A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Filters
Software-defined networking (SDN): a survey
2016
Security and Communication Networks
In this fashion, SDN offers real-time performance and responds to high availability requirements. ...
Additionally, we aim to present different existing solutions and mitigation techniques that address SDN scalability, elasticity, dependability, reliability, high availability, resiliency, security, and ...
rules Desai et al. ✓ An algorithm: checking connectivity among Fast failure detection in SDN [84] neighboring switches for fast failure detection by using the OpenFlow switch's link signal Kempf et al ...
doi:10.1002/sec.1737
fatcat:emyctovhxfdm3cxio3itfynpdq
A Survey of Security in Software Defined Networks
2016
IEEE Communications Surveys and Tutorials
Secure SDN [45]
Protect the SDN Control Plane from attack
Multiple controller structure with
Byzantine-Fault Tolerant algorithm
Authentication for Resilience
TABLE V PROBLEM V AND SOLUTION PROPOSED ...
The controller checks the tag for an identifier corresponding to malware or to secret data. ...
doi:10.1109/comst.2015.2453114
fatcat:7d46s7rtxrg3romy2zds72e5pm
Applying Formal Methods to Networking: Theory, Techniques, and Applications
2015
IEEE Communications Surveys and Tutorials
The lack of formalization of the Internet architecture meant limited abstractions and modularity, especially for the control and management planes, thus requiring for every new need a new protocol built ...
Despite its great importance, modern network infrastructure is remarkable for the lack of rigor in its engineering. ...
BDD is a very popular data structure that can be used, along with efficient graph algorithms for BDDs, to significantly improve the computing time and space efficiency of algorithms [90] , [91] .
4 ...
doi:10.1109/comst.2014.2345792
fatcat:oc6l6pn4tnddjbbr5v4gbbuycq
Network Programming and Probabilistic Sketching for Securing the Data Plane
2018
Security and Communication Networks
The main contributions of VISKA lie in (1) utilizing network programming and secure probabilistic sketching in SDN environments to dynamically detect and isolate parts of the data plane that experience ...
This paper presents VISKA, a cloud security service for dynamically detecting malicious switching elements in software defined networking (SDN) infrastructures. ...
In [22] the authors propose a framework for detecting and classifying anomalies in SDN using information theory and machine learning techniques. ...
doi:10.1155/2018/2905730
fatcat:nh2aewhxjre53knx4eqsaqoxs4
Theoretical bounds on control-plane self-monitoring in routing protocols
2007
Performance Evaluation Review
# 000 patterns (in routing parlance, they analyze data-plane data while we analyze control-plane data). ...
These algorithms are then used to compare and contrast the self-monitoring power these various classes of protocols possess. ...
We presented practical algorithms for well-known routing protocols that show how this theory can be applied by a node which, through a simple analysis of its stateinformation, can check whether other nodes ...
doi:10.1145/1269899.1254921
fatcat:5mvtuqphabg7bg6t2j6hziyzui
Theoretical bounds on control-plane self-monitoring in routing protocols
2007
Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems - SIGMETRICS '07
# 000 patterns (in routing parlance, they analyze data-plane data while we analyze control-plane data). ...
These algorithms are then used to compare and contrast the self-monitoring power these various classes of protocols possess. ...
We presented practical algorithms for well-known routing protocols that show how this theory can be applied by a node which, through a simple analysis of its stateinformation, can check whether other nodes ...
doi:10.1145/1254882.1254921
dblp:conf/sigmetrics/RajendranMR07
fatcat:thw2cxvbcnfqbafoyu4qxubo6m
Static Equivalence Checking for OpenFlow Networks
2021
Electronics
Software-defined networking (SDN) provides many advantages over traditional networking by separating the control and data planes. ...
Based on the definition, We present a method for checking the equivalence of OpenFlow network forwarding behaviors. ...
Abbreviations The following abbreviations are used in this manuscript:
SDN Software-defined networking SMT Satisfiability modulo theories QoS Quality of service ...
doi:10.3390/electronics10182207
fatcat:qkowe4742rgand4c5cfxx6qi7y
Modelling cyber security for software-defined networks those grow strong when exposed to threats
2015
Journal of Reliable Intelligent Environments
Both these perspectives of "Security with SDN" and "Security for SDN" have invited research and innovations, yet both these approaches remain disintegrated, failing to support each other. ...
with SDN" and "Security for SDN" to achieve the overall objective of protecting our information from cyber threats in this globally connected internetwork. ...
