2019
DOI: 10.1002/ett.3788
|View full text |Cite
|
Sign up to set email alerts
|

A systematic literature review on formal verification of software‐defined networks

Abstract: By raising evolutionary network connections, a software‐defined network (SDN) offers a well‐managed and flexible novel network topology. The SDN efforts are provided to abstract the original network configuration for business applications and web services. Additionally, the SDN modifies the network management policies such as topology policies, deployment policies, the applicability, and infrastructure maintenance. One of the important features of the SDN is standardizing the network interfaces with the precis… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2

Citation Types

0
5
0

Year Published

2020
2020
2024
2024

Publication Types

Select...
3
3
1

Relationship

0
7

Authors

Journals

citations
Cited by 9 publications
(5 citation statements)
references
References 90 publications
0
5
0
Order By: Relevance
“…In this paper, we employ the term conformance checking to refer to the verification of high-level rule enforcement through execution traces, as it is commonly done in the business process community. We consider cases where the management plane does not have a deep understanding of the lower-level intricacies of the network and its models are thus too abstract to be directly used in traditional model checking [4]. This is often the case when decisions are taken by artificial intelligence [5].…”
Section: Background/related Workmentioning
confidence: 99%
“…In this paper, we employ the term conformance checking to refer to the verification of high-level rule enforcement through execution traces, as it is commonly done in the business process community. We consider cases where the management plane does not have a deep understanding of the lower-level intricacies of the network and its models are thus too abstract to be directly used in traditional model checking [4]. This is often the case when decisions are taken by artificial intelligence [5].…”
Section: Background/related Workmentioning
confidence: 99%
“…In terms of the techniques used in our method, there are various studies that used formal techniques in relation to SDN [10,11]. Reitblatt et al [12] proposed a rule tagging based update mechanism to ensure the consistency of packet forwarding.…”
Section: Related Workmentioning
confidence: 99%
“…Output flow from Switch1 is SF S1 (P). We can define the forwarding behavior of D NET with a given set of packet flows P, F B D NET (P) as (11) as follows:…”
mentioning
confidence: 99%
“…However, they often suffer from issues such as high computational complexity, suboptimal performance, and limited ability to handle large-scale and high-dimensional datasets. 6,33 To address these challenges, this research proposes an improved feature selection for defect detection by using mutation boosted salp swarm optimizer (MBSSO) in conjunction with Rough Set Theory. MBSSO is inspired by the foraging behavior of salps, which exhibits efficient exploration and exploitation capabilities.…”
Section: Introductionmentioning
confidence: 99%
“…Automated methods, such as filter, wrapper, or embedded techniques, have been proposed to overcome these limitations. However, they often suffer from issues such as high computational complexity, suboptimal performance, and limited ability to handle large‐scale and high‐dimensional datasets 6,33 …”
Section: Introductionmentioning
confidence: 99%