Skip to main content

2022 | OriginalPaper | Buchkapitel

5. Network Policies in Software Defined Internet of Everything

verfasst von : Rashid Amin, Mudassar Hussain, Muhammad Bilal

Erschienen in: Software Defined Internet of Everything

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The wide use of communication devices and machines over the world turned the legacy Internet into Internet of everything. These devices are controlled and governed by rules and policies, mostly dictated by an organization. Obliged to rules the network management and control are vital tasks that require significant effort and resources. Software Defined Network eases all devices’ control and management by decoupling the control plane from the data plane. Network policies are an essential part of every system that controls the access of devices and users among each other as well as to the data centers. Due to the change in business requirements, these network policies are required to update rules across all the devices. If there are some misconfigurations, the entire IoT system may cause disruption and can lead to unauthorized access to network resources. Several approaches have been adopted to cope with these challenges, automation of network policies, optimizing policy placements, the suitable mechanism to update the policies according to requirements, etc.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Al-Shaer, E., & Al-Haj, S. (2010). Flowchecker: Configuration analysis and verification of federated openflow infrastructures. In Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration (pp. 37–44), 2010. Al-Shaer, E., & Al-Haj, S. (2010). Flowchecker: Configuration analysis and verification of federated openflow infrastructures. In Proceedings of the 3rd ACM Workshop on Assurable and Usable Security Configuration (pp. 37–44), 2010.
2.
Zurück zum Zitat Alvarez-Campana, M., López, G., Vázquez, E., Villagrá, V. A., & Berrocal, J. (2017). Smart CEI moncloa: An IoT-based platform for people flow and environmental monitoring on a smart university campus. Sensors, 17(12), 2856.CrossRef Alvarez-Campana, M., López, G., Vázquez, E., Villagrá, V. A., & Berrocal, J. (2017). Smart CEI moncloa: An IoT-based platform for people flow and environmental monitoring on a smart university campus. Sensors, 17(12), 2856.CrossRef
3.
Zurück zum Zitat Alvizu, R., Maier, G., Kukreja, N., Pattavina, A., Morro, R., Capello, A., & Cavazzoni, C. (2017). Comprehensive survey on T-SDN: Software-defined networking for transport networks. IEEE Communications Surveys & Tutorials, 19(4), 2232–2283.CrossRef Alvizu, R., Maier, G., Kukreja, N., Pattavina, A., Morro, R., Capello, A., & Cavazzoni, C. (2017). Comprehensive survey on T-SDN: Software-defined networking for transport networks. IEEE Communications Surveys & Tutorials, 19(4), 2232–2283.CrossRef
4.
Zurück zum Zitat Amin, R., Shah, N., Shah, B., & Alfandi, O. (2016). Auto-configuration of ACL policy in case of topology change in hybrid SDN. IEEE Access, 4, 9437–9450.CrossRef Amin, R., Shah, N., Shah, B., & Alfandi, O. (2016). Auto-configuration of ACL policy in case of topology change in hybrid SDN. IEEE Access, 4, 9437–9450.CrossRef
5.
Zurück zum Zitat Amin, R., Reisslein, M., & Shah, N. (2018). Hybrid SDN networks: A survey of existing approaches. IEEE Communications Surveys & Tutorials, 20(4), 3259–3306.CrossRef Amin, R., Reisslein, M., & Shah, N. (2018). Hybrid SDN networks: A survey of existing approaches. IEEE Communications Surveys & Tutorials, 20(4), 3259–3306.CrossRef
6.
Zurück zum Zitat Amin, R., Shah, N., & Mehmood, W. (2019). Enforcing optimal ACL policies using k-partite graph in hybrid SDN. Electronics, 8(6), 604.CrossRef Amin, R., Shah, N., & Mehmood, W. (2019). Enforcing optimal ACL policies using k-partite graph in hybrid SDN. Electronics, 8(6), 604.CrossRef
7.
Zurück zum Zitat Aujla, G. S., Chaudhary, R., Kumar, N., Kumar, R., & Rodrigues, J. J. P. C. (2018). An ensembled scheme for QoS-aware traffic flow management in software defined networks. In 2018 IEEE International Conference on Communications (ICC) (pp. 1–7). New York: IEEE. Aujla, G. S., Chaudhary, R., Kumar, N., Kumar, R., & Rodrigues, J. J. P. C. (2018). An ensembled scheme for QoS-aware traffic flow management in software defined networks. In 2018 IEEE International Conference on Communications (ICC) (pp. 1–7). New York: IEEE.
