Volume 33 Issue 4
Jul.  2024
Turn off MathJax
Article Contents
Yue ZHAO, Bin YANG, Fei TENG, et al., “A Review of Intelligent Configuration and Its Security for Complex Networks,” Chinese Journal of Electronics, vol. 33, no. 4, pp. 920–947, 2024 doi: 10.23919/cje.2023.00.001
Citation: Yue ZHAO, Bin YANG, Fei TENG, et al., “A Review of Intelligent Configuration and Its Security for Complex Networks,” Chinese Journal of Electronics, vol. 33, no. 4, pp. 920–947, 2024 doi: 10.23919/cje.2023.00.001

A Review of Intelligent Configuration and Its Security for Complex Networks

doi: 10.23919/cje.2023.00.001
More Information
  • Author Bio:

    Yue ZHAO was born in 1983. He received the B.S. degree from the North China Institute of Science and Technology, Langfang, China, in 2006, and the Ph.D. degree from Southwest Jiaotong University, Chengdu, China, in 2012. He is currently a Professorate Senior Engineer with the Science and Technology on Communication Security Laboratory, Chengdu, China. He is also the master student supervisor of the School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China; the School of Computer and Software Engineering, Xihua University, Chengdu, China; the School of Computer and Information Engineering, Chuzhou University, Chuzhou, China. His research interests include wireless networks and information security. (Email: yuezhao@foxmail.com)

    Bin YANG received the Ph.D. degree in systems information science from Future University Hakodate, Hakodate, Japan, in 2015. He was a Research Fellow with the School of Electrical Engineering, Aalto University, Helsinki, Finland, from Jul. 2020 to Nov. 2021. He is currently a Professor with the School of Computer and Information Engineering, Chuzhou University, Chuzhou, China. His research interests include unmanned aerial vehicle networks, cyber security, and Internet of things. (Email: ybcup@chzu.edu.cn)

    Fei TENG received the B.S. and M.S. degrees from Southwest Jiaotong University, Chengdu, China, in 2006 and 2008, respectively. She received the Ph.D. degree from Ecole Centrale Paris, Paris, France, in 2011. She is an Associate Professor with the School of Computing and Artificial Intelligence, Southwest Jiaotong University, Chengdu, China. Her research interests include cloud computing and industrial data mining. (Email: fteng@swjtu.edu.cn)

    Xianhua NIU received the B.S. degree in communication engineering and the Ph.D. degree in information security from Southwest Jiaotong University, Chengdu, China, in 2006 and 2012, respectively. She is currently a Professor with the School of Computer and Software Engineering, Xihua University, Chengdu, China, and a Post-Doctoral Member with the National Key Laboratory of Science and Technology on Communications, University of Electronic Science and Technology of China, Chengdu, China. Her research interests include sequence design and coding theory. (Email: niuxh@mail.xhu.edu.cn)

    Ning HU received the B.S., M.S., and Ph.D. degrees in computer science from National University of Defense Technology, Changsha, China. He is currently a Professor with the Cyberspace Institute of Advanced Technology, Guangzhou University, Chuzhou, China. His current research interests include software-defined network and network security. (Email: huning@gzhu.edu.cn)

    Bo TIAN was born in 1970. He received the M.S. degree in communication engineering from Southwest Communication Institute, in 1997. Currently, he is an Executive Vice-Director and Professorate Senior Engineer with Science and Technology on Communication Security Laboratory, Chengdu, China. His main research interests include cyberspace security and communication information system. (Email: tb_30wish@163.com)

  • Corresponding author: Email: yuezhao@foxmail.com
  • Received Date: 2023-01-01
  • Accepted Date: 2023-06-05
  • Available Online: 2023-07-14
  • Publish Date: 2024-07-05
  • Complex networks are becoming more complex because of the use of many components with diverse technologies. In fact, manual configuration that makes each component interoperable has breed latent danger to system security. There is still no comprehensive review of these studies and prospects for further research. According to the complexity of component configuration and difficulty of security assurance in typical complex networks, this paper systematically reviews the abstract models and formal analysis methods required for intelligent configuration of complex networks, specifically analyzes, and compares the current key technologies such as configuration semantic awareness, automatic generation of security configuration, dynamic deployment, and verification evaluation. These technologies can effectively improve the security of complex networks intelligent configuration and reduce the complexity of operation and maintenance. This paper also summarizes the mainstream construction methods of complex networks configuration and its security test environment and detection index system, which lays a theoretical foundation for the formation of the comprehensive effectiveness verification capability of configuration security. The whole lifecycle management system of configuration security process proposed in this paper provides an important technical reference for reducing the complexity of network operation and maintenance and improving network security.
