Modelling and verification of security rules in an OpenFlow environment with Coloured Petri Nets
The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to...
Saved in:
Published in | Iberian Conference on Information Systems and Technologies (Print) pp. 1 - 7 |
---|---|
Main Authors | , , |
Format | Conference Proceeding |
Language | English Portuguese |
Published |
AISTI
01.06.2014
|
Subjects | |
Online Access | Get full text |
ISSN | 2166-0727 |
DOI | 10.1109/CISTI.2014.6876890 |
Cover
Abstract | The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied in an environment based on OpenFlow. The analysis of the security policy rules is realized based on data obtained from a simulation of a scenario, modeled using Colored Petri Nets (CPN), and validated by the state space generated from the outputs of this model. The collected results are for a specific scenario. However, the approach is useful to analyze several types of systems. Thus, this research demonstrates that is feasible to employ CPN to model and validate security rules in an OpenFlow-based SDN. |
---|---|
AbstractList | The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied in an environment based on OpenFlow. The analysis of the security policy rules is realized based on data obtained from a simulation of a scenario, modeled using Colored Petri Nets (CPN), and validated by the state space generated from the outputs of this model. The collected results are for a specific scenario. However, the approach is useful to analyze several types of systems. Thus, this research demonstrates that is feasible to employ CPN to model and validate security rules in an OpenFlow-based SDN. |
Author | Torrez Rojas, Marco Antonio Melo de Brito Carvalho, Tereza Cristina Takeo Ueda, Eduardo |
Author_xml | – sequence: 1 givenname: Marco Antonio surname: Torrez Rojas fullname: Torrez Rojas, Marco Antonio email: matrojas@larc.usp.br organization: Dept. de Eng. de Comput. e Sist. Digitais, Escola Politec. da Univ. de Sao Paulo, Sao Paulo, Brazil – sequence: 2 givenname: Eduardo surname: Takeo Ueda fullname: Takeo Ueda, Eduardo email: edutakeo@larc.usp.br organization: Dept. de Eng. de Comput. e Sist. Digitais, Escola Politec. da Univ. de Sao Paulo, Sao Paulo, Brazil – sequence: 3 givenname: Tereza Cristina surname: Melo de Brito Carvalho fullname: Melo de Brito Carvalho, Tereza Cristina email: carvalho@larc.usp.br organization: Dept. de Eng. de Comput. e Sist. Digitais, Escola Politec. da Univ. de Sao Paulo, Sao Paulo, Brazil |
BookMark | eNotkM1OAjEYRWuCiYC8gG76AoP9m7azNBNREhQTcY2dzletGVrS6UB4e0lkdc_i5CzuBI1CDIDQHSVzSkn1UC8_Nss5I1TMpVZSV-QKTSpdVVpwwekIjRmVsiCKqRs06_tfQginSpVMjdHXa2yh63z4xia0-ADJO29N9jHg6HAPdkg-n3AaOuixD2cLr_cQFl08YggHn2LYQcj46PMPrmMXhwQtfoecPH6D3N-ia2e6HmaXnaLPxdOmfilW6-dl_bgqPCVlLqC1TmjLGdFMckErY1jTOt1I4pSorBb2jFKxRljihJLCqJKXjaUl0460fIru_7seALb75HcmnbaXQ_gfNAFXkQ |
ContentType | Conference Proceeding |
DBID | 6IE 6IL CBEJK RIE RIL |
DOI | 10.1109/CISTI.2014.6876890 |
DatabaseName | IEEE Electronic Library (IEL) Conference Proceedings IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume IEEE Xplore All Conference Proceedings IEEE Electronic Library (IEL) IEEE Proceedings Order Plans (POP All) 1998-Present |
DatabaseTitleList | |
Database_xml | – sequence: 1 dbid: RIE name: IEEE Electronic Library (IEL) url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/ sourceTypes: Publisher |
DeliveryMethod | fulltext_linktorsrc |
Discipline | Engineering |
EISBN | 9899843431 9789899843431 |
EndPage | 7 |
ExternalDocumentID | 6876890 |
