Formal model and Policy specification for software defined networks
DOI:
https://doi.org/10.31642/JoKMC/2018/030207Keywords:
Usage Control, Flog, Reliability and Formal Model.Abstract
Software-defined networking SDN is gaining a sharp increase in adoption by very well-known companies Like Google and Microsoft. Currently, the two stands out reliability and security are the most issues that hampering the SDN rapid growth. This paper aims to contribute to this growing area of research by exploring the SDN security issues. Novel approach will be proposed by utilizing the well-known access control approach called theusage control UCON model and also the Flog policy language of software defined networks SDNs. This work will be produced as a formal modelling via high-level abstract language like FlogDownloads
References
ValdiviesoCaraguay, Á. L., Benito Peral, A., Barona López, L. I., &GarcíaVillalba, L. J. (2014). SDN: Evolution and Opportunities in the Development IoT Applications. International Journal of Distributed Sensor Networks, 2014. DOI: https://doi.org/10.1155/2014/735142
Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., &Uhlig, S. (2015). Software-defined networking: A comprehensive survey. proceedings of the IEEE, 103(1), 14-76. DOI: https://doi.org/10.1109/JPROC.2014.2371999
Raghu/Castro-leonYeluri (Enrique). (2014). Building the Infrastructure for Cloud Security. Springer Verlag.
Monsanto, C., Reich, J., Foster, N., Rexford, J., & Walker, D. (2013, April). Composing Software Defined Networks. In NSDI (pp. 1-13).
Hu, F., Hao, Q., &Bao, K. (2014). A survey on software defined networking (SDN) and openflow: From concept to implementation. DOI: https://doi.org/10.1109/COMST.2014.2326417
Schehlmann, L., Abt, S., &Baier, H. (2014, November). Blessing or curse?Revisiting security aspects of Software-Defined Networking. In Network and Service Management (CNSM), 2014 10th International Conference on (pp. 382-387). IEEE. DOI: https://doi.org/10.1109/CNSM.2014.7014199
Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2015). SPHINX: Detecting security attacks in software-defined networks. In Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium. DOI: https://doi.org/10.14722/ndss.2015.23064
Hong, S., Xu, L., Wang, H., &Gu, G. (2015). Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.NDSS. DOI: https://doi.org/10.14722/ndss.2015.23283
Khurshid, A., Zhou, W., Caesar, M., & Godfrey, P. (2012). Veriflow: verifying network-wide invariants in real time. ACM SIGCOMM Computer Communication Review, 42(4), 467-472. DOI: https://doi.org/10.1145/2377677.2377766
Ball, T., Bjørner, N., Gember, A., Itzhaky, S., Karbyshev, A., Sagiv, M., ...& Valadarsky, A. (2014, June). Vericon: Towards verifying controller programs in software-defined networks. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (p. 31).ACM. DOI: https://doi.org/10.1145/2594291.2594317
Batista, B., & Fernandez, M. (2014, February). PonderFlow: A Policy Specification Language for Openflow Networks. In ICN 2014, The Thirteenth International Conference on Networks (pp. 204-209).
Lara, A., & Ramamurthy, B. (2014, December). OpenSec: A framework for implementing security policies using OpenFlow. In Global Communications Conference (GLOBECOM), 2014 IEEE (pp. 781-786).IEEE. DOI: https://doi.org/10.1109/GLOCOM.2014.7036903
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2016 DAWOOD SALMAN JASIM AL-FARTTOOSI
This work is licensed under a Creative Commons Attribution 4.0 International License.
which allows users to copy, create extracts, abstracts, and new works from the Article, alter and revise the Article, and make commercial use of the Article (including reuse and/or resale of the Article by commercial entities), provided the user gives appropriate credit (with a link to the formal publication through the relevant DOI), provides a link to the license, indicates if changes were made and the licensor is not represented as endorsing the use made of the work.