Modelling and verification of security rules in an OpenFlow environment with Coloured Petri Nets

The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to...

Full description

Saved in:
Bibliographic Details
Published inIberian Conference on Information Systems and Technologies (Print) pp. 1 - 7
Main Authors Torrez Rojas, Marco Antonio, Takeo Ueda, Eduardo, Melo de Brito Carvalho, Tereza Cristina
Format Conference Proceeding
LanguageEnglish
Portuguese
Published AISTI 01.06.2014
Subjects
Online AccessGet full text
ISSN2166-0727
DOI10.1109/CISTI.2014.6876890

Cover

Abstract The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied in an environment based on OpenFlow. The analysis of the security policy rules is realized based on data obtained from a simulation of a scenario, modeled using Colored Petri Nets (CPN), and validated by the state space generated from the outputs of this model. The collected results are for a specific scenario. However, the approach is useful to analyze several types of systems. Thus, this research demonstrates that is feasible to employ CPN to model and validate security rules in an OpenFlow-based SDN.
AbstractList The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and mechanisms that can help even the current approach. Within this context, the paradigm of Software Defined Networking (SDN) is becoming popular due to recent initiatives based on OpenFlow. This article presents an analysis of security policy rules applied in an environment based on OpenFlow. The analysis of the security policy rules is realized based on data obtained from a simulation of a scenario, modeled using Colored Petri Nets (CPN), and validated by the state space generated from the outputs of this model. The collected results are for a specific scenario. However, the approach is useful to analyze several types of systems. Thus, this research demonstrates that is feasible to employ CPN to model and validate security rules in an OpenFlow-based SDN.
Author Torrez Rojas, Marco Antonio
Melo de Brito Carvalho, Tereza Cristina
Takeo Ueda, Eduardo
Author_xml – sequence: 1
  givenname: Marco Antonio
  surname: Torrez Rojas
  fullname: Torrez Rojas, Marco Antonio
  email: matrojas@larc.usp.br
  organization: Dept. de Eng. de Comput. e Sist. Digitais, Escola Politec. da Univ. de Sao Paulo, Sao Paulo, Brazil
– sequence: 2
  givenname: Eduardo
  surname: Takeo Ueda
  fullname: Takeo Ueda, Eduardo
  email: edutakeo@larc.usp.br
  organization: Dept. de Eng. de Comput. e Sist. Digitais, Escola Politec. da Univ. de Sao Paulo, Sao Paulo, Brazil
– sequence: 3
  givenname: Tereza Cristina
  surname: Melo de Brito Carvalho
  fullname: Melo de Brito Carvalho, Tereza Cristina
  email: carvalho@larc.usp.br
  organization: Dept. de Eng. de Comput. e Sist. Digitais, Escola Politec. da Univ. de Sao Paulo, Sao Paulo, Brazil
BookMark eNotkM1OAjEYRWuCiYC8gG76AoP9m7azNBNREhQTcY2dzletGVrS6UB4e0lkdc_i5CzuBI1CDIDQHSVzSkn1UC8_Nss5I1TMpVZSV-QKTSpdVVpwwekIjRmVsiCKqRs06_tfQginSpVMjdHXa2yh63z4xia0-ADJO29N9jHg6HAPdkg-n3AaOuixD2cLr_cQFl08YggHn2LYQcj46PMPrmMXhwQtfoecPH6D3N-ia2e6HmaXnaLPxdOmfilW6-dl_bgqPCVlLqC1TmjLGdFMckErY1jTOt1I4pSorBb2jFKxRljihJLCqJKXjaUl0460fIru_7seALb75HcmnbaXQ_gfNAFXkQ
ContentType Conference Proceeding
DBID 6IE
6IL
CBEJK
RIE
RIL
DOI 10.1109/CISTI.2014.6876890
DatabaseName IEEE Electronic Library (IEL) Conference Proceedings
IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume
IEEE Xplore All Conference Proceedings
IEEE Electronic Library (IEL)
IEEE Proceedings Order Plans (POP All) 1998-Present
DatabaseTitleList
Database_xml – sequence: 1
  dbid: RIE
  name: IEEE Electronic Library (IEL)
