2015 IEEE Global Communications Conference (GLOBECOM) 2015
DOI: 10.1109/glocom.2015.7417563
|View full text |Cite
|
Sign up to set email alerts
|

TimeoutX: An Adaptive Flow Table Management Method in Software Defined Networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
19
0
3

Year Published

2017
2017
2024
2024

Publication Types

Select...
6
1
1

Relationship

0
8

Authors

Journals

citations
Cited by 26 publications
(24 citation statements)
references
References 10 publications
0
19
0
3
Order By: Relevance
“…Similarly, exchanges of messages between switches lack the authentication/encryption mechanism in the SDN data plane [44]. Toward addressing the aforementioned security challenges, efforts were made lately to address several SDN security attacks [46][47][48].…”
Section: Sdn Security Threat and Vulnerabilitiesmentioning
confidence: 99%
See 1 more Smart Citation
“…Similarly, exchanges of messages between switches lack the authentication/encryption mechanism in the SDN data plane [44]. Toward addressing the aforementioned security challenges, efforts were made lately to address several SDN security attacks [46][47][48].…”
Section: Sdn Security Threat and Vulnerabilitiesmentioning
confidence: 99%
“…It may be effective to conclude as the traffic flows increase, the scheme may introduce another loophole for DoS attack, which may force switches to refuse writing rules from a legitimate source. To mitigate such a problem, Luo et al [46] proposed LRU flow entry rule eviction aimed to improve the SDN performance. The scheme can be effective with acceptable performance in fixed network with small flow table size, but in large network scale with dense flow arrival it may lead to significant communication overhead because of its architectural design of being reactive event-driven.…”
Section: Sdn Security Threat and Vulnerabilitiesmentioning
confidence: 99%
“…However, a TCAM has very limited capacity and capabilities as this memory is expensive and has a high‐power consumption. To address this limitation, compression techniques or methods to adaptively set a suitable timeout for each flow entry are proposed to reduce the number of flow entries on TCAMs. In addition, specialized performance tests as presented in Kuźniar, Perešín, and Kostić can help developers of controller applications and network architects to improve their designs without requiring expensive and demanding experimental setups.…”
Section: The Proposal In Practicementioning
confidence: 99%
“…As a result, how to use such limited cache efficiently and safely has been an active field of research. To help the switches store more flow entries without adding TCAMs, several proposals attempt to split the workload between the switches [9], [10] or aggregate redundant flow entries [11], [12]. Although these proposals are useful for normal users, they could be inefficient when attackers attempt to exhaust the switches.…”
mentioning
confidence: 99%