  • loading
  • [1]
    Y. L. Hu, J. C. Li, and Y. R. Ruan, “Finding influencers in complex networks: A novel method based on information theory,” IEEE Systems Journal, vol. 16, no. 2, pp. 3372–3380, 2022. doi: 10.1109/JSYST.2021.3119081
    [2]
    R. Q. Lu, W. W. Yu, J. H. Lü, et al., “Synchronization on complex networks of networks,” IEEE Transactions on Neural Networks and Learning Systems, vol. 25, no. 11, pp. 2110–2118, 2014. doi: 10.1109/TNNLS.2014.2305443
    [3]
    O. Duman, M. Y. Zhang, L. Y. Wang, et al., “Factor of security (FoS): Quantifying the security effectiveness of redundant smart grid subsystems,” IEEE Transactions on Dependable and Secure Computing, vol. 19, no. 2, pp. 1018–1035, 2022. doi: 10.1109/TDSC.2020.3009931
    [4]
    Defense Advanced Research Projects Agency, “DARPA Configuration Security (ConSec) Program,” Available at: https://www.darpa.mil/attachments/ConsSecProposersDay1.pdf, 2017-11-17.
    [5]
    H. H. Liu, X. Wu, W. Zhou, et al., “Automatic life cycle management of network configurations,” in Proceedings of the Afternoon Workshop on Self-Driving Networks, Budapest, Hungary, pp. 29–35, 2018.
    [6]
    D. Comer and A. Rastegarnia, “Toward disaggregating the SDN control plane,” IEEE Communications Magazine, vol. 57, no. 10, pp. 70–75, 2019. doi: 10.1109/MCOM.001.1900063
    [7]
    D. Comer, “Configuration and operation,” in Automated Network Management Systems: Current and Future Capabilities, China Machine Press, Beijing China, pp. 103–112, 2009. (in Chinese)
    [8]
    Y. S. X. Lin, J. Bi, Y. Zhou, et al., “Research and applications of programmable data plane based on P4,” Chinese Journal of Computers, vol. 42, no. 11, pp. 2539–2560, 2019. (in Chinese) doi: 10.11897/SP.J.1016.2019.02539
    [9]
    A. Ratan, “Using artificial intelligence in operations,” in Practical Network Automation: A Beginner’s Guide to Automating and Optimizing Networks Using Python, Ansible, and More, 2nd ed., Ed. Packt Publishing, Birmingham, UK, pp. 618–619, 2018.
    [10]
    B. Claise, J. Clarke, and J. Lindblad, “Automation is as good as the data models, their related metadata, and the tools: For the network architect and operator introduction,” in Network Programmability with YANG: The Structure of Network Automation with YANG, NETCONF, RESTCONF, and gNMI, China Machine Press, Beijing China, pp. 306–331, 2021. (in Chinese)
    [11]
    T. Szigeti, D. Zacks, M. Falkner, and S. Arena, “Software Innovations,” in Cisco Digital Network Architecture: Intent-Based Networking for the Enterprise, Hoboken, NJ, USA, Cisco Press, pp. 189–224, 2018.
    [12]
    A. Bartusevics and L. Novickis, “Models for implementation of software configuration management,” Procedia Computer Science, vol. 43, pp. 3–10, 2015. doi: 10.1016/j.procs.2014.12.002
    [13]
    K. T. Foerster, S. Schmid, and S. Vissicchio, “Survey of consistent software-defined network updates,” IEEE Communications Surveys & Tutorials, vol. 21, no. 2, pp. 1435–1461, 2019. doi: 10.1109/COMST.2018.2876749
    [14]
    W. Kellerer, P. Kalmbach, A. Blenk, et al., “Adaptable and data-driven softwarized networks: Review, opportunities, and challenges,” Proceedings of the IEEE, vol. 107, no. 4, pp. 711–731, 2019. doi: 10.1109/JPROC.2019.2895553
    [15]
    M. He, A. M. Alba, A. Basta, et al., “Flexibility in softwarized networks: Classifications and research challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 3, pp. 2600–2636, 2019. doi: 10.1109/COMST.2019.2892806
    [16]
    Q. Cai, S. Alam, and J. M. Liu, “On the robustness of complex systems with multipartitivity structures under node attacks,” IEEE Transactions on Control of Network Systems, vol. 7, no. 1, pp. 106–117, 2020. doi: 10.1109/TCNS.2019.2919856
    [17]
    G. C. Zhang, Y. Q. Xia, X. F. Li, et al., “Multievent-triggered sliding-mode control for a class of complex dynamic network,” IEEE Transactions on Control of Network Systems, vol. 9, no. 2, pp. 835–844, 2022. doi: 10.1109/TCNS.2021.3124897
    [18]
    C. K. Zhang, Y. Cui, H. Y. Tang, et al., “State-of-the-art survey on software-defined networking (SDN),” Journal of Software, vol. 26, no. 1, pp. 62–81, 2015. (in Chinese) doi: 10.13328/j.cnki.jos.004701
    [19]
    M. Dai, G. Cheng, and Y. Y. Zhou, “Survey on measurement methods in software-defined networking,” Journal of Software, vol. 30, no. 6, pp. 1853–1874, 2019. (in Chinese) doi: 10.13328/j.cnki.jos.005832
    [20]
    L. Csikor, M. Szalay, G. Rétvári, et al., “Transition to SDN is HARMLESS: Hybrid architecture for migrating legacy ethernet switches to SDN,” IEEE/ACM Transactions on Networking, vol. 28, no. 1, pp. 275–288, 2020. doi: 10.1109/TNET.2019.2958762
    [21]
    A. Ludwig, S. Dudycz, M. Rost, et al., “Transiently policy-compliant network updates,” IEEE/ACM Transactions on Networking, vol. 26, no. 6, pp. 2569–2582, 2018. doi: 10.1109/TNET.2018.2871023
    [22]
    K. Subramanian, L. Antoni, and A. Akella. “Synthesis of fault-tolerant distributed router configurations,” in Proceedings of the ACM International Conference on Measurement and Modeling of Computer Systems, Irvine, CA, USA, pp. 87–89, 2018.