  url: https://proxy.k.utb.cz/login?url=https://ieeexplore.ieee.org/
  sourceTypes: Publisher
DeliveryMethod fulltext_linktorsrc
Discipline Engineering
EISBN 9899843431
9789899843431
EndPage 7
ExternalDocumentID 6876890
Genre orig-research
GroupedDBID 6IE
6IF
6IH
6IK
6IL
6IN
AAJGR
AAWTH
ABLEC
ADZIZ
ALMA_UNASSIGNED_HOLDINGS
BEFXN
BFFAM
BGNUA
BKEBE
BPEOZ
CBEJK
CHZPO
IEGSK
IPLJI
M43
OCL
RIE
RIL
ID FETCH-LOGICAL-i105t-edcf48c3208263419aa2bdf8b60f749c84cb60672b4c0f4764a7535bc1528f0d3
IEDL.DBID RIE
ISSN 2166-0727
IngestDate Wed Aug 27 04:17:35 EDT 2025
IsPeerReviewed false
IsScholarly false
Language English
Portuguese
LinkModel DirectLink
MergedId FETCHMERGED-LOGICAL-i105t-edcf48c3208263419aa2bdf8b60f749c84cb60672b4c0f4764a7535bc1528f0d3
PageCount 7
ParticipantIDs ieee_primary_6876890
PublicationCentury 2000
PublicationDate 2014-June
PublicationDateYYYYMMDD 2014-06-01
PublicationDate_xml – month: 06
  year: 2014
  text: 2014-June
PublicationDecade 2010
PublicationTitle Iberian Conference on Information Systems and Technologies (Print)
PublicationTitleAbbrev CISTI
PublicationYear 2014
Publisher AISTI
Publisher_xml – name: AISTI
SSID ssj0003177527
Score 1.539917
Snippet The discussion of alternatives to the Internet architecture has been the subject of research for several years, resulting in a number of solutions and...
SourceID ieee
SourceType Publisher
StartPage 1
SubjectTerms Analytical models
Coloured Petri Nets
Computational modeling
Data models
Internet
OpenFlow
Petri nets
SDN
Security
Software
Validate security rules
Title Modelling and verification of security rules in an OpenFlow environment with Coloured Petri Nets
URI https://ieeexplore.ieee.org/document/6876890
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3Pa8IwFA7O03bZDx37TQ47rrXWNG3OMtGBMpiCN9ckLyCTdmjLYH_9XtLq3Nhht1BKCHltv_fS730fIfciCiOtTeKlCL4eS4z0UinAg0BDyLTiwom4jid8OGNP82jeIA-7XhgAcOQz8O3Q_cvXuSrtUVmH46ubCCzQD-JYVL1au_MUxMG4cmgNuxyLZMTlbY9MIDr90ct0ZIlczK8n-eGm4sBkcEzG22VUHJI3vyykrz5_KTT-d50npP3dtkefd4B0ShqQnZGjPcXBFnm13mdOhpummab4HFuqkIsOzQ3d1G52dF2uYEOXGd5FLedksMo_6F5THLXnt7SPX85yDZo6Xy46gWLTJrPB47Q_9GqTBW-JqVXhgVaGJaoXYi7ArbhbmoYSgyd5YGImVMIUDnkcSqYCw2LOUqxwIqkQ-BMT6N45aWZ5BheEGglWjjCNQgWMGZ1IFguuo64JoYdTXpKW3avFe6Wjsai36ervy9fk0MaromXdkGaxLuEWE4BC3rnIfwGLw7Cx
linkProvider IEEE
linkToHtml http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwjV3NT8IwFG-IHtSLH2D8tgePbozSdduZSECBmAgJN1zb14RINgNbTPzrfd0GovHgrVmWpulr9z72e78fIXeRz3ytTejE6HwdHhrpxDICBzwNjGslooLEdTgSvQl_nPrTGrnf9MIAQAE-A9cOi3_5OlW5LZU1BV7dMMIEfdfnPGBlt9amooKeMCg1WllLYJqMnnndJeNFzU7_Zdy3UC7uVtP80FMp3En3kAzXCylRJG9unklXff7iaPzvSo9I47txjz5vXNIxqUFyQg62OAfr5NWqnxVE3DRONMWTbMFChX1oauiq0rOjy3wBKzpP8C1qUSfdRfpBt9riqK3g0g5-O_MlaFooc9ERZKsGmXQfxp2eU8ksOHMMrjIHtDI8VG2G0YCw9G5xzCSaTwrPBDxSIVc4FAGTXHmGB4LHmOP4UqHrD42n26dkJ0kTOCPUSLCEhLHPFHBudCh5EAnttwyDNk55Tup2r2bvJZPGrNqmi78f35K93ng4mA36o6dLsm9tV4K0rshOtszhGsOBTN4Up-AL9smz_A
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=proceeding&rft.title=Iberian+Conference+on+Information+Systems+and+Technologies+%28Print%29&rft.atitle=Modelling+and+verification+of+security+rules+in+an+OpenFlow+environment+with+Coloured+Petri+Nets&rft.au=Torrez+Rojas%2C+Marco+Antonio&rft.au=Takeo+Ueda%2C+Eduardo&rft.au=Melo+de+Brito+Carvalho%2C+Tereza+Cristina&rft.date=2014-06-01&rft.pub=AISTI&rft.issn=2166-0727&rft.spage=1&rft.epage=7&rft_id=info:doi/10.1109%2FCISTI.2014.6876890&rft.externalDocID=6876890
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=2166-0727&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=2166-0727&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=2166-0727&client=summon