References
Scarfone K, Mell P. Guide to intrusion detection and prevention systems (IDPS). NIST Spec Publ, 2007, 800: 94
Malathi V, Takehiro S, Molly B, et al. Network function virtualization: a survey. IEICE Trans, 2017, 100: 1978–1991
Mishra P, Pilli E S, Varadharajan V, et al. Intrusion detection techniques in cloud environment: a survey. J Netw Comput Appl, 2017, 77: 18–47
Xiong W, Hu H P, Xiong N X, et al. Anomaly secure detection methods by analyzing dynamic characteristics of the network traffic in cloud communications. Inf Sci, 2014, 258: 403–415
Srikanth K, Sudipta S, Albert G, et al. The nature of data center traffic: measurements analysis. In: Proceedings of the 9th ACM SIGCOMM Internet Measurement Conference, Chicago, 2009. 202–208
Kreutz D, Ramos F M V, Esteves Verissimo P, et al. Software-defined networking: a comprehensive survey. Proc IEEE, 2015, 103: 14–76
Shin S, Wang H P, Gu G F. A first step toward network security virtualization: from concept to prototype. IEEE Trans Inform Forensic Secur, 2015, 10: 2236–2249
Holger D, Anja F, Vern P, et al. Predicting the resource consumption of network intrusion detection systems. In: Proceedings of ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2008. 135–154
Lorenzo D C, Robin S, Somesh J. Beyond pattern matching: a concurrency model for stateful deep packet inspection. In: Proceedings of ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, 2014. 1378–1390
Acknowledgements
This work was supported by National Key R&D Program of China (Grant No. 2020YFB1804705), Industrial Internet Innovation and Development Project (2019) — Project of Time Sensitive Network (TSN) Technology based Programmable Logical Controller (PLC) (Grant No. TC190A449), the Key R&D Program of Zhejiang Province (Grant Nos. 2020C01077, 2021C01036), and Major Scientific Project of Zhejiang Lab (Grant No. 2018FD0ZX01).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Xing, J., Wu, C., Zhou, H. et al. Efficient middlebox scaling for virtualized intrusion prevention systems in software-defined networks. Sci. China Inf. Sci. 65, 189102 (2022). https://doi.org/10.1007/s11432-019-2731-7
Received:
Revised:
Accepted:
Published:
DOI: https://doi.org/10.1007/s11432-019-2731-7