Please use this identifier to cite or link to this item:
https://hdl.handle.net/1959.11/56792
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Sood, Keshav | en |
dc.contributor.author | Karmakar, Kallol Krishna | en |
dc.contributor.author | Varadharajan, Vijay | en |
dc.contributor.author | Tupakula, Uday | en |
dc.contributor.author | Yu, Shui | en |
dc.date.accessioned | 2023-11-29T07:01:08Z | - |
dc.date.available | 2023-11-29T07:01:08Z | - |
dc.date.issued | 2019-04 | - |
dc.identifier.citation | IEEE Communications Letters, 23(4), p. 612-615 | en |
dc.identifier.issn | 1558-2558 | en |
dc.identifier.issn | 1089-7798 | en |
dc.identifier.uri | https://hdl.handle.net/1959.11/56792 | - |
dc.description.abstract | <p>In software-defined networks, policy-based security management or architecture (PbSA) is an ideal way to dynamically control the network. We observe that on the one hand, this enables security capabilities intelligently and enhance fine-grained control over end user behavior. But, on the other hand, dynamic variations in network, rapid increases in security attacks, geographical distribution of nodes, complex heterogeneous networks, and so on have serious effects on the performance of PbSAs. These affect the flow specific quality of service requirements with further degradation of the performance of the security context. Hence, in this letter, PbSA's performance is evaluated. The key factors including a number of rules, rule-table size, position of rules, flow arrival rate, and CPU utilization are examined, and found to have considerable impact on the performance of PbSAs.</p> | en |
dc.language | en | en |
dc.publisher | Institute of Electrical and Electronics Engineers | en |
dc.relation.ispartof | IEEE Communications Letters | en |
dc.title | Analysis of policy-based security management system in software-defined networks | en |
dc.type | Journal Article | en |
dc.identifier.doi | 10.1109/LCOMM.2019.2898864 | en |
local.contributor.firstname | Keshav | en |
local.contributor.firstname | Kallol Krishna | en |
local.contributor.firstname | Vijay | en |
local.contributor.firstname | Uday | en |
local.contributor.firstname | Shui | en |
local.profile.school | School of Science & Technology | en |
local.profile.email | utupakul@une.edu.au | en |
local.output.category | C1 | en |
local.record.place | au | en |
local.record.institution | University of New England | en |
local.publisher.place | United States of America | en |
local.format.startpage | 612 | en |
local.format.endpage | 615 | en |
local.peerreviewed | Yes | en |
local.identifier.volume | 23 | en |
local.identifier.issue | 4 | en |
local.contributor.lastname | Sood | en |
local.contributor.lastname | Karmakar | en |
local.contributor.lastname | Varadharajan | en |
local.contributor.lastname | Tupakula | en |
local.contributor.lastname | Yu | en |
dc.identifier.staff | une-id:utupakul | en |
local.profile.orcid | 0000-0001-5048-9797 | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.profile.role | author | en |
local.identifier.unepublicationid | une:1959.11/56792 | en |
local.date.onlineversion | 2019-02-13 | - |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
dc.identifier.academiclevel | Academic | en |
local.title.maintitle | Analysis of policy-based security management system in software-defined networks | en |
local.output.categorydescription | C1 Refereed Article in a Scholarly Journal | en |
local.relation.url | https://ieeexplore.ieee.org/document/8641349 | en |
local.search.author | Sood, Keshav | en |
local.search.author | Karmakar, Kallol Krishna | en |
local.search.author | Varadharajan, Vijay | en |
local.search.author | Tupakula, Uday | en |
local.search.author | Yu, Shui | en |
local.uneassociation | No | en |
local.atsiresearch | No | en |
local.sensitive.cultural | No | en |
local.year.available | 2019 | en |
local.year.published | 2019 | en |
local.subject.for2020 | 460407 System and network security | en |
local.subject.seo2020 | 220405 Cybersecurity | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.profile.affiliationtype | External Affiliation | en |
local.relation.worldcat | https://www.worldcat.org/title/8088193938 | en |
Appears in Collections: | Journal Article School of Science and Technology |
SCOPUSTM
Citations
15
checked on May 25, 2024
Page view(s)
214
checked on May 5, 2024
Items in Research UNE are protected by copyright, with all rights reserved, unless otherwise indicated.