Filters








156 Hits in 3.5 sec

Software-defined networking (SDN): a survey

Kamal Benzekki, Abdeslam El Fergougui, Abdelbaki Elbelrhiti Elalaoui
2016 Security and Communication Networks  
In this fashion, SDN offers real-time performance and responds to high availability requirements.  ...  Additionally, we aim to present different existing solutions and mitigation techniques that address SDN scalability, elasticity, dependability, reliability, high availability, resiliency, security, and  ...  rules Desai et al. ✓ An algorithm: checking connectivity among Fast failure detection in SDN [84] neighboring switches for fast failure detection by using the OpenFlow switch's link signal Kempf et al  ... 
doi:10.1002/sec.1737 fatcat:emyctovhxfdm3cxio3itfynpdq

A Survey of Security in Software Defined Networks

Sandra Scott-Hayward, Sriram Natarajan, Sakir Sezer
2016 IEEE Communications Surveys and Tutorials  
Secure SDN [45] Protect the SDN Control Plane from attack Multiple controller structure with Byzantine-Fault Tolerant algorithm Authentication for Resilience TABLE V PROBLEM V AND SOLUTION PROPOSED  ...  The controller checks the tag for an identifier corresponding to malware or to secret data.  ... 
doi:10.1109/comst.2015.2453114 fatcat:7d46s7rtxrg3romy2zds72e5pm

Applying Formal Methods to Networking: Theory, Techniques, and Applications

Junaid Qadir, Osman Hasan
2015 IEEE Communications Surveys and Tutorials  
The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built  ...  Despite its great importance, modern network infrastructure is remarkable for the lack of rigor in its engineering.  ...  BDD is a very popular data structure that can be used, along with efficient graph algorithms for BDDs, to significantly improve the computing time and space efficiency of algorithms [90] , [91] . 4  ... 
doi:10.1109/comst.2014.2345792 fatcat:oc6l6pn4tnddjbbr5v4gbbuycq

Network Programming and Probabilistic Sketching for Securing the Data Plane

Maha Shamseddine, Wassim Itani, Ali Chehab, Ayman Kayssi
2018 Security and Communication Networks  
The main contributions of VISKA lie in (1) utilizing network programming and secure probabilistic sketching in SDN environments to dynamically detect and isolate parts of the data plane that experience  ...  This paper presents VISKA, a cloud security service for dynamically detecting malicious switching elements in software defined networking (SDN) infrastructures.  ...  In [22] the authors propose a framework for detecting and classifying anomalies in SDN using information theory and machine learning techniques.  ... 
doi:10.1155/2018/2905730 fatcat:nh2aewhxjre53knx4eqsaqoxs4

Theoretical bounds on control-plane self-monitoring in routing protocols

Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein
2007 Performance Evaluation Review  
# 000 patterns (in routing parlance, they analyze data-plane data while we analyze control-plane data).  ...  These algorithms are then used to compare and contrast the self-monitoring power these various classes of protocols possess.  ...  We presented practical algorithms for well-known routing protocols that show how this theory can be applied by a node which, through a simple analysis of its stateinformation, can check whether other nodes  ... 
doi:10.1145/1269899.1254921 fatcat:5mvtuqphabg7bg6t2j6hziyzui

Theoretical bounds on control-plane self-monitoring in routing protocols

Raj Kumar Rajendran, Vishal Misra, Dan Rubenstein
2007 Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '07  
# 000 patterns (in routing parlance, they analyze data-plane data while we analyze control-plane data).  ...  These algorithms are then used to compare and contrast the self-monitoring power these various classes of protocols possess.  ...  We presented practical algorithms for well-known routing protocols that show how this theory can be applied by a node which, through a simple analysis of its stateinformation, can check whether other nodes  ... 
doi:10.1145/1254882.1254921 dblp:conf/sigmetrics/RajendranMR07 fatcat:thw2cxvbcnfqbafoyu4qxubo6m

Static Equivalence Checking for OpenFlow Networks

Hyuk Lee, Jin-Young Choi
2021 Electronics  
Software-defined networking (SDN) provides many advantages over traditional networking by separating the control and data planes.  ...  Based on the definition, We present a method for checking the equivalence of OpenFlow network forwarding behaviors.  ...  Abbreviations The following abbreviations are used in this manuscript: SDN Software-defined networking SMT Satisfiability modulo theories QoS Quality of service  ... 
doi:10.3390/electronics10182207 fatcat:qkowe4742rgand4c5cfxx6qi7y

Modelling cyber security for software-defined networks those grow strong when exposed to threats

Usama Ahmed, Imran Raza, Syed Asad Hussain, Amjad Ali, Muddesar Iqbal, Xinheng Wang
2015 Journal of Reliable Intelligent Environments  
Both these perspectives of "Security with SDN" and "Security for SDN" have invited research and innovations, yet both these approaches remain disintegrated, failing to support each other.  ...  with SDN" and "Security for SDN" to achieve the overall objective of protecting our information from cyber threats in this globally connected internetwork.  ...  [19] problem and is formulated using Satisfiability Modulo Theories (SMT) [20] .  ... 
doi:10.1007/s40860-015-0008-0 fatcat:5uzcjwxp4bhnfbq3acw6srtmny

