Conferences related to Middleboxes

Back to Top

2020 IEEE Symposium on Security and Privacy (SP)

Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2023 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2022 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2021 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2019 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2018 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2017 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2016 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2015 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for the presentation of developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.Papers offer novel research contributions in any aspect of computer security or electronic privacy. Papers may represent advances in the theory, design, implementation, analysis, or empirical evaluation of secure systems, either for general use or for specific application domains.

  • 2014 IEEE Symposium on Security and Privacy (SP)

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2013 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2012 IEEE Symposium on Security and Privacy (SP) Conference dates subject to change

    IEEE Symposium on Security and Privacy has been the premier forum for computer security research, presenting the latest developments and bringing together researchers and practitioners.

  • 2011 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2010 IEEE Symposium on Security and Privacy (SP)

    S&P is interested in all aspects of computer security and privacy.

  • 2009 IEEE Symposium on Security and Privacy (SP)

    The IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2008 IEEE Symposium on Security and Privacy (SP)

    Since 1980, the IEEE Symposium on Security and Privacy has been the premier forum for presenting developments in computer security and electronic privacy, and for bringing together researchers and practitioners in the field.

  • 2007 IEEE Symposium on Security and Privacy (SP)

    Research contributions in any aspect of computer security and electronic privacy including advances in the theory, design, implementation, analysis of empirical evaluation of secure systems.

  • 2006 IEEE Symposium on Security and Privacy (SP)

  • 2005 IEEE Symposium on Security and Privacy (SRSP)


GLOBECOM 2020 - 2020 IEEE Global Communications Conference

IEEE Global Communications Conference (GLOBECOM) is one of the IEEE Communications Society’s two flagship conferences dedicated to driving innovation in nearly every aspect of communications. Each year, more than 2,900 scientific researchers and their management submit proposals for program sessions to be held at the annual conference. After extensive peer review, the best of the proposals are selected for the conference program, which includes technical papers, tutorials, workshops and industry sessions designed specifically to advance technologies, systems and infrastructure that are continuing to reshape the world and provide all users with access to an unprecedented spectrum of high-speed, seamless and cost-effective global telecommunications services.


ICC 2020 - 2020 IEEE International Conference on Communications

All topics relating to existing and emerging communications networking technologies.


IEEE INFOCOM 2020 - IEEE Conference on Computer Communications

IEEE INFOCOM solicits research papers describing significant and innovative researchcontributions to the field of computer and data communication networks. We invite submissionson a wide range of research topics, spanning both theoretical and systems research.


2019 15th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

all aspects of wireless on-demand networks and systems; from protocol and network design, modeling, performance evaluation, energy efficiency, QoS models and mechanisms, practical implementations, service level aspects, application use-cases, to the integration of multiple wireless network technologies.

  • 2018 14th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

    all aspects of wireless on-demand networks and systems; from protocol and network design, modeling, performance evaluation, energy efficiency, QoS models and mechanisms, practical implementations, service level aspects, application use-cases, to the integration of multiple wireless network technologies.

  • 2017 13th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

    Wireless on-demand network systems and services have become pivotal in shaping our future networked world. Starting as a niche application over Wi-Fi, they can now be found in mainstream technologies like Bluetooth LE, LTE Direct and Wireless LANs, and have become the cornerstone of upcoming networking paradigms including mesh and sensor networks, cloud networks, vehicular networks, disruption tolerant and opportunistic networks, and in-body networks. The challenges of this exciting research field are numerous. Examples include how to make smart use of these novel technologies when multiple technologies or a mix of permanent services and on-demand networking opportunities are available to a network node, how to provide robust services in highly dynamic environments, how to efficiently employ and operate heavily resource-constrained devices, and how to develop robust and lightweight algorithms for self-organization and adaptation.

  • 2016 12th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

    Wireless on-demand network systems and services have become pivotal in shaping our future networked world. Starting as a niche application over Wi-Fi, they can now be found in mainstream technologies like Bluetooth LE, LTE Direct and Wireless LANs, and have become the cornerstone of upcoming networking paradigms including mesh and sensor networks, cloud networks, vehicular networks, disruption tolerant and opportunistic networks, and in-body networks. WONS, now numbering twelve editions, has established itself as a high quality forum to address these and related challenges. After a one-year break, WONS is able to continue to provide a global platform for rich interactions between experts in their fields, discussing innovative contributions in a stimulating environment.

