],"abstract_inverted_index":{"Modern":[0],"router":[1],"hardware":[2,93,119,162],"in":[3,18],"computer":[4],"networks":[5],"is":[6,89],"based":[7],"on":[8,195],"programmable":[9],"network":[10,38,63,87,130,177],"processors,":[11],"which":[12,156],"implement":[13],"various":[14],"packet":[15,58,67],"forwarding":[16],"operations":[17,99],"software.":[19],"These":[20],"processor":[21,64,102,127,166],"systems":[22,95],"are":[23],"vulnerable":[24,66],"to":[25,42,135,176],"attacks":[26],"that":[27,53,96],"can":[28,59],"be":[29],"launched":[30],"entirely":[31],"through":[32],"the":[33,37,43,47,78,90,98,148,158,170,192],"data":[34],"plane":[35],"of":[36,46,92,100,133,137,150,161,172,182,191],"without":[39],"any":[40],"access":[41],"control":[44],"interface":[45],"router.":[48],"Prior":[49],"work":[50],"has":[51],"shown":[52],"a":[54,62,72,151,187],"single":[55,126],"malformed":[56],"UDP":[57],"take":[60],"over":[61],"running":[65],"processing":[68],"software":[69],"and":[70,112,115],"trigger":[71],"devastating":[73],"denial-of-service":[74],"attack":[75,111],"from":[76,106],"within":[77],"network.":[79],"One":[80],"possible":[81],"defense":[82],"mechanism":[83],"for":[84,125],"these":[85],"resource-constrained":[86],"processors":[88,131,138,178],"use":[91],"monitoring":[94,163,174,193],"track":[97],"each":[101],"core.":[103],"Any":[104],"deviation":[105],"programmed":[107],"behavior":[108],"indicates":[109],"an":[110,196],"triggers":[113],"reset":[114],"recovery":[116],"actions.":[117],"Such":[118],"monitors":[120],"have":[121],"been":[122],"studied":[123],"extensively":[124],"cores,":[128],"but":[129],"consist":[132],"dozens":[134],"hundreds":[136],"with":[139,179],"highly":[140],"dynamic":[141,159],"workloads.":[142],"In":[143],"this":[144],"paper,":[145],"we":[146],"present":[147,186],"design":[149],"Scalable":[152],"Hardware":[153],"Monitoring":[154],"Grid,":[155],"allows":[157],"sharing":[160],"resources":[164],"among":[165],"cores.":[167,183],"We":[168,184],"show":[169],"scalability":[171],"our":[173],"system":[175,194],"large":[180],"numbers":[181],"also":[185],"multicore":[188],"prototype":[189],"implementation":[190],"FPGA":[197],"platform.":[198]},"counts_by_year":[{"year":2021,"cited_by_count":3},{"year":2018,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":2}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
