2014
DOI: 10.1007/978-3-319-12400-1_15
|View full text |Cite
|
Sign up to set email alerts
|

Collaborating with the Enemy on Network Management

Abstract: Software Defined Networking (SDN) deconstructs the current routing infrastructure into a small number of controllers, which are general purpose computers, and a large number of switches which are programmable forwarding engines. It is already deployed in data centres, where it offers considerable advantages of both cost and flexibility over a switching fabric of traditional routers. Such applications have a single controlling organisation and issues of trust between subdomains do not really arise. However for … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 7 publications
(3 citation statements)
references
References 5 publications
0
3
0
Order By: Relevance
“…can be used to test these components and assess their feature set and performance, an assessment framework to evaluate the component risks and vulnerabilities is still missing. Quagga SDN Module (QuaSM) has been proposed in [168] to support experimentation and testing of BGP functions within SDN with a view to support security researchers. It is proposed that information learned by BGP can be integrated with the rest of the SDN network state to provide increased network security.…”
Section: Security Assessment Frameworkmentioning
confidence: 99%
“…can be used to test these components and assess their feature set and performance, an assessment framework to evaluate the component risks and vulnerabilities is still missing. Quagga SDN Module (QuaSM) has been proposed in [168] to support experimentation and testing of BGP functions within SDN with a view to support security researchers. It is proposed that information learned by BGP can be integrated with the rest of the SDN network state to provide increased network security.…”
Section: Security Assessment Frameworkmentioning
confidence: 99%
“…It then quickly infiltrated datacenters due to the benefits that it offered to these environments in terms of virtualization and ease of management 6,7 . In both scenarios, the network is relatively small in terms of diameter and usually under a single domain authority 8 …”
Section: Introductionmentioning
confidence: 99%
“…These approaches are powerful, but there has not been widespread adoption [13]. This may be because of processor requirements, memory requirements, or a lack of incentive alignment [20]. Cryptographic solutions are also expensive.…”
Section: Introductionmentioning
confidence: 99%