2022
DOI: 10.1109/tnsm.2022.3183591
|View full text |Cite
|
Sign up to set email alerts
|

Intent-Driven Security Policy Management for Software-Defined Systems

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
4
0

Year Published

2023
2023
2024
2024

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 6 publications
(5 citation statements)
references
References 39 publications
0
4
0
Order By: Relevance
“…The research work presented in 38 introduces a robust security policy enforcement mechanism that offers a standardized set of intent rules, effectively shielding the network administrator from the intricacies of the SDN controller's format. Furthermore, this mechanism significantly alleviates the complexities associated with checking flow rules conflicts at the data plane.…”
Section: Related Workmentioning
confidence: 99%
“…The research work presented in 38 introduces a robust security policy enforcement mechanism that offers a standardized set of intent rules, effectively shielding the network administrator from the intricacies of the SDN controller's format. Furthermore, this mechanism significantly alleviates the complexities associated with checking flow rules conflicts at the data plane.…”
Section: Related Workmentioning
confidence: 99%
“…The objective is to convert abstract user intents into network-executable policies and automate the network policy configuration process [24]. While some solutions have been proposed, such as the work by Chowdhary et al [25] for efficient security policy management. However, this solution still requires users to possess prior knowledge of network security services.…”
Section: A Security Service Automationmentioning
confidence: 99%
“…Intent-Based Networking (IBN) has emerged as a promising approach to address this problem. Intent-driven security management [23][24][25][26][27][28][29] has received considerable attention from researchers. However, existing research primarily focuses on configuring specific security functions or operational security during service orchestration, overlooking the application of SFC-enabled security services.…”
Section: Introductionmentioning
confidence: 99%
“…Capturing non-complicated high-level requirements to generate extensive policies is a challenge tackled by intent driven policy management. This approach is actively prospected by the software network community, and has been successfully transposed to security issues, as INTPOL [ 26 ] proposes. However, it remains mainly centred on programmable switches, while our approach targets a wider spectrum of resources to operate.…”
Section: Related Workmentioning
confidence: 99%