PETRI NETS MODELING FOR SDN TOPOLOGIES

The article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming the centralization problem. This is a positive...

Full description

Bibliographic Details
Main Authors: AMEEN, Ali, GUȚULEAC, Emilian
Format: Article
Language:English
Published: Technical University of Moldova 2021-06-01
Series:Journal of Engineering Science (Chişinău)
Subjects:
rsa
Online Access:https://jes.utm.md/wp-content/uploads/sites/20/2021/06/JES-2-2021_79-90.pdf
id doaj-5c7f6af344b24511b9a8b3599fe66cde
record_format Article
spelling doaj-5c7f6af344b24511b9a8b3599fe66cde2021-07-12T15:45:11ZengTechnical University of Moldova Journal of Engineering Science (Chişinău)2587-34742587-34822021-06-01282799010.52326/jes.utm.2021.28(2).06PETRI NETS MODELING FOR SDN TOPOLOGIESAMEEN, Ali0https://orcid.org/0000-0002-5451-8257GUȚULEAC, Emilian1https://orcid.org/0000-0001-6839-514XTechnical University of Moldova, 168 Stefan cel Mare Av., MD-2004 Chisinau, Republic of MoldovaTechnical University of Moldova, 168 Stefan cel Mare Av., MD-2004 Chisinau, Republic of MoldovaThe article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming the centralization problem. This is a positive feature of the SDN structure, but could also be a threat, caused by the use of several controllers in different working topologies. This article focuses on exactly one of the suggested topologies, which features and models based on the Petri Nets system. The usual topology of a single controller is compared to verify the advantages and privileges of the proposed serial topology over the existing one. The paper tries to obtain a formula from the modeling of the serial topology and its advantages over the usual topology and that formula will be used to measure the level of security or the defense capacity of the network defined by the software against cyber attacks; in particular, denial of service attacks / distributed denial of service attacks / DDoS.https://jes.utm.md/wp-content/uploads/sites/20/2021/06/JES-2-2021_79-90.pdfblockchaineast-westbound apigspnhydrapetri netsrsavirtual private network
collection DOAJ
language English
format Article
sources DOAJ
author AMEEN, Ali
GUȚULEAC, Emilian
spellingShingle AMEEN, Ali
GUȚULEAC, Emilian
PETRI NETS MODELING FOR SDN TOPOLOGIES
Journal of Engineering Science (Chişinău)
blockchain
east-westbound api
gspn
hydra
petri nets
rsa
virtual private network
author_facet AMEEN, Ali
GUȚULEAC, Emilian
author_sort AMEEN, Ali
title PETRI NETS MODELING FOR SDN TOPOLOGIES
title_short PETRI NETS MODELING FOR SDN TOPOLOGIES
title_full PETRI NETS MODELING FOR SDN TOPOLOGIES
title_fullStr PETRI NETS MODELING FOR SDN TOPOLOGIES
title_full_unstemmed PETRI NETS MODELING FOR SDN TOPOLOGIES
title_sort petri nets modeling for sdn topologies
publisher Technical University of Moldova
series Journal of Engineering Science (Chişinău)
issn 2587-3474
2587-3482
publishDate 2021-06-01
description The article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming the centralization problem. This is a positive feature of the SDN structure, but could also be a threat, caused by the use of several controllers in different working topologies. This article focuses on exactly one of the suggested topologies, which features and models based on the Petri Nets system. The usual topology of a single controller is compared to verify the advantages and privileges of the proposed serial topology over the existing one. The paper tries to obtain a formula from the modeling of the serial topology and its advantages over the usual topology and that formula will be used to measure the level of security or the defense capacity of the network defined by the software against cyber attacks; in particular, denial of service attacks / distributed denial of service attacks / DDoS.
topic blockchain
east-westbound api
gspn
hydra
petri nets
rsa
virtual private network
url https://jes.utm.md/wp-content/uploads/sites/20/2021/06/JES-2-2021_79-90.pdf
work_keys_str_mv AT ameenali petrinetsmodelingforsdntopologies
AT gutuleacemilian petrinetsmodelingforsdntopologies
_version_ 1721307074344779776