Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security 2014
DOI: 10.1145/2660267.2660353
|View full text |Cite
|
Sign up to set email alerts
|

Rosemary

Abstract: Within the hierarchy of the Software Defined Network (SDN) network stack, the control layer operates as the critical middleware facilitator of interactions between the data plane and the network applications, which govern flow routing decisions. In the OpenFlow implementation of the SDN model, the control layer, commonly referred to as a network operating system (NOS), has been realized by a range of competing implementations that offer various performance and functionality advantages: NOX [14], and ONIX [18].… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
44
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 170 publications
(54 citation statements)
references
References 14 publications
0
44
0
Order By: Relevance
“…Several controller frameworks exist, such as Floodlight [20], Ryu [71], Open Network Operating System (ONOS) [61], and OpenDaylight (ODL) [64]. Special-purpose controllers for secure environments include SE-Floodlight [68], Rosemary [75], and Security-Mode ONOS [89]. The controller maintains data stores that collectively serve as a "network information base" for abstractions of the network's topology, flow entries, and end hosts, among others.…”
Section: Sdn Architecturementioning
confidence: 99%
See 3 more Smart Citations
“…Several controller frameworks exist, such as Floodlight [20], Ryu [71], Open Network Operating System (ONOS) [61], and OpenDaylight (ODL) [64]. Special-purpose controllers for secure environments include SE-Floodlight [68], Rosemary [75], and Security-Mode ONOS [89]. The controller maintains data stores that collectively serve as a "network information base" for abstractions of the network's topology, flow entries, and end hosts, among others.…”
Section: Sdn Architecturementioning
confidence: 99%
“…3.3.1 Lack of well-defined application isolation and enforcement as applied to shared control plane state. Some controllers, such as Rosemary [75], sandbox each app's resources (e.g., memory and CPU usage) and use RBAC to allow apps or prevent them from accessing parts of the SDN control plane state, in a manner analogous to resource sharing and file permissions in operating systems, respectively. However, RBAC is limiting in practice because it does not enforce certain usage of data after authorization [72].…”
Section: Sdn Control Plane Information Flow Challengesmentioning
confidence: 99%
See 2 more Smart Citations
“…Additionally, a software extension to NOX was proposed in FortNoX [9], which offers rolebased authorization and security constraint enforcement for the NOX controller. Both SE-Floodlight [10] and Rosemary [11] proposed a security enforcement kernel to improve the robustness of SDN controller. In addition, some recent works [12]- [14] have noted that the SDN controller is vulnerable to DoS attacks.…”
Section: Related Workmentioning
confidence: 99%