8.
Zurück zum Zitat Aujla, G. S., Singh, A., & Kumar, N. (2019). Adaptflow: Adaptive flow forwarding scheme for software-defined industrial networks. IEEE Internet of Things Journal, 7(7), 5843–5851.CrossRef Aujla, G. S., Singh, A., & Kumar, N. (2019). Adaptflow: Adaptive flow forwarding scheme for software-defined industrial networks. IEEE Internet of Things Journal, 7(7), 5843–5851.CrossRef
10.
Zurück zum Zitat Aujla, G. S., Singh, A., Singh, M., Sharma, S., Kumar, N., & Choo, K.-K. R. (2020). Blocked: Blockchain-based secure data processing framework in edge envisioned v2x environment. IEEE Transactions on Vehicular Technology, 69(6), 5850–5863.CrossRef Aujla, G. S., Singh, A., Singh, M., Sharma, S., Kumar, N., & Choo, K.-K. R. (2020). Blocked: Blockchain-based secure data processing framework in edge envisioned v2x environment. IEEE Transactions on Vehicular Technology, 69(6), 5850–5863.CrossRef
11.
Zurück zum Zitat Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). Blocksdn: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 34(2), 83–91.CrossRef Aujla, G. S., Singh, M., Bose, A., Kumar, N., Han, G., & Buyya, R. (2020). Blocksdn: Blockchain-as-a-service for software defined networking in smart city applications. IEEE Network, 34(2), 83–91.CrossRef
12.
Zurück zum Zitat Bandara, A. K., Lupu, E. C., Moffett, J., & Russo, A. (2004). A goal-based approach to policy refinement. In Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004 (pp. 229–239). New York: IEEE. Bandara, A. K., Lupu, E. C., Moffett, J., & Russo, A. (2004). A goal-based approach to policy refinement. In Proceedings of the Fifth IEEE International Workshop on Policies for Distributed Systems and Networks, 2004. POLICY 2004 (pp. 229–239). New York: IEEE.
13.
Zurück zum Zitat Benson, T., Akella, A., & Maltz, D. A. (2009). Unraveling the complexity of network management. In NSDI (pp. 335–348). Benson, T., Akella, A., & Maltz, D. A. (2009). Unraveling the complexity of network management. In NSDI (pp. 335–348).
14.
Zurück zum Zitat Berke, P., Cooper, J., Aminto, M., Grabich, S., & Horney, J. (2014). Adaptive planning for disaster recovery and resiliency: An evaluation of 87 local recovery plans in eight states. Journal of the American Planning Association, 80(4), 310–323.CrossRef Berke, P., Cooper, J., Aminto, M., Grabich, S., & Horney, J. (2014). Adaptive planning for disaster recovery and resiliency: An evaluation of 87 local recovery plans in eight states. Journal of the American Planning Association, 80(4), 310–323.CrossRef
15.
Zurück zum Zitat Cao, H., Wu, S., Aujla, G. S., Wang, Q., Yang, L., & Zhu, H. (2019). Dynamic embedding and quality of service-driven adjustment for cloud networks. IEEE Transactions on Industrial Informatics, 16(2), 1406–1416 (2019) Cao, H., Wu, S., Aujla, G. S., Wang, Q., Yang, L., & Zhu, H. (2019). Dynamic embedding and quality of service-driven adjustment for cloud networks. IEEE Transactions on Industrial Informatics, 16(2), 1406–1416 (2019)
17.
Zurück zum Zitat Damianou, N., Bandara, A., Sloman, M., & Lupu, E. (2002). A survey of policy specification approaches. Department of Computing, Imperial College of Science Technology and Medicine, London (Vol. 3, pp. 142–156). Damianou, N., Bandara, A., Sloman, M., & Lupu, E. (2002). A survey of policy specification approaches. Department of Computing, Imperial College of Science Technology and Medicine, London (Vol. 3, pp. 142–156).
18.
