Chrome Extension
WeChat Mini Program
Use on ChatGLM

A Dynamic Service Identity-Based Security Policy Consistency Checking Mechanism in SDN

Xincheng Yan, Jianhua Wu,Na Zhou,Zhihong Jiang, Junsan Zeng, Jianhui Yin,Ying Liu

2023 IEEE INTERNATIONAL CONFERENCES ON INTERNET OF THINGS, ITHINGS IEEE GREEN COMPUTING AND COMMUNICATIONS, GREENCOM IEEE CYBER, PHYSICAL AND SOCIAL COMPUTING, CPSCOM IEEE SMART DATA, SMARTDATA AND IEEE CONGRESS ON CYBERMATICS,CYBERMATICS(2024)

State Key Lab Mobile Network & Mobile Multimedia | Beijing Jiaotong Univ

Cited 0|Views5
Abstract
Service Function Chaining (SFC) is the basic business model in a Virtualization of Network Functions (VNF) scenario, which enables the provision of customized network services, including security services such as resiliently deployed stateless firewalls, load balancers, and Intrusion Detection and Prevention Systems (IDPS). However, conflicting security policies during service matching and operation enforcement may lead to problems such as policy inconsistency, forwarding loop, and information leakage. To solve these problems, the paper takes a global view of the SDN controller and configures unique service identifiers and authentication keys for policy enforcers. At the same time, a probabilistic path authentication identifier is inserted for the packet using programming protocol-independent packet processors (P4) language and combined with a symmetric key-based authentication algorithm to realize the policy checking mechanism. In this way, the consistency of the SDN controller security policy can be ensured in terms of both the consistency of the SDN flow table rules and the consistency of the enforced policies in the service function chain. The experimental results show that our mechanism can effectively ensure the consistency of security policies under the premise of ensuring acceptable throughput and delay overhead.
More
Translated text
Key words
Software-Defined Networking (SDN),Network Functions Virtualization (NFV),Service Function Chaining (SFC),Policy consistency checking,P4,Path verification
求助PDF
上传PDF
Bibtex
AI Read Science
AI Summary
AI Summary is the key point extracted automatically understanding the full text of the paper, including the background, methods, results, conclusions, icons and other key content, so that you can get the outline of the paper at a glance.
Example
Background
Key content
Introduction
Methods
Results
Related work
Fund
Key content
  • Pretraining has recently greatly promoted the development of natural language processing (NLP)
  • We show that M6 outperforms the baselines in multimodal downstream tasks, and the large M6 with 10 parameters can reach a better performance
  • We propose a method called M6 that is able to process information of multiple modalities and perform both single-modal and cross-modal understanding and generation
  • The model is scaled to large model with 10 billion parameters with sophisticated deployment, and the 10 -parameter M6-large is the largest pretrained model in Chinese
  • Experimental results show that our proposed M6 outperforms the baseline in a number of downstream tasks concerning both single modality and multiple modalities We will continue the pretraining of extremely large models by increasing data to explore the limit of its performance
Upload PDF to Generate Summary
Must-Reading Tree
Example
Generate MRT to find the research sequence of this paper
Data Disclaimer
The page data are from open Internet sources, cooperative publishers and automatic analysis results through AI technology. We do not make any commitments and guarantees for the validity, accuracy, correctness, reliability, completeness and timeliness of the page data. If you have any questions, please contact us by email: report@aminer.cn
Chat Paper
GPU is busy, summary generation fails
Rerequest