NOMS 2018 - 2018 IEEE/IFIP Network Operations and Management Symposium 2018
DOI: 10.1109/noms.2018.8406194
|View full text |Cite
|
Sign up to set email alerts
|

Service function chaining policy compliance checking

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

0
3

Authors

Journals

citations
Cited by 3 publications
(3 citation statements)
references
References 1 publication
0
3
0
Order By: Relevance
“…By incorporating periodic checks in the orchestrator, the compatibility of all devices can be verified. The Network orchestration software can also be given permissions to upgrade devices automatically [13] or manually to maintain connectivity in the network.…”
Section: Compliance Checkmentioning
confidence: 99%
“…By incorporating periodic checks in the orchestrator, the compatibility of all devices can be verified. The Network orchestration software can also be given permissions to upgrade devices automatically [13] or manually to maintain connectivity in the network.…”
Section: Compliance Checkmentioning
confidence: 99%
“…Various countermeasures have been proposed to protect SFC and SDN from compromised switches [11] - [24]. There are two main categories of such a solution: probe-based and statisticsbased method.…”
Section: A Compromised Switch Attacksmentioning
confidence: 99%
“…R. A. Eichelberger [23] tries to track every packet, notify the controller every time a packet comes through a switch in SFC. Y. Qiu [24] defines and checks the key information of SFC policy, collect the flow rule of network and compare the relations of flow rules and flow pattern. The statistics-based method can find out the compromised switches, but it does not support real-time detection because it [25] needs time to gather data and only works after packets are forwarded.…”
Section: A Compromised Switch Attacksmentioning
confidence: 99%