Zurück zum Zitat Feamster, N., Rexford, J., & Zegura, E. (2014). The road to SDN: An intellectual history of programmable networks. ACM SIGCOMM Computer Communication Review, 44(2), 87–98.CrossRef Feamster, N., Rexford, J., & Zegura, E. (2014). The road to SDN: An intellectual history of programmable networks. ACM SIGCOMM Computer Communication Review, 44(2), 87–98.CrossRef
19.
Zurück zum Zitat Foster, N., Harrison, R., Freedman, M. J., Monsanto, C., Rexford, J., Story, A., & Walker, D. (2011). Frenetic: A network programming language. ACM Sigplan Notices, 46(9), 279–291.CrossRef Foster, N., Harrison, R., Freedman, M. J., Monsanto, C., Rexford, J., Story, A., & Walker, D. (2011). Frenetic: A network programming language. ACM Sigplan Notices, 46(9), 279–291.CrossRef
20.
Zurück zum Zitat Gabillon, A., Gallier, R., & Bruno, E. (2020). Access controls for IoT networks. SN Computer Science, 1(1), 1–13.CrossRef Gabillon, A., Gallier, R., & Bruno, E. (2020). Access controls for IoT networks. SN Computer Science, 1(1), 1–13.CrossRef
21.
Zurück zum Zitat Gusmeroli, S., Piccione, S., & Rotondi, D. (2013). A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling, 58(5–6), 1189–1205.CrossRef Gusmeroli, S., Piccione, S., & Rotondi, D. (2013). A capability-based security approach to manage access control in the internet of things. Mathematical and Computer Modelling, 58(5–6), 1189–1205.CrossRef
23.
Zurück zum Zitat Huang, D., Chowdhary, A., & Pisharody, S. (2018). Software-Defined networking and security: From theory to practice. Boca Raton: CRC Press.CrossRef Huang, D., Chowdhary, A., & Pisharody, S. (2018). Software-Defined networking and security: From theory to practice. Boca Raton: CRC Press.CrossRef
24.
Zurück zum Zitat Hussain, M., & Shah, N. (2018). Automatic rule installation in case of policy change in software defined networks. Telecommunication Systems, 68(3), 461–477 (2018) Hussain, M., & Shah, N. (2018). Automatic rule installation in case of policy change in software defined networks. Telecommunication Systems, 68(3), 461–477 (2018)
25.
Zurück zum Zitat Hussain, M., Shah, N., & Tahir, A. (2019). Graph-based policy change detection and implementation in SDN. Electronics, 8(10), 1136.CrossRef Hussain, M., Shah, N., & Tahir, A. (2019). Graph-based policy change detection and implementation in SDN. Electronics, 8(10), 1136.CrossRef
26.
Zurück zum Zitat Keoh, S. L., Kumar, S. S., & Tschofenig, H. (2014). Securing the internet of things: A standardization perspective. IEEE Internet of things Journal, 1(3), 265–275.CrossRef Keoh, S. L., Kumar, S. S., & Tschofenig, H. (2014). Securing the internet of things: A standardization perspective. IEEE Internet of things Journal, 1(3), 265–275.CrossRef
27.
Zurück zum Zitat Kolar, M., Fernandez-Gago, C., & Lopez, J. (2018). Policy languages and their suitability for trust negotiation. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 69–84). New York: Springer. Kolar, M., Fernandez-Gago, C., & Lopez, J. (2018). Policy languages and their suitability for trust negotiation. In IFIP Annual Conference on Data and Applications Security and Privacy (pp. 69–84). New York: Springer.
28.
Zurück zum Zitat Kreibich, C., Handley, M., & Paxson, V. (2001). Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the USENIX Security Symposium, Vol. 2001. Kreibich, C., Handley, M., & Paxson, V. (2001). Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In Proceedings of the USENIX Security Symposium, Vol. 2001.
29.
Zurück zum Zitat Lee, J., Kang, J.-M., Prakash, C., Banerjee, S., Turner, Y., Akella, A., Clark, C., Ma, Y., Sharma, P., & Zhang, Y. (2015). Network policy whiteboarding and composition. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (pp. 373–374). Lee, J., Kang, J.-M., Prakash, C., Banerjee, S., Turner, Y., Akella, A., Clark, C., Ma, Y., Sharma, P., & Zhang, Y. (2015). Network policy whiteboarding and composition. In Proceedings of the 2015 ACM Conference on Special Interest Group on Data Communication (pp. 373–374).
