Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (12): 62-78.doi: 10.11959/j.issn.2096-109x.2017.00223
• Papers • Previous Articles
Ying-ying LV,Yun-fei GUO,Chao QI,Qi WU,Ya-wen WANG
Revised:
2017-11-08
Online:
2017-12-01
Published:
2018-01-12
Supported by:
Ying-ying LV,Yun-fei GUO,Chao QI,Qi WU,Ya-wen WANG. Flow consistency in an intensive SDN security architecture with multiple controllers[J]. Chinese Journal of Network and Information Security, 2017, 3(12): 62-78.
[1] | MCKEOWN N , ANDERSON T , BALAKRISHNAN H ,et al. OpenFlow:enabling innovation in campus networks[J]. ACM Sigcomm Computer Communication Review, 2008,38(2): 69-74. |
[2] | MONSANTO C , REICH J , FOSTER N ,et al. Composing software-defined networks[C]// The 10th USENIX Conference on Networked Systems Design and Implementation,USENIX Association. 2013: 1-14. |
[3] | KREUTZ D , RAMOS F M V , VERISSIMO P . Towards secure and dependable software-defined networks[C]// The Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013: 55-60. |
[4] | CABAJ K,WYTR?BOWICZ J,KUKLI?SKI S , et al . SDN architecture impact on network security[C]// Federated Conference on Computer Science and Information Systems. 2014. |
[5] | SCOTT-HAYWARD S , NATARAJAN S , SEZER S . A survey of security in software defined networks[J]. IEEE Communications Surveys&Tutorials, 2015,18(1): 623-654. |
[6] | PORRAS P , SHIN S , YEGNESWARAN V ,et al. A security enforcement kernel for OpenFlow networks[C]//2012:121-126. 2012: 121-126. |
[7] | PORRAS P , CHEUNG S , FONG M ,et al. Securing the Software-Defined Network Control Layer[C]// The 2015 Network and Distributed System Security Symposium (NDSS),San Diego,California. 2015. |
[8] | JAIN S , KUMAR A , MANDAL S ,et al. B4:experience with a globally-deployed software defined wan[C]// ACM SIGCOMM 2013 Conference on SIGCOMM. 2013: 3-14. |
[9] | BERDE P , HART J , HART J ,et al. ONOS:towards an open,distributed SDN OS[C]// The Workshop on Hot Topics in Software Defined NETWORKING. 2010: 1-6. |
[10] | ELDEFRAWY K , KACZMAREK T . Byzantine fault tolerant software-defined networking (SDN) controllers[C]// Computer Software and Applications Conference. 2016: 208-213. |
[11] | CELLO M , XU Y , WALID A ,et al. BalCon:a distributed elastic SDN control via efficient switch migration[C]// IEEE International Conference on Cloud Engineering. 2017. |
[12] | GUO Z , XU Y , CELLO M ,et al. JumpFlow:reducing flow table usage in software-defined networks[J]. Computer Networks, 2015,(92): 300-315. |
[13] | MCGEER R , . A safe,efficient update protocol for openflow networks[C]// The Workshop on Hot Topics in Software Defined Networks. 2012: 61-66. |
[14] | SUKAPURAM R , BARUA G . Enhanced algorithms for consistent network updates[C]// Network Function Virtualization and Software Defined Network. 2016: 184-190. |
[15] | HUSSEIN A , ELHAJJ I H , CHEHAB A ,et al. SDN verification plane for consistency establishment[C]// Computers and Communication. IEEE, 2016: 519-524. |
[16] | HUA J , GE X , ZHONG S . FOUM:a flow-ordered consistent update mechanism for software-defined networking in adversarial settings[C]// The International Conference on Computer Communications. 2016: 1-9. |
[17] | Reitblatt M , Foster N , Rexford J ,et al. Consistent updates for software-defined networks:change you can believe in![C]// ACM Workshop on Hot Topics in Networks. 2011:7. |
[18] | Ryu SDN Framework[EB/OL]. . |
[19] | FloodLight.“Open SDN controller”[EB/OL]. . |
