Programmable In-Network Obfuscation of Traffic.
Liang WangHyojoon KimPrateek MittalJennifer RexfordPublished in: CoRR (2020)
Keyphrases
- network traffic
- network resources
- traffic analysis
- traffic flow
- transportation networks
- network traffic monitoring
- internet traffic
- traffic data
- computer networks
- traffic load
- origin destination
- traffic flows
- network management
- complex networks
- resource utilization
- peer to peer
- network structure
- traffic volume
- network monitoring
- network layer
- wavelength division multiplexing
- traffic network
- network configuration
- ip traffic
- wireless sensor networks
- high speed networks
- traffic patterns
- general purpose
- network conditions
- real time
- anomaly detection
- network model
- reverse engineering
- communication networks