2018
DOI: 10.1002/cpe.4518
|View full text |Cite
|
Sign up to set email alerts
|

A trust management framework for software‐defined network applications

Abstract: The emergence of Software-Defined Network (SDN) has brought unprecedented innovation to current networks. SDN's two most notable features are decoupling and programmability. Decoupling makes network management centralized in a control plane. Meanwhile, benefitted from the programmable characteristic of SDN, new functions of networking can be easily realized. However, these features also introduce new security issues to SDN. Through the programming interface provided by SDN, software engineers can easily develo… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
9
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
5
1

Relationship

0
6

Authors

Journals

citations
Cited by 16 publications
(9 citation statements)
references
References 38 publications
0
9
0
Order By: Relevance
“…The rule consists of a matching packet set (P m ), a rule action (action), and a called chain (CalledChain). After parsing a new rule, the algorithm adds new matching packet information to the associated action space (lines [5][6][7][8]. If the action is to call another chain, the algorithm recursively traverses the called chain and gets the ACCEPT and DROP space to update the Security Space of the chain (lines 9-12).…”
Section: Security Policies Parsingmentioning
confidence: 99%
See 2 more Smart Citations
“…The rule consists of a matching packet set (P m ), a rule action (action), and a called chain (CalledChain). After parsing a new rule, the algorithm adds new matching packet information to the associated action space (lines [5][6][7][8]. If the action is to call another chain, the algorithm recursively traverses the called chain and gets the ACCEPT and DROP space to update the Security Space of the chain (lines 9-12).…”
Section: Security Policies Parsingmentioning
confidence: 99%
“…The result shows that the scheme we proposed can detect attacks in the process of SDN network update effectively. ACC = TP + TN TP + TN + FP + FN (7) FPR = FP FP + TN (8)…”
Section: Network Configurationmentioning
confidence: 99%
See 1 more Smart Citation
“…Thus, in the mentioned environments, in order to establish trust between service users and providers, SLAs alone are not adequate due to their uncertain and changeable conditions 14,25,26 . There are various works have been done in order to manage trust for different context such as WSN, 27‐29 smart IoT, 30 edge computing, 31 multimedia block‐chain privacy protection system, 32 VANET, 33 SDN, 34 but our focus is on TMoS.…”
Section: Introductionmentioning
confidence: 99%
“…Currently, research on policy conflict detection for SDN has been gradually carried out. For example, for the conflict between traffic scheduling policies and firewall policies, Hu et al 10 proposed the FlowGuard framework to track traffic flows to detect the conflicts with firewall strategies when policies are issued, but this method does not involve conflicts between forwarding policies; FortNOX 11 proposed a security constraint mechanism for OpenFlow controllers to detect indirect security conflicts based on role authorization and constraints, and this mechanism also fails to handle forwarding policy conflicts; Wang et al 12 proposed a detection method for the conflict between traffic scheduling policies and firewall strategies, and this method also unable to resolve the forwarding policy conflict; Shu et al 13 proposed a controller module FLOVER based on NOX to prevent conflicts between network security policies and flow strategies of application, but this method does not involve conflicts between forwarding and auditing. However, most of these methods are only for the strategies conflict between application level and security level.…”
Section: Introductionmentioning
confidence: 99%