    [23]
    S. Achleitner, N. Bartolini, T. He, et al., “Fast network configuration in software defined networking,” IEEE Transactions on Network and Service Management, vol. 15, no. 4, pp. 1249–1263, 2018. doi: 10.1109/TNSM.2018.2874051
    [24]
    D. Streeb, M. El-Assady, D. A. Keim, et al., “Why visualize? Untangling a large network of arguments,” IEEE Transactions on Visualization and Computer Graphics, vol. 27, no. 3, pp. 2220–2236, 2021. doi: 10.1109/TVCG.2019.2940026
    [25]
    S. di Bartolomeo, M. Riedewald, W. Gatterbauer, et al., “STRATISFIMAL LAYOUT: A modular optimization model for laying out layered node-link network visualizations,” IEEE Transactions on Visualization and Computer Graphics, vol. 28, no. 1, pp. 324–334, 2022. doi: 10.1109/TVCG.2021.3114756
    [26]
    A. Gember-Jacobson, C. Raiciu, and L. Vanbever, “Integrating verification and repair into the control plane,” in Proceedings of the 16th ACM Workshop on Hot Topics in Networks, Palo Alto, CA, USA, pp. 129–135, 2017.
    [27]
    E. N. Zhai, A. Chen, R. Piskac, et al., “Check before you change: Preventing correlated failures in service updates,” in Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 575–590, 2020.
    [28]
    S. K. R. Kakarla, A. L. Tang, R. Beckett, et al., “Finding network misconfigurations by automatic template inference,” in Proceedings of the 17th USENIX Symposium on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 999–1014, 2020.
    [29]
    Y. Zhao, Y. R. Yang, B. Tian, et al., “An invocation chain test and evaluation method for fog computing,” Wireless Communications and Mobile Computing, vol. 2020, article no. 8812017, 2020. doi: 10.1155/2020/8812017
    [30]
    F. Tao, Y. Laili, Y. L. Liu, et al., “Concept, principle and application of dynamic configuration for intelligent algorithms,” IEEE Systems Journal, vol. 8, no. 1, pp. 28–42, 2014. doi: 10.1109/JSYST.2013.2275619
    [31]
    U. Dharmapriya, S. B. Kiridena, and N. Shukla, “A review of supply network configuration literature and decision support tools,” in Proceedings of the IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), Bali, Indonesia, pp. 149–153, 2016.
    [32]
    M. Sayagh, N. Kerzazi, B. Adams, et al., “Software configuration engineering in practice interviews, survey, and systematic literature review,” IEEE Transactions on Software Engineering, vol. 46, no. 6, pp. 646–673, 2020. doi: 10.1109/TSE.2018.2867847
    [33]
    E. Schede, J. Brandt, A. Tornede, et al., “A survey of methods for automated algorithm configuration,” Journal of Artificial Intelligence Research, vol. 75, pp. 425–487, 2022. doi: 10.1613/jair.1.13676
    [34]
    S. Achleitner, Q. Burke, P. McDaniel, et al., “MLSNet: A policy complying multilevel security framework for software defined networking,” IEEE Transactions on Network and Service Management, vol. 18, no. 1, pp. 729–744, 2021. doi: 10.1109/TNSM.2020.3045998
    [35]
    B. Li, Z. D. Wang, and L. F. Ma, “An event-triggered pinning control approach to synchronization of discrete-time stochastic complex dynamical networks,” IEEE Transactions on Neural Networks and Learning Systems, vol. 29, no. 12, pp. 5812–5822, 2018. doi: 10.1109/TNNLS.2018.2812098
    [36]
    X. P. Qi, K. Duan, and K. Wang, “Design of module-based test system configuration management system,” in Proceedings of the IEEE International Conference on Artificial Intelligence and Information Systems (ICAIIS), Dalian, China, pp. 194–197, 2020.
