Proceedings of the Genetic and Evolutionary Computation Conference Companion 2019
DOI: 10.1145/3319619.3326853
|View full text |Cite
|
Sign up to set email alerts
|

A role-base approach and a genetic algorithm for VLAN design in large critical infrastructures

Abstract: The use of the virtual local area networks (VLAN) technology is a well-known method of restricting access to network elements in heterogeneous network infrastructures, including critical infrastructures. The essence of the VLAN usage is to create a set of virtual subnets and in the distribution of computers on these subnets. This distribution is described by a "computer-subnet" matrix, called the VLAN-based access control scheme. The formation of an access control scheme is an NP-complete problem, and for its … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
3
3

Relationship

0
6

Authors

Journals

citations
Cited by 8 publications
(5 citation statements)
references
References 19 publications
0
4
0
Order By: Relevance
“…Saenko and Kotenko [37] introduce the concept of VLAN "roles" and use the role-based method to simplify VLAN-based access control schemes. An enhanced genetic method is presented to tackle the optimization problem.…”
Section: Development Software-defined Network By Using Virtual Local ...mentioning
confidence: 99%
See 1 more Smart Citation
“…Saenko and Kotenko [37] introduce the concept of VLAN "roles" and use the role-based method to simplify VLAN-based access control schemes. An enhanced genetic method is presented to tackle the optimization problem.…”
Section: Development Software-defined Network By Using Virtual Local ...mentioning
confidence: 99%
“…This optimization depends on the SDN's promising capabilities. Studies [35]- [37] reduce cost, and time of service and discover the error early, by creating and executing the application to control the VLAN depending on the SDN.…”
Section: Development Software-defined Network By Using Virtual Local ...mentioning
confidence: 99%
“…The changes that have been made have been minimal [33]. Every day there are complaints, in addition to the excessive waiting time when exchanging waiting time at the moment of exchanging information, generating discomfort.…”
Section: Interview Analysis Using Atlas Timentioning
confidence: 99%
“…In the first group, GAs with binary coding were studied [10] - [11]. In the second group, respectively, GAs with valid coding [12] - [13]. In [12], it was shown that in the first group it is possible to achieve higher efficiency of searching for extreme values on the set of feasible solutions.…”
Section: Review and Analysis Of Previous Studiesmentioning
confidence: 99%
“…In [12] - [14] it was shown that the constant mutation of objects is used in most GA implementations. Variables in this case are more flexible, which makes it possible to find initial solutions already at sufficiently early stages of the GA operation.…”
Section: Review and Analysis Of Previous Studiesmentioning
confidence: 99%