2017 IEEE Conference on Network Softwarization (NetSoft) 2017
DOI: 10.1109/netsoft.2017.8004195
|View full text |Cite
|
Sign up to set email alerts
|

Automated verification of security chains in software-defined networks with synaptic

Abstract: Software-defined networks provide new facilities for deploying security mechanisms dynamically. In particular, it is possible to build and adjust security chains to protect the infrastructures, by combining different security functions, such as firewalls, intrusion detection systems and services for preventing data leakage. It is important to ensure that these security chains, in view of their complexity and dynamics, are consistent and do not include security violations. We propose in this paper an automated … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
18
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 18 publications
(18 citation statements)
references
References 21 publications
0
18
0
Order By: Relevance
“…They used spin tool, SATMC checker tool, NuXmv updated model checker of NuSMV, CBMC checker, Scyther tool and SMT solvers. [15] A method that was designed as a packet of SDN language which makes it easy to be extended for further formal languages to check simple invariants properties…”
Section: Discussionmentioning
confidence: 99%
See 3 more Smart Citations
“…They used spin tool, SATMC checker tool, NuXmv updated model checker of NuSMV, CBMC checker, Scyther tool and SMT solvers. [15] A method that was designed as a packet of SDN language which makes it easy to be extended for further formal languages to check simple invariants properties…”
Section: Discussionmentioning
confidence: 99%
“…FOR SECURITY ALGORITHMS Schnepf et al [15] proposed an automated alternative method that can support the verification process of the security in chains at the early stages. The proposed strategy considered control and data planes to be analysed, which contained different security algorithms formed as security functions in chains.…”
Section: Review On the Selected Verification Approachesmentioning
confidence: 99%
See 2 more Smart Citations
“…In this work model checking is possible via a translation to binary decision diagrams, under a similar assumption to ours: controllers are described as finite state machines. Another relevant work on automated verification is [22]. Our approach however is based on a declarative descriptions of controllers, switches, and network topology as a Reo circuits, whose automatic composition yields a finite automaton.…”
Section: Introductionmentioning
confidence: 99%