Dependable Policy Enforcement in Traditional Non-SDN Networks

被引:2
|
作者
Odegbile, Olufemi [1 ]
Chen, Shigang [1 ]
Wang, Yuanda [1 ]
机构
[1] Univ Florida, Dept Comp & Informat Sci & Engn, Gainesville, FL 32611 USA
基金
美国国家科学基金会;
关键词
PACKET CLASSIFICATION;
D O I
10.1109/ICDCS.2019.00061
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Middleboxes are widely used in modern networks for a variety of network functions in cybersecurity, performance enhancement, and monitoring. Middlebox policy enforcement is however complex and tedious with unreliable manual re-configuration of legacy routers. The existing solution on automated policy enforcement relies on software-defined networking and does not apply to the traditional non-SDN networks, which remain popular today in enterprise deployment and core networks. This paper proposes a new architecture based entirely on software-defined middleboxes (instead of using software-defined switches in the prior art) to enable dependable and automated policy enforcement in non-SDN networks whose routers forward packets based on traditional routing protocols that are not policy-sensitive. We present a hot-potato enforcement strategy, which is then enhanced with two optimizations for load-balanced policy enforcement. Further enhancements are made to relieve middlebox processing overhead and avoid packet fragmentation due to policy enforcement.
引用
收藏
页码:545 / 554
页数:10
相关论文
共 50 条
  • [21] Performance Analysis of Traditional and SDN Based Handovers in Wireless LAN Networks
    Emran, Muhammad
    Kotuliak, Ivan
    2020 IEEE INTERNATIONAL IOT, ELECTRONICS AND MECHATRONICS CONFERENCE (IEMTRONICS 2020), 2020, : 463 - 468
  • [22] TD-RA policy-enforcement framework for an SDN-based IoT architecture
    Lahlou, Sara
    Moukafih, Youness
    Sebbar, Anass
    Zkik, Karim
    Boulmalf, Mohammed
    Ghogho, Mounir
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2022, 204
  • [23] Distributed Policy Enforcement for Priority Awareness in Tactical SATCOM Networks
    Sucec, John
    Fecko, Mariusz A.
    Ong, Baron
    Liu, Wei
    Doshi, Sheetal
    Turck, Kurt
    2015 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2015), 2015, : 169 - 174
  • [24] Enforcement of Access Control Policy for Mobile Ad Hoc Networks
    Maity, Soumya
    Ghosh, Soumya K.
    PROCEEDINGS OF THE FIFTH INTERNATIONAL CONFERENCE ON SECURITY OF INFORMATION AND NETWORKS, 2012, : 47 - 52
  • [25] Cooptation of transformation? Local policy networks and federal regulatory enforcement
    Scholz, JT
    Wang, CL
    AMERICAN JOURNAL OF POLITICAL SCIENCE, 2006, 50 (01) : 81 - 97
  • [27] A survey on DoS/DDoS attacks mathematical modelling for traditional, SDN and virtual networks
    Balarezo, Juan Fernando
    Wang, Song
    Chavez, Karina Gomez
    Al-Hourani, Akram
    Kandeepan, Sithamparanathan
    ENGINEERING SCIENCE AND TECHNOLOGY-AN INTERNATIONAL JOURNAL-JESTECH, 2022, 31
  • [29] CyberShip-IoT: A dynamic and adaptive SDN-based security policy enforcement framework for ships
    Sahay, Rishikesh
    Meng, Weizhi
    Estay, D. A. Sepulveda
    Jensen, Christian D.
    Barfod, Michael Bruhn
    FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 100 : 736 - 750
  • [30] Usage Control Policy Enforcement in SDN-based Clouds: A Dynamic Availability Service Use Case
    Toumi, Khalifa
    Idrees, Muhammad Sabir
    Charmet, Fabien
    Yaich, Reda
    Blanc, Gregory
    PROCEEDINGS OF 2016 IEEE 18TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS; IEEE 14TH INTERNATIONAL CONFERENCE ON SMART CITY; IEEE 2ND INTERNATIONAL CONFERENCE ON DATA SCIENCE AND SYSTEMS (HPCC/SMARTCITY/DSS), 2016, : 578 - 585