2016
DOI: 10.1587/transcom.2015ebp3329
|View full text |Cite
|
Sign up to set email alerts
|

A Verification Method of SDN Firewall Applications

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 7 publications
(8 citation statements)
references
References 12 publications
0
8
0
Order By: Relevance
“…VeriSDN [7], [9] is a framework verifying the firewall application from among SDN applications by using pACSR [9], an extension of the algebra of communicating shared resources (ACSR) [19], [20]. It verifies the rule conflicts that occur due to the multiple applications executed within the SDN controller.…”
Section: Related Workmentioning
confidence: 99%
See 2 more Smart Citations
“…VeriSDN [7], [9] is a framework verifying the firewall application from among SDN applications by using pACSR [9], an extension of the algebra of communicating shared resources (ACSR) [19], [20]. It verifies the rule conflicts that occur due to the multiple applications executed within the SDN controller.…”
Section: Related Workmentioning
confidence: 99%
“…We use the simplified rules determining whether to forward a packet with the IP information as in [8], [9], [22]. Rules are applied to each packet sequentially using the example of firewall rules described in [8], [9], [22], which is modified by adding the protocol information to rules, as summarized in Table 2.…”
Section: ) Firewall Policy For An Sdn Controllermentioning
confidence: 99%
See 1 more Smart Citation
“…This algorithm underlies the Synoptic 1 tool [9] that can learn Markov models of processes. The Invarimint tool [18] is also based on k-tails but produces simpler, socalled declarative automata, without probabilities on the edges. In the field of statistical automata learning algorithms, there is the approach proposed by Carrasco [19] for inferring grammar of languages by stochastic methods used in [20] for learning inexact automata from logs of behaviors.…”
Section: Related Workmentioning
confidence: 99%
“…VeriFlow [18] also proposes support for the realtime verification of OpenFlow rules, but its low level of abstraction may make it cumbersome to verify large security chains. Finally, VeriSDN [19] is another example of control plane verification in the specific case of SDN-based firewalls, although the verification of more sophisticated security functions is considered. In a similar spirit, work by Shaer et al [20] considers anomaly detection in distributed firewalls.…”
Section: Related Workmentioning
confidence: 99%