2018
DOI: 10.1109/tnsm.2018.2822668
|View full text |Cite
|
Sign up to set email alerts
|

A Practical Byzantine-Based Approach for Faulty Switch Tolerance in Software-Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

3
27
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 22 publications
(30 citation statements)
references
References 48 publications
3
27
0
Order By: Relevance
“…While no solution exists to resolve the rational behavior of compromised switches i.e., being a malicious agent, it will try to hide its presence to induce maximum damage. Hence, we provide a hypervisor-based dynamic bayesian game-theoretic IDS for vSDN, which eliminates the need for an additional layer of the limited functionality [17] and allocates monitoring resources to vSDN controllers efficiently. Overall, the existing methods seek to maintain the performance of the overloaded network by adding more to the consumption of resources.…”
Section: Discussionmentioning
confidence: 99%
See 2 more Smart Citations
“…While no solution exists to resolve the rational behavior of compromised switches i.e., being a malicious agent, it will try to hide its presence to induce maximum damage. Hence, we provide a hypervisor-based dynamic bayesian game-theoretic IDS for vSDN, which eliminates the need for an additional layer of the limited functionality [17] and allocates monitoring resources to vSDN controllers efficiently. Overall, the existing methods seek to maintain the performance of the overloaded network by adding more to the consumption of resources.…”
Section: Discussionmentioning
confidence: 99%
“…To address the limitation mentioned above of incorrect information of flow statistics from the faulty switches, a Byzantine model-based prototype is proposed in the [17]. The objective of this model is to tolerate faulty switches automatically.…”
Section: ) Statistical Based Mechanismsmentioning
confidence: 99%
See 1 more Smart Citation
“…At present, the equation algorithm can no longer be well applied to the new blockchain environment, so the existing equation algorithm has to be improved. The practical byzantine fault tolerance (PBFT) algorithm can reduce the complexity of the original byzantine fault tolerance algorithm while improving the calculation efficiency without influence on the security of the algorithm [32,33]. However, the PBFT algorithm needs to give a limited condition to each node of the copy.…”
Section: Improvement Of Consensus Algorithm Of Digital Music Copyrmentioning
confidence: 99%
“…Some studies also considered reliability in this manner. In (Yuan et al, 2018) Yuan et al designed a system based on the Byzantine model to tolerate faulty switches in order to enhance reliability. Moreover, Song et al (Song et al, 2017) focused on control-path reliability which is an important consideration for out-of-band controllers whose network view can be affected by the data plane failures.…”
Section: Restoration Approachesmentioning
confidence: 99%