    [37]
    J. Edelman, S. S. Lowe, and M. Oswalt, “Network automation,” in Network Programmability and Automation: Skills for the Next-Generation Network Engineer, Eds. O’Reilly, Sebastopol, CA, USA, pp. 56–58, 2018.
    [38]
    E. L. Manibardo, I. Laña, and J. Del Ser, “Deep learning for road traffic forecasting: Does it make a difference?,” IEEE Transactions on Intelligent Transportation Systems, vol. 23, no. 7, pp. 6164–6188, 2022. doi: 10.1109/TITS.2021.3083957
    [39]
    P. Ashok, T. P. G. James, G. Malathi, et al., “Development of truly intelligent autonomous agents based on classical AI using complex representations,” in Proceedings of the International Conference on Power, Energy, Control and Transmission Systems (ICPECTS), Chennai, India, pp. 1–6, 2022.
    [40]
    C. G. Yang, X. R. Mi, Y. Ouyang, et al., “SMART intent-driven network management,” IEEE Communications Magazine, vol. 61, no. 1, pp. 106–112, 2023. doi: 10.1109/MCOM.002.2200119
    [41]
    Y. W. E. Sung, X. Z. Tie, S. H. Y. Wong, et al., “Robotron: Top-down network management at facebook scale,” in Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, pp. 426–439, 2016.
    [42]
    R. Beckett, R. Mahajan, T. Millstein, et al., “Don’t mind the gap: Bridging network-wide objectives and device-level configurations,” in Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, pp. 328–341, 2016.
    [43]
    R. Beckett, R. Mahajan, T. Millstein, et al., “Network configuration synthesis with abstract topologies,” in Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation, New York, NY, USA, pp. 437–451, 2017.
    [44]
    S. Choi, B. Burkov, A. Eckert, et al., “FBOSS: Building switch software at scale,” in Proceedings of the 2018 Conference of the ACM Special Interest Group on Data Communication, Budapest, Hungary, pp. 342–356, 2018.
    [45]
    A. El-Hassany, P. Tsankov, L. Vanbever, et al., “netcomplete: Practical network-wide configuration synthesis with autocompletion,” in Proceedings of the 15th USENIX Conference on Networked Systems Design and Implementation, Renton, WA, USA, pp. 579–594, 2018.
    [46]
    F. X. Tang, B. M. Mao, Y. Kawamoto, et al., “Survey on machine learning for intelligent end-to-end communication toward 6G: From network access, routing to traffic control and streaming adaption,” IEEE Communications Surveys & Tutorials, vol. 23, no. 3, pp. 1578–1598, 2021. doi: 10.1109/COMST.2021.3073009
    [47]
    Y. Zhao, X. M. Fang, R. S. Huang, et al., “Joint interference coordination and load balancing for OFDMA multihop cellular networks,” IEEE Transactions on Mobile Computing, vol. 13, no. 1, pp. 89–101, 2014. doi: 10.1109/TMC.2012.224
    [48]
    V. Sciancalepore, F. Z. Yousaf, and X. Costa-Perez, “z-TORCH: An automated NFV orchestration and monitoring solution,” IEEE Transactions on Network and Service Management, vol. 15, no. 4, pp. 1292–1306, 2018. doi: 10.1109/TNSM.2018.2867827
    [49]
    M. Samson, T. Vergnaud, É. Dujardin, et al., “A model-based approach to automatic generation of TSN network simulations,” in Proceedings of the IEEE 18th International Conference on Factory Communication Systems (WFCS), Pavia, Italy, pp. 1–8, 2022.
    [50]
    A. Kanso, F. Khendek, M. Toeroe, et al., “Automatic configuration generation for service high availability with load balancing,” Concurrency and Computation: Practice & Experience, vol. 25, no. 2, pp. 265–287, 2013. doi: 10.1002/cpe.2805
    [51]
    A. Syed, B. Anwer, V. Gopalakrishnan, et al., “DEPO: A platform for safe DEployment of POlicy in a software defined infrastructure,” in Proceedings of the 2019 ACM Symposium on SDN Research, San Jose, CA, USA, pp. 98–111, 2019.
    [52]
    R. Birkner, D. Drachsler-Cohen, L. Vanbever, et al., “Config2Spec: Mining network specifications from network configurations,” in Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 969–984, 2020.
