Detailed Information

Cited 0 time in webofscience Cited 0 time in scopus
Metadata Downloads

A Verification Method of SDN Firewall Applications

Full metadata record
DC Field Value Language
dc.contributor.authorKang, Miyoung-
dc.contributor.authorChoi, Jin-Young-
dc.contributor.authorKang, Inhye-
dc.contributor.authorKwak, Hee Hwan-
dc.contributor.authorAhn, So Jin-
dc.contributor.authorShin, Myung-Ki-
dc.date.accessioned2021-09-03T22:12:26Z-
dc.date.available2021-09-03T22:12:26Z-
dc.date.created2021-06-18-
dc.date.issued2016-07-
dc.identifier.issn0916-8516-
dc.identifier.urihttps://scholar.korea.ac.kr/handle/2021.sw.korea/88118-
dc.description.abstractSDN (Software-Defined Networking) enables software applications to program individual network devices dynamically and therefore control the behavior of the network as a whole. Incomplete programming and/or inconsistency with the network policy of SDN software applications may lead to verification issues. The objective of this paper is to describe the formal modeling that uses the process algebra called pACSR and then suggest a method to verify the firewall application running on top of the SDN controller. The firewall rules are translated into a pACSR process which acts as the specification, and packet's behaviors in SDN are also translated to a pACSR process which is a role as the implementation. Then we prove the correctness by checking whether the parallel composition of two pACSR processes is deadlock-free. Moreover, in the case of network topology changes, our verification can be directly applied to check whether any mismatches or inconsistencies will occur.-
dc.languageEnglish-
dc.language.isoen-
dc.publisherIEICE-INST ELECTRONICS INFORMATION COMMUNICATIONS ENG-
dc.subjectPROCESS ALGEBRAIC APPROACH-
dc.titleA Verification Method of SDN Firewall Applications-
dc.typeArticle-
dc.contributor.affiliatedAuthorKang, Miyoung-
dc.contributor.affiliatedAuthorChoi, Jin-Young-
dc.identifier.doi10.1587/transcom.2015EBP3329-
dc.identifier.scopusid2-s2.0-84976618259-
dc.identifier.wosid000381561500002-
dc.identifier.bibliographicCitationIEICE TRANSACTIONS ON COMMUNICATIONS, v.E99B, no.7, pp.1408 - 1415-
dc.relation.isPartOfIEICE TRANSACTIONS ON COMMUNICATIONS-
dc.citation.titleIEICE TRANSACTIONS ON COMMUNICATIONS-
dc.citation.volumeE99B-
dc.citation.number7-
dc.citation.startPage1408-
dc.citation.endPage1415-
dc.type.rimsART-
dc.type.docTypeArticle-
dc.description.journalClass1-
dc.description.journalRegisteredClassscie-
dc.description.journalRegisteredClassscopus-
dc.relation.journalResearchAreaEngineering-
dc.relation.journalResearchAreaTelecommunications-
dc.relation.journalWebOfScienceCategoryEngineering, Electrical & Electronic-
dc.relation.journalWebOfScienceCategoryTelecommunications-
dc.subject.keywordPlusPROCESS ALGEBRAIC APPROACH-
dc.subject.keywordAuthorsoftware-defined networking-
dc.subject.keywordAuthorpACSR-
dc.subject.keywordAuthorformal modeling-
dc.subject.keywordAuthorformal verification-
Files in This Item
There are no files associated with this item.
Appears in
Collections
School of Cyber Security > Department of Information Security > 1. Journal Articles

qrcode

Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.

Related Researcher

Researcher CHOI, Jin Young photo

CHOI, Jin Young
Department of Information Security
Read more

Altmetrics

Total Views & Downloads

BROWSE