[1] |
MANAR J , TARANPREET S , ABDALLAH S ,et al. Software defined networking:state of the art and research challenges[J]. Computer Networks, 2014,72: 74-98.
|
[2] |
Software-defined network[J].
|
[3] |
RASHID M , JOAN S , JUAN-LUIS G ,et al. Network function virtualization:state-of-the-art and research challenges[J]. IEEE Communications Surveys & Tutorials, 2016,18(1): 236-262.
|
[4] |
饶少阳, 陈运清, 冯明 . 基于 SDN 的云数据中心网络[J]. 电信科学, 2014(8): 33-41.
|
|
RAO S Y , CHEN Y Q , FENG M . cloud data center based on SDN[J]. Telecommunications Science, 2014(8): 33-41.
|
[5] |
安琪, 刘艳萍, 孙茜 ,等. 基于SDN与NFV的网络切片架构[J]. 电信科学, 2016(11): 119-126.
|
|
ANQ , LIU Y P , SUN Q ,et al. Network slicing architecture based on SDN and NFV[J]. Telecommunications Science. 2016(11): 119-126.
|
[6] |
SDN & NFV use cases defined[EB].
|
[7] |
WANG Y , LI Z , XIE G , KAVE S . Enabling automatic composition and verification of service function chain[C]// IEEE/ACM International Symposium on Quality of Service (IWQoS’17). 2017: 1-5.
|
[8] |
PANDA A , ARGYRAKI K , SAGIV M ,et al. New directions for network verification[C]// LIPIcs-Leibniz International Proceedings in Informatics, 2015: 209-220
|
[9] |
STOENESCU R , POPOVICI M , NEGREANU L ,et al. Symnet:scalable symbolic execution for modern networks[C]// Proceedings of the 2016 ACM SIGCOMM Conference (SIGCOMM’16). 2016: 314-327.
|
[10] |
HORN A , KHERADMAND A , PRASAD M R . Delta-net:real-time network verification using atoms[C]// Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI’17). 2017: 735-749
|
[11] |
KHURSHID A , ZHOU W , CAESAR M ,et al. Veriflow:verifying network-wide invariants in real time[C]// Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation (NSDI’13). 2013: 15-27.
|
[12] |
SHERRY J , HASAN S , SCOTT C ,et al. Making middleboxes someone else's problem:network processing as a cloud service[J]. ACM SIGCOMM Computer Communication Review, 2012,42(4): 13-24.
|
[13] |
PANDA A , LAHAV O , ARGYRAKI K ,et al. Verifying isolation properties in the presence of middleboxes[J]. arXiv preprint,2014,arXiv:1409. 7687.
|
[14] |
HU H , AHN G J , KULKARNI K . Detecting and resolving firewall policy anomalies[J]. IEEE Transactions on Dependable & Secure Computing(TDSC’12), 2012,9(3): 318-331.
|
[15] |
DENG J , LI H . On the safety and efficiency of virtual firewall elasticity control[C]// 24th Network and Distributed System Security Symposium (NDSS’17). 2017.
|
[16] |
MALDONADO-LOPEZ F A , CALLE E , DONOSO Y . Detection and prevention of firewall-rule conflicts on software-defined networking[C]// 7th IEEE international Workshop on Reliable Networks Design and Modeling (RNDM’15). 2015: 259-265.
|
[17] |
邱松, 焦健, 张东阳 . 面向防火墙和IDS/IPS协同防御的策略冲突检测算法[J]. 系统仿真学报, 2015,27(11): 2770-2777.
|
|
QIU S , JIAO J , ZHANG D Y . Policy conflicts verification algorithm towards collaborative defense with firewalls and IDS/IPS[J]. Journal of System Simulation, 2015,27(11): 2770-2777.
|
[18] |
PANDA A , LAHAV O , ARGYRAKI K ,et al. Verifying reachability in networks with mutable datapaths[C]// Proceedings of the 14th USENIX Symposium on Networked Systems Design and Implementation (NSDI’17). 2017: 699-718.
|
[19] |
WU W , ZHANG Y , BANERJEE S . Automatic synthesis of NF models by program analysis[C]// ACM Workshop on Hot Topics in Networks (HotNets’16). 2016: 29-35.
|
[20] |
FAYAZ S K , YU T , TOBIOKA Y , CHAKI S , SEKAR V . BUZZ:testing context-dependent policies in stateful networks[C]// 13th USENIX Conference on Networked Systems Design and Implementation (NSDI’16). 2016: 275-289.
|
[21] |
PRABHU S , CHOU K Y , KHERADMAND A ,et al. Plankton:Scalable network configuration verification through model checking[C]// Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI’20). 2020: 953-967.
|
[22] |
YUAN Y , MOON S J , UPPAL S ,et al. NetSMC:a custom symbolic model checker for stateful network verification[C]// Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI’20). 2020: 181-200.
|