  • 2014 11th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

    Providing secure, reliable, and dependable wireless services is the primary objective of modern data networks. While enabling technology for

  • 2013 10th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

    Providing secure, reliable, and dependable wireless services is the primary objective of modern data networks. While enabling technology for

  • 2012 9th Annual Conference on Wireless On-demand Network Systems and Services (WONS)

    Since users become increasingly dependent on wireless and mobile communications, it is necessary to secure a reliable and dependable technology support for "on-demand" services through any of the wireless architectures that have been in development recently. WONS has established itself as a high-quality forum to address these challenges.

  • 2011 Eighth International Conference on Wireless On-demand Network Systems and Services (WONS)

    Topics related to all kinds of wireless on-demand networks comprise, but are not limited to: * Architecture and design * Evaluation through simulations and experiments * Modeling * Integration and co-existence * Social and economic aspects * Pervasive and ubiquitous computing * Localization and mobility management * Security, privacy, and trust * Novel applications and services * Energy-efficient protocols and power management * Implementations and te

  • 2010 Seventh International Conference on Wireless On-demand Network Systems and Services (WONS)

    The conference addresses topics related to wireless ad hoc networks, mesh networks, vehicular networks and sensor networks

  • 2009 Sixth International Conference on Wireless On-demand Network Systems and Services (WONS)

    As more users become increasingly dependent on wireless and mobile communications, it is necessary to secure a reliable and dependable technology support for "on-demand" services through any of the wireless architectures that have been in development recently, such as mesh networks, wimax, wifi, ad hoc networks, sensor networks, etc.

  • 2008 Fifth Annual Conference on Wireless On demand Network Systems and Services (WONS 2008)

    With the increasing variety of wireless technologies, ubiquitous connectivity and service provisioning more and more complements traditional, infrastructure-based cellular networks. WLANs, WiMax, Mobile Ad-hoc networks as well as vehicular networks and sensor networks are popular examples. The goal is to provide services "on demand" with minimal planning and management effort as well as with little dependency on existing network infrastructures. On-demand provisioning of services in such infrastruct

  • 2007 Second Annual Conference on Wireless On demand Network Systems and Services (WONS 2007)


More Conferences

Periodicals related to Middleboxes

Back to Top

Communications Letters, IEEE

Covers topics in the scope of IEEE Transactions on Communications but in the form of very brief publication (maximum of 6column lengths, including all diagrams and tables.)


Communications Magazine, IEEE

IEEE Communications Magazine was the number three most-cited journal in telecommunications and the number eighteen cited journal in electrical and electronics engineering in 2004, according to the annual Journal Citation Report (2004 edition) published by the Institute for Scientific Information. Read more at http://www.ieee.org/products/citations.html. This magazine covers all areas of communications such as lightwave telecommunications, high-speed data communications, personal communications ...


Distributed Systems Online, IEEE

After nine years of publication, DS Online will be moving into a new phase as part of Computing Now (http://computingnow.computer.org), a new website providing the front end to all of the Computer Society's magazines. As such, DS Online will no longer be publishing standalone peer-reviewed articles.


Internet Computing, IEEE

IEEE Internet Computing provides journal-quality evaluation and review of emerging and maturing Internet technologies and applications. The magazine targets the technical and scientific Internet user communities as well as designers and developers of Internet-based applications and enabling technologies. IC publishes refereed articles on the latest developments and key trends in Internet technologies and applications. A crossroads between academic researchers and ...


Lightwave Technology, Journal of

All aspects of optical guided-wave science, technology, and engineering in the areas of fiber and cable technologies; active and passive guided-wave componentry (light sources, detectors, repeaters, switches, fiber sensors, etc.); integrated optics and optoelectronics; systems and subsystems; new applications; and unique field trials.


More Periodicals

Most published Xplore authors for Middleboxes

Back to Top

Xplore Articles related to Middleboxes

Back to Top

Monitoring and measuring wireless network performance in the presence of middleboxes

2011 Eighth International Conference on Wireless On-Demand Network Systems and Services, 2011

Monitoring and measurement of wireless networks play an important role for a number of reasons. In current networking scenarios, middleboxes (NAT, firewall, PEP, PCMS, ...) are more and more common. In this paper we present preliminary results of our ongoing work on the monitoring and measurement of the performance of real operational wireless networks in the presence of middleboxes. We ...