    [53]
    N. Perera, “Automatic configuration management: Autodiscovery of configuration items and automatic configuration verification,” in Proceeding of the International Conference on Space Operations (SpaceOps), Daejeon, Korea, pp. 1–13, 2016.
    [54]
    H. H. Liu, Y. B. Zhu, J. Padhye, et al., “CrystalNet: Faithfully emulating large production networks,” in Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, pp. 599–613, 2017.
    [55]
    L. Z. Tan, W. Su, W. Zhang, et al., “A packet loss monitoring system for in-band network telemetry: Detection, localization, diagnosis and recovery,” IEEE Transactions on Network and Service Management, vol. 18, no. 4, pp. 4151–4168, 2021. doi: 10.1109/TNSM.2021.3125012
    [56]
    J. Y. Pan, Z. X. Wei, W. Chen, et al., “Orchestrating probabilistic in-band network telemetry for network monitoring,” in Proceedings of the International Conference on Computer and Communications (ICCC), Chengdu, China, pp. 441–446, 2021.
    [57]
    A. Fogel, S. Fung, L. Pedrosa, et al., “A general approach to network configuration analysis,” in Proceedings of the 12th USENIX Conference on Networked Systems Design and Implementation, Oakland, CA, USA, pp. 469–483, 2015.
    [58]
    R. Beckett, A. Gupta, R. Mahajan, et al., “A general approach to network configuration verification,” in Proceedings of the Conference of the ACM Special Interest Group on Data Communication, Los Angeles, CA, USA, pp. 155–168, 2017.
    [59]
    A. Panda, K. Argyraki, M. Sagiv, et al., “New directions for network verification,” in Proceedings of the 1st Summit on Advances in Programming Languages (SNAPL), Dagstuhl, Germany, pp. 209–220, 2015.
    [60]
    S. Prabhu, K. Y. Chou, A. Kheradmand, et al., “Plankton: Scalable network configuration verification through model checking,” in Proceedings of the 17th USENIX Conference on Networked Systems Design and Implementation, Santa Clara, CA, USA, pp. 953–968, 2020.
    [61]
    S. K. Fayaz, T. Sharma, A. Fogel, et al., “Efficient network reachability analysis using a succinct control plane representation,” in Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation, Savannah, GA, USA, pp. 217–232, 2016.
    [62]
    A. Gember-Jacobson, A. Akella, R. Mahajan, et al., “Automatically repairing network control planes using an abstract representation,” in Proceedings of the 26th Symposium on Operating Systems Principles, Shanghai, China, pp. 359–373, 2017.
    [63]
    A. Gember-Jacobson, R. Viswanathan, A. Akella, et al., “Fast control plane analysis using an abstract representation,” in Proceedings of the 2016 ACM SIGCOMM Conference, Florianopolis, Brazil, pp. 300–313, 2016.
    [64]
    Y. H. Li, X. Yin, Z. L. Wang, et al., “A survey on network verification and testing with formal methods: Approaches and challenges,” IEEE Communications Surveys & Tutorials, vol. 21, no. 1, pp. 940–969, 2019. doi: 10.1109/COMST.2018.2868050
    [65]
    J. A. Riaza and G. Moreno, “Using SAT/SMT solvers for efficiently tuning fuzzy logic programs,” in Proceedings of the IEEE International Conference on Fuzzy Systems (FUZZ-IEEE), Glasgow, UK, pp. 1–8, 2020.
    [66]
    S. Zhou, J. B. Wang, J. Jia, et al., “A formal verification method for the SOPC software,” IEEE Transactions on Reliability, vol. 71, no. 2, pp. 818–829, 2022. doi: 10.1109/TR.2022.3166548
    [67]
    F. L. Li, J. H. Yang, J. P. Wu, et al., “Research on internet automatic configuration,” Journal of Software, vol. 25, no. 1, pp. 118–134, 2014. (in Chinese) doi: 10.13328/j.cnki.jos.004458
    [68]
    S. Sinche, D. Raposo, N. Armando, et al., “A survey of IoT management protocols and frameworks,” IEEE Communications Surveys & Tutorials, vol. 22, no. 2, pp. 1168–1190, 2020. doi: 10.1109/COMST.2019.2943087
    [69]
    S. Kim, J. Kim, and S. Maeng, “Modeling and evaluation of serial multicast remote procedure calls (RPCs),” IEEE Communications Letters, vol. 13, no. 4, pp. 283–1097, 2009. doi: 10.1109/TR.2022.3166548.
    [70]
    F. Lei, D. Z. Dong, and X. K. Liao, “Exploring the galaxyfly family to build flexible-scale interconnection networks,” IEEE Transactions on Parallel and Distributed Systems, vol. 33, no. 5, pp. 1054–1068, 2022. doi: 10.1109/TPDS.2021.3100783
    [71]
    Y. Y. Liu, Z. Y. Liu, F. Fang, et al., “Hierarchical domain-consistent network for cross-domain object detection,” in Proceedings of the IEEE International Conference on Image Processing (ICIP), Anchorage, AK, USA, pp. 474–478, 2021.
