Formal model and Policy specification for software defined networks

Authors

  • DAWOOD SALMAN JASIM AL-FARTTOOSI University of Kufa

DOI:

https://doi.org/10.31642/JoKMC/2018/030207

Keywords:

Usage Control, Flog, Reliability and Formal Model.

Abstract

Software-defined networking SDN is gaining a sharp increase in adoption by very well-known companies Like Google and Microsoft. Currently, the two stands out reliability and security are the most issues that hampering the SDN rapid growth. This paper aims to contribute to this growing area of research by exploring the SDN security issues. Novel approach will be proposed by utilizing the well-known access control approach called theusage control UCON model and also the Flog policy language of software defined networks SDNs. This work will be produced as a formal modelling via high-level abstract language like Flog

Downloads

Download data is not yet available.

References

ValdiviesoCaraguay, Á. L., Benito Peral, A., Barona López, L. I., &GarcíaVillalba, L. J. (2014). SDN: Evolution and Opportunities in the Development IoT Applications. International Journal of Distributed Sensor Networks, 2014. DOI: https://doi.org/10.1155/2014/735142

Kreutz, D., Ramos, F. M., Verissimo, P. E., Rothenberg, C. E., Azodolmolky, S., &Uhlig, S. (2015). Software-defined networking: A comprehensive survey. proceedings of the IEEE, 103(1), 14-76. DOI: https://doi.org/10.1109/JPROC.2014.2371999

Raghu/Castro-leonYeluri (Enrique). (2014). Building the Infrastructure for Cloud Security. Springer Verlag.

Monsanto, C., Reich, J., Foster, N., Rexford, J., & Walker, D. (2013, April). Composing Software Defined Networks. In NSDI (pp. 1-13).

Hu, F., Hao, Q., &Bao, K. (2014). A survey on software defined networking (SDN) and openflow: From concept to implementation. DOI: https://doi.org/10.1109/COMST.2014.2326417

Schehlmann, L., Abt, S., &Baier, H. (2014, November). Blessing or curse?Revisiting security aspects of Software-Defined Networking. In Network and Service Management (CNSM), 2014 10th International Conference on (pp. 382-387). IEEE. DOI: https://doi.org/10.1109/CNSM.2014.7014199

Dhawan, M., Poddar, R., Mahajan, K., & Mann, V. (2015). SPHINX: Detecting security attacks in software-defined networks. In Proceedings of the 2015 Network and Distributed System Security (NDSS) Symposium. DOI: https://doi.org/10.14722/ndss.2015.23064

Hong, S., Xu, L., Wang, H., &Gu, G. (2015). Poisoning Network Visibility in Software-Defined Networks: New Attacks and Countermeasures.NDSS. DOI: https://doi.org/10.14722/ndss.2015.23283

Khurshid, A., Zhou, W., Caesar, M., & Godfrey, P. (2012). Veriflow: verifying network-wide invariants in real time. ACM SIGCOMM Computer Communication Review, 42(4), 467-472. DOI: https://doi.org/10.1145/2377677.2377766

Ball, T., Bjørner, N., Gember, A., Itzhaky, S., Karbyshev, A., Sagiv, M., ...& Valadarsky, A. (2014, June). Vericon: Towards verifying controller programs in software-defined networks. In Proceedings of the 35th ACM SIGPLAN Conference on Programming Language Design and Implementation (p. 31).ACM. DOI: https://doi.org/10.1145/2594291.2594317

Batista, B., & Fernandez, M. (2014, February). PonderFlow: A Policy Specification Language for Openflow Networks. In ICN 2014, The Thirteenth International Conference on Networks (pp. 204-209).

Lara, A., & Ramamurthy, B. (2014, December). OpenSec: A framework for implementing security policies using OpenFlow. In Global Communications Conference (GLOBECOM), 2014 IEEE (pp. 781-786).IEEE. DOI: https://doi.org/10.1109/GLOCOM.2014.7036903

Downloads

Published

2016-12-30

How to Cite

JASIM AL-FARTTOOSI, D. S. (2016). Formal model and Policy specification for software defined networks. Journal of Kufa for Mathematics and Computer, 3(2), 55–62. https://doi.org/10.31642/JoKMC/2018/030207

Similar Articles

1 2 3 4 5 > >> 

You may also start an advanced similarity search for this article.