Inter-function anomaly analysis for correct SDN/NFV deployment

被引:16
作者
Basile, Cataldo [1 ]
Canavese, Daniele [1 ]
Lioy, Antonio [1 ]
Pitscheider, Christian [1 ]
Valenza, Fulvio [1 ]
机构
[1] Politecn Torino, Dipartimento Automat & Informat, I-10129 Turin, Italy
关键词
SDN/NFV; VNF policy; inter-function anomaly analysis; CONFIGURATION;
D O I
10.1002/nem.1917
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Implementing the security of a network consists in individually configuring several network functions. Network functions are configured by means of a policy composed of a set of rules, but their actual behaviour is influenced by the other policies implemented by all the other network functions around them. This paper proposes a formal model that can be used to detect inter-function anomalies, which are defined as the interferences between two or more functions deployed in the same network. We have proved with experiments that the proposed model is fast and scalable. Copyright (C) 2015 John Wiley & Sons, Ltd
引用
收藏
页码:25 / 43
页数:19
相关论文
共 32 条
[21]  
Liu AX, 2005, LECT NOTES COMPUT SC, V3654, P193
[22]   Understanding BGP misconfiguration [J].
Mahajan, R ;
Wetherall, D ;
Anderson, T .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2002, 32 (04) :3-16
[23]   OpenFlow: Enabling innovation in campus networks [J].
McKeown, Nick ;
Anderson, Tom ;
Balakrishnan, Hari ;
Parulkar, Guru ;
Peterson, Larry ;
Rexford, Jennifer ;
Shenker, Scott ;
Turner, Jonathan .
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW, 2008, 38 (02) :69-74
[24]  
Panda A, 2014, CORR, P7687
[25]  
Quinn B, 2001, RFC3198
[26]   Formal Verification of Virtual Network Function Graphs in an SP-DevOps Context [J].
Spinoso, Serena ;
Virgilio, Matteo ;
John, Wolfgang ;
Manzalini, Antonio ;
Marchetto, Guido ;
Sisto, Riccardo .
SERVICE ORIENTED AND CLOUD COMPUTING, ESOCC 2015, 2015, 9306 :253-262
[27]  
Spinoso S, 2014, INT CONF UTIL CLOUD, P750, DOI 10.1109/UCC.2014.122
[28]  
Tavakoli A, 2009, 8 ACM WORKSH HOT TOP, P22
[29]   Survey and taxonomy of packet classification techniques [J].
Taylor, DE .
ACM COMPUTING SURVEYS, 2005, 37 (03) :238-275
[30]   A Formal Model of Network Policy Analysis [J].
Valenza, Fulvio ;
Spinoso, Serena ;
Basile, Cataldo ;
Sisto, Riccardo ;
Lioy, Antonio .
2015 IEEE 1ST INTERNATIONAL FORUM ON RESEARCH AND TECHNOLOGIES FOR SOCIETY AND INDUSTRY (RTSI 2015) PROCEEDINGS, 2015, :516-522