30.
Zurück zum Zitat Levitin, G., Xing, L., Zhai, Q., & Dai, Y. (2015). Optimization of full versus incremental periodic backup policy. IEEE Transactions on Dependable and Secure Computing, 13(6), 644–656.CrossRef Levitin, G., Xing, L., Zhai, Q., & Dai, Y. (2015). Optimization of full versus incremental periodic backup policy. IEEE Transactions on Dependable and Secure Computing, 13(6), 644–656.CrossRef
31.
Zurück zum Zitat Li, D., Wang, S., Zhu, K., & Xia, S. (2017). A survey of network update in SDN. Frontiers of Computer Science, 11(1), 4–12.CrossRef Li, D., Wang, S., Zhu, K., & Xia, S. (2017). A survey of network update in SDN. Frontiers of Computer Science, 11(1), 4–12.CrossRef
32.
Zurück zum Zitat Mai, H., Khurshid, A., Agarwal, R., Caesar, M., Godfrey, P. B., & King, S. T. (2011). Debugging the data plane with anteater. ACM SIGCOMM Computer Communication Review, 41(4), 290–301.CrossRef Mai, H., Khurshid, A., Agarwal, R., Caesar, M., Godfrey, P. B., & King, S. T. (2011). Debugging the data plane with anteater. ACM SIGCOMM Computer Communication Review, 41(4), 290–301.CrossRef
33.
Zurück zum Zitat McKeown, N. (2011). How SDN will shape networking. Open Networking Summit. McKeown, N. (2011). How SDN will shape networking. Open Networking Summit.
34.
Zurück zum Zitat McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., & Turner, J. (2008). Openflow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2), 69–74 (2008) McKeown, N., Anderson, T., Balakrishnan, H., Parulkar, G., Peterson, L., Rexford, J., Shenker, S., & Turner, J. (2008). Openflow: Enabling innovation in campus networks. ACM SIGCOMM Computer Communication Review, 38(2), 69–74 (2008)
35.
Zurück zum Zitat Monsanto, C., Reich, J., Foster, N., Rexford, J., & Walker, D. (2013). Composing software defined networks. In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13) (pp. 1–13). Monsanto, C., Reich, J., Foster, N., Rexford, J., & Walker, D. (2013). Composing software defined networks. In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13) (pp. 1–13).
36.
Zurück zum Zitat Moshref, M., Yu, M., Sharma, A., & Govindan, R. (2013). Scalable rule management for data centers. In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13) (pp. 157–170). Moshref, M., Yu, M., Sharma, A., & Govindan, R. (2013). Scalable rule management for data centers. In 10th {USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 13) (pp. 157–170).
37.
Zurück zum Zitat Mousa, M., Bahaa-Eldin, A. M., & Sobh, M. (2016). Software defined networking concepts and challenges. In 2016 11th International Conference on Computer Engineering & Systems (ICCES) (pp. 79–90). New York: IEEE.CrossRef Mousa, M., Bahaa-Eldin, A. M., & Sobh, M. (2016). Software defined networking concepts and challenges. In 2016 11th International Conference on Computer Engineering & Systems (ICCES) (pp. 79–90). New York: IEEE.CrossRef
38.
Zurück zum Zitat Paquet, C. (2012). Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide: Imp Cisco IOS Netw Sec F _c2. Indianapolis: Cisco Press. Paquet, C. (2012). Implementing Cisco IOS Network Security (IINS 640-554) Foundation Learning Guide: Imp Cisco IOS Netw Sec F _c2. Indianapolis: Cisco Press.
39.
Zurück zum Zitat Pashkov, V., Shalimov, A., & Smeliansky, R. (2014). Controller failover for SDN enterprise networks. In 2014 International Science and Technology Conference (Modern Networking Technologies)(MoNeTeC) (pp. 1–6). New York: IEEE. Pashkov, V., Shalimov, A., & Smeliansky, R. (2014). Controller failover for SDN enterprise networks. In 2014 International Science and Technology Conference (Modern Networking Technologies)(MoNeTeC) (pp. 1–6). New York: IEEE.
40.