    [72]
    H. Chahed and A. J. Kassler, “Software-defined time sensitive networks configuration and management,” in Proceedings of the IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), Heraklion, Greece, pp. 124–128, 2021.
    [73]
    L. Z. You, J. H. Zhang, Y. L. Jin, et al., “Fast configuration change impact analysis for network overlay data center networks,” IEEE/ACM Transactions on Networking, vol. 30, no. 1, pp. 423–436, 2022. doi: 10.1109/TNET.2021.3114448
    [74]
    S. K. Patri, E. Grigoreva, W. Kellerer, et al., “Rational agent-based decision algorithm for strategic converged network migration planning,” Journal of Optical Communications and Networking, vol. 11, no. 7, pp. 371–382, 2019. doi: 10.1364/JOCN.11.000371
    [75]
    M. Quamara, G. Pedroza, and B. Hamid, “Multi-layered model-based design approach towards system safety and security co-engineering,” in Proceedings of the ACM/IEEE International Conference on Model Driven Engineering Languages and Systems Companion (MODELS-C), Fukuoka, Japan, pp. 274–283, 2021.
    [76]
    L. Hiryanto, S. Soh, K. W. Chin, et al., “Green multi-stage upgrade for bundled-links SDN/OSPF-ECMP networks,” in Proceedings of the IEEE International Conference on Communications, Montreal, QC, Canada, pp. 1–7, 2021.
    [77]
    W. Quan, Z. Xu, M. Liu, et al., “AI-driven packet forwarding with programmable data plane: A survey,” IEEE Communications Surveys & Tutorials, vol. 25, no. 1, pp. 762–790, 2023. doi: 10.1109/COMST.2022.3217613.
    [78]
    H. W. Hui, C. C. Zhou, S. G. Xu, et al., “A novel secure data transmission scheme in industrial internet of things,” China Communications, vol. 17, no. 1, pp. 73–88, 2020. doi: 10.23919/JCC.2020.01.006
    [79]
    A. Aminpour and P. Razzaghi, “Weakly supervised semantic segmentation using hierarchical multi-image model,” in Proceedings of the Iranian Conference on Electrical Engineering (ICEE), Mashhad, Iran, pp. 1634–1640, 2018.
    [80]
    J. Brenes, A. García-Martínez, M. Bagnulo, et al., “Power prefixes prioritization for smarter BGP reconvergence,” IEEE/ACM Transactions on Networking, vol. 28, no. 3, pp. 1074–1087, 2020. doi: 10.1109/TNET.2020.2979665
    [81]
    M. Quamara, G. Pedroza, and B. Hamid, “Introducing a multi-layered model-based design approach towards safety-security co-engineering,” in Proceedings of the IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C), Hainan, China, pp. 1163–1164, 2021.
    [82]
    L. Pradittasnee, S. Camtepe, and Y. Tian, “Efficient route update and maintenance for reliable routing in large-scale sensor networks,” IEEE Transactions on Industrial Informatics, vol. 13, no. 1, pp. 144–156, 2021. doi: 10.1109/TII.2016.2569523.
    [83]
    M. Behringer, M. Pritikin, S. Bjarnason, et al., “Autonomic networking: Definitions and design goals,” Available at: https://www.rfc-editor.org/rfc/pdfrfc/rfc7575.txt.pdf, 2015-06-01.
    [84]
    A. Clemm, L. Ciavaglia, L. Z. Granville, et al., “Intent-based networking-concepts and definitions,” Available at: https://datatracker.ietf.org/doc/rfc9315/, 2022-10-11.
    [85]
    Q. Sun, W. Liu, and K. Xie, “An intent-driven management framework,” Available at: https://datatracker.ietf.org/meeting/105/materials/slides-105-nmrg-an-intent-driven-management-framework-01.pdf, 2019-07-08.
    [86]
    R. Perez, A. Zabala, and A. Banchs, “Alviu: An intent-based SD-WAN orchestrator of network slices for enterprise networks,” in Proceedings of the IEEE 7th International Conference on Network Softwarization (NetSoft), Tokyo, Japan, pp.211–215, 2021.
    [87]
    S. Larkin, W. Collicott, and J. Hiebel, “Modeling expert knowledge in a heuristic-based gin rummy agent,” in Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), Virtual Event, pp. 15577–15582, 2021.
    [88]
    M. F. Balcan, T. Sandholm, and Ellen Vitercik, “Refined bounds for algorithm configuration: The knife-edge of dual class approximability,” in Proceedings of the 37th International Conference on Machine Learning (ICML), Vienna, Austria, article no. 55, 2020.
