Статья 'Средство определения изменения конфигурации SDN сети' - журнал 'Кибернетика и программирование' - NotaBene.ru
по
Journal Menu
> Issues > Rubrics > About journal > Authors > About the Journal > Requirements for publication > Council of Editors > Peer-review process > Policy of publication. Aims & Scope. > Article retraction > Ethics > Online First Pre-Publication > Copyright & Licensing Policy > Digital archiving policy > Open Access Policy > Open access publishing costs > Article Identification Policy > Plagiarism check policy
Journals in science databases
About the Journal

Публикация за 72 часа - теперь это реальность!
При необходимости издательство предоставляет авторам услугу сверхсрочной полноценной публикации. Уже через 72 часа статья появляется в числе опубликованных на сайте издательства с DOI и номерами страниц.
По первому требованию предоставляем все подтверждающие публикацию документы!
MAIN PAGE > Back to contents
Cybernetics and programming
Reference:

The Method of Defining the SDN Network Configuration Change

Pavlov Aleksei Vladimirovich

student of the Department of Computer Systems at Novosibirsk State University

630090, Russia, Novosibirsk Region, Novosibirsk, Pirogov's str., 2

pavlovalexx@gmail.com

DOI:

10.7256/2306-4196.2016.4.19516

Review date:

19-06-2016


Publish date:

26-08-2016


Abstract: The subject of the research is the analysis of SDN network safety methods. One of such safety methods is the analysis of the current network configuration for a fast determination of changes and upkeep of the authorized status. Today SDN networks are gaining popularity therefore development of protection algorithms for such networks is a necessary step. SDN network approach to data transfer differs from that of traditional networks. Based on that fact, an important research goalo is either to define drawbacks of exisiting algorithms applicable to such networks or to develop new ones. Research goals include analysis of existing algorithms, search for solutions and adaptation of these solutions to initial tasks or development of a new solution. As a result of the research, the author describes a device that would ensure security of SDN network at the level of data transfer disregarding external factors. This would alllow to provide an independent evaluation of network security. When the network is being re-configured, all changes will be automatic or semi-automatic, thus they will not distort the authorized status of the network. 


Keywords: network modeling, Unified Threat Management, network security, network analysys, network topology, security, SDN security device, network, SDN, network configuration
This article written in Russian. You can find full text of article in Russian here .

References
1.
Pandey S. et al. Ip network topology discovery using snmp //Information Networking, 2009. ICOIN 2009. International Conference on. – IEEE, 2009. – S. 1-5.
2.
Nazir F. et al. Constella: a complete IP network topology discovery solution //Managing Next Generation Networks and Services. – Springer Berlin Heidelberg, 2007. – S. 425-436.
3.
Harrington D., Wijnen B., Presuhn R. An architecture for describing simple network management protocol (SNMP) management frameworks. – 2002.
4.
Li C. S., Liao W. Software defined networks //IEEE Communications Magazine. – 2013. – T. 51. – №. 2. – S. 113-113.
5.
Sezer S. et al. Are we ready for SDN? Implementation challenges for software-defined networks //Communications Magazine, IEEE. – 2013. – T. 51. – №. 7. – S. 36-43.
6.
Kreutz D., Ramos F., Verissimo P. Towards secure and dependable software-defined networks //Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. – ACM, 2013. – S. 55-60.
7.
Shin S. et al. FRESCO: Modular Composable Security Services for Software-Defined Networks //NDSS. – 2013.
Link to this article

You can simply select and copy link from below text field.


Other our sites:
Official Website of NOTA BENE / Aurora Group s.r.o.
"History Illustrated" Website