Prototype of an ICN based approach for flexible service chaining in SDN

2015 IEEE Conference on Computer Communications Workshops (INFOCOM WKSHPS), 2015

With the widespread use of middleboxes in communication networks (e.g., for services such as Firewall, DPI, accounting, proxies, caching), additional processing beyond simple forwarding has become common. With the emergence of Network Function Virtualization (NFV), dynamically instantiating these functions becomes even more feasible. In addition, chaining such services for packet flows is key to efficiently delivering Internet services. In addition, ...


A case for caching middleboxes for scalable MMT video delivery

2015 IEEE International Conference on Multimedia & Expo Workshops (ICMEW), 2015

We present a content-based caching architecture for scalable MMT video delivery. Our architecture places a caching proxy in the path between an MMT server and its clients. Between an MMT server and a caching proxy, we exploit the popular HTTP protocol to reliably synchronize the video contents by their fragments while the caching proxy delivers the MMT asset to the ...


Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks

200614th IEEE International Workshop on Quality of Service, 2006

This paper describes flow-cookies which defend against DDoS flooding attacks using bandwidth amplification. "Flow-cookies" is a mechanism in which a Website can reliably send filtering requests to a cooperating node in the network, leveraging its protection bandwidth. In this approach, a third party provider installs a flow-cookies enabled middlebox called the cookie box, in the network at a high bandwidth ...


A gatekeeper-based NAT traversal method for media transport in H.323 network system

Proceedings. 2005 International Conference on Wireless Communications, Networking and Mobile Computing, 2005., 2005

H.323 has application to a variety of network media, including local area networks, enterprise networks, Internet and wireless networks. But NAT (network address translation) traversal problem is baffling H.323 communication due to complex network situations and flaws of protocol. The existing traversal methods are not suitable for all network situations. They often require upgrading or adding other deceives and protocols ...


More Xplore Articles

Educational Resources on Middleboxes

Back to Top

IEEE.tv Videos

No IEEE.tv Videos are currently tagged "Middleboxes"

IEEE-USA E-Books

  • Monitoring and measuring wireless network performance in the presence of middleboxes

    Monitoring and measurement of wireless networks play an important role for a number of reasons. In current networking scenarios, middleboxes (NAT, firewall, PEP, PCMS, ...) are more and more common. In this paper we present preliminary results of our ongoing work on the monitoring and measurement of the performance of real operational wireless networks in the presence of middleboxes. We analyze the 3G network of two of the major operators in Europe and the satellite network of one of the major European providers of satellite connectivity. Our results show how middleboxes can deeply change the results of an experiment: in the presence of such devices, the performance parameters of interest can obtain completely different values when measured with different tools and methodologies. To cope with these issues, we propose an approach composed of both active and passive techniques, considering several layers in a combined fashion, using different traffic profiles, and looking at both side of the considered middleboxes.

  • Prototype of an ICN based approach for flexible service chaining in SDN

    With the widespread use of middleboxes in communication networks (e.g., for services such as Firewall, DPI, accounting, proxies, caching), additional processing beyond simple forwarding has become common. With the emergence of Network Function Virtualization (NFV), dynamically instantiating these functions becomes even more feasible. In addition, chaining such services for packet flows is key to efficiently delivering Internet services. In addition, Software Defined Networking (SDN) gives Internet Service Providers greater flexibility to provision such middlebox based services and route flows through them. However, with the dynamic instantiation of network functions, efficient and scalable use of these services requires separation of the services from their location. In this work, we implement and demonstrate an Information Centric Networking based solution that complements SDN for service chaining and provides benefits such as scalability, flexibility and reliability.

  • A case for caching middleboxes for scalable MMT video delivery

    We present a content-based caching architecture for scalable MMT video delivery. Our architecture places a caching proxy in the path between an MMT server and its clients. Between an MMT server and a caching proxy, we exploit the popular HTTP protocol to reliably synchronize the video contents by their fragments while the caching proxy delivers the MMT asset to the clients via the standard MMTP protocol. This split architecture not only allows distributing the load on theMMT server but also supports MMT clients without any modification on the MMTP protocol. Furthermore, our architecture supports content-based caching with little run-time overhead, eliminating any redundant network transfers.