Adaptable and Data-Driven Softwarized Networks: Review, Opportunities, and Challenges[40pt]

Wolfgang Kellerer, Patrick Kalmbach, Andreas Blenk, Arsany Basta, Martin Reisslein, Stefan Schmid
2019 Proceedings of the IEEE  
for highly flexible network operations, enabling fast and simple adaptation of network resources and flows.  ...  In contrast to traditional networking technologies, software-oriented networking concepts, such as software-defined networking (SDN) and network function virtualization (NFV), provide ample opportunities  ...  For instance, control theory has been used to describe the system dynamics of congestion control algorithms [111] and to directly control flow rates [112] .  ... 
doi:10.1109/jproc.2019.2895553 fatcat:k5kucpmukfgf5ol7vg7j5di4f4

A Survey on Software-Defined Networking

Wenfeng Xia, Yonggang Wen, Chuan Heng Foh, Dusit Niyato, Haiyong Xie
2015 IEEE Communications Surveys and Tutorials  
SDN is characterized by its two distinguished features, including decoupling the control plane from the data plane and providing programmability for network application development.  ...  ., mobile, social, cloud, and big data) in information and communication technologies (ICT) are commanding new challenges to future Internet, for which ubiquitous accessibility, high bandwidth, and dynamic  ...  Along this line of research, Flow-Checker is proposed to identify intra-switch misconfigurations and inter-switch inconsistencies leveraging model checking [145] , [146] .  ... 
doi:10.1109/comst.2014.2330903 fatcat:7sfisfhitfepzooibipfovhlyy

Defining a Reliable Network Topology in Software-Defined Power Substations

Alexander Leal, Juan Felipe Botero
2019 IEEE Access  
These solutions include algorithms to solve problems related to the broadcast traffic containment and the diffusion and reliability of the multicast traffic.  ...  However, there is no unique criterion to define the structure of the topology in such networks, since in every substation the end user implements their own topology or the topology suggested by a vendor  ...  The proposed structure for this application is shown in Algorithm 2 and Fig. 15 .  ... 
doi:10.1109/access.2019.2893114 fatcat:sltfwdpnezexzihuh3szuiadp4

A Survey on Efforts to Evolve the Control Plane of Inter-Domain Routing

Walber Silva, Djamel Sadok
2018 Information  
This survey also discusses why the control plane's issues are hard to evolve and future perspectives for that topic.  ...  The BGP was introduced in the early stages of the Internet, and although the BGP is one of the most successful protocols, new desirable features have been difficult to incorporate into the network over  ...  A major feature of SDN is the decoupled control and data plane.  ... 
doi:10.3390/info9050125 fatcat:4jrfkl4flrd2rmjxce3uutx5py

SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment [article]

Tobias Fiebig, Franziska Lichtblau, Florian Streibelt, Thorben Krueger, Pieter Lexis, Randy Bush, Anja Feldmann
2016 arXiv   pre-print
security sensitive traps for operators, implementors and users.  ...  The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents.  ...  Other abuses of misconfiguration are stateless amplifications attacks (TFTP, DNS) where the root cause is that the server sends data without checking if the client wants it.  ... 
arXiv:1610.05531v1 fatcat:vaybjuis7rcnrnhlaetdhql6au

Methods and Tools for Policy Analysis

Amani Abu Jabal, Maryam Davari, Elisa Bertino, Christian Makaya, Seraphin Calo, Dinesh Verma, Alessandra Russo, Christopher Williams
2019 ACM Computing Surveys  
For supporting both spatial and temporal constraints, Kumar and Newman [123] introduced the Spatial-Temporal RBAC model (STRBAC).  ...  Policy-based management of computer systems, computer networks and devices is a critical technology especially for present and future systems characterized by large-scale systems with autonomous devices  ...  The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon.  ... 
doi:10.1145/3295749 fatcat:ujkyr4jeerdxdbeonmh2wnixhy

Survey of Consistent Software-Defined Network Updates

Klaus-Tycho Foerster, Stefan Schmid, Stefano Vissicchio
2018 IEEE Communications Surveys and Tutorials  
While our survey is mainly motivated by the advent of Software-Defined Networks (SDNs) and their primary need for correct and efficient update techniques, the fundamental underlying problems are not new  ...  This paper presents a structured survey of mechanism and protocols to update computer networks in a fast and consistent manner.  ...  ACKNOWLEDGEMENTS For inputs and feedback, we would like to thank Marco Canini, Nate Foster, Dejan Kostić, Ratul Mahajan, Roger Wattenhofer, and Jiaqi Zheng.  ... 
doi:10.1109/comst.2018.2876749 fatcat:wcegero4tvbmrkfogpqw6ze3ce
« Previous Showing results 1 — 15 out of 156 results