Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM 2013
DOI: 10.1145/2486001.2491686
|View full text |Cite
|
Sign up to set email alerts
|

Design and implementation of a framework for software-defined middlebox networking

Abstract: Increasingly, middleboxes are being deployed as software components and, with the advent of software defined networking, can be deployed at arbitrary locations. However, existing approaches for controlling the operations of middleboxes continue to be rudimentary and ad hoc. As such, a variety of dynamic network control scenarios that are crucial to enhancing the security, availability and performance of enterprise applications cannot be realized today.In this paper, we ask: what is the right way to exercise un… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
9
0

Year Published

2015
2015
2018
2018

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 20 publications
(9 citation statements)
references
References 7 publications
0
9
0
Order By: Relevance
“…A quantity of existing access control implementations, including SELinux, Domain, and Type Enforcement (DTE) and Linux Intrusion Detection System (LIDS) has already been adapted to use the LSM framework. [22][23][24] uses stratification ideas to separate data and control. The control layer mainly includes a logiccentric and programmable controller so that it can grasp the global network information and it is convenient for operators and researchers to manage network configurations and the deployment of new protocols.…”
Section: Blpmentioning
confidence: 99%
“…A quantity of existing access control implementations, including SELinux, Domain, and Type Enforcement (DTE) and Linux Intrusion Detection System (LIDS) has already been adapted to use the LSM framework. [22][23][24] uses stratification ideas to separate data and control. The control layer mainly includes a logiccentric and programmable controller so that it can grasp the global network information and it is convenient for operators and researchers to manage network configurations and the deployment of new protocols.…”
Section: Blpmentioning
confidence: 99%
“…In this part, we consider the works [126][127][128][129] which leverage SDN into the set of middleboxes placed behind the SGi-LAN of the mobile network. StEERING [126] relied on the SDN concept to route the traffic through a series of middleboxes.…”
Section: Service Function Chainingmentioning
confidence: 99%
“…StEERING allows steering different types of traffic through a sequence of desired middleboxes according to per-subscriber and per-application policies. Gember et al [127,128] introduced the concept of software defined middlebox networking to address some challenges in traditional middlebox networks, such as complex management, middlebox scaling. OpenNF [129] is a control plane architecture that allows quick and safe flows' allocation across virtual middlebox instances by combining NFV and SDN concepts.…”
Section: Service Function Chainingmentioning
confidence: 99%
“…In order to overcome these difficulties, more and more specific middleboxes [7] (e.g., firewall, network monitor, DPI detector) have been added in the network to guarantee the performance and resist the external attacks.…”
Section: Introductionmentioning
confidence: 99%