  • Flow-Cookies: Using Bandwidth Amplification to Defend Against DDoS Flooding Attacks

    This paper describes flow-cookies which defend against DDoS flooding attacks using bandwidth amplification. "Flow-cookies" is a mechanism in which a Website can reliably send filtering requests to a cooperating node in the network, leveraging its protection bandwidth. In this approach, a third party provider installs a flow-cookies enabled middlebox called the cookie box, in the network at a high bandwidth link. All traffic to or from the protected Web server must traverse the cookie box. The cookie box guarantees that all packets that pass between it and the server belong to a legitimate TCP flow with a valid sender. This implementation is able to operate at gigabit speeds including per-packet IP filtering of millions of addresses. This approach is also very effective against high volume SYN flooding attacks

  • A gatekeeper-based NAT traversal method for media transport in H.323 network system

    H.323 has application to a variety of network media, including local area networks, enterprise networks, Internet and wireless networks. But NAT (network address translation) traversal problem is baffling H.323 communication due to complex network situations and flaws of protocol. The existing traversal methods are not suitable for all network situations. They often require upgrading or adding other deceives and protocols to support call procedure. In this paper, A NAT traversal method based on gatekeeper (GK) for media transport is proposed. This scheme only needs a gatekeeper server, which is able to route call. This resolving method is also very easy to implement without changing network situations. And it is very available for communications with many NAT deceives in applications. The mechanism may be used as the short-term solution for the NAT traversal problem in H.323 system.

  • Design and Realization of TCP-Based NAT Traversal in P2P

    IP address shortage over IPv4 is a big problem now, therefore the more massive deployment of NAT equipments is coming. One of the urgent problems for P2P is that how can each peer behind NAT find others and can establish direct connection to others. This paper discusses a TCP-based traversal model on the foundation of existing traversal methods having been analyzed, designs and presents the details for its realization.

  • OpenFunction: An extensible data plane abstraction protocol for platform-independent software-defined middleboxes

    We propose OpenFunction, an extensible data plane abstraction protocol for platform-independent software-defined middleboxes. The main challenge is how to abstract packet operations, flow states and event generations with elements. The key decision of OpenFunction is: actions/states/events operations should be defined in a uniform pattern and independent from each other. We implemented a working SDM system including one OpenFunction controller and OpenFunction boxes based on Netmap, DPDK and FPGA to verify OpenFunction abstraction.

  • Coflow Scheduling in the Multi-resource Environment

    In data centers, a lot of cluster computing applications follow the coflow working pattern. That is, a collection of flows between two groups of machines is semantically related. On the other hand, network function virtualization (NFV) sufficiently improves the performance of data center networks. It, however, complicates the network environment by introducing many multi- function middleboxes each with multiple resources. Coflows encounter extremely different processing delays under diverse network functions. Prior coflow scheduling schemes are insufficient to guarantee the coflow completion time (CCT) in the multi-resource environment. In this paper, we propose, model, and analyze the coflow scheduling problem in the multi-resource environment. We present a dedicated method, DRGC (Data Rate Guarantee for Coflow), to guarantee the data rate requirements of coflows in this situation. DRGC prioritizes the coflow scheduling sequence, assigns precise data rates for coflows, and deploys a packet scheduling algorithm at middleboxes to guarantee their transmissions. In our experiments, DRGC efficiently guarantees the completion times of coflows and supports 15% more workload, compared with other scheduling schemes.

  • D-StreaMon: From middlebox to distributed NFV framework for network monitoring

    Many reasons make NFV an attractive paradigm for IT security: lowers costs, agile operations and better isolation as well as fast security updates, improved incident responses and better level of automation. On the other side, the network threats tend to be increasingly complex and distributed, implying huge traffic scale to be monitored and increasingly strict mitigation delay requirements. Considering the current trend of the networking and the requirements to counteract to the evolution of cyber-threats, it is expected that also network monitoring will move towards NFV based solutions. In this paper, we present D-StreaMon an NFV-capable distributed framework for network monitoring realized to face the above described challenges. It relies on the StreaMon platform, a solution for network monitoring originally designed for traditional middleboxes. An evolution path which migrates StreaMon from middleboxes to Virtual Network Functions (VNFs) has been realized.

  • Click-on-OSv: A platform for running Click-based middleboxes

    In this paper, we present a modern platform for running Virtualized Network Functions based on the Click Modular Router. The proposed platform leverages of current technologies - such as DPDK, OSv, and REST Web Services - to fulfill the ETSI requirements for Network Functions Virtualization. The obtained results show the feasibility of the platform to consolidate disparate network functions, while demonstrating flexibility from a management point-of- view.



Standards related to Middleboxes

Back to Top

No standards are currently tagged "Middleboxes"


Jobs related to Middleboxes

Back to Top