2018
DOI: 10.1109/tnsm.2018.2799000
|View full text |Cite
|
Sign up to set email alerts
|

Big Data Analysis-Based Secure Cluster Management for Optimized Control Plane in Software-Defined Networks

Abstract: In software-defined networks (SDN), the abstracted control plane is its symbolic characteristic, whose core component is the software-based controller. The control plane is logically centralized, but the controllers can be physically distributed and composed of multiple nodes. To meet the service management requirements of large-scale network scenarios, the control plane is usually implemented in the form of distributed controller clusters. Cluster management technology monitors all types of events and must ma… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
77
0
2

Year Published

2018
2018
2022
2022

Publication Types

Select...
5
3

Relationship

1
7

Authors

Journals

citations
Cited by 179 publications
(79 citation statements)
references
References 34 publications
0
77
0
2
Order By: Relevance
“…In [36], Map function is used to perform the procedure of assigning each sample to the closest centroid while reduce function is used to update the new centroids. Several papers (e.g., [37][38][39][40][41][42]) have studied related issues.…”
Section: Related Workmentioning
confidence: 99%
“…In [36], Map function is used to perform the procedure of assigning each sample to the closest centroid while reduce function is used to update the new centroids. Several papers (e.g., [37][38][39][40][41][42]) have studied related issues.…”
Section: Related Workmentioning
confidence: 99%
“…Concurrently, the security of cluster technology becomes an open issue caused by the dynamic features of SDNs. To meet the above challenges, a big data analysis based secure cluster management framework for optimal control plane has been proposed recently [28]. An ant colony optimized method that uses big data analysis approach and the implementation system that optimizes the control plane are proposed.…”
Section: Fog Networking (Sdn and Nfv)mentioning
confidence: 99%
“…CISCO related studies and information [26] explained an overview about a developing fog computing architecture with a three-layered approach of distributed AI services for better QoS at edge location of the network as well as distributed intelligence and predictable fog computing. Two systems can be discussed for the availability of resources near the edge of the network [72] that is explained for live sensor streaming analysis and cloudlets [10,28] that are interactive for applications which are previously proposed and also will be discussed in next sections. A sequence in SDN [73,74] is the basic structured property of a secured communications network in fog computing, having confidentiality, integrity, availability of information, authentication, and nonrepudiation.…”
Section: Fog Frame Work and Architecturesmentioning
confidence: 99%
See 1 more Smart Citation
“…Due to the open nature of wireless links, the security performance is another important consideration in wireless communication networks [7], [8]. To address this, physical layer security (PLS) techniques have been proposed to protect legitimate transmissions in MEC systems from being overheard by an eavesdropper.…”
Section: Introductionmentioning
confidence: 99%