Chinese Journal of Network and Information Security ›› 2017, Vol. 3 ›› Issue (12): 62-78.doi: 10.11959/j.issn.2096-109x.2017.00223
• Papers • Previous Articles
Ying-ying LV,Yun-fei GUO,Chao QI,Qi WU,Ya-wen WANG
Revised:
2017-11-08
Online:
2017-12-01
Published:
2018-01-12
Supported by:
Ying-ying LV,Yun-fei GUO,Chao QI,Qi WU,Ya-wen WANG. Flow consistency in an intensive SDN security architecture with multiple controllers[J]. Chinese Journal of Network and Information Security, 2017, 3(12): 62-78.
[1] | MCKEOWN N , ANDERSON T , BALAKRISHNAN H ,et al. OpenFlow:enabling innovation in campus networks[J]. ACM Sigcomm Computer Communication Review, 2008,38(2): 69-74. |
[2] | MONSANTO C , REICH J , FOSTER N ,et al. Composing software-defined networks[C]// The 10th USENIX Conference on Networked Systems Design and Implementation,USENIX Association. 2013: 1-14. |
[3] | KREUTZ D , RAMOS F M V , VERISSIMO P . Towards secure and dependable software-defined networks[C]// The Second ACM SIGCOMM Workshop on Hot Topics in Software Defined Networking. 2013: 55-60. |
[4] | CABAJ K,WYTR?BOWICZ J,KUKLI?SKI S , et al . SDN architecture impact on network security[C]// Federated Conference on Computer Science and Information Systems. 2014. |
[5] | SCOTT-HAYWARD S , NATARAJAN S , SEZER S . A survey of security in software defined networks[J]. IEEE Communications Surveys&Tutorials, 2015,18(1): 623-654. |
[6] | PORRAS P , SHIN S , YEGNESWARAN V ,et al. A security enforcement kernel for OpenFlow networks[C]//2012:121-126. 2012: 121-126. |
[7] | PORRAS P , CHEUNG S , FONG M ,et al. Securing the Software-Defined Network Control Layer[C]// The 2015 Network and Distributed System Security Symposium (NDSS),San Diego,California. 2015. |
[8] | JAIN S , KUMAR A , MANDAL S ,et al. B4:experience with a globally-deployed software defined wan[C]// ACM SIGCOMM 2013 Conference on SIGCOMM. 2013: 3-14. |
[9] | BERDE P , HART J , HART J ,et al. ONOS:towards an open,distributed SDN OS[C]// The Workshop on Hot Topics in Software Defined NETWORKING. 2010: 1-6. |
[10] | ELDEFRAWY K , KACZMAREK T . Byzantine fault tolerant software-defined networking (SDN) controllers[C]// Computer Software and Applications Conference. 2016: 208-213. |
[11] | CELLO M , XU Y , WALID A ,et al. BalCon:a distributed elastic SDN control via efficient switch migration[C]// IEEE International Conference on Cloud Engineering. 2017. |
[12] | GUO Z , XU Y , CELLO M ,et al. JumpFlow:reducing flow table usage in software-defined networks[J]. Computer Networks, 2015,(92): 300-315. |
[13] | MCGEER R , . A safe,efficient update protocol for openflow networks[C]// The Workshop on Hot Topics in Software Defined Networks. 2012: 61-66. |
[14] | SUKAPURAM R , BARUA G . Enhanced algorithms for consistent network updates[C]// Network Function Virtualization and Software Defined Network. 2016: 184-190. |
[15] | HUSSEIN A , ELHAJJ I H , CHEHAB A ,et al. SDN verification plane for consistency establishment[C]// Computers and Communication. IEEE, 2016: 519-524. |
[16] | HUA J , GE X , ZHONG S . FOUM:a flow-ordered consistent update mechanism for software-defined networking in adversarial settings[C]// The International Conference on Computer Communications. 2016: 1-9. |
[17] | Reitblatt M , Foster N , Rexford J ,et al. Consistent updates for software-defined networks:change you can believe in![C]// ACM Workshop on Hot Topics in Networks. 2011:7. |
[18] | Ryu SDN Framework[EB/OL]. . |
[19] | FloodLight.“Open SDN controller”[EB/OL]. . |
