Publication | Open Access
LightBox
70
Citations
79
References
2019
Year
Unknown Venue
Hardware SecurityOff-site Software MiddleboxesRaw TrafficEngineeringInternet Traffic AnalysisDistributed MiddlewareEdge ComputingInformation SecurityCloud ComputingData PrivacyComputer ScienceRemote SiteNetwork Traffic MeasurementData SecurityMiddlewareNetwork Security
Running off-site software middleboxes at third-party service providers has been a popular practice. However, routing large volumes of raw traffic, which may carry sensitive information, to a remote site for processing raises severe security concerns. Prior solutions often abstract away important factors pertinent to real-world deployment. In particular, they overlook the significance of metadata protection and stateful processing. Unprotected traffic metadata like low-level headers, size and count, can be exploited to learn supposedly encrypted application contents. Meanwhile, tracking the states of 100,000s of flows concurrently is often indispensable in production-level middleboxes deployed at real networks.
| Year | Citations | |
|---|---|---|
Page 1
Page 1