Genre | orig-research |
GroupedDBID | 6IE 6IF 6IH 6IK 6IL 6IN AAJGR AAWTH ABLEC ADZIZ ALMA_UNASSIGNED_HOLDINGS BEFXN BFFAM BGNUA BKEBE BPEOZ CBEJK CHZPO IEGSK IPLJI M43 OCL RIE RIL |
ID | FETCH-LOGICAL-i105t-edcf48c3208263419aa2bdf8b60f749c84cb60672b4c0f4764a7535bc1528f0d3 |
IEDL.DBID | RIE |
ISSN | 2166-0727 |
IngestDate | Wed Aug 27 04:17:35 EDT 2025 |
IsPeerReviewed | false |
IsScholarly | false |
Language | English Portuguese |
LinkModel | DirectLink |
MergedId | FETCHMERGED-LOGICAL-i105t-edcf48c3208263419aa2bdf8b60f749c84cb60672b4c0f4764a7535bc1528f0d3 |
PageCount | 7 |
ParticipantIDs | ieee_primary_6876890 |
PublicationCentury | 2000 |
PublicationDate | 2014-June |
PublicationDateYYYYMMDD | 2014-06-01 |
PublicationDate_xml | – month: 06 year: 2014 text: 2014-June |
PublicationDecade | 2010 |
PublicationTitle | Iberian Conference on Information Systems and Technologies (Print) |
PublicationTitleAbbrev | CISTI |
PublicationYear | 2014 |
Publisher | AISTI |
Publisher_xml | – name: AISTI |
SSID | ssj0003177527 |
Score | 1.539917 |
Snippet | The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and... |
SourceID | ieee |
SourceType | Publisher |
StartPage | 1 |
SubjectTerms | Analytical models Coloured Petri Nets Computational modeling Data models Internet OpenFlow Petri nets SDN Security Software Validate security rules |
Title | Modelling and verification of security rules in an OpenFlow environment with Coloured Petri Nets |
URI | https://ieeexplore.ieee.org/document/6876890 |
hasFullText | 1 |
inHoldings | 1 |
isFullTextHit | |
isPrint | |
link | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pa8IwFA7O03bZDx37TQ47rrXWNG3OMtGBMpiCN9ckLyCTdmjLYH_9XtLq3Nhht1BKCHltv_fS730fIfciCiOtTeKlCL4eS4z0UinAg0BDyLTiwom4jid8OGNP82jeIA-7XhgAcOQz8O3Q_cvXuSrtUVmH46ubCCzQD-JYVL1au_MUxMG4cmgNuxyLZMTlbY9MIDr90ct0ZIlczK8n-eGm4sBkcEzG22VUHJI3vyykrz5_KTT-d50npP3dtkefd4B0ShqQnZGjPcXBFnm13mdOhpummab4HFuqkIsOzQ3d1G52dF2uYEOXGd5FLedksMo_6F5THLXnt7SPX85yDZo6Xy46gWLTJrPB47Q_9GqTBW-JqVXhgVaGJaoXYi7ArbhbmoYSgyd5YGImVMIUDnkcSqYCw2LOUqxwIqkQ-BMT6N45aWZ5BheEGglWjjCNQgWMGZ1IFguuo64JoYdTXpKW3avFe6Wjsai36ervy9fk0MaromXdkGaxLuEWE4BC3rnIfwGLw7Cx |
linkProvider | IEEE |
linkToHtml | http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-IHtSLH2D8tgePbozSdduZSECBmAgJN1zb14RINgNbTPzrfd0GovHgrVmWpulr9z72e78fIXeRz3ytTejE6HwdHhrpxDICBzwNjGslooLEdTgSvQl_nPrTGrnf9MIAQAE-A9cOi3_5OlW5LZU1BV7dMMIEfdfnPGBlt9amooKeMCg1WllLYJqMnnndJeNFzU7_Zdy3UC7uVtP80FMp3En3kAzXCylRJG9unklXff7iaPzvSo9I47txjz5vXNIxqUFyQg62OAfr5NWqnxVE3DRONMWTbMFChX1oauiq0rOjy3wBKzpP8C1qUSfdRfpBt9riqK3g0g5-O_MlaFooc9ERZKsGmXQfxp2eU8ksOHMMrjIHtDI8VG2G0YCw9G5xzCSaTwrPBDxSIVc4FAGTXHmGB4LHmOP4UqHrD42n26dkJ0kTOCPUSLCEhLHPFHBudCh5EAnttwyDNk55Tup2r2bvJZPGrNqmi78f35K93ng4mA36o6dLsm9tV4K0rshOtszhGsOBTN4Up-AL9smz_A |
openUrl | ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Iberian+Conference+on+Information+Systems+and+Technologies+%28Print%29&rft.atitle=Modelling+and+verification+of+security+rules+in+an+OpenFlow+environment+with+Coloured+Petri+Nets&rft.au=Torrez+Rojas%2C+Marco+Antonio&rft.au=Takeo+Ueda%2C+Eduardo&rft.au=Melo+de+Brito+Carvalho%2C+Tereza+Cristina&rft.date=2014-06-01&rft.pub=AISTI&rft.issn=2166-0727&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FCISTI.2014.6876890&rft.externalDocID=6876890 |
thumbnail_l | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2166-0727&client=summon |
thumbnail_m | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2166-0727&client=summon |
thumbnail_s | http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2166-0727&client=summon |