PETRI NETS MODELING FOR SDN TOPOLOGIES
The article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming the centralization problem. This is a positive...
Main Authors: | , |
---|---|
Format: | Article |
Language: | English |
Published: |
Technical University of Moldova
2021-06-01
|
Series: | Journal of Engineering Science (Chişinău) |
Subjects: | |
Online Access: | https://jes.utm.md/wp-content/uploads/sites/20/2021/06/JES-2-2021_79-90.pdf |
id |
doaj-5c7f6af344b24511b9a8b3599fe66cde |
---|---|
record_format |
Article |
spelling |
doaj-5c7f6af344b24511b9a8b3599fe66cde2021-07-12T15:45:11ZengTechnical University of Moldova Journal of Engineering Science (Chişinău)2587-34742587-34822021-06-01282799010.52326/jes.utm.2021.28(2).06PETRI NETS MODELING FOR SDN TOPOLOGIESAMEEN, Ali0https://orcid.org/0000-0002-5451-8257GUȚULEAC, Emilian1https://orcid.org/0000-0001-6839-514XTechnical University of Moldova, 168 Stefan cel Mare Av., MD-2004 Chisinau, Republic of MoldovaTechnical University of Moldova, 168 Stefan cel Mare Av., MD-2004 Chisinau, Republic of MoldovaThe article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming the centralization problem. This is a positive feature of the SDN structure, but could also be a threat, caused by the use of several controllers in different working topologies. This article focuses on exactly one of the suggested topologies, which features and models based on the Petri Nets system. The usual topology of a single controller is compared to verify the advantages and privileges of the proposed serial topology over the existing one. The paper tries to obtain a formula from the modeling of the serial topology and its advantages over the usual topology and that formula will be used to measure the level of security or the defense capacity of the network defined by the software against cyber attacks; in particular, denial of service attacks / distributed denial of service attacks / DDoS.https://jes.utm.md/wp-content/uploads/sites/20/2021/06/JES-2-2021_79-90.pdfblockchaineast-westbound apigspnhydrapetri netsrsavirtual private network |
collection |
DOAJ |
language |
English |
format |
Article |
sources |
DOAJ |
author |
AMEEN, Ali GUȚULEAC, Emilian |
spellingShingle |
AMEEN, Ali GUȚULEAC, Emilian PETRI NETS MODELING FOR SDN TOPOLOGIES Journal of Engineering Science (Chişinău) blockchain east-westbound api gspn hydra petri nets rsa virtual private network |
author_facet |
AMEEN, Ali GUȚULEAC, Emilian |
author_sort |
AMEEN, Ali |
title |
PETRI NETS MODELING FOR SDN TOPOLOGIES |
title_short |
PETRI NETS MODELING FOR SDN TOPOLOGIES |
title_full |
PETRI NETS MODELING FOR SDN TOPOLOGIES |
title_fullStr |
PETRI NETS MODELING FOR SDN TOPOLOGIES |
title_full_unstemmed |
PETRI NETS MODELING FOR SDN TOPOLOGIES |
title_sort |
petri nets modeling for sdn topologies |
publisher |
Technical University of Moldova |
series |
Journal of Engineering Science (Chişinău) |
issn |
2587-3474 2587-3482 |
publishDate |
2021-06-01 |
description |
The article examines some new algorithms and focuses mainly on suggesting new working topologies for software-defined controllers in order to ensure SDN security and to prevent the occurrence of a potential central point of failure (SPOF) by overcoming the centralization problem. This is a positive feature of the SDN structure, but could also be a threat, caused by the use of several controllers in different working topologies. This article focuses on exactly one of the suggested topologies, which features and models based on the Petri Nets system. The usual topology of a single controller is compared to verify the advantages and privileges of the proposed serial topology over the existing one. The paper tries to obtain a formula from the modeling of the serial topology and its advantages over the usual topology and that formula will be used to measure the level of security or the defense capacity of the network defined by the software against cyber attacks; in particular, denial of service attacks / distributed denial of service attacks / DDoS. |
topic |
blockchain east-westbound api gspn hydra petri nets rsa virtual private network |
url |
https://jes.utm.md/wp-content/uploads/sites/20/2021/06/JES-2-2021_79-90.pdf |
work_keys_str_mv |
AT ameenali petrinetsmodelingforsdntopologies AT gutuleacemilian petrinetsmodelingforsdntopologies |
_version_ |
1721307074344779776 |