Zurück zum Zitat Pisharody, S. (2017). Policy conflict management in distributed SDN environments. PhD thesis, Arizona State University, 2017. Pisharody, S. (2017). Policy conflict management in distributed SDN environments. PhD thesis, Arizona State University, 2017.
41.
Zurück zum Zitat Prakash, C., Lee, J., Turner, Y., Kang, J.-M., Akella, A., Banerjee, S., Clark, C., Ma, Y., Sharma, P., & Zhang, Y. (2015). PGA: Using graphs to express and automatically reconcile network policies. ACM SIGCOMM Computer Communication Review, 45(4), 29–42 (2015). Prakash, C., Lee, J., Turner, Y., Kang, J.-M., Akella, A., Banerjee, S., Clark, C., Ma, Y., Sharma, P., & Zhang, Y. (2015). PGA: Using graphs to express and automatically reconcile network policies. ACM SIGCOMM Computer Communication Review, 45(4), 29–42 (2015).
42.
Zurück zum Zitat Reitblatt, M., Foster, N., Rexford, J., Schlesinger, C., & Walker, D. (2012). Abstractions for network update. ACM SIGCOMM Computer Communication Review, 42(4), 323–334.CrossRef Reitblatt, M., Foster, N., Rexford, J., Schlesinger, C., & Walker, D. (2012). Abstractions for network update. ACM SIGCOMM Computer Communication Review, 42(4), 323–334.CrossRef
43.
Zurück zum Zitat Sanabria-Russo, L., Alonso-Zarate, J., & Verikoukis, C. (2018). SDN-based pro-active flow installation mechanism for delay reduction in IoT. In 2018 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). New York: IEEE. Sanabria-Russo, L., Alonso-Zarate, J., & Verikoukis, C. (2018). SDN-based pro-active flow installation mechanism for delay reduction in IoT. In 2018 IEEE Global Communications Conference (GLOBECOM) (pp. 1–6). New York: IEEE.
44.
Zurück zum Zitat Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., & Rao, N. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), 36–43.CrossRef Sezer, S., Scott-Hayward, S., Chouhan, P. K., Fraser, B., Lake, D., Finnegan, J., Viljoen, N., Miller, M., & Rao, N. (2013). Are we ready for SDN? Implementation challenges for software-defined networks. IEEE Communications Magazine, 51(7), 36–43.CrossRef
45.
Zurück zum Zitat Shenker, S., Casado, M., Koponen, T., McKeown, N., et al. (2011). The future of networking, and the past of protocols. Open Networking Summit, 20, 1–30. Shenker, S., Casado, M., Koponen, T., McKeown, N., et al. (2011). The future of networking, and the past of protocols. Open Networking Summit, 20, 1–30.
46.
Zurück zum Zitat Stephen, B., & Petropoulakis, L. (2007). The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement. Journal of Network and Computer Applications, 30(2), 445–465.CrossRef Stephen, B., & Petropoulakis, L. (2007). The design and implementation of an agent-based framework for acceptable usage policy monitoring and enforcement. Journal of Network and Computer Applications, 30(2), 445–465.CrossRef
47.
Zurück zum Zitat Stone, G. N., Lundy, B., & Xie, G. G. (2001). Network policy languages: A survey and a new approach. IEEE Network, 15(1), 10–21.CrossRef Stone, G. N., Lundy, B., & Xie, G. G. (2001). Network policy languages: A survey and a new approach. IEEE Network, 15(1), 10–21.CrossRef
48.
Zurück zum Zitat Strassner, J., & Schleimer, S. (1998). Policy framework definition language. draft-ietf-policy-framework-pfdl-00. txt. Strassner, J., & Schleimer, S. (1998). Policy framework definition language. draft-ietf-policy-framework-pfdl-00. txt.
49.
Zurück zum Zitat Sun, X., Rao, S. G., & Xie, G. G. (2012). Modeling complexity of enterprise routing design. In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (pp. 85–96). Sun, X., Rao, S. G., & Xie, G. G. (2012). Modeling complexity of enterprise routing design. In Proceedings of the 8th International Conference on Emerging Networking Experiments and Technologies (pp. 85–96).
50.
Zurück zum Zitat Sun, X., Sung, Y.-W., Krothapalli, S. D., & Rao, S. G. (2010). A systematic approach for evolving vlan designs. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). New York: IEEE. Sun, X., Sung, Y.-W., Krothapalli, S. D., & Rao, S. G. (2010). A systematic approach for evolving vlan designs. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). New York: IEEE.
