2019
DOI: 10.3390/electronics8101136
|View full text |Cite
|
Sign up to set email alerts
|

Graph-Based Policy Change Detection and Implementation in SDN

Abstract: Software Defined Networking (SDN), as a cutting-edge network, splits control and management planes from the data plane for simplifying network manageability as well as programmability. In SDN, network policies change with the passage of time due to changes in the application environment, topology or user/admin requirements. As a result, modifications at the control plane take place. In existing research works, packet violations occur due to already installed flow rules at the data plane (switches) that are not… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
13
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
7
1

Relationship

1
7

Authors

Journals

citations
Cited by 19 publications
(13 citation statements)
references
References 33 publications
0
13
0
Order By: Relevance
“…Thus, an automatic, correct and fast composition of multiple independently specified network policies is an open problem. There are some methods to detect and resolve policy conflicts 40,41 . However, we are not concern about policy specifications and their conflicts in our current work.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…Thus, an automatic, correct and fast composition of multiple independently specified network policies is an open problem. There are some methods to detect and resolve policy conflicts 40,41 . However, we are not concern about policy specifications and their conflicts in our current work.…”
Section: Proposed Methodsmentioning
confidence: 99%
“…We have used the multi-dimensional hash-able objects to store the attribute of the link. Although there is a choice of directly using the multidimensional arrays (matrix) for storing and accessing these attributes, it elevates the accessing cost (i.e., time) [49].…”
Section: Raf Path Computationmentioning
confidence: 99%
“…Another important issue is related to detecting policy changes in an SDN environment. That is, when installing new Flow [34]. Generally speaking, there is a possibility that ransomware may be granted access, even despite being blocked by the controller.…”
Section: Detecting Policy Changesmentioning
confidence: 99%
“…This is because these two approaches depend entirely on monitoring a certain number of legitimate packets (the number of ARP requests, and the attempt to reach the webserver) to impose restrictions on the infected device. Resolving such conflicts is beyond the scope of this paper and the interested reader may refer relevant works [34]- [36].…”
Section: Detecting Policy Changesmentioning
confidence: 99%