[20] | QI C , WU J , HU H ,et al. Dynamic-scheduling mechanism of controllers based on security policy in software-defined network[J]. Electronics Letters, 2016,52(23): 1918-1920. |
[21] | QI C , WU J , HU H ,et al. An intensive security architecture with multi-controller for SDN[C]// Computer Communications Workshops. 2016: 401-402. |
[22] | OpenDaylightConsortium[EB/OL]. . |
[23] | LANTZ B , HELLER B , MCKEOWN N . A network in a laptop:rapid prototyping for software-defined networks[C]// ACM Workshop on Hot Topics in Networks. 2010: 1-6. |
[24] | MACHAT R , BANKS S , CALABRIA F ,et al. ISSU benchmarking methocldogy[DB/OL]. . |
[1] | Renfeng CHEN, Hongbin ZHU. Research on credit card transaction security supervision based on PU learning [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 73-78. |
[2] | Jingyi YUAN, Zichuan LI, Guojun PENG. EN-Bypass: a security assessment method on e-mail user interface notification [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 90-101. |
[3] | Genlin XIE, Guozhen CHENG, Yawen WANG, Qingfeng WANG. Software diversity evaluating method based on gadget feature analysis [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 161-173. |
[4] | Peng HOU, Zhixin LI, Fei ZHANG, Xu SUN, Dan CHEN, Yihao CUI, Hanbing ZHANG, Yinan JIN, Hongfeng CHAI. Technology and practice of intelligent governance for financial data security [J]. Chinese Journal of Network and Information Security, 2023, 9(3): 174-187. |
[5] | Jinyin CHEN, Rongchang LI, Guohan HUANG, Tao LIU, Haibin ZHENG, Yao CHENG. Survey on vertical federated learning: algorithm, privacy and security [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 1-20. |
[6] | Heli WANG, Qiao YAN. Selfish mining detection scheme based on the characters of transactions [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 104-114. |
[7] | Xiaochen SHEN, Yinhui GE, Bo CHEN, Ling YU. Research on construction technology of artificial intelligence security knowledge graph [J]. Chinese Journal of Network and Information Security, 2023, 9(2): 164-174. |
[8] | Beiyuan YU, Shanyao REN, Jianwei LIU. Overview of blockchain assets theft attacks and defense technology [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 1-17. |
[9] | Xunxun CHEN, Mingzhe LI, Ning LYU, Liang HUANG. Intrinsic assurance: a systematic approach towards extensible cybersecurity [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 92-102. |
[10] | Kexian LIU, Jianfeng GUAN, Wancheng ZHANG, Zhikai HE, Dijia YAN. Multiple redundant flow fingerprint model based on time slots [J]. Chinese Journal of Network and Information Security, 2023, 9(1): 115-129. |
[11] | Ganqin LIU, Hui LI, Hui ZHU, Yukun HUANG, Xingdong LIU. Public key cryptographic algorithm SM2 optimized implementation on low power embedded platform [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 29-38. |
[12] | Xue BAI, Baodong QIN, Rui GUO, Dong ZHENG. Two-party cooperative blind signature based on SM2 [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 39-51. |
[13] | Jun LIU, Lin YUAN, Zhishang FENG. Survey of key management schemes for cluster networks [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 52-69. |
[14] | Dong LI, Yanni HAO, Shenghui PENG, Ruijie ZI, Ximeng LIU. Network security of the National Natural Science Foundation of China: today and prospects [J]. Chinese Journal of Network and Information Security, 2022, 8(6): 92-101. |
[15] | Yi XIA, Mingjng LAN, Xiaohui CHEN, Junyong LUO, Gang ZHOU, Peng HE. Survey on explainable knowledge graph reasoning methods [J]. Chinese Journal of Network and Information Security, 2022, 8(5): 1-25. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|