2021
DOI: 10.1109/tpds.2021.3068135
|View full text |Cite
|
Sign up to set email alerts
|

Efficient Forwarding Anomaly Detection in Software-Defined Networks

Abstract: Data centers, the critical infrastructure underpinning Cloud computing, often employ Software-Defined Networks (SDN) to manage cluster, wide-area and enterprise networks. As the network forwarding in SDN is dynamically programmed by controllers, it is crucial to ensure that the controller intent is correctly translated into underlying forwarding rules. Therefore, detecting and locating forwarding anomalies in SDN is a fundamental problem in production networks. Existing research proposals, roughly categorized … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2022
2022
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(3 citation statements)
references
References 38 publications
0
3
0
Order By: Relevance
“…Therefore, the combined structure, i.e. Software defined‐information centric network (SD‐ICN), has been paid close attention by a multitude of school groups and enterprises [10–30]. After both architectures interact with each other, SD‐ICN can complement respective advantages and sufficiently make up for a series of drawbacks [31].…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, the combined structure, i.e. Software defined‐information centric network (SD‐ICN), has been paid close attention by a multitude of school groups and enterprises [10–30]. After both architectures interact with each other, SD‐ICN can complement respective advantages and sufficiently make up for a series of drawbacks [31].…”
Section: Introductionmentioning
confidence: 99%
“…By analyzing the topology and installing rules to collect statistics at optimal monitoring positions, forwarding anomalies are detected and located in the network [103]. For a prediction variance anomaly detector, the most vital component is the covariance matrix.…”
Section: Distributed Anomaly Detectionmentioning
confidence: 99%
“…Mov-ing away from having a central server also avoids having a single point of failure. For example, crash detection in traffic surveillance [148], invalid router updates in network connections [103], pedestrian detection in self-driving cars [215], anomalous condition detection in medical electrocardiograms [30], etc. are all mission critical scenarios which require quick decision making and tractability.…”
Section: Introductionmentioning
confidence: 99%