A Centralized Reputation Management Scheme for Isolating Malicious Controller(s) in Distributed Software-Defined Networks
Journal Title: International Journal of Advanced Computer Science & Applications - Year 2016, Vol 7, Issue 12
Abstract
Software-Defined Networks have seen an increas-ing in their deployment because they offer better network manageability compared to traditional networks. Despite their immense success and popularity, various security issues in SDN remain open problems for research. Particularly, the problem of securing the controllers in distributed environment is still short of any solutions. This paper proposes a scheme to identify any rogue/malicious controller(s) in a distributed environment. Our scheme is based on trust and reputation system which is centrally managed. As such, our scheme identifies any controllers acting maliciously by comparing the state of installed flows/policies with policies that should be installed. Controllers rate each other on this basis and report the results to a central entity, which reports it to the network administrator.
Authors and Affiliations
Bilal Karim Mughal, Sufian Hameed, Ghulam Muhammad Shaikh
An Improvement of FA Terms Dictionary using Power Link and Co-Word Analysis
Information retrieval involves obtaining some wanted information in a database. In this paper, we used the power link to improve the extracted field association terms from corpus by the proposed algorithm to support the...
Comprehensive Classification Model for Diagnosing Multiple Disease Condition from Chest X-Ray
Classification plays a significant role in the diagnosis of any form of radiological images in the healthcare sector. After reviewing existing classification approaches carried out over chest radiographs, it was explored...
Intelligent Educational Assistant based on Multiagent System and Context-Aware Computing
This paper provides an overview of the current stage of EducActiveCore research, an orchestrated computational model, formed by different areas of artificial intelligent, combined to support personalized assistance to st...
Joint Operation in Public Key Cryptography
We believe that there is no real data protection without our own tools. Therefore, our permanent aim is to have more of our own codes. In order to achieve that, it is necessary that a lot of young researchers become inte...
A semantic cache for enhancing Web services communities activities: Health care case Study
Collective memories are strong support for enhancing the activities of capitalization, management and dissemination inside a Web services community. To take advantages of collective memory, we propose an approach for ind...