On the Fingerprinting of Software-Defined Networks
نویسندگان
چکیده
منابع مشابه
VM and Workload Fingerprinting for Software Defined
In this work we develop strategies for mining telemetry streams in virtualized clusters to automatically discover relationships between sets of virtual machines. Examples of relationships include correlations between virtual machines, similarities in resource consumption patterns or dominant resources, and similarities in metric variations. The main challenge in our approach is to transform the...
متن کاملSoftware Defined Networks
In previous chapters we have seen why SDN is necessary and what preceded the actual advent of SDN in the research and industrial communities. In this chapter we provide an overview of how SDN actually works, including discussion of the basic components of a Software Defined Networking system, their roles, and how they interact with one another. In the first part of this chapter we focus on the ...
متن کاملComposing Software Defined Networks
Managing a network requires support for multiple concurrent tasks, from routing and traffic monitoring, to access control and server load balancing. Software-Defined Networking (SDN) allows applications to realize these tasks directly, by installing packet-processing rules on switches. However, today’s SDN platforms provide limited support for creating modular applications. This paper introduce...
متن کاملOn Controller Performance in Software-Defined Networks
Network architectures in which the control plane is decoupled from the data plane have been growing in popularity. Among the main arguments for this approach is that it provides a more structured software environment for developing network-wide abstractions while potentially simplifying the data plane. As has been adopted elsewhere [11], we refer to this split architecture as Software-Defined N...
متن کاملSoftware-Defined Networks as Databases
In software-defined networks (SDN), the separation of the control and data-plane moves the concurrency control from the data-plane to a separate, now logically centralized controller program. As a result, despite its intention to simplify programming, the separation forces the programmer to deal with a spectrum of concurrent events (e.g. execution of controller programs, in-flight packets), a t...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: IEEE Transactions on Information Forensics and Security
سال: 2016
ISSN: 1556-6013,1556-6021
DOI: 10.1109/tifs.2016.2573756