[20] | QI C , WU J , HU H ,et al. Dynamic-scheduling mechanism of controllers based on security policy in software-defined network[J]. Electronics Letters, 2016,52(23): 1918-1920. |
[21] | QI C , WU J , HU H ,et al. An intensive security architecture with multi-controller for SDN[C]// Computer Communications Workshops. 2016: 401-402. |
[22] | OpenDaylightConsortium[EB/OL]. . |
[23] | LANTZ B , HELLER B , MCKEOWN N . A network in a laptop:rapid prototyping for software-defined networks[C]// ACM Workshop on Hot Topics in Networks. 2010: 1-6. |
[24] | MACHAT R , BANKS S , CALABRIA F ,et al. ISSU benchmarking methocldogy[DB/OL]. . |
[1] | Kui REN, Quanrun MENG, Shoukun YAN, Zhan QIN. Survey of artificial intelligence data security and privacy protection [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 1-10. |
[2] | Aiqun HU, Lanting FANG, Tao LI. Research on bionic mechanism based endogenous security defense system [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 11-19. |
[3] | Chenglei ZHANG, Yulong FU, Hui LI, Jin CAO. Research on security scenarios and security models for 6G networking [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 28-45. |
[4] | Lu CHEN, Hongbo TANG, Wei YOU, Yi BAI. Research on security defense of mobile edge computing [J]. Chinese Journal of Network and Information Security, 2021, 7(1): 130-142. |
[5] | Jingjing SHANG,Yujia ZHU,Qingyun LIU. Analysis of security extension protocol in e-mail system [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 69-79. |
[6] | Guojie LIU,Jianbiao ZHANG. TPCM-based trusted PXE boot method for servers [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 105-111. |
[7] | Luhui YANG,Huiwen BAI,Guangjie LIU,Yuewei DAI. Lightweight malicious domain name detection model based on separable convolution [J]. Chinese Journal of Network and Information Security, 2020, 6(6): 112-120. |
[8] | Zhenhua CAI,Jiayun LIN,Fang LIU. Blockchain storage:technologies and challenges [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 11-20. |
[9] | Ximeng LIU,Lehui XIE,Yaopeng WANG,Xuru LI. Adversarial attacks and defenses in deep learning [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 36-53. |
[10] | Lei HAN,Jiqiang LIU,Jian WANG,Bo SHI,Xudong HE. Quantitative threat situational assessment method for higher secure attribute value device [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 54-66. |
[11] | Bo XIE,Guowei SHEN,Chun GUO,Yan ZHOU,Miao YU. Cyber security entity recognition method based on residual dilation convolution neural network [J]. Chinese Journal of Network and Information Security, 2020, 6(5): 126-138. |
[12] | Qiao HU,Yupeng HU,Xin LIAO,Zheng QIN,Jianhua SUN,Jiliang ZHANG. Investigation,analysis and improvement mentality of the revision on information security’s training program to undergraduates in Hunan University [J]. Chinese Journal of Network and Information Security, 2020, 6(4): 153-158. |
[13] | Bo MENG,Jiabing LIU,Qin LIU,Xiaoxiao WANG,Xurui ZHENG,Dejun WANG. Survey of smart contract security [J]. Chinese Journal of Network and Information Security, 2020, 6(3): 1-13. |
[14] | Guanghan DUAN,Chunguang MA,Lei SONG,Peng WU. Research on structure and defense of adversarial example in deep learning [J]. Chinese Journal of Network and Information Security, 2020, 6(2): 1-11. |
[15] | Qiang QU,Hongtao YU,Ruiyang HUANG. Attention-based approach of detecting spam in social networks [J]. Chinese Journal of Network and Information Security, 2020, 6(1): 54-61. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|