2018 IEEE 43rd Conference on Local Computer Networks (LCN) 2018
DOI: 10.1109/lcn.2018.8638226
|View full text |Cite
|
Sign up to set email alerts
|

An Incremental Approach for Swift OpenFlow Anomaly Detection

Abstract: Software Defined Networking (SDN) is designed for dynamic policy update where frequent changes are pushed to the forwarding devices. Different offline approaches for detecting misconfiguration anomalies in SDN by taking a snapshot of the state of the network have been developed in the literature. However, the detection process is time-consuming and unfeasible in the case of frequent changes to the OpenFlow tables as well in big size networks containing a large number of rules. This paper presents an incrementa… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
9
0

Year Published

2020
2020
2022
2022

Publication Types

Select...
3
1

Relationship

2
2

Authors

Journals

citations
Cited by 4 publications
(9 citation statements)
references
References 12 publications
0
9
0
Order By: Relevance
“…Both a single-thread and multi-thread implementation of Net Auto-Solver are assessed, and the results are promising. As future work, we would like to apply an incremental approach [10] to improve the performance of the correction process in Net Auto-Solver. Since the data plane rules are updated frequently, the correction performance is an essential factor in the efficiency of the method and thus the need for an incremental approach.…”
Section: Discussionmentioning
confidence: 99%
“…Both a single-thread and multi-thread implementation of Net Auto-Solver are assessed, and the results are promising. As future work, we would like to apply an incremental approach [10] to improve the performance of the correction process in Net Auto-Solver. Since the data plane rules are updated frequently, the correction performance is an essential factor in the efficiency of the method and thus the need for an incremental approach.…”
Section: Discussionmentioning
confidence: 99%
“…Shadowing does not only occur when one rule completely encompasses another rule. The authors of [27] list a different kind of shadowing that they call total shadowing. The authors describe total shadowing as when the combined scope of multiple rules covers the entire scope of another rule.…”
Section: Shadowingmentioning
confidence: 99%
“…Earlier, we discussed how the concept [27] describes as total shadowing. We mentioned before that total shadowing represents multiple instances of a different misconfiguration.…”
Section: Correlationmentioning
confidence: 99%
See 1 more Smart Citation
“…The online verification operates by the principle of only checking the affected set of packets due to the policy update. In Reference 11, we show how we can extend the offline verification method proposed in Reference 1 to cover online verification. In this article, we focus on the offline method for modeling the static networks and verifying policies before any changes.…”
Section: Introductionmentioning
confidence: 99%