{"id":"https://openalex.org/W7116779903","doi":"https://doi.org/10.23919/cnsm67658.2025.11297512","title":"Enforcing Security Policies in the Application Layer and the Data Plane","display_name":"Enforcing Security Policies in the Application Layer and the Data Plane","publication_year":2025,"publication_date":"2025-10-27","ids":{"openalex":"https://openalex.org/W7116779903","doi":"https://doi.org/10.23919/cnsm67658.2025.11297512"},"language":null,"primary_location":{"id":"doi:10.23919/cnsm67658.2025.11297512","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm67658.2025.11297512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21st International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5118955081","display_name":"Federico Rinaudi","orcid":null},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":true,"raw_author_name":"Federico Rinaudi","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5011246061","display_name":"Alessio Sacco","orcid":"https://orcid.org/0000-0003-2835-5455"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Alessio Sacco","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Italy","institution_ids":["https://openalex.org/I177477856"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010269472","display_name":"Guido Marchetto","orcid":"https://orcid.org/0000-0003-3588-9367"},"institutions":[{"id":"https://openalex.org/I177477856","display_name":"Polytechnic University of Turin","ror":"https://ror.org/00bgk9508","country_code":"IT","type":"education","lineage":["https://openalex.org/I177477856"]}],"countries":["IT"],"is_corresponding":false,"raw_author_name":"Guido Marchetto","raw_affiliation_strings":["Politecnico di Torino,Department of Control and Computer Engineering,Italy"],"affiliations":[{"raw_affiliation_string":"Politecnico di Torino,Department of Control and Computer Engineering,Italy","institution_ids":["https://openalex.org/I177477856"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5118955081"],"corresponding_institution_ids":["https://openalex.org/I177477856"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.83294202,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"4"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8774999976158142,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.8774999976158142,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.04270000010728836,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.02370000071823597,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6247000098228455},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.590399980545044},{"id":"https://openalex.org/keywords/encryption","display_name":"Encryption","score":0.5609999895095825},{"id":"https://openalex.org/keywords/traffic-analysis","display_name":"Traffic analysis","score":0.555400013923645},{"id":"https://openalex.org/keywords/layer","display_name":"Layer (electronics)","score":0.5340999960899353},{"id":"https://openalex.org/keywords/resource","display_name":"Resource (disambiguation)","score":0.46630001068115234},{"id":"https://openalex.org/keywords/feature","display_name":"Feature (linguistics)","score":0.44519999623298645},{"id":"https://openalex.org/keywords/inference","display_name":"Inference","score":0.38040000200271606},{"id":"https://openalex.org/keywords/forwarding-plane","display_name":"Forwarding plane","score":0.3684000074863434},{"id":"https://openalex.org/keywords/pace","display_name":"Pace","score":0.34549999237060547}],"concepts":[{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6247000098228455},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.6111000180244446},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.590399980545044},{"id":"https://openalex.org/C148730421","wikidata":"https://www.wikidata.org/wiki/Q141090","display_name":"Encryption","level":2,"score":0.5609999895095825},{"id":"https://openalex.org/C2781317605","wikidata":"https://www.wikidata.org/wiki/Q7832483","display_name":"Traffic analysis","level":2,"score":0.555400013923645},{"id":"https://openalex.org/C2779227376","wikidata":"https://www.wikidata.org/wiki/Q6505497","display_name":"Layer (electronics)","level":2,"score":0.5340999960899353},{"id":"https://openalex.org/C206345919","wikidata":"https://www.wikidata.org/wiki/Q20380951","display_name":"Resource (disambiguation)","level":2,"score":0.46630001068115234},{"id":"https://openalex.org/C2776401178","wikidata":"https://www.wikidata.org/wiki/Q12050496","display_name":"Feature (linguistics)","level":2,"score":0.44519999623298645},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.39259999990463257},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.3815999925136566},{"id":"https://openalex.org/C2776214188","wikidata":"https://www.wikidata.org/wiki/Q408386","display_name":"Inference","level":2,"score":0.38040000200271606},{"id":"https://openalex.org/C10597312","wikidata":"https://www.wikidata.org/wiki/Q5473302","display_name":"Forwarding plane","level":3,"score":0.3684000074863434},{"id":"https://openalex.org/C2777526511","wikidata":"https://www.wikidata.org/wiki/Q691543","display_name":"Pace","level":2,"score":0.34549999237060547},{"id":"https://openalex.org/C182590292","wikidata":"https://www.wikidata.org/wiki/Q989632","display_name":"Network security","level":2,"score":0.3343999981880188},{"id":"https://openalex.org/C2779696439","wikidata":"https://www.wikidata.org/wiki/Q7512811","display_name":"Signature (topology)","level":2,"score":0.3264999985694885},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.3158000111579895},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.30869999527931213},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.3082999885082245},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.3046000003814697},{"id":"https://openalex.org/C158251709","wikidata":"https://www.wikidata.org/wiki/Q354025","display_name":"Intrusion","level":2,"score":0.30390000343322754},{"id":"https://openalex.org/C52622490","wikidata":"https://www.wikidata.org/wiki/Q1026626","display_name":"Feature extraction","level":2,"score":0.3034000098705292},{"id":"https://openalex.org/C10511746","wikidata":"https://www.wikidata.org/wiki/Q899388","display_name":"Data security","level":3,"score":0.2957000136375427},{"id":"https://openalex.org/C27061796","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion prevention system","level":3,"score":0.29490000009536743},{"id":"https://openalex.org/C38369872","wikidata":"https://www.wikidata.org/wiki/Q7445009","display_name":"Security analysis","level":2,"score":0.2906999886035919},{"id":"https://openalex.org/C117468950","wikidata":"https://www.wikidata.org/wiki/Q208074","display_name":"Network layer","level":3,"score":0.28380000591278076},{"id":"https://openalex.org/C45235069","wikidata":"https://www.wikidata.org/wiki/Q278425","display_name":"Table (database)","level":2,"score":0.2833999991416931},{"id":"https://openalex.org/C29202148","wikidata":"https://www.wikidata.org/wiki/Q287260","display_name":"Resource allocation","level":2,"score":0.27790001034736633},{"id":"https://openalex.org/C40305131","wikidata":"https://www.wikidata.org/wiki/Q2616305","display_name":"Obfuscation","level":2,"score":0.27149999141693115},{"id":"https://openalex.org/C204679922","wikidata":"https://www.wikidata.org/wiki/Q734252","display_name":"Deep packet inspection","level":3,"score":0.2689000070095062},{"id":"https://openalex.org/C175801342","wikidata":"https://www.wikidata.org/wiki/Q1988917","display_name":"Data analysis","level":2,"score":0.2635999917984009},{"id":"https://openalex.org/C190793597","wikidata":"https://www.wikidata.org/wiki/Q189768","display_name":"Application layer","level":3,"score":0.2635999917984009},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.26190000772476196},{"id":"https://openalex.org/C541664917","wikidata":"https://www.wikidata.org/wiki/Q14001","display_name":"Malware","level":2,"score":0.25999999046325684},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.25699999928474426},{"id":"https://openalex.org/C133462117","wikidata":"https://www.wikidata.org/wiki/Q4929239","display_name":"Data collection","level":2,"score":0.2567000091075897},{"id":"https://openalex.org/C20277647","wikidata":"https://www.wikidata.org/wiki/Q5227234","display_name":"Data access layer","level":3,"score":0.2556999921798706}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.23919/cnsm67658.2025.11297512","is_oa":false,"landing_page_url":"https://doi.org/10.23919/cnsm67658.2025.11297512","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2025 21st International Conference on Network and Service Management (CNSM)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":21,"referenced_works":["https://openalex.org/W1994926493","https://openalex.org/W2021949962","https://openalex.org/W2124423070","https://openalex.org/W2401862431","https://openalex.org/W2485000773","https://openalex.org/W2767153364","https://openalex.org/W2806616617","https://openalex.org/W2963704216","https://openalex.org/W2992960562","https://openalex.org/W3181596493","https://openalex.org/W3185618306","https://openalex.org/W4280526466","https://openalex.org/W4288057717","https://openalex.org/W4293901589","https://openalex.org/W4366493286","https://openalex.org/W4390102136","https://openalex.org/W4401537668","https://openalex.org/W4408325043","https://openalex.org/W4409316135","https://openalex.org/W4412346662","https://openalex.org/W7084162648"],"related_works":[],"abstract_inverted_index":{"Network":[0],"traffic":[1,29,91,121],"is":[2],"now":[3],"largely":[4],"encrypted.":[5],"Yet":[6],"analysis":[7,30,122],"of":[8,111],"side-channel":[9],"features-packet":[10],"sizes,":[11],"timings,":[12],"and":[13,33,43,64,84,93,107,123,135],"directions-can":[14],"still":[15],"reveal":[16],"patterns":[17,92],"about":[18],"encrypted":[19],"flows.":[20],"Recent":[21],"machine":[22],"learning":[23],"(ML)":[24],"techniques":[25],"have":[26],"made":[27],"such":[28,72],"more":[31],"powerful,":[32],"they":[34],"can":[35],"be":[36],"applied":[37],"both":[38,119],"offensively":[39],"(e.g.,":[40,45,80],"inference":[41],"attacks)":[42],"defensively":[44],"intrusion":[46],"detection).":[47],"This":[48],"raises":[49],"the":[50,109,130],"need":[51],"for":[52,97,126],"protections":[53],"that":[54],"keep":[55],"pace":[56],"with":[57,114],"MLenabled":[58],"capabilities":[59],"without":[60],"exacerbating":[61],"resource":[62],"overhead":[63],"reaction":[65],"delays.":[66],"My":[67,101],"research":[68],"explores":[69],"new":[70],"opportunities,":[71],"as":[73],"application-agnostic":[74],"defenses,":[75],"offered":[76],"by":[77],"data-plane":[78],"programmability":[79],"eBPF/XDP":[81],"at":[82],"hosts":[83],"P4":[85],"in":[86],"switches)":[87],"to":[88,118],"reshape":[89],"observable":[90],"fast":[94],"feature":[95],"extraction":[96],"advanced":[98],"detection":[99],"mechanisms.":[100],"PhD":[102],"also":[103],"focuses":[104],"on":[105],"designing":[106],"prototyping":[108],"combination":[110],"ML":[112],"together":[113],"programmable":[115],"data":[116],"planes":[117],"mitigate":[120],"harness":[124],"it":[125],"defense,":[127],"while":[128],"clarifying":[129],"trade-offs":[131],"between":[132],"privacy,":[133],"performance,":[134],"deployability.":[136]},"counts_by_year":[],"updated_date":"2025-12-23T23:11:35.936235","created_date":"2025-12-22T00:00:00"}
