Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM 2013
DOI: 10.1145/2486001.2486022
|View full text |Cite
|
Sign up to set email alerts
|

SIMPLE-fying middlebox policy enforcement using SDN

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
302
0
2

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 569 publications
(312 citation statements)
references
References 25 publications
0
302
0
2
Order By: Relevance
“…Gibb et al [9] present a similar approach where a cloud-based architecture is designed for outsourcing network functionalities using SDN. Regarding the chaining of such network functionalities, Qazi et al introduces SIMPLE [10], a policy enforcement layer based on SDN and flow correlation for middlebox traffic steering. In the same vein, Fayazbakhsh et al propose Flowtags [11], an architecture where middleboxes are extended to support OpenFlow and to deal with dynamic middlebox flow mangling.…”
Section: Related Workmentioning
confidence: 99%
“…Gibb et al [9] present a similar approach where a cloud-based architecture is designed for outsourcing network functionalities using SDN. Regarding the chaining of such network functionalities, Qazi et al introduces SIMPLE [10], a policy enforcement layer based on SDN and flow correlation for middlebox traffic steering. In the same vein, Fayazbakhsh et al propose Flowtags [11], an architecture where middleboxes are extended to support OpenFlow and to deal with dynamic middlebox flow mangling.…”
Section: Related Workmentioning
confidence: 99%
“…Additionally, in traditional networks the lack of a centralized control of these security functions can further complicate their deployment [61]. In contrast, SDN enables the implementation of applications that have the ability to support similar security functions in a much more flexible manner, and it offers a suitable place for the implementation of more accurate, reliable 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 Qazi et al [84] and efficient security solutions. Table 3 presents the major research efforts addressing security in SDN.…”
Section: Securitymentioning
confidence: 99%
“…Firewalls are an example of network application that can be fully assisted by SDN because: (i) the need of additional middleboxes to enforce policies in the network is reduced because this functionality can be placed in the SDN control plane; (ii) the con -1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 trol plane has a comprehensive view of the network; and (iii) the management of heterogeneous devices is abstracted by the control plane. Also, Qazi et al [84] present a policy security monitoring layer for efficient middlebox-specific traffic steering. Another work that goes in this direction is proposed by Son et al [85].…”
Section: Securitymentioning
confidence: 99%
See 1 more Smart Citation
“…For instance, recent work has demonstrated that OpenFlow can help deploying security policies in the network [8], performing dynamic load-balancing [9], [10], implementing network intrusion detection/prevention [11], performing secure end-to-end network measurements [12], etc.…”
Section: Introductionmentioning
confidence: 99%