Don't call them middleboxes, call them middlepipes
暂无分享,去创建一个
[1] Vyas Sekar,et al. Design and Implementation of a Consolidated Middlebox Architecture , 2012, NSDI.
[2] Mark Handley,et al. Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-End Protocol Semantics , 2001, USENIX Security Symposium.
[3] Anees Shaikh,et al. CloudNaaS: a cloud networking platform for enterprise applications , 2011, SoCC.
[4] Srinivasan Seshan,et al. Packet caches on routers: the implications of universal redundant traffic elimination , 2008, SIGCOMM '08.
[5] Martin Roesch,et al. Snort - Lightweight Intrusion Detection for Networks , 1999 .
[6] Ion Stoica,et al. Modeling middleboxes , 2008, IEEE Network.
[7] Andrew Warfield,et al. Split/Merge: System Support for Elastic Execution in Virtual Middleboxes , 2013, NSDI.
[8] Thomas E. Anderson,et al. An End to the Middle , 2009, HotOS.
[9] Vyas Sekar,et al. Making middleboxes someone else's problem: network processing as a cloud service , 2012, SIGCOMM '12.