An Analytical Survey on Policy making for Software Defined Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2016 by IJCTT Journal
Volume-42 Number-2
Year of Publication : 2016
Authors : Mr. Abhijit P. Jamble, Mrs.Geeta Atkar
  10.14445/22312803/IJCTT-V42P114

MLA

Mr. Abhijit P. Jamble, Mrs.Geeta Atkar  "An Analytical Survey on Policy making for Software Defined Networks". International Journal of Computer Trends and Technology (IJCTT) V42(2):86-89, December 2016. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract -
Today Network Defense mechanism is urging requirement of software industry. Dynamic Threat Evolution and changing nature of threats require policy based network security Mechanism. Numerous research techniques exits on network security but fail to handle new threats. This lead to development of software defined network and Open Flow Technology for policy based security. Device level configuration is issue and requires automated technique, software controller to manage devices. This manuscript presents survey on Open sec security technology. Open sec assist to implement security measures in human readable language. Intrusion detection system, data packet detection and other techniques is time complex. This article focuses to examine different methods present in SDN and find correct technique to enhance security measures for networks.

References
[1] Sezer, Sakir, et al. "Are we ready for SDN? Implementation challenges for software-defined networks."IEEE Communications Magazine 51.7 (2013): 36-43.
[2] Kreutz, Diego, Fernando Ramos, and Paulo Verissimo. "Towards secure and dependable software-defined networks." Proceedings of the second ACM SIGCOMM workshop on Hot topics in software defined networking. ACM, 2013.
[3] Nunes, Bruno Astuto A., et al. "A survey of softwaredefined networking: Past, present, and future of programmable networks." IEEE Communications Surveys & Tutorials 16.3 (2014): 1617-1634.
[4] Lara, Adrian, Byrav Ramamurthy."Opensec: A framework for implementing security policies using openflow." 2014 IEEE Global Communications Conference. IEEE, 2014.
[5] Kim, Hyojoon, and Nick Feamster. "Improving network management with software defined networking." IEEE Communications Magazine 51.2 (2013): 114-119.
[6] Agrawal, Dakshi, Kang-Won Lee, and Jorge Lobo. "Policybased management of networked computing systems." IEEE communications magazine 43.10 (2005): 69-75.
[7] Tuncer, Daphne, et al. "Adaptive resource management and control in software defined networks." IEEE Transactions on Network and Service Management 12.1 (2015): 18-33.
[8] E. Dart, L. Rotman, B. Tierney, M. Hester, and J. Zurawski, “The Science DMZ: A Network Design Pattern for Data-intensive Science,” in International Conference for High Performance Computing, Networking, Storage and Analysis (SC), Denver, Colorado, November 2013.
[9] M. Wichtlhuber, R. Reinecke, and D. Hausheer, “An SDNbased CDN/ISP collaboration architecture for managing highvolume flows,”Network and Service Management, IEEE Transactions on, vol. 12, no. 1,pp. 48–60, March 2015.
[10] Nadeau, Thomas D., and Ken Gray. SDN: software defined networks. " O'Reilly Media, Inc.", 2013.
[11] A. K. Bandara, E. C. Lupu, and A. Russo, “Using event calculusto formalise policy specification and analysis,” in IEEE Workshop onPolicies for Distributed Systems and Networks, Lake Como, Italy, June2003.
[12] A. K. Bandara, E. C. Lupu, J. Moffett, and A. Russo, “A goal-basedapproach to policy refinement,” in IEEE Workshop on policies forDistributed Systems and Networks, Yorktown Heights, NY, USA, June2004.
[13] A. K. Bandara, A. Kakas, E. C. Lupu, and A. Russo, “Using argumentationlogic for firewall policy specification and analysis,” in Large ScaleManagement of Distributed Systems. Springer, 2006, pp. 185–196.
[14] J. Rubio-Loyola, J. Serrat, M. Charalambides, P. Flegkas, G. Pavlou,and A. L. Lafuente, “Using linear temporal model checking for goalorientedpolicy refinement frameworks,” in IEEE Workshop on Policiesfor Distributed Systems and Networks, Stockholm, Sweden, June 2005.
[15] J. Rubio-Loyola, J. Serrat, M. Charalambides, P. Flegkas, and G. Pavlou,“A methodological approach toward the refinement problem in policybasedmanagement systems,” IEEE Communications Magazine, vol. 44,no. 10, pp. 60–68, 2006.
[16] M. Charalambides, P. Flegkas, G. Pavlou, A. Bandara, E. Lupu,A. Russo, N. Dulav, M. Sloman, and J. Rubio-Loyola, “Policy conflictanalysis for quality of service management,” in IEEE InternationalWorkshop on Policies for Distributed Systems and Networks, Stockholm,Sweden, June 2005.
[17] M. Charalambides, P. Flegkas, G. Pavlou, J. Rubio-Loyola, A. K.Bandara, E. C. Lupu, A. Russo, M. Sloman, and N. Dulay, “Dynamicpolicy analysis and conflict resolution for diffserv quality of servicemanagement,” in IEEE/IFIP Network Operations and ManagementSymposium (NOMS), Vancouver, Canada, April 2006.
[18] D. Agrawal, K.-W. Lee, and J. Lobo, “Policy-based management of networkedcomputing systems,” Communications Magazine, IEEE, vol. 43,no. 10, pp. 69–75, Oct 2005.
[19] R. Bhatia, J. Lobo, and M. Kohli, “Policy evaluation for networkmanagement,” in IEEE INFOCOM, vol. 3, March 2000.
[20] E. Bertino, C. Brodie, S. Calo, L. Cranor, C. Karat, J. Karat, N. Li,D. Lin, J. Lobo, Q. Ni, P. R. Rao, and X. Wang, “Analysis of privacy andsecurity policies,” IBM Journal of Research and Development, vol. 53,no. 2, pp. 3:1–3:18, March 2009.

Keywords
Software Defined Networks, Open Sec , Policy Making, OpenFlo, Network Security.