51.
Zurück zum Zitat Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., & Richardson, M. (2015). A security threat analysis for the routing protocol for low-power and lossy networks (RPLS). RFC 7416 (Informational), Internet Engineering Task Force. Tsao, T., Alexander, R., Dohler, M., Daza, V., Lozano, A., & Richardson, M. (2015). A security threat analysis for the routing protocol for low-power and lossy networks (RPLS). RFC 7416 (Informational), Internet Engineering Task Force.
52.
Zurück zum Zitat Valenza, F., Spinoso, S., & Sisto, R. (2019). Formally specifying and checking policies and anomalies in service function chaining. Journal of Network and Computer Applications, 146, 102419.CrossRef Valenza, F., Spinoso, S., & Sisto, R. (2019). Formally specifying and checking policies and anomalies in service function chaining. Journal of Network and Computer Applications, 146, 102419.CrossRef
53.
Zurück zum Zitat Voellmy, A., Wang, J., Yang, Y. R., Ford, B., & Hudak, P. (2013). Maple: Simplifying SDN programming using algorithmic policies. ACM SIGCOMM Computer Communication Review, 43(4), 87–98.CrossRef Voellmy, A., Wang, J., Yang, Y. R., Ford, B., & Hudak, P. (2013). Maple: Simplifying SDN programming using algorithmic policies. ACM SIGCOMM Computer Communication Review, 43(4), 87–98.CrossRef
54.
Zurück zum Zitat Wang, B., & Liu, K. J. R. (2010). Advances in cognitive radio networks: A survey. IEEE Journal of Selected Topics in Signal Processing, 5(1), 5–23.CrossRef Wang, B., & Liu, K. J. R. (2010). Advances in cognitive radio networks: A survey. IEEE Journal of Selected Topics in Signal Processing, 5(1), 5–23.CrossRef
55.
Zurück zum Zitat Whitlock, M. C., Bronstein, J. L., Bruna, E. M., Ellison, A. M., Fox, C. W., McPeek, M. A., Moore, A. J., Noor, M. A. F., Rausher, M. D., Rieseberg, L. H., et al. (2016). A balanced data archiving policy for long-term studies. Trends in Ecology & Evolution, 31(2), 84–85.CrossRef Whitlock, M. C., Bronstein, J. L., Bruna, E. M., Ellison, A. M., Fox, C. W., McPeek, M. A., Moore, A. J., Noor, M. A. F., Rausher, M. D., Rieseberg, L. H., et al. (2016). A balanced data archiving policy for long-term studies. Trends in Ecology & Evolution, 31(2), 84–85.CrossRef
56.
Zurück zum Zitat Yan, B., Xu, Y., Xing, H., Xi, K., & Chao, H. J. (2014). Cab: A reactive wildcard rule caching system for software-defined networks. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking (pp. 163–168). Yan, B., Xu, Y., Xing, H., Xi, K., & Chao, H. J. (2014). Cab: A reactive wildcard rule caching system for software-defined networks. In Proceedings of the Third Workshop on Hot Topics in Software Defined Networking (pp. 163–168).
57.
Zurück zum Zitat Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and distributed denial of service (DDOS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef Yan, Q., Yu, F. R., Gong, Q., & Li, J. (2015). Software-defined networking (SDN) and distributed denial of service (DDOS) attacks in cloud computing environments: A survey, some research issues, and challenges. IEEE Communications Surveys & Tutorials, 18(1), 602–622.CrossRef
58.
Zurück zum Zitat Zhang, B., & Ng, T. E. (2010) On constructing efficient shared decision trees for multiple packet filters. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). New York: IEEE. Zhang, B., & Ng, T. E. (2010) On constructing efficient shared decision trees for multiple packet filters. In 2010 Proceedings IEEE INFOCOM (pp. 1–9). New York: IEEE.
Metadaten
Titel
Network Policies in Software Defined Internet of Everything
verfasst von
Rashid Amin
Mudassar Hussain
Muhammad Bilal
Copyright-Jahr
2022
DOI
https://doi.org/10.1007/978-3-030-89328-6_5

Premium Partner