[19] problem and is formulated using Satisfiability Modulo Theories (SMT) [20] . ...
doi:10.1007/s40860-015-0008-0
fatcat:5uzcjwxp4bhnfbq3acw6srtmny
Adaptable and Data-Driven Softwarized Networks: Review, Opportunities, and Challenges[40pt]
2019
Proceedings of the IEEE
for highly flexible network operations, enabling fast and simple adaptation of network resources and flows. ...
In contrast to traditional networking technologies, software-oriented networking concepts, such as software-defined networking (SDN) and network function virtualization (NFV), provide ample opportunities ...
For instance, control theory has been used to describe the system dynamics of congestion control algorithms [111] and to directly control flow rates [112] . ...
doi:10.1109/jproc.2019.2895553
fatcat:k5kucpmukfgf5ol7vg7j5di4f4
A Survey on Software-Defined Networking
2015
IEEE Communications Surveys and Tutorials
SDN is characterized by its two distinguished features, including decoupling the control plane from the data plane and providing programmability for network application development. ...
., mobile, social, cloud, and big data) in information and communication technologies (ICT) are commanding new challenges to future Internet, for which ubiquitous accessibility, high bandwidth, and dynamic ...
Along this line of research, Flow-Checker is proposed to identify intra-switch misconfigurations and inter-switch inconsistencies leveraging model checking [145] , [146] . ...
doi:10.1109/comst.2014.2330903
fatcat:7sfisfhitfepzooibipfovhlyy
Defining a Reliable Network Topology in Software-Defined Power Substations
2019
IEEE Access
These solutions include algorithms to solve problems related to the broadcast traffic containment and the diffusion and reliability of the multicast traffic. ...
However, there is no unique criterion to define the structure of the topology in such networks, since in every substation the end user implements their own topology or the topology suggested by a vendor ...
The proposed structure for this application is shown in Algorithm 2 and Fig. 15 . ...
doi:10.1109/access.2019.2893114
fatcat:sltfwdpnezexzihuh3szuiadp4
A Survey on Efforts to Evolve the Control Plane of Inter-Domain Routing
2018
Information
This survey also discusses why the control plane's issues are hard to evolve and future perspectives for that topic. ...
The BGP was introduced in the early stages of the Internet, and although the BGP is one of the most successful protocols, new desirable features have been difficult to incorporate into the network over ...
A major feature of SDN is the decoupled control and data plane. ...
doi:10.3390/info9050125
fatcat:4jrfkl4flrd2rmjxce3uutx5py
SoK: An Analysis of Protocol Design: Avoiding Traps for Implementation and Deployment
[article]
2016
arXiv
pre-print
security sensitive traps for operators, implementors and users. ...
The resulting Misconfigurations, i.e., not enabling strong authentication, are common root causes for Internet security incidents. ...
Other abuses of misconfiguration are stateless amplifications attacks (TFTP, DNS) where the root cause is that the server sends data without checking if the client wants it. ...
arXiv:1610.05531v1
fatcat:vaybjuis7rcnrnhlaetdhql6au
Methods and Tools for Policy Analysis
2019
ACM Computing Surveys
For supporting both spatial and temporal constraints, Kumar and Newman [123] introduced the Spatial-Temporal RBAC model (STRBAC). ...
Policy-based management of computer systems, computer networks and devices is a critical technology especially for present and future systems characterized by large-scale systems with autonomous devices ...
The U.S. and U.K. Governments are authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation hereon. ...
doi:10.1145/3295749
fatcat:ujkyr4jeerdxdbeonmh2wnixhy
Survey of Consistent Software-Defined Network Updates
2018
IEEE Communications Surveys and Tutorials
While our survey is mainly motivated by the advent of Software-Defined Networks (SDNs) and their primary need for correct and efficient update techniques, the fundamental underlying problems are not new ...
This paper presents a structured survey of mechanism and protocols to update computer networks in a fast and consistent manner. ...
ACKNOWLEDGEMENTS For inputs and feedback, we would like to thank Marco Canini, Nate Foster, Dejan Kostić, Ratul Mahajan, Roger Wattenhofer, and Jiaqi Zheng. ...
doi:10.1109/comst.2018.2876749
fatcat:wcegero4tvbmrkfogpqw6ze3ce
« Previous
Showing results 1 — 15 out of 156 results