    [89]
    N. Halliwell, “Evaluating explanations of relational graph convolutional network link predictions on knowledge graphs,” in Proceedings of the AAAI Conference on Artificial Intelligence (AAAI), Virtual Event, pp. 12880–12881, 2022.
    [90]
    B. Y. Hou, Q. Chen, Z. Q. Chen, et al., “r-HUMO: A risk-aware human-machine cooperation framework for entity resolution with quality guarantees,” IEEE Transactions on Knowledge and Data Engineering, vol. 32, no. 2, pp. 347–359, 2020. doi: 10.1109/TKDE.2018.2883532
    [91]
    B. M. Mao, Y. Kawamoto, J. J. Liu, et al., “Harvesting and threat aware security configuration strategy for IEEE 802.15. 4 based IoT networks,” IEEE Communications Letters, vol. 23, no. 11, pp. 2130–2134, 2019. doi: 10.1109/LCOMM.2019.2932988
    [92]
    F. Q. Liu, H. Huang, Z. M. Yang, et al., “Search-based algorithm with scatter search strategy for automated test case generation of NLP toolkit,” IEEE Transactions on Emerging Topics in Computational Intelligence, vol. 5, no. 3, pp. 491–503, 2021. doi: 10.1109/TETCI.2019.2914280
    [93]
    Y. Cao, R. Wang, M. Chen, et al., “AI agent in software-defined network: Agent-based network service prediction and wireless resource scheduling optimization,” IEEE Internet of Things Journal, vol. 7, no. 7, pp. 5816–5826, 2020. doi: 10.1109/JIOT.2019.2950730
    [94]
    O. Alhussein, P. T. Do, Q. Ye, et al., “A virtual network customization framework for multicast services in NFV-enabled core networks,” IEEE Journal on Selected Areas in Communications, vol. 38, no. 6, pp. 1025–1039, 2020. doi: 10.1109/JSAC.2020.2986591
    [95]
    Y. Bi, C. C. Meixner, M. Bunyakitanon, X. Vasilakos, et al., “Multi-objective deep reinforcement learning assisted service function chains placement,” IEEE Transactions on Network and Service Management, vol. 18, no. 4, pp. 4134–4150, 2021. doi: 10.1109/TNSM.2021.3127685
    [96]
    L. L. Zheng, H. L. Xu, S. Chen, et al., “Performance guaranteed single link failure recovery in SDN overlay networks,” in Proceedings of the IEEE 26th International Conference on Parallel and Distributed Systems (ICPADS), Hong Kong, China, pp. 703–708, 2020.
    [97]
    L. Y. Ji, S. B. He, W. J. Wu, et al., “Dynamic network slicing orchestration for remote adaptation and configuration in industrial IoT,” IEEE Transactions on Industrial Informatics, vol. 18, no. 6, pp. 4297–4307, 2022. doi: 10.1109/TII.2021.3131355
    [98]
    E. Municio, N. Balemans, S. Latré, et al., “Leveraging distributed protocols for full end-to-end softwarization in IoT networks,” in Proceedings of the IEEE 17th Annual Consumer Communications & Networking Conference (CCNC), Las Vegas, NV, USA, pp. 1–6, 2020.
    [99]
    R. Ganduri, R. Dantu, M. Thompson, et al., “A human-network-security-interface for an average joe,” in Proceedings of the IEEE International Conference on Intelligence and Security Informatics (ISI), Arlington, VA, USA, pp. 1–6, 2020.
    [100]
    C. Lorenz, V. Clemens, M. Schrötter, et al., “Continuous verification of network security compliance,” IEEE Transactions on Network and Service Management, vol. 19, no. 2, pp. 1729–1745, 2022. doi: 10.1109/TNSM.2021.3130290
    [101]
    S. Guellouz, A. Benzina, M. Khalgui, et al., “Designing efficient reconfigurable control systems using IEC61499 and symbolic model checking,” IEEE Transactions on Automation Science and Engineering, vol. 16, no. 3, pp. 1110–1124, 2019. doi: 10.1109/TASE.2018.2868897
    [102]
    Y. Zhang, K. Chakrabarty, Z. B. Peng, et al., “Software-based self-testing using bounded model checking for out-of-order superscalar processors,” IEEE Transactions on Computer-Aided Design of Integrated Circuits and Systems, vol. 39, no. 3, pp. 714–727, 2020. doi: 10.1109/TCAD.2018.2890695
    [103]
    Y. Zhao, X. M. Fang, B. Huang, et al., “Resource allocation scheme based on load balancing for OFDMA two-hop relay networks,” Journal of Southwest Jiaotong University, vol. 48, no. 1, pp. 94–101, 2013. (in Chinese) doi: 10.3969/j.issn.0258-2724.2013.01.015
    [104]
    A. Rahman and L. Williams, “Characterizing defective configuration scripts used for continuous deployment,” in Proceedings of the IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), Västerås, Sweden, pp. 34–45, 2018.
