Inter-function anomaly analysis for correct SDN/NFV deployment. Basile, C., Canavese, D., Lioy, A., Pitscheider, C., & Valenza, F. International Journal of Network Management, 26(1):25–43, 2016.
Paper doi abstract bibtex 1 download Implementing the security of a network consists in individually configuring several network functions. Network functions are configured by means of a policy composed of a set of rules, but their actual behaviour is influenced by the other policies implemented by all the other network functions around them. This paper proposes a formal model that can be used to detect inter-function anomalies, which are defined as the interferences between two or more functions deployed in the same network. We have proved with experiments that the proposed model is fast and scalable. Copyright © 2015 John Wiley & Sons, Ltd.
@Article{2016IJNM,
author = {Cataldo Basile and Daniele Canavese and Antonio Lioy and Christian Pitscheider and Fulvio Valenza},
doi = {10.1002/nem.1917},
journal = {International Journal of Network Management},
number = {1},
pages = {25--43},
title = {Inter-function anomaly analysis for correct {SDN/NFV} deployment},
volume = {26},
year = {2016},
abstract={Implementing the security of a network consists in individually configuring several network functions. Network functions are configured by means of a policy composed of a set of rules, but their actual behaviour is influenced by the other policies implemented by all the other network functions around them. This paper proposes a formal model that can be used to detect inter-function anomalies, which are defined as the interferences between two or more functions deployed in the same network. We have proved with experiments that the proposed model is fast and scalable. Copyright © 2015 John Wiley & Sons, Ltd.},
keywords={Policy Analysis},
url = {https://iris.polito.it/retrieve/handle/11583/2623293/426336/2016IJNM_author.pdf},
}
Downloads: 1
{"_id":"63vzceupDsDixHZJZ","bibbaseid":"basile-canavese-lioy-pitscheider-valenza-interfunctionanomalyanalysisforcorrectsdnnfvdeployment-2016","authorIDs":["XRFf3mmJNmSCrLeYm","anJrBcCdr4LzzWetx","x5vNTEJ4s3raTsibp"],"author_short":["Basile, C.","Canavese, D.","Lioy, A.","Pitscheider, C.","Valenza, F."],"bibdata":{"bibtype":"article","type":"article","author":[{"firstnames":["Cataldo"],"propositions":[],"lastnames":["Basile"],"suffixes":[]},{"firstnames":["Daniele"],"propositions":[],"lastnames":["Canavese"],"suffixes":[]},{"firstnames":["Antonio"],"propositions":[],"lastnames":["Lioy"],"suffixes":[]},{"firstnames":["Christian"],"propositions":[],"lastnames":["Pitscheider"],"suffixes":[]},{"firstnames":["Fulvio"],"propositions":[],"lastnames":["Valenza"],"suffixes":[]}],"doi":"10.1002/nem.1917","journal":"International Journal of Network Management","number":"1","pages":"25–43","title":"Inter-function anomaly analysis for correct SDN/NFV deployment","volume":"26","year":"2016","abstract":"Implementing the security of a network consists in individually configuring several network functions. Network functions are configured by means of a policy composed of a set of rules, but their actual behaviour is influenced by the other policies implemented by all the other network functions around them. This paper proposes a formal model that can be used to detect inter-function anomalies, which are defined as the interferences between two or more functions deployed in the same network. We have proved with experiments that the proposed model is fast and scalable. Copyright © 2015 John Wiley & Sons, Ltd.","keywords":"Policy Analysis","url":"https://iris.polito.it/retrieve/handle/11583/2623293/426336/2016IJNM_author.pdf","bibtex":"@Article{2016IJNM,\r\n author = {Cataldo Basile and Daniele Canavese and Antonio Lioy and Christian Pitscheider and Fulvio Valenza},\r\n doi = {10.1002/nem.1917},\r\n journal = {International Journal of Network Management},\r\n number = {1},\r\n pages = {25--43},\r\n title = {Inter-function anomaly analysis for correct {SDN/NFV} deployment},\r\n volume = {26},\r\n year = {2016},\r\n abstract={Implementing the security of a network consists in individually configuring several network functions. Network functions are configured by means of a policy composed of a set of rules, but their actual behaviour is influenced by the other policies implemented by all the other network functions around them. This paper proposes a formal model that can be used to detect inter-function anomalies, which are defined as the interferences between two or more functions deployed in the same network. We have proved with experiments that the proposed model is fast and scalable. Copyright © 2015 John Wiley & Sons, Ltd.},\r\n keywords={Policy Analysis},\r\n url = {https://iris.polito.it/retrieve/handle/11583/2623293/426336/2016IJNM_author.pdf},\r\n}\r\n\r\n","author_short":["Basile, C.","Canavese, D.","Lioy, A.","Pitscheider, C.","Valenza, F."],"key":"2016IJNM","id":"2016IJNM","bibbaseid":"basile-canavese-lioy-pitscheider-valenza-interfunctionanomalyanalysisforcorrectsdnnfvdeployment-2016","role":"author","urls":{"Paper":"https://iris.polito.it/retrieve/handle/11583/2623293/426336/2016IJNM_author.pdf"},"keyword":["Policy Analysis"],"metadata":{"authorlinks":{"basile, c":"https://bibbase.org/show?bib=https%3A%2F%2Fraw.githubusercontent.com%2FFulvioValenza%2Fbibliography%2Fmain%2FValenza_bibliography.bib&msg=embed","valenza, f":"https://bibbase.org/show?bib=https%3A%2F%2Fraw.githubusercontent.com%2FFulvioValenza%2Fbibliography%2Fmain%2FValenza_bibliography.bib&commas=true","valenza, f":"https://bibbase.org/service/mendeley/47be63fe-fca0-3f0f-a864-642602926c3f"}},"downloads":1},"bibtype":"article","biburl":"https://raw.githubusercontent.com/FulvioValenza/bibliography/main/Valenza_bibliography.bib","creationDate":"2021-01-16T10:07:49.761Z","downloads":1,"keywords":["policy analysis"],"search_terms":["inter","function","anomaly","analysis","correct","sdn","nfv","deployment","basile","canavese","lioy","pitscheider","valenza"],"title":"Inter-function anomaly analysis for correct SDN/NFV deployment","year":2016,"dataSources":["JbiX35GNqPCF3nids","csYhy47rJJgSM7jjJ"]}