    [105]
    A. Lara and B. Ramamurthy, “OpenSec: Policy-based security using software-defined networking,” IEEE Transactions on Network and Service Management, vol. 13, no. 1, pp. 30–42, 2016. doi: 10.1109/TNSM.2016.2517407
    [106]
    C. C. Machado, L. Z. Granville, and A. Schaeffer-Filho, “ANSwer: Combining NFV and SDN features for network resilience strategies,” in Proceedings of the IEEE Symposium on Computers and Communication (ISCC), Messina, Italy, pp. 391–396, 2016.
    [107]
    I. Hafeez, A. Y. Ding, L. Suomalainen, et al., “Securebox: Toward safer and smarter IoT networks,” in Proceedings of the 2016 ACM Workshop on Cloud-Assisted Networking, Irvine, CA, USA, pp. 55–60, 2016.
    [108]
    Z. L. Zhao, E. Schiller, E. Kalogeiton, et al., “Autonomic communications in software-driven networks,” IEEE Journal on Selected Areas in Communications, vol. 35, no. 11, pp. 2431–2445, 2017. doi: 10.1109/JSAC.2017.2760354
    [109]
    S. Choi and J. Kwak, “Enhanced SDIoT security framework models,” International Journal of Distributed Sensor Networks, vol. 12, no. 5, article no. 4807804, 2016. doi: 10.1155/2016/4807804
    [110]
    K. Fysarakis, N. E. Petroulakis, A. Roos, et al., “A reactive security framework for operational wind parks using service function chaining,” in Proceedings of the IEEE Symposium on Computers and Communications (ISCC), Heraklion, Greece, pp. 663–668, 2017.
    [111]
    A. M. Zarca, J. B. Bernabe, I. Farris, et al., “Enhancing IoT security through network softwarization and virtual security appliances,” International Journal of Network Management, vol. 28, no. 5, article no. e2038, 2018. doi: 10.1002/nem.2038
    [112]
    X. C. Liu, “Application of configuration software in remote monitoring system,” in Proceedings of the International Conference on Virtual Reality and Intelligent Systems (ICVRIS), Hunan, China, pp. 263–266, 2018.
    [113]
    C. C. Min, D. C. Zhao, and H. Lu, “The processing method of the message based on the in-band network telemetry technology,” in Proceedings of the International Conference on Service Science (ICSS), Zhuhai, China, pp. 21–24, 2022.
    [114]
    B. Gu, J. L. Li, J. C. Fang, et al., “Airborne distributed POS flexible baseline measurement method based on MCLS,” IEEE Sensors Journal, vol. 19, no. 6, pp. 2087–2095, 2019. doi: 10.1109/JSEN.2018.2886582
    [115]
    B. Małysiak-Mrozek, M. Stabla, and D. Mrozek, “Soft and declarative fishing of information in big data lake,” IEEE Transactions on Fuzzy Systems, vol. 26, no. 5, pp. 2732–2747, 2018. doi: 10.1109/TFUZZ.2018.2812157
    [116]
    J. J. Carroll, P. Anand, and D. Guo, “Preproduction deploys: Cloud-native integration testing,” in Proceedings of the IEEE Cloud Summit (Cloud Summit), Hempstead, NY, USA, pp. 41–48, 2021.
    [117]
    S. Yang, L. Z. Cui, X. H. Deng, et al., “FISE: A forwarding table structure for enterprise networks,” IEEE Transactions on Network and Service Management, vol. 17, no. 2, pp. 1181–1196, 2020. doi: 10.1109/TNSM.2019.2951426
    [118]
    A. Bartel, J. Klein, and Y. Le Traon, “Musti: Dynamic prevention of invalid object initialization attacks,” IEEE Transactions on Information Forensics and Security, vol. 14, no. 8, pp. 2167–2178, 2019. doi: 10.1109/TIFS.2019.2894356
    [119]
    A. Umunnakwe, A. Sahu, and K. Davis, “Multi-component risk assessment using cyber-physical betweenness centrality,” in Proceedings of the IEEE Madrid PowerTech, Madrid, Spain, pp. 1–6, 2021.
    [120]
    L. G. Chen, J. Guo, Z. L. He, D. L. Mu, et al., “RoBin: Facilitating the reproduction of configuration-related vulnerability,” in Proceedings of the IEEE 20th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), Shenyang, China, pp. 91–98, 2021.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(9)  / Tables(2)

    Article Metrics

    